To give a user read permission for only the first three columns of a table, which access control method would you use?
Which of these statements about BigQuery caching is true?
What are two of the characteristics of using online prediction rather than batch prediction?
Which of these operations can you perform from the BigQuery Web UI?
Which of the following statements about the Wide & Deep Learning model are true? (Select 2 answers.)
You are creating the CI'CD cycle for the code of the directed acyclic graphs (DAGs) running in Cloud Composer. Your team has two Cloud Composer instances: one instance for development and another instance for production. Your team is using a Git repository to maintain and develop the code of the DAGs. You want to deploy the DAGs automatically to Cloud Composer when a certain tag is pushed to the Git repository. What should you do?
You are deploying a batch pipeline in Dataflow. This pipeline reads data from Cloud Storage, transforms the data, and then writes the data into BigQuory. The security team has enabled anorganizational constraint in Google Cloud, requiring all Compute Engine instances to use only internal IP addresses and no external IP addresses. What should you do?