Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Problem:
(a) Data mining is one of the best ways to analyse data and using software techniques, hidden and unexpected patterns and relationships in sets of data can be extracted.
(i) What is Predictive Modelling and describe the two techniques associated with this model.
(ii) Describe link analysis and the three specializations of link analysis.
(iii) Data mining being relatively a new technology, what advantages would a Commercial Bank achieved for implementing such a technique. Provide relevant Examples.
(iv) To better exploit data mining what are the pre-requisites for a data warehouse.
Key to represent relationship amongs tables is called ? A Key that represent the relationship between tables is called Foreign Key.
A constraint named less_than_20 was defined on the field date_of_birth of table student. Delete this constraint. ALTER TABLE student DROP CONSTRAINT less_than_20;
Define the Attribute Inheritance The attributes of a higher level entity set are inherited through a lower level entity set made by specialization-generalization hierarchy. Nam
Project Description: We have purchased facebook style chat software which we are using with our site. It is prepared in PHP but the rest of the site is developed asp.net. Iss
What is completeness constraint on generalization? Define the variation between total and partial design constraint. Give an example each. Ans: Completeness Constraints
What are the two types of blocks in the fixed -length representation? Define them. Anchor block: Have the first record of a chain. Overflow block: Have the records other tha
Explain the Functional Mode with help of an example. Functional Model The functional model shows a computation and functional derivation of data values in it without ind
What is the disadvantage of a call by reference? During a call by reference damage or loss of data is not restricted to the subroutine, but will instantly lead to alters to th
Attributes that are directly kept in the data base. For example, 'Birth date' attribute of a person. Derived Attributes that are not stored directly but can be derived
Explain the challenges before an E-business management.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd