Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) What are decision support systems, and what role do they play in the business environment?
(b) Data mining is a knowledge discovery process of automated extraction of hidden predictive information from large databases.
(i) Describe the four main steps involved in the data mining process.
(ii) There are various data mining techniques dealing with different types of problems. Give example of any three techniques that could be used in a supermarket.
(iii) To better exploit data mining what are the pre-requisites for a data warehouse?
(iv) Discuss the two critical factors which can affect success with the application of data mining technology.
(v) Data mining being relatively a new technology, what advantages would an Insurance company achieved for implementing such a technique? Illustrate your answer with some examples.
Performance of Various Concurrency Control Mechanisms
Describe the development process of Object oriented methods Object oriented methods have roots which are strongly anchored back in the 60s, functional and structured methods we
Evaluate, compare and contrast the two methods of relational database design namely top down method and Bottom up method. What will be your choice if you are asked to select a meth
What are views? Explain how views are different from tables? A view in SQL terminology is a one table in which is derived from other tables. These other tables could be base t
Project: Microsoft Access You have been asked by the ABC Tanning Salon to create a database that can be used to track the salon's customers. You are to create a table in Access
Define in which normalisation form if an attribute of a composite key is dependent on an attribute of other composite key. Ans: 3NF A relation is in 3 NF if an attribute of
List any eight applications of DBMS. a) Universities b) Airlines c) Banking d) Credit card transactions e) Tele communication f) Sales g)Finance h) Manufac
What is hash file organization? What are the causes of bucket overflow within a hash file organization? What can be completed to decrease the occurrence of bucket overflow?
Explain the uses of deadlock It will lead to deadlock since this is the only place where incoming acknowledgements are processed. Without this code, sender will keep timing ou
Explain the following functions of Oracle with suitable examples: (i) To_Char( ) (ii) Count( ) (iii) Trim( ) (iv) Length( ) Ans: (i) To_char( ): The TO_CHAR function conver
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd