Chapter 21. Practice Exam Answer Key for Exam 611

1. C

2. D

3. C

4. C

5. D

6. B

7. D

8. D

9. B

10. B

11. B

12. C

13. A

14. D

15. C

16. B

17. C

18. D

19. C

20. A

21. C

22. D

23. A

24. B

25. C

26. D

27. C

28. A

29. D

30. C

31. A

32. B

33. C

34. D

35. C

36. A

37. E

38. E

39. B

40. D

41. B

42. D

43. B

44. D

45. A

46. D

47. C

48. D

49. D

50. D

Question 1The correct answer is C. An image resource set, also known as an image well, contains more than one image. There are two types of image resource sets: horizontal, which creates an image that seems to change based on its state (for example, the image lights up during a mouseover and dims after it's clicked), and vertical, which includes an icon in three different sizes. Image resources can only use .bmp, .gif, and .jpg files. A is incorrect because image resource sets can contain more than one image. B is incorrect because .ani is the extension to an animation file and is not one of the three files used in the image resources. D is incorrect because hide-when formulas do not work with mouse events.
Question 2The correct answer is D. @GetProfileField(name of profile document;name of field in profile document; unique key [optional]) allows formulas and scripts to retrieve data from a central source. This function is particularly useful for applications that must go between multiple databases to retrieve information, in that a profile document could contain the file paths of the databases, text to be used in picklists or email messages, and so on. A is incorrect because @GetProfileField requires both the name of the profile document and the name of the desired field. B is incorrect because @Command([EditProfile]; form name [optional]; unique key [optional]) allows users with the appropriate access rights to edit the profile document. C is incorrect because there is no such function as @GetProfileDocument.
Question 3The correct answer is C. The NoteID of an object is unique only within the database in which it resides. It does not maintain its unique identity when it is replicated. To maintain this identity when replicating between databases, it is better to reference objects through their Notes UNIDs, which do not change during replication. A is incorrect because the users are not reporting that documents are missing, only that the action agent isn't working. If the documents had not been replicated, Eddy would have heard about missing documents before hearing about the malfunctioning action agent and he would have had to check the server access. B is incorrect because documents keep the same access across replicas; Authors and Readers fields do not change. D is incorrect because if the action agent had not been replicated, the users would have reported either being unable to see the action or they would not even know there was an action to use in the first place. Instead, they used the action and found it did not work.
Question 4The correct answer is C. Roland can create an action that deletes a document and refreshes the view afterwards and places it within the view that's being embedded. Then he can enable Show Action Bar in the embedded view. A is incorrect because under R6, documents in an embedded view can be deleted. B is incorrect because documents are not affected by the action agents of the form in which their view is embedded. D is incorrect because there is no such property as Show Embedded View Action Bar in the form.
Question 5The correct answer is D. @Command([EditClear]); @PostedCommand([ViewRefreshFields]) is the correct formula. A is incorrect because there is no such function as @DocumentDelete. B is incorrect because there is no such function as @ViewClear. D is incorrect because @Command([EditClear]); @PostedCommand([ViewRefreshFields]) deletes documents within an embedded view.
Question 6The correct answer is B. Chris cannot control the width and height of the combobox or the listbox on the Web. They format themselves according to the width of the longest keyword string they contain. listbox, radio button, and dialog list automatically adjust width and height. A is incorrect because although listbox and radio button automatically adjust width and height, dialog list does not. C is incorrect because although listbox and radio button will automatically adjust width and height, combobox does not. D is incorrect because although checkbox automatically adjusts width and height, dialog list and combobox do not.
Question 7The correct answer is D. This method is the least labor-intensive. Also the files workpane shows a refresh icon and the File Resources property box has the “Needs refresh” checkbox checked if a file has been modified.
Question 8The correct answer is D. The date picker is not supported on the Web. A is incorrect in that although it is the correct procedure for embedding the date picker in Notes, James wanted the date picker to be used on the Web. B is incorrect because the date picker should be embedded in a frameset with a frame containing a calendar view as a target frame. C is incorrect because there is no need to enable a Java applet.
Question 9The correct answer is B. The length of an agent's code has no bearing on its speed of execution. However, how a code is written matters. The more efficient the code, the quicker it executes. For instance, a GetAllDocumentsByKey or a FTSearch function is quicker than a db.Search when the code is searching for particular documents. GetAllDocumentsByKey searches for documents using a unique key and a view, which helps limit the number of documents through which it has to search. FTSearch uses the full-text index in its searches. However, db.Search searches the entire database, making it the least efficient of the three. A is incorrect because setting too many agents to run at the same time has a negative impact on server resources. C is incorrect because processing (editing, saving, creating, deleting, and so on) many documents one at a time slows the agent down. D is incorrect because full-text indexing creates an index, which allows faster retrieval of documents.
Question 10The correct answer is B. Although Bill has Editor access in the Notes client, the Maximum Internet name-and-password access gives him only Reader access when he logs on to the database via the Web. Maximum Internet name-and-password access overrides even explicit access levels in the ACL if the user is accessing the database through the Web. A is incorrect because if the user has the proper access, documents can be edited on the Web. C is incorrect because the documents on Notes are the same documents seen on the Web. If Bill could edit the documents on Notes, then he should be able to edit them on the Web—unless Maximum Internet name-and-password access has been set to Reader on the database. That would prevent Bill from editing the documents. D is incorrect because in the database ACL, Bill is listed explicitly as having Editor access. Explicit access in a database for an individual always overrides group access. Although Bill may be in a group that has Reader access only, he has the Editor access explicitly assigned to him.
Question 11The correct answer is B. Check the Render Pass-Through HTML in Notes box on the Form Info tab. A is incorrect because HTML can be used in the Notes client. C is incorrect because the Render Pass-Through HTML in Notes check box is found in the Form Info tab; there is no HTML tab in the Form properties. D is incorrect because although a developer can import, paste, or type HTML into form, or convert part of or the entire form into HTML, the result can only be seen through the Web. To use HTML in the Notes client, the Render Pass-Through HTML in Notes checkbox must be enabled.
Question 12The correct answer is C. @DoWhile statements always execute at least once. A is incorrect because @DoWhile loops execute at least once to test the condition(s) under which they must run. B is incorrect because a @DoWhile loop runs at least once. D is incorrect because a @DoWhile loop runs at least once; also, the question called for the lowest number, and an infinite number of loops can never be least.
Question 13The correct answer is A. The value of x must be 10 before it no longer meets the criteria of x < 10. B is incorrect because although the @For loop begins at 1 (x = 1), it must continue looping until x < 10. That means it will loop more than once. C is incorrect because the @For loop will continue until x is no longer less than 10: 1 < 10, 2 < 10, 3 < 10, 4 < 10, 5 < 10, 6 < 10, 7 < 10, 8 < 10, 9 < 10—nine loops—then after the tenth loop begins 10 < 10, then the condition x < 10 is no longer true and @For stops after the tenth loop. D is incorrect because the @For function continues looping until the condition x is no longer less than 10.
Question 14The correct answer is D. @GetDocField requires the Unique ID of the parent document as well as the name of the field belonging to the parent document. The field name should be in quotation marks. A is incorrect because it is referencing the response document's field rather than that of the parent document. B is incorrect because not only are the parameters backwards (field, then Unique ID), but the field belongs to the response document and not its parent. C is incorrect because although the Status field could inherit the status value from the parent document, it can inherit only once. Because the parent document's status may change more than once, the status of the response documents must change with it, hence the need for @GetDocField.
Question 15The correct answer is C. Only LotusScript can be used in the InViewEdit event of the view. A, B, and D are incorrect because the event accepts no other code.
Question 16The correct answer is B. If a user is explicitly listed in the ACL with Editor access and is also a member of a group with Reader access, the user's Effective Access is Editor. A is incorrect because Effective Access has to do with access listed in the database ACL, not the contents of the database. C is incorrect because Effective Access is the highest level of access a user has through a database ACL. D is incorrect because Effective Access determines only the highest access of users. However, @UserNamesList provides the access of the current user, as well as the roles and groups to which the user belongs.
Question 17The correct answer is C. Data Connection Resources (DCRs) require that the application to which you are connecting be installed on a Domino server. A is incorrect because the Tools menu allows designers to bring in other applications for use in creating applications. B is incorrect because one of the things that make DCRs so attractive to developers is that DCRs can be shared across applications, and are reusable as well. D is incorrect because a data source server reference to the external application must always be created before the DCR can be created and used. The data source server reference indicates the data source and what driver to use for the data exchange.
Question 18The correct answer is D. The function @Sort( list ; [ order ]; customSortExpression ) provides a variety of ways to sort a text, number, or date/time list. Among the keywords used in @Sort are [ASCENDING] and [DESCENDING]. Answer C has the keyword [ASCENDING] in its @Sort function and the list of lakes ascends in alphabetical order. Answer A shows that the keywords are optional, but @Sort sorts a list in ascending order with or without the [ASCENDING] designation. A is incorrect because it is not the only answer. B is incorrect because the parameters are out of order: the list is first, then the keyword. C is incorrect because it is not the only answer.
Question 19The correct answer is C. The default Index Encrypted Fields option is selected when the index is created on a database. This means that the full text index file is unencrypted plain text and anyone with access to the server can read the file. A is incorrect because if the user has access to the server, then the user can locate the full-text index file, which is unencrypted plain text. Or the user could do a search for a particular word or phrase and get a list of documents containing them, even if the word or phrase is in an encrypted field. The user can't read the field, but knows the document contains the word or phrase. B is incorrect because although encrypted fields can be searched, their contents cannot be read. D is incorrect because leaving the Index Encrypted Fields option checked produces a full text index file that is in unencrypted text, which anyone who has access to the server can read.
Question 20The correct answer is A. If the MailOptions field is set to 1, it forces the document to be mailed when it is saved. B is incorrect because although the SendTo field is a required field for a memo, it does not control when the document is sent. C is incorrect because a 1 in the SaveOptions field saves the document only when the document is submitted; the field does not determine when the document is mailed. D is incorrect because Sign is a field that is included if an electronic signature is to be included with a mailed document. Only one sign-enabled field is required and the Sign If Mailed or Saved in Section property must be selected.
Question 21The correct answer is C. @DialogBox can work in the current document, which is an open document or one selected in a view. A, B, and D are all incorrect because they are in fact true statements about the @DialogBox function.
Question 22The correct answer is D. @GetViewInfo([CalendarViewFormat]) returns 7. @GetViewInfo requires an attribute like [CalendarViewFormat] (returns the number of days displayed), [ColumnValue] (returns the value of a column on the current row and requires a second parameter of column number), or [IsCalViewTimeSlotOn] (returns @True if time slots are displayed, @False if not). A is incorrect because there is no such function as @GetViewFormat. B is incorrect because there is no such function as @GetViewAttribute. C is incorrect because there is no such function as @GetCalendarFormat.
Question 23The correct answer is A. The Extended ACL (xACL) is used in the Domino Directory, Extended Directory Catalog, and Administration Requests database. Unlike Readers and Authors fields, which restrict user access on a form or document level, xACL can restrict user access at the field level. B is incorrect because LOG.nsf is used for monitoring databases and tracking replication events. C is incorrect because NAMES.nsf is the Name and Address Book. D is incorrect because the Execution Control List (ECL) is found on each user's workstation and allows the user to determine which formulas and scripts can be run on that workstation.
Question 24The correct answer is B. Molly will be listed as the author of any new documents the agent creates. The agent Security property can now be set so that an agent is run on behalf of a specified person or on anyone's behalf. Any user who runs the agent must be in the ACL of any database being accessed by the agent. A is incorrect because Run on Behalf Of allows the designer to designate certain users or anyone. C is incorrect because if a user is not in the ACL of a database to which the agent must have access, the agent fails. D is incorrect because the agent has been set to run on Molly's behalf, which means that any documents the agent creates will list her name as the author.
Question 25The correct answer is C. Each embedded view can be linked to one or more embedded editors. This method is called “targeting” and enables users to edit documents in a view without having to open another window. A is incorrect because an embedded view must have an embedded editor to target. Developers can enter the name of the editor through the Target Frame field in the Embedded View properties box. B is incorrect because embedded editors can be seen in either edit or read mode. D is incorrect because only C is the correct answer.
