Different types of product Master Data solutions include:
A. People Lifecycle Product Management (PLPM)
B. Product data in Manufacturing Execution Systems (MES)
C. None of the above
D. Product Data in Enterprise Resource Planning (ERP)
E. Product Lifecycle Management (PLM)
Please select valid modelling schemes or notations
A. NoSQL
B. Dimensional
C. Relational
D. Object-orientated
E. Fact-based
F. Matrix-based
Two risks with the Matching process are:
A. False positives
B. False Certainties
C. False Negatives
D. False Uncertainties
Please select the two concepts that drive security restrictions:
A. Regulation
B. Regression
C. Confidence level
D. Confidentiality level
The Zachman Framweork’s communication interrogative columns provides guidance on defining enterprise architecture. Please select answer(s) that is(are) coupled correctly:
A. What -> The inventory Column
B. What -> The entity column
C. When -> The timing column
D. Why -> The motivation column
E. Who -> The responsibility column
F. How -> The process column
Project that use personal data should have a disciplined approach to the use of that data. They should account for:
A. What activities analytics will focus on
B. How they select their populations for study
C. All of the above
D. How data will be captured
E. How results will be made accessible
Poorly managed metadata leads to:
A. Row-orientated metadata
B. Graph metadata issues
C. Redundant data and data management processes
D. Doubt about the reliability of metadata and data
E. Redundant master data
F. Document inefficiencies
Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity
A. FALSE
B. TRUE
Developing complex event processing solutions require:
A. Preparation of historical data and pre-population of a predictive model
B. Integration testing for subsequent logging requirements
C. Processing of real-time data stream to fully populate a predictive model and identify meaningful events
D. Executing the triggered action in response to the prediction
E. All of the above
F. None of the above
Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.
A. TRUE
B. FALSE
Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.
A. FALSE
B. TRUE
Data flows map and document relationships between data and:
A. Locations where local differences occur
B. Situations where local differences occur
C. Network segments
D. Applications within a business process
E. None of the above
F. All of the above
Page 10 out of 40 Pages |
Previous |