Skip to content

Module 4 challenge :Prepare Data for Exploration (Google Data Analytics Professional Certificate) Answers 2025

1.

Question 1

You restrict access so each department can only view its own spreadsheet sheet. What does this describe?

Data security
❌ Data hygiene
❌ Data integrity
❌ Data preservation

Explanation:
Data security involves protecting data from unauthorized access or misuse — such as limiting departmental access to specific sheets.


Question 2

What should be included in file names to locate project files efficiently?

Version number
Creation date
Content description
❌ Collaborator names

Explanation:
Good naming conventions include the date, version, and description to organize files clearly and support easy tracking — names are unnecessary in filenames.


Question 3

A data team uses “data about data” for consistent naming conventions. What type of data is this?

Metadata
❌ Long data
❌ Aggregated data
❌ Big data

Explanation:
Metadata describes the structure, content, and properties of data (like naming conventions, format, or creation date).


Question 4

A proper naming convention for the file would be:

HS_Football_2022-09-15_V01
❌ HSFootball 2022-09-15 V01
❌ HSFootball2022-09-15V01MondayGameHomeTeamWon
❌ HS Football 2022_09_15_v01

Explanation:
Good naming conventions use underscores, consistent formatting, dates (YYYY-MM-DD), and version numbers for clarity.


Question 5

Fill in the blank: A data team establishes _____ best practices to keep project folders organized.

Foldering
❌ Version control
❌ Data hygiene
❌ Data grouping

Explanation:
Foldering best practices ensure related files are stored together in structured folders and subfolders for easy navigation.


Question 6

How can the team keep tab 3 private when sharing?

Copy tabs 1 and 2 into a separate spreadsheet, then share the new file.
Make a copy of the spreadsheet, delete tab 3, then share the new file.
❌ Rename tab 3 “Sensitive.”
❌ Hide tab 3.

Explanation:
Renaming or hiding isn’t secure — recipients can unhide or still access the data. Safest method: remove the sensitive tab completely before sharing.


Question 7

They deleted files but later needed them again — what should they have done?

Archive the files
❌ Print out the project files
❌ Email the project
❌ Keep them locally

Explanation:
Archiving safely stores files that aren’t actively used but might be needed later, preserving institutional knowledge.


Question 8

Broader-topic folders are located at the top of a _____.

Hierarchy
❌ Permission
❌ File extension
❌ Encryption

Explanation:
Folder structures follow a hierarchy, starting with broad folders (top-level) and moving into specific subfolders and files underneath.


🧾 Summary Table

Q# ✅ Correct Answer(s) Key Concept
1 Data security Protecting access to data
2 Version, date, description File naming conventions
3 Metadata Data about data
4 HS_Football_2022-09-15_V01 Proper file naming
5 Foldering Organized file structures
6 Copy/delete sensitive tab Secure sharing
7 Archive the files Data retention
8 Hierarchy Folder structure