Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 5

Answers and explanations to your questions:

Detailed explanation:

Question#1:

ANSWER & EXPLANATION:

-----END OF ANSWER & EXPLANATION-----

(Hello Student,

The answers are based on the data needed and by the reference you have provided
which is enough. I have sectioned the answers based on the question for you to
easily pinpoint which answers the question.

Have a great day, Thank you!

Best regards,

Tutor Mar)

Detailed explanation:

Question#1:

Which of these is a benefit of implementing metadata management?

ANSWER & EXPLANATION:

Helps in preventing data linage reporting and analysis

Metadata management enables knowledge of what data exists and its potential
value, thus promoting digital transformation through; improved digital experiences
by enhanced understanding of how an organization interacts with its customers.

Question#2:

Match the vendor name with the associated appliance server name
ANSWER & EXPLANATION:

IBM - Balance configuration unit or balanced warehouse


Ingres - IceBreaker
IBM - Greenplum
HP - Neoview

IBM - Balance configuration unit or balanced warehouse

The IBM Data Warehousing Balanced Configuration Unit is a family of data


warehousing servers from IBM. IBM introduced the Balanced Configuration Unit (BCU)
for AIX in 2005, and the BCU for Linux in 2006.

Ingres - IceBreaker

Ingres Corp. has released Icebreaker BI Appliance, a package of software


integrating JasperSoft's open-source business-intelligence suite with the Ingres
2006 database running on Rpath Linux.

IBM - Greenplum

Greenplum is a massively parallel processing (MPP) database server that supports


next generation data warehousing and large-scale analytics processing, and is part
of the IBM Cloud Pak for Data.

HP - Neoview

HP's Neoview, an integrated hardware and software appliance targeted at BI


applications, was launched with considerable fanfare during Mark Hard's tenure at
HP. The product however largely languished under his leadership and failed to make
any impression in the market.

Question#3:

Which are the reports generated out of data analysis and Profiling?

ANSWER & EXPLANATION:

Matrices

This is called profile analysis. You start with a series of things as units of
analysis, and you measure a series of variables for each of those things. This
produces a profile matrix, or, simply, a data matrix. A data matrix is a table of
cases and their associated variables. Figure 15.2(a) shows the shape of a profile
matrix. Each unit of analysis in each row is profiled by a particular set of
measurements on some variables in the columns.

Question#4:

Which among the following is not an advantage of custom code. (select as many as
possible)

ANSWER & EXPLANATION:

Low cost
High auditing capabilities

Low cost

The obvious disadvantage of custom software is high upfront cost. The


implementation of unique functionality requires the use of cutting-edge
technologies. Your project may need a team of experienced developers, designers,
project managers, QA engineers resulting in costs way higher compared to off-the-
shelf solutions.

High auditing capabilities

A high-quality audit is essentially an audit that accomplishes its classic goal—


namely to be a systematic and objective assessment of your business's accounts. It
should be performed by a qualified, independent organization in compliance with
current auditing standards. Since it is a custom code, there is no involvement of a
qualified, independent organization.

Question#5:

The rule-based approach to Data clean-up include (Choose all which are applicable)

ANSWER & EXPLANATION:

Detective rules
Corrective rules

Detective rules
Detective controls are a key component of a cybersecurity program in providing
visibility into malicious activity, breaches and attacks on an organization's IT
environment. These controls include logging of events and the associated monitoring
and alerting that facilitate effective IT management.

Corrective rules

A corrective rule is a rule for correcting certain types of errors. Its general
form is as follows: "If errors are detected by the checks, make a correction in
this way".

When it comes to rule-based approach to Data clean-up, these two in the


options are considered, Detective rules, and Corrective rules. For they both
contribute to detecting and correcting the which data are included for a clean-up.
Other choices does not conform with the data needed.

Question#6:

Which Metadata spans across the BI Technical Metadata and the Business Metadata?

ANSWER & EXPLANATION:

Front-Room Metadata

Front-Room Metadata spans across the BI Technical Metadata and the Business
Metadata, which is primarily used by the business users.

Question#7:

Best place to implement data quality checks is

ANSWER & EXPLANATION:

Target System (Example : Data Warehouse)

The purpose of the target data model is to show how relational tables in the
archive reflect the business models pulled from the source.
Question#8:

ANSWER & EXPLANATION:

Question#:

ANSWER & EXPLANATION:

-----END OF ANSWER & EXPLANATION-----

(Hello Student,

The answers are based on the data needed and by the reference you have provided
which is enough. I have sectioned the answers based on the question for you to
easily pinpoint which answers the question.

Have a great day, Thank you!

Best regards,

Tutor Mar)

Which Metadata spans across the BI Technical Metadata and the Business Metadata?
Best place to implement data quality checks is
Select all the

You might also like