Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

12 Cards in this Set

  • Front
  • Back
Application Objects
Report and report related objects built in desktop. ex: report, document, template, filter, metric, custom group, consolidation, prompt. Built in Desktop.
Configuration Objects
Administrative and connectivity related objects. ex: users, database instances, database login ID's, schedules. Built in Architect or Desktop Admin.
Schema Objects
Logical Objects that relate application objects to physical data warehouse structures. ex: facts, attributes, functions, hierarchies, operators, partition mappings, tables and transformations. Built in Architect.
Metadata Database
Stores object definitions and information about the DW and maps objects to the DW structure and content.
List components of MSTR BI architecture.
Source Systems
MSTR metadata
MSTR BI Platform
Source Systems
Any system or file that captures or holds data of interest. (databases or mainframes)
Data Warehouse
A database containing the historical data of an enterprise.
What are the components that make up the core of the MSTR BI platform?
SQL Engine and Query Engine
Analytical Engine
Server components.
Explain Report Execution Query Flow
1) Request submitted
2) Desktop sends to IS
3) IS checks for valid cache
4) IS retrieves prompt from MD
5) SQL engine generates sql
6)Query engine submits sql and retrieves result set
7) Analytical engine formats
8) IS sends report to desktop and cache is created
9) Report formatted and desplayed
Object-Level Security
Browse-see in object browser
Read-open in editor and read def
Write-edit def
Control-allow users control over security settings
Use-use to build another object
Security Filters
Apply a filter to a user on a per-user basis, so that the filter is applied to every report the user runs.
Connection Mapping
The ability to assign different database logins or databse connections to different users.