ActualTests.IBM.000-778.Exam.Q.and.A.06.14.07-ATK
hibernate内部测试题总结

hibernate内部测试题总结在Hibernate中,关于脏检查和刷新缓存说法正确的是(ab )。
A.当事务提交时,会发⽣脏检查B.Session的flush( )⽅法是刷新缓存的⽅法C.在执⾏Session的commit( )⽅法之前不会调⽤Session的flush( )⽅法D.编写代码时,调⽤commit( )⽅法之前要调⽤flush( )⽅法解析:在执⾏Session的commit()⽅法之前会调⽤Session的flush()⽅法 C错误 调⽤commit()⽅法都不是⼿动调⽤flush()⽅法使⽤HQL查询所有部门信息,以下正确的是( b)。
A.from DeptB.select * from cn.jbit.demo.entity.DeptC.select Dept from cn.jbit.demo.entity.Dept dD.select d from Dept d解析:HQL查询信息没有 *关于Query接⼝的list( )和iterate( )⽅法,说法正确的是( ad)。
A.执⾏list( )⽅法,查询所有符合条件的记录B.执⾏iterate( )⽅法,查询所有符合条件的记录C.执⾏list( )⽅法,查询出所有符合条件的主键值D.执⾏iterate ( )⽅法,查询出所有符合条件的主键值解析:list()是查询⼿游符合条件的记录 iterate()是查询出所有符合条件的5.在HQL中,关于Query接⼝绑定参数的⽅法,说法正确的是( ABCD)。
A.setParameter( )⽅法⽤于绑定任意类型的参数B.setParameter( )有重载的⽅法C.setProperties( )有重载的⽅法D.setProperties( )⽅法⽤于绑定命名参数6.在Hibernate中,关于以下映射配置,说法错误的是(D)。
<hibernate-mapping><class name="cn.jbit.hibernatedemo.entity.Emp" table="EMP" schema="scott"> <id name="empNo" column="EMPNO" type="ng.Integer"><generator class="assigned"/></id><property name="salary" type="ng.Double" column="SAL"/><property name="hireDate" type="java.util.Date"/><many-to-onename="dept"column="DEPTNO"class="cn.jbit.hibernatedemo.entity.Dept"/></class></hibernate-mapping>A.此配置信息描述了cn.jbit.hibernatedemo.entity.Emp类和EMP表的映射B.描述的是scott⽤户的EMP表C.<many-to-one>标签中的name属性值dept是cn.jbit.hibernatedemo.entity.Emp类的属性名D.<many-to-one>标签中的column属性值DEPTNO是dept表的主键名解析:D选项中column属性值deptNo是emp表中的外键列7.在Hibernate映射⽂件中,关于inverse属性说法正确的是(ACD)。
IBM SPSS Modeler Server 18.4 for Windows 安装说明说明书

iv
Chapter 1. Installation instructions
The following instructions are for installing IBM® SPSS® Modeler Server version 18.4.0. IBM SPSS Modeler Server can be installed and configured to run in distributed analysis mode together with one or more client installations. This provides superior performance on large datasets, since memory-intensive operations can be run on the server without downloading data to the client computer. At least one IBM SPSS Modeler Client installation must be present to run an analysis. Whenever you install a new version, be sure to distribute IBM SPSS Modeler Server product's host name and port number to the end users.
Silent installation
Silent mode enables an installation to run on its own without any interaction; installing silently can free system administrators from the task of monitoring each installation and providing input to prompts and dialog boxes. This method is especially useful when you are installing SPSS Modeler Server on a number of different computers that have identical hardware. Note: You must have administrator privileges to be able to run silent installations.
(完整版)软件测试题目与答案

软件测试课堂测验第一次测验:Consider an application App that takes two inputs name and age, where name is a nonempty string containing at most 20 alphabetic characters and age is an integer that must satisfy the constraint 0≤age≤120. The App is required to display an error message if the input value provided for age is out of range. The application truncates any name that is more than 20-character in length and generates an error message if an empty string is supplied for name.(1)Please find out the equivalence classes(等价类). (30分)(2)Construct test cases using the equivalence classes derived in(1)(20分)答案:Consider a method fp, brief for findPrice, that takes two inputs code and qty. The item code is represented by the integer code and the quantity purchased by another integer variable qty. fp accesses a database to find and display the unit price, the description, and the total price of the item corresponding to code. fp is required to display an error message, and return, if either of the two inputs is incorrect. Assuming that an item code must be in the range 99…999 and quantity in the range 1…100.Please give your test cases using boundary-value analysis.(50分)答案:第二次:1.Develop a decision table for the descriptions belowNo charges are reimbursed(报销)to the patient until the deductible(扣除)has been met. After the deductible has been met, the amount to be reimbursed depends on whether or not the doctor or hospital is a "Preferred Provider." For preferred providersDoctor's office visits are reimbursed at 65% and Hospital visits are reimbursed at 95%. For other providers reimburse 50% for Doctor's Office visits or 80% for Hospital visits.答案:2.Develop a decision table for the YesterDate function.答案:第三次:Cause-Effect Testing:In a given network, the sendfile command is used to send a file to a user on a different file server. The sendfile command takes three arguments: the first argument should be an existing file in the sender’s home directory, the second argument should be the name of the receiver’s file server, and the third argument should be the receiver’s userid. If all the arguments are correct, then the file is successfully sent; otherwise the sender obtains an error message.答案:中国象棋走马下法:1. 如果落点在棋盘外,则不移动棋子;2. 如果落点与起点不构成日字形,则不移动棋子;3. 如果落点处有自己放棋子,则不移动棋子;4. 如果在落点方向的邻近交叉点有棋子(绊马腿),则不移动棋子;5. 如果不属于1-4,且落点处无棋子,则移动棋子;6.如果不属于1-4,且落点处为对方棋子(非老将),则移动棋子并除去对方棋子。
各公司c++面试题

发信人: Leonix (Leon), 信区: job标题: 中兴面试过程发信站: 饮水思源 (2002年11月20日21:10:39 星期三), 站内信件面试我的一个男的和一个ppjj。
ppjj不时微笑一下,另一位老沉着脸。
我是学网络的,本来我想先介绍一下做的项目,后来都没有机会,只把其中两个附带介绍了一下。
ppjj好像不太懂技术,只问我最后一个项目中担任具体工作,我刚好想说,因为这个项目我做总体设计和项目管理。
另一个问我IPv6对V4的改进之处,IPv6的过渡技术,我们的改进方案的原理(这是我的研究方向),UDP的应用场合,ping的实现原理(让我ft)还让我写二分法的算法(太简单了,很ft,问了他几次证实,他有点不悦)我就很快写了一下,可能有些小错。
最核然后问我想在哪儿工作,ppjj代我回答了,对他说上海深圳都可以的。
他们就是问你项目然后逮住你自己说精通的或者他懂的东西深入问一下。
--复旦大学网络乒协※来源:·饮水思源 ·[FROM: ]E:\面试题\中兴面试过程.txt.mazC++ object-oriented questionsZZshury ·¢±íÓÚ 2004-12-5 17:40:00Q. What is pure virtual function?A class is made abstract by declaring one or more of its virtual functions to be pure. A pure virtual function is one with an initializer of = 0 in its declarationQ. Write a Struct Time where integer m, h, s are its membersstruct Time{int m;int h;int s;};how do you traverse a Btree in Backward in-order?Process the node in the right subtreeProcess the rootProcess the node in the left subtreeQ. What is the two main roles of Operating System?As a resource managerAs a virtual machineQ. In the derived class, which data member of the base class are visible? In the public and protected sections.What is a modifier?A modifier, also called a modifying function is a member function that changes the value of at least one data member. In other words, an operation that modifies the state of an object. Modifiers are also known as ¡®mutators¡¯. Example: The function mod is a modifier in the following code snippet:class test{int x,y;public:test(){x=0; y=0;}void mod(){x=10;y=15;}};What is an accessor?An accessor is a class operation thatdoes not modify the state of an object. The accessor functions need tobe declared as const operationsDifferentiate between a template class and class template. Template class: A generic definition or a parameterized class not instantiated until the client provides the needed information. It¡¯s jargon for plain templates. Class template: A class template specifies how individual classes can be constructed much like the way a class specifies how individual objects can be constructed. It¡¯s jargon for plain classes.When does a name clash occur?A name clash occurs when a name is defined in more than one place. For example., twodifferent class libraries could give two different classes the same name. If you try to use many class libraries at the same time, there isa fair chance that you will be unable to compile or link the program because of name clashes.Define namespace. It is a feature in C++ tominimize name collisions in the global name space. This namespace keyword assigns a distinct name to a library that allows other libraries to use the same identifier names without creating any name collisions. Furthermore, the compiler uses the namespace signature fordifferentiating the definitions.What is the use of ¡®using¡¯ declaration.A using declaration makes it possible to use a name from a namespace without the scope operator.What is an Iterator class?A class that is used to traverse through the objects maintained by a container class. There arefive categories of iterators: input iterators, output iterators, forward iterators, bidirectional iterators, random access. An iteratoris an entity that gives access to the contents of a container object without violating encapsulation constraints. Access to the contents isgranted on a one-at-a-time basis in order. The order can be storage order (as in lists and queues) or some arbitrary order (as in array indices) or according to some ordering relation (as in an ordered binary tree). The iterator is a construct, which provides an interface that, when called, yields either the next element in the container, orsome value denoting the fact that there are no more elements to examine. Iterators hide the details of access to and update of the elements of a container class.The simplest and safest iterators are those that permit read-only access to the contents of a container class.List out some of the OODBMS available. GEMSTONE/OPALof Gemstone systems, ONTOS of Ontos, Objectivity of Objectivity Inc, Versant of Versant object technology, Object store of Object Design, ARDENT of ARDENT software, POET of POET software.List out some of the object-oriented methodologies.Object Oriented Development (OOD) (Booch 1991,1994),Object Oriented Analysis and Design (OOA/D) (Coad and Yourdon 1991), Object Modelling Techniques (OMT) (Rumbaugh 1991),Object Oriented Software Engineering (Objectory) (Jacobson 1992), O bject Oriented Analysis (OOA)(Shlaer and Mellor 1992),The Fusion Method (Coleman 1991).What is an incomplete type?Incomplete types refers to pointers in which there is non availability of theimplementation of the referenced location or it points to some location whose value is not available for modification.int *i=0x400 // i points to address 400*i=0; //set the value of memory location pointed by i.Incomplete types are otherwise called uninitialized pointers.What is a dangling pointer?A dangling pointer arises when you use the address of an object afterits lifetime is over. This may occur in situations like returning addresses of the automatic variables from a function or using the address of the memory block after it is freed. The followingcode snippet shows this:class Sample{public:int *ptr;Sample(int i){ptr = new int(i);}~Sample(){delete ptr;}void PrintVal(){cout << ¡°The value is ¡± << *ptr;}};void SomeFunc(Sample x){cout << ¡°Say i am in someFunc ¡± << endl;}int main(){Sample s1 = 10;SomeFunc(s1);s1.PrintVal();}In the above example when PrintVal() function iscalled it is called by the pointer that has been freed by the destructor in SomeFunc.Differentiate between the message and method.Message:Objects communicate by sending messages to each other.A message is sent to invoke a method.Method Provides response to a message.It is an implementation of an operation.What is an adaptor class or Wrapper class?A class that has no functionality of its own. Its member functions hidethe use of a third party software component or an object with the non-compatible interface or a non-object-oriented implementation.What is a Null object?It is an object of some class whose purpose is to indicate that a real object of that classdoes not exist. One common use for a null object is a return value froma member function that is supposed to return an object with some specified properties but cannot find such an object.What is class invariant?A class invariant is a condition that defines all valid states for an object. It is a logicalcondition to ensure the correct working of a class. Class invariants must hold when an object is created, and they must be preserved under all operations of the class. In particular all class invariants are both preconditions and post-conditions for all operations or member functions of the class.What do you mean by Stack unwinding?It is a process during exception handling when the destructor is called for alllocal objects between the place where the exception was thrown and where it is caught.Define precondition and post-condition to a member function. Precondition: A precondition is a condition that must be true on entry to a member function. A class is used correctly if preconditions are never false. An operation is not responsible for doing anything sensible if its precondition fails to hold. For example, the interface invariants of stack class say nothing about pushing yet another element on a stack that is already full. We say that isful() is a precondition of the push operation.Post-condition: A post-condition is a conditionthat must be true on exit from a member function if the precondition was valid on entry to that function. A class is implemented correctly if post-conditions are never false. For example, after pushing an element on the stack, we know that isempty() must necessarily hold. This is a post-condition of the push operation.What are the conditions that have to be met for a condition to be an invariant of the class?The condition should hold at the end of every constructor.The condition should hold at the end of every mutator (non-const) operation.What are proxy objects?Objects that stand for other objects are called proxy objects or surrogates.template <class t="">class Array2D{public:class Array1D{public:T& operator[] (int index);const T& operator[] (int index)const;};Array1D operator[] (int index);const Array1D operator[] (int index) const;};The following then becomes legal:Array2D<float>data(10,20);cout<<data[3][6]; // fineHere data[3] yields an Array1D objectand the operator [] invocation on that object yields the float in position(3,6) of the original two dimensional array. Clients of the Array2D class need not be aware of the presence of the Array1D class. Objects of this latter class stand for one-dimensional array objects that, conceptually, do not exist for clients of Array2D. Such clients program as if they were using real, live, two-dimensional arrays. Each Array1D object stands for a one-dimensional array that is absent from aconceptual model used by the clients of Array2D. In the above example, Array1D is a proxy class. Its instances stand for one-dimensional arrays that, conceptually, do not exist.Name some pure object oriented languages. Smalltalk, Java, Eiffel, Sather.Name the operators that cannot be overloaded. sizeof, ., .*, .->, ::, ?: Salam in the comments notes that -> can be overloaded.What is a node class? A node class is a class that,relies on the base class for services and implementation,provides a wider interface to the users than its base class,relies primarily on virtual functions in its public interface depends on all its direct and indirect base classcan be understood only in the context of the base classcan be used as base for further derivationcan be used to create objects.A node class is a class that has added new services or functionality beyond the services inherited from its base class.What is an orthogonal base class?If two base classes have no overlapping methods or data they are said to be independent of, or orthogonal to each other. Orthogonal in the sense means that two classes operate in different dimensions and do notinterfere with each other in any way. The same derived class may inherit such classes with no difficulty.What is a container class? What are the types of container classes?A container class is a class that is used to hold objects in memory orexternal storage. A container class acts as a generic holder. A container class has a predefined behavior and a well-known interface. Acontainer class is a supporting class whose purpose is to hide the topology used for maintaining the list of objects in memory. When a container class contains a group of mixed objects, the container is called a heterogeneous container; when the container is holding a group of objects that are all the same, the container is called a homogeneous container.1 两个人轮流拿10个硬币,每次可拿1,2,4个,拿到最后一个的为输,问有无必胜条件?答:后拿者赢2 有1000个表,每个表有若干个item,每个item形式为(x,y),寻找这些表中overlapp ed的item3 用一串节点存放N个数据,每个节点可放k个数据,其中包含额外的b个数据,问k为多少最能节省存储空间(假设N/(k-b)mod1=1/2)4 一个链表排序程序,补足其中一些丢失的语句(排序中不用额外的存储空间)5 一篇英文,将打乱的各段排序并写个总结,大意是吹嘘SAP如何的好6 两个仓库的进货,出货和仓库间的货物转移交易的流水帐,写出每次交易的货物数,单价,交易后仓库中的货物数和amount(货物数*单价)1.Jeff and Diamond like playing game of coins,One day theydesigned a new set of rules:1)Totally 10 coins2)One can take away 1,2or 4 coins at one time by turns3)Who takes the last loses.Given these rules Whether the winning status is pre-determined or not解答:1:从后面开始考虑,最后肯定要留1个才能保证自己赢2:所以要设法让对方留下2,3,5个3:也就是要自己取后留下1,4,6,7,8,9。
Pearson Computer Delivered Testing Test Administra

1. IntroductionPearson’s Computer Delivered Test (CDT) program, using patented Ordinate® speech processing technology, enables test administrators to deliver Versant language tests on a test center computer and upload completed tests for scoring.This Guide is written for administrators of CDT. It explains how to:•Configure Testing Center Computers•Download Tests•Take a TestThis Guide assumes that you have successfully installed the CDT program on each of the computers on which you intend to administer tests. If you have not completed the installation process, please consult the CDT Installation Guide which can be downloaded on Pearson’s website:https:///english/versant/cdt.html2. Configuring Testing Center ComputersBefore administrating a test, prepare the computer for test delivery. Preparation involves three steps:•Verify screen resolution settings•Verify that the microphone is working and that the volume is properly set•Verify bandwidth of your Internet connection for your expected testing volume2.1 Verify screen resolution settings1.Open the Control Panel.2.In the Control Panel, click Display.3.Click the Settings tab.4.Check the screen resolution setting in the Screen Area. It should be at least 1024 x 768.5.Move the slider to adjust the settings to the required minimum if needed.2.2 Verify microphone volume levelMicrophone volume level for Windows XP, 7, 8 and 10 is adjusted automatically by the CDT Client. For Windows Vista it is required that microphone volume level is adjusted by following these steps:1.In the Start Menu, locate the search box, type Speech Recognition Options and press Enter.2.In the Speech Recognition Options Window click on Set up microphone.3.Follow the instructions provided and click Next.4.Read the full sentence that appears on the screen into the microphone, then click Next.5.Click Finish, to complete your microphone calibration.2.3 Verify bandwidth for expected testing volumeThe CDT program operates by downloading a test to the local machine and then uploading theresponses once the test is complete for scoring. This requires network access to an Internet connection of sufficient bandwidth to accommodate the volume of concurrent testing that you plan to conduct inyour test center. (Note: In addition to a real-time mode, CDT also supports an option that allows you to pre-load tests, complete the tests offline, and then reconnect later to upload results for scoring). To ensure your test center has adequate Internet bandwidth, please consult the document “Network and Bandwidth Requirements.”3. Downloading TestsAfter the CDT software has been installed and each computer has been configured, testing can proceed. For test takers to be able to take a test, a Test Identification Number (TIN) must be entered for each test to download the appropriate test materials. There are 2 administrative options for downloading TINs:1. Pre-loading TINs before scheduled testing: As the test administrator, you can pre-load thecomputer with tests before your scheduled testing. We recommend this method if:a.You have any concerns about the speed or performance of your Internet connection.‡b.You plan to conduct testing on multiple computers at the same time.‡c.You need to conduct testing on a computer that cannot be connected to the Internetduring the test (for example, if you conduct testing with a laptop in a remote location).2. On-demand downloading of TINs: If you can stay connected to the Internet and have enoughbandwidth for the volume of testing you plan to do‡, you may also provide TINs to the testtakers and instruct them to enter the TIN as the first step of their test. The test materials willdownload then, on-demand. This download will need to complete before the test taker canbegin the test.‡ To verify that you have enough bandwidth for the volume of testing that you plan to do, please consult the document titled “Network and Bandwidth Requirements.”Note that he same TINs cannot be downloaded to multiple computers. If a batch or TIN was mistakenly downloaded to the incorrect computer, please contact Pearson Support (+1 650-470-3503 or*********************) to release the TIN(s) from the computer.3.1 Getting Started1.Ensure the computer is connected to the Internet.2.Start CDT by double-clicking the CDT Client icon on the desktop.3.Go to Menu located on the top right of the screen.4.Click on Administration.5.Enter your ScoreKeeper Username and Password to enter the Administrator’s configurationpreferences and click Enter. If you do not have a ScoreKeeper Username and Password,contact your Account Manager.3.2 Pre-loading TINs Before Scheduled TestingTests can be pre-loaded by batch, or by Test Identification Numbers (TINs).1.In the Administrator menu, click Download Tests.2.To download an entire batch of testsa.Click the Batch Key tab.b.Enter the alpha-numeric batch key into the space provided (Note: the batch key can befound by going to the batch in your ScoreKeeper account and clicking the TestMaterials link).c.Click Enter. CDT will then download all of the unused TINs in that batch.3.To download individual Test Identification Numbers (TINs) from multiple batchesa.Click the TIN(s) tab.b.Enter each TIN or a comma-separated list of TINs.c.Click Enter.3.3 On-Demand Downloading of TINsTo download tests on-demand, you may also provide TINs to the test takers and instruct them to enter the TIN as the first step of their test.1.Start CDT, enter the TIN in the space provided and click Enter.2.The TIN will then begin to download. The download progress will be displayed. Do not exit CDTwhile the TIN is downloading.3.Once the TIN is fully downloaded, CDT will display the headset (and for speaking test,microphone) check.3.4 View TestsOnce you have downloaded tests to the computer, you can view all the unused tests that are available for use on this computer.1.In the Administrator menu, click View Tests.2.Verify the total number of tests available match your records.3.Click Refresh TIN List to check the availability of the local test inventory against yourScoreKeeper account.4. Taking a TestTo begin a test, the administrator or test taker must enter a valid Test Identification Number (TIN) into the Welcome screen of the CDT Client.1.Start CDT and go to Home page.2.Give the test taker a TIN.3.The test taker enters the TIN in the space provided and clicks Enter to start the test.If the TIN has been pre-loaded, then the test will begin immediately, starting with an audio check. If not, then the TIN will be downloaded before the test can begin.4.1 Audio Volume and Microphone CheckAt the beginning of each test, test takers will go through an audio volume check. For speaking tests, test takers will also go through a microphone volume check.1.The test taker is instructed to put on their headset (for speaking tests) or headphones (forwriting tests) as shown on the screen.2.Click Next to proceed.3.The test taker listens to a passage and is instructed to move the slider to change the volume.Note: Test takers can also change the volume during the test in the upper right corner of thescreen.4.Click Next to proceed.5.For speaking tests, test takers are asked to read a sentence into their microphone to verify thatit is working correctly.6.If CDT cannot verify that the microphone is working correctly, an error message will appear.Follow the instructions to complete the microphone check. Is important to verify that themicrophone is working properly. If the microphone is unable to properly record the test taker’s responses, then that test’s score may be affected. If error messages persist, exit CDT and check the microphone volume and functioning using your computer’s audio and microphone controls (see Section 2.2).7.Once the calibration checks are complete, the test will begin.4.2 Completing the TestWhen the test taker is finished, the application will prompt the test taker to click Finish. If the computer is connected to the Internet with the test taker clicks Finish, then the test responses will be automatically uploaded to the Versant system for scoring. Note: if the test taker exits CDT before clicking Finish, then the test will not be completed and sent for scoring.If the Internet connection was disabled during testing, administrators must reconnect to the Internet and launch the CDT Client for the response files to be automatically submitted for scoring. Keep CDT open until all responses have been uploaded. You can check the status of completed tests by doing the following:1.Go to Menu located on the top right of the screen.2.Click on Administration.3.Enter your ScoreKeeper Username and Password to access the Administrator’s configurationpreferences and click Enter. If you do not have a ScoreKeeper Username and Password,contact your Account Manager.4.In the View Tests section, click Refresh TIN List.5.Look at the “Sessions” information. If there are tests that still need to upload for scoring, theywill be listed here. If you see “No local sessions/response,” then all completed tests have been uploaded and you can exit CDT.4.3 Checking ScoresTest scores are available within minutes after the voice files are successfully submitted to the Versant system. To view scores, go to https:///english/versant/score.html or log into your ScoreKeeper account.5. TroubleshootingThis section contains suggestions for troubleshooting problems. If you encounter any problem that cannot be resolved, contact our Technical Support team at ********************* or +1 650-470-3503.5.1 Microphone ErrorsMicrophone volume levels for Windows XP, 7, 8 and 10 users will automatically adjust in the CDT Client. For Windows Vista users, follow the steps in Section 2.2 to verify the microphone volume level. If the volume levels have been verified but error messages are still occurring, it could be for one of the following reasons:1.The microphone has not been positioned correctly as shown on the computer screen.2.The microphone may not be compatible or working properly with the computer. Exit the CDTClient, and go to the Control Panel. Select Sound and Audio Devices and then click on theVoice tab. Next, click on the Test Hardware button and follow the steps on the screen to make sure the microphone is working properly.5.2 Downloading TestsIf you are experiencing difficulties downloading tests, it could be for one of the following reasons:1.The Batch Key may not be valid. The Batch Key is a 12 character alpha-numeric code that isunique to each batch. The Batch Key can be found in your ScoreKeeper account List Batches >> Test Materials for each batch.2.The Batch has no available tests. If the batch is already downloaded into your computer it isrecommended to Refresh the TIN list before starting using those TINs (see Section 3.3), toensure the most up to date list of unused TINs are displayed. Only unused TINs will bedownloaded to the computer.3.The TIN(s) or Batch cannot be located. The TIN(s) or entire batch may have already been used. Loginto your ScoreKeeper account and go to List Batches >> View Scores and select Click here to see a list of all tests in this batch to ensure the TIN(s) or batch are unused.5.3 Scoring DelaysTest scores are typically available in ScoreKeeper within minutes of completing a test and uploading the responses to the Versant Testing System. If scores are not available within 15 minutes, it could be for one of the following reasons:1.Your internet connection may have been interrupted. Exit the CDT Client, re-connect to theInternet, and open the CDT Client. Tests will be automatically uploaded to the Versant testing system and the scores will become available shortly.2.The Versant testing system may be experiencing a brief outage. Check with your Account Managerto see if there is any scheduled maintenance downtime and when the system will becomeavailable. Once the outage is complete, tests that were administered during the outage window will be scored on a first-come, first-served basis to the best of our scoring capacity.。
Manual——Test(翻译1)

Manual——Test(翻译1)LTE Manual ——Logging(翻译)(本⽂为个⼈学习笔记,如有不当的地⽅,欢迎指正!)1.17.3 Testing framework(测试框架)ns-3 包含⼀个仿真核⼼引擎、⼀系列模块、例⼦程序和测试。
随着时间的推移,⼀些新的贡献者贡献出模型、测试和例⼦。
Python 测试程序 test.py 作为测试执⾏管理者;test.py 运⾏测试代码和例⼦来寻找 regressions,输出结果有很多种形式,管理代码覆盖分析⼯具。
此外,我们对buildslaves进⾏分层,buildslaves 是⾃动化创建的 robots,通过在不同的系统中和使⽤不同的配置选项运⾏测试框架,buildslaves 能执⾏健壮性测试。
(1)Buildslavesns-3 测试的最⾼级别是 buildslaves (build robots)。
如果你不熟悉该系统,可以参考 ——jenkins 是⼀个开源的⾃动化系统,允许 ns-3 ⽇常重建和测试。
通过在很多不同系统上运⾏ buildbots(⼀种⾃动化构建⼯具),我们可以确保 ns-3 在它⽀持的所有系统上正确地构建和执⾏。
⽤户(和开发者)通常不会与 buildslave 系统打交道,除了读取它的关于测试结果的消息。
如果在⼀个⾃动化构建和测试的⼯作中检测到 FAIL, buildbot 会发送邮件给ns-commits mailing 列表。
该邮件看起来类似于:In the full details URL shown in the email, one can find links to the detailed test output。
(在邮件显⽰的详细 URL 信息中,⽤户可以找到详细测试输出的链接。
)如果没有错误的话,buildslave 系统会默默执⾏它的⼯作,并且系统每天会进⾏构建和测试循环来验证⼀切是否 ok。
ab test实际运用案例

ab test实际运用案例AB testing, also known as split testing, is a method of comparing two versions of a webpage or app to see which one performs better. AB 测试,又称分割测试,是一种比较网页或应用程序两个版本的方法,以查看哪个版本表现更好。
It is a common practice in online marketing and product development to make data-driven decisions. This can be done by randomly showing one version to a set of users and the other version to another set of users, and then comparing the results. 这是在线营销和产品开发中常见的实践,以做出基于数据的决策。
可以通过将一个版本随机展示给一组用户,将另一个版本展示给另一组用户,然后比较结果来完成。
AB testing can be used for a variety of purposes, such as testing the effectiveness of different ad copy, website designs, or product features. AB测试可以用于各种目的,比如测试不同广告文案、网站设计或产品功能的有效性。
By using AB testing, businesses can make informed decisions that lead to improved user experiences and increased conversions. 通过使用AB测试,企业可以做出知情决策,从而改善用户体验并增加转化率。
软件测试英语面试题及答案

软件测试英语面试题及答案### 软件测试英语面试题及答案1. What is software testing?Software testing is the process of evaluating a software application or system to determine whether it meets the specified requirements and to identify any defects or issues that might be present. It is a key phase in the software development life cycle and plays a crucial role in ensuring the quality and reliability of the software product.Answer: Software testing is a systematic process that involves verifying and validating a software application to ensure it meets the requirements and is free from defects. It is essential to improve the quality of the software and to ensure that it functions correctly under various conditions.2. What are the different types of software testing?There are several types of software testing, including:- Functional Testing: Testing individual components or features for both expected and unexpected inputs and comparing the actual results with the expected results.- Non-functional Testing: Evaluating the performance, reliability, usability, and other attributes of the software. - Regression Testing: Ensuring that new changes to thesoftware have not adversely affected existing features.- Integration Testing: Testing the combination of software components to ensure they work together as expected.- System Testing: Testing the complete, integrated software system to evaluate its compliance with the specified requirements.- Acceptance Testing: The final testing stage where the software is tested to ensure it meets the user's acceptance criteria.Answer: The various types of software testing are designed to cover different aspects of software quality. They include functional, non-functional, regression, integration, system, and acceptance testing, each serving a specific purpose in the overall testing process.3. What is the difference between white box testing and black box testing?- White Box Testing: Also known as structural testing or code-based testing, it involves testing the software with knowledge of its internal structure and workings. It is used to check the internal logic and flow of the program.- Black Box Testing: This type of testing is performed without any knowledge of the internal workings of the application. It focuses on the functionality of the software and how it responds to inputs.Answer: White box testing requires an understanding of the software's internal code and structure, while black box testing is based on the software's functionality and externalbehavior. The choice between the two depends on the testing objectives and the information available to the tester.4. What is the purpose of test cases and test suites?Test cases are detailed descriptions of the test scenarios that are designed to verify specific aspects of the software. They include the input, expected results, and the steps to execute the test. A test suite is a collection of test cases that are grouped together to cover a particular feature or functionality of the software.Answer: Test cases and test suites are essential for structured testing. They provide a systematic approach to testing, ensuring that all aspects of the software are evaluated. Test cases help in identifying defects, while test suites help in organizing and prioritizing the testing efforts.5. How do you handle a situation where you find a bug that is not reproducible?When a bug is not reproducible, it can be challenging to diagnose and fix. The steps to handle such a situation include:- Documenting the Bug: Record all the details about the bug, including the steps taken, the environment, and any error messages.- Analyzing the Bug: Try to understand the conditions under which the bug might occur by analyzing the logs, code, andsystem state.- Isolating the Bug: Attempt to isolate the bug by changing one variable at a time to see if the bug can be reproduced. - Communicating with the Team: Discuss the bug with the development team to get insights and possible solutions.- Prioritizing the Bug: If the bug cannot be reproduced, it may be necessary to prioritize it based on its impact and the likelihood of it occurring again.Answer: Reproducibility is key to resolving bugs. However, when a bug is not reproducible, thorough documentation, analysis, isolation, communication, and prioritization are crucial steps in managing the issue effectively.6. How do you prioritize testing efforts?Prioritizing testing efforts is essential to ensure that the most critical parts of the software are tested first. The factors that influence prioritization include:- Risk Assessment: Testing areas with the highest risk of failure first.- Business Value: Prioritizing features that provide the most value to the business.- User Impact: Focusing on features that impact the user experience the most.- Resource Availability: Considering the availability of testing resources.- Development Progress: Aligning testing with the development schedule to ensure that testing is completed in time.Answer: Effective prioritization of testing efforts is a balance between risk, value, user impact, resource availability, and development progress. It's important to have a clear understanding。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Exam : 000-778Title : IBM Tivoli License Manager V2.1 Implementation Ver : 06.14.07QUESTION 1Certkiller .com's runtime server is performing badly. They need to make changes to the system.properties file. Once the changes have been made, what needs to be done to ensure the changes are implemented?A. restart the runtime serverB. restart the administration and runtime serversC. Nothing needs to be done. The changes are dynamic.D. restart DB2 and the runtime serverAnswer: AQUESTION 2What is a function of a runtime server?A. identifies the starting or stopping of a monitored software product and communicates this information to the runtime server so that a license can be assigned or releasedB. Web interface that can be used to perform license management and administration tasks and to produce historical reports of license usage and inventory information over timeC. central repository of product, license agreement, license usage, inventory, and organization informationD. Web interface that can be used to deploy the agents to nodes that are to be monitored and to produce real-time reports of usage of software running on the monitored agents Answer: DQUESTION 3Besides the Super Administrator role, which two roles can create divisions and application users? (Choose two.)A. Procurement and Licensing ManagerB. AdministratorC. Procurement ManagerD. System Resources ManagerE. License AdministratorAnswer: B,DQUESTION 4Certkiller .com wants to improve the throughput of software inventory and agent information in their IBM Tivoli License Manager (ITLM) environment. Which configuration change to the system.properties file accomplishes this?A. in the runtime server settings, decrease the value of adminUploadPeriodB. in the administration server settings, decrease the value of serverWakeUpPeriodC. in the administration server settings, increase the value of adminDownloadPeriodD. in the runtime server settings, increase the value of inventoryUpdatePeriod Answer: AQUESTION 5Which three pieces of information are required to install the Warehouse Enablement Pack (WEP) for IBM Tivoli License Manager (ITLM)? (Choose three.)A. login ID and password to the catalog manager databaseB. login ID and password to the runtime server databaseC. database name or alias to the runtime server databaseD. database name or alias to the administration server databaseE. login ID and password to the administration server databaseF. the location of the WEP installation properties fileAnswer: D,E,FQUESTION 6There is a requirement for the IBM Tivoli License Manager (ITLM) agent to contact all runtime servers for an organization. Which value needs to be set for the requestScope parameter in the system.properties file?A. 1B. 0C. 3D. 2Answer: DQUESTION 7Which version of the JDBC driver must be installed when using DB2 V7.2 Fixpack 10a?A. 2.0B. 2.2C. 1.2D. 1.5Answer: AQUESTION 8On Windows, what is the default install path for WebSphere Application Server?A. C:\Program Files\WebSphere\binB. C:\Program Files\Websphere\AppServerC. C:\Program Files\ITLM\WebSphereD. C:\Program Files\WebSphere\appAnswer: BQUESTION 9Which statement is true about an Limited Availability (LA) patch?A. It contains only one patch and can be ad hoc for a particular customer.B. The patch is generally available and should be applied by all customers.C. The LA patch always fixes issues with both the administration and runtime server.D. The LA patch contains more than one patch and supersedes all previous patches. Answer: AQUESTION 10Which two tasks are performed to recover from a corrupt IBM Tivoli License Manager (ITLM) server database? (Choose two).A. restore a backup copy of the ITLM administration server configuration filesB. restore a backup copy of the ITLM administration server databaseC. reinstall the ITLM runtime server database component, deleting the database during the uninstallD. reinstall the ITLM runtime serverE. reinstall the ITLM administration serverAnswer: B,CQUESTION 11What is the purpose of the IBM Tivoli License Manager (ITLM) communication.properties file?A. controls the communications between an ITLM runtime and administration serverB. controls the communications between an ITLM runtime server and agentsC. controls the communications between multiple ITLM runtime serversD. controls the communications between an ITLM administration server and agents Answer: AQUESTION 12What does the command viewer do?A. converts each trace log into a single XML fileB. converts each message file into a XML file and creates a single HTML fileC. converts each message and trace log into a XML file and create a single text fileD. converts each trace file into a XML file and creates a single HTML fileAnswer: DQUESTION 13Sometimes products expected in a Real Time Use report are not displayed. What is the reason for this?A. The compliance Level is set to Minimum.B. The Hard Stop setting is enabled.C. The compliance Level is set to High.D. Monitoring has been turned on for the application in question.Answer: AQUESTION 14Which value enables automatic assignment of a node name to an agent during installation?A. autonaming=yB. parm.automaticTagAssignment=yC. parm.automaticTagAssignment=nD. _Assignment=yAnswer: BQUESTION 15Which custom field can be added to contracts?A. Product VendorB. Contract CostC. LocationD. SupplierAnswer: CQUESTION 16Which two pieces of information are needed before installing the Catalog Manager? (Choose two.)A. host name of the runtime serverB. host name of the Tivoli Management Framework serverC. port number used to communicate with the database serverD. DB2 instance name of the administration server databaseE. database name of the administration server databaseAnswer: C,EQUESTION 17Which two types of recognition modules can be added to the software catalog using the catalog manager? (Choose two.)A. Solaris packagesB. Linux rpm packagesC. AIX software packagesD. Install Shield for Multiplatform Installation registryE. Windows Registry KeysAnswer: D,EQUESTION 18A new administrator joins ACME international. The IBM Tivoli License Manager (ITLM) environment for ACME international contains two organizations: ACME1 and ACME2 The new administrator needs to perform all administrative tasks for both organizations, ACME1 and ACME2 except for creating new administrators. What is the process for creating the new administrator?A. from the administration server CLI, use the crtadm command to create the new administrator account; create a new profile for the new administrator for each organization (ACME1 and ACME2 using the crtadprf cli commandB. log in to the Administration Server Web User Interface as any user with administrator authority; create an account for the new administrator; create a single profile the new account with Global Administrator authorityC. log in to the Administrator Server Web User Interface as alumroot; create an accountfor the new administrator; create two new profiles for the new account, one with the administrator role for ACME1 and the other profile with the administrator role forACME2D. log in to the Administrator Web User Interface as alumroot; create an account for the new administrator with Super Administrator authorityAnswer: CQUESTION 19On the administration server, in which directory are the IBM Tivoli License Manager (ITLM) configuration files found?A. <INSTALL_DIR>\admin\confB.<INSTALL_DIR>\admin\SLM_Admin_Application.ear\slm_admin.war\WEB-INF\conf C.<INSTALL_DIR>\runtime\SLM_Runtime_Application.ear\slm_runtime.war\WEB-INF\conf D.<INSTALL_DIR>\admin\SLM_Admin_Application.war\slm_admin.ear\WEB-INF\confAnswer: BQUESTION 20Which file shows whether a specific patch has been applied to the IBM Tivoli License Manager (ITLM) system?A. <INSTALL_DIR>/patch.xmlB. <INSTALL_DIR>/product.xmlC. <TEMP>/patch.logD. <TIVOLI_COMMON_DIR>/product.txtAnswer: BQUESTION 21If SSL is enabled for the administration server's GUI, which action must be completed to access the GUI using a non-SSL connection?A. stop and restart the serverB. disable SSL for both the WebSphere Application Server and IBM HTTP ServerC. access the following URL http://<server name>/slmadmin/loginD. open the administration server's GUI using SSL and uncheck the SSL Only box in the configuration sectionAnswer: CQUESTION 22What are three reasons to use SSL communications with IBM Tivoli License Manager V2.1? (Choose three.)A. simplifies the configuration of the componentsB. ensures the quality of the data being transmittedC. increases network performanceD. reduces runtime server response times to agent requestsE. authenticates the origin of messagesF. encrypts the messages between the componentsAnswer: B,E,FQUESTION 23A default version of DB2 is installed on a Windows system. What can be done to verify that DB2 is running?A. open the DB2 Warehouse ControlCenterB. check that the DB2-DB2 service is runningC. look at the db2log.log fileD. run netstat -an and verify that port 60000 is listeningAnswer: BQUESTION 24Which method is used to uninstall the IBM Tivoli License Manager (ITLM) catalog manager on a Windows system?A. run the uninstaller.exe commandB. run the uinstall.catman commandC. run the wuninst <catman> commandD. uninstall the ITLM administration serverAnswer: AQUESTION 25What must be configured to allow online backups of the administration server database?A. Log Retain must be set to on for the DB2 instance, which contains the TLMA database.B. Log Retain must be set to on for the TLMA DB2 database.C. The number of primary logs for the DB2 instance, which contains the TLMA database must be increased to at least 50.D. The number of primary logs for the TLMA database must be increased to at least 50. Answer: BQUESTION 26Which two reports are available on a runtime server? (Choose two.)A. Inventory SnapshotB. Real-time Software UseC. Software Use SnapshotD. Use SnapshotE. Distributed LicensesAnswer: B,EQUESTION 27What is the minimum recommended RAM required for an IBM Tivoli License Manager (ITLM) V2.1 administration server installation on a Windows platform?A. 2048 MBB. 256 MBC. 512 MBD. 1024 MBAnswer: DQUESTION 28An IBM Tivoli License Manager (ITLM) runtime server outage is planned. Which task is performed before the ITLM runtime server is taken offline?A. execute the backupconf commandB. configure a backup runtime serverC. back up the ITLM runtime server databaseD. configure the notifyAgent parameter to inform the ITLM agents that the ITLM runtime server is offlineAnswer: BQUESTION 29Which action is necessary to complete agent self updates?A. install the fixpack or interim fix to the administration serverB. restart the administration server after the fix is appliedC. edit the agent settings section of the system.properties file on each administration server, and change the updateAgentEnabled parameter to YesD. edit the agent settings section of the system.properties file on each runtime server and change the updateAgentEnabled parameter to YesAnswer: DQUESTION 30What are two ways trace levels are changed and applied for an IBM Tivoli License Manager (ITLM) native agent? (Choose two.)A. stop and restart the ITLM native agent after editing the log.propertiesB. edit the log.properties file and run the tlmagent -reload command to apply the new trace levelC. edit the tlmagent.ini file and run the logreload command to apply the new trace levelD. stop and restart the ITLM native agent after editing the tlmagent.ini fileE. edit the tlmagent.ini file and run the tlmagent -reload command to apply the new trace levelAnswer: D,EQUESTION 31Which field is mandatory when creating a new Windows registry module?A. Key ValueB. Key PathC. Data TypeD. GUIDAnswer: BQUESTION 32Which method can be used to install an AS/400 agent?A. using IBM Tivoli Configuration ManagerB. using SSH or RSHC. using a Windows Logon scriptD. via the webAnswer: AQUESTION 33An IBM Tivoli License Manager (ITLM) administration server database is being installed on a remote server. Which DB2 component needs to be installed on the administration server to allow communication with its database?A. DB2 LDAP SupportB. DB2 Enterprise EditionC. DB2 Control DatabaseD. DB2 Administrative ClientAnswer: DQUESTION 34When installing WebSphere Application Server and IBM HTTP Server on AIX, which ports are most likely to conflict with software already installed?A. 9090 and 80B. 8080 and 90C. 80 and 443D. 9091 and 80Answer: AQUESTION 35What is the purpose of the IBM Tivoli License Manager (ITLM) log.properties file?A. The log.properties files stores configuration values for the ITLM WebSpere Application Server agent.B. The log.properties file stores configuration values that control the logging of trace, messages and events that can be defined differently for each ITLM server.C. The log.properties file stores common log configuration values that are sharedbetween ITLM servers.D. The log.properties file stores configuration values to handle the web deployment of an ITLM native agent.Answer: BQUESTION 36A planned installation of the administration server will run RedHat Linux ES V3.0. Which document indicates the correct version of DB2 to install?A. IBM Tivoli License Manager (ITLM) V2.1 Release NotesB. IBM Tivoli License Manager (ITLM) V2.1 Planning, Installation and Configuration GuideC. IBM Tivoli License Manager (ITLM) V2.1 Migration Tool GuideD. IBM Tivoli License Manager (ITLM) V2.1 Problem Determination Guide Answer: BQUESTION 37Which two parameters are used to authenticate the communication between a runtime server and the administration server? (Choose two.)A. PortB. Organization NameC. SSL PortD. Administration Server AddressE. Runtime Server NameAnswer: B,EQUESTION 38How are the configuration files for the IBM Tivoli License Manager administration server on a UNIX server backed up?A. change to the <INSTALL_DIR>/admin/cli directory;execute../tlmcli to initialize the admin command line environment; execute the command./wbkupdb to backup the configuration filesB. change to the <INSTALL_DIR>/admin/cli directory;execute../tlmcli to initialize the admin command line environment; execute the command./backupconf to backup the configuration filesC. change to the <INSTALL_DIR>/admin/cli directory;execute../tlmcli to initialize the admin command line environment;execute the command./bkupef to backup the configuration filesD. change to the <INSTALL_DIR>/runtime/cli directory;execute../tlmcli to initialize the admin command line environment;execute the command./backupconf to backup the configuration filesAnswer: BQUESTION 39Certkiller .com develops an in-house application. Since this application is not recognized by the IBM catalog of signatures, an operator adds a signature with the corresponding modules to the catalog. Two months later, the operator downloads the new IBM catalog and updates the catalog. What happens to the custom signature that the operator created for the in-house application?A. The update engine updates any entries that were previously from the IBM catalog and erases any custom entries.B. The update engine tries to associate the custom entry with the closest entry in the new catalog.C. The custom signature is preserved.D. The entire catalog is replaced and the custom entry is erased.Answer: CQUESTION 40Which two must exist prior to deploying an agent? (Choose two.)A. divisionB. contractC. runtime serverD. catalog managerE. license poolAnswer: A,CQUESTION 41Which tool can be used to schedule a backup of the administration server database?A. DB2 alert centerB. DB2 control centerC. administration server web User InterfaceD. DB2 command line processorAnswer: BQUESTION 42Which report does an operator use to display how an application is being used over a period of time within an organization?A. License Compliance reportB. Installs History reportC. Use Trend Analysis reportD. Use Level Analysis reportAnswer: CQUESTION 43What is the quickest and easiest way to verify that the reports of the IBM Tivoli License Manager (ITLM) V2.1 Warehouse Enablement Pack (WEP) are correctly imported into Crystal Enterprise?A. check the status in the DB2 Warehouse Control CenterB. open the Crystal Management ConsoleC. run the twh_list_marts commandD. check the e-portfolio for user aivoliAnswer: DQUESTION 44Which account role(s) can create a new Organization?A. Super Administrator onlyB. Administrator onlyC. Super Administrator and System Resources ManagerD. Super Administrator and AdministratorAnswer: AQUESTION 45What is the effect of executing the tlmagent -s command on an IBM Tivoli License Manager (ITLM) agent?A. The command stops the agent.B. The command uninstalls the agent.C. The command initiates a software scan.D. The command starts the agent.Answer: CQUESTION 46What information is displayed in the License Compliance Report?A. PlatformB. Unlicensed HWM (High Water Mark)C. Percentage Used (% Used)D. Unlicensed InstallsAnswer: CQUESTION 47What is the correct sequence of steps used to upgrade an existing IBM Tivoli License Manager (ITLM) V1.1.1 installation to ITLM V2.1?A. uninstall and reinstall the administration server, upgrade the catalog manager, uninstall and reinstall the runtime servers and databases, upgrade or reinstall the agentsB. upgrade or reinstall the agents, upgrade the runtime servers and databases, upgrade the catalog manager, upgrade the administration server and databaseC. delete all agents, upgrade the administration server and database, upgrade the catalog manager, upgrade the runtime servers and databases, reinstall all the agentsD. upgrade the runtime servers and databases, upgrade or reinstall the agents, upgrade the administration server and database, upgrade the catalog managerAnswer: AQUESTION 48What are the three methods for installing the IBM Tivoli License Manager V2.1 administration server? (Choose three).A. Silent InstallB. GUIC. Web ConsoleD. Software DistributionE. Web InstallationF. CloningAnswer: A,B,DQUESTION 49How is the version level of agents obtained?A. navigate to the Manage Components - Servers - View Agents section of the runtime server GUIB. use a select query on the adm.agent table via the DB2 command lineC. execute the agent_version.sh command on the administration serverD. execute the agent_version.sh command on the runtime serverAnswer: BQUESTION 50DB2 is installed on a UNIX system. What is the name of the default DB2 instance?A. db2fenc1C. db2D. db2inst1Answer: DQUESTION 51Which configuration problem can be identified and resolved using the pdtool?A. The IBM Tivoli License Manager (ITLM) agent inventory scan is not sent to the administration server.B. The runtime server fails to plug-in to the administration server because the administration server address that was specified during the installation of the runtime server was incorrect.C. The runtime server fails to plug-in to the administration server because the name in the runtime server configuration files does not match any server name registered in the administration server database.D. The ITLM agent fails to plug-in to the runtime server.Answer: CQUESTION 52What is the supported version of DB2 on RedHat Enterprise Linux V3.0?A. DB2 V8.1.4B. DB2 V7.2.0C. DB2 V8.1.0D. DB2 V7.2.10Answer: AQUESTION 53What is the default port number for DB2 Server communications?A. 9090B. 50000C. 80D. 60000Answer: BQUESTION 54Which field is mandatory on a contract?A. Contract CostB. Product VendorD. SupplierAnswer: CQUESTION 55Which document contains information about upgrading the IBM Tivoli License Manager (ITLM) V1.1.1 catalog to ITLM V2.1 catalog?A. ITLM V2.1 Administration GuideB. ITLM V2.1 Release NotesC. ITLM V2.1 Planning, Installation and Configuration GuideD. ITLM V2.1 Migration Tool READMEAnswer: DQUESTION 56The pdtool, viewer and log2xml are available for which three IBM Tivoli License Manager (ITLM) components? (Choose three.)A. ITLM agentB. ITLM catalog managerC. ITLM administration serverD. ITLM WebSphere Application Server agentE. ITLM runtime serverF. ITLM runtime databaseAnswer: B,C,EQUESTION 57SSL communications can be used between which components?A. runtime server and agents onlyB. administration server, runtime server and agentsC. administration server and agents onlyD. administration server and runtime server onlyAnswer: BQUESTION 58What is the least secure method for enabling SSL communications?A. create a certificate as a Certificate AuthorityB. request a certificate from a Certificate AuthorityC. create a self signed certificateD. use the default test certificateAnswer: DQUESTION 59What is the maximum recommended number of agents per IBM Tivoli License Manager (ITLM) V2.1 administration server?A. 45000B. 15000C. 30000D. unlimitedAnswer: AQUESTION 60Which file controls the frequency that data is sent between IBM Tivoli License Manager (ITLM) runtime server and agent?A. agent_install.propertiesB. communication.propertiesC. tlmagent.ini fileD. system.propertiesAnswer: DQUESTION 61Which file controls the frequency in which data is sent between the IBM Tivoli License Manager (ITLM) administration server and runtime server?A. communication.propertiesB. system.propertiesC. tlmagent.ini fileD. agent_install.propertiesAnswer: BQUESTION 62A Windows system running the IBM Tivoli License Manager (ITLM) agent is removed from the network and is no longer monitored. Which two steps uninstall the ITLM agent? (Choose two.)A. uninstall the agent via the web, http://<runtime server>/slmruntime/deploy and select uninstallB. delete the agent information from the ITLM administration server databaseC. uninstall the agent automatically by setting the updateAgentEnabled=deleteD. delete the agent information from the ITLM runtime server databaseE. uninstall the agent via the command tlmuninst.batAnswer: B,EQUESTION 63Which statement is true about the High product compliance level?A. Use of the product is not monitored.B. A real time request is forwarded at application start and the server only grants it if a license is valid and available.C. A real time request is forwarded at application start and the server only grants it if a license is valid and available and/or when no license exists for the requesting agent.D. Use of the product is monitored offline; enforcement is not required.Answer: BQUESTION 64Which URL gives access to the WebSphere Application Server V5.x console?A. http://<serveraddress>:9090/admin/B. http://<serveraddress>:9090/consoleC. http://<serveraddress>:80/console/D. http://<serveraddress>:80/admin/Answer: AQUESTION 65In which order are IBM Tivoli License Manager (ITLM) components installed in an enterprise environment?A. administration server, catalog manager, agent(s), runtime serverB. administration server, agent(s), runtime server, catalog managerC. agent(s), catalog manager, runtime server, administration serverD. administration server, runtime server, catalog manager, agent(s)Answer: DQUESTION 66What is the purpose of the Tivoli Common Directory?A. provides a common location in which Tivoli support procedures are documentedB. provides a common location in which problem determination information for Tivoli products is savedC. provides a common location in which Tivoli products are installedD. provides a common location in which Tivoli publications are installedAnswer: BQUESTION 67If the runtime server database is deleted during the uninstall process, how is the runtime data recovered?A. Data can be rebuilt from data stored by a backup runtime server.B. The runtime server data is lost and cannot be recovered.C. It can be recovered by restoring the database backup made during the uninstallation process.D. Runtime data can be rebuilt from data stored on the administration server database. Answer: DQUESTION 68On which platform can the IBM Tivoli License Manager (ITLM) V2.1 runtime server be installed?A. Windows NTB. RHEL V3.0 U2C. AIX V4.3.3D. RHEL V3.0 U3Answer: BQUESTION 69Which statement is true about the assignment of products to licenses?A. The quantity contained in a license can only be assigned to multiple nodes in the products, versions hierarchy at the products level.B. The quantity contained in a license can be assigned to multiple nodes in the products, versions and release hierarchy in any combination.C. The quantity contained in a license can only be assigned to multiple nodes in the products, versions hierarchy at the versions level.D. The quantity contained in a license can only be assigned to multiple nodes at the same level in the product version, release hierarchy.Answer: DQUESTION 70What is a correct way to stop IBM HTTP Server on Windows?A. db2stop "IBM HTTP Server", db2stop "IBM HTTP Administration"B. net stop "IBM HTTP Server", net stop "IBM HTTP Administration"C. db2stop "IBM HTTP Administration", db2stop "IBM HTTP Server"D. net stop all "IBM HTTP"Answer: BQUESTION 71What is the effect of executing the tlmagent -s command on an IBM Tivoli License Manager (ITLM) agent?A. The command uninstalls the agent.B. The command starts the agent.C. The command stops the agent.D. The command initiates a software scan.Answer: DQUESTION 72Which two IBM Tivoli License Manager (ITLM) configuration files can be modified by the user? (Choose two.)A. scpServices.xmlB. tlmagent.iniC. system.propertiesD. password.propertiesE. db.propertiesAnswer: B,CQUESTION 73Which role does an administrator need for an Organization to define software-monitoring settings for that organization?A. Procurement ManagerB. System Resources ManagerC. License AdministratorD. Software Resources ManagerAnswer: CQUESTION 74What does the statusinfo command do?A. collects configuration, trace and database information to send to Tivoli SupportB. provides informational messages about the IBM Tivoli License Manager (ITLM) runtime servers that are plugged-in to the ITLM administration serverC. provides informational messages about the status of the WebSphere serverD. collects information about the version of the ITLM components that are installed。