#create dblink in oracle
Explore tagged Tumblr posts
Text
How to Get DB Link DDL in oracle
How to Get DB Link DDL in oracle #oracle #oracledba #oracledatabase
how to get ddl for db_link in oracle with password, export db_link with password, drop db link, dbms_metadata.get_ddl dblink, get public db link ddl in oracle, drop db link in oracle. Viewing Information About Database Links Oracle has three data dictionary views listed below, which help us to find the information about DB links. View NamePurposeDBA_DB_LINKSShow the list of all DB Links from…
View On WordPress
#create database link#create dblink in oracle#dbms_metadata.get_ddl dblink#drop db link#drop db link in oracle#export db_link with password#how to get ddl for db_link in oracle with password#how to get public db link ddl in oracle
0 notes
Text
300+ TOP SAP BO Interview Questions and Answers
SAP BO Interview Questions for freshers experienced :-
1. What is SAP BO? Business object can be considered as integrated analysis, reporting and query for the purpose of finding a solution to some business professionals that can be helpful for them to retrieve data from the corporate databases in a direct manner from the desktop. This retrieved information can be presented and analyzed within a document that of business objects. Business objects can be helpful as an OLAP tool to high-level management as a significant part of Decision Support Systems. 2. Explain the advantages of using business objects. There are many advantages in making use of business objects, and they are User friendliness Familiar business terms Graphical interface Deployment of documents on an enterprise basis by making use of WebI Dragging and dropping Powerful reports for a lesser amount of time. 3. Explain the different products related to Business Objects. There are various kinds of products related to business objects, and they are User module Designer Supervisor Auditor Set Analyzer Info View Business Objects – Software Development – Kit Broadcast Agent 4. What is Designer ? The designer is a module related to Business Objects IS used by the designers for creating and maintaining universes. Universes can be considered as a semantic layer that can isolate the end users from the various issues that are technical and related to the structure of the database. Universe designers have the possibility for distributing the universes to the end users after moving these as a file through the system of files or can be done by exporting the files to the repository. 5. What are the kinds of modes associated with designer and business objects? There are especially two different kinds of modes associated with these platforms, they are Enterprise mode Workgroup mode 6. List out the various kinds of methods related to multidimensional analysis that is inside business objects. There are two different methods related to multidimensional analysis available inside BO and these methods are Slice & Dice Drill down 7. List out the kinds of users associated with business objects. Different kinds of users associated with the business object are General supervisor Supervisor Graphical Interface Designer Supervisor Designer End User Versatile User 8. What are the various data sources available? Business objects help you in accessing the data from a variety of sources. You have the possibility of obtaining data from RDBMS like Oracle, MS SQL server and IBM DB2. 9. Define the kinds of data providers? There are various kinds of data providers available for the business objects, and they are Stored procedures Queries over universe Freehand – SQL VBA procedures SAP OLAP servers Personal data files 10. Define the drill mode. Drill is a kind of analysis mode associated with business objects and helps in breaking down data as well as in viewing data from all the possible angles and the levels of detail for discovering the factor that has caused a good or a bad result.
SAP BO Interview Questions 11. What is a personal connection? A personal connection can be created only by a single user, and it can’t be made used by others. The details regarding such a connection can be usually stored inside PDAC.LSI file. 12. What is Shared connection? This is a kind of connection that is usually used by another user via a server which is a shared one. The details regarding the connection can be stored within the SDAC>LSI file which can be found within the installation folder of the business objects. 13. What is a secured connection? Secured connection is a kind of connection that can be helpful in overcoming the various limitations associated with the former connections. The rights related to this kind of connection can be set over documents as well as objects. Universes can be brought inside the central repository only by making use of the secured connection. The parameters regarding these connection care usually saved inside CMS. 14. Define custom hierarchies? The custom hierarchies can be used for defining the universe for facilitating drill down that is customized and can happen between objects from different or same classes considering the user requirements. 15. How can custom Hierarchies be created? The custom hierarchies can be created by following the path tools ->hierarchies in BO designer. 16. Define a context in the universe. Context can be defined as the particular path of the join between a specific group of joins or the tables for the purpose of a particular query. A particular object that can be found inside the column of a table, belonging to particular context is supposed to be compatible with all the various kinds of objects belonging to the same context. In the case of objects that are from the various kinds of context, different kinds of SQL can be generated, and the results can be merged inside the micro cube. This is for making sure that there is no incorrect result associated with a loop or any other kind of issue related with join path. 17. How can Contexts be created? Context can be created by making use of feature associated with context or by manual procedures. The context is usually created by making use of logical calculation or based on the business requirements. The detect context may not be much useful in this case and so it should be done by making use of the manual procedure. 18. Define a Chasm Trap. Chasm trap is a condition that arises when the values inside the fact table get inflated at the time of measuring the values from two different fact tables by considering the dimensions inside the dimension table. 19. How can Chasm Trap be solved? Chasm trap should be solved by making use of two different methods. In the case of SQL parameters in the universe, the option generates numerous queries for each and every measure that needs to be chosen. This helps in generating a SQL statement for every measure and gives the correct results. Another approach is to include two joints in different contexts, where the problem will get solved by generating two synchronized queries. 20. What are the utilities of Derived tables? Using SQL queries from the database level, Derived tables are created in the universe. The columns of the derived table will be the columns selected in the query. Derived table can be used in the complex calculations which are difficult to be achieved in the report levels. Using a dblink, tables can be accessed from a different schema, is another use of derived tables. 21. Define User Objects. User objects are a universe of classes and objects which is created by the universe designer. Once the objects consisted of the universe does not match your necessities, then the user can create his own objects called User objects. 22. List out the @functions. The @functions are: @Aggregate_Aware @Script @Select @Variable @where @Prompt 23. What is the use of @functions? The @prompt function asks the end user to enter any specific values. The Visual Basics for applications macro’s results will be recovered by using @Script function. An existing statements SELECT statement can be re-used by using @Select function. For a name or variable, the value assigned to it will be referenced using @Variable. An existing object’s where clause can be re-used by @Where functions. 24. How many Domains are there in Business Objects? What are they? There are three Domains in Business Objects and they are: Security Document Universe 25. How to access one derived table from another? Using @Derived_table function, we can access one derived table from another. The syntax is: @derived_table(the derived table name) 26. What is Slice in Business Objects. Slice works with the master or detail reports and it is used to rename, reset and delete the blocks. 27. Differentiate Dice and Slice. Slice: It renames, reset and delete the blocks. It works with the master/detail report. Dice: It displays the data and removes the data. It turns the crosstabs and tables into charts and vice versa. 28. What is a master/detail report? Large blocks of data can be split into sections by using master/detail report. Repeating values can be avoided by using this and also the subtotals can be displayed. 29. What is a class. The class can be defined as a collection of objects in a universe. Subclasses can be derived from classes and using these classes and the subclasses, we can create a hierarchy. 30. How many approaches are there for linking universes? There are three approaches available for linking the universes and they are: The Kernal approach. The Master approach. The Component approach. 31. What is data mining? Data mining is the process through which you can extract the required details from the database, which can be made used for making conclusions. 32. List out the available Drill modes. Drill mode helps to analyze data from different angles and different state of details. The available Drill modes are; Drill up. Drill down. Drill by. Drill through. 33. What is aggregate_awarness. when we have the same fact tables in different grains, we use the aggregate_awarness function to define one object for measures in fact tables. The syntax is as @aggregate_aware(highest_level.lower level) 34. What is the term fan trap? A one to many join, links to a table which respond with another one to many join links is called fan trap. 35. What is Data provider. The query or the data source is called as the data provider. 36. When we use a context? Context is created when the dimension objects are present in one or both fact tables. 37. What is the standard mode? Only the users within the group can be accessed in this mode. 38. List out the schemas supported by Business Objects Designer. There are five different schemas supported by Business Objects designer and they are: star schema. Snowflake Schema Multistar Schema Normalized production schema. Data warehouse with aggregates. 39. What is a Channel? Channel is a website with ‘push’ technology. It is to make the users know up-to-date information. Each and every Business Objects channel will be associated with a broadcast agent, who can have several channels. 40. What are the restrictions over user objects? User objects are not shared with other end users. It is stored in a specific user object definition file. So if any end-user tries to refresh or edit the query contains another user’s user object, it will be automatically cleaned and removed. 41. List out the tasks of universe designer. The tasks consist of, Designing the universe. Creating the universe. Maintaining the universe. Distributing the universe 42. List out the main components of the designer interface. The main components it consists of are: The table browser. The structure pane. The universe pane. 43. What do you mean by report bursting? To maintain the version documents according to the user profiles, we use report bursting. 44. What is WEBI. Web intelligence is a solution that is specialized in supporting decisions related to queries, reports, and analysis. 45. Abbreviation of DSS is? Decision Support Systems. 46. Define strategies. To automatically extract structural information from a database or from a flat file we use a script known as strategy. 47. Define the universe. It is a set of objects and classes. These objects and classes will be intended for an application or a group of users. 48. Define secured mode. Secured mode restricts the access of specific users over specific commands. 49. What is Drill by? Using drill by we can move to other hierarchy and analyze the other data, which belongs to another hierarchy. 50. What is a list of values? It is a file which contains the data values associated with an object. 51. Define Data Services components. Data Services includes the following standard components: Designer Repository Job Server Engines Access Server Adapters Real-time Services Address Server Cleansing Packages, Dictionaries, andDirectories Management Console 52. What are the steps included in Data integration process? Stage data in an operational datastore, data warehouse, or data mart. Update staged data in batch or real-time modes. Create a single environment for developing, testing, and deploying the entire data integration platform. Manage a single metadata repository to capture the relationships between different extraction and access methods and provide integrated lineage and impact analysis. 53. Define the terms Job, Workflow, and Dataflow. A job is the smallest unit of work that you can schedule independently for execution. A work flow defines the decision-making process for executing data flows. Data flows extract, transform, and load data. Everything having to do with data, including reading sources, transforming data, and loading targets, occurs inside a data flow. 54. What is the use of Case Transform? Use the Case transform to simplify branch logic in data flows by consolidating case or decision-making logic into one transform. The transform allows you to split a data set into smaller sets based on logical branches. 55. What must you define in order to audit a data flow? You must define audit points and audit rules when you want to audit a data flow. 56. List some factors for PERFORMANCE TUNING in data services? The following sections describe ways you can adjust Data Integrator performance: Source-based performance options Using array fetch size Caching data Join ordering Minimizing extracted data Target-based performance options Loading method and rows per commit Staging tables to speed up auto-correct loads Job design performance options Improving throughput Maximizing the number of pushed-down operations Minimizing data type conversion Minimizing locale conversion Improving Informix repository performance 57. What are Cleansing Packages? These are packages that enhance the ability of Data Cleanse to accurately process various forms of global data by including language-specific reference data and parsing rules. 58. What is Data Cleanse? The Data Cleanse transform identifies and isolates specific parts of mixed data, and standardizes your data based on information stored in the parsing dictionary, business rules defined in the rule file, and expressions defined in the pattern file. 59. What is the difference between Dictionary and Directory? Directories provide information on addresses from postal authorities. Dictionary files are used to identify, parse, and standardize data such as names, titles, and firm data. 60. Give some examples of how data can be enhanced through the data cleanse transform, and describe the benefit of those enhancements. Enhancement Benefit Determine gender distributions and target Gender Codes marketing campaigns Provide fields for improving matching Match Standards results SAP BO Questions and Answers Pdf Download Read the full article
0 notes
Text
Create and list the SYNONYM objects in Oracle
Create and list the SYNONYM objects in Oracle
Create and list the SYNONYM objects in Oracle
SYNONYM is used to give the alternative name to the objects for make your database object name more secure. You can also give synonym name to the database link to make it short or easy to use instead of defining the dblink again and again. You can create alternative name of a table, view, sequence, procedure, stored function, and materialized view.
C…
View On WordPress
0 notes
Text
Next challenges for the firewall technologies and for their administrators
The functionality of firewalls tries to find the right balance between the required security and the required service providing from the beginning. Earlier, firewalls just hid the internal network from the ‘dangerous’ Internet, but now firewalls deploy applications, make authentication and authorization, discover and prevent attacks, threats and malicious contents. Functionality changes have followed the possible implementing places of firewalls. From the borderline, firewalls have conquested new places inside the internal network between desktop and server networks, defending the most important data inside internal networks and adding extra services as a (HA) load balancer and so on.
Firewall vendors have been trying to fulfill new requirements and sometimes spend a lot of money on unrequested and usefulness things. As the complexity has grown up, management interfaces look like a mixed dashboard of the ISS and Wanamaker-organ together.
Challenges of the past
In the ‘stone age,’ the network was simple: the net had consisted of two parts: internal and external sides and in the middle there had been the firewall.
The appearance of the DMZ just divided the server network into internal and demilitarized zones, from viewpoints of the desktops.
