Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

IBM C2090-417 Dumps

IBM
IBM Certified Solution Developer - WebSphere Information Analyzer v8.0
IBM
IBM Certified Solution Developer - WebSphere Information Analyzer v8.0

Questions & Answers for IBM C2090-417

Showing 1-15 of 111 Questions

Question #1

During profiling, you did not find any single column candidate primary keys for one table.
You would like to see Information Server find a candidate primary key. How do you
proceed to do this for only the one table?

A. Run a multi-column primary key analysis but select only the one column and change composite max to 1.

B. Go to Overview, Project Properties and choose the Analysis Settings tab. Select the options to ignore duplicate rows.

C. Go to Overview, Project Properties and choose the Analysis Settings tab. Change the Primary Key Threshold at the project level.

D. Go to Overview, Project Properties and choose the Analysis Settings tab. Change the Primary Key Threshold at the Data Source level.

Question #2

Which two statements are true when importing metadata describing a data source?
(Choose two.)

A. Column definitions can be changed by the user during import.

B. Metadata can be discovered by using the Identify Next Level function.

C. Discovered metadata is automatically imported into the analysis database.

D. Metadata for table and column definitions can be discovered using the Identify All Levels function.

Question #3

What are two valid ways of connecting Audit Stage to a database? (Choose two.)

A. JDBC

B. federation

C. Information Analyzer

D. direct database connection

Question #4

Which architectural component applies to both Information Analyzer and Audit Stage?

A. XMeta

B. domain

C. client interface

D. parallel engine

Question #5

Given a column with 4 data values of Y, N, [null], and [spaces], what is an approach to
modify the system inference of data classification?

A. Delete the [null] and [spaces] values.

B. Add a new data classification in the metadata management screen.

C. Set the [null] and [spaces] values to incomplete, save, and rebuild the inferences.

D. Add a note to the column and publish the analysis results so the developers can correct.

Question #6

Which two components can be used to extend metadata definitions? (Choose two.)

A. terms

B. classes

C. data types

D. data stores

Question #7

In a scenario where you are reviewing the Baseline Summary for the BillTo table, what
does a value of 16 indicate in the Number of Incomplete Values?

A. The BillTo table has 16 columns with variances in incomplete values.

B. The BillToNo column has 16 more invalid values in the current analysis.

C. The BillTo table has 16 more incomplete values in the current analysis.

D. The BillToRef column has 16 fewer incomplete values in the current analysis.

Question #8

Which three steps must be completed to make a data source available for analysis in
Information Analyzer? (Choose three.)

A. Define a host computer.

B. Import the source metadata.

C. Import a sample set of source records.

D. Define an ODBC connection to the data source.

E. Define an ODBC connection to the IADB repository.

Question #9

Which two measures for defects can be monitored with Audit Stage metrics? (Choose two.)

A. counts

B. percents

C. parts per million

D. variances from benchmark

Question #10

When choosing the task to publish analysis results to the metadata repository, there are
three options available. What are two of these options? (Choose two.)

A. baseline

B. checkpoint

C. all historical results

D. frequency distributions

Question #11

Two tables named Customer and Supplier contain a column named "phone_number".
Which Information Analyzer process is used to determine commonality between these two
tables based on "phone_number"?

A. column analysis

B. foreign key analysis

C. primary key analysis

D. cross domain analysis

Question #12

Which two Information Analyzer functions provide the capability to classify data
independent of the data class? (Choose two.)

A. terms

B. policies

C. formats

D. user classifications

Question #13

Which three steps must be completed prior to analyzing a data source in Information
Analyzer? (Choose three.)

A. Create an Information Analyzer project.

B. Import source metadata into Data Stage.

C. Create a valid Information Analyzer userid.

D. Map a valid operating system user ID with Data Stage credentials.

E. Configure a Data Stage project to read and write to the source data.

Question #14

You are profiling a very large table with over 60 columns which does not have a single
column candidate for the primary key. You have an old data model which specifies six
columns as the multi-column primary key. How would you validate only the specific six
columns as a multi-column candidate primary key?

A. Run a primary key analysis to check for candidates.

B. Run a multi-column primary key analysis selecting all candidate columns and set composite max equal to 6.

C. Create a virtual column with all six candidate columns and run a column analysis on it to check for uniqueness.

D. Create a data sample and run a multi-column primary key analysis against all columns and set composite max equal to six.

Question #15

During profiling, you found a particular column defined as character with a length of 255.
The data for that column however appears to be all numeric with a maximum length of 8 .
You know from your business experience this column could grow to 10 numeric digits. How
should you document this finding?

A. Add a note at the project level stating this information.

B. From the View Analysis Summary window, change the inferred data type to be numeric with length 10.

C. Change the source database properties to be a numeric with length 10 and re-run the analysis to pick up the correct information.

D. From the View Analysis Summary window, choose View Details, choose the Properties tab, change the selected data type to be numeric and change the selected length to 10.

×