What is a common control?
A. A user interface element that is common to most environments
B. A way to specify how group of elements is controlled
C. An emulation of device's native controls using various technologies
D. A native interface element which cannot be controlled by a web means such as JavaScript
How can Java code replace a Worklight adapter?
A. It is possible to setup request routing directly to Java code removing the need to use Worklight adapter
B. By setting useJavaAdapters property to true in adapter's XML file
C. By deleting the adapter's JS file and declaring Java class in XML file
D. Java code can be used as an extension of adapter functionality; it cannot be used as a replacement
Which mobile environments support the TabBar control? (Choose two)
A. BlackBerry,
B. Windows Phone
C. iOS,
D. Android
When defining a realm using adapter based authentication in authenticationConfig.xml, which parameters are mandatory? (Choose two)
A. login-function
B. adapter-name
C. logout-function
D. realm-name
Which object's properties should be overwritten in order to override system messages?
A. WL.SystemMessages
B. WL.Messages
C. WL.Resources.Messages
D. WL.ClientMessages
A developer creates two adapters. Each adapter is protected by its own authentication realm with different login modules. What would be the consequence of this approach?
A. Once the user authenticates in one realm he will be automatically authenticated in a second one
B. The user will not be able to use these adapters together in same application
C. The user will have to login in each realm separately
D. The user will have to logout from one realm prior to using adapter protected by another realm
Which sentences correctly describe the encrypted cache ?
A. The encrypted cache is stored in the device's native storage. Its size is limited by the free space on a device therefore large amounts of data can be stored.
B. HTML5 WebStorage is used for storing encrypted cache; therefore the amount of data stored in it is limited to several megabytes
C. The encrypted cache is stored on Worklight server. Its size is limited by the free space in the Worklight server's database; therefore large amounts of data can be stored
D. The encrypted cache is stored in virtual memory. Its size is limited by the device's RAM and erased each time user quits the application.
Which of the below should not be a part of Shell component?
A. Authentication module
B. Native functionality JavaScript wrapper
C. Application UI components
D. Company logo that should be shared between several application
How does an adapter present data back to the application?
A. SOAP
B. JMS
C. JSON
D. RMI
For which OSes does Worklight provide unified push notification? (Choose two)
A. Windows Phone
B. Android
C. iOS
D. Blackberry
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2180-279 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.