Service mediation is defined as a(n) _____________.
A. architecture that mediates between the service consumers and one or more service providers in a manner that loosely couples location, interface, data, and security
B. technique that loosely couples programming languages
C. methodology for mediating between interfaces and concrete instances
D. product that automatically provides for abstraction between service consumers and service providers
Your application has the requirement to create a shopping cart feature with multiple pages to search and select items and separate pages to pay and finalize the transaction.
When defining this feature in MAF, which single content type is the correct choice?
A. fragment
B. local AMX
C. local HTML
D. declarative component
E. remote URL
F. bounded task flow
G. unbounded task flow
H. remote task flow
When developing a MAF application for service technicians, you determine that the mobile technician will need to extensively describe the condition of the item he or she is servicing, including the area that is broken and any other pertinent details.
How would you implement this in an MAF application to avoid excessive typing?
A. Use a remote URL page to enable the technician to specify the description in a browser- based page.
B. Use the camera integration feature to allow the technician to take a photo of the serviced item.
C. Use an input text area to allow for multiple lines of text.
D. Use the voice recognition integration feature to allow the technician to enter details by voice.
If you want to create your own custom Springboardrather than use the out-of-the-boxone, which two artifacts would you need to create?
A. unbounded task flow
B. feature
C. AMX page
D. menu items
E. side bar
You have been asked to select the appropriate security policy to apply to a SOAP web service data control. The web service is accessed over HTTPS. In addition,the web service calls must use the same single sign-on infrastructure as the other web applications deployed on the network. That way, users will not have to authenticate again if they navigate between remote URL features and AMX features making web service calls.
Which policy would you choose?
A. oracle/wss_http_token_over_ssl_client_policy
B. oracle/wss_username_token_client_policy
C. oracle/soap_over_ssl_client_policy
D. oracle/wss11_message_protection_client_policy
Which is a benefit of service mediation?
A. location independence, schema independence, and security independence
B. programming language independence and state-full process integration with business rules
C. easy mobile enablement of enterprise systems and cross-platform code generation integrated with online source-code-control systems such as Git, Mercurial, and Subversion
D. easy application of security rules to existing mobile applications and legacy applications
In your MAF design, you have defined a "checkout" feature based on a task flow where customers place items into their shopping basket and, at the end of task flow, either purchase the items in the shopping cart or cancel the order. The items in the shopping cart are persisted in a managed bean.
Which single bean scope is the right option for the shopping cart managed bean?
A. applicationScope
B. backingBeanScope
C. pageFlowScope
D. requestScope
E. sessionScope
F. viewScope
Which two limitations apply to the REST web services data control?
A. REST web service data controls can be used only with REST services that do not require authentication.
B. REST web service data controls support only XMLpayloads.
C. REST web service data controls support only UTF-8 character encoding.
D. The REST web service data control wizard does not perform changes on existing REST data controls. If the requirement is to change an existing data control configuration, then the existing data control must be deleted before running the REST service data control.
Which two capabilities determine your decision to select either a native or a hybrid architecture over a web mobile architecture?
A. supporting a variety of input components such as sliders, checkbox, and date-selection components
B. supporting push events through the Apple or Google push servers
C. leveraging the full device features (such as camera and files)
D. accessing secure REST backends
E. skinning of the user interface
View the Exhibit.
The application accesses secured web services over HTTPS. The certificates have been issued by the internal certificate authority of your organization. In addition, the application requires access to the SMS and camera features of the device.
Which are the three actions you must perform to prepare the application for distribution on the Google Play Store?
A. In the deployment profile, specify a unique, Java language-like package name identifying the application as the ApplicationBundle ID.
B. Obtain or generate a private key to sign the application package (.apk file) and update the preferences of your IDE to use it.
C. Validate your archive name by using the registry available on the Oracle Technology Network.
D. Registeryour application on the Oracle Mobile Cloud Service.
E. In the deployment profile, set the build mode to Release.
F. Remove any certificates emitted by your organization from the cacerts file.