SAP C_TBW45_70 - SAP Certified Application Associate- Business Intelligence with SAP NetWeaver 7.0 Exam

Page:    1 / 16   
Total 80 questions

Organizations that are 'data rich, but information poor' might gain from the business knowledge discovered through data mining. Which of the following are true regarding data mining? (Choose three)

  • A. Clustering is a data mining method.
  • B. Data mining is an analytical approach that looks for hidden information patterns in large databases.
  • C. Data mining can easily analyze historical information, but is unable to predict future trends.
  • D. Regression analysis is a data mining method.
  • E. ETL (Extraction, Transformation and Loading) is a data mining method.


Answer : A,B,D

The APD (Analysis Process Designer) in SAP NetWeaver BI provides a mechanism for reading data from a source and then transferring the analytical results back out to a data target. In this scenario, which of the following are possible data targets of the APD?
(Choose two)

  • A. Standard DataStore Objects
  • B. VirtualProviders
  • C. Meta Data Repository
  • D. DataStore Objects for direct update
  • E. InfoObject master data tables


Answer : D,E

The design mode of the BEx Analyzer allows you to: (Choose two)

  • A. Add your own navigation controls such as drop down lists and check boxes.
  • B. Add in your own broadcast scheduling options so users receive the workbook by email and in their SAP NetWeaver Portal role.
  • C. Insert results from other data providers into the same workbook.
  • D. Access a toolbox of predefined macros that can automate common tasks.


Answer : A,C

A BEx Analyzer workbook can be based on which of the following? (Choose three)

  • A. A Query
  • B. A Query view created with the BEx Analyzer
  • C. An InfoProvider
  • D. A BEx Report created with the Report Designer


Answer : A,B,C

If two queries are inserted into the same worksheet in a workbook, which of the following is a potential conflict?

  • A. The results for one query could affect the results for the other query.
  • B. The first query on the worksheet is the only query accessible by the user.
  • C. If the user drills down in the first query, the query result could possibly extend into the area occupied by the second query.
  • D. The security settings of the first query would override the security settings of the second query.


Answer : C

Page:    1 / 16   
Total 80 questions