ACP Mock Exams By Al Quintos

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Alquintosjr
A
Alquintosjr
Community Contributor
Quizzes Created: 2 | Total Attempts: 3,731
| Attempts: 761
SettingsSettings
Please wait...
  • 1/277 Questions

    What does a workflow in AVALOQ symbolize in a bank? ______________

Please wait...
ACP Mock Exams By Al Quintos - Quiz
About This Quiz

Reviewer in preparation for the upcoming ACP Exams Jan. 23, 2013


Quiz Preview

  • 2. 

    A kind of order that creates or modifies objects is __________________

    Explanation
    Static Data Order refers to a type of order that is responsible for creating or modifying objects. This order is typically used in programming to define the sequence in which objects are instantiated or modified. It ensures that objects are created or modified in a specific and consistent manner, allowing for proper execution of the program.

    Rate this question:

  • 3. 

    Order that generates booking is called _________________

    Explanation
    The order that generates a booking is referred to as a transaction order. This term is commonly used in the context of online bookings or reservations, where a customer's request for a booking is processed as a transaction. The term "transaction" implies that there is an exchange of goods or services involved, and in this case, it is the booking itself. The terms "transaction" and "transactional order" can also be used interchangeably to describe this process.

    Rate this question:

  • 4. 

    ________________ are symbolic references to objects.

    Explanation
    Keys are symbolic references to objects. They are used to identify and access specific objects within a collection or data structure. Keys provide a way to uniquely identify and retrieve values associated with them. In many programming languages, keys are commonly used in data structures like dictionaries, maps, and hash tables to organize and retrieve data efficiently.

    Rate this question:

  • 5. 

    ____________ provides business data fields not available in the standard entry forms.

    Explanation
    The word "Additions" in the plural form suggests that there are multiple business data fields that are not available in the standard entry forms. Similarly, the singular form "Addition" implies that there is at least one business data field that is not found in the standard entry forms. Both words indicate the presence of additional or extra data fields beyond what is typically provided in the standard forms.

    Rate this question:

  • 6. 

    __________________ are the ones that groups objects and use these groups for lookup, reporting etc.

    Explanation
    Classes/Classifications are the ones that groups objects and use these groups for lookup, reporting, etc. This means that both classes and classifications can be used to categorize and organize objects in a way that allows for easier retrieval and analysis. Whether the term "classes" or "classifications" is used first does not change the meaning of the statement, as they both refer to the same concept of grouping objects.

    Rate this question:

  • 7. 

    The currency is defined through the _______________________

    Explanation
    The currency is defined through the contract of the Money Account. This contract specifies the terms and conditions for the use and exchange of the currency. It outlines the rights and obligations of the parties involved in the transaction, including the issuer of the currency and the account holder. By entering into this contract, individuals and institutions agree to abide by the rules and regulations set forth by the Money Account, which ultimately defines the currency and its value.

    Rate this question:

  • 8. 

    ____________________ are exclusively for order and serves as additional information for an order.

    Explanation
    Post-It and Post it are both correct answers because they refer to the same thing, which are small pieces of paper with adhesive on one side that are used for writing notes or reminders. They are exclusively for order and serve as additional information for an order, allowing individuals to add specific instructions or details to their orders.

    Rate this question:

  • 9. 

    ___________ is the character you need to type to enter the last value date of a month into a date field?

    Explanation
    In this case, the letter "u" is the character that needs to be typed to enter the last value date of a month into a date field. This is likely because "u" is the last letter of the word "month" and is used as a shortcut to represent the end of the month when entering dates.

    Rate this question:

  • 10. 

    ______________ is a drop-down list of predefined values.

    Explanation
    A code table is a drop-down list of predefined values. It allows users to select from a set of predetermined options, rather than having to manually enter the values. This can help to ensure consistency and accuracy in data entry, as well as making it easier for users to input the desired information. Code tables are commonly used in various applications and databases to provide a standardized selection of choices for users.

    Rate this question:

  • 11. 

    ____________________ means the enhancement of functionality, usually with AVALOQ Script.

    Explanation
    Scripting refers to the process of writing and implementing scripts, typically using AVALOQ Script, to enhance the functionality of a system. It involves creating customized code to automate tasks, add new features, or modify existing functionality. Scripting allows for flexibility and customization, enabling users to tailor the system to their specific needs without making extensive changes to the underlying software. It is a powerful tool that can be used to extend the capabilities of a system and improve efficiency.

    Rate this question:

  • 12. 

    ______________ status is set if the source is not accepted by Oracle

    Explanation
    The term "CORRUPT" is the status that is set if the source is not accepted by Oracle. This implies that if the source data is found to be unreliable, invalid, or tampered with, it is considered corrupt and will not be accepted by Oracle.

    Rate this question:

  • 13. 

    _____________________ status is set if the source contains a syntax error.

    Explanation
    The given correct answer is "ERROR". This status is set if the source contains a syntax error. This means that there is a mistake or error in the way the code is written, which prevents it from being executed correctly.

    Rate this question:

  • 14. 

    ___________________ the table where basic information about the different AVALOQ Source Types is stored.

    Explanation
    The given answer "CODE_SRC_TYPE" is the correct answer because it refers to the table where basic information about the different AVALOQ Source Types is stored. This table likely contains codes or identifiers for each source type, allowing for easy reference and organization of the different types of AVALOQ sources.

    Rate this question:

  • 15. 

    _________________ is where data is stored, which are part of a database.

    Explanation
    A table is where data is stored in a database. It is a structured collection of related data organized in rows and columns. Each row represents a record, and each column represents a field or attribute of that record. Tables are used to store and organize data in a way that allows for efficient retrieval and manipulation of information. They are an essential component of a database system and are used to store and manage large amounts of data.

    Rate this question:

  • 16. 

    What is the naming convention for tables which contain a predefined "list of data"?

    Explanation
    The naming convention for tables which contain a predefined "list of data" is to prefix the table name with "CODE_". This prefix helps to identify that the table contains a specific list of data, which may be used for reference or as a lookup table in the database system.

    Rate this question:

  • 17. 

    What is the basic syntax to call an API?

    Explanation
    The basic syntax to call an API is to use the API name followed by a dot, then the function name, and finally the parameter list enclosed in parentheses. This syntax allows the programmer to specify which API and function they want to call, and pass any necessary parameters to the function. By repeating this syntax with different API names and functions, multiple APIs can be called in a program.

    Rate this question:

  • 18. 

    What API stands for?

    Explanation
    An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with each other. It defines the methods and data formats that can be used for this communication, enabling developers to access certain functionalities or services provided by another software or platform. APIs are essential for creating software integrations, building applications that rely on external services, and enabling interoperability between different systems.

    Rate this question:

  • 19. 

    ____________________ is a script which contain elements of PL/SQL and SQL and is stored in AVALOQ ICE

    Explanation
    BTC, Business Type Config is a script that contains elements of PL/SQL and SQL. This script is stored in AVALOQ ICE, which is a platform used for managing and executing scripts related to business configurations. The BTC script is specifically used for configuring and customizing business types in the AVALOQ system.

    Rate this question:

  • 20. 

    What does OMD stand for?

    Explanation
    OMD stands for Object Modelling Definition. This term refers to the process of creating a model or representation of an object or system using object-oriented techniques. Object modelling involves identifying the objects in a system, defining their attributes and behaviors, and specifying how they interact with each other. This approach helps in understanding and designing complex systems by breaking them down into smaller, manageable components.

    Rate this question:

  • 21. 

    _______________ contains a user's preferred settings, indexes and temporary files (local history)

    Explanation
    A workspace contains a user's preferred settings, indexes, and temporary files (local history). This is where a user can customize their environment according to their preferences, such as the layout, theme, and keybindings. It also includes indexes that help with faster searching and navigation within the workspace. Additionally, temporary files and local history are stored within the workspace, allowing users to easily access and revert back to previous versions of their work if needed.

    Rate this question:

  • 22. 

    ______________________ consists of the Kernel Data, Customisation Sources and Business Data.

    Explanation
    An ABS Instance consists of the Kernel Data, Customisation Sources, and Business Data. This means that an ABS Instance includes the core data of the system (Kernel Data), any customizations made to the system (Customisation Sources), and the specific data related to the business using the system (Business Data). This combination of components makes up the ABS Instance, which is necessary for the proper functioning and customization of the system.

