1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
7

An Einstein Analytics team wants to create a dashboard that displays values from an external, on-premise Oracle Database. What a

re two options to load the data from the Oracle Database into Einstein Analytics
Computers and Technology
1 answer:
Vedmedyk [2.9K]3 years ago
3 0

Answer:

1. Load the data as a CSV file.

2. Use Oracle Database connector.

Explanation:

In this scenario, an Einstein Analytics team wants to create a dashboard that displays values from an external, on-premise Oracle Database. The two (2) options to load the data from the Oracle Database into Einstein Analytics are;

1. Load the data as a CSV file: the data from the external, on-premise Oracle database should be loaded as a comma separated value (CSV) file because these data are normally a text source file. To load the data as a CSV file, the Einstein analytics team can either use the SQL developer, SQL loader, external table or SQL command-line tool and create a database table.

2. Use Oracle Database connector: this is use to import the comma separated values (CSV) files that has been created. It is the necessary program that helps user to connect with the on-premise Oracle Database in order to enable perform various actions such as create, delete, get, and update in a table. Thus, it would load the data from Oracle database into the Einstein Analytics.

You might be interested in
Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
natita [175]

Answer:

010100000001101000101

Explanation:

When an error occurs in data bits, the SEC code is used to determine where the error took place. 5 check-bits are needed to generate SEC code for 16-bits data word. The check bits are:

C16=0, C8=0, C4=0,C2=0,C1=1

Therefore the SEC code is 010100000001101000101

7 0
3 years ago
Read 2 more answers
You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private
Oksana_A [137]

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

4 0
2 years ago
When using bits to represent fractions of a number, can you make all possible fractions?
saw5 [17]
This is your perfect answer

8 0
2 years ago
In company a, there is a team that performs day-to-day it operations with a focus on security. they are responsible for a wide r
jasenka [17]

The security operation being carried out by this team is Administrative in nature.

<h3>What is the role of an Administrators?</h3>

An Administrators is known to be a person who works or handles the day-to-day deployment, operation and looking of an IT environment.

Note that their areas of concern are the systems, networks and applications as well as others and as such, The security operation being carried out by this team is Administrative in nature.

Learn more about  security operation from

brainly.com/question/371967

#SPJ1

6 0
2 years ago
What are some reasons DNS is necessary? Check all that apply. A. It maps local addresses to simple names without editing hosts f
dsp73
Domain Name Servers (DNS) are certainly necessary for easy access of resources across a network. The applicable options of the above are A and B - below are explanations as to why.

A: Computers generally are set to automatically obtain DNS information from the network they are connected to or can be pointed to a specific DNS server. This allows for records of where resources (network attach storage devices, other computers on local network, or even website server details) are located on a “master” kind of list so that the local machine’s host file does not have to be routinely updated to contain new addresses.

B: DNS, as explained partially by the answer to A, maintains a type-able or “human readable” domain name for the actual server’s IP address so we don’t have to memorize or keep a list of IPs for where we want to visit on the web (although, Google’s 8.8.8.8 IP address does make it easy). It shows an association between a name/domain name and an IP address so that we can enter something simple (Google.com) and the computer knows where to go (the server at IP address 8.8.8.8) so it can show you the content you want to see.

C: DNS would only simplify remote access if your were attempting LAN (Local Area Network) remote access of another computer on your network. DNS would not make it easier for remote access of a computer on the internet, as most DNS used in non-commercial settings are created and maintained by third-parties that will not put a specific record for one of your computers in it - not that you would want them to either, since it could lead to an open cyber attack.

D: Network throughput is a fancy phrase for network speed. It could be possible that different DNS servers could process requests faster than others, but it is not likely to increase network speed on the whole as navigating via IP or DNS records will be relatively the same speed.
3 0
2 years ago
Other questions:
  • A ______________ is a document created when planning resource management to help promote teamwork and clarify team communication
    13·1 answer
  • What information is not typically included in an e-mail header?​?
    15·1 answer
  • A search engine that crawls uses
    7·1 answer
  • What might a programming prefer the top-down approach to programming design?
    10·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • Given the following sets, for each set operation provide the elements of the resulting set in set notation or using a well-known
    5·1 answer
  • Which of the following is the definition of registration authority ( RA)?
    10·1 answer
  • If you do not specify any criteria in a delete query, Access will delete all the records in the table. Truth or False
    11·1 answer
  • Do you think that distributed OSs use a process-communication technique different from that used by desktop OSs?
    13·1 answer
  • Select all statements below that are TRUE for For...Next loops. A. It is used for a fixed number of iterations. B. It is used fo
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!