Which of the following WebCR options allows to view the list of all client machines along with their status in read-only form?
Which dashboard does the Control Room administrator need to reference to get a graphical representation of Events Distribution by Activity Type?
Which of the following methods is used to assign a new set of permissions to a group of users?
You need to assign a value to an existing variable that has been previously defined. What will you choose?
You need to create a Bot that requires you to extract people's data from an online portal and put in a database.
Which recorder will you use?
A user scheduled some tasks on the local client and left for the day. The next day, the user finds that none of the tasks were executed. The event log shows that the machine did not shut down or restart.
Which of these are possible reasons that the command did not execute? (Choose two.)
Which of the following options in AAE support the email notification feature?
The administrator of an Automation Anywhere Enterprise server has noticed that in the last few days, there has been an unusually high volume of events.
What should the administrator do to get more information about these events?
The administrator of an Automation Anywhere Enterprise server has noticed that in the last few days, there has been an unusually high volume of events.
What should the administrator do to get more information about these events?
The locker administrator wants to ensure that developers having access to a locker and its corresponding variables can map the password variable to only fields tagged as password. What can the locker administrator do to achieve this?
It is possible to run/execute a task by pressing a pre-assigned Hot Key combination which has been associated with the task beforehand (True/False)?
How would an administrator view the values of some variables continuously when running the code in Debugging mode?
A developer accidentally misspells the city name for a Marketing Event. What is the fastest way to correct this mistake across 100 rows in an Excel spreadsheet?
Which option allows an administrator to identify the location of a Control Room repository?
Which of the following command allows users to send the Username and Password in the Terminal Environment?
$Filedata Column$ variable allows us to read column wise information from the following file type(s)?
Which command will allow you to bring a 'Titled' window to the foreground?
It is Ray's first day at his new office, BotMakers. He is trying update the Metabot assets with respect to the newer version of source application. Help him perform the task.
Which option will Ray choose to instantly compare an existing screen with a newer screen to identify changes/modifications in the source application?
An administrator has scheduled a bot from the Bots section. The administrators manager feels that the schedule is incorrect. In Control Room, where would the administrator go to show the schedule?
An administrator captures the value of $Error Line Number$ variable in a log file and finds that the value of $Error Line Number$ variable is 4. What does this mean?
While editing a task, the screenshots are not appearing under the Visualize Tab. What could be the possible reason?
Control Room, Development Client and Runtime Client and key components of Automation Anywhere architecture. Development Client and Runtime Client are also known as
A user scans multiple documents into individual PDF documents and stores them on their hard drive. The user attempts to upload the documents individually but is told to send one large PDF document containing the individual documents instead.
How can the user accomplish this request?
A user from human resources wants to access all records that are in the employee database. The user is not comfortable editing databases but is comfortable working in Excel.
What are two methods that an administrator can provide the information to the user in the desired format? (Choose two.)
What variable is returned when the String Operation's Split command is used?
The locker administrator of an organization is worried that giving developers "Consumer" access to a locker will compromise the integrity of the credentials. The developer can login into the control room and using the consumer access can view the values of the credential variables.
What can the administrator do to stop this?