Time limit: 0
Quiz Summary
0 of 80 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 80 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the practice exam, but hey, you have unlimited access.😎
Practise makes you perfect! 👊 -
Congratulations! 🥳
You have passed the practice exam successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 80
1. Question
In which of the following data quality dimensions the data is following a set of standard data definitions like data type, size, and format (e.g. date of birth of customer is in the format “mm/dd/yyyy”)?
CorrectIncorrect -
Question 2 of 80
2. Question
A data analyst wants to measure how well a piece of information reflects reality.
Which of the following data quality dimensions does the data analyst need to assess?
CorrectIncorrect -
Question 3 of 80
3. Question
The ACME Corporation hired an analyst to detect data quality issues in their excel documents. Which of the following are the most common issues? (Select TWO)
CorrectIncorrect -
Question 4 of 80
4. Question
The Acme Corporation is working on a new data warehouse and business intelligence (DW/BI) project. They need to uncover data quality issues in data sources, and what needs to be corrected in Extract, transform, load (ETL).
Which of the following methods should they use to validate the data?
CorrectIncorrect -
Question 5 of 80
5. Question
Which of the following ways can be used to achieve the desired quality output for standardized names in a master data management (MDM) architecture? (Select TWO)
CorrectIncorrect -
Question 6 of 80
6. Question
Cardinality refers to the maximum number of times an instance in one entity can relate to instances of another entity while ordinality is the minimum number of times an instance in one entity can be associated with an instance in the related entity. (TRUE/FALSE)
CorrectIncorrect -
Question 7 of 80
7. Question
Which of the following policies is a set of guidelines that helps organizations keep track of how long information must be kept and how to dispose of the information when it’s no longer needed?
CorrectIncorrect -
Question 8 of 80
8. Question
Which of the following policies is shown in the given image?
CorrectIncorrect -
Question 9 of 80
9. Question
A financial analyst gathers information, assembles spreadsheets, and writes reports. He wants every time he makes changes to the files, these will be synced and updated across all of his devices.
Which of the following storage environments does the analyst need to save his file?
CorrectIncorrect -
Question 10 of 80
10. Question
Acme Corporation wants to reduce the probability of a data breach in order to reduce the risk of fines in the future.
Which of the following security requirements SHOULD they use?
CorrectIncorrect -
Question 11 of 80
11. Question
Records from governmental agencies, student records information, and existing human research subjects’ data are examples of:
CorrectIncorrect -
Question 12 of 80
12. Question
A company uses AWS cloud technologies for its scalability and high-performance features. The company wants to give access to software engineers to control the AWS infrastructure and deny access to the rest employees.
Which of the following access control method the company SHOULD use to fulfill the requirement?
CorrectIncorrect -
Question 13 of 80
13. Question
The purpose of the Geographic map is to:
CorrectIncorrect -
Question 14 of 80
14. Question
Which of the following recurring reports help General Data Protection Regulation (GDPR) to maintain and prove compliance?
CorrectIncorrect -
Question 15 of 80
15. Question
Which of the following recurring reports help companies to reach business goals, identify strengths, weaknesses, and trends?
CorrectIncorrect -
Question 16 of 80
16. Question
Static reporting requires pulling up various reports from different sources and analyzing insights from a longer time period in order to provide a snapshot of data while Dynamic reports provide deep insights, and allow users to interact with the data rather than just view it. (TRUE/FALSE)
CorrectIncorrect -
Question 17 of 80
17. Question
What’s the difference between ad-hoc and structured reports? (Select TWO)
CorrectIncorrect -
Question 18 of 80
18. Question
A company wants to create a chart that presents the growth in online sales broken down by customer type, based on the mix of channels they used similar to the one you see below.
Which of the following type of visualization is MOST suitable?
CorrectIncorrect -
Question 19 of 80
19. Question
Which of the following type of visualization is a graphical representation of word frequency that gives greater prominence to words that appear more frequently in a source text?
CorrectIncorrect -
Question 20 of 80
20. Question
Which of the following type of visualizations represents the chart below?
CorrectIncorrect -
Question 21 of 80
21. Question
A developer wants to develop a new dashboard. On the main page, he wants to show data variables and trends to help companies to make predictions about the results of data not yet recorded.
Which of the following type of visualizations should the developer apply?
CorrectIncorrect -
Question 22 of 80
22. Question
The ACME Corporation is using 2 different font families and 2 different color codes for its logo, as shown below.
Font families: 1. Roboto Regular 2. Lato Colors codes in hex: 1. #fa1d53 2. #1dfac4
The Corporation wants to develop a new dashboard for visualizing information and KPIs.
