Data Warehouse MCQ Questions and Answers
1. __________ is a subject-oriented, integrated, time-variant, nonvolatile collection of data in support of
management decisions.
A. Data Mining.
B. Data Warehousing.
C. Web Mining.
D. Text Mining.
2. The data Warehouse is__________.
A. read only.
B. write only.
C. read write only.
D. none.
3. Expansion for DSS in DW is__________.
A. Decision Support system.
B. Decision Single System.
C. Data Storable System.
D. Data Support System.
4. The important aspect of the data warehouse environment is that data found within the data warehouse
is___________.
A. subject-oriented.
B. time-variant.
C. integrated.
D. All of the above.
5. The time horizon in Data warehouse is usually __________.
A. 1-2 years.
B. 3-4years.
C. 5-6 years.
D. 5-10 years.
6. The data is stored, retrieved & updated in ____________.
A. OLAP.
B. OLTP.
C. SMTP.
D. FTP.
7. __________describes the data contained in the data warehouse.
A. Relational data.
B. Operational data.
C. Metadata.
D. Informational data.
8. ____________predicts future trends & behaviors, allowing business managers to make proactive,
knowledge-driven decisions.
A. Data warehouse.
B. Data mining.
C. Datamarts.
D. Metadata.
9. __________ is the heart of the warehouse.
A. Data mining database servers.
B. Data warehouse database servers.
C. Data mart database servers.
D. Relational data base servers.
10. ________________ is the specialized data warehouse database.
A. Oracle.
B. DBZ.
C. Informix.
D. Redbrick.
11. ________________defines the structure of the data held in operational databases and used by
operational applications.
A. User-level metadata.
B. Data warehouse metadata.
C. Operational metadata.
D. Data mining metadata.
12. ________________ is held in the catalog of the warehouse database system.
A. Application level metadata.
B. Algorithmic level metadata.
C. Departmental level metadata.
D. Core warehouse metadata.
13. _________maps the core warehouse metadata to business concepts, familiar and useful to end users.
A. Application level metadata.
B. User level metadata.
C. Enduser level metadata.
D. Core level metadata.
14. ______consists of formal definitions, such as a COBOL layout or a database schema.
A. Classical metadata.
B. Transformation metadata.
C. Historical metadata.
D. Structural metadata.
15. _____________consists of information in the enterprise that is not in classical form.
A. Mushy metadata.
B. Differential metadata.
C. Data warehouse.
D. Data mining.
16. . ______________databases are owned by particular departments or business groups.
A. Informational.
B. Operational.
C. Both informational and operational.
D. Flat.
17. The star schema is composed of __________ fact table.
A. one.
B. two.
C. three.
D. four.
18. The time horizon in operational environment is ___________.
A. 30-60 days.
B. 60-90 days.
C. 90-120 days.
D. 120-150 days.
19. The key used in operational environment may not have an element of__________.
A. time.
B. cost.
C. frequency.
D. quality.
20. Data can be updated in _____environment.
A. data warehouse.
B. data mining.
C. operational.
D. informational.
21. Record cannot be updated in _____________.
A. OLTP
B. files
C. RDBMS
D. data warehouse
22. The source of all data warehouse data is the____________.
A. operational environment.
B. informal environment.
C. formal environment.
D. technology environment.
23. Data warehouse contains_____________data that is never found in the operational environment.
A. normalized.
B. informational.
C. summary.
D. denormalized.
24. The modern CASE tools belong to _______ category.
A. a. analysis.
B. b.Development
C. c.Coding
D. d.Delivery
25. Bill Inmon has estimated___________of the time required to build a data warehouse, is consumed in
the conversion process.
A. 10 percent.
B. 20 percent.
C. 40 percent
D. 80 percent.
26. Detail data in single fact table is otherwise known as__________.
A. monoatomic data.
B. diatomic data.
C. atomic data.
D. multiatomic data.
27. _______test is used in an online transactional processing environment.
A. MEGA.
B. MICRO.
C. MACRO.
D. ACID.
28. ___________ is a good alternative to the star schema.
A. Star schema.
B. Snowflake schema.
C. Fact constellation.
D. Star-snowflake schema.
29. The biggest drawback of the level indicator in the classic star-schema is that it limits_________.
A. quantify.
B. qualify.
C. flexibility.
D. ability.
30. A data warehouse is _____________.
A. updated by end users.
B. contains numerous naming conventions and formats
C. organized around important subject areas.
D. contains only current data.
31. An operational system is _____________.
A. used to run the business in real time and is based on historical data.
B. used to run the business in real time and is based on current data.
C. used to support decision making and is based on current data.
D. used to support decision making and is based on historical data.
32. The generic two-level data warehouse architecture includes __________.
A. at least one data mart.
B. data that can extracted from numerous internal and external sources.
C. near real-time updates.
D. far real-time updates.
33. The active data warehouse architecture includes __________
A. at least one data mart.
B. data that can extracted from numerous internal and external sources.
C. near real-time updates.
D. all of the above.
34. Reconciled data is ___________.
A. data stored in the various operational systems throughout the organization.
B. current data intended to be the single source for all decision support systems.
C. data stored in one operational system in the organization.
D. data that has been selected and formatted for end-user support applications.
35. Transient data is _____________.
A. data in which changes to existing records cause the previous version of the records to be eliminated.
B. data in which changes to existing records do not cause the previous version of the records to be
eliminated.
C. data that are never altered or deleted once they have been added.
D. data that are never deleted once they have been added.
36. The extract process is ______.
A. capturing all of the data contained in various operational systems.
B. capturing a subset of the data contained in various operational systems.
C. capturing all of the data contained in various decision support systems.
D. capturing a subset of the data contained in various decision support systems.
37. Data scrubbing is _____________.
A. a process to reject data from the data warehouse and to create the necessary indexes.
B. a process to load the data in the data warehouse and to create the necessary indexes.
C. a process to upgrade the quality of data after it is moved into a data warehouse.
D. a process to upgrade the quality of data before it is moved into a data warehouse
38. The load and index is ______________.
A. a process to reject data from the data warehouse and to create the necessary indexes.
B. a process to load the data in the data warehouse and to create the necessary indexes.
C. a process to upgrade the quality of data after it is moved into a data warehouse.
D. a process to upgrade the quality of data before it is moved into a data warehouse.
39. Data transformation includes __________.
A. a process to change data from a detailed level to a summary level.
B. a process to change data from a summary level to a detailed level.
C. joining data from one source into various sources of data.
D. separating data from one source into various sources of data.
40. ____________ is called a multifield transformation.
A. Converting data from one field into multiple fields.
B. Converting data from fields into field.
C. Converting data from double fields into multiple fields.
D. Converting data from one field to one field.
41. The type of relationship in star schema is __________________.
A. many-to-many.
B. one-to-one.
C. one-to-many.
D. many-to-one.
42. Fact tables are ___________.
A. completely demoralized.
B. partially demoralized.
C. completely normalized.
D. partially normalized.
43. _______________ is the goal of data mining.
A. To explain some observed event or condition.
B. To confirm that data exists.
C. To analyze data for expected relationships.
D. To create a new data warehouse.
44. Business Intelligence and data warehousing is used for ________.
A. Forecasting.
B. Data Mining.
C. Analysis of large volumes of product sales data.
D. All of the above.
45. The data administration subsystem helps you perform all of the following, except__________.
A. backups and recovery.
B. query optimization.
C. security management.
D. create, change, and delete information.
46. The most common source of change data in refreshing a data warehouse is _______.
A. queryable change data.
B. cooperative change data.
C. logged change data.
D. snapshot change data.
47. ________ are responsible for running queries and reports against data warehouse tables.
A. Hardware.
B. Software.
C. End users.
D. Middle ware.
48. Query tool is meant for __________.
A. data acquisition.
B. information delivery.
C. information exchange.
D. communication.
49. Classification rules are extracted from _____________.
A. root node.
B. decision tree.
C. siblings.
D. branches.
50. Dimensionality reduction reduces the data set size by removing ____________.
A. relevant attributes.
B. irrelevant attributes.
C. derived attributes.
D. composite attributes.
51. ___________ is a method of incremental conceptual clustering.
A. CORBA.
B. OLAP.
C. COBWEB.
D. STING.
52. Effect of one attribute value on a given class is independent of values of other attribute is called
_________.
A. value independence.
B. class conditional independence.
C. conditional independence.
D. unconditional independence.
53. The main organizational justification for implementing a data warehouse is to provide ______.
A. cheaper ways of handling transportation.
B. decision support.
C. storing large volume of data.
D. access to data.
54. Multidimensional database is otherwise known as____________.
A. RDBMS
B. DBMS
C. EXTENDED RDBMS
D. EXTENDED DBMS
55. Data warehouse architecture is based on ______________.
A. DBMS.
B. RDBMS.
C. Sybase.
D. SQL Server.
56. Source data from the warehouse comes from _______________.
A. ODS.
B. TDS.
C. MDDB.
D. ORDBMS.
57. ________________ is a data transformation process.
A. Comparison.
B. Projection.
C. Selection.
D. Filtering.
58. The technology area associated with CRM is _______________.
A. specialization.
B. generalization.
C. personalization.
D. summarization.
59. SMP stands for _______________.
A. Symmetric Multiprocessor.
B. Symmetric Multiprogramming.
C. Symmetric Metaprogramming.
D. Symmetric Microprogramming.
60. __________ are designed to overcome any limitations placed on the warehouse by the nature of the
relational data model.
A. Operational database.
B. Relational database.
C. Multidimensional database.
D. Data repository.
61. __________ are designed to overcome any limitations placed on the warehouse by the nature of the
relational data model.
A. Operational database.
B. Relational database.
C. Multidimensional database.
D. Data repository.
62. MDDB stands for ___________.
A. multiple data doubling.
B. multidimensional databases.
C. multiple double dimension.
D. multi-dimension doubling.
63. ______________ is data about data.
A. Metadata.
B. Microdata.
C. Minidata.
D. Multidata.
64. ___________ is an important functional component of the metadata.
A. Digital directory.
B. Repository.
C. Information directory.
D. Data dictionary.
65. EIS stands for ______________.
A. Extended interface system.
B. Executive interface system.
C. Executive information system.
D. Extendable information system.
66. ___________ is data collected from natural systems.
A. MRI scan.
B. ODS data.
C. Statistical data.
D. Historical data.
67. _______________ is an example of application development environments.
A. Visual Basic.
B. Oracle.
C. Sybase.
D. SQL Server.
68. The term that is not associated with data cleaning process is ______.
A. domain consistency.
B. deduplication.
C. disambiguation.
D. segmentation.
69. ____________ are some popular OLAP tools.
A. Metacube, Informix.
B. Oracle Express, Essbase.
C. HOLAP.
D. MOLAP.
70. Capability of data mining is to build ___________ models.
A. retrospective.
B. interrogative.
C. predictive.
D. imperative.
71. _____________ is a process of determining the preference of customer’s majority.
A. Association.
B. Preferencing.
C. Segmentation.
D. Classification.
72. Strategic value of data mining is ______________.
A. cost-sensitive.
B. work-sensitive.
C. time-sensitive.
D. technical-sensitive.
73. ____________ proposed the approach for data integration issues.
A. Ralph Campbell.
B. Ralph Kimball.
C. John Raphlin.
D. James Gosling.
74. The terms equality and roll up are associated with ____________.
A. OLAP.
B. visualization.
C. data mart.
D. decision tree.
75. Exceptional reporting in data warehousing is otherwise called as __________.
A. exception.
B. alerts.
C. errors.
D. bugs.
76. ____________ is a metadata repository.
A. Prism solution directory manager.
B. CORBA.
C. STUNT.
D. COBWEB.
77. ________________ is an expensive process in building an expert system.
A. Analysis.
B. Study.
C. Design.
D. Information collection.
78. The full form of KDD is _________.
A. Knowledge database.
B. Knowledge discovery in database.
C. Knowledge data house.
D. Knowledge data definition.
79. The first International conference on KDD was held in the year _____________.
A. 1996.
B. 1997.
C. 1995.
D. 1994.
80. Removing duplicate records is a process called _____________.
A. recovery.
B. data cleaning.
C. data cleansing.
D. data pruning.
81. ____________ contains information that gives users an easy-to-understand perspective of the
information stored in the data warehouse.
A. Business metadata.
B. Technical metadata.
C. Operational metadata.
D. Financial metadata.
82. _______________ helps to integrate, maintain and view the contents of the data warehousing system.
A. Business directory.
B. Information directory.
C. Data dictionary.
D. Database.
83. Discovery of cross-sales opportunities is called ________________.
A. segmentation.
B. visualization.
C. correction.
D. association.
84. Data marts that incorporate data mining tools to extract sets of data are called ______.
A. independent data mart.
B. dependent data marts.
C. intra-entry data mart.
D. inter-entry data mart.
85. ____________ can generate programs itself, enabling it to carry out new tasks.
A. Automated system.
B. Decision making system.
C. Self-learning system.
D. Productivity system.
86. The power of self-learning system lies in __________.
A. cost.
B. speed.
C. accuracy.
D. simplicity.
87. Building the informational database is done with the help of _______.
A. transformation or propagation tools.
B. transformation tools only.
C. propagation tools only.
D. extraction tools.
88. How many components are there in a data warehouse?
A. two.
B. three.
C. four.
D. five.
89. Which of the following is not a component of a data warehouse?
A. Metadata.
B. Current detail data.
C. Lightly summarized data.
D. Component Key.
90. ________ is data that is distilled from the low level of detail found at the current detailed leve.
A. Highly summarized data.
B. Lightly summarized data.
C. Metadata.
D. Older detail data.
91. Highly summarized data is _______.
A. compact and easily accessible.
B. compact and expensive.
C. compact and hardly accessible.
D. compact.
92. A directory to help the DSS analyst locate the contents of the data warehouse is seen in ______.
A. Current detail data.
B. Lightly summarized data.
C. Metadata.
D. Older detail data.
93. Metadata contains atleast _________.
A. the structure of the data.
B. the algorithms used for summarization.
C. the mapping from the operational environment to the data warehouse.
D. all of the above.
94. Which of the following is not a old detail storage medium?
A. Phot Optical Storage.
B. RAID.
C. Microfinche.
D. Pen drive.
95. The data from the operational environment enter _______ of data warehouse.
A. Current detail data.
B. Older detail data.
C. Lightly summarized data.
D. Highly summarized data.
96. The data in current detail level resides till ________ event occurs.
A. purge.
B. summarization.
C. archieved.
D. all of the above.
97. The dimension tables describe the _________.
A. entities.
B. facts.
C. keys.
D. units of measures.
98. The granularity of the fact is the _____ of detail at which it is recorded.
A. transformation.
B. summarization.
C. level.
D. transformation and summarization.
99. Which of the following is not a primary grain in analytical modeling?
A. Transaction.
B. Periodic snapshot.
C. Accumulating snapshot.
D. All of the above.
100. Granularity is determined by ______.
A. number of parts to a key.
B. granularity of those parts.
C. both A and B.
D. none of the above.
101. ___________ of data means that the attributes within a given entity are fully dependent on the entire
primary key of the entity.
A. Additivity.
B. Granularity.
C. Functional dependency.
D. Dimensionality.
102. A fact is said to be fully additive if ___________.
A. it is additive over every dimension of its dimensionality.
B. additive over atleast one but not all of the dimensions.
C. not additive over any dimension.
D. None of the above.
103. A fact is said to be partially additive if ___________.
A. it is additive over every dimension of its dimensionality.
B. additive over atleast one but not all of the dimensions.
C. not additive over any dimension.
D. None of the above.
104. A fact is said to be non-additive if ___________.
A. it is additive over every dimension of its dimensionality.
B. additive over atleast one but not all of the dimensions.
C. not additive over any dimension.
D. None of the above.
105. Non-additive measures can often combined with additive measures to create new _________.
A. additive measures.
B. non-additive measures.
C. partially additive.
D. All of the above.
106. A fact representing cumulative sales units over a day at a store for a product is a _________.
A. additive fact.
B. fully additive fact.
C. partially additive fact.
D. non-additive fact.
107. ____________ of data means that the attributes within a given entity are fully dependent on the entire
primary key of the entity.
A. Additivity.
B. Granularity.
C. Functional Dependency.
D. Dependency.
108. Which of the following is the other name of Data mining?
A. Exploratory data analysis.
B. Data driven discovery.
C. Deductive learning.
D. All of the above.
109. Which of the following is a predictive model?
A. Clustering.
B. Regression.
C. Summarization.
D. Association rules.
110. Which of the following is a descriptive model?
A. Classification.
B. Regression.
C. Sequence discovery.
D. Association rules.
111. A ___________ model identifies patterns or relationships.
A. Descriptive.
B. Predictive.
C. Regression.
D. Time series analysis.
112. A predictive model makes use of ________.
A. current data.
B. historical data.
C. both current and historical data.
D. assumptions.
113. ____________ maps data into predefined groups.
A. Regression.
B. Time series analysis
C. Prediction.
D. Classification.
114. __________ is used to map a data item to a real valued prediction variable.
A. Regression.
B. Time series analysis.
C. Prediction.
D. Classification.
115. In ____________, the value of an attribute is examined as it varies over time.
A. Regression.
B. Time series analysis.
C. Sequence discovery.
D. Prediction.
116. In ________ the groups are not predefined.
A. Association rules.
B. Summarization.
C. Clustering.
D. Prediction.
117. Link Analysis is otherwise called as ___________.
A. affinity analysis.
B. association rules.
C. both A & B.
D. Prediction.
118. _________ is a the input to KDD.
A. Data.
B. Information.
C. Query.
D. Process.
119. The output of KDD is __________.
A. Data.
B. Information.
C. Query.
D. Useful information.
120. The KDD process consists of ________ steps.
A. three.
B. four.
C. five.
D. six.
121. Treating incorrect or missing data is called as ___________.
A. selection.
B. preprocessing.
C. transformation.
D. interpretation.
122. Converting data from different sources into a common format for processing is called as ________.
A. selection.
B. preprocessing.
C. transformation.
D. interpretation.
123. Various visualization techniques are used in ___________ step of KDD.
A. selection.
B. transformaion.
C. data mining.
D. interpretation.
124. Extreme values that occur infrequently are called as _________.
A. outliers.
B. rare values.
C. dimensionality reduction.
D. All of the above.
125. Box plot and scatter diagram techniques are _______.
A. Graphical.
B. Geometric.
C. Icon-based.
D. Pixel-based.
126. __________ is used to proceed from very specific knowledge to more general information.
A. Induction.
B. Compression.
C. Approximation.
D. Substitution.
127. Describing some characteristics of a set of data by a general model is viewed as ____________
A. Induction.
B. Compression.
C. Approximation.
D. Summarization.
128. _____________ helps to uncover hidden information about the data.
A. Induction.
B. Compression.
C. Approximation.
D. Summarization.
129. _______ are needed to identify training data and desired results.
A. Programmers.
B. Designers.
C. Users.
D. Administrators.
130. Overfitting occurs when a model _________.
A. does fit in future states.
B. does not fit in future states.
C. does fit in current state.
D. does not fit in current state.
131. The problem of dimensionality curse involves ___________.
A. the use of some attributes may interfere with the correct completion of a data mining task.
B. the use of some attributes may simply increase the overall complexity.
C. some may decrease the efficiency of the algorithm.
D. All of the above.
132. Incorrect or invalid data is known as _________.
A. changing data.
B. noisy data.
C. outliers.
D. missing data.
133. ROI is an acronym of ________.
A. Return on Investment.
B. Return on Information.
C. Repetition of Information.
D. Runtime of Instruction
134. The ____________ of data could result in the disclosure of information that is deemed to be
confidential.
A. authorized use.
B. unauthorized use.
C. authenticated use.
D. unauthenticated use.
135. ___________ data are noisy and have many missing attribute values.
A. Preprocessed.
B. Cleaned.
C. Real-world.
D. Transformed.
136. The rise of DBMS occurred in early ___________.
A. 1950’s.
B. 1960’s
C. 1970’s
D. 1980’s.
137. SQL stand for _________.
A. Standard Query Language.
B. Structured Query Language.
C. Standard Quick List.
D. Structured Query list.
138. Which of the following is not a data mining metric?
A. Space complexity.
B. Time complexity.
C. ROI.
D. All of the above.
139. Reducing the number of attributes to solve the high dimensionality problem is called as ________.
A. dimensionality curse.
B. dimensionality reduction.
C. cleaning.
D. Overfitting.
140. Data that are not of interest to the data mining task is called as ______.
A. missing data.
B. changing data.
C. irrelevant data.
D. noisy data.
141. ______ are effective tools to attack the scalability problem.
A. Sampling.
B. Parallelization
C. Both A & B.
D. None of the above.
142. Market-basket problem was formulated by __________.
A. Agrawal et al.
B. Steve et al.
C. Toda et al.
D. Simon et al.
143. Data mining helps in __________.
A. inventory management.
B. sales promotion strategies.
C. marketing strategies.
D. All of the above.
144. The proportion of transaction supporting X in T is called _________.
A. confidence.
B. support.
C. support count.
D. All of the above.
145. The absolute number of transactions supporting X in T is called ___________.
A. confidence.
B. support.
C. support count.
D. None of the above.
146. The value that says that transactions in D that support X also support Y is called ______________.
A. confidence.
B. support.
C. support count.
D. None of the above.
147. If T consist of 500000 transactions, 20000 transaction contain bread, 30000 transaction contain jam,
10000 transaction contain both bread and jam. Then the support of bread and jam is _______.
A. 2%
B. 20%
C. 3%
D. 30%
148. 7 If T consist of 500000 transactions, 20000 transaction contain bread, 30000 transaction contain jam,
10000 transaction contain both bread and jam. Then the confidence of buying bread with jam is _______.
A. 33.33%
B. 66.66%
C. 45%
D. 50%
149. The left hand side of an association rule is called __________.
A. consequent.
B. onset.
C. antecedent.
D. precedent.
150. The right hand side of an association rule is called _____.
A. consequent.
B. onset.
C. antecedent.
D. precedent.
151. Which of the following is not a desirable feature of any efficient algorithm?
A. to reduce number of input operations.
B. to reduce number of output operations.
C. to be efficient in computing.
D. to have maximal code length.
152. All set of items whose support is greater than the user-specified minimum support are called as
_____________.
A. border set.
B. frequent set.
C. maximal frequent set.
D. lattice.
153. If a set is a frequent set and no superset of this set is a frequent set, then it is called ________.
A. maximal frequent set.
B. border set.
C. lattice.
D. infrequent sets.
154. Any subset of a frequent set is a frequent set. This is ___________.
A. Upward closure property.
B. Downward closure property.
C. Maximal frequent set.
D. Border set.
155. Any superset of an infrequent set is an infrequent set. This is _______.
A. Maximal frequent set.
B. Border set.
C. Upward closure property.
D. Downward closure property.
156. If an itemset is not a frequent set and no superset of this is a frequent set, then it is _______.
A. Maximal frequent set
B. Border set.
C. Upward closure property.
D. Downward closure property.
157. A priori algorithm is otherwise called as __________.
A. width-wise algorithm.
B. level-wise algorithm.
C. pincer-search algorithm.
D. FP growth algorithm.
158. The A Priori algorithm is a ___________.
A. top-down search.
B. breadth first search.
C. depth first search.
D. bottom-up search.
159. The first phase of A Priori algorithm is _______.
A. Candidate generation.
B. Itemset generation.
