2.
A kind of order that creates or modifies objects is __________________
Explanation
Static Data Order refers to a type of order that is responsible for creating or modifying objects. This order is typically used in programming to define the sequence in which objects are instantiated or modified. It ensures that objects are created or modified in a specific and consistent manner, allowing for proper execution of the program.
3.
Order that generates booking is called _________________
Explanation
The order that generates a booking is referred to as a transaction order. This term is commonly used in the context of online bookings or reservations, where a customer's request for a booking is processed as a transaction. The term "transaction" implies that there is an exchange of goods or services involved, and in this case, it is the booking itself. The terms "transaction" and "transactional order" can also be used interchangeably to describe this process.
4.
________________ are symbolic references to objects.
Explanation
Keys are symbolic references to objects. They are used to identify and access specific objects within a collection or data structure. Keys provide a way to uniquely identify and retrieve values associated with them. In many programming languages, keys are commonly used in data structures like dictionaries, maps, and hash tables to organize and retrieve data efficiently.
5.
____________ provides business data fields not available in the standard entry forms.
Explanation
The word "Additions" in the plural form suggests that there are multiple business data fields that are not available in the standard entry forms. Similarly, the singular form "Addition" implies that there is at least one business data field that is not found in the standard entry forms. Both words indicate the presence of additional or extra data fields beyond what is typically provided in the standard forms.
6.
__________________ are the ones that groups objects and use these groups for lookup, reporting etc.
Explanation
Classes/Classifications are the ones that groups objects and use these groups for lookup, reporting, etc. This means that both classes and classifications can be used to categorize and organize objects in a way that allows for easier retrieval and analysis. Whether the term "classes" or "classifications" is used first does not change the meaning of the statement, as they both refer to the same concept of grouping objects.
7.
The currency is defined through the _______________________
Explanation
The currency is defined through the contract of the Money Account. This contract specifies the terms and conditions for the use and exchange of the currency. It outlines the rights and obligations of the parties involved in the transaction, including the issuer of the currency and the account holder. By entering into this contract, individuals and institutions agree to abide by the rules and regulations set forth by the Money Account, which ultimately defines the currency and its value.
8.
____________________ are exclusively for order and serves as additional information for an order.
Explanation
Post-It and Post it are both correct answers because they refer to the same thing, which are small pieces of paper with adhesive on one side that are used for writing notes or reminders. They are exclusively for order and serve as additional information for an order, allowing individuals to add specific instructions or details to their orders.
9.
___________ is the character you need to type to enter the last value date of a month into a date field?
Explanation
In this case, the letter "u" is the character that needs to be typed to enter the last value date of a month into a date field. This is likely because "u" is the last letter of the word "month" and is used as a shortcut to represent the end of the month when entering dates.
10.
______________ is a drop-down list of predefined values.
Explanation
A code table is a drop-down list of predefined values. It allows users to select from a set of predetermined options, rather than having to manually enter the values. This can help to ensure consistency and accuracy in data entry, as well as making it easier for users to input the desired information. Code tables are commonly used in various applications and databases to provide a standardized selection of choices for users.
11.
____________________ means the enhancement of functionality, usually with AVALOQ Script.
Explanation
Scripting refers to the process of writing and implementing scripts, typically using AVALOQ Script, to enhance the functionality of a system. It involves creating customized code to automate tasks, add new features, or modify existing functionality. Scripting allows for flexibility and customization, enabling users to tailor the system to their specific needs without making extensive changes to the underlying software. It is a powerful tool that can be used to extend the capabilities of a system and improve efficiency.
12.
______________ status is set if the source is not accepted by Oracle
Explanation
The term "CORRUPT" is the status that is set if the source is not accepted by Oracle. This implies that if the source data is found to be unreliable, invalid, or tampered with, it is considered corrupt and will not be accepted by Oracle.
13.
_____________________ status is set if the source contains a syntax error.
Explanation
The given correct answer is "ERROR". This status is set if the source contains a syntax error. This means that there is a mistake or error in the way the code is written, which prevents it from being executed correctly.
14.
___________________ the table where basic information about the different AVALOQ Source Types is stored.
Explanation
The given answer "CODE_SRC_TYPE" is the correct answer because it refers to the table where basic information about the different AVALOQ Source Types is stored. This table likely contains codes or identifiers for each source type, allowing for easy reference and organization of the different types of AVALOQ sources.
15.
_________________ is where data is stored, which are part of a database.
Explanation
A table is where data is stored in a database. It is a structured collection of related data organized in rows and columns. Each row represents a record, and each column represents a field or attribute of that record. Tables are used to store and organize data in a way that allows for efficient retrieval and manipulation of information. They are an essential component of a database system and are used to store and manage large amounts of data.
16.
What is the naming convention for tables which contain a predefined "list of data"?
Explanation
The naming convention for tables which contain a predefined "list of data" is to prefix the table name with "CODE_". This prefix helps to identify that the table contains a specific list of data, which may be used for reference or as a lookup table in the database system.
17.
What is the basic syntax to call an API?
Explanation
The basic syntax to call an API is to use the API name followed by a dot, then the function name, and finally the parameter list enclosed in parentheses. This syntax allows the programmer to specify which API and function they want to call, and pass any necessary parameters to the function. By repeating this syntax with different API names and functions, multiple APIs can be called in a program.
18.
What API stands for?
Explanation
An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with each other. It defines the methods and data formats that can be used for this communication, enabling developers to access certain functionalities or services provided by another software or platform. APIs are essential for creating software integrations, building applications that rely on external services, and enabling interoperability between different systems.
19.
____________________ is a script which contain elements of PL/SQL and SQL and is stored in AVALOQ ICE
Explanation
BTC, Business Type Config is a script that contains elements of PL/SQL and SQL. This script is stored in AVALOQ ICE, which is a platform used for managing and executing scripts related to business configurations. The BTC script is specifically used for configuring and customizing business types in the AVALOQ system.
20.
What does OMD stand for?
Explanation
OMD stands for Object Modelling Definition. This term refers to the process of creating a model or representation of an object or system using object-oriented techniques. Object modelling involves identifying the objects in a system, defining their attributes and behaviors, and specifying how they interact with each other. This approach helps in understanding and designing complex systems by breaking them down into smaller, manageable components.
21.
_______________ contains a user's preferred settings, indexes and temporary files (local history)
Explanation
A workspace contains a user's preferred settings, indexes, and temporary files (local history). This is where a user can customize their environment according to their preferences, such as the layout, theme, and keybindings. It also includes indexes that help with faster searching and navigation within the workspace. Additionally, temporary files and local history are stored within the workspace, allowing users to easily access and revert back to previous versions of their work if needed.
22.
______________________ consists of the Kernel Data, Customisation Sources and Business Data.
Explanation
An ABS Instance consists of the Kernel Data, Customisation Sources, and Business Data. This means that an ABS Instance includes the core data of the system (Kernel Data), any customizations made to the system (Customisation Sources), and the specific data related to the business using the system (Business Data). This combination of components makes up the ABS Instance, which is necessary for the proper functioning and customization of the system.
23.
_____________________________ is the tool use for developing and storing the customisation source code and creation of installable units for an ABS Instance.
Explanation
AVALOQ ICE and ICE are the tools used for developing and storing the customization source code and creating installable units for an ABS Instance. These tools provide a platform for developers to write and manage code, as well as package it into installable units that can be easily deployed in the ABS Instance.
24.
How do you modify a source with AVALOQ ICE? Answer with dash e.g. "3-2-1"
1. Check out the source into the and then modify it.
2. Create a task and a change.
3. Save the source.
Explanation
The correct answer sequence suggests that the first step is to create a task and a change. This implies that before modifying the source, it is necessary to create a task and a change to track the modifications. After that, the source can be checked out into the system and then modified. Finally, the modified source should be saved.
25.
Can the OMD sheet be compiled or installed?
Explanation
False. There are no AVALOQ compilers for BIN type sources.
26.
In order to customise an ABS instance using an OMD sheet and Avaloq ice, the actions listed below need to be performed.
Answer with dash e.g. "3-2-1"
-
Check out the OMD sheet into a change.
-
Install the change.
-
Modify the OMD sheet.
-
Generate the script
-
Create a BTC source and copy the OMD script into it.
-
Create a task and change.
Correct Answer
6-1-3-4-5-2
Explanation
To customize an ABS instance using an OMD sheet and Avaloq ice, the following actions need to be performed in the given order:
6. Create a task and change.
1. Check out the OMD sheet into a change.
3. Modify the OMD sheet.
4. Generate the script.
5. Create a BTC source and copy the OMD script into it.
2. Install the change.
This sequence ensures that the necessary modifications are made to the OMD sheet, the script is generated, and the changes are installed in the ABS instance.
27.
Questions, Bugs, Change Requests and Functional Requests are _____________
Correct Answer
Issues
Explanation
This question is asking for a word that can fill in the blank to complete the sentence. The correct answer is "Issues" because it is the word that makes the most sense in the context of the sentence. Questions, bugs, change requests, and functional requests can all be considered issues that need to be addressed or resolved.
28.
In which field do you define, if a classification is mandatory or not?
Correct Answer
MAND
Explanation
The answer "MAND" refers to the field in which you define whether a classification is mandatory or not. This field allows you to specify whether a classification must be assigned or if it is optional.
29.
The system checks the rule with the _________________ first, until one rule matches.
Correct Answer
highest priority
Explanation
The system checks the rule with the highest priority first, until one rule matches. This means that rules are organized in a hierarchical order based on their importance or urgency. By checking the rule with the highest priority first, the system ensures that the most critical rules are applied first, potentially avoiding conflicts or errors.
30.
________________________ allow you to apply more than one rule out of a rule set for the same input.
Correct Answer
Sequence Number
SEQNR
seqnr
Explanation
The given answer options "Sequence Number, SEQNR, seqnr" are examples of case-insensitive matching in programming or data processing. When applying rules or conditions to a specific input, case-insensitive matching allows for the consideration of multiple variations of the same input, regardless of the case. In this case, "Sequence Number," "SEQNR," and "seqnr" all refer to the same concept or variable, and by using case-insensitive matching, any of these options can be used interchangeably.
31.
Put the following steps in the right sequence: (Answer by entering the sequence separated by dash without spaces
e.g. 2-1-3-4)
1. Evaluation of COST_RULE (by the Cost Engine)
2. Bookings are done (by the Book Engine
3. Verify (workflow action selected by the user)
4. Cost Rule loading (done with a task)
Correct Answer
4-2-1-3
Explanation
The correct sequence of steps is as follows: First, the Cost Rule loading is done with a task (Step 4). Then, the Bookings are done by the Book Engine (Step 2). Next, the Evaluation of COST_RULE is performed by the Cost Engine (Step 1). Finally, the user selects the Verify workflow action (Step 3).
32.
Also called event packets
Correct Answer
Bookings
33.
_______________________ are booking dimensions.
Correct Answer
PKO
PKOs
Position Keeping Occurence
Position Keeping Occurences
Explanation
PKO and PKOs are abbreviations for Position Keeping Occurrence and Position Keeping Occurrences respectively. These terms refer to the dimensions or factors that are considered when making a booking. In the context of the question, PKO and PKOs are booking dimensions that are relevant for the booking process.
34.
________________________ table defines the different kinds of bookings for a bank.
Correct Answer
CODE_BOOK_KIND
Explanation
The given correct answer "CODE_BOOK_KIND" suggests that the table mentioned in the question is named "CODE_BOOK_KIND" and it defines the different kinds of bookings for a bank. This table likely contains information about the various types of bookings that can be made in the bank, such as savings account bookings, loan bookings, investment bookings, etc. The table probably includes columns that provide details about each type of booking, such as the booking code, description, and any other relevant information.
35.
How can you create a balance structure?
Correct Answer
balstru#.put
36.
What do you need to do to load a chart of accounts?
Correct Answer
Balance Account Loading
Explanation
To load a chart of accounts, you need to perform balance account loading. This involves inputting the account balances into the system, which allows for accurate financial reporting and analysis. By loading the balance accounts, you ensure that the chart of accounts reflects the current financial position of the organization. This process is crucial for maintaining accurate records and making informed financial decisions.
37.
You need ___________________ to protect objects, workflows and other subjects in AVALOQ.
Correct Answer
Access Codes
Explanation
Access codes are required to protect objects, workflows, and other subjects in AVALOQ. These codes act as a security measure to ensure that only authorized individuals have access to these resources. By implementing access codes, AVALOQ can control and restrict access to sensitive information, preventing unauthorized users from modifying or accessing it. This helps to maintain the confidentiality, integrity, and availability of the protected subjects within the AVALOQ system.
38.
When you restrict access where necessary its a ____________________.
Correct Answer
Open Security
Explanation
When you restrict access where necessary, it is called "Open Security." This means that although there are restrictions in place to protect certain areas or information, overall there is a culture of openness and transparency when it comes to security. This approach allows for a balance between protecting sensitive data and allowing appropriate access for authorized individuals. It promotes trust and collaboration while still maintaining necessary security measures.
39.
Is it possible to protect single fields within a form with AVALOQ Security?
Explanation
False. It is not. Full access allowed if the access code fits.
40.
What is API?
Correct Answer
Application Programming Interface
Explanation
An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with each other. It defines the methods and functions that can be used to access and manipulate data or perform specific tasks within a software system. APIs are commonly used in web development to enable integration between different applications or services, allowing them to share and exchange information seamlessly. They provide a standardized way for developers to interact with software components and access their functionality, making it easier to build and maintain complex software systems.
41.
It is better to use an API instead of a direct table parameterisation to prevent _____________________.
Correct Answer
Data Inconsistencies
Data Inconsistency
Explanation
Using an API instead of direct table parameterization helps prevent data inconsistencies. When directly parameterizing tables, there is a risk of data inconsistencies occurring due to various factors such as concurrent access, data corruption, or human error. APIs provide a more controlled and standardized way of accessing and manipulating data, reducing the chances of inconsistencies. By utilizing APIs, developers can enforce data validation, implement transactional operations, and ensure proper data handling, resulting in a more reliable and consistent data environment.
42.
Which interface do you need to add an access code to a user?
Correct Answer
USER_ADMIN_INTF#.USER#ADD_ACCESS
Explanation
To add an access code to a user, you need to use the USER_ADMIN_INTF interface. Within this interface, the USER#ADD_ACCESS method is used to add the access code to the user.
43.
List three features of AVALOQ Script. (Answers should be separated by comma e.g. Asset, BP, Container)
Correct Answer
Block Structure,Modularity,Separate Compilation
Block Structure Modularity Separate Compilation
Block Structure, Modularity, Separate Compilation
Explanation
The correct answer is "Block Structure, Modularity, Separate Compilation". These three features are characteristics of AVALOQ Script. Block Structure refers to the organization of the script into blocks, making it easier to read and understand. Modularity means that the script can be divided into separate modules or sections, allowing for better organization and reusability. Separate Compilation allows individual modules or sections of the script to be compiled independently, making it more efficient and flexible.
44.
3 Main Data Dictionary Sections in the Memory Layer
Correct Answer(s)
A. Constructor
A. Methods
A. Fields
Explanation
The correct answer is Constructor, Methods, Fields. In the memory layer of a data dictionary, there are three main sections: constructor, methods, and fields.
The constructor section is responsible for creating and initializing objects of a class. It sets the initial values of the object's attributes and prepares it for use.
The methods section contains the functions or procedures that define the behavior of the object. These methods can perform various operations on the object's data and can be called by other parts of the program.
The fields section stores the attributes or variables associated with the object. These fields hold the data that the object needs to perform its functions.
Together, these three sections form the backbone of the data dictionary in the memory layer.
45.
Which AVALOQ Script Language construct do you use when working with list fields?
Correct Answer(s)
Loops
Loop
Explanation
When working with list fields in AVALOQ Script Language, you use the "Loops" construct. This allows you to iterate over the elements of a list and perform operations on each element. The "Loop" construct is not a valid construct in AVALOQ Script Language for working with list fields.
46.
What triggers an order validation?
Correct Answer(s)
Workflow Action
Explanation
An order validation is triggered by a Workflow Action. This means that when a specific action is performed within a workflow, such as submitting an order or making changes to an existing order, the system will validate the order to ensure that all necessary requirements are met and that the order can proceed to the next stage of the workflow. This validation process helps to maintain accuracy and consistency in the order management process.
47.
Which source is use to define the network type (field format, XML or internal)?
Correct Answer(s)
Network Structure
Network Structure Source
Explanation
The correct answer is Network Structure and Network Structure Source. These sources are used to define the network type, including the field format, XML, and internal aspects. The Network Structure provides the overall structure and organization of the network, while the Network Structure Source specifies the specific source or location where this information is defined. Together, they ensure that the network type is properly defined and can be accessed and understood by relevant systems and processes.
48.
The following extract of a network structure source is provided:
character set n = "4"
a = "D"
d = "e"
s = "N"
t = "8"
field format tag 3!n ":" 1!a ":" 2t
Correct Answer(s)
444:D:88
444:D:8
444:D
Explanation
The given answer includes three examples that follow the specified field format. The field format requires a tag of 3 numeric characters followed by a colon, then 1 alphabetic character followed by another colon, and finally 2 characters representing the time. The first example, "444:D:88," follows this format with the tag "444," the alphabetic character "D," and the time "88." The second example, "444:D:8," also follows the format but has a single-digit time of "8." The third example, "444:D," does not include the required time component and does not follow the specified field format.
49.
Where do we find the messages that were exported via the Business Bus?
Correct Answer(s)
MSG_EXTL_OUT
Explanation
The messages that were exported via the Business Bus can be found in the MSG_EXTL_OUT.