image


EADC Dumps EADC Braindumps

EADC Real Questions EADC Practice Test EADC Actual Questions


Avaya


EADC


Einstein Analytics and Discovery Consultant


https://killexams.com/pass4sure/exam-detail/EADC


Question: 62


What can you do on the Edit Field Attributes page when uploading a CSV file to Analytics? A . Changea field’s name

B . Change a field’s format C . Change a field’s type D . All of the above


Answer: D


Question: 63


Max story creations per org per month A . 1000 (can purchase more)

B . 500 (can purchase more) C . 200 (can purchase more) D . 500


Answer: B


Question: 64


In a dataset, there are multiple boolean fields. When displayed on any dashboard, the boolean fields should all be displayed in thesame way: a value of true should result in the display of the word "Yes" in green; a value of false should result in the display of the word "No" in red.


In which two ways can this be accomplished? Choose 2 answers

A . Download the XMD for the dataset andchange the values and color for the fields and then upload to the dataset.

B . In the explorer, select the boolean fields and use the "edit values" option on the fields to change values and colors. C . Create an XMD node in the dataflow to change the label and color of the values in the fields.

D . In the explorer, select the boolean fields, then create a derived dimension that references the boolean fields, and then modify the values and colors of the derived dimension.


Answer: A,B


Question: 65


What can you change in a Compare Table formula column? A . Thefilters

B . The measure C . The grouping

D . The formula and the name

Answer: D


Question: 66


The Einstein Analytics Plus Platform license is enabled for a Salesforce org and assigned to each user. However, these users cannot see the Einstein Analytics Studio in the App Launcher.


How can this issue be addressed?

A . Share the app with the users in Einstein Analytics.

B . Create user accounts for the users in Einstein Analytics.

C . Assign the users to the permission set containing Use Analytics.

D . Assign the users to the permission set containingManage Analytics.


Answer: C


Question: 67


A shipping company created a dataset. "Bookll," containing budget per region per month for the first sixmonths of 2018. The dataset is shown in the graphic. Now, they want to create a lens showing the total budget for each region for each month. Every combination of region and month must be shown in the lens, even if there is no data.


image


How can an Einstein Consultant help this company build this lens?

A . Use a SAQL query leveraging the "fill" statement with a "partition" parameter.

B . Use a SAQL query to create fake rows for any data that is missing data from the dataset. C . Use a "Compare Table" and use the "Show summary" option.

D . Use a "Compare Table" and add a column leveraging the "Running Total" function.


Answer: D


Question: 68


Default rows in values table A . 100

B . 200

C . 50

D . 75


Answer: A


Question: 69


An Einstein Consultant receives a request from the Marketing department to help them understand lead conversion. Presently, they are unaware of the percentage of leads that get converted to sales. They hope to view results by account manager, value, and quarter. The data is there, so the consultant can add it to the marketing dashboard.


How should this metric be calculated?

A . Create a new step inthe dashboard using a compare table and define a formula. B . Create a formula field on the lead object in Salesforce and add it to the dataset. C . Create a computeExpression in the dataflow.

D . Create a new step in the dashboard using a compare table andthe running total function.


Answer: D


Question: 70


An Einstein Analytics team plans to enable data sync (replication).


Which two limits are specific to data sync (replication) and should be considered before enabling the feature because they might impact existing jobs? Choose 2 answers

A . Maximum number of dataflow definitions

B . Maximum number of dataflow transformations

C . Maximum number of objects that can be enabled for data sync (replication)

D . Timeout for ELT (Extract Load Transform) jobs that are scheduled but not yet executed


Answer: A,C Explanation:

https://help.salesforce.com/articleView?id=bi_limits.htm&type=5


Question: 71


What are the two main parts of a lens/exploration? A . Query

B . Visualization C . Dataset

D . Measure E . Grouping


Answer: B,E

Question: 72


Universal Containers reports that any selection in the Listwidget is not affecting the Pie chart in one of their Einstein Analytics dashboards. The step options associated with the List widget and Pie chart are shown in the graphic.


image


Given that the steps are using different datasets. which two changes can an Einstein Consultant make to solve this issue’ Choose 2 answers?

A . Use ‘Connect Data Sources" and create a connection to connect the two datasets. B . Use selection binding in the filters section of Che step "Step_pie_2."

C . Use "Connect Data Sources" and createa connection to connect the two widgets. D . Use selection binding in the filters section of the step "Type_l."


Answer: A,B


Question: 73


What are the 3 basic actions within a query in Analytics? Choose 3: A . Aggregate by a measure

B . Count rows by measure you want to visualize. C . Filter to narrow down your results.

D . Grouping by a dimesnsion

E . Display the results graphically


Answer: A,C,D


Question: 74


Which three statements are true regarding sharing inheritance? Choose 3 answers

A . If a user can see more than 3,000 records on the object in Salesforce, but the user does not have the "View All Data" permission, sharing inheritance is not used. The backup security predicate takes effect. This limitation does not apply to the Opportunity object.

B . Sharing inheritance supports Account,Campaign, Case, Contact, Opportunity, Lead, Order, User, and custom objects. If you use other objects, such as Idea or Site, you must use security predicates for those objects.

C . A dataset using sharing must also have a security predicate defined. D . Sharing inheritance supports a foreign key for enforcing security.

E . When sharing inheritance is enabled, security predicates are ignored.

Answer: A,B,C Explanation:

https://help.salesforce.com/articleView?id=bi_security_datasets_sharing_about.htm&type= 5


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG