Module 4 challenge :Prepare Data for Exploration (Google Data Analytics Professional Certificate) Answers 2025
1.
Question 1
You restrict access so each department can only view its own spreadsheet sheet. What does this describe?
✅ Data security
❌ Data hygiene
❌ Data integrity
❌ Data preservation
Explanation:
Data security involves protecting data from unauthorized access or misuse — such as limiting departmental access to specific sheets.
Question 2
What should be included in file names to locate project files efficiently?
✅ Version number
✅ Creation date
✅ Content description
❌ Collaborator names
Explanation:
Good naming conventions include the date, version, and description to organize files clearly and support easy tracking — names are unnecessary in filenames.
Question 3
A data team uses “data about data” for consistent naming conventions. What type of data is this?
✅ Metadata
❌ Long data
❌ Aggregated data
❌ Big data
Explanation:
Metadata describes the structure, content, and properties of data (like naming conventions, format, or creation date).
Question 4
A proper naming convention for the file would be:
✅ HS_Football_2022-09-15_V01
❌ HSFootball 2022-09-15 V01
❌ HSFootball2022-09-15V01MondayGameHomeTeamWon
❌ HS Football 2022_09_15_v01
Explanation:
Good naming conventions use underscores, consistent formatting, dates (YYYY-MM-DD), and version numbers for clarity.
Question 5
Fill in the blank: A data team establishes _____ best practices to keep project folders organized.
✅ Foldering
❌ Version control
❌ Data hygiene
❌ Data grouping
Explanation:
Foldering best practices ensure related files are stored together in structured folders and subfolders for easy navigation.
Question 6
How can the team keep tab 3 private when sharing?
✅ Copy tabs 1 and 2 into a separate spreadsheet, then share the new file.
✅ Make a copy of the spreadsheet, delete tab 3, then share the new file.
❌ Rename tab 3 “Sensitive.”
❌ Hide tab 3.
Explanation:
Renaming or hiding isn’t secure — recipients can unhide or still access the data. Safest method: remove the sensitive tab completely before sharing.
Question 7
They deleted files but later needed them again — what should they have done?
✅ Archive the files
❌ Print out the project files
❌ Email the project
❌ Keep them locally
Explanation:
Archiving safely stores files that aren’t actively used but might be needed later, preserving institutional knowledge.
Question 8
Broader-topic folders are located at the top of a _____.
✅ Hierarchy
❌ Permission
❌ File extension
❌ Encryption
Explanation:
Folder structures follow a hierarchy, starting with broad folders (top-level) and moving into specific subfolders and files underneath.
🧾 Summary Table
| Q# | ✅ Correct Answer(s) | Key Concept |
|---|---|---|
| 1 | Data security | Protecting access to data |
| 2 | Version, date, description | File naming conventions |
| 3 | Metadata | Data about data |
| 4 | HS_Football_2022-09-15_V01 | Proper file naming |
| 5 | Foldering | Organized file structures |
| 6 | Copy/delete sensitive tab | Secure sharing |
| 7 | Archive the files | Data retention |
| 8 | Hierarchy | Folder structure |