Data and Analytics Management 2 Flashcards
How can system validation be used?
To enforce data type, data length, Required fields or unique entries
When are custom validation rules used?
Used for custom complex validation rules that can involve one or more fields (standard or custom)
What are the implications of validation rules?
Validates data type, filed length, enforces required fields and enforces unique setting
What happens when loading records through a Data Import tool and the required fields are blank or not matched?
Those records fail to load.
What happens when a formula in a validation rule returns a result “True”?
The record is not created or saved and an error message is displayed.
How does the unique field requirements differ from duplication rules?
The unique field requirements looks at specific fields and ensures there is no other record with that entry. Duplication rules are used for the record as a whole when only one record should exist.
What formula function is used to ensure the correct formatting of a field entry?
RegEx
What are the formats available for exporting reports?>
CSV files, Excel (.XSL or .XLSX) files.
How does the Data Export service work?
All or selected data is exported weekly, monthly or on demand (maximum once every 7 days). An email is sent with a link to a downloadable zip file which becomes an inactive link after 48 hrs.
What are the options for exporting data?
Data Loader, Exports from Reports, Data Exports Service
In which case would a user run into issues with exporting data?
Accessing export download link 3 days after link was sent; exporting data from a Sandbox environment
Which Salesforce features for Lightning Experience allow finding duplicates across the org and merging them?
Duplicate Jobs and Duplicate Record Sets
How can you ensure that a Dashboard is not accessed by someone not authorized>?
Store the dashboard in a folder that is accessible only by the authorized users
What are the different formats of reports?
Tabular, summary, matrix and joined
What impacts does the sharing model have when running reports?
Security and sharing model settings are applied when running a report so users will only see data they have access to.