Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following statements regarding Blue Prism Login Agent are true? (Select all that apply.)

A.

Windows passwords can be changed using Login Agent Functionality

B.

It is possible to use a SAS (Secure Attention Sequence) service with Login Agent to traverse the ‘Press CTRL + ALT + DELETE to log on’ screen

C.

Blue Prism Login Agent can be used to lock a Resource PC

D.

You cannot configure the Blue Prism scheduler to login via Login Agent and then run a business process once it has logged in

Which of the following statements is true regarding the automation of Java applications? (Choose two.)

A.

Java Access Bridge is always required to automate applications using Java spy mode.

B.

Spy modes cannot be mixed when automating a Java application. All objects called by the process must use the same interface.

C.

Surface Automation is not compatible with Java applications.

D.

Active Accessibility spy mode can be used on Java applications

A business requirement exists to be able to distinguish between cases that have failed due to ‘not being an adult’ and cases that have failed due to ‘invalid ID’ based on the exception detail Blue Prism has captured. The following Process configuration has been built as a solution.

Which of the following statements are correct?

A.

The Process configuration will meet the requirements

B.

The Process will fail because 2 Recover stages lead to a single Resume stage

C.

The Process configuration will not meet the requirements because the Exception Detail is not captured for the two Business Exceptions

D.

If the Valid ID stage results in a ‘No’ answer, the Process will not throw an exception.

The following screen displays order details in a client’s order system application. An order is entered into the Order number field and the details for that order are displayed. There is a requirement to read the Product code value from the resulting display. The Product code will vary between orders.

The Product Code label has been successfully spied and the following attributes have been returned:

The Product Code value field has been spied and the following attribute set has been selected:

In order to ensure a consistent match for the Screen Text – Product Code element, which of the following statements must be considered:

1. The Dynamic value of the Y attribute for the Screen Text – Product Code element must be derived from the Y attribute of the Label –Product Code element

2. The Y attribute of the Label –Product Code element cannot be derived as it is not checked

3. The Y attribute for the Screen Text – Product Code element must be set to a Match Type of ‘Equal’

4. The Window Text attribute for the Screen Text – Product Code element must be set to a Match Type of ‘Wildcard’

5. The Window Text attribute for the Screen Text – Product Code element must be un-checked

A.

1 and 4

B.

1, 2 and 5

C.

3 and 4

D.

1 and 5

Which of the following techniques is most suitable for extracting text from a PDF Document which originated as a Microsoft Word Document and was saved as a read only PDF?

A.

Use Global Mouse Clicks and Global Send Keys to extract the PDF text to the Windows clipboard and use Blue Prism utilities or functions to extract the text from the clipboard

B.

Use the ‘Read Text with OCR’ option of a Blue Prism Read Stage on Win32 Elements

C.

Use the ‘Get Text’ option of a Blue Prism Read Stage on Regions

D.

None of these options