How does data lineage validate data integrity

Assignment Help Computer Engineering
Reference no: EM133691689

Assignment

Overview

When performing data analysis, it is very important to be able to track data lineage. When a user tracks data lineage, they are able to validate that the data is accurate, untampered-with, secure, and complete. These verifications are essential when data is analyzed. They allow an analyst to present their results to stakeholders with the confidence that the results are accurate and valid.

Prompt

In your journal entry, consider a situation where establishing data lineage is important to either your work or your stakeholder's expectations.

Specifically, you must address the following criteria:

A. Explain how data lineage is established.

1. What is data lineage, and what is it used for?
2. How do you know you have the correct lineage?

B. Discuss the purpose of establishing data lineage.

1. Are there any valid reasons for not establishing data lineage?
2. When would it be most appropriate to begin tracking data lineage?

C. Provide examples of how data lineage can validate data integrity.

1. How does data lineage validate data integrity?
2. What can be established with tracking lineage?

D. Discuss the potential consequences of using data without a lineage.

1. What happens if you don't establish the lineage of data you are using?
2. Why is it potentially harmful to proceed without establishing lineage for your data?

Reference no: EM133691689

Questions Cloud

Definition for leadership and management : Definition (in your own words) for "Leadership" and "Management". Explain how they are different and why both are important for a Criminal Justice Agency.
What should be the gateway for any computer : Provide a solution to this problem, drawing a map of the network and indicating the IP. What should be the gateway for any computer in each of the departments?
How does clark say that collectors classify intelligence : How does Clark say that collectors classify the intelligence collection INTs? Why do they view them this way?
Pros and cons of this situation for us foreign policy : Which factors do you think are the most important? What are the pros and cons of this situation for U.S. foreign policy?
How does data lineage validate data integrity : When would it be most appropriate to begin tracking data lineage? How does data lineage validate data integrity? What can be established with tracking lineage?
Identifying scheduling interruptions : Identify what has, usually does, or can interrupt your schedule (job, family, and social media) identify which of these interruptions you can prevent.
What are reasons other three would not be appropriate choice : What is the intended goal of the model? What are the reasons the other three would not be appropriate choices?
Why it important to prioritize epic feature and user stories : You are a Scrum Master working with your team to prepare the backlog for upcoming sprint. Why is it important to prioritize epics, features and user stories?
Does the death penalty violate mans law : Does the death penalty violate Man's Law (Constitutional Rights, The Eighth Amendment, against cruel and unusual punishment)?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a relationship between two tables

Create a relationship between two tables. Which tool should you use? Select only one answer. Power Apps admin center Dataverse site map designer Power Apps

  What would you do to help create a national security culture

If you could, what would you do to help create a national "security culture," in which everyone is more knowledgeable and proactive about threats to information

  Discuss best practices for incident response in the cloud

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

  What are the reasons behind requiring updates from users

What are the ethical implications of updating an Operating System without informing the user?

  Why are you hesitant to commit

Carl picks 20 random names and finds that P1 sorts them faster than P2. "We're using P1!" exclaims Carl. Why are you hesitant to commit?

  What file is used when creating a rainbow table

What command is used to open the Local User Manager from a command prompt? What file is used when creating a Rainbow Table?What switch would you use with the Windows Credentials Editor dump plaintext passwords?

  Create a function checkcustomerbalance that takes as input

Create 3 Procedure "CustomersDetails" that retrieves each customer from the Customer table and creates a list that displays each customer's name= address

  How should the company get this application in order

Apply the concepts of change management to discuss how should the company get this application in order? What type( s) of maintenance should they consider for

  Discuss topic - introduction to policy-making in digital age

The topic of paper: "Introduction to Policy-Making in the Digital Age". Each student will write a short research paper for a peer-reviewed research paper.

  Create each option as a sperate function and call them

The program calls a function that displays the seat chart from the array seatChart using the format shown in page 1.

  Questionwrite down a c program myls that functions like

questionwrite down a c program myls that functions like unix command ls.purposely myls is a program that displays file

  Explain the theory of politeness and its importance

Explain the theory of politeness and its importance to the business world. Write words and use APA for in-text citation and a bibliographic entry at the bottom

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd