Questions Flashcards
Actions to perform in sequence in Stored Procedure
Create an empty table that has the same schema
Switch partition containing the stale data
Drop the table
Rule of thumb regarding common distribution methods
Fact table - use Hash distribution with clustered columnstore index
Dimension table - use Replicated if the table is smaller. If it’s too large, use Hash.
Staging table - use Round Robin
Users with administrative privileges are ______ excluded from masking and can see the original data
never/sometimes/always
Always
Actions to perform in sequence in Databricks notebook when destination table in Azure Synapse, Azure Blob storage container, and service principle have already been created
Mount the Data Lake Storage on DBFS
Read the file into the data frame
Perform transformations on the data frame
Specify a temporary folder to stage the data
Write the results to a table in Azure Synapse
Publish changes from main branch of Git repository to ADFdev. Need to deploy the artifats from ADFdev to ADFprod. What first?
From Azure DevOps, create a release pipeline
When developing a solution that will have both streaming data and reference data and that will stream to Azure Stream Analytics, which input type should be used for reference data?
Azure Blob storage. Stream Analytics supports Blob storage and Azure SQLDatabase as the storage layer for Reference Data
Ensure automated data loads have enough memory available to complete quickly and successfully when adhoc queries run
Assign a larger resource class to the automated data load queries. Increases the available memory for the node. Less parallelization as a consequence.
Which 3 tSQL DDL commands to run in sequence to ensure that Twitter feed data can be analyzed in dedicated SQL pool?
CREATE EXTERNAL DATA SOURCE
CREATE EXTERNAL FILE FORMAT
CREATE EXTERNAL TABLE
You need to implement the surrogate key for the retail store table. What should you create?
A table that has an IDENTITY property
Recommended to use to secure sensitive customer contact information?
Column-level security. That way you can hide an entire column with sensitive data