Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) What are decision support systems, and what role do they play in the business environment?
(b) Data mining is a knowledge discovery process of automated extraction of hidden predictive information from large databases.
(i) Describe the four main steps involved in the data mining process.
(ii) There are various data mining techniques dealing with different types of problems. Give example of any three techniques that could be used in a supermarket.
(iii) To better exploit data mining what are the pre-requisites for a data warehouse?
(iv) Discuss the two critical factors which can affect success with the application of data mining technology.
(v) Data mining being relatively a new technology, what advantages would an Insurance company achieved for implementing such a technique? Illustrate your answer with some examples.
What is the use of Union and intersection operation? Union: The result of this operation contains all tuples that are either in r1 or in r2 or in both r1 and r2.Duplicate tuple
Convert the following ER - diagram (Entity Relationship Diagram) into a relational database (the primary keys are underlined): Ans: The relational database schema f
What is meant by data-transfer rate? The data-transfer rate is the rate at which data can be retrieved from or kept to the disk.
explain ANSI SPARC architecture
Write an sql statement to find what is the percentage of home policies which are from the state of Arizona out of all Home policies by Policy Value.
Illustrate the view of software architecture A model is a semantically closed abstraction of system composes of elements. It can be visualized using any of the following five v
1. Staff (staffID --> availabilityID) 2. Services (servicesID --> itemBasedID --> timedBasedID) 3. TimedBased (timedbasedID--> priceid) 4. Clients (clientId, serviceId-->
Mention the several levels in security measures. A) Database system B) Operating system C) Network D) Physical Human
1. Use the Invoice table structure shown below to answer the following questions: a) Draw the dependency diagram and identify the primary key and all dependencies, including al
brief history,definition,current trends and future trends if any of data fragmentation
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd