Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Problem:
(a) Data mining is one of the best ways to analyse data and using software techniques, hidden and unexpected patterns and relationships in sets of data can be extracted.
(i) What is Predictive Modelling and describe the two techniques associated with this model.
(ii) Describe link analysis and the three specializations of link analysis.
(iii) Data mining being relatively a new technology, what advantages would a Commercial Bank achieved for implementing such a technique. Provide relevant Examples.
(iv) To better exploit data mining what are the pre-requisites for a data warehouse.
What are composite attributes? Composite attributes can be separated in to sub parts.
Describe integrity and security? a) Domain constraint b) Referential integrity A value that appears in one relation for a given set of attributes also appear fo
Write the motivations led to development of OO-DBMS? 1. Programmer frustration with RDBMSs. 2. Requirement for special features.
Horizontal Fragmentation- Horizontal fragmentation groups together the tuples in a relation that are collectively used by the main transactions. A horizontal fragment is produced b
What are the typical phases of query processing
What is the use of a slotted-page structure and what is the information are there in the header? The slotted-page structure is used for organizing records within a one block.
Designing the fields in the data base The following are the considerations one has to remain in mind while designing the fields in the data base. Coding, compression, en
A super key is an attribute or set of attributes used to recognize the records uniquely in a relation. For instance, in the Relation PERSON defines earlier PERSON_ID is a super
What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it
Advantages of Observation Methods: Bailey has pointed out four advantages of observation: 1. Superior in Data Collection on Non Verbal Behavior: When a person a opi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd