Question No : 3 Business Process Management (BPM) is more than just orchestration of activities. Which three are key aspects of BPM? Select three.

Similar documents
COURSE LISTING. Courses Listed. Training for Cloud with SAP SuccessFactors in Integration. 23 November 2017 (08:13 GMT) Beginner.

The Enterprise Knowledge Portal: The Concept

PROCESS USE CASES: USE CASES IDENTIFICATION

Practice Examination IREB

Implementing a tool to Support KAOS-Beta Process Model Using EPF

Development of an IT Curriculum. Dr. Jochen Koubek Humboldt-Universität zu Berlin Technische Universität Berlin 2008

Automating the E-learning Personalization

Bluetooth mlearning Applications for the Classroom of the Future

Computerized Adaptive Psychological Testing A Personalisation Perspective

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits.

CREATING SHARABLE LEARNING OBJECTS FROM EXISTING DIGITAL COURSE CONTENT

Using SAM Central With iread

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

A Context-Driven Use Case Creation Process for Specifying Automotive Driver Assistance Systems

Introduction of Open-Source e-learning Environment and Resources: A Novel Approach for Secondary Schools in Tanzania

Envision Success FY2014-FY2017 Strategic Goal 1: Enhancing pathways that guide students to achieve their academic, career, and personal goals

GACE Computer Science Assessment Test at a Glance

EOSC Governance Development Forum 4 May 2017 Per Öster

ON BEHAVIORAL PROCESS MODEL SIMILARITY MATCHING A CENTROID-BASED APPROACH

Closing out the School Year for Teachers and Administrators Spring PANC Conference Wrightsville Beach April 7-9, 2014

VOL VISION 2020 STRATEGIC PLAN IMPLEMENTATION

Process Assessment Issues in a Bachelor Capstone Project

PeopleSoft Human Capital Management 9.2 (through Update Image 23) Hardware and Software Requirements

Timeline. Recommendations

CHANCERY SMS 5.0 STUDENT SCHEDULING

November 17, 2017 ARIZONA STATE UNIVERSITY. ADDENDUM 3 RFP Digital Integrated Enrollment Support for Students

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments

HILDE : A Generic Platform for Building Hypermedia Training Applications 1

Running Head: STUDENT CENTRIC INTEGRATED TECHNOLOGY

On-Line Data Analytics

A Pipelined Approach for Iterative Software Process Model

UCEAS: User-centred Evaluations of Adaptive Systems

Efficient Use of Space Over Time Deployment of the MoreSpace Tool

Unit 18: Pick Activity

Process Assessment Issues in a Bachelor Capstone Project

CollaboFramework. Framework and Methodologies for Collaborative Research in Digital Humanities. DHN Workshop. Organizers:

Architecting Interaction Styles

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

Earthsoft s EQuIS Database Lower Duwamish Waterway Source Data Management

Institutionen för datavetenskap. Hardware test equipment utilization measurement

HIGHPOINT CONSULTING RESPONSE TO MARICOPA COUNTY COMMUNITY COLLEGE DISTRICT

CWIS 23,3. Nikolaos Avouris Human Computer Interaction Group, University of Patras, Patras, Greece

M55205-Mastering Microsoft Project 2016

An Open Framework for Integrated Qualification Management Portals

Emergency Management Games and Test Case Utility:

MARKETING MANAGEMENT II: MARKETING STRATEGY (MKTG 613) Section 007

Bluetooth mlearning Applications for the Classroom of the Future

Success Factors for Creativity Workshops in RE

INFED. INFLIBNET Access Management Federation Yatrik Patel

Seminar - Organic Computing

The IDN Variant Issues Project: A Study of Issues Related to the Delegation of IDN Variant TLDs. 20 April 2011

On the Combined Behavior of Autonomous Resource Management Agents

Ericsson Wallet Platform (EWP) 3.0 Training Programs. Catalog of Course Descriptions

Activities, Exercises, Assignments Copyright 2009 Cem Kaner 1

Continuing Education Unit Program Course Catalog

A Business Process Environment Supporting Collaborative Planning

Pragmatic Use Case Writing

Expert Reference Series of White Papers. Mastering Problem Management

STANDARD OPERATING PROCEDURES (SOP) FOR THE COAST GUARD'S TRAINING SYSTEM. Volume 7. Advanced Distributed Learning (ADL)

Two Futures of Software Testing

PRINCE2 Foundation (2009 Edition)

Introduction to Simulation

Top US Tech Talent for the Top China Tech Company

Unit purpose and aim. Level: 3 Sub-level: Unit 315 Credit value: 6 Guided learning hours: 50

Android App Development for Beginners

Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing

Rental Property Management: An Android Application

Software Maintenance

EDITORIAL: ICT SUPPORT FOR KNOWLEDGE MANAGEMENT IN CONSTRUCTION

CS Machine Learning

AGENDA LEARNING THEORIES LEARNING THEORIES. Advanced Learning Theories 2/22/2016

LEGO MINDSTORMS Education EV3 Coding Activities

Sharing Educational Knowledge and Best Practices in Edu-Sharing

Computing Professional Experience

CURRICULUM VITAE PERSONAL DETAILS. Evans Anderson Kirimi Miriti Year of Birth: English (Excellent), Kiswahili (Excellent), French (Fair).

From Self Hosted to SaaS Our Journey (LEC107648)

CyberCIEGE: An Extensible Tool for Information Assurance Education

CS 1103 Computer Science I Honors. Fall Instructor Muller. Syllabus

Coding II: Server side web development, databases and analytics ACAD 276 (4 Units)

SEDETEP Transformation of the Spanish Operation Research Simulation Working Environment

Houghton Mifflin Online Assessment System Walkthrough Guide

Nearing Completion of Prototype 1: Discovery

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Preparing for the School Census Autumn 2017 Return preparation guide. English Primary, Nursery and Special Phase Schools Applicable to 7.

Axiom 2013 Team Description Paper

Texas A&M University-Central Texas CISK Comprehensive Networking C_SK Computer Networks Monday/Wednesday 5.

THE DEPARTMENT OF DEFENSE HIGH LEVEL ARCHITECTURE. Richard M. Fujimoto

California s Bold Reimagining of Adult Education. Meeting of the Minds September 6, 2017

Using Blackboard.com Software to Reach Beyond the Classroom: Intermediate

Web-based Learning Systems From HTML To MOODLE A Case Study

Banner Financial Aid Release Guide. Release and June 2017

Value Creation Through! Integration Workshop! Value Stream Analysis and Mapping for PD! January 31, 2002!

IMPROVE THE QUALITY OF WELDING

Citrine Informatics. The Latest from Citrine. Citrine Informatics. The data analytics platform for the physical world

HARPER ADAMS UNIVERSITY Programme Specification

Organizational Knowledge Distribution: An Experimental Evaluation

7KH5ROHRI3URFHVVRULHQWHG(QWHUSULVH0RGHOLQJLQ'HVLJQLQJ 3URFHVVRULHQWHG.QRZOHGJH0DQDJHPHQW6\VWHPV

VISUALIZING SUCCESS PLANNING FOR THE FUTURE PUBLIC FORUM DECEMBER 17, 2013

Transcription:

Volume: 77 Questions Question No : 1 Which components are parts of BPM Suite 11g? Select two or three. A. Oracle Business Activity Monitoring (Oracle BAM) B. Oracle Business Rules C. Oracle WebCenter D. Oracle Business Intelligence E. Oracle Business Process Analysis Answer: A,B Question No : 2 BPM capability maturity levels describe. A. the capabilities of the BPM business analyst B. the length of time the BPM application has been in production C. the strategic and tactical levels of enterprise adoption of BPM D. BPM concepts, consistently applied, facilitating sharing and reuse Answer: C Question No : 3 Business Process Management (BPM) is more than just orchestration of activities. Which three are key aspects of BPM? Select three. A. Process Transparency B. Process Intelligence C. Continuous Process Improvement

D. Web Services Interoperability E. Identity Management Answer: A,B,C Question No : 4 Which two are true about BPM roles? Select two. A. BPM roles are concrete roles defined in the enterprise directory. B. BPM roles are abstract roles. C. Application roles can be defined as members of a BPM role. D. BPM roles are private to a process.,c Question No : 5 Which one of these implementations will allow a process to reply back to the calling process? A. a Receive task followed by a Send task that implements a Service call to the calling process B. a Send task with Conversation set to Initiates In its implementation C. a Service task that implements a Process Call to the calling process D. a Receive task with Conversation set to Initiates followed by a Send task with conversation set Continues Answer: A Question No : 6 Which three options does process tracking provide? A. It is available from the Process Tracking tab in Workspace. B. It is available to any user participating in a process.

C. It shows data entered at each point in the process. D. It shows the path taken during process execution. E. It allows any user participating in the process to modify the process execution. Answer: A,D,E Question No : 7 Which one cannot be used as a start point to initiate a new instance of a process? A. Initiator User Task B. Call Task C. Receive Task D. Message Start Event Question No : 8 By default, which two task participant roles can change the outcome of a task? Select two. A. Admin B. Approvers C. Assignees D. Creator E. Owner F. Reviewer Answer: C,E Question No : 9 Which three can you analyze using simu-lation? Select three.

A. Process throughput and performance B. Resource allocation for roles C. Activity-based cost D. End-to-end production run-time durations E. ROI Answer: A,B,C Question No : 10 Which two features are provided by BPM Process Analytics? Select two. A. simulation for a BPM process B. easy-to-use process metric collection C. easy-to-use modeling tools D. custom reporting dashboards,d Question No : 11 Which statement is false about a Process Simu-lation Model? A. It does not execute actual code of a process. B. It captures time and cost parameters C. It computes business rules. D. There can be multiple Process Simulation Models for a business process model in BPM Studio. Answer: C Question No : 12 Which two could be used to handle exceptions thrown by a service? Select two.

A. Subprocess B. event subprocess C. error end event D. error catch event as a boundary event on the service task,d Question No : 13 Which ADF technology binds UI components, such as input fields, to human task details? A. Managed beans B. Data controls C. Bounded task flow D. Human workflow Web services Question No : 14 Which one is a gateway type used in the context of process interactions? A. Exclusive Gateway B. Event Based Gateway C. Inclusive Gateway D. Parallel Gateway Question No : 15 Which two are true about project data objects? Select two. A. Any process in the project can access a project data object.

B. The value of a project data object does not vary between processes. C. Project data objects can be only used as input arguments to a process. D. Project data objects can be used in data associations and expressions. Answer: A,D Question No : 16 Which two options can be used to create custom dashboards on business indicator data? Select two. A. BPM Process Workspace B. WebCenter Process Spaces C. BPM Studio D. Oracle BAM Answer: A,D Question No : 17 Which one of these tools would you use to see the detail information, like source component and about faults generated by a running process? A. BPM Workspace B. Enterprise Manager C. Process Composer D. JDeveloper MDS Explorer Question No : 18 You can implement complex server-side validation logic to the task form by using a custom. A. data control

B. managed bean C. EL script D. UI component Question No : 19 In Oracle BPM 1 11g, which two things can be accomplished using a script task? Select two. A. execute Java code B. execute XSLT transformations C. copy data to variables or between variables D. define new process variables Answer: C,D Question No : 20 Which two actions can you perform on a task in your Inbox? Select two. A. You can reassign the task to a colleague B. You can delegate the task to your manager C. You can postpone a due date to a later date D. You can re-open a completed task. Answer: A,B Question No : 21 Human workflow is implemented as a. A. service engine within the SOA infrastructure B. component within the BPEL service engine

C. component within the BPMN service engine D. shared component within both BPEL and BPMN service Answer: A Question No : 22 Which one of the user personas is least likely to use Process Composer? A. Process Developer B. Business User C. Business Analyst D. Line of Business Owner Answer: D Question No : 23 In the ADF model-view-controller architecture, the controller is the ADF. A. binding layer B. data control layer C. controller D. faces Answer: C Question No : 24 Which human task pattern would be best suited for single approver scenario where the role is resolved through group membership? A. User B. Group

C. Initiator D. FYI E. Management Answer: A Question No : 25 Which three activities are most likely performed by a Business Analyst? Select three. A. model business processes B. design and implement user interfaces C. simulate and analyze business processes D. create services for system interactions E. design and implement BAM dashboards Answer: A,C,E Question No : 26 Which two correctly describe a Project Simu-lation Model? A. It is used for simu-lation across multiple processes. B. It describes the simu-lation scenario for a process model. C. It is associated with shared resources. D. It is configured using BPMN 2.0 notation. E. It is driven by parameters provided at application deployment time. Answer: A,C Question No : 27 Which two are predefined instance attributes that can be used in data associations and expressions?

Select two. A. ActivationCount B. Component C. LoopCounter D. String Answer: A,C Question No : 28 Which one is not a list builder used to determine the actual list of approvers in a management task? A. Approval groups B. Business rules C. Job level D. BPM role Question No : 29 Which two features do you find in decision tables? Select two. A. Sets of input data can be bucketed and reviewed for gaps. B. Data sets can be reviewed for conflicts. C. Data can be used for only one rule evaluation. D. A rule evaluation can only be used to enter new output data. Answer: A,B Question No : 30 Which end event should you use at the end of your process to send a message to a specific process?