PEGAPCRSA80V1_2019 Dumps
PEGAPCRSA80V1_2019 Braindumps PEGAPCRSA80V1_2019 Real Questions PEGAPCRSA80V1_2019 Practice Test PEGAPCRSA80V1_2019 Actual Questions
Pega Certified Robotics System Architect 80V1 2019
https://killexams.com/pass4sure/exam-detail/PEGAPCRSA80V1_2019
Question: 50
You have extracted a proxy for a data set and are using it to pass the data into a procedure automation input parameter. In the procedure automation, the data link from the input parameter is not connecting to the stringValue on a stringUtils method.
What two troubleshooting steps do you perform to correct the issue? (Choose two.)
Answer: AC
Question: 51
There are two basic types of automations: events and procedures. Which three statements describe a procedure automation? (Choose three.)
Answer: CDE
Question: 52
You are automating the login process for a web application. There are three possible scenarios that may occur: (1) You may successfully login, (2) you may not be successful logging in, or (3) you may log in but go to the change password screen.
Which control from the Toolbox do you use to determine which page you were on after performing the login function?
Answer: C
Question: 53
During application discovery of a Clarify application, you determine that the user accesses more than one customer case concurrently within the application, which creates multiple windows of the same type. This requires you to enable the UseKeys property on an application’s object.
Based on the image that shows the application and the matched controls in the Object Explorer, which control’s UseKeys property must be set to True?
Answer: A
Reference: https://community.pega.com/knowledgebase/articles/how-do-i-use-keys-navigate-between-multiple-instances-object
Question: 54
HOTSPOT
Pega Robot Studio provides five rules on how to differentiate between cloneable application objects when using key assignments in automations. The first rule states that an event creates the instance to set the context of a cloneable object. The remaining four rules state the requirements for a key assignment.
In the Answer Area, determine if each rule description requires a key assignment. Hot Area:
Answer:
Question: 55
You need to configure an application to store encrypted login credentials in the user’s local profile. You also need to automate the login using these encrypted credentials.
How do you fulfill this requirement without creating an automation?
Answer: A
Reference: https://community.pega.com/knowledgebase/articles/pega-robotic-automation/encryption-and-assisted-sign-component
Question: 56
Pega Robotic Coding Standards suggest organization of project components. You have added the _GC_CRM project item to the CRMPrj. Which three components are recommended to be placed in the _GC_CRM project item? (Choose three.)
Answer: CDE
Question: 57
Which of the following controls cannot be added to the Windows form?
Answer: C
Question: 58
You add a MessageDialog component to an automation. Based on the following image, which option shows the configuration settings that generates the message dialog?
Answer: D
Question: 59
You are designing an automation that adds new customers to an online insurance web site. If a customer exists, a pop-up window is displayed with an error message, which closes automatically after 35 seconds.
While debugging the automation, you notice that you are receiving a control not created exception message in the Add Customer procedure after a page navigation occurs. How do you resolve the exception?
Answer: D
Question: 60
Select two statements that correctly describe adapters. (Choose two.)
Answer: AB
Reference: https://community1.pega.com/community/product-support/question/adapter-pega-robotics
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG