Certified Blueprism Professional Developer Sample Questions
The mandatory Blue Prism development ideas and functionality are tested on the Blue Prism Developer Exam (AD01) for developers. Employees in the automation sector will be in high demand in the not-too-distant future when everything will be run by robots. With the help of this certification, you may demonstrate your abilities to superiors and advance in your profession. It improves both your abilities and knowledge as well as your professional reputation. To pass this exam, you must put in a lot of effort and entire dedication. The article provides a list of Certified Blueprism Professional Developer Sample Questions that cover core exam topics including –
- Exception Handling Guide
- Work Queues Guide
- Developer Best Practice
- Lifecycle Orientation
- Object Layer Design
Q1) A spreadsheet stored in a shared drive is used to feed cases to a Process so it can work. The shared drive’s location varies across the environments for development and production. How ought this to be handled?
- A. Hold the “Development” path to the spreadsheet in a data item within a Process during the build and test phase. The data item will be changed to hold the “Production” path when the Process is opened and imported into Production.
- B. Keep the “Development” path to the spreadsheet in a data item within a Process while the build and test phase is in progress. Put this data point on display as a session variable. This Session Variable value can be configured in the Control Room for use when the Process is executed in Production.
- C. Hold the spreadsheet’s path in memory as an environment variable.
- D. When the process begins, pass the Path as a Startup Parameter.
Correct Answer: B
Q2) A popup window from the browser programme occurs when you are automating a procedure involving a browser-based application, and you must work with it. Blue Prism throws the following problem when you attempt to spy the popup window and its components: “There was an error during the spying process.” Which of the following represents the best workaround in Certified Blueprism Professional Developer?
- A. Change the value of the TabProcGrowth Registry key under HKEY CURRENT USER/SOFTWARE/Microsoft/Internet Explorer/Main to 2.
- B. Modify the process’s scope such that the pop-up window doesn’t require automation.
- C. Instead, attempt to spy on elements using a new, independent object that is attached to the active popup instance.
- D. Interact with the popup window using surface automation methods.
Correct Answer: D
Q3) Which of the following suggestions is a good way to deal with issues with installing and attaching browser applications in Certified Blueprism Professional Developer?
- A. Launch the application using the Utility – Environment Object’s Start-Process action, then attach to the application using the attach stage.
- B. Store the target URL in a data item rather than having the Application Modeller Wizard set it up.
- C. Change the value of the TabProcGrowth Registry key under HKEY CURRENT USER/SOFTWARE/Microsoft/Internet Explorer/Main to 2.
- D. Automate the application with Surface Automation
Correct Answer: A
Q4) A browser-based programme has an action built into it that automates it. The object operates flawlessly in Object Studio and can be successfully spied on all of its components. However, when the programme is run in the control room, errors have raised that show there are no elements. This is due to the web page’s elements not loading all at once but rather gradually one by one. Which of the following would be best for enhancing the automation’s resilience?
- A. Before starting the action, use a Wait Stage with the Check Exists condition.
- B. Start the action with a Wait Stage and the Parent Document Loaded condition.
- C. Start the action using a Wait Stage and the Document Loaded condition.
- D. Avoid using HTML mode to spy on elements
Correct Answer: B
Q5) Which of the following assertions regarding using browser applications is accurate? (Select three.)
- A. An HTML element need not be visible on the screen in order to be read or written to. Reading from or writing to the element will work as long as it is present on the page that is presently being loaded.
- B. Checking the Parent URL attribute will enable a quicker and more accurate element identification.
- C. A web application’s elements can be watched using the Active Accessibility mode.
- D. Internet Explorer Window identification using Win32 mode is possible.
- E. In any browser programme, HTML elements can be found using the HTML spy mode.
Correct Answer: CDE
Q6) A PDD has been developed that calls for logging into the CDS application. A user account may only be logged into the CDS application on one computer at a time. The customer wants to keep their CDS login information in the Blue Prism Credential repository.According to calculations, the automated solution will need three resource PCs in order to handle the amount of cases within SLAs. Which design choice will best satisfy the aforementioned requirements?
- A. In the Blue Prism Credential Manager, create user accounts and sets of credentials for each Resource PC for the CDS Application.
- B. Request from IT the ability for concurrent Blue Prism User Account logins to the CDS application.
- C. Manually log into the CDS programme and let Blue Prism to take over after you’re done.
- D. Create a single credential for the CDS Application in the Blue Prism Credential Manager. To ensure that only one Resource PC can be logged into the CDS application at once, use a Blue Prism Environment Lock.
Correct Answer: D
Q7) Which of the aforementioned claims about Blue Prism Credentials is accurate?
- The Business Object; Internal – Credentials cannot access the Blue Prism database with encrypted credentials.
- Holding application credentials within the Process that necessitates them is great practise.
- Keeping application credentials in the object that needs them is great practise.
- Blue Prism credentials can be kept in an unencrypted state.
- A. 1 only
- B. 2 only
- C. 3 and 4
- D. None
Correct Answer: D
Q8) What are some examples of a business exception from the list below?
- According to a Business Requirement, Blue Prism is not permitted to work on any accounts that have a balance of more than £1,000,000. The balance field has been successfully read by Blue Prism, which has returned a value of £1,000,000.
- An unexpected pop-up has been discovered by Blue Prism.
- While waiting for a web page to load, a Blue Prism wait stage has expired.
- The process’s data input has been verified, yet it failed.
- A. All of them
- B. 2 and 3
- C. 1 and 4
- D. None of them
Correct Answer: D
Q9) Which of the following claims about Control Room is true? (Select three.)
- A. process can run simultaneously on numerous resources.
- B. A resource has the capacity to run numerous processes concurrently.
- C. Each process can only be running in a single instance at a time.
- D. Only one process can be active at a time on a resource PC.
- E. Before a process may be used in the control room, it must be published.
Q10) The following error message has appeared as a result of an attempt to start a Process on resource BP0100: To run that process, BP0100 is currently overloaded. Which of the following is the error’s most likely cause?
- A. BP0100 is not available.
- B. The Blue Prism resourcepc command is running on resource BP0100 in more than one instance.
- C. The Blue Prism Application Server does not have the BPServer service active.
- D. A Process with the run mode of “Exclusive” is now operating on resource BP0100 and calling a Business Object.
Q11) You’re engaged in Java application development. The target programme breaks while attempting to highlight or interact with an element after successfully spying it in Java mode. Which of the subsequent steps ought to be tried to fix this?
- A. Use a different spy mode to monitor the element.
- B. Restart the programme
- C. Download and install Java Access Bridge
- D. In Application Modeller, enable the “descend tree” target application option.
Correct Answer: D
Q12) When espionage concerns arise, which of the following alternatives to the standard approach of spying application elements should be used?
- A. Application Model
- B. Application Navigator
- C. Highlight
- D. System Navigator
Correct Answer: C
Q13)The performance of interaction with a Java element should be improved by checking which of the following attributes?
- A. Java Text
- B. Ancestor Count
- C. Role
- D. Allowed Actions
Correct Answer: A
Q14) The Loop Count and Max Loop data elements start out with initial values of 0 and 5, respectively. How many times during the Process’s execution will the Process’s “Open Account Part 1” be read into memory?
- A. 4
- B. 5
- C. 1
- D. 0
Correct Answer: A
Q15) The Loop Count and Max Loop data elements start out with initial values of 0 and 5, respectively. During the course of the Process, how many times will the Business Objects Action “Screen AO1″” Enter Data” be read into memory?
- A. 4
- B. 5
- C. 1
- D. 0
Correct Answer: C
Q16) Which of the subsequent assertions is true?
- A. The process configuration complies with the specifications
- B. The Process will fail since there are two stages of recover that lead to one step of resume.
- C. Since the Exception Detail is not captured for the two Business Exceptions, the Process configuration will not satisfy the criteria.
- D. The Process won’t raise an error if the Valid ID stage returns a “No” response.
Correct Answer: C
Q17)Which of the following statements must be taken into account in order to guarantee a consistent match for the Screen Text “” Product Code element in Certified Blueprism Professional Developer:
- The Y attribute of the Label “”Product Code element must be used to calculate the dynamic value of the Y attribute for the Screen Text “” Product Code element.
- Because it is not verified, the Y attribute of the Label “”Product Code element cannot be generated.
- The Screen Text’s Y attribute “The Match Type for the Product Code element must be “Equal.”
- A Match Type of must be selected for the Window Text attribute of the Screen Text “” Product Code element “˜Wildcard’
- You must uncheck the Window Text checkbox for the Screen Text “Product Code” element.
- A. 1 and 4
- B. 1, 2 and 5
- C. 3 and 4
- D. 1 and 5
Correct Answer: D
Q18) Which of the following design alternatives is appropriate, in accordance with Best Practice, for entering the value 2008 Cash ISA in the Product Selection field in Certified Blueprism Professional Developer:
- A. In the stage that will fill the field, the Product Selection value should be hard coded as 2008 Cash ISA.
- B. You should set up a text data item with the initial value “2008 Cash ISA.” The stage that will fill the Product Selection field should receive this data item as its input value.
- C. During the start stage, an input parameter should be set up to let the caller process choose the value to enter into the Product Selection number field.
- D. All the aforementioned
Correct Answer: C
Q19 )A spreadsheet stored in a shared drive is used to feed cases to a Process so it can work. The shared drive’s location varies across the environments for development and production. How ought this to be handled in Certified Blueprism Professional Developer in Certified Blueprism Professional Developer?
- The Y attribute of the Label “”Product Code element must be used to calculate the dynamic value of the Y attribute for the Screen Text “” Product Code element.
- Because it is not verified, the Y attribute of the Label “”Product Code element cannot be generated.
- The Screen Text’s Y attribute “The Match Type for the Product Code element must be “Equal.”
- A Match Type of must be selected for the Window Text attribute of the Screen Text “” Product Code element “˜Wildcard’
- You must uncheck the Window Text checkbox for the Screen Text “Product Code” element.
Correct Answer: B
Q20)A popup window from the browser programme occurs when you are automating a procedure involving a browser-based application, and you must work with it. Blue Prism throws the following problem when you attempt to spy the popup window and its components: “There was an error during the spying process.” Which of the following represents the best workaround?
- A. Change the value of the TabProcGrowth Registry key under HKEY CURRENT USER/SOFTWARE/Microsoft/Internet Explorer/Main to 2.
- B. Modify the process’s scope such that the pop-up window doesn’t require automation.
- C. Instead, attempt to spy on elements using a new, independent object that is attached to the active popup instance.
- D. Interact with the pop-up window using surface automation methods.