Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-591 - Oracle Business Intelligence Foundation Suite 11g Essentials

Page: 2 / 4
Total 120 questions

Query Limits are used to manage Query environment in the repository for users and roles and can_________.

A.

Control runaway queries

B.

Limit Queries by maximum run time

C.

Control aggregation

D.

Control User Authentication

E.

Control Write Back Capabilities

The ODBC DSN is never used for _______.

A.

Initial import of the physical layer metadata on a Windows server

B.

Query execution and data access on a Windows server

C.

Initial import of the physical layer metadata, query execution, and data access on a Windows Server

D.

Changing passwords

E.

Comparing RPDs

How will you model a Type II Slowly-Changing Dimension?

A.

Add an additional column to the dimension table to capture a version of change

B.

Overwrite an existing dimension table record with the changed record

C.

Add a new row to the dimension table with a new key for the changed record

D.

Do Nothing

Which two options are valid Repository Variable names?

A.

USER

B.

CurrentDay

C.

CurrentMonth

D.

Date

What is the process in which there is redundancy of data to improve performance?

A.

Redundancy

B.

Normalization

C.

Denormalization

D.

Granularity

E.

Cardinality

A customer frequently queries multiple dimension tables without a measure. What needs to be defined in the presentation layer?

A.

Logical Key

B.

Implicit Fact Column

C.

Alias

D.

Logical Column Name

E.

Custom Display Name

When a customer wants to get sales numbers by day, how is data stored in the Star Schema, if the data is loaded nightly?

A.

The lowest level of aggregation

B.

The highest level of aggregation

C.

Multiple levels of aggregation

D.

Independently from aggregation level

Use of the Enterprise Install option is recommended for which three options?

A.

Multiple instances on a single computer

B.

Scale out for High Availability and Failover

C.

Support for high security requirements

D.

Evaluation of end user functionality

E.

Single users working on a single computer

An organization has its employees' names in an Employees table, and information about their jobs in a Jobs table.

However, an organization's employees can have multiple jobs, and the same job can be performed by multiple employees. This situation would result in a many to-many relationship between the Employees and Jobs tables. How can the many to-many relationship issue be resolved?

A.

By modeling the many to many relationship in the business model

B.

By creating a bridge table that represents one employee doing one job, with several rows for an employee who has several jobs

C.

By creating the many to many join in the physical model

D.

By creating a logical table source (LTS) that joins the Employees and Jobs tables

Which task can be performed after the Administrator link has been reached through logging into OBIEE?

A.

Associate map layers to columns

B.

Manage access to Subject Areas

C.

SSO enablement

D.

Start or Stop BI Managed Servers