-
Notifications
You must be signed in to change notification settings - Fork 104
3.4.3.Weekly challenge 4
LATEST SUBMISSION GRADE 100%
Fill in the blank: File-naming conventions are _____ that describe a file's content, creation date, or version.
common verificationsfrequent suggestionsgeneral attributes- consistent guidelines
Correct. File-naming conventions are consistent guidelines that describe a file's content, creation date, or version.
A data analytics team uses data about data to indicate consistent naming conventions for a project. What type of data is involved in this scenario?
Long data- Metadata
Big dataAggregated data
Correct. Metadata is data about data. Metadata practices can help analytics teams create consistent naming conventions and storage practices for their files.
A data analyst creates a file that lists people who donated to their organization’s fund drive. An effective name for the file is FundDriveDonors_20210216_V01.
- True
False
Correct. FundDriveDonors_20210216_V03 is an effective file name because it is an appropriate length and references the project name, creation date, version.
What process do data analysts use to keep project-related files together and organize them into subfolders?
- Foldering
NamingEncryptingEditing
Correct. Data analysts use foldering to keep project-related files together and organize them into subfolders.
Data analysts use archiving to separate current from past work. What does this process involve?
- Moving files from completed projects to another location
Using secure data-erase software to destroy old filesReorganizing and renaming current filesReviewing current data files to confirm they’ve been cleaned
Correct. Archiving involves moving files from completed projects to a separate location.
Fill in the blank: Data analysts create _____ to structure their folders.
sequences- hierarchies
scalesladders
Correct. Data analysts create hierarchies to structure their folders.
Using encryption to protect data is an example of what?
Data integrityData ethics- Data security
Data validation
Correct. Using encryption to protect data is an example of data security.
A data analyst creates a spreadsheet with five tabs. They want to share the data in tabs 1-4 with a client. Tab 5 contains private information about other clients. Which of the following tactics will enable them to keep tab 5 private? Select all that apply.
Rename tab 5 to include the word “private” then share the spreadsheet with the client.- Make a copy of the spreadsheet, delete tab 5, then share the new file with the client.
Hide tab 5, then share the spreadsheet with the client.- Copy tabs 1-4 into a separate spreadsheet, then share the new file with the client.
Correct. Copying tabs 1-4 into a separate spreadsheet, then sharing the new file with the client will keep tab 5 private. In addition, making a copy of the spreadsheet, deleting tab 5, then sharing the new file with the client will keep tab 5 private.
https://www.coursera.org/professional-certificates/google-data-analytics
© 2021 Coursera Inc. All rights reserved.