The next step was when firewalls defended the server farm from malicious desktops. The functionality of the firewalls has been extended with ids/ips services.
Nowadays firewalls can run as VPN gateway, ids/ips, load balancer, web filter, content filter, virus scanner, client authenticator, router, application publisher and so on. However, integration with NAC systems or the radius based 8021x authentication systems cannot be seen as easy, if it is possible at all.
-------------------------------------------------------------
Solutions to tasks required by new technologies are as follows
In clouds and in DC’s:
From the viewpoint of the server infrastructure, new IT models like DevOps, cloud solutions create some new challenges and requests, as the quantity of servers and the requested connectivity could change in every minute.
In this case, the connectivity of servers does not need more sophisticated rulesets, as masses of servers work in the same configuration and have the same functionality. The connectivity is simple, as it contains just some ports and protocols. The external service level access does not often require special things: all servers are clones of a well-configured server, and if something goes wrong, it is better to destroy all affected clones and re-generate them based on the fixed one.
SDN without virtualized firewall solutions doesn't exist, but the functionality of the firewall doesn’t require all-inclusive services in the firewalls on their layer3 points which control the traffic between different parts of the clouds: access control for the other server connectivity and dynamical routing functionality probably are enough; in addition load balancing could also be option.
In a well-planned software structure, direct access from desktops is not necessary.
An interesting method could be when some kind of servers are configurated without default route. All requested connectivity should be well known before the creation of servers in cloud and just some static route should be enough for the connectivity. In this case, servers will be unavailable from other nodes and for the attackers, as well.
Desktops:
BYOD, homeworking and new threats of ransomware increase the requested firewall functionality and tasks too, from a desktop side. Integration with NAC and the 8021x solutions will also create challenges for admins and for firewalls. The Kerberos or radius based centralized authorization solutions can improve the security. If infrastructure is able to support these solutions from workplace switches to servers, security will be raised. Automatic policy deploying into security points is required, as well.
It could be an alternative way - provided that the structure is declared to this - if all desktop clients run as a homeworking desktop and it does not really matter, where they are. The entry points between the desktop environments and the server environments are similar. All desktops from all places are connecting through a centralized application deploying service. In this case, entry points need more powerful machines. Implementing phases of this functionality into employees’ culture may not be too easy, however, because if implementation of this functionality does not contain more advantages and new user experiences, they will just see it as a new obstacle in their work.
Nowadays, employees prefer to see the same functionality on their desk, regardless of where it actually is: at home or in the office building. Contrarily, a lot of well-known functions are very dangerous and outworn, as file server services, dblink based applications and so on.
IMHO, I would try to cut back file server functionality and file-based workflows, because when an employee makes a copy of a document into desktop (forking of the contents), this document could leave the defended infrastructure and this could be a possible leaking point. In addition, the back copy procedure may open the infrastructure for dangerous contents.
Firewalls can report the copying procedure, handle viruses, however new threats could be faster than the update.
Nowadays, Sharepoint-based solutions can handle these requests. If advantages of Sharepoint (or different SharePoint-like solutions) contain more comfortable features than simple file server solutions, the migration/implementation will be easier. The reason is that all users are conservative when changes affect their working-tools.
Ransomware's attack throughout file server functionality, as well. Forking of contents demands more human resources if somebody wants to merge different versions of documents. And this is the point where shared Documentum functionality can overtake file servers. Prerequisites are just Internet connection and well-configured access services.
Different ways
Leading firewall vendors have recognized these changes and they usually have two different ways to reply:
Lightweight, but fast configuration capabilities and functionality inside clouds without appliances on the layer-3 endpoints, uniting the routing and firewall functions. This is the way for the software-defined networks. In this point, automatic configuration is more important than the available, but unused firewall services
Improved functionality and integration on the borders with different security systems (NAC, Radius, Kerberos, LDAP, AD, etc.) on firewalls that are between the desktops, internet, and server farms. Here, sophisticated configurations and collaborations with other systems are more important.
Automated API based configuration of the firewall is required in both cases, and another important aspect is that in the first case, integration can be done with different cloud management platforms like ansible or puppets. In the second case, the collaboration with the other systems is strongly required.
Actually, I am waiting for an integrator solution which is similar to the Oracle Fusion for servers and middlewares. I think this could hide different syntaxes of the API and make integration with other systems easier.
My view is that in the near future firewall admins have two different ways to follow: transforming themselves into ticketing machines and trying to follow waves of daily requests or improving their programming abilities for automated configurations.
Interesting links:
http://opnsense.firewallhardware.it/en/pfsense_vs_opnsense.html#comparativa
https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/technical-documentation/pan-os-70/XML-API-7.0.pdf
https://www.juniper.net/documentation/en_US/junos/information-products/pathway-pages/rest-api/rest-api.html
http://dl3.checkpoint.com/paid/71/718e475bf948f4782792b83fd006400e/CP_ZeroTouch_REST_API_UserGuide.pdf?HashKey=1507809588_6bce391602aa1318390aa985b78e74eb&xtn=.pdf
http://docs.fortinet.com/uploaded/files/3316/FortiGate%20Connector%20for%20OpenStackML2%20Plugin%20v.1.1%20-%20Administration%20Guide.pdf
https://community.checkpoint.com/events/1023-how-to-use-r8010-api-for-automation-and-streamlined-security
https://www.sans.org/reading-room/whitepapers/authentication/two-factor-authentication-2fa-openotp-36087
http://www.firewalld.org/
https://turbofuture.com/internet/How-to-Set-Up-a-Radius-Server-on-pfSense-Using-the-FreeRadius-Package
https://github.com/evgeny-gridasov/openvpn-otp
https://github.com/ndejong/pfsense_fauxapi
0 notes
Text
ORA-02019: connection description for remote database not found
I'm facing this error "ORA-02019: connection description for remote database not found" during making a connection with the DB link. #oracle #oracledba #oracledatabase
Hi, I’m facing this error “ORA-02019: connection description for remote database not found” during making a connection with the DB link. ORA-02019 SQL> select sysdate from dual@xdb_link; select sysdate from dual@xdb_link * ERROR at line 1: ORA-02019: connection description for remote database not found This could be happening because of the wrong DB link name or a TNS entry missing of the…
View On WordPress
#connection description for remote database not found in informatica#create database link#ORA-02019#ora-02019 burleson#ora-02019 database link error#ora-02019 ora 02063#ORA-02019: connection description#ora-02063: preceding line from dblink 19c#ora-02085#oracle links
0 notes
Text
300+ TOP SAP BO Interview Questions and Answers
SAP BO Interview Questions for freshers experienced :-
1. What is SAP BO? Business object can be considered as integrated analysis, reporting and query for the purpose of finding a solution to some business professionals that can be helpful for them to retrieve data from the corporate databases in a direct manner from the desktop. This retrieved information can be presented and analyzed within a document that of business objects. Business objects can be helpful as an OLAP tool to high-level management as a significant part of Decision Support Systems. 2. Explain the advantages of using business objects. There are many advantages in making use of business objects, and they are User friendliness Familiar business terms Graphical interface Deployment of documents on an enterprise basis by making use of WebI Dragging and dropping Powerful reports for a lesser amount of time. 3. Explain the different products related to Business Objects. There are various kinds of products related to business objects, and they are User module Designer Supervisor Auditor Set Analyzer Info View Business Objects – Software Development – Kit Broadcast Agent 4. What is Designer ? The designer is a module related to Business Objects IS used by the designers for creating and maintaining universes. Universes can be considered as a semantic layer that can isolate the end users from the various issues that are technical and related to the structure of the database. Universe designers have the possibility for distributing the universes to the end users after moving these as a file through the system of files or can be done by exporting the files to the repository. 5. What are the kinds of modes associated with designer and business objects? There are especially two different kinds of modes associated with these platforms, they are Enterprise mode Workgroup mode 6. List out the various kinds of methods related to multidimensional analysis that is inside business objects. There are two different methods related to multidimensional analysis available inside BO and these methods are Slice & Dice Drill down 7. List out the kinds of users associated with business objects. Different kinds of users associated with the business object are General supervisor Supervisor Graphical Interface Designer Supervisor Designer End User Versatile User 8. What are the various data sources available? Business objects help you in accessing the data from a variety of sources. You have the possibility of obtaining data from RDBMS like Oracle, MS SQL server and IBM DB2. 9. Define the kinds of data providers? There are various kinds of data providers available for the business objects, and they are Stored procedures Queries over universe Freehand – SQL VBA procedures SAP OLAP servers Personal data files 10. Define the drill mode. Drill is a kind of analysis mode associated with business objects and helps in breaking down data as well as in viewing data from all the possible angles and the levels of detail for discovering the factor that has caused a good or a bad result.
SAP BO Interview Questions 11. What is a personal connection? A personal connection can be created only by a single user, and it can’t be made used by others. The details regarding such a connection can be usually stored inside PDAC.LSI file. 12. What is Shared connection? This is a kind of connection that is usually used by another user via a server which is a shared one. The details regarding the connection can be stored within the SDAC>LSI file which can be found within the installation folder of the business objects. 13. What is a secured connection? Secured connection is a kind of connection that can be helpful in overcoming the various limitations associated with the former connections. The rights related to this kind of connection can be set over documents as well as objects. Universes can be brought inside the central repository only by making use of the secured connection. The parameters regarding these connection care usually saved inside CMS. 14. Define custom hierarchies? The custom hierarchies can be used for defining the universe for facilitating drill down that is customized and can happen between objects from different or same classes considering the user requirements. 15. How can custom Hierarchies be created? The custom hierarchies can be created by following the path tools ->hierarchies in BO designer. 16. Define a context in the universe. Context can be defined as the particular path of the join between a specific group of joins or the tables for the purpose of a particular query. A particular object that can be found inside the column of a table, belonging to particular context is supposed to be compatible with all the various kinds of objects belonging to the same context. In the case of objects that are from the various kinds of context, different kinds of SQL can be generated, and the results can be merged inside the micro cube. This is for making sure that there is no incorrect result associated with a loop or any other kind of issue related with join path. 17. How can Contexts be created? Context can be created by making use of feature associated with context or by manual procedures. The context is usually created by making use of logical calculation or based on the business requirements. The detect context may not be much useful in this case and so it should be done by making use of the manual procedure. 18. Define a Chasm Trap. Chasm trap is a condition that arises when the values inside the fact table get inflated at the time of measuring the values from two different fact tables by considering the dimensions inside the dimension table. 19. How can Chasm Trap be solved? Chasm trap should be solved by making use of two different methods. In the case of SQL parameters in the universe, the option generates numerous queries for each and every measure that needs to be chosen. This helps in generating a SQL statement for every measure and gives the correct results. Another approach is to include two joints in different contexts, where the problem will get solved by generating two synchronized queries. 20. What are the utilities of Derived tables? Using SQL queries from the database level, Derived tables are created in the universe. The columns of the derived table will be the columns selected in the query. Derived table can be used in the complex calculations which are difficult to be achieved in the report levels. Using a dblink, tables can be accessed from a different schema, is another use of derived tables. 21. Define User Objects. User objects are a universe of classes and objects which is created by the universe designer. Once the objects consisted of the universe does not match your necessities, then the user can create his own objects called User objects. 22. List out the @functions. The @functions are: @Aggregate_Aware @Script @Select @Variable @where @Prompt 23. What is the use of @functions? The @prompt function asks the end user to enter any specific values. The Visual Basics for applications macro’s results will be recovered by using @Script function. An existing statements SELECT statement can be re-used by using @Select function. For a name or variable, the value assigned to it will be referenced using @Variable. An existing object’s where clause can be re-used by @Where functions. 24. How many Domains are there in Business Objects? What are they? There are three Domains in Business Objects and they are: Security Document Universe 25. How to access one derived table from another? Using @Derived_table function, we can access one derived table from another. The syntax is: @derived_table(the derived table name) 26. What is Slice in Business Objects. Slice works with the master or detail reports and it is used to rename, reset and delete the blocks. 27. Differentiate Dice and Slice. Slice: It renames, reset and delete the blocks. It works with the master/detail report. Dice: It displays the data and removes the data. It turns the crosstabs and tables into charts and vice versa. 28. What is a master/detail report? Large blocks of data can be split into sections by using master/detail report. Repeating values can be avoided by using this and also the subtotals can be displayed. 29. What is a class. The class can be defined as a collection of objects in a universe. Subclasses can be derived from classes and using these classes and the subclasses, we can create a hierarchy. 30. How many approaches are there for linking universes? There are three approaches available for linking the universes and they are: The Kernal approach. The Master approach. The Component approach. 31. What is data mining? Data mining is the process through which you can extract the required details from the database, which can be made used for making conclusions. 32. List out the available Drill modes. Drill mode helps to analyze data from different angles and different state of details. The available Drill modes are; Drill up. Drill down. Drill by. Drill through. 33. What is aggregate_awarness. when we have the same fact tables in different grains, we use the aggregate_awarness function to define one object for measures in fact tables. The syntax is as @aggregate_aware(highest_level.lower level) 34. What is the term fan trap? A one to many join, links to a table which respond with another one to many join links is called fan trap. 35. What is Data provider. The query or the data source is called as the data provider. 36. When we use a context? Context is created when the dimension objects are present in one or both fact tables. 37. What is the standard mode? Only the users within the group can be accessed in this mode. 38. List out the schemas supported by Business Objects Designer. There are five different schemas supported by Business Objects designer and they are: star schema. Snowflake Schema Multistar Schema Normalized production schema. Data warehouse with aggregates. 39. What is a Channel? Channel is a website with ‘push’ technology. It is to make the users know up-to-date information. Each and every Business Objects channel will be associated with a broadcast agent, who can have several channels. 40. What are the restrictions over user objects? User objects are not shared with other end users. It is stored in a specific user object definition file. So if any end-user tries to refresh or edit the query contains another user’s user object, it will be automatically cleaned and removed. 41. List out the tasks of universe designer. The tasks consist of, Designing the universe. Creating the universe. Maintaining the universe. Distributing the universe 42. List out the main components of the designer interface. The main components it consists of are: The table browser. The structure pane. The universe pane. 43. What do you mean by report bursting? To maintain the version documents according to the user profiles, we use report bursting. 44. What is WEBI. Web intelligence is a solution that is specialized in supporting decisions related to queries, reports, and analysis. 45. Abbreviation of DSS is? Decision Support Systems. 46. Define strategies. To automatically extract structural information from a database or from a flat file we use a script known as strategy. 47. Define the universe. It is a set of objects and classes. These objects and classes will be intended for an application or a group of users. 48. Define secured mode. Secured mode restricts the access of specific users over specific commands. 49. What is Drill by? Using drill by we can move to other hierarchy and analyze the other data, which belongs to another hierarchy. 50. What is a list of values? It is a file which contains the data values associated with an object. 51. Define Data Services components. Data Services includes the following standard components: Designer Repository Job Server Engines Access Server Adapters Real-time Services Address Server Cleansing Packages, Dictionaries, andDirectories Management Console 52. What are the steps included in Data integration process? Stage data in an operational datastore, data warehouse, or data mart. Update staged data in batch or real-time modes. Create a single environment for developing, testing, and deploying the entire data integration platform. Manage a single metadata repository to capture the relationships between different extraction and access methods and provide integrated lineage and impact analysis. 53. Define the terms Job, Workflow, and Dataflow. A job is the smallest unit of work that you can schedule independently for execution. A work flow defines the decision-making process for executing data flows. Data flows extract, transform, and load data. Everything having to do with data, including reading sources, transforming data, and loading targets, occurs inside a data flow. 54. What is the use of Case Transform? Use the Case transform to simplify branch logic in data flows by consolidating case or decision-making logic into one transform. The transform allows you to split a data set into smaller sets based on logical branches. 55. What must you define in order to audit a data flow? You must define audit points and audit rules when you want to audit a data flow. 56. List some factors for PERFORMANCE TUNING in data services? The following sections describe ways you can adjust Data Integrator performance: Source-based performance options Using array fetch size Caching data Join ordering Minimizing extracted data Target-based performance options Loading method and rows per commit Staging tables to speed up auto-correct loads Job design performance options Improving throughput Maximizing the number of pushed-down operations Minimizing data type conversion Minimizing locale conversion Improving Informix repository performance 57. What are Cleansing Packages? These are packages that enhance the ability of Data Cleanse to accurately process various forms of global data by including language-specific reference data and parsing rules. 58. What is Data Cleanse? The Data Cleanse transform identifies and isolates specific parts of mixed data, and standardizes your data based on information stored in the parsing dictionary, business rules defined in the rule file, and expressions defined in the pattern file. 59. What is the difference between Dictionary and Directory? Directories provide information on addresses from postal authorities. Dictionary files are used to identify, parse, and standardize data such as names, titles, and firm data. 60. Give some examples of how data can be enhanced through the data cleanse transform, and describe the benefit of those enhancements. Enhancement Benefit Determine gender distributions and target Gender Codes marketing campaigns Provide fields for improving matching Match Standards results SAP BO Questions and Answers Pdf Download Read the full article
0 notes