Which of the following best practices they SHOULD follow for clean dashboard development?
CorrectIncorrect -
Question 23 of 80
23. Question
Which of the following is one of the most important principles you have to take into account for dashboard development?
CorrectIncorrect -
Question 24 of 80
24. Question
Sort the steps to develop a clean and well-structured dashboard according to CompTIA dashboard development process. Starting from the top (first step) to the bottom (last step).
-
Deploy to production
-
Grant approval
-
Mockup/wireframe design
-
Develop dashboard
View Answers:
CorrectIncorrect -
-
Question 25 of 80
25. Question
Which of the following is the MOST appropriate Report Cover Page?
CorrectIncorrect -
Question 26 of 80
26. Question
An Amazon seller wants to generate a revenue report that includes the number of sales and the number of refunds between June and August.
Which of the following should the seller use to generate the report?
CorrectIncorrect -
Question 27 of 80
27. Question
A web analyst has a Microsoft Access report, listing all employees. He wants to limit the report to employees whose first names start with “N” and print the report with just that data.
Which of the following SHOULD the analyst use?
CorrectIncorrect -
Question 28 of 80
28. Question
Which of the following data analytics tools is a cloud-based platform designed to provide direct, simplified, real-time access to business data for decision-makers across the company with minimal IT involvement?
CorrectIncorrect -
Question 29 of 80
29. Question
One of the benefits of using Amazon QuickSight is:
CorrectIncorrect -
Question 30 of 80
30. Question
An online payment company wants to develop a new fraud detection system to protect customers against disputes and fraudulent payments.
Which of the following data analytics tools is MOST suitable for developing the fraud detection system?
CorrectIncorrect -
Question 31 of 80
31. Question
A data analyst is looking for software that includes accounting and budgeting templates for easy use and built-in calculating and formula features to organize and synthesize results.
Which of the following data analytics tools is MOST suitable in this case?
CorrectIncorrect -
Question 32 of 80
32. Question
A junior web developer wants to develop a new eCommerce app using python for the back end, MongoDB for the database, and Vue.js for the front end. He wants to create a simple list called apparel with three lists items (“t-shirts, hoodies, jackets”).
Which of the following command does he need to type to create the list on Python?
CorrectIncorrect -
Question 33 of 80
33. Question
Which of the following data analytics tools can execute the following command?
INSERT INTO Companies (CompanyName, ContactName, Address, City, PostalCode, Country) VALUES ('ExamsDigest', 'Nick G.', 'London St. 13', 'London', '45533', 'United Kingdom');
CorrectIncorrect -
Question 34 of 80
34. Question
A forecasting analyst wants to predict sales for a company based on weather, previous sales, and GDP growth.
Which of the following inferential statistical methods is MOST suitable for this case?
CorrectIncorrect -
Question 35 of 80
35. Question
Τype I error is the mistaken rejection of the null hypothesis, also known as a “false positive”, while a type II error is the mistaken acceptance of the null hypothesis, also known as a “false negative”. (TRUE/FALSE)
CorrectIncorrect -
Question 36 of 80
36. Question
Which of the following inferential statistical methods is a statistical test used to compare observed results with expected results?
CorrectIncorrect -
Question 37 of 80
37. Question
Which of the following inferential statistical methods is a number describing how likely it is that your data would have occurred by random chance?
CorrectIncorrect -
Question 38 of 80
38. Question
Which of the following inferential statistical methods determine if there is a significant difference between the means of two groups?
CorrectIncorrect -
Question 39 of 80
39. Question
Which of the following inferential statistical methods is a numerical measurement that describes a value’s relationship to the mean of a group of values?
CorrectIncorrect -
Question 40 of 80
40. Question
Which of the following statistical methods refers to the probability that a population parameter will fall between a set of values for a certain proportion of times?
CorrectIncorrect -
Question 41 of 80
41. Question
Suppose that we have observed the following n = 5 resting pulse rates: 64, 68, 74, 76, 78
Which of the following values is the variance of the resting pulse rates?
CorrectIncorrect -
Question 42 of 80
42. Question
Which of the following measures of dispersion would help analysts to measure market and security volatility — and predict performance trends?
CorrectIncorrect -
Question 43 of 80
43. Question
Which of the following value is the measure of dispersion “range” between the scores of ten students in a test.
The scores of ten students in a test are 17, 23, 30, 36, 45, 51, 58, 66, 72, 77.
CorrectIncorrect -
Question 44 of 80
44. Question
A data analyst wants to make a rough comparison of two graphs of variability, considering only the most extreme cases.
Which of the following measures of dispersion would effectively make the comparison?
CorrectIncorrect -
Question 45 of 80
45. Question
Consider this dataset showing the retirement age of 11 people, in whole years:
54, 54, 54, 55, 56, 57, 57, 58, 58, 60, 60
Which of the following value is the measure of the central tendency “mean”?
CorrectIncorrect -
Question 46 of 80
46. Question
Consider this dataset showing the retirement age of 11 people, in whole years:
54, 54, 54, 55, 56, 57, 57, 58, 58, 60, 60
Which of the following value is the measure of the central tendency “median”?
CorrectIncorrect -
Question 47 of 80
47. Question
Consider this dataset showing the retirement age of 11 people, in whole years:
54, 54, 54, 55, 56, 57, 57, 58, 58, 60, 60
This table shows a simple frequency distribution of the retirement age data.
AgeFrequency543551561572582602Which of the following value is the measure of the central tendency “mode”?
CorrectIncorrect -
Question 48 of 80
48. Question
Which of the following data manipulation techniques improves the accuracy and integrity of your data while ensuring that your database is easier to navigate?
CorrectIncorrect -
Question 49 of 80
49. Question
Consider the following dataset which contains information about houses that are for sale.
Which of the following string manipulation commands will replace the “St” characters in the address column with the word “Street”?
CorrectIncorrect -
Question 50 of 80
50. Question
Consider the following dataset which contains information about houses that are for sale.
Which of the following string manipulation commands will combine the address and region name columns to create a full address?
full_address ----------------------------------------- 85 Turner St, Northern Metropolitan 25 Bloomburg St, Northern Metropolitan 5 Charles St, Northern Metropolitan 40 Federation La, Northern Metropolitan 55a Park St, Northern Metropolitan
CorrectIncorrect -
Question 51 of 80
51. Question
The human resources (HR) department of the ACME Corporation needs to monitor changes in employee satisfaction over time. Which of the following data collection methods will BEST help the HR department to monitor the changes?
CorrectIncorrect -
Question 52 of 80
52. Question
A web analyst wants to display a chart of daily hits on the keyword “it certifications” for four different states with the help of Google Trends and Python.
Which of the following data collection methods will effectively request data from google trends and display them in a chart?
CorrectIncorrect -
Question 53 of 80
53. Question
A database administrator is responsible to optimise the data queries from 800ms to 300ms by using indexing.
Which of the following techniques, indexing uses to make columns faster to query?
CorrectIncorrect -
Question 54 of 80
54. Question
Which of the following SQL commands will be used to prevent SQL injection attacks?
CorrectIncorrect -
Question 55 of 80
55. Question
A web developer wants to ensure that malicious users can’t type SQL statements when they asked for input, like their username/userid. Which of the following query optimization techniques would effectively prevent SQL Injection attacks?
CorrectIncorrect -
Question 56 of 80
56. Question
A SQL database administrator wants to display the total number of employees. Which of the following SQL commands should the administrator use to display the total number?
CorrectIncorrect -
Question 57 of 80
57. Question
Consider the following data sets.
Which of the following Logical functions would return TRUE?
CorrectIncorrect -
Question 58 of 80
58. Question
Which of the following Date function commands would effectively calculate the number of days, months, or years between two dates?
CorrectIncorrect -
Question 59 of 80
59. Question
Consider the following data set.
Which of the following data manipulation techniques would arrange the data set in decreasing order of total marks so that who scored highest marks is in the top row, and who scored lowest marks is in the last row?
CorrectIncorrect -
Question 60 of 80
60. Question
A data analyst wants to show and hide information on his sheet based on selected criteria. Which of the following data manipulation techniques is most appropriate in this case?
CorrectIncorrect -
Question 61 of 80
61. Question
A data scientist wants to see which products make the most money and which products attract the most customer purchasing interest in their company.
Which of the following data manipulation techniques would he use to obtain this information?
CorrectIncorrect -
Question 62 of 80
62. Question
An online shop wants to expand its customer base using SMS marketing campaigns. The online shop has already a database with customers with the following columns.
-
First_Name
-
Last_Name
-
Email
The head of marketing wants to add one more column titled “Phone_Numbers”. Also, he wants to match the customer’s names with the respective phone numbers.
Which of the following data manipulation techniques would the head of marketing use to add the phone numbers into the database without affecting the existing data?
CorrectIncorrect -
-
Question 63 of 80
63. Question
A data analyst wants to create “Income Categories” that would be calculated based on the existing variable “Income”.
The “Income Categories” would be as follows:
-
Income category 1: less than $1
-
Income category 2: more than $1 and less than $20,000
-
Income category 3: more than $20,001 and less than $40,000
-
Income category 4: more than $40,001
Which of the following data manipulation techniques should the data analyst use to create “Income Categories”?
CorrectIncorrect -
-
Question 64 of 80
64. Question
An online shop sends orders based on the zip code customers type during the checkout process. Many orders never received the customers because customers misspell the zip code into the input field.
Which of the following solutions SHOULD the online shop implement to solve this issue?
CorrectIncorrect -
Question 65 of 80
65. Question
A database administrator designs a new database with two tables.
-
Employee
-
Department
The Employee table has the following columns:
-
Employee_birthdate
-
Employee_Year_Of_Registration_In_Company
-
Employee_Total_Years_Of_Registration
Which of the following refers to the situation that there is data in the database that can be removed without losing information?
CorrectIncorrect -
-
Question 66 of 80
66. Question
A web analyst wants to use automated bots to crawl through the internet and extract data from targeted sites. He wants the collected data to be delivered in a readable form such as CSV for further analysis.
Which of the following data collection methods is the MOST appropriate method to employ?
CorrectIncorrect -
Question 67 of 80
67. Question
Which of the following data integration processes combines data from multiple data sources into a single, consistent data store that is loaded into a data warehouse?
CorrectIncorrect -
Question 68 of 80
68. Question
Which of the following are common examples of unstructured data? (Choose TWO)
CorrectIncorrect -
Question 69 of 80
69. Question
Which of the following are common examples of structured data? (Choose TWO)
CorrectIncorrect -
Question 70 of 80
70. Question
A junior web developer is developing a new application where users can upload short videos. The first task is to create a homepage that shows the headline “Upload Your Short Videos” and a clickable button that says “upload now”.
Which of the following HTML commands would help the developer to complete the task successfully?
CorrectIncorrect -
Question 71 of 80
71. Question
A web developer is developing a new application using React.js for the front-end and Python for the backend. He wants to store data in JavaScript Object Notation (JSON) format in order to transmit the data between the web application and the server.
Which of the following formats represents a JSON file?
CorrectIncorrect -
Question 72 of 80
72. Question
Drag and drop the data file formats into their respective use cases.
Sort elements
- JSON
- XML
- HTML
- Flat
-
Transmit data in web applications
-
Provide a standard method to access information
-
Create web pages and web applications
-
Import data in data warehousing projects
CorrectIncorrect -
Question 73 of 80
73. Question
Which of the following statements BEST describes the difference between discrete and continuous data types?
CorrectIncorrect -
Question 74 of 80
74. Question
You have been tasked to create the login form for the website of your client. You design the database for the login form but you forgot to add the column that keeps a boolean type (0/1) which shows if a user has an account or not. If a user has an account, then the database should be stored the value 1, alternatively the value 0.
Which of the following data types should you use to complete the database?
CorrectIncorrect -
Question 75 of 80
75. Question
A business analyst requests an analysis of data to display a table of all of a company’s cloth products that were sold in the UK in June, compare the sales figures with those in September, and then compare them with other product sales in the UK over the same period.
Which of the following methods enables the data scientist to extract and query data in order to analyze it from different angles?
CorrectIncorrect -
Question 76 of 80
76. Question
A web developer which develops an e-commerce marketplace designs its database to capture, store and process data from transactions in real-time. The e-commerce platform will deal with many standard and straightforward queries such as insert, delete, and update and the data will be stored in 3NF (third normal form).
In which of the following databases would the developer store the data?
CorrectIncorrect -
Question 77 of 80
77. Question
Maria, a senior database manager, wants to create a new DB for the sales department. She needs to create 2 tables, Employees and Sales respectively. The Employees table contains a single row representing an employee with each employee assigned a unique id (primary key). The second table, Sales, contains individual sales records associated with the employee who made the sale.
Which of the following database types will Maria implement?
CorrectIncorrect -
Question 78 of 80
78. Question
Which of the following categories would contain information about an individual’s demographic information, medical histories, laboratory results, and mental health conditions?
CorrectIncorrect -
Question 79 of 80
79. Question
Which of the following categories would contain information about an individual’s biometric data, genetic information, and sexual orientation?
CorrectIncorrect -
Question 80 of 80
80. Question
Which of the following types of vulnerability scans an organization should perform as they store credit card information that follows the Payment Card Industry Data Security Standard (PCI DSS)?
CorrectIncorrect