Professional Documents
Culture Documents
1.The three concepts used to explain the foundation of blockchain are ________________ .
--->Distributed Network, Cryptography , Public Ledger
2.Consortium blockchain has a predefined set of nodes allowing the users to write the data.
--->true
3.Blockchain which is popularly known as ‘for the people, by the people and of the people” is
___________. --->Public Blockchain
7.Hash is used to ensure integrity of the data transmitted in the blockchain network. --->true
9.In bitcoin mining, the computational power adjusts the difficulty level of mining. --->true
14.Which platform could gain its best use case from supply chain industry? --->Hyperledger
16.Which platform could gain its best use case from financial service industry? --->R3 Corda
17.________ is checked for your previous transactions to determine your wallet balance.
--->Ledger
19.A copy of the blockchain is maintained locally in all the user nodes of the network. --->true
24.Which among the following are the advantages of using bitcoin? --->All the options
35.In asymmetric key cryptography, the public key is available with ________. --->everyone in
the network
37.Block rewards are given for every successful transaction verification in the network. --->true
39.The __ key(s) plays a significant role in the encryption and decryption of blocks.
--->private(wrong)
43.Chose the correct option. --->Hash algorithm takes inputs of any size and produces an output
of a fixed size.
44.The sender and the receiver of a transaction always provide miners with a fee. --->false
46.Currencies other than bitcoin such as Litecoin and Dash are popularly known as
___________. --->Altcoins
51.The value of coins, such as litecoin and bitcoin, remains the same across all the exchanges
that actively trade them. --->false
54.Blockchain provides visibility to the user, thus imposing a more significant potential for cyber
risk. --->false
3.On which type of clients from control room can you schedule tasks? --->Runtime client
4.Using Email automation command, you can directly receive emails from the server without
having an Email client interface such as Gmail. --->true
6.Web recorder can also be used to work with windows or desktop applications. --->false
7.Meta bots are utilized in AA as a reusable component and let us work with visual captures and
DLLs. --->true
9.Following operations can be done utilizing string operation command? --->All the option
10.Mapping of variables from main task to sub-task can be done using ___________. --->Run
task command
12.You can find one image in another image and do left-click, right-click and double-click using
_________. --->image recognition command
13.In Automation anywhere task editor window, we can manually write the lines of code without
using a single AA command. --->false
14.Automation Anywhere offers some special variables that can be utilized inside the loop
command ___________. --->Excel and table column
15.___________ is the command you can utilize to hold the bot execution for a particular period
and then continue. --->delay
16.Automation Anywhere offers us the flexibility to run the task by utilizing Runtime Client,
Development Client, and Control Room. --->false
17.Which system variable is utilized to read the CSV and text files? --->Filedata column
18.PDF integration command cannot be used for ___________. --->converting pdf files to word
document
19.It is optional to offer CSV path for pattern-based data extraction in web recording. --->true
21.Automation Anywhere is compatible with SAP, Oracle, Mainframes, and Java applications.
--->true
22.SQL query option under Database command can be utilized to insert, delete, and update the
SQL table. --->false
23.Which of the following commands is more prescribed while creating a bot? --->insert
keystrokes
24.What is the exact order in Automation Anywhere - Most friendly-Moderate friendly - Least
friendly formats? --->Excel-pdf-power point
27.Mapping of variables from main task to sub-task can be done using ___________. --->Run
task command
30.AA auto login feature permits us __________. --->AA auto login feature permits us
__________.
2.In a process, which data item can be used to store the values from Rows and Columns fetched
from .xls file? --->Collection
4.What is correct about Object Studio? --->Object Studio does not have a Main Page, but It does
have 2 default page
5.What are all the spy modes in Blue Prism? --->Win 32 Mode, HTML Mode, Active Accessibility
Mode, Region Mode
6.What is the purpose of Action Stage? --->It’s used to call a Business Object page from a
Processes.
7.Which stage enables a Business Object to pause and wait for an application element?
--->wait stage
9.Which stage is available in Object Studio but not in process studio? --->Wait Stage
10.How do you refer the Collection Fields? Identify the correct option. --->‘Collection Name.Field
Name’
12.Which of the following statement in incorrect? --->Queued cases can be monitored and
maintained from Control Room
13.Which stage is used in Blue Prism Object Studio to launch an application ____ --->Navigate
14.Application Modelling can be done in which Module of Blue Prism? --->Object Studio
15.Which of the System Manager module of Blue Prism provides the below functionalities?
--->All
16.Which of the following statements is true when employing multiple object in object layer?
--->Reduces the risk to the process layer when a change is made in object layer
17.Exception Bubbling means ___________. --->Exception travel upwards towards the Main
Page of the Process
18.The Stage which can be used to throw can exception in Blue Prism Process is _____________.
--->Exception Stage
19.Which stage enables a Business Object to pause and wait for an application element? --->wait
stage
20.Which part of Blue Prism interacts with the target system (the application a user would use)?
--->Application Modeller
22.Code Stage in Blue Prism does not allow to write code in which programming language?
--->java
24.Which stage always comes, if we insert Wait Stage in our Object? --->Pause stage
25.Which of the following statements are correct? --->Blue Prism can be configured to handle an
exception and continue processing.
26.Select the incorrect statement. --->One recover Stage can handle all exceptions on a page
28.Which of the following statements is correct regarding the key field of the Work Queue?
--->The key field value can only be set when the case if first added to the queue.
30.Which stage allows to move forward through the rows of a collection? --->loop stage
31.Which type of brackets must be used to include a Data Item in an expression? --->Square
brackets
32.What is true about Global Data Items? --->Global Data Items name and Local Data Items
name cannot share same name
33.To spy the elements in any mode in an application, the keyboard shortcut is _________.
--->CTRL + Left Click
34.What is true about defer items from the Work Queue? --->All the options
35.Identify the two stages that that should always be there in process definition --->Start stage
and End Stage
2.OpenSpan helps in enhancing the ________ platform(s) of Pega. --->BPM and CRM
4.Which of the following is a property of the web adapter? --->All the options
7.To start web interrogation, global web page function should always be kept as default. --->true
9._________ is used for querying the data in the table. --->Data cells
12.In UWA, _______ leaves the open tabs when interrogation is stopped. --->Stop Running
13.By using project to project reference, changes are updated in all the referenced application
projects. --->True
14._________ need(s) minimum code and execute(s) faster than loops. --->Queries
15.How many input parameters are present for a for loop? --->3
16._____ character is used to allow dynamic data in the design block. --->@
17._______ helps in creating dependencies between the projects in the build. --->Project to
project reference
18._________ is used for specifying unique data elements. --->All the options
19.In message manifest, all the messages are stored in the central repository. --->true
23.An activity can start in one framework project and end in another framework project. --->true
24._________ help in identifying the elements across multiple instances. --->Match Rules
26.With the help of _________, you can easily find where the error has occurred. --->indicator
27._________ is/are the method(s) for activities. --->Cancel and start activities
31.To create a window based application, which adapter should be chosen? --->windows
adapter(wrong)
33.While editing automation, you can open the playback file. --->false
34.Renaming the interrogated control can be done in _______ tool window. --->Object
Explorer(wrong)
36.__________ animates the automation activities in runtime log files. --->Automation playback
37.For loop uses ______ as a counter to iterate through the logic. --->index
38.The dependency between the parent and child steps can be created using _____. --->Wait
step
4.Software built as microservices can, by definition, be broken down into multiple component
services. --->true
6.Microservice Architecture adapts which of the following concept(s)? --->All the options
7.The client expects a timely response from the service and might even block while it waits. This
represents the _________ client service interaction style. --->Synchronous
9.Scenarios where the client takes the onus and is responsible for determining the network
locations of the available service instances is _________ --->Client-side discovery
10.The two types of Service Discovery includes Client-side discovery and server-side discovery.
--->true
13.The transactions that span across multiple services are handled by ___________ --->Event
driven Architecture
14.Which of these is a drawback of Multiple Services per Host pattern? --->Difficult to limit
resource utilization(wrong)
15.Packer.io and Boxful represent ______________ type of pattern. --->Service Instance per Host
16.Service Instance per Host pattern provides ________________ --->ALL the options
19.Which pattern collects and reports all exceptions to a centralized exception tracking service?
--->Exception tracing
20.The following are all caching types, except ___________ --->Local & Remote Cache (wrong)
21._____________ helps to control and limit the number of consecutive request failures that
cross a threshold. --->Circuit breaker
31.__________ is the ability to store something temporarily to reduce the loading times, and I/O
of a system. --->Cache
4.The following statements are true about Ionic framework, except _____________ --->It is built
on top of Cascading, Scalding, C++ and Node.js
5.Which of the following includes device APIs that allow accessing native device features like
camera or maps? --->Cordova
6.Which of the following classes can be used to group a set of items in a list? --->item-divider
7.Which of the following tags displays a button with rounded corners? --->both the options
8.Which of the following classes can be used to create a button that occupies the entire width of
the screen? --->button-block
12.Which of the following components uses "CSS Flexible Box Layout"? --->Grid
14.Which of the following is a content pane that can go over the user’s main view temporarily?
--->Modal
15.What is the ionic directive that can be used for creating a tab bar? --->ion-tabs
16.Which of the following interaction modes can be enabled by using ionList and ionItem
directives? --->All
17.Which of the following directives can be used to enable the "pull to refresh" functionality?
--->ion-refresher
18.Which of the following components is a multi-page container where each page can be swiped
or dragged between? --->ion-slides
20.What is the command for running an app in iOS emulator? --->ionic emulate ios
21.In Ionic CLI, which of the following commands can be used to automatically monitor changes
in the file system? --->ionic serve
23.Which of the following is a slide-up pane that lets the user choose from a set of options?
--->Action Sheet
24.Which of the following is the place to check for community contributed Ionic Components?
--->Ionic Market
25.Which of the following directives can help in using Ionic custom Scroll View, or the built-in
overflow scrolling of the browser? --->ion-content
26.Which of the following CSS components are best to create a News App that displays a picture
and a caption with short description? --->cards
27.Which of the following offers AngularJS wrappers for the most popular Cordova plugins?
--->ngCordova
28.Which CSS component is ideal for creating top navigation for a mobile app? --->tabs
Caching Techniques(in Microservices)
1.A cache is a ______________. --->Small and fast memory
2.Which type of caching can be used to cache the contest registration page in a website, to
reduce the time taken to serve the page for the users? --->Application Cache
3.In which type of cache does the application directly interacts with database for data that is not
available in the cache? --->Cache-aside
4.In which type of cache does the application treats cache as the main data store, reads data
from it and writes data to it? (I) Read Through/Write Through Cache (II) Cache-aside --->I
6.Which of the following Cache Eviction techniques consider Locality? --->Least Recently Used
7.When a computer processor does not get a data item that it requires in the cache, it is known
as _________. --->Cache Hit
8.Which type of cache is recommended to store user preferences for an application with several
100s of concurrent users? --->On Demand Cache
9..A byte addressable direct-mapped cache has 1024 blocks/lines, with each block having eight
32-bit words. How many bits are required for block offset, assuming a 32-bit address? --->5
10.Which of the following is true about a well-designed cache? --->Hit Rate > Miss Rate
12.Which type of cache reference locality aims at designing cache to store the entire block near
the Recently Referenced Data? (I) Temporal Locality (II) Spatial Locality --->II
13.The Caching Technique where the cache is populated the first time a particular piece of data
is requested is called _________. --->Lazy Loading
14.A web page displays ten items per page and has pagination enabled. What would be the
recommended way to enable efficient paging? --->Use Spatial Cache
15.Which type of cache reference locality aims at designing cache to store Recently Referenced
Data assuming that the same data will be requested frequently? --->Temporal Locality
16.Cache Performance or Average Memory Access Time (AMAT) depends on which of the
following? --->All the options
17.While using a Write Back cache, which of the following policies needs to be abided? --->Write
Allocate
19.For a cache look up to be a Hit, which of the following must be true? --->Tag==Block Number
and Valid Bit = 1
4.Which of the following is a value of DevOps? --->DevOps goals span the entire delivery pipeline
6.The following are benefits of automation in DevOps, except it _________ --->Implants Manual
Errors
7.What is the desire in the organization to push things to production termed as? --->Live Site
Culture
8.Minimizing conflicts when merging code should be one of your goals while performing
branching. --->true
9.During the Continuous Integration process, unit tests are executed during the build. --->true
10._____________ ensures that the code deployed to the production environment is not
necessarily released to all end users. --->Feature Flag
16.In Manual Integration testing, Human Intelligence is waged against the application. --->true
17._____________ is the automated system used for continuous integration (Build Code, Create
Packages and Run Code). --->Buil pipeline
18.DevOps is people following a _________ enabled by products to deliver value to the end
users. --->Process
19.Improving the quality and performance of the applications is a major driver for switching to
DevOps. --->true
20.What is the metric used to measure how quickly we are deploying? --->Mean time to
recover(wrong)
21.What is the desire in the organization to push things to production termed as? --->Live Site
Culture
24.It is acceptable if all the environments are not consistent in a DevOps lifecycle. --->false
2.______ stores longer-lived control data like component IP addresses and distributed locks.
--->Consul
6.Command to list the services available to the targeted organization is ____________. --->cf
marketplace
11.Which of the following option is used to specify push timeout in seconds? ---> -t
15.Which of the following command lists all the applications within a space? --->cf apps
19.Blobstore is a repository for the large binary file that contains _____. --->All the options
22.Cloud Native applications should ____________ to access local file system. --->Attempt
23.What are services in Cloud Foundry? --->Any type of add-on that can be provisioned along
side your apps.
28.What is the purpose of –n option under cf push command? --->To specify the name of the
app as it appears in Cloud Foundry
29.______________ defines how to get to an application. --->Route
34.Which option can be used to see the current organization and space? --->cf target
36.What are three activities involved in deploying an application to Cloud Foundry? --->deploy,
push, upload
43.What can you do if your application uses a language or framework that Cloud Foundry
buildpacks do not support? Choose all the correct options. --->all
44.Why should one go for Cloud Foundry? Select all the applicable options. --->All
45.Market place services are ___________. Choose the correct option. --->CF Managed
48.Select all the languages for which Build Packs are available. --->Ruby and java
49.What is the route that is set for the application and deployed using the command? --->cf push
spring-music
50.What is meant by routes in Cloud Foundry? --->A resource that define routes to apps.
51.Select the valid log manager____. --->Splunk(wrong)
55.As per 12 Factor, each component in the codebase should be an APP. --->true
58.What is the command to see the logs of the application deployed to cloud foundry? --->cf logs
Bitbucket(in DevOps)
1.Which stage of artifact denotes that the files are added to the index but not in Git Database?
--->staged
2.Which stage of artifact denotes that the files are stored in Git Database? --->Committed
4.Which version control system allows every developer to have a complete codebase along with
the history? --->Distributed Version Control System
5.Does Bitbucket allow the user to restrict the other users from using his/her repository? --->yes
8.The logical unit in Mercurial which has a group of files that are modified. --->ChangeSet
14.Which of the following IDE’s has the Bitbucket feature integrated within? --->All
3.It is mandatory to install Android Studio or Xcode for developing a React Native mobile
application. --->false
4.JSX is JavaScript with a syntax extension which allows a mixture between _______________
and ___________. --->JavaScript and XML tags
5._______________ are the building blocks for a React Native application. --->Component
6.AppRegistry is the JavaScript exit point to run all React Native apps. --->false
7.Please select the one which is not a React Native UI Component. --->Switch
8.Which method is called when a component is being removed from the DOM?
--->componentWillUnmount()
9.With React Native, you just style your application using _______________. --->CSS(wrong)
,,,javascript
11..apk extension is the application file for Android whereas_______________ extension is the
application file for iOS. --->.IPA
12.The _______________ file defines some metadata for your project and, most importantly,
declares React-Native as a dependency of your project. --->package.json
13.By writing CSS in JavaScript, you are isolating styles from _______________. --->global
namespac
14.In Reactive forms, the HTML of the forms are automatically created. --->false
16.To build an iOS app, you need a Mac OS, and to build an Android app you need
____________. --->Any
17.Live Reloading and Hot Loading is present in React Native Developer Tools. --->true
18.Which method retrieves automatic updates about the current location of the device?
--->Geolocation.watchPosition()
20.For networking needs, React Native framework provides the fetch API. --->true
22.React Native is like other Hybrid Apps that are actually slower than Native mobile apps.
--->true ,,, false
24.Which command do you have to run for installing React Native? --->npm install -g react-
native-cli
25.How do you create a new React Native project? --->$ react-native init
28.In React Native, Geolocation API is available through the _______________ global, so you do
not need to import it. --->navigator.geolocation
29.One of the benefits of React Native vs. Native Development is that React Native has the live
reload ability. --->true
30.You can use any CSS in the styles of the React Native StyleSheet object. --->true
32.Which Objective C file can be used to switch the React Native bundle location in bundle.cc?
--->AppDelegate.m
Redis(in Microservices)
1.Which configuration setting specifies the file to which the RDB snapshot dump is saved?
--->dbfilename
2.When using Pipelining, will the additional memory used be high? --->very less(wrong)
3.redis.conf is configured for changing ____________ to connect to the Redis server. --->port
4.Redis provides multi-state architecture during replication, where every instance can both read
and write. --->false
5.The _________ command is used to remove the expiration from a key. --->Persist
6.Which of the following does the Redis Hashes store --->Key value pair
7._______ sets the key to expire within the given number of seconds. --->EXPIRE
9.Which of the following commands returns the remaining time for the key to expire? --->TTL
10._____________ is a type of lock that allows you to limit the number of processes that can
concurrently access a resource to some fixed number. --->Optimistic locking(wrong)
11.In a Redis transaction, we can use ________ command to enter into the transaction and
queue the transaction commands instead of executing them. --->Multi
12.Which among the following factors helps in calculating the number of shards in Redis?
--->Number of keys in a single shard
13.Which of the following commands is used to post the message to the channel? --->PUBLISH
14.Which is the short structure that Redis provides for the compact representation of Sets?
--->inset
15._________ is required in the distributed backend systems where cache state needs to be
maintained uniformly across the systems. --->Centralized cache
16._________ is an implementation of partitioning where you can send your query to a random
instance, and the instance will forward your query to the right node. --->Query routing
17.Consider an example where a range of users from 0 to 10000 goes to a Redis instance R0, and
another range of users 10001 to 20000 goes to R1. This is _________ partitioning. --->
Range partitioning
18.Which among the following is a benefit of Pipelining? --->speed
19.The configuration setting in redis.conf that could be configured to the number of samples of
keys to be checked, to evict keys with the oldest access time is ________ --->maxmemory-policy
20._________ is the technique of breaking down data into multiple parts. --->Sharding
22. is used for failover process when a master is not working, promoting the slave to master.
--->Quorum(wrong)
25._________ is the memory policy that returns errors when the memory limit is reached, and
the client is trying to execute commands that result in higher memory usage. --->noeviction
27._________ is the configuration setting that tells the maximum number of items allowed in a
Hash table for ziplist encoding. --->hash-max-ziplist-entries
28.Redis string cannot hold any value beyond a certain length. What is it? --->512MB
29._________ refers to an undesirable state when a system attempts to perform two or more
operations, which should, otherwise, be done in a proper sequence to be executed correctly.
--->Race condition
30.In Redis context, senders are named as _________ and receivers are named as Subscribers.
--->Publishers
32.____________ is the number of sentinels that need to agree to the fact that the master is not
reachable and make a failover procedure promoting the slave to the master. --->Quorum
33.Redis provides the output of all commands in ____________. --->A single step
34.Which is the mechanism to enforce limits on the access of a resource when multiple threads
are executed? --->locking
35.____________ is the memory eviction policy where keys are evicted by removing the less
recently used keys first but only among keys that have an 'expire' field set, to make space for the
newly added data. --->Volatile-lru
36.The persistent server should be the _________ once the whole environment is started.
--->Master server
37.Twemproxy is a proxy developed at Twitter for Redis protocol for automatic partitioning
among multiple Redis instances and optional ejection of the node if it is not available. --->true