When a customer wants to get sales numbers by day, how is data stored in the Star Schema, if the data is loaded nightly?
Correct Answer:
A
🗳️
The highest sales amount for this year is $10,000. If you create a rank measure for sales this year and display it on a report, the value will be________.
Correct Answer:
C
🗳️
The rank measure is numbered from 1. The highest sales amount will be ranked 1.
Which two components are required for all OBIEE installations?
Correct Answer:
BE
🗳️
B: Before you can run Oracle Business Intelligence 11g Installer, you must first create required Oracle Business Intelligence schemas in an unhardened database. You use a tool called the Repository Creation Utility (RCU) to create these schemas with the appropriate permissions and data.
E: The database 11gR2 is required if you want to run the Oracle Business Intelligence Enterprise Edition Plus Samples
One Oracle Database Preinstalled and not hardened to host the schemas.
The administration tool is the developer's interface to the repository file. It allows the development of and changes to the metadata repository file. Which statement is true?
Correct Answer:
B
🗳️
The Oracle BI repository development process adheres to the classic Software Configuration Management (SCM)process, which utilizes a three-way merge to manage concurrent development.
The merge process involves three repositories:
1. The (Original|Received|Master|Parent) repository. The repository that you received before changed. You must keep it preciously unchanged.
2. The Modified repository. The repository that contains the customizations you made to the original repository.
3. The Current repository. Generally, the repository that is in production and where some customisations could have been performed by other people.
In a multiuser environment (MUDE), Developers check out the file and make changes locally. Then, these changes are automatically reconciled and merged into the master repository.
Incorrect answers:
A: Most updates to the repository can be done in Online mode.
C: To define a complete security model, you have then to define:
1. A security structure by creating this elements:
* The directory Server User and Group managed by the authentication provider.
* The application roles managed by the policy store provider
2. a security policy (permissions) split across the following components:
*Presentation Catalog
* Repository
* Policy Store to define the Application Policies managed by the policy store provider