Question 26The correct answer is D. A way to show the presence or absence of file attachments would be to use an @Function such as @Attachments (shows number of attachments) or @AttachmentNames (returns file names) in the column. A is incorrect because Jeff did not assign Display Values as Icons to that column, nor did he create a formula that would allow him to test for the existence of file attachments in the field. Had he done so, the paperclip would display. B is incorrect because no error message appears when a column displays the contents of a rich text field (which is the only kind of field that can contain attachments); the column appears empty even when the rich text field has something in it. Rich text fields cannot be displayed in views. C is incorrect because the contents of rich text fields are not displayed in columns, and even then only through formulas.
Question 27The correct answer is C. No DCRs or import file commands are necessary to add an application as a bookmark to the Designer client. A, B, and D are all incorrect because they include either DCRs or import file commands.
Question 28The correct answer is A. Users receive two encryption keys. A private key and a public key are stored in the User ID file, and a public key is stored in the user's Person document. B is incorrect because the user's Person document is where the public key is stored. C is incorrect because although the private and public keys are stored together in the User ID file, only the public key is in the user's Person document. D is incorrect because both the private key and the public key are stored in the User ID file, and only the public key is stored in the user's Person document.
Question 29The correct answer is D. View logging can help avoid view rebuilds after a system crash, which in turn shortens recovery time. Although any view can be included in the transaction log, the view updates can slow the server's performance. Therefore, complex views such as $All or $Users would be the best candidates for view logging. A is incorrect because not only can any view be included in view logging, but the $All view in particular should be used in view logging (answer B) and server restarts can perform faster if views are included in the transaction log (answer C). B is incorrect because the $All view is not the only view that can be included in view logging (answer A), and server restarts can perform faster if views are included in the transaction log (answer C). C is incorrect because not only do server restarts perform faster if views are included in the transaction log, but any view, especially $All view (answers A and B), can be included in view logging. E is incorrect because not only can any view be included in view logging (answer A) and server restarts can perform faster if views are included in the transaction log (answer C), but the $All view in particular should be used in view logging (answer B).
Question 30The correct answer is C. A date field is being used in a text statement and must be converted to text: "This request was due on " + @Text(DueDate) + ", and will be removed within 24 hours if the document is not finalized." + @NewLine + @NewLine + "Click on the document link to view the request ->". A is incorrect because in the @If statement, both DueDate and @Today are already the same data type: date/time. B is incorrect because an ampersand (&) is used for Boolean arguments, whereas a plus (+) is used to concatenate text strings. D is incorrect because @MailSend does not require a Remark parameter, although it does require a null value as a placeholder.
Question 31The correct answer is A. A 3-number value determines the RGB value of the text in a row, leaving the background color unchanged, whereas a 6-number value determines first the RGB value of the background (the first 3-number value), then the RGB number of the text (the last 3-number value). B is incorrect because 255:0:0:0:0:0 shows black text on a red background. C is incorrect because 255:0:0:255:255:255 shows white text on a red background. D is incorrect because the first 3-number value determines the color of the text. In this case, 255:0:0:0:0:0 means red text on a white background.
Question 32The correct answer is B. Upon receiving his Notes User ID, a user possesses special encryption keys: A public key is stored in his Person document in the Domino Directory, and a public key and a private key are stored in his User ID. If the sender sends an encrypted mail message, it is encrypted with the recipient's public key, obtained from the Domino Directory. The recipient needs the correct private key, obtained from the recipient's Notes User ID, which verifies his or her identity, to read the encrypted message. The private key prevents anyone other than the recipient from reading the encrypted email. A is incorrect because it is the private key that verifies the user's identity to allow decryption. C is incorrect because a SecretEncryptionKeys field stores special encryption keys with which users can encrypt documents. These keys are used instead of the users' own encryption keys to encrypt documents. These keys must be distributed to the proper users before they can decrypt the documents. D is incorrect because @MailEncryptSavedPreference is not a real function.
Question 33The correct answer is C. Effective users are those under whose authority an agent runs—in many cases, this would be the current user. For instance, instead of a mail application sending an email in the name of the server or the name of the developer who signed the agent, the agent could be set to use the name of the person who invoked the agent. Effective usernames are used to grant database access; to grant the right to create databases, replicas, and templates on the server; to identify the mail sender; to identify the document author; and to lock and unlock documents. A is incorrect because effective usernames do not direct the actions an agent can perform. B is incorrect because effective usernames are not used for encryption rights. D is incorrect because effective usernames are not used for encryption rights.
Question 34The correct answer is D. Disk space on the users' workstations, as well as the time it would take to complete the workflow, should be taken into account when considering this method. A is incorrect because C is also correct. B is incorrect because remote users still need a modem to reach their mail. However, time spent on the modem is reduced if they don't have to access both their mail and the remote database. C is incorrect because A is also correct.
Question 35The correct answer is C. The @UserName function returns the username in canonical format and must be formatted to the common name, using the @Name function to match “Robert Bristow.” Also, the name in the DocCreator field must match @UserName so that Robert Bristow sees only his own documents in blue text with yellow background, represented by the RGB value: 255:255:0:0:0:255. The first three values specify the background color, whereas the last three specify the text color. The value 255:255:255:0:0:0 represents the white background with black text. A is incorrect because the @Name function is needed to convert the username to the common name ([CN]) format. Also, the color formats are incorrect—255:255:0:0:0:0 is a yellow background with black text, whereas the color format for documents not belonging to Robert—255:255:0:0:0:255—is a yellow background with blue text. B is incorrect because the formula does not check the username against the DocCreate field value. D is incorrect because the @Name function is being used illegally and will cause the error Too many arguments for @Function: ')'.
Question 36The correct answer is A. A document edited after its replica was deleted on another server is not removed by replication. B is incorrect because the edit must take place after the deletion. However, if the document had been edited more than once on one database and deleted on another, the document that was edited multiple times takes precedence over the deleted document, even if the document deletion was the most recent change. Multiple edits of a document always take precedence in replication. C is incorrect because deletions do not always take precedence when it comes to documents edited multiple times or documents edited at least once after the replica deletion. D is incorrect because if the document was edited only once, the deletion takes precedence.
Question 37The correct answer is E. The scheduled agent runs immediately if it has been modified, pasted, or saved and scheduled monthly, weekly, or daily. A is incorrect because C is also true. B is incorrect because if the agent was scheduled daily and is enabled within a half hour of its scheduled run, it runs immediately. Otherwise, it runs at its next scheduled time. C is incorrect because A is also a true. D is incorrect because A and C are true and E is the only correct answer.
Question 38The correct answer is E. The agent must remove the internal fields $TITLE, $INFO, $WINDOWTITLE, $BODY, and $ACTIONS. Also, the agent should remove the old form name and assign the name of the form that will display the documents. Compacting the database after running the agent reduces the database's size. A, B, and C are incorrect because all three should be done together. D is incorrect because A, B, and C should all be done together.
Question 39The correct answer is B. @UserAccess(server:file;[access privilege]) can be used without parameters. If used with parameters, @UserAccess can determine the current user's access to a specified database on a specified server. The parameter access privilege allows @UserAccess to test whether the current user has a particular access to the database. A is incorrect because @UserAccess returns only a list of access privileges for the current user. C is incorrect because no parameters are required in @UserAccess. D is incorrect because @UserAccess always returns 6;1;1 on local databases—which translates to "Manager";"can create documents";"can delete documents".
Question 40The correct answer is D. The color picker is contained by the field type color. A and C are incorrect because the color picker field must be referenced in the first column, along with the name of the profile document containing the color picker field so that users can successfully choose a color. B is incorrect because a rich text lite field can contain images, attachments, views, shared applets, OLE objects, text, calendar, DatePicker, or inbox, but not color.
Question 41The correct answer is B. @IsTime tests a value and returns 1 (True) if it is a date-time or date-time list. A is incorrect because @ToTime can convert text or time to a time value. C is incorrect because @TextToTime converts a string into a date/time value. D is incorrect because because @IsTime tests a value to see if it is a date/time type, rather than converting it.
