-
Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
A . Data Mining API
B . Provisioning API
C . Cryptography API
D . API for Second Factors
E . SOAP API for Mobile ActiveCode
-
One of the schedulers has submitted an ad hoc job to list a particular directory. Which command should be used to view the output of the ls command through IBM Tivoli Workload Scheduler? ()
A . conman "sj CPU#jobs.ls;joblog"
B . conman "sj CPU#jobs.ls;stdlist"
C . jobman "showjoblog CPU#jobs.ls"
D . jobman "showjoblog CPU#jobs.ls;stdlist"
-
When designing an expansion within the same data center, when is a pre-sales TDA absolutely required by IBM?()
A . for a SAN768B Director
B . for a second TS3500 Tape Library
C . for a second EXP5060 Expansion Unit
D . for an additional DS8300 Expansion Frame
-
When does an MDisk become managed by an IBM Storwize V7000?()
A . when a volume is created using thatMDisk
B . when theMDisk is first imported into the cluster
C . when the LUN is first presented to theStorwize V7000
D . when theMDisk is assigned to a storage pool
-
Which tool is used to correctly size an IBM virtual tape solution?()
A . System Planning Tool (SPT)
B . Tape Magic
C . Capacity Magic
D . TS3500 Slot Calculator
-
Which IBM resource would you use to verify hardware compatibility between IBM System x Servers and OEM options?()
A . IBM Sizing Guides
B . Configuration & Options Guide - (COG)
C . Standalone Solutions Configuration Tool (SSCT)
D . System x Sales Configuration Aid (xSCA)
E . ServerProve
-
What technology of IBM is used to diagnose hardware errors before they occur? ()
A . Capacity Manager
B . Predictive Failure Analysis
C . Software Rejuvenation
D . Light Path Diagnostic
-
What is one benefit of using the IBM eConfig configuration tool?()
A . It warns users of parts availability constraints.
B . It provides a record of discounts used in the past.
C . It optimizes the adapter selection based on function and cost.
D . It provides validation of acceptable combinations of components.
-
Which two commands are used to migrate IBM Tivoli Workload Scheduler to version 8.5 on a UNIX system?()
A . launch.sh
B . wdinstspb
C . SETUP.bin
D . twsinst -migrate
E . SETUP.bin -silent
-
Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
A . to add second factor based authentication to a Web application
B . to pre-populate user wallets with all their application credentials in one go
C . to enhance out-of-the-box audit logging by creating custom audit log events
D . to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On
E . to configure automatic password change on expiry for an application so that the new password is a random string of specified strength
-
IBM Tivoli Storage Productivity Center for Disk can manage any storage device that employs whatfeature?()
A . SMI-S
B . SNA
C . COBRA
D . HTML
-
Using the Tivoli Dynamic Workload Console, what are two ways to change the priority of a job?()
A . Open the "Set Priority" panel from the job properties.
B . Change the priority of the job stream that contains the job.
C . Select the corresponding action from the Monitor jobs task panel.
D . Open the job stream properties and drill down to the job priority panel.
E . The priority of a job can only be changed from the Workload Designer.
-
When configuring an IBM System Storage DS8100 for an IBM system z environment, what is themaximum number of base + alias addresses allowed per LCU?()
A . 32
B . 64
C . 128
D . 256
-
Which of the following features is an IBM advantage when comparing the Oracle/Storage TekVirtual Storage Manager (VSM) to the IBM Virtualization Engine TS7700 (VTS)?()
A . throughput
B . automatic tape reclamation
C . 3490E tape volume emulation
D . disk and tape (physical) storage included in same frame
-
An administrator is attempting to use the Tivoli Performance Viewer to see the average response time for a WebSphere Commerce command, which of the following must be done in order to be successful?()
A . Enable performance monitoring of the WebSphere Application Server through the WebSphere Application Server Administrative Console
B . Enable performance monitoring of the WebSphere Commerce application through the WebSphere Commerce Administration Console
C . Install and configure Tivoli Performance Viewer on a separate machine and configure it to connect to the Application Server.
D . Install and configure DB2 Intelligent Miner for Data to support the appropriate closed-loop analytic
-
An IBM Tivoli Workload Scheduler administrator finds that most of the job streams are carried forward during each production day. Which action should the administrator take to ensure that only a few job streams need to be carried forward? ()
A . change start of day
B . disable the Carry Forward option
C . cancel all job streams before start of day
D . Administrator does not have to take any actio
-
Which is a license scope option when managing activations for an IBM System Storage DS8100using the IBM Disk Storage Feature Activation (DSFA) application?()
A . Operating environment
B . Parallel access volumes
C . Point-in-time copy
D . Count Key Data
-
When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()
A . all those that have been created by all users
B . just those created by the user in the current session
C . all those created by the user and shared with user’s login group
D . just those where the connection engine specifies the user’s logo
-
What is the default message level configured for IBM Tivoli Federated Identity Manager?()
A . error messages only
B . disable all messages
C . error and warning messages only
D . info, error and warning message
-
What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()
A . The directory must exist with one subdirectory (general).
B . The directory must exist with two subdirectories (daily, weekly).
C . The directory must exist with three subdirectories (daily, weekly, monthly).
D . The directory must exist with four subdirectories (general, daily, weekly, monthly).
-
Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
A . The database user must be created using DB2 Control Center.
B . The database user must be created using the DB2 Command Line Processor.
C . The database user may be created using DB2 Control Center or DB2 Command Line Processor.
D . The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
-
What is the primary use of the IBM Configuration & Options Guide (COG)? ()
A . IBM System x ServicePac part number look up
B . Operating system and part number look up
C . General server information and part number look up
D . Software compatibility chart
-
What is the IBM tool used to configure the IBM System Storage DS5000 system?()
A . DS Storage Manager
B . Tivoli Storage Manager
C . Remote Support Manager
D . Tivoli Provisioning Manager
-
Computers have aided in the study of humanities for almost as long as the machines have existed. Decades ago, when the technology consisted solely of massive, number-crunching mainframe. computers, the chief liberal arts applications were in compiling statistical indexes of works of literature. In 1964, IBM held a conference on computers and the humanities where, according to a 1985 article in the journal Science, "most of the conferees were using compeers to compile concordances, which are alphabetical indices used in literary research."
Mainframe. computers helped greatly in the highly laborious task, which dates back to the Renaissance, of cataloging each reference of a particular word in a particular work. Concordances help scholars scrutinize important texts for patterns and meaning. Other humanities applications for computers in this early era of technology included compiling dictionaries, especially for forei8n or antiquated languages, and cataloging library collections.
Such types of computer usage in the humanities may seem limited at first, but they have produced some interesting re suits in the last few years and promise to continue to do so. As computer use and access have grown, so has the number of digitized texts of classic literary works.
The computer-hosed study of literary texts has established its own niche in academia. Donald Foster, an English professor at Vassar College in Poughkeepsie, New York, is one of the leaders in textual scholarship. In the late 1980s Foster created SHAXICON, a database that tracks all the "rare" words used by English playwright William Shakespeare. Each of these words appears in any individual Shakespeare play no more than 12 times. The words can then be cross-referenced with some 2,000 other poetic texts, allowing experienced researchers to explore when they were written, who wrote them, how the author was influenced by the works of other writers, and how the texts changed as they were reproduced over the centuries.
In late 1995 Foster’s work attracted widespread notice when he claimed that Shakespeare was the anonymous author of an obscure 578-1ine poem, A Funeral Elegy (1612). Although experts had made similar claims for other works in the past, Foster gained the backing of a number of prominent scholars because of his computer-based approach. If Foster’s claim holds up to long-term judgment, the poem will be one of the few additions to the Shakespearean canon in the last 100 years.
Foster’s work gained further public acclaim and validation when he was asked to help identify the anonymous author of the heat-selling political novel Primary Colors (1996). After using his computer program to compare the stylistic traits of various writers with those in the novel, Foster tabbed journalist Joe Klein as the author. Soon after, Klein admitted that he was the author. Foster was also employed as an expert in the case of the notorious Unabomber, a terrorist who published an anonymous manifesto in several major newspapers in 1995.
Foster is just one scholar who has noted the coming of the digital age and what it means for traditional fields such as literature. "For traditional learning and humanistic scholarship to be preserved, it, too, must be digitized," he wrote in a scholarly paper. "The future success of literary scholarship depends on our ability to integrate those electronic texts with our ongoing work as scholars and teachers, and to exploit fully the advantages offered by the new medium."
Foster noted that people can now study Shakespeare via Internet Shakespeare Editions, using the computer to compare alternate wordings in different versions and to consult editorial footnotes, literary criticism, stage history, explanatory graphics, video clips, theater reviews, and archival records. Novelist and literary journalist Gregory Feeley noted that "the simplest (and least radic
A.computers have not been very helpful in humanities study until recently
B.computers were widely used in all kinds of literary texts very long ago
C.computers were invented by International Business Machines Corporation
D.computers began to be used for literary study as soon as they were invented