Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-760 Exam - Cheat-Test.com

Free HP0-760 Sample Questions:

Q: 1 If a process does a PSEM and the semaphore is not available, what happens?
A. A dispatcher interrupt occurs.
B. The monitor process is invoked.
C. The process is trapped out.
D. The process sets a PCBWAIT bit.
Answer: A

Q: 2 System globals (SGs) are primarily used to
A. contain pointers to kernel data structures
B. contain kernel data structures such as memory mapping tables
C. keep data structures for memory management and file system operations
D. allow shared memory
Answer: A

Q: 3 Which of the following is NOT a function of iTP WebServer?
A. accessing CGI pathway programs
B. accessing servlets
C. searching the Web
D. serving Web pages
Answer: C

Q: 4 A process needs to dynamically allocate, use, and deallocate buffers of different sizes. Which of the following is the most appropriate data structure?
A. pool
B. PCB entry
C. finder table
D. table
Answer: A

Q: 5 How do Enscribe file partitions link?
A. The primary partition points to all secondary partitions.
B. Secondary partitions all point to the primary partition.
C. Primary and secondary partitions all point to each other.
D. The primary partition points to the first secondary partition, which points to the next secondary partition, and so forth.
Answer: A

Q: 6 Which of the following statements is true for SQL programs?
A. SQL programs are invalidated by UPDATE STATISTICS on tables the program access.
B. SQL programs are defined in SQL user catalogs in the PROGRAMS table only.
C. SQL programs contain SQL statements that can be recompiled dynamically at execution time.
D. SQL programs cannot be compiled unless all associated tables are closed.
Answer: C

Q: 7 Which FUP ALTER command option is used to change the BROKEN flag in the file label, allowing a non-audited file to be read?
A. RESETBROKEN
B. CLEARFLAG
C. SETRECOVERY
D. CLEARBROKEN
Answer: A

Q: 8 What is the feature that distinguishes the SQL system catalog from other SQL catalogs?
A. The system catalog must be TM/MP protected, whereas other catalogs need not be.
B. The system catalog MUST reside on $SYSTEM.SQL.
C. The system catalog contains an additional table, CATALOGS.
D. The system catalog cannot contain references to user-defined tables.
Answer: C

Q: 9 Which SQLCI command lists the contents of all rows in the table TEST?
A. GET * FROM TEST;
B. RETRIEVE * FROM TEST;
C. LIST * FROM TEST;
D. SELECT * FROM TEST;
Answer: D

Q: 10 Which type of Enscribe file can contain multiple index levels?
A. relative
B. unstructured
C. entry-sequenced
D. key-sequenced
Answer: D

Q: 11 Which type of Enscribe file is an alternate-key file?
A. entry-sequenced
B. relative
C. unstructured
D. key-sequenced
Answer: D

Q: 12 Which Enscribe file type is created by the EDIT and TEDIT utilities?
A. entry-sequenced
B. relative
C. unstructured
D. key-sequenced
Answer: C

Q: 13 The purpose of an alternate-key file is to
A. provide additional file data storage capacity
B. assist the sequential access of multiple block levels
C. provide additional logical access paths to data
D. allow alternate access from the backup physical disk path
Answer: C

Q: 14 Data integrity in distributed transactions is provided by
A. file partitioning across nodes
B. nomadic disk configurations
C. cooperating NonStop TM/MP subsystems
D. RDF replication between nodes
Answer: C

Q: 15 Which operating system software upgrade step requires a cold load?
A. updating SP firmware
B. performing a BUILD and APPLY
C. running ZPHIRNM to rename files
D. switching to a new OSIMAGE
Answer: D

Q: 16 A persistent process in processor 2 is assigned the attribute: CPU FIRSTOF (2,3). Given this configuration, what will occur if processor 2 fails?
A. A persistence monitor will automatically restart the process in an available processor.
B. Its backup process will take over with no loss of data.
C. An operator will be instructed to restart this process in an alternative processor.
D. When the processor is reloaded, the process will be restarted.
Answer: A

Q: 17 A CRC character is present in each ServerNet packet. What is the meaning of the acronym CRC?
A. certified reliability check
B. circuit response code
C. cycle response character
D. cyclic redundancy check
Answer: D

Q: 18 A Tetra 8 ServerNet topology
A. incorporates 8 system enclosures
B. has all processors directly connected
C. does not allow I/O enclosures
D. can support no more than 16 processors with limited I/O
Answer: B

Q: 19 What is the benefit of running a program in a high PIN?
A. High-PIN processes run at a higher priority than low-PIN processes.
B. High-PIN processes are protected from marauding low-PIN processes.
C. Only a high-PIN process can access high-PIN devices.
D. There are more high PINs available than low PINs.
Answer: D

Q: 20 What are the benefits of each processor in a multi-processor system having its own memory? Select TWO.
A. linear scalability
B. isolation of memory faults
C. inherent load-balancing
D. faster system startup
E. simplified global table updates
Answer: A, B

Q: 21 Which of the following is a function of the FUP CHECKSUM command?
A. performs CHECKSUM on both open and closed files
B. rewrites CHECKSUM on all blocks in a file
C. corrects block-level data errors in a file
D. recalculates CHECKSUM on all blocks in a file
Answer: D

Q: 22 NonStop TM/MP employs a "two-phased commit" protocol. The purpose of this protocol is to
A. enforce simultaneous writes to both primary and mirror disks
B. subdivide large transactions into standard size packages
C. ensure transaction integrity across system boundaries
D. support ANSI standard SQL features
Answer: C

Q: 23 Why is a client/server design ideally suited to the NonStop Kernel architecture?
A. The NonStop Kernel has been optimized to handle multiple input devices efficiently.
B. The multi-threading capabilities of NonStop Kernel servers are ideally suited to the demands of multiple clients.
C. Clustering allows servers to access enormous databases and thus serve the most demanding clients.
D. Discrete units of work can be spread easily over processes and processors.
Answer: D

Q: 24 The Tandem Development Suite (TDS) provides application programmers with the ability to
A. write, compile, and test code on a PC platform without the use of the NonStop Himalaya system
B. write and compile code on a PC platform and then use PC-based Visual Inspect to run code on NonStop Kernel
C. write and syntax-check the code on a PC before shipping for compilation and testing on NonStop Kernel
D. allow people familiar with Microsoft Visual Studio to develop code in an environment they know well
Answer: B

Q: 25 You are upgrading a mirrored disk volume to one that has a larger capacity. Which of the following applies?
A. The disk drive must not have opened SQL tables.
B. The data on that named disk volume remains continually available.
C. The opened files on the disk drive must be TMF protected.
D. All files on the disk must be closed.
Answer: B

Q: 26 An existing Pathway application designed for 6530 devices is to be deployed worldwide. What is one advantage of Web enabling this application?
A. It can be accessed from any workstation with a Web browser.
B. It will perform much faster as a Web application.
C. It will add an extra layer of security to the application.
D. It will increase application availability.
Answer: A

Q: 27 What happens to an application when a single disk of a mirrored pair fails?
A. Performance decreases because all subsequent reads are from the remaining drive.
B. Databases on the failed drive are invalid and all accessing applications fail.
C. The last write to the failed drive is lost unless the file was TMF protected.
D. An application accessing the drive closes and reopens its database.
Answer: A

Q: 28 You are adding new physical disk volumes while the system is running.
Which of the following statements applies?
A. Applications need to be quiesced.
B. Reloading processors might be required.
C. Applications can keep running.
D. The COUP utility is used to configure the drive.
Answer: C

Q: 29 A customer is running a low-PIN application and now needs to run more copies of the program. All the low-PINs in each of the processors have already been used. Which method solves the problem?
A. adding memory
B. adding one or more disks
C. adding processors
D. configuring more low pins
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved