What do you know about Data Mining? - Part 2
- Question 1: KDD is the abbreviation of any technique in Data Mining?
- Knowledge Data Developer
- Knowledge Develop Database
- Knowledge Discovery Database
- There is no right answer
-
- Question 2: Which of the following statements is true about KDD?
- Output of KDD is data.
- Output of KDD is query.
- The output of KDD is information.
- The output of KDD is potentially valuable information.
-
- Question 3: Where is not an application of Data Warehouse?
- Information processing - Information processing
- Processing data analysis - Analytical processing
- Transaction processing - Transaction processing
- Data mining - Data mining
-
- Question 4: Choose the correct answer:Data can be updated in the operational environment (Operational Environment).
- It's correct
- False
-
- Question 5: How many stages does KDD process have?
- 3
- 4
- 5
- 6
-
- Question 6: Transient data is what data type?
- The data created in the session with the application and stored in the database after the application ends.
- Is the data created in the session with the application but not stored in the database after the application ends.
- Data is never changed or deleted after they are added.
- Data is never deleted after they are added.
-
- Question 7: Data Warehouse architecture based on:
- Database Management System - DBMS
- RDBMS - Relational Database Management System
- Structured query language - SQL
- ORACLE Database Management System
-
- Question 8: What kind of database can be used for data warehouse optimization and OLAP?
- Retional Database
- Relational Database
- Structural Database
- Multidimensional Database
-
- Question 9: ODS stands for:
Online Data Store- Online Data Storage
- Operational Data Stand
- Operational Data Store
- Question 10: A subset of the Data Warehouse data warehouse contains all data on a specific topic called:
- Data Pocket
- Metadata
- Data Mart
- Data Mining
-
4 ★ | 2 Vote
You should read it
- Leading the trend, ASUS officially launched a pair of video mining cards specializing in mining
- AMD Radeon RX 6600 XT - the next 'monster' in the world of crypto mining!
- Drill the warehouse wall to steal 85 Bitcoin machines
- Instruction for mining Ethereum
- Detected 172 fake Android apps used to mine coins
- Increase revenue by billions of USD / year by processing large data
- Amazon offers cryptocurrency mining in the cloud
- French police successfully cracked down on a botnet that exploits 850,000 computers from more than 100 countries.
May be interested
- Drill the warehouse wall to steal 85 Bitcoin machinesthe 85 bitcoin machines stored in the warehouse were 'flying without wings'.
- What is Blockchain technology? Why use Blockchain in Bitcoin miningwhat is blockchain? why use blockchain in bitcoin mining? to answer that question, you can refer to tipsmake's article below to know the origin of blockchain as well as how to apply it to bitcoin mining.
- Increase revenue by billions of USD / year by processing large dataknowing how to handle big data (big data) including unstructured data from sensors, videos, social networking sites ..., organizations and businesses can increase billions of dollars in revenue and improve operational efficiency .
- Google can detect cryptocurrency mining malware without needing to install software on the user's computerbecause there is no need to install software, detecting cryptocurrency mining malware will not affect the device's performance.
- Intel is about to launch a chip dedicated to mining virtual currencythe latest rumors say that intel is preparing to launch a chip dedicated to mining virtual currency codenamed bonanza mine.
- 6 best Bitcoin digging software for Windows, Mac, Linuxif you are planning to dig bitcoin, you cannot ignore these 11 bitcoin mining software. read and choose the right software for you.
- Instructions for mining all kinds of ores in Dinkuminstructions for mining ores in dinkum, instructions on how to exploit ores in dinkum, help gamers collect many gems and can be sold for money
- SteelFox Trojan: Malware Turns PCs Into Cryptocurrency Mining Zombiesthis malware infects people looking to avoid paying for the product, steals their personal information, and turns their computers into cryptocurrency mining zombies.
- Pi virtual currency players call for app deletionmany people participating in pi mining have called for the app to be deleted on social networks because they have lost faith in this virtual currency, while the pi network team continues to only make promises.
- Just because he wanted to hack the game, my brother was infected with cryptocurrency mining malware and ruined his laptop like thisthe explosion of cryptocurrencies has created a number of negative consequences - including the explosion of unauthorized cryptocurrency mining on users' computers.