Within the Data Handling Ethics Context Diagram a key deliverable is the Ethical Data Handling Strategy.
Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.
While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.
Primary deliverables of the Data Warehouse and Business Intelligence context diagram include:
Data Governance includes developing alignment of the data management approach with organizational touchpoints outside of the direct authority of the Chief Data Officer. Select the example of such a touchpoint.
Domains can be identified in different ways including: data type; data format; list; range; and rule-based.
Repositories facilitate the collection, publishing and distribution of data in a centralized and possibly standardized way. Data is most often used to:
What area do you not consider when developing a 'Data Governance operating model?
Real-time data integration is usually triggered by batch processing, such as historic data.
The difference between warehouses and operational systems do not include the following element:
Customer value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as well we managing risk related to usage. Which of these is not a way to measure value?
A limitation of the centralized metadata repository approach is it may be less expensive.
Master data management includes several basic steps, which include: Develop rules for accurately matching and merging entity instances.
A critical step in data management organization design is identifying the best-fit operating model for the organization.
Examples of the ‘Who’ entity category include: employee; patient; player; and suspect.
According to the DMBoK, Data Governance is central to Data Management. In practical terms, what other functions of Data Management are required to ensure that your Data Governance programme is successful?
Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.
Every DMM and Data Governance assessment must define how the assessment team will interact with its subjects (after defining the subject/stakeholder list). This is important because:
Document and content management is defined as planning, implementation and control activities for storage management of data and information found in any form or medium.
A controlled vocabulary is a defined list of explicitly allowed terms used to index, categorize, tag, sort and retrieve content through browsing and searching.
SPARC published their three-schema approach to database management. The three key components were:
The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.
When reviewing data access plans, sequential searching is slowing the database. One
way to fix this is:
Integration of ETL data flows will usually be developed within tools specialised to manage those flows in a proprietary way.
Examples of concepts that can be standardized within the data architecture knowledge area include:
The failure to gain acceptance of a business glossary may be due to ineffective:
Use business rules to support Data Integration and Interoperability at various points, to:
Architects seek to design in a way that brings value to an organisation. To reach these goals, data architects define and maintain specifications that:
Assessment capabilities are evaluated against a pre-determined scale with established criteria. This is important because:
When constructing an organization’s operating model cultural factors must be taken into consideration.
DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.
Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.
Which of the following is not a step in the 'document and content management
lifecycle'?
A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.
Emergency contact phone number would be found in which master data
management program?
Bold means doing something that might cause short term pain, not just something that looks good in a marketing email.
A dimensional physical data model is usually a star schema, meaning there is one structure for each dimension.
The best preventative action to prevent poor quality data from entering an organisation include:
Which of the following is NOT a preventative action for creating high quality data?
The load step of the ETL is physically storing or presenting the results of the transformation into the source system.
There are numerous methods of implementing databases on the cloud. The most common are:
All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.
Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?
Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.
E-discovery is the process of finding electronic records that might serve as evidence in a legal action.
Poorly managed Metadata leads to, among other, redundant data and data management processes.
The data in Data warehouses and marts differ. Data is organized by subject rather than function
ISO 8000 will describe the structure and the organization of data quality management, including:
Small reference data value sets in the logical data model can be implemented in a physical model in three common ways:
Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?
Data parsing is the process of analysing data using pre-determined rules to define its content or value.
Over a decade an organisation has rationalised implementation of party concepts
from 48 systems to 3. This is a result of good:
In a data warehouse, where the classification lists for organisation type are
inconsistent in different source systems, there is an indication that there is a lack of
focus on:
Communications are essential to the success of a DMM or Data Governance assessment. Communications are important because:
Structural Metadata describe srealtionships within and among resource and enables identification and retrieval.
In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.
Those responsible for the data-sharing environment have an obligation to downstream data consumers to provide high quality data.
The implementation of a Data Warehouse should follow guiding principles, including:
Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:
Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:
Looking at the DMBoK definition of Data Governance, and other industry definitions, what are some of the common key elements of Data Governance?
Which of the following are must-do for any successful Data Governance programme?
Change only requires change agents in special circumstances, especially when there is little to no adoption.
Through similarity analysis, slight variation in data can be recognized and data values can be consolidated. Two basic approaches, which can be used together, are:
Data access control can be organized at an individual level or group level, depending on the need.
The term data quality refers to only the characteristics associated with high quality data.
A business driver for Master Data Management program is managing data quality.
Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?
Uniqueness, as a dimension of data quality, states no entity exists more than once within the data set.
A database uses foreign keys from code tables for column values. This is a way of
implementing:
Effective document management requires clear policies and procedures, especially regarding retention and disposal of records.
When we consider the DMBoK2 definition of Data Governance, and the various practitioner definitions that exist in the literature, what are some of the key elements of Data Governance?
The number of entities in a relationship is the arity of the relationship. The most common are:
A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.
Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.
All assessments should include a roadmap for phased implementation of the recommendations. This is important because:
Data handling ethics are concerned with how to procure, store, manage, use and dispose of data in ways that are aligned with ethical principles.
Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:
The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:
Data professionals involved in Business Intelligence, analytics and Data Science are often responsible for data that describes: who people are; what people do; where people live; and how people are treated. The data can be misused and counteract the principles underlying data ethics.
Data security issues, breaches and unwarranted restrictions on employee access to data cannot directly impact operational success.
Three classic implementation approaches that support Online Analytical Processing include:
Considerations for whether to integrate two data stores should include all except
the:
An implemented warehouse and its customer-facing BI tools is a technology product.
Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as
Deliverables in the data management maturity assessment context diagram include:
Please select the correct definition of Data Management from the options below.
The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.
Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.
Validity, as a dimension of data quality, refers to whether data values are consistent with a defined domain of values.
Record management starts with a vague definition of what constitutes a record.
Some document management systems have a module that may support different types of workflows such as:
How can the Data Governance process best support Regulatory reporting requirements?
A metadata repository is essential to assure the integrity and consistent use of an enterprise data model across business processes.
A sandbox is an alternate environment that allows write-only connections to production data and can be managed by the administrator.
Achieving security risk reduction in an organisation begins with developing what?
The advantage of a decentralized data governance model over a centralized model is:
Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.
The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:
What business function is best aligned to deliver oversight to data architecture ?
A deliverable in the data modelling and design context diagram is the logical data model.
Business glossary is not merely a list of terms. Each term will be associated with other valuable metadata such as synonyms, metrics, lineage, or:
Data governance program must contribute to the organization by identifying and delivering on specific benefits.
Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.
A data warehouse deployment with multiple ETL, storage and querying tools often
suffers due to the lack of:
Following the rollout of a data issue process, there have been no issues recorded in the first month. The reason for this might be:
Project that use personal data should have a disciplined approach to the use of that data. They should account for:
Differentiating between data and information. Please select the correct answers based on the sentence below: Here is a marketing report for the last month [1]. It is based on data from our data warehouse[2]. Next month these results [3] will be used to generate our month-over-month performance measure [4].
To build models, data modellers heavily rely on previous analysis and modelling work.
Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.
Changes to reference data do not need to be management, only metadata should be managed.
You have completed analysis of a Data Governance issue in your organisation and have presented your findings to the executive management team. However, your findings are not greeted warmly and you find yourself being blamed for the continued existence of the issue. What is the most likely root cause for this?
Referential Integrity (RI) is often used to update tables without human intervention. Would this be a good idea for reference tables?
Malware refers to any infectious software created to damage, change or improperly access a computer or network.
Corrective actions are implemented after a problem has occurred and been detected.
Data mining is a sub-field of supervised learning where users attempt to model data elements and predict future outcomes through the evaluation of probability estimates.
Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.
Tools required to manage and communicate changes in data governance programs include
The process of building architectural activities into projects also differ between methodologies. They include:
Several global regulations have significant implications on data management practices. Examples include:
The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.
One of the deliverables in the Data Integration and Interoperability context diagram is: