Questions and Answers
Question fRF0MEwnrHAXSCVbnp9l
Question
The view updates represents an incremental batch of all newly ingested data to be inserted or updated in the customers table. The following logic is used to process these records. //IMG//
Which statement describes this implementation?
Choices
- A: The customers table is implemented as a Type 3 table; old values are maintained as a new column alongside the current value.
- B: The customers table is implemented as a Type 2 table; old values are maintained but marked as no longer current and new values are inserted.
- C: The customers table is implemented as a Type 0 table; all writes are append only with no changes to existing values.
- D: The customers table is implemented as a Type 1 table; old values are overwritten by new values and no history is maintained.
- E: The customers table is implemented as a Type 2 table; old values are overwritten and new customers are appended.
answer?
Answer: B Answer_ET: B Community answer B (100%) Discussion
Comment 1303618 by Tayari
- Upvotes: 1
B is correct
Comment 1223860 by imatheushenrique
- Upvotes: 3
B. The customers table is implemented as a Type 2 table; old values are maintained but marked as no longer current and new values are inserted.
A Type 1 table does not track changes in dimensional attributes - the new value overwrites the existing value. Here, we do not preserve historical changes in data.
A Type 2 Table tracks change over time by creating new rows for each change. A new dimension record is inserted with a high-end date or one with NULL. The previous record is “closed” with an end date. This approach maintains a complete history of changes and allows for as-was reporting use cases.
A data warehousing method called Slowly Changing Dimension (SCD) Type 3 is used to track both the old and new values while managing historical changes in data over time. To reflect the historical and present values of an attribute, SCD Type 3 keeps two extra columns in the dimension table.
Comment 1131071 by spaceexplorer
- Upvotes: 3
Selected Answer: B B is correct
Comment 1118794 by kz_data
- Upvotes: 1
Selected Answer: B B is correct
Comment 1051456 by chokthewa
- Upvotes: 2
B is correct.
Question HJkfUgXEbtfYL5uSAtCS
Question
The DevOps team has configured a production workload as a collection of notebooks scheduled to run daily using the Jobs UI. A new data engineering hire is onboarding to the team and has requested access to one of these notebooks to review the production logic. What are the maximum notebook permissions that can be granted to the user without allowing accidental changes to production code or data?
Choices
- A: Can Manage
- B: Can Edit
- C: No permissions
- D: Can Read
- E: Can Run
answer?
Answer: D Answer_ET: D Community answer D (73%) E (27%) Discussion
Comment 1410951 by AlHerd
- Upvotes: 1
Selected Answer: D We don’t want to person to run the code in the notebooks as this might change the data, so “can read” is best.
Comment 1342287 by RasipalayamRDK
- Upvotes: 1
Selected Answer: E Maximum permission Can Run .https://docs.databricks.com/en/notebooks/notebooks-collaborate.html
Comment 1335287 by arekm
- Upvotes: 1
Selected Answer: D I change my mind - answer D. D would still allow to change data (provided the notebook changes the data), however it would require using importing from other notebook, which is more of a nuisance than just clicking Run in the notebook.
Comment 1335285 by arekm
- Upvotes: 1
Selected Answer: E Answer E - the question states “maximum notebook permissions”, which means “Can Run”, see: https://docs.databricks.com/en/security/auth/access-control/index.html#notebook-acls
Comment 1305342 by benni_ale
- Upvotes: 1
Selected Answer: D It happend that by only running a production workload scheduled to run only once a day , some directories got removed. I would say D as by only running a program when u should not you cold commit changes to production data.
Comment 1303021 by nedlo
- Upvotes: 2
Selected Answer: D Can Read, because Running could have changed DATA
Comment 1280330 by olly24
- Upvotes: 1
Correct answer is C. https://learn.microsoft.com/en-us/azure/databricks/security/auth/access-control/#—notebook-acls
Comment 1272690 by Melik3
- Upvotes: 2
Selected Answer: E can run is the correct answer here because the question asked for the maximum possible permission without editing.
Comment 1270153 by AndreFR
- Upvotes: 2
Selected Answer: D https://docs.databricks.com/en/security/auth/access-control/index.html#notebook-acls
Comment 1068403 by alexvno
- Upvotes: 3
Selected Answer: D Correct
Comment 1057395 by Quadronoid
- Upvotes: 1
Selected Answer: D Correct, D
Question G7MJbo3Y2LPZpUZJfNoY
Question
A table named user_ltv is being used to create a view that will be used by data analysts on various teams. Users in the workspace are configured into groups, which are used for setting up data access using ACLs. The user_ltv table has the following schema: email STRING, age INT, ltv INT The following view definition is executed: //IMG//
An analyst who is not a member of the marketing group executes the following query:
SELECT * FROM email_ltv - Which statement describes the results returned by this query?
Choices
- A: Three columns will be returned, but one column will be named “REDACTED” and contain only null values.
- B: Only the email and ltv columns will be returned; the email column will contain all null values.
- C: The email and ltv columns will be returned with the values in user_ltv.
- D: The email.age, and ltv columns will be returned with the values in user_ltv.
- E: Only the email and ltv columns will be returned; the email column will contain the string “REDACTED” in each row.
answer?
Answer: E Answer_ET: E Community answer E (100%) Discussion
Comment 1270161 by AndreFR
- Upvotes: 2
Selected Answer: E A, D incorrect because 2 columns email & ltv are returned. B incorrect because email will not always contain null values (unless email is null) The user is not a member of “marketing”, so 3 is the correct answer. If the user were a member of “marketing” group, correct answer would have been C
Comment 1226711 by Isio05
- Upvotes: 1
Selected Answer: E E, only email column is selected and is not allowed to be viewed by the user
Comment 1068406 by alexvno
- Upvotes: 2
Selected Answer: E sure E
Comment 1062679 by ismoshkov
- Upvotes: 2
Selected Answer: E E is correct
Comment 1051501 by chokthewa
- Upvotes: 1
E is correct.
Question 8Eqa9Tpa5NBbw3hSArEx
Question
The data governance team has instituted a requirement that all tables containing Personal Identifiable Information (PH) must be clearly annotated. This includes adding column comments, table comments, and setting the custom table property “contains_pii” = true. The following SQL DDL statement is executed to create a new table: //IMG//
Which command allows manual confirmation that these three requirements have been met?
Choices
- A: DESCRIBE EXTENDED dev.pii_test
- B: DESCRIBE DETAIL dev.pii_test
- C: SHOW TBLPROPERTIES dev.pii_test
- D: DESCRIBE HISTORY dev.pii_test
- E: SHOW TABLES dev
answer?
Answer: A Answer_ET: A Community answer A (100%) Discussion
Comment 1364178 by Tedet
- Upvotes: 1
Selected Answer: A C is wrong since Property value returned by this statement excludes some properties that are internal to spark and hive. The excluded properties are:
All the properties that start with prefix spark.sql Property keys such as: EXTERNAL, comment All the properties generated internally by hive to store statistics. Some of these properties are: numFiles, numPartitions, numRows.
Comment 1339852 by RandomForest
- Upvotes: 1
Selected Answer: A Answer A is correct as explained by lexaneon
Comment 1111774 by lexaneon
- Upvotes: 3
looks like A & C are correct.. https://docs.databricks.com/en/sql/language-manual/sql-ref-syntax-aux-show-tblproperties.html#show-tblproperties
Comment 1091940 by rok21
- Upvotes: 4
Selected Answer: A correct A !
Question E1KUVy4e4WBWyVGVqha7
Question
The data governance team is reviewing code used for deleting records for compliance with GDPR. They note the following logic is used to delete records from the Delta Lake table named users. //IMG//
Assuming that user_id is a unique identifying key and that delete_requests contains all users that have requested deletion, which statement describes whether successfully executing the above logic guarantees that the records to be deleted are no longer accessible and why?
Choices
- A: Yes; Delta Lake ACID guarantees provide assurance that the DELETE command succeeded fully and permanently purged these records.
- B: No; the Delta cache may return records from previous versions of the table until the cluster is restarted.
- C: Yes; the Delta cache immediately updates to reflect the latest data files recorded to disk.
- D: No; the Delta Lake DELETE command only provides ACID guarantees when combined with the MERGE INTO command.
- E: No; files containing deleted records may still be accessible with time travel until a VACUUM command is used to remove invalidated data files.
answer?
Answer: E Answer_ET: E Community answer E (100%) Discussion
Comment 1119870 by kz_data
- Upvotes: 4
Selected Answer: E E is correct
Comment 1105105 by ervinshang
- Upvotes: 3
Selected Answer: E E is correct.
Comment 1068411 by alexvno
- Upvotes: 2
Selected Answer: E Correct
Comment 1051511 by chokthewa
- Upvotes: 2
E is correct.