Question 42The correct answer is D. @Keywords(textlist1;textlist2;separator) is case sensitive. The functions @LowerCase, @UpperCase, or @ProperCase should be used in conjunction with @Keywords so that the lists are of the same case before making a comparison. A is incorrect because the result is in proper case. Textlist2 is in lowercase ("lions";"tigers";"leopards";"cheetahs") so no proper case matches could result. B is incorrect because although tigers” matches the lowercase tigers” in textlist2, “Lions and Cheetahs” do not match lions and “cheetahs.” C is incorrect because although “tigers” matches the lowercase “tigers” in textlist2, “Lions,” “leoPards” and “Cheetahs” do not match “lions,” “leopards,” and “cheetahs.”
Question 43The correct answer is B. Belinda was not given the proper role in the database ACL to allow her to edit the section. To edit a controlled-access section, the user must have at least Editor rights in the database ACL, as well as be listed as a section editor, whether by role, group, or individually. A, C, and D are incorrect because Belinda was able to place the document in edit mode and it is implied that she was able to edit other places in the document.
Question 44The correct answer is D. When a date range is used in @Explode, it cannot be used as a string type. The brackets present the range as a date-time range. A is incorrect because the @Text function is being used to convert dates into text and the formula does not have the brackets to convert the range into a date-time range. B is incorrect because the @Date function is being used to convert text into dates and the formula does not have the brackets to convert the range into a date-time range. C is incorrect because the dates are rendered as text and there are no brackets to convert the range into a date-time range.
Question 45The correct answer is A. The single copy template enables developers to store design information in one template rather than in each database that uses the template, which results in less disk space used by the database. For instance, using the single copy template with a mail template stores all the design information in one place, making users' mail databases smaller because the databases no longer have to store the design as well as the data. A is correct because the SCT must also be enabled through the Domino Administrator client. B, C, and D are incorrect because they are true statements about SCT.
Question 46The correct answer is D. Domino tries to reuse unused space left behind when documents and attachments are deleted, rather than reducing the database's file size. Compaction can help in recovering space and reducing file size. Optimizing a database improves its access time on the server, and there are properties that can be set to help in that effort. Unread marks in a database takes up resources and slows down response time, especially if the view is a large one and users are reading only select documents rather than all of them. Selecting Don't Maintain Unread Marks can help increase the database's efficiency. Document Table Bitmap Optimization enables Domino to update views more efficiently by allowing it to search only the tables associated with the forms used by documents in the view being updated, rather than search each table during each view update. Selecting Don't Support Response Hierarchy means that data used by @AllChildren and @AllDescendants will no longer be stored. It must be noted that this option does not affect hierarchical views that do not use the @AllChildren and @AllDescendants functions. All these selections require database compaction to take effect. A is incorrect because Don't Overwrite Freespace and Limit Entries in $UpdatedBy Fields do not require database compaction. B is incorrect because Prevent the User of Stored Forms does not require database compaction. C is incorrect because Display Images After Loading and Don't Overwrite Freespace do not require database compaction.
Question 47The correct answer is C. Profile documents, although their fields can be accessed through formulas and LotusScript, do not show up in views or database document counts. They cannot be deleted through formula language. A is incorrect because profile documents cannot be seen in views and therefore cannot be deleted manually. B is incorrect because profile documents cannot be deleted through formulas, but they can be deleted through LotusScript. D is incorrect because the only way to delete a profile document is to use LotusScript.
Question 48The correct answer is D. @GetFocusTable([TABLENAME]) returns the entry located in Name/ID of the Table Programming tab in Table Properties. If there is no name or the table isn't in focus, the return value is a null string. A is incorrect because there is no such formula as @Command([TableName]). B is incorrect because there is no such function as @GetTableFocus. C is incorrect because there is no such function as @Table.
Question 49The correct answer is D. The SendTo and MailOptions fields are required to automatically mail documents. The SendTo field requires the name of the person, group, or mail-in database. MailOptions requires a 1 for automatic mailing. A is incorrect because B is required, too. B is incorrect because A is required, too. C is incorrect because it deals with saving the document when it is being mailed.
Question 50The correct answer is D. To get printouts of only the two frames, Rachel would have to choose Selected Frame Only for each frame and run the printer twice. A is incorrect because only the selected frame is printed. B is incorrect because all the frames as seen by the user would be printed out. C is incorrect because all the frames would be printed out, one frame for each printed page.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.167.114