1.
Kelly supports the Inventory application. This application is accessed by staff in India, the UK, Brazil, and the USA. For reasons of performance and contingency planning, the office in each country has its own server. Kelly needs the Inventory application to reside on each of these servers, and she needs to ensure that the application data and design is kept in sync among all of these locations. How can Kelly meet this requirement?
2.
Richard's form includes a field that causes a document to be mailed when the document is saved. Which of the following is the reserved field name that Richard assigned to the field?
3.
Muriel has created a view that shows the current year's reported sales in the Sales Tracking application. She would like to give her end users the ability to sort on the customer, region, and sales manager columns. How would she accomplish this?
4.
Robert does not want Authors in the Video database's ACL to be able to edit certain fields in documents they created. Which one of the following can he do to accomplish this?
5.
Luis needs to add a field to a form that will allow him to enter up to 500 kilobytes of data. What type of field should he use for this requirement?
6.
Everyone needs read access to inventory documents. Only the Inventory Managers group should be able to create inventory documents. The Warehouse group must be able to edit these documents. How should Claude configure the security?
7.
Which one of the following formulas does Cheng use to change the value of the ReleaseDate field to today's date?
8.
Janira is adding a Received date to her Video Rental form. She would like to have the date field show the user a calendar for date selection. How would she accomplish this?
9.
James would like to use profile documents to track individual users' preferences when they access his Web site. How can he collect the user preference information and create a new profile document?
10.
A system administrator needs to give Web users access to databases on DomServer1/Acme. Presently, only Lotus Notes clients are allowed to access the database using TCP/IP. What should the system administrator do?