New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Pegasystems PEGACPRSA22V1 - Certified Pega Robotics System Architect 22

Page: 1 / 3
Total 101 questions

The variable varInput is a String that holds the value What is the output?

What is the outcome of the above automation?

A.

An exception is thrown.

B.

The variable varOutput ends with C.

C.

The variable varOutput ends with A.

D.

The variable varOutput ends with B.

You are assigned to develop a set of activities by using a popular HR application. The application loads automatically after you start interrogation from Pega Robot Studio, but you notice that you are unable to use the bullseye on the Robot Studio Interrogation Form to drag and drop over the desired controls.

Why are you unable to interrogate the desired application controls?

A.

The StartMethod on the application is set to StartAndWait, but the TargetPath property is undefined.

B.

The StartOnProject property of the application is set to false.

C.

The StartMethod on the application is set to Start, but the TargetPath property is undefined.

D.

The StartMethod on the application is set to MonitorAll, but the Path property is undefined.

An automation requires the web adapter to attach to a running instance of Internet Explorer.

How do you achieve this requirement?

A.

Configure the Universal Web adapter and set the StartMethod property to MonitorAll.

B.

Configure the web adapter and set the StartMethod property to MonitorAll.

C.

Configure the web adapter and set the StartMehod property to Attach.

D.

The web adapter cannot connect to a running instance.

An application includes Assisted Sign-On by default with Pega Robot Studio?

A.

Pega Sales Automation

B.

Pega Customer Decision Hub

C.

Pega Customer Service

D.

Pega Robot Manager

Runtime produces an error when debugging a solution. The error message references that a control does not have the necessary value to complete an activity. The control depends upon the completion of a second activity in another project to provide its value.

Which two debugging options provide a benefit when referencing threads for issue resolution? (Choose two.)

A.

Add studio execution log entries

B.

Insert Try and Catch components to an automation

C.

Use the Automation Playback

D.

Dissert a log file for propagating data

Pega Robot Studio has several methods to manage the flow of an automation depending on when a control is matched.

In the Answer Area, drag the description on the left to its matching Design Block.

Which three statements describe the characteristics of unattended automations? (Choose Three)

A.

They retrieve the next case assignment in a robotic work queue.

B.

They execute a fully automated task.

C.

They can streamline and automate portions of your case management workflow.

D.

They run during pre-processing to obtain information to display on a form.

E.

They complete the automated tasks based on user input.

When developing automations and robotic projects for use with Pega applications, there are recommended design specifics and considerations for the developer. Of the options below, which three are recommended developer considerations? (Choose Three)

A.

Set valid completion status.

B.

Design an automation to complete multiple tasks.

C.

Use an unlimited number of transferable data items.

D.

Ensure data formats agree between the automation and the Pega application.

E.

Match the Pega automation identifier with the robot activity component name.

F.

Run automations synchronously.

An Insurance Call Center project requires the use of the Interaction Framework. The supporting applications should perform specific work when processing claims. The claim requires the claim number and the claim date, but it may also share other claim information in the interaction’s context values.

Based on the information, which interaction.xml activity entry configures the project requirements?

A.

Exhibit A

B.

Exhibit B

C.

Exhibit C

D.

Exhibit D

Pega Robot Studio provides five rules on how to differentiate between cloneable application objects when using key assignments in automations. The first rule states that an event creates the instance to set the context of a cloneable object. The remaining four rules state the requirements for a key assignment.

In the Answer Area, determine if each rule description requires a key assignment.