
BigQuery views show up on the Professional Cloud Architect exam in two ways. First, you need to know which view type fits a given workload. Second, you need to recognize when a view is the right answer to a security or sharing question, instead of copying data or building a new pipeline. I want to walk through the three view types you should know going into the exam: standard views, materialized views, and authorized views.
A standard view is the most common type. It is a virtual table that represents the result of a query. The view itself does not store data. Every time someone queries the view, BigQuery runs the underlying query to generate the results.
That has a direct cost implication. Because nothing is cached, frequent access to a standard view means the underlying query runs again every time, and you pay the compute for each run. For a workload that hits the same view thousands of times per day, this gets expensive.
You should choose a standard view when:
That last point is the one most people miss. A standard view always shows the latest state of the underlying tables, because it has no stored copy to fall behind. If freshness matters more than performance, the standard view is the right answer.
A materialized view stores pre-computed and cached query results. Instead of recalculating the result every time the view is accessed, BigQuery serves the cached output and refreshes it as the base data changes.
This is the cost-effective option when the same query runs repeatedly against a large dataset. You pay storage for the cached results, but you avoid paying compute on every read. For frequently-accessed analytics, that trade is almost always worth it.
Choose a materialized view over a standard view when:
The exam will often phrase this as a cost optimization question. If you see a frequently-queried dashboard or a heavy aggregation that runs many times per hour, a materialized view is usually the answer.
Authorized views are a security mechanism. They let users query specific data without granting them access to the underlying tables. You define a query that exposes only certain columns or rows, and you authorize the view to read from the source dataset on the user's behalf.
The user gets access to the view but not to the source tables. Anything the query does not return stays hidden. This is how you share results from sensitive data without exposing the data itself.
Authorized views are most useful in multi-user environments where different teams need different slices of the same source data. Instead of copying tables or building separate datasets, you define one view per access pattern and authorize each view appropriately. The underlying data stays in one place, and visibility is controlled at the view layer.
On the Professional Cloud Architect exam, view questions usually fall into one of three patterns:
If the question describes a dashboard hitting the same aggregation thousands of times per day, do not pick a standard view just because it is the default. The compute cost of recomputing on every access is exactly the problem a materialized view solves. Conversely, if the question emphasizes that the data must always be current and the query is cheap, do not over-engineer with a materialized view that you would have to refresh.
For authorized views, the giveaway language is usually around access control. If a question describes a team that needs to see results without seeing the raw data, or a partner who needs query output but no permission on the source dataset, the authorized view is what you reach for. Row-level and column-level security can also solve some of these cases, but the authorized view is the answer when the entire access pattern is "run this specific query and nothing else."
My Professional Cloud Architect course covers BigQuery views alongside the rest of the storage and analytics material.