Mario works with a group of R programmers tasked with copying data from an accounting system into a data warehouse.
In what phase are the group's R skills most relevant?
Correct answer C. Transform
The R programming language is used to manipulate and model data.
In the ETL process, this activity normally takes place during the Transform phase.
The Extract and Load phases typically use database-centric tools.
Purging data from database is typically done using SQL.
What effort has the goal of maintaining a single source of truth for the most important data elements handled by the organization?
Master data management (MDM) involves creating a single master record for each person, place, or thing in a business, from across internal and external data sources and applications. This information has been de-duplicated, reconciled and enriched, becoming a consistent, reliable source. Once created, this master data serves as a trusted view of business-critical data that can be managed and shared across the business to promote accurate reporting, reduce data errors, remove redundancy, and help workers make better-informed business decisions.
An analyst needs to provide a chart to identify the composition between the categories of the survey response data set:
Which of the following charts would be BEST to use?
Analyzing a data point, you find that the point is 1 standard deviation above the mean.
What is the z-score for this data point?
What European law requires that organizations handling personal information designate a Data Protection Officer (DPO)?
The General Data Protection Regulation 2016/679 is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area.
Which of the following can be used to translate data into another form so it can only be read by a user who has a key or a password?
A. Data encryption.
Data encryption is a way of translating data from plaintext (unencrypted) to ciphertext (encrypted). Users can access encrypted data with an encryption key and decrypted data with a decryption key.
You would like to combine the text in two different strings to form a single string.
What action are you performing?
Simply defined, concatenation is the act of linking things together. In Microsoft Excel, the concatenation function is one of many text functions, which allows users to combine data distributed over multiple columns.
The concatenation of two or more numbers is the number formed by concatenating their numerals.
For example, the concatenation of 1, 234, and 5678 is 12345678.
When would you show time on a standard line chart?
Consider the following dataset which contains information about houses that are for sale:
Which of the following string manipulation commands will combine the address and region name columns to create a full address?
full_address------------------------- 85 Turner St, Northern Metropolitan 25 Bloomburg St, Northern Metropolitan 5 Charles St, Northern Metropolitan 40 Federation La, Northern Metropolitan 55a Park St, Northern Metropolitan
The correct answer is A: SELECT CONCAT(address, ' , ' , regionname) AS full_address FROM melb LIMIT 5; String manipulation (or string handling) is the process of changing, parsing, splicing, pasting, or analyzing strings. SQL is used for managing data in a relational database. The CONCAT() function adds two or more strings together. Syntax CONCAT(stringl, string2,... string_n) Parameter Values Parameter Description stringl, string2, string_n Required. The strings to add together.
How many variables may be shown in a simple pie chart?
Which one of the following values will appear first if they are sorted in descending order?
Emma is working in a data warehouse and finds a finance fact table links to an organization dimension, which in turn links to a currency dimension that not linked to the fact table.
What type of design pattern is the data warehouse using?
Correct answer C. Snowflake.
Since the dimension links to a dimension that isn't connected to the fact table, it must be a Snowflake, with a Star, all dimensions link directly to the fact table, Sun and Comet are not data warehouse design patterns.
What SQL command is used to delete an entire table from a database?
What data obfuscation technique is designed to be reversible?
Which of the following contains alphanumeric values?
What is the most time-consuming of the practices that authorize international data transfers under GDPR?
What is NOT a characteristic of a good data steward?
Provide the technical expertise around source systems, extract, transform, and load (ETL) processes, data stores, data warehouses, and Business intelligence tools.