Data mining, Database Management System

Assignment Help:

1.Why we need data mining? Give an example to illustrate your answer.

2. Why data mining is considered as "misleading name"?

3. Distinguish the difference between database and data warehouse? Give 4 differences at least.

4. Discus the major difference between relational database and object oriented database?

5. Text databases may be highly unstructured, semi structured and well structured. Give an example for each. 

6. How can data mining affect our privacy? Give examples to illustrate your answer.


Related Discussions:- Data mining

Referential integrity constraint - relational constraints, It defines that ...

It defines that the tuple in one relation that refers to another relation must refer to an existing tuple in that relation. This constraint is states on two relations (not essentia

What is olap, What is OLAP? OnLine Analytical Processing (OLAP) is a Bu...

What is OLAP? OnLine Analytical Processing (OLAP) is a Business Intelligence (BI) reporting system. OLAP gives the user with the capability to sum, count, average and do other

Draw entity relationship diagram, Draw entity relationship diagram for the ...

Draw entity relationship diagram for the following scenario. A university has many departments whereas each department belongs to that particular uni. That uni has also many bui

ER diagram, sir we want er diagram of bank management system in this main m...

sir we want er diagram of bank management system in this main menu option as new account,deposit amount,withdraw amount,all acount holder list,modify account,close account

#cursor, #what is cursor its uses ? Explain it

#what is cursor its uses ? Explain it

Update anomaly-data redundancy, Update Anomaly : This anomaly is occurred d...

Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014

Explain recovery process after system failure, Explain recovery process aft...

Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to

Explain the shadow paging recovery technique, Explain the shadow paging rec...

Explain the shadow paging recovery technique.  Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages i

In e-r diagram how generalization is represented, In E-R diagram how genera...

In E-R diagram how generalization is represented? in E-R diagram generalization is represented by Triangle shape.

What is the use of sub queries, What is the use of sub queries? A sub q...

What is the use of sub queries? A sub query is a select-from-where expression that is nested with in another query. A common use of sub queries is to do tests for set membershi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd