• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
Application Objects
Report and report related objects built in desktop. ex: report, document, template, filter, metric, custom group, consolidation, prompt. Built in Desktop.
Configuration Objects
Administrative and connectivity related objects. ex: users, database instances, database login ID's, schedules. Built in Architect or Desktop Admin.
Schema Objects
Logical Objects that relate application objects to physical data warehouse structures. ex: facts, attributes, functions, hierarchies, operators, partition mappings, tables and transformations. Built in Architect.
Metadata Database
Stores object definitions and information about the DW and maps objects to the DW structure and content.
List components of MSTR BI architecture.
Source Systems
MSTR metadata
Datawarehouse
MSTR BI Platform
Source Systems
Any system or file that captures or holds data of interest. (databases or mainframes)
Data Warehouse
A database containing the historical data of an enterprise.
What are the components that make up the core of the MSTR BI platform?
SQL Engine and Query Engine
Analytical Engine
Server components.
Explain Report Execution Query Flow
1) Request submitted
2) Desktop sends to IS
3) IS checks for valid cache
4) IS retrieves prompt from MD
5) SQL engine generates sql
6)Query engine submits sql and retrieves result set
7) Analytical engine formats
8) IS sends report to desktop and cache is created
9) Report formatted and desplayed
Object-Level Security
Browse-see in object browser
Read-open in editor and read def
Write-edit def
Delete-delete
Control-allow users control over security settings
Use-use to build another object
Execute-execute
Security Filters
Apply a filter to a user on a per-user basis, so that the filter is applied to every report the user runs.
Connection Mapping
The ability to assign different database logins or databse connections to different users.