Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
1.Why we need data mining? Give an example to illustrate your answer.
2. Why data mining is considered as "misleading name"?
3. Distinguish the difference between database and data warehouse? Give 4 differences at least.
4. Discus the major difference between relational database and object oriented database?
5. Text databases may be highly unstructured, semi structured and well structured. Give an example for each.
6. How can data mining affect our privacy? Give examples to illustrate your answer.
ddlc
What is 2NF? A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully functionally dependent on primary key.
Log based recovery: Let us first describe the term transaction log in the context of DBMS. A transaction log is a record in DBMS that remains track of all the transactions of a dat
System level permissions : With the use of data dictionary you can view them. Let us take the table name as user_sys_privs (used in oracle). DESCRIBE USER_SYS_PRI
we need example of 2phase locking
What is Enterprise Resource Planning (ERP), and what kind of a database is used in an ERP application? Enterprise Resource Planning (ERP) is an information system used in manuf
What are referential integrity constraints? A value that appears in single relation for a given set of attributes also appears for a particular set of attributes in another rel
State the Object Design for Processing The object design phase comes after analysis and system design phase. The object design phase includes implementation details like as i
Aggregate functions Some of these functions are min, count, max, and avg. These functions help in getting consolidated information from a set of tuples. Example:
Explain the Dynamic Hashing Techniques There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identica
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd