New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

DA0-001 Exam Dumps - CompTIA Data+ Certification Exam

Go to page:
Question # 17

A data analyst for a media company needs to determine the most popular movie genre. Given the table below:

Which of the following must be done to the Genre column before this task can be completed?

A.

Append

B.

Merge

C.

Concatenate

D.

Delimit

Full Access
Question # 18

Encryption is a mechanism for protecting data.

When should encryption be applied to data?

Choose the best answer.

A.

When data is at rest.

B.

When data is at rest or in transit.

C.

When data is in transit.

D.

When data is at rest, unless you are using local storage.

Full Access
Question # 19

A data analyst is asked to create a sales report for the second-quarter 2020 board meeting, which will include a review of the business’s performance through the second quarter. The board meeting will be held on July 15, 2020, after the numbers are finalized. Which of the following report types should the data analyst create?

A.

Static

B.

Real-time

C.

Self-service

D.

Dynamic

Full Access
Question # 20

Which of the following is an example of structured data?

A.

A credit card number

B.

An email

C.

A photo

D.

Social media correspondence

Full Access
Question # 21

Which one of the following in NOT a common data integration tool?

A.

XSS

B.

ELT

C.

ETL

D.

APIs

Full Access
Question # 22

Emma is working in a data warehouse and finds a finance fact table links to an organization dimension, which in turn links to a currency dimension that not linked to the fact table.

What type of design pattern is the data warehouse using?

A.

Star.

B.

Sun.

C.

Snowflake.

D.

Comet.

Full Access
Question # 23

Which one of the following would not normally be considered a summary statistic?

A.

z-score.

B.

Mean.

C.

Variance.

D.

Standard deviation.

Full Access
Question # 24

A web developer wants to ensure that malicious users can't type SQL statements when they asked for input, like their username/userid.

Which of the following query optimization techniques would effectively prevent SQL Injection attacks?

A.

Indexing.

B.

Subset of records.

C.

Temporary table in the query set.

D.

Parametrization.

Full Access
Go to page: