- All Exams Instant Download
Which of the following SQL command can be used to insert or update or delete rows based on a condition to check if a row(s) exists?
Which of the following SQL command can be used to insert or update or delete rows based on a condition to check if a row(s) exists?A . MERGE INTO table_nameB . COPY INTO table_nameC . UPDATE table_nameD . INSERT INTO OVERWRITE table_nameE . INSERT IF EXISTS table_nameView AnswerAnswer: A Explanation:...
Which of the following technique can be used to implement fine-grained access control to rows and columns of the Delta table based on the user's access?
Which of the following technique can be used to implement fine-grained access control to rows and columns of the Delta table based on the user's access?A . Use Unity catalog to grant access to rows and columnsB . Row and column access control listsC . Use dynamic view functionsD ....
You are currently asked to work on building a data pipeline, you have noticed that you are currently working on a very large scale ETL many data dependencies, which of the following tools can be used to address this problem?
You are currently asked to work on building a data pipeline, you have noticed that you are currently working on a very large scale ETL many data dependencies, which of the following tools can be used to address this problem?A . AUTO LOADERB . JOBS and TASKSC . SQL EndpointsD...
Which of the following locations hosts the driver and worker nodes of a Databricks-managed cluster?
Which of the following locations hosts the driver and worker nodes of a Databricks-managed cluster?A . Data planeB . Control planeC . Databricks FilesystemD . JDBC data sourceE . Databricks web applicationView AnswerAnswer: A Explanation: The answer is Data Plane, which is where compute(all-purpose, Job Cluster, DLT) are stored this...
table("uncleanedSales")
table("uncleanedSales")View AnswerAnswer: B Explanation: The answer is
Which of the following technique can be used to implement fine-grained access control to rows and columns of the Delta table based on the user's access?
Which of the following technique can be used to implement fine-grained access control to rows and columns of the Delta table based on the user's access?A . Use Unity catalog to grant access to rows and columnsB . Row and column access control listsC . Use dynamic view functionsD ....
You noticed that colleague is manually copying the notebook with _bkp to store the previous versions, which of the following feature would you recommend instead.
You noticed that colleague is manually copying the notebook with _bkp to store the previous versions, which of the following feature would you recommend instead.A . Databricks notebooks support change tracking and versioningB . Databricks notebooks should be copied to a local machine and setup source control locally to version...
You are currently asked to work on building a data pipeline, you have noticed that you are currently working on a very large scale ETL many data dependencies, which of the following tools can be used to address this problem?
You are currently asked to work on building a data pipeline, you have noticed that you are currently working on a very large scale ETL many data dependencies, which of the following tools can be used to address this problem?A . AUTO LOADERB . JOBS and TASKSC . SQL EndpointsD...
Which of the following describes how Databricks Repos can help facilitate CI/CD workflows on the Databricks Lakehouse Platform?
Which of the following describes how Databricks Repos can help facilitate CI/CD workflows on the Databricks Lakehouse Platform?A . Databricks Repos can facilitate the pull request, review, and approval process before merging branchesB . Databricks Repos can merge changes from a secondary Git branch into a main Git branchC ....
table("uncleanedSales")
table("uncleanedSales")View AnswerAnswer: B Explanation: The answer is