Data security includes
Protecting data from accidental loss, corruption
Standardizing data formats
Eliminating irrelevant data
Correcting anomalies
___________________________ is recommended for small and medium data volumes, good data quality and off peak loads
ETL
ELT
ELTL
EII
This is the process in which data is explored to find the hidden factors and patterns
data mining
data preprocessing
data scrubbing
data profiling
_________________transforms enterprise into agile, accountable, adaptable, and aligned organization
Corporate Performance Management
Analytics BPO
Predictive analysis
None of the above
Topn/Bottom n can be achieved using
Filters
Sort
Rank
Data aggregation
Each Struts action is uniquely identified by ________ attribute.
Name
Page
Path
Type
In Struts 1.1, you can change how struts populates form fields by
Overriding the populate method in ActionForm
Override the processPopulate method of the RequestProcessor
Override the populateBean method of the ActionMapping
From MVC Prespective, Struts provides
Model
View
Controller
Number of request processor instances in a Struts application is
One per application
One per request
One per module
One per Action Servlet
The Struts 1 ActionServlet is based on the Design Pattern
Intercepting Filter
Front Controller
Single Controller