For BE/B.Tech/BCA/MCA/ME/M.Tech Major/Minor Project for CS/IT branch at minimum price Text Message @ 9424820157

Capgemini Blue Prism Interview Questions

  Capgemini Blue Prism Interview Questions






1. What are the main components of Blue Prism?
Below are the four main components of the blue prism:
1) Process Studio: In Blue Prism, this is the workspace where processes are created (flow of processes). It facilitates the design, build, test, and modification of automation processes in Blue Prism. In this component of Blue Prism, you will find features such as object calls, control loops, business logic, and variables. Upon creating a process, it will have the Main Page, which is the first to be run.
2) Object Studio: A large number of enterprises require communication with external applications in order to automate processes. Since Process Studio cannot facilitate this, Object Studio is used. It is the area in which VBO (Visual Business Objects) are developed or created. It is never possible to configure a Business Object in Process Studio, but instead in a different environment called Object Studio. The Business Object provides interfaces to interact with external applications, and one Business Object provides interfaces with only one external application.
3) Control Room: In Blue Prism architecture, the control room can be considered the command center that's used to schedule, monitor, and execute automation processes for the digital workforce. In other words, the control room is used for process scheduling. It provides real-time stats and insights into what software robots are doing, what their speed is, and how efficient they are.
4) Release Manager: This component manages, imports, verifies, and exports configuration packages (such as processes and instructions) across Blue Prism environments.

2. What is an Application Modeller?
The application modeller is a feature in Object Studio for creating application models. Essentially, it consists of the configuration needed to interact with existing applications and UI (user interface) elements. A software bot identifies these elements based on specific attributes and then interacts and performs the desired operation on them.
It lets you run/execute Blue Prism and your target application simultaneously (side-by-side), and you can tell Object Studio about the features of your target application by pointing and clicking. You can add elements representing user interface elements to the Application Model by opening the Application Modeller and selecting "Add Element". With this step, you introduce Object Studio to an additional or new feature of your target application.

3. Can you explain the various exception types in Blue Prism?
The following are the three types of exceptions found in Blue Prism:

1) Internal Exceptions: Internal exceptions arise when mandatory data is missing in the stages.
2) System Exceptions: Whenever there is an internet outage, our bot requires internet access, or if the system fails, we will encounter system exceptions. A system exception is raised when Blue Prism is unable to access or interact with an external application.
3) Business Exceptions: Business exceptions aren't really exceptions. In fact, you create them based on business rules. They have to be manually fired through the bot. In case of faulty logic in automation, it will cause a business exception.

4. What do you mean by the attach option in Blue Prism?
In Blue Prism, the attached option is used to identify the application currently being used. To identify an application, we are required to enter the appropriate value, such as the Process name or window title.

5. Explain environment locking in Blue Prism.
Blue Prism sessions are able to use environment locks to restrict access to specific resources or critical sections of the process so that other sessions are forced to wait until the lock is released. By doing so, multiple bots cannot access the same path of a process at the same time. The environment lock works by using tokens. During environmental locking, a token is generated to grant access to only one bot at a time. Once the first bot acquires the lock, it will receive the token, and the other bot will not be able to access the environment or excel file until the first bot releases the lock or token.

6. Can you explain about Blue Prism Process Template?
The Blue Prism templates serve as blueprints for all processes created in Blue Prism, making them easy to configure and maintain. A process template is primarily intended to be used by developers to automate processes quickly. The process templates contain basic activities and structure, so developers do not need to create them every time. Furthermore, they provide developers with an understanding of how work queues are implemented in the Blue Prism processes. The templates streamline the overall working process and make it easier to create processes quickly and easily configured.

7. What are Multiple-Part Processes?
Multiple-Part processes are used when a case has to be dealt with in multiple parts at separate/different items. Each work queue item is associated with one request via a parent-child relationship. You can also use this when work is driven from another/external system instead of the Blue Prism work queue. In addition to this, the Multiple-Part process can be used when requests are added throughout a day and must be executed within the service-level agreement period.

8. What do you mean by thin client and thick client?
Thin Client: A thin client is an application that doesn't allow us to access many attributes of an object. It is an application in which we are unable to get the quality properties when spying using the RPA tool. Thin-client applications can only use region mode. Examples include Citrix and Oracle applications, etc.
Thick Client: A thick client provides us with access to many attributes of an object. It is an application in which we are able to get the quality properties when spying using the RPA tool. Any mode can be used in thick client applications. Examples include Internet Explorer, Calculator, etc.

9. List different types of security in Blue Prism
There are three different types of security in the Blue Prism:
1) User: Assigning new user information.
2) Credentials: storing secret information.
3) Options: assigning rules for setting passwords.

10. How can you set priority for the work queue?
Setting the priority for a work queue item is performed at the time when an item is initially added to the queue using queue action.

No comments:

Post a Comment



Please go through below tutorials:


Mule 4 Tutorials

DEPLOY TO CLOUDHUB C4E CLIENT ID ENFORCEMENT CUSTOM POLICY RABBIT MQ INTEGRATION
XML TO JSON WEBSERVICE CONSUMER VM CONNECTOR VALIDATION UNTIL SUCCESSFUL
SUB FLOW SET & REMOVE VARIABLE TRANSACTION ID SCATTER GATHER ROUND ROBIN
CONSUME REST WEBSERVICE CRUD OPERATIONS PARSE TEMPLATE OBJECT TO JSON LOAD STATIC RESOURCE
JSON TO XML INVOKE IDEMPOTENT FILTER FOR EACH FLAT TO JSON
FIXWIDTH TO JSON FIRST SUCCESSFUL FILE OPERATIONS EXECUTE ERROR HANDLING
EMAIL FUNCTIONALITY DYNAMIC EVALUATE CUSTOM BUSINESS EVENT CSV TO JSON COPYBOOK TO JSON
CHOICE ASYNC

Widely used Connectors in Mule 3

CMIS JETTY VM CONNECTOR SALESFORCE POP3
JMS TCP/IP WEBSERVICE CONSUMER QUARTZ MONGO DB
FILE CONNECTOR DATABASE CONNECTOR


Widely used Scopes in Mule 3

SUB FLOW REQUEST REPLY PROCESSOR CHAIN FOR EACH CACHE
ASYNC TCP/IP COMPOSITE SOURCE POLL UNTIL SUCCESSFUL
TRANSACTIONAL FLOW

Widely used Components in Mule 3

EXPRESSION CXF SCRIPT RUBY PYTHON
JAVASCRIPT JAVA INVOKE CUSTOM BUSINESS EVENT GROOVY
ECHO LOGGER


Widely used Transformers in Mule 3

MONGO DB XSLT TRANSFORMER REFERENCE SCRIPT RUBY
PYTHON MESSAGE PROPERTIES JAVA TRANSFORMER GZIP COMPRESS/UNCOMPRESS GROOVY
EXPRESSION DOM TO XML STRING VALIDATION COMBINE COLLECTIONS BYTE ARRAY TO STRING
ATTACHMENT TRANSFORMER FILE TO STRING XML TO DOM APPEND STRING JAVASCRIPT
JSON TO JAVA COPYBOOK TO JSON MAP TO JSON JSON TO XML FLATFILE TO JSON
FIXWIDTH TO JSON CSV TO JSON


Widely used Filters in Mule 3

WILDCARD SCHEMA VALIDATION REGEX PAYLOAD OR
NOT MESSAGE PROPERTY MESSAGE IDEMPOTENT FILTER REFERNCE
EXPRESSION EXCEPTION CUSTOM AND


Exception Strategy in Mule 3

REFERENCE EXCEPTION STRATEGY CUSTOM EXCEPTION STRATEGY CHOICE EXCEPTION STRATEGY CATCH EXCEPTION STRATEGY GLOBAL EXCEPTION STRATEGY


Flow Control in Mule 3

CHOICE COLLECTION AGGREGATOR COLLECTION SPLITTER CUSTOM AGGREGATOR FIRST SUCCESSFUL
MESSAGE CHUNK AGGREGATOR MESSAGE CHUNK SPLITTER RESEQUENCER ROUND ROBIN SOAP ROUTER