    Rate this question:

  • 23. 

    _____________________________ is the tool use for developing and storing the customisation source code and creation of installable units for an ABS Instance.

    Explanation
    AVALOQ ICE and ICE are the tools used for developing and storing the customization source code and creating installable units for an ABS Instance. These tools provide a platform for developers to write and manage code, as well as package it into installable units that can be easily deployed in the ABS Instance.

    Rate this question:

  • 24. 

    How do you modify a source with AVALOQ ICE? Answer with dash e.g. "3-2-1" 1. Check out the source into the and then modify it. 2. Create a task and a change. 3. Save the source.

    Explanation
    The correct answer sequence suggests that the first step is to create a task and a change. This implies that before modifying the source, it is necessary to create a task and a change to track the modifications. After that, the source can be checked out into the system and then modified. Finally, the modified source should be saved.

    Rate this question:

  • 25. 

    Can the OMD sheet be compiled or installed?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    False. There are no AVALOQ compilers for BIN type sources.

    Rate this question:

  • 26. 

    In order to customise an ABS instance using an OMD sheet and Avaloq ice, the actions listed below need to be performed. Answer with dash e.g. "3-2-1"
    1. Check out the OMD sheet into a change.
    2. Install the change.
    3. Modify the OMD sheet.
    4. Generate the script
    5. Create a BTC source and copy the OMD script into it.
    6. Create a task and change.

    Correct Answer
    6-1-3-4-5-2
    Explanation
    To customize an ABS instance using an OMD sheet and Avaloq ice, the following actions need to be performed in the given order:

    6. Create a task and change.
    1. Check out the OMD sheet into a change.
    3. Modify the OMD sheet.
    4. Generate the script.
    5. Create a BTC source and copy the OMD script into it.
    2. Install the change.

    This sequence ensures that the necessary modifications are made to the OMD sheet, the script is generated, and the changes are installed in the ABS instance.

    Rate this question:

  • 27. 

    Questions, Bugs, Change Requests and Functional Requests are _____________

    Correct Answer
    Issues
    Explanation
    This question is asking for a word that can fill in the blank to complete the sentence. The correct answer is "Issues" because it is the word that makes the most sense in the context of the sentence. Questions, bugs, change requests, and functional requests can all be considered issues that need to be addressed or resolved.

    Rate this question:

  • 28. 

    In which field do you define, if a classification is mandatory or not?

    Correct Answer
    MAND
    Explanation
    The answer "MAND" refers to the field in which you define whether a classification is mandatory or not. This field allows you to specify whether a classification must be assigned or if it is optional.

    Rate this question:

  • 29. 

    The system checks the rule with the _________________ first, until one rule matches.

    Correct Answer
    highest priority
    Explanation
    The system checks the rule with the highest priority first, until one rule matches. This means that rules are organized in a hierarchical order based on their importance or urgency. By checking the rule with the highest priority first, the system ensures that the most critical rules are applied first, potentially avoiding conflicts or errors.

    Rate this question:

  • 30. 

    ________________________ allow you to apply more than one rule out of a rule set for the same input.

    Correct Answer
    Sequence Number
    SEQNR
    seqnr
    Explanation
    The given answer options "Sequence Number, SEQNR, seqnr" are examples of case-insensitive matching in programming or data processing. When applying rules or conditions to a specific input, case-insensitive matching allows for the consideration of multiple variations of the same input, regardless of the case. In this case, "Sequence Number," "SEQNR," and "seqnr" all refer to the same concept or variable, and by using case-insensitive matching, any of these options can be used interchangeably.

    Rate this question:

  • 31. 

    Put the following steps in the right sequence: (Answer by entering the sequence separated by dash without spaces                                                                                     e.g. 2-1-3-4) 1. Evaluation of COST_RULE (by the Cost Engine) 2. Bookings are done (by the Book Engine 3. Verify (workflow action selected by the user) 4. Cost Rule loading (done with a task)  

    Correct Answer
    4-2-1-3
    Explanation
    The correct sequence of steps is as follows: First, the Cost Rule loading is done with a task (Step 4). Then, the Bookings are done by the Book Engine (Step 2). Next, the Evaluation of COST_RULE is performed by the Cost Engine (Step 1). Finally, the user selects the Verify workflow action (Step 3).

    Rate this question:

  • 32. 

    Also called event packets

    Correct Answer
    Bookings
  • 33. 

    _______________________ are booking dimensions.

    Correct Answer
    PKO
    PKOs
    Position Keeping Occurence
    Position Keeping Occurences
    Explanation
    PKO and PKOs are abbreviations for Position Keeping Occurrence and Position Keeping Occurrences respectively. These terms refer to the dimensions or factors that are considered when making a booking. In the context of the question, PKO and PKOs are booking dimensions that are relevant for the booking process.

    Rate this question:

  • 34. 

    ________________________ table defines the different kinds of bookings for a bank.

    Correct Answer
    CODE_BOOK_KIND
    Explanation
    The given correct answer "CODE_BOOK_KIND" suggests that the table mentioned in the question is named "CODE_BOOK_KIND" and it defines the different kinds of bookings for a bank. This table likely contains information about the various types of bookings that can be made in the bank, such as savings account bookings, loan bookings, investment bookings, etc. The table probably includes columns that provide details about each type of booking, such as the booking code, description, and any other relevant information.

    Rate this question:

  • 35. 

    How can you create a balance structure?

    Correct Answer
    balstru#.put
  • 36. 

    What do you need to do to load a chart of accounts?

    Correct Answer
    Balance Account Loading
    Explanation
    To load a chart of accounts, you need to perform balance account loading. This involves inputting the account balances into the system, which allows for accurate financial reporting and analysis. By loading the balance accounts, you ensure that the chart of accounts reflects the current financial position of the organization. This process is crucial for maintaining accurate records and making informed financial decisions.

    Rate this question:

  • 37. 

    You need ___________________ to protect objects, workflows and other subjects in AVALOQ.

    Correct Answer
    Access Codes
    Explanation
    Access codes are required to protect objects, workflows, and other subjects in AVALOQ. These codes act as a security measure to ensure that only authorized individuals have access to these resources. By implementing access codes, AVALOQ can control and restrict access to sensitive information, preventing unauthorized users from modifying or accessing it. This helps to maintain the confidentiality, integrity, and availability of the protected subjects within the AVALOQ system.

    Rate this question:

  • 38. 

    When you restrict access where necessary its a ____________________.

    Correct Answer
    Open Security
    Explanation
    When you restrict access where necessary, it is called "Open Security." This means that although there are restrictions in place to protect certain areas or information, overall there is a culture of openness and transparency when it comes to security. This approach allows for a balance between protecting sensitive data and allowing appropriate access for authorized individuals. It promotes trust and collaboration while still maintaining necessary security measures.

    Rate this question:

  • 39. 

    Is it possible to protect single fields within a form with AVALOQ Security?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    False. It is not. Full access allowed if the access code fits.

    Rate this question:

  • 40. 

    What is API?

    Correct Answer
    Application Programming Interface
    Explanation
    An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with each other. It defines the methods and functions that can be used to access and manipulate data or perform specific tasks within a software system. APIs are commonly used in web development to enable integration between different applications or services, allowing them to share and exchange information seamlessly. They provide a standardized way for developers to interact with software components and access their functionality, making it easier to build and maintain complex software systems.

    Rate this question:

  • 41. 

    It is better to use an API instead of a direct table parameterisation to prevent _____________________.

    Correct Answer
    Data Inconsistencies
    Data Inconsistency
    Explanation
    Using an API instead of direct table parameterization helps prevent data inconsistencies. When directly parameterizing tables, there is a risk of data inconsistencies occurring due to various factors such as concurrent access, data corruption, or human error. APIs provide a more controlled and standardized way of accessing and manipulating data, reducing the chances of inconsistencies. By utilizing APIs, developers can enforce data validation, implement transactional operations, and ensure proper data handling, resulting in a more reliable and consistent data environment.

    Rate this question:

  • 42. 

    Which interface do you need to add an access code to a user?

    Correct Answer
    USER_ADMIN_INTF#.USER#ADD_ACCESS
    Explanation
    To add an access code to a user, you need to use the USER_ADMIN_INTF interface. Within this interface, the USER#ADD_ACCESS method is used to add the access code to the user.

    Rate this question:

  • 43. 

    List three features of AVALOQ Script. (Answers should be separated by comma   e.g. Asset, BP, Container)

    Correct Answer
    Block Structure,Modularity,Separate Compilation
    Block Structure Modularity Separate Compilation
    Block Structure, Modularity, Separate Compilation
    Explanation
    The correct answer is "Block Structure, Modularity, Separate Compilation". These three features are characteristics of AVALOQ Script. Block Structure refers to the organization of the script into blocks, making it easier to read and understand. Modularity means that the script can be divided into separate modules or sections, allowing for better organization and reusability. Separate Compilation allows individual modules or sections of the script to be compiled independently, making it more efficient and flexible.

    Rate this question:

  • 44. 

    3 Main Data Dictionary Sections in the Memory Layer

    • Parameter List

    • Task

    • Constructor

    • Template

    • Methods

    • Fields

    • Fieldlist

    Correct Answer(s)
    A. Constructor
    A. Methods
    A. Fields
    Explanation
    The correct answer is Constructor, Methods, Fields. In the memory layer of a data dictionary, there are three main sections: constructor, methods, and fields.

    The constructor section is responsible for creating and initializing objects of a class. It sets the initial values of the object's attributes and prepares it for use.

    The methods section contains the functions or procedures that define the behavior of the object. These methods can perform various operations on the object's data and can be called by other parts of the program.

    The fields section stores the attributes or variables associated with the object. These fields hold the data that the object needs to perform its functions.

    Together, these three sections form the backbone of the data dictionary in the memory layer.

    Rate this question:

  • 45. 

    Which AVALOQ Script Language construct do you use when working with list fields?

    Correct Answer(s)
    Loops
    Loop
    Explanation
    When working with list fields in AVALOQ Script Language, you use the "Loops" construct. This allows you to iterate over the elements of a list and perform operations on each element. The "Loop" construct is not a valid construct in AVALOQ Script Language for working with list fields.

    Rate this question:

  • 46. 

    What triggers an order validation?

    Correct Answer(s)
    Workflow Action
    Explanation
    An order validation is triggered by a Workflow Action. This means that when a specific action is performed within a workflow, such as submitting an order or making changes to an existing order, the system will validate the order to ensure that all necessary requirements are met and that the order can proceed to the next stage of the workflow. This validation process helps to maintain accuracy and consistency in the order management process.

    Rate this question:

  • 47. 

    Which source is use to define the network type (field format, XML or internal)?

    Correct Answer(s)
    Network Structure
    Network Structure Source
    Explanation
    The correct answer is Network Structure and Network Structure Source. These sources are used to define the network type, including the field format, XML, and internal aspects. The Network Structure provides the overall structure and organization of the network, while the Network Structure Source specifies the specific source or location where this information is defined. Together, they ensure that the network type is properly defined and can be accessed and understood by relevant systems and processes.

    Rate this question:

  • 48. 

    The following extract of a network structure source is provided: character set n = "4"                         a = "D"                         d = "e"                         s = "N"                         t = "8" field format   tag 3!n ":" 1!a ":" 2t

    Correct Answer(s)
    444:D:88
    444:D:8
    444:D
    Explanation
    The given answer includes three examples that follow the specified field format. The field format requires a tag of 3 numeric characters followed by a colon, then 1 alphabetic character followed by another colon, and finally 2 characters representing the time. The first example, "444:D:88," follows this format with the tag "444," the alphabetic character "D," and the time "88." The second example, "444:D:8," also follows the format but has a single-digit time of "8." The third example, "444:D," does not include the required time component and does not follow the specified field format.

    Rate this question:

  • 49. 

    Where do we find the messages that were exported via the Business Bus?

    Correct Answer(s)
    MSG_EXTL_OUT
    Explanation
    The messages that were exported via the Business Bus can be found in the MSG_EXTL_OUT.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 28, 2012
    Quiz Created by
    Alquintosjr
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.