Data mining, Database Management System

Assignment Help:

1.Why we need data mining? Give an example to illustrate your answer.

2. Why data mining is considered as "misleading name"?

3. Distinguish the difference between database and data warehouse? Give 4 differences at least.

4. Discus the major difference between relational database and object oriented database?

5. Text databases may be highly unstructured, semi structured and well structured. Give an example for each. 

6. How can data mining affect our privacy? Give examples to illustrate your answer.


Related Discussions:- Data mining

Difference between internal tables and extra datasets, What is the differen...

What is the difference between internal tables and extract datasets? The lines of an internal table always have the similar structure. By using extract datasets, you can ha

Dml precompiler in database management system, DML Precompiler All th...

DML Precompiler All the DBMS have two basic sets of Languages - Data Definition Language (DDL) that have the set of commands needed to define the format of the data that is b

Property management database, You are to write a property management databa...

You are to write a property management database program that allows a real estate agent to view, add, search, and save property listings. The program is to do the following: 1.

Define weak and strong entity sets, Define weak and strong entity sets?  ...

Define weak and strong entity sets?  Weak entity  set:  entity  set  that  do not  have  key  attribute  of  their  own are  known as weak entity sets.  Strong entity set

Strong entity set and weak entity set, Strong entity set and weak entity se...

Strong entity set and weak entity set? Strong entity set and weak entity set: A strong entity set has a primary key. All tuples in the set are distinguishable through that key.

Explain the deferred update, Explain the Deferred Update The deferred ...

Explain the Deferred Update The deferred update methods do not physically update the database on disk till after a transaction reaches its commit point; after that the updates

Integrity of a database enforced by integrity rules, Question: This Que...

Question: This Question refers to the database schema given in the Appendix. (a) The integrity of a database is enforced by integrity rules. Discuss what should happen on a

Shadow copy, why shadow copy technique is used?

why shadow copy technique is used?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd