Which of the following is a significant cause of failure when using the technology- focusedapproach to BI Application development?
A. Users often have difficulty understanding new technology.
B. New technology often contains internal flaws and errors that affect the delivered solution.
C. The solution is focused on a single subject area.
D. Developers often focus on just the data.
If anonymous access is disabled, when a user accessesCognos BI, what is the correct flow ofthe request?
A. To Cognos Access Manager which queries the content store for user information and displaysthe log on page through the dispatcher and the gateway
B. To the monitoring service which monitors the user authentication request and displays the logon page through the dispatcher and the gateway
C. To the presentation service which displays the log on page through the dispatcher and thegateway
D. To Cognos Application Firewall which monitors the user authentication request and displaysthe log on page through the dispatcher and the gateway
Which of the following statements best describes the Iterative Approach of applicationdevelopment?
A. A prototype solution is developed after the initial user interviews. This prototype is then usedas a basis for refining specific design requirements.
B. The design step is repeated multiple times before proceeding to the development step. Eachpass through the design step further refines the eventual solution.
C. The solution is developed and delivered to the users. After approximately 2 weeks, the usersare interviewed for any missing requirements and any new requirements form the basis for thenext iteration.
D. A prototype is created that addresses 80 to 90% of the business requirements. This isdemonstrated to the users and their feedback is used to refine the prototype in subsequentiterations.
A user makes the following request:"I need to see the number of flights throughout the year thatarrived or departed more than 15 minutes early or late by origin and destination airport, by carrier,and by time of day. I want to see if the number of flights delayed is greater for large carriers orsmall carriers."This request requires clarification to make the user's intention clear.
Which of thefollowing will NOT further clarify the user's request?
A. Determine if origin and destination airports should be considered joined pairs (for example,from DFW to ORD) or as separate dimensions.
B. Determine if 15 minutes is the only significant grouping of late or early departures or arrivals.
C. Determine the definition of a large and small carrier.
D. Determine if Date and Time of Day should be split into separate dimensions.
Which of the following statements describes the critical differences between a managed reportand a query?
A. A managed report is intended to be run on a regular execution schedule from a backgroundbatch process whereas a query is run interactively.
B. A managed report is authored by trained developers whereas a query is authored by eithertrained developers or end users.
C. A managed report is intended to be run on a regular execution schedule whereas a query isintended to be authored and run on-demand.
D. A managed report prompts users for run-time parameters whereas a query does not.
A company records when customers check into a service center. If there are too many customerswaiting for the number of service representatives on hand, a manager wishes to be notified by ane-mail that contains a report showing the current condition.
Which of the following Cognos 8Components would BEST address their needs?
A. Office Connection and Report Studio
B. Data Manager, Event Management, and Office Connection
C. Office Connection and Query Studio
D. Event Management and Report Studio
Which of the following is NOT a critical feature or function of a scorecard?
A. Targets
B. Projections
C. Tolerances
D. Histories
Using the diagram below to install and configureCognos BI, which of the following componentswill NOT address automatic failover?
A. Cognos BIContent Manager (Active)
B. Cognos BIContent Manager (Passive)
C. Cognos BIReport Server
D. Cognos BIGateway
When deploying an application from a development environment to a production environment, which of the following is correct when each environment uses a separate LDAP instance?
A. There are no issues because the Access Control List (ACL) references the same usernames.
B. Use theCognos BIsecurity objects.
C. Do not useCognos BIsecurity unless you are deploying your application using Series 7Cognos Access Manager for authentication.
D. There are no issues because LDAP objects are always replicated between the environments.
What is the recommended configuration size for Cognos 8 on a Windows 2003 Serverenvironment, and why?
A. Small or medium because Cognos 8 can only allocate 2 GB of memory per process.
B. Small because Java consumes half of the 2GB of RAM that can be allocated per process.
C. Small or medium because Cognos 8 can take advantage of the switch that allows 3GB of RAMper process.
D. Medium or large because Windows 2003 can allocate up to 4 GB of RAM per process.