Identify two implementation strategies of changed data capture provided through ODI Knowledge Modules. (Choose two.)
A. extracting source data to flat files
B. triggers
C. Oracle GoldenGate
D. before-and-after database image comparison
How are the ODI repositories upgraded? (Choose the best answer.)
A. by using Opatch
B. by using ODI Studio
C. by using the import/export utilities
D. by using Upgrade Assistant
Which two statements are true about the Oracle Data Integrator Software Development Kit (ODI SDK)? (Choose two.)
A. It enables developers to execute most ODI operations through a Java program.
B. It can be used to embed ODI processes into another product.
C. It is used to load data between Teradata and Oracle.
D. It must be used by ETL developers to develop ODI processes.
Which is the correct statement about the contents of Master repositories? (Choose the best answer.)
A. They contain data model and security information.
B. They contain security and topology information.
C. They contain project and topology information.
D. They contain project and security information.
The source and target data stores are located on the same data server.
Which statement is correct about the need for a Loading Knowledge Module to load the data on the target? (Choose the best answer.)
A. Only an Integration KnowledgeModule single-technology is required.
B. Only an Integration Knowledge Module multitechnology is required.
C. Aloading Knowledge Module multitechnology and an IntegrationKnowledgeModule single- technology are required.
D. Both a Loading Knowledge Module multitechnology and an Integration Knowledge Module multitechnology are required.
You must split a model with many database tables into multiple sub-models based on their names. How must you proceed? (Choose the best answer)
A. Create new submodels and drag data stores individually to each submodel.
B. Use automatic distribution feature at the models level to automatically create the submodels and move the data stores based on their names.
C. Create new submodels and leverage the automatic distribution feature at the submodels level to automatically move the data stores based on their names.
D. Create new models, drag the data stores individually to each model and then drag the models to the parent model to create submodels.
You must send the same message in multiple packages to several email addresses stored in the same database table.
How do you accomplish this by using a reusable package step? (Choose the best answer.)
A. Create a procedure and add two tasks. The first one must have a Command on Source that reads the email addresses from the database table and stores them in a bind variable, and the second must have a Command on Target that usesOdiSendMailto send the email by using the bind variable defined in the first task.
B. Createa Knowledge Module. Add a task with a Command on Source that reads the email addresses from the database table and stores them in a bind variable, and a Command on Target that usesOdiSendMailto send the email using the bind variable defined in the Command on Source.
C. Create a counter variable that gets the total number of email addresses stored in the database table. Next, create another variable that selects the email addresses from the database table. Then, create a loop in the packages by using the variables and anOdiSendMailstep.
D. Create a procedure. Add a task with a Command on Source that reads the email addresses from the database table and stores them in a bind variable, and a Commandon Targetthat usesOdiSendMailto send the email using the bind variable defined in the Command on Source.
What must you set on the Definition tab of a variable to protect the variable value from being displayed in the Operator logs? (Choose the best answer.)
A. Select the Secure Value check box.
B. Select the Hide Value check box.
C. Set the Keep History field to No History.
D. Leave the Default Value field empty.
You need to implement security mechanisms that allow only user "A" to view all the Mappings contained in a specific project named "P1."
How must you proceed? (Choose the best answer.)
A. Go to Security, assign the NG DESIGNER profile to user "A." Next, drag project "P1" to user "A" and finally setView privilegesto Active for the Mapping objects.
B. Go to Security, assign the DESIGNER profile to user "A." Next, drag project "P1" to user "A" and finally set View privileges to Active for the Mapping objects.
C. Go to Security, assign the NG DESIGNER profile to user "A." Next, drag project "P1" to user "A" and finally set View privileges to Active for the Project, Folder, and Mapping objects.
D. Go to Security, assign the DESIGNER profile to user "A." Next, drag project "P1" to user "A" and finally set View privileges to Active for the Project, Folder, and Mapping objects.
Identify the correct variable step type to use when assigning a value to a variable with an SQL query. (Choose the best answer.)
A. Evaluate Variable
B. Set Variable
C. Declare Variable
D. Refresh Variable