Download IBM Datacap V9.0 Solution Designer.C2070-994.PassCertification.2019-02-26.67q.vcex

Vendor: IBM
Exam Code: C2070-994
Exam Name: IBM Datacap V9.0 Solution Designer
Date: Feb 26, 2019
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
An administrator is trying to troubleshoot a problem with actions running in a page id task through Rulerunner. 
To get more information about the execution of the actions in Rulerunner, what configuration option should be modified?
  1. Change the service log level to 5 in the page id task setup.
  2. Edit the rrprocessor.exe.config file and set RRSLogSeverity=5
  3. Set the Level of details to All in the RRS log tab in Rulerunner Manager.
  4. In Datacap Server Manager’s Logging tab, check the RRSFullLogging checkbox.
Correct answer: C
Explanation:
As Rulerunner runs each action, it writes detailed logging information to a Rulerunner Service (RRS) log file (task_rrs.log). Rulerunner also generates an RRS log file whenever you run a task from Datacap Studio. If you want to generate an RRS log file for tasks that you run from the Datacap Web Client or for Datacap Desktop tasks, complete the following steps. Start Datacap Rulerunner Manager. Click the Logging tab. Click the RRS log tab and select the logging options that you want. References: https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.develop.doc/dcadg420.htm
As Rulerunner runs each action, it writes detailed logging information to a Rulerunner Service (RRS) log file (task_rrs.log). Rulerunner also generates an RRS log file whenever you run a task from Datacap Studio. 
  1. If you want to generate an RRS log file for tasks that you run from the Datacap Web Client or for Datacap Desktop tasks, complete the following steps. 
  2. Start Datacap Rulerunner Manager. 
  3. Click the Logging tab. 
  4. Click the RRS log tab and select the logging options that you want. 
References: https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.develop.doc/dcadg420.htm
Question 2
A company has a corporate policy to install applications on a non-C: drive so they installed IBM Datacap on the E: drive on all machines. Rulerunner is configured to process PageId, Profiler and Export steps. While testing the OOTB TravelDocs application, the VScan step in DcDesktop creates batches successfully.
Rulerunner picks up the job from PageId step, processes it to the Profiler step, which also processes it. However, instead of ending up on the Verify task when tested on the C: drive, the batches all end up in FixUp with pages set to Other when tested on the E: drive (see following screenshots for examples).
  
  
Which log file would show the following clue as to why and what needs to be done to resolve the issue so that the batches do not end up in Fixup? 
  
  1. profiler_rrs.log – travelDocs.app needs to be updated to with the fingerprint path
  2. pageid_rrs.log – fingerprint database needs to be updated with the path to the fingerprints
  3. vscan_rrs.log – user requires read+write access to the batches folder and fingerprints folder
  4. fixup_rrs.log – user requires read_write access to the batches folder and travelDocs.app needs to be updated with the fingerprint path
Correct answer: B
Explanation:
The X_rrs.log, where X is the name of the task. The file is in the batch folder of the application (for example, C:\datacap\TravelDocs\batches\20130924.00001\pageid_rrs.log), and contains information about actions that are completed by the Rulerunner engine.Something that is fairly common,  look in your fingerprint database to the Template table.  In there, for the .tif and .cco file of every fingerprint there is a path stored there.  You may need to do a search and replace to make sure the path is correct and pointed to your shared fingerprint directory.   References: https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.admin.doc/dclog002.htm
The X_rrs.log, where X is the name of the task. The file is in the batch folder of the application (for example, C:\datacap\TravelDocs\batches\20130924.00001\pageid_rrs.log), and contains information about actions that are completed by the Rulerunner engine.
Something that is fairly common,  look in your fingerprint database to the Template table.  In there, for the .tif and .cco file of every fingerprint there is a path stored there.  You may need to do a search and replace to make sure the path is correct and pointed to your shared fingerprint directory.   
References: https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.admin.doc/dclog002.htm
Question 3
A developer has created a new custom action using the IBM Datacap V9.0 and V9.0.1 custom action DDk. 
Which of the following is required to install and use the custom action in datacap?
  1. Put the DDL in the RRS folder.
  2. Copy the DLL anywhere on the system and register it with RegAsm.
  3. Put both the RRX file and DLL in the RRS folder and register the DLL.
  4. Out the RRX file in the RRS folder and the DLL in the dcshared\Net folder.
Correct answer: A
Explanation:
Only the built DLL file is placed in the IBM Datacap installation directories. Do not place the RRX file in the Datacap installation directories; the RRX file is already imbedded within the DLL. Procedure To deploy custom actions:Choose one of the following routes: To make the custom actions visible to a single application, place the DLL in the RULES directory of that application. For example, if you take this route, instead of placing the DLL in Datacap\dcshared\NET folder, you must place dcsmart.dll and irrx.dll into the Rules folder as well.  To make the custom actions visible to all applications, place the DLL in the RRS directory. The default location is C:\RRS. Do not register the DLL. References: https://developer.ibm.com/answers/questions/364945/how-to-deploy-custom-actions/
Only the built DLL file is placed in the IBM Datacap installation directories. Do not place the RRX file in the Datacap installation directories; the RRX file is already imbedded within the DLL. 
Procedure 
To deploy custom actions:
  1. Choose one of the following routes: 
    To make the custom actions visible to a single application, place the DLL in the RULES directory of that application. For example, if you take this route, instead of placing the DLL in Datacap\dcshared\NET folder, you must place dcsmart.dll and irrx.dll into the Rules folder as well.  
    To make the custom actions visible to all applications, place the DLL in the RRS directory. The default location is C:\RRS. 
  2. Do not register the DLL. 
References: https://developer.ibm.com/answers/questions/364945/how-to-deploy-custom-actions/
Question 4
A developer has created a new task in Datacap Studio’s Task Profiles. The system uses ADSI for authentication. The task name is CreateFlatFile. The developer creates a new task in the App Managers Rulerunner tab by clicking “add new”. The first entry is createFlatFile and the second entry is CreateFlatfile. The developer then goes to TMweb to make sure the group and station can run the new task. 
While testing, the developer cannot get the new profile to execute. 
What did the developer incorrectly configure?
  1. The user needs right to the new task.
  2. The case is not correct for tasks name.
  3. No Shortcut was created for the new task.
  4. A shortcut and user rights to the task are needed.
Correct answer: B
Explanation:
You click Add new Task to add a profile that Rulerunner is to process. Profile names are case-sensitive. References: https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.install.doc/dchkl000.htm
You click Add new Task to add a profile that Rulerunner is to process. Profile names are case-sensitive. 
References: https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.install.doc/dchkl000.htm
Question 5
An administrator added an additional IBM Datacap server for load balancing. The solution designer has been asked to reconfigure the sample TravelDocs application to test the new load balanced configuration. 
What two configuration files must be updated with the new location of the application?
  1. Rulerunner.xml and datacap.xml
  2. Datacap.xml and TravelDocs.app
  3. Datacap.xml and TravelDocsAdm.mdb
  4. TraveIDocsEng.mdb and travelDocsAdm.mdb
Correct answer: B
Explanation:
The application configuration file, or .app file, stores the paths, connection strings, and other settings of the application. The application entry in the datacap.xml file, such as TravelDocs, must point to the correct location for TravelDocs.app. References:https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.develop.doc/dcadg605.htmhttps://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.install.doc/dcain114.htm
The application configuration file, or .app file, stores the paths, connection strings, and other settings of the application. 
The application entry in the datacap.xml file, such as TravelDocs, must point to the correct location for TravelDocs.app. 
References:
https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.develop.doc/dcadg605.htm
https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.install.doc/dcain114.htm
Question 6
A company is going to test authentication by both using passwords and not using passwords for their IBM Datacap application.  
Which two authentication system can optionally be configured to either require passwords or not require passwords?
  1. TMA
  2. LDAP
  3. ADSI
  4. ADLDS
  5. LLLDAP
Correct answer: BC
Explanation:
For ADSI authentication,  select one of the following strings to enter based on whether you require password entry:WinNT://<%domain%>/<%user%>WinNT://<%domain%>/<%user%>?password:enabledFor LDAP authentication, select one of the following strings to enter based on whether you require password entry:LDAP://<%domain%>.comLDAP://<%domain%>.com?password:enabledNote: You can configure Datacap to use Datacap authentication or to use one of the external authentication methods.The following five authentication systems are supported:Datacap authentication (referred to as TMA) Lightweight Directory Access Protocol (referred to as LDAP) Windows Active Directory (referred to as ADSI) Windows Active Directory Lightweight Directory Services (referred to as ADLDS) Low-Level Lightweight Directory Access Protocol (referred to as LLLDAP) References: https://www.ibm.com/support/knowledgecenter/SSZRWV_9.0.0/com.ibm.dc.install.doc/dcain427.htm
For ADSI authentication,  select one of the following strings to enter based on whether you require password entry:
WinNT://<%domain%>/<%user%>
WinNT://<%domain%>/<%user%>?password:enabled
For LDAP authentication, select one of the following strings to enter based on whether you require password entry:
LDAP://<%domain%>.com
LDAP://<%domain%>.com?password:enabled
Note: You can configure Datacap to use Datacap authentication or to use one of the external authentication methods.
The following five authentication systems are supported:
  • Datacap authentication (referred to as TMA) 
  • Lightweight Directory Access Protocol (referred to as LDAP) 
  • Windows Active Directory (referred to as ADSI) 
  • Windows Active Directory Lightweight Directory Services (referred to as ADLDS) 
  • Low-Level Lightweight Directory Access Protocol (referred to as LLLDAP) 
References: https://www.ibm.com/support/knowledgecenter/SSZRWV_9.0.0/com.ibm.dc.install.doc/dcain427.htm
Question 7
An account payable department needs to collect and gather information from the receipts of its employees as part of their expense reporting process. Although many of the receipts follow specific patterns there are some images, such as handwritten receipts, that do not lend themselves to having their information gathered by automation and require a human to analyze the image for the data to be extracted. 
Which of the following methods would be best suited for this type of data extraction?
  1. Zonal
  2. Click N Key
  3. Locating by keyword
  4. Locate with regular expressions
Correct answer: B
Explanation:
Click N Key is the fourth and final method of extracting data from a form is for the data entry operator to click the form. Data at that location is then extracted and placed into the active field. This is the least preferred approach because it is the most expensive (it requires a human to do the clicking), although it is reliable. Note: There are four ways of extracting data from an image. They are ranked in order of preferable practice: Zonal, Locate with regular expressions, Locating by keyword, Click N KeyReferences: IBM Redbooks, Implementing Document Imaging and Capture Solutions with IBM Datacap, Second Edition (October 2015), page 125
Click N Key is the fourth and final method of extracting data from a form is for the data entry operator to click the form. Data at that location is then extracted and placed into the active field. This is the least preferred approach because it is the most expensive (it requires a human to do the clicking), although it is reliable. 
Note: There are four ways of extracting data from an image. They are ranked in order of preferable practice: Zonal, Locate with regular expressions, Locating by keyword, Click N Key
References: IBM Redbooks, Implementing Document Imaging and Capture Solutions with IBM Datacap, Second Edition (October 2015), page 125
Question 8
A developer needs to insert the date and time into the current field separated by a space. 
Which of the following is the correct Smart Parameter string to accomplish this task?
  1. rrset(“@DATE+@CHR(\s)+@TIME,”@F”)
  2. rrset(“@DATE+@STRING(\s)+@TIME,”@F”)
  3. rrset(“@DATE+@CHR()+@TIME(HH:MM:SS),”@F”)
  4. rrset(“@DATE+@STRING()+@TIME(HH:MM:SS),”@F”)
Correct answer: B
Explanation:
@STRING( string value) Returns a string of the argument passed. Incorrect ANswers:A, C: @CHR(ASCII value) returns a character that is a member of the ASCII character set.References: https://www-01.ibm.com/support/docview.wss?uid=swg21498904
@STRING( string value) Returns a string of the argument passed. 
Incorrect ANswers:
A, C: @CHR(ASCII value) returns a character that is a member of the ASCII character set.
References: https://www-01.ibm.com/support/docview.wss?uid=swg21498904
Question 9
Within IBM Datacap there is a file that contains a list of the available report types that are displayed in report Viewer. 
When a new report type is created, what is the name and default location of the file that the new report type must be added to?
  1. C:\Datacap\RV2\reports.ini
  2. C:\Datacap\RV2\reports.xml
  3. C:\Datacap\ReportViewer\reports.ini
  4. C:\Datacap\ReportViewer\reports.dco
Correct answer: B
Explanation:
The C:\Datacap\RV2\reports.xml file contains a list of the available report types that are displayed in Report Viewer. When you create a new report type, you must add the report type to this file.References: https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.customrv2.doc/dcapi037.htm
The C:\Datacap\RV2\reports.xml file contains a list of the available report types that are displayed in Report Viewer. When you create a new report type, you must add the report type to this file.
References: https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.customrv2.doc/dcapi037.htm
Question 10
An accounts payable department needs to collect and gather information from the receipts of its employees as part of their expense reporting process. They have chosen IBM Datacap as the tool they want to use to automate large portions of this process. 
What method would be best suited to gather data from images where the name of the data label might change from image to image but still able to be defined as a list?
  1. Zonal
  2. Click N Key
  3. Fingerprinting
  4. locating by keyword
Correct answer: D
Explanation:
Keywords are labels that accompany the data you want to find on the form. Locating by keyword ranks third behind the zonal and regular expression methods in terms of reliability because you have to know what the keyword is and recognize the keyword correctly. You also have to anticipate the location of the actual data, relative to the position of the keyword, for extraction. Keyword extraction is made easier by using keyword lists, which are text files that contain many different keywords that might be used as labels around the data you want to extract. For instance, a keyword list could contain Total, Total Due, Pay this amount, and similar words or phrases that occur in close proximity to the actual data. Note: There are four ways of extracting data from an image. They are ranked in order of preferable practice: Zonal, Locate with regular expressions, Locating by keyword, Click N KeyReferences: IBM Redbooks, Implementing Document Imaging and Capture Solutions with IBM Datacap, Second Edition (October 2015), page 125
Keywords are labels that accompany the data you want to find on the form. 
Locating by keyword ranks third behind the zonal and regular expression methods in terms of reliability because you have to know what the keyword is and recognize the keyword correctly. 
You also have to anticipate the location of the actual data, relative to the position of the keyword, for extraction. 
Keyword extraction is made easier by using keyword lists, which are text files that contain many different keywords that might be used as labels around the data you want to extract. For instance, a keyword list could contain Total, Total Due, Pay this amount, and similar words or phrases that occur in close proximity to the actual data. 
Note: There are four ways of extracting data from an image. They are ranked in order of preferable practice: Zonal, Locate with regular expressions, Locating by keyword, Click N Key
References: IBM Redbooks, Implementing Document Imaging and Capture Solutions with IBM Datacap, Second Edition (October 2015), page 125
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!