Infosys
RCDP Interview Questions and Answers
Q1. What is difference between calculate column and measures?
Calculated columns are computed during data loading, while measures are computed on the fly during data visualization.
Calculated columns are created in the data model and stored in the underlying table.
Measures are created using DAX expressions and are calculated dynamically based on the context of the visualization.
Calculated columns consume memory and can impact performance, while measures are more efficient.
Calculated columns are useful for static calculations, while measu...read more
Q2. how many refresh are allowed in premium account?
The number of refreshes allowed in a Power BI Premium account depends on the capacity size.
The number of refreshes allowed varies based on the capacity size of the Power BI Premium account.
For P1 capacity, up to 48 refreshes per day are allowed.
For P2 capacity, up to 96 refreshes per day are allowed.
For P3 capacity, up to 384 refreshes per day are allowed.
Additional refreshes can be purchased if needed.
Q3. What is difference between SUM and SUMX?
SUM calculates the sum of a column or expression, while SUMX calculates the sum of an expression over a table.
SUM is used to calculate the sum of a column or expression in Power BI.
SUMX is used to calculate the sum of an expression over a table in Power BI.
SUM is typically used with a column reference, while SUMX is used with an expression.
SUMX can be used to perform calculations on filtered or modified data.
Example: SUM([Sales]) calculates the sum of the Sales column, while ...read more
Q4. What is Row Level Security ?
Row Level Security is a feature in Power BI that allows you to restrict data access at the row level based on user roles and filters.
Row Level Security (RLS) is used to control data access in Power BI based on user roles and filters.
It allows you to define rules that determine which rows of data a user can see.
RLS can be applied to tables or views in the data model.
It is commonly used to restrict access to sensitive or confidential data.
For example, you can use RLS to ensure ...read more
Q5. Without RLS how can you implement the security to data?
Implement security to data using row-level security (RLS)
Use user roles and permissions to restrict access to specific data
Leverage Power BI's built-in security features such as dataset security and data categorization
Implement dynamic security based on user context or attributes
Utilize Power BI's security features like Azure Active Directory integration for authentication and authorization
Q6. difference between having and where clause
HAVING clause is used with GROUP BY to filter grouped results, WHERE clause is used to filter individual rows
HAVING clause is used with GROUP BY to filter grouped results
WHERE clause is used to filter individual rows before grouping
HAVING clause is used with aggregate functions like SUM, COUNT, AVG
WHERE clause is used with conditions like =, >, <, IN
Q7. what are the commands in sql
SQL commands are used to interact with databases and perform various operations like querying, updating, and deleting data.
SELECT: Retrieves data from a database
INSERT: Adds new records to a table
UPDATE: Modifies existing records in a table
DELETE: Removes records from a table
CREATE TABLE: Creates a new table in the database
ALTER TABLE: Modifies the structure of an existing table
DROP TABLE: Deletes a table from the database
Interview Process at RCDP
Top Power BI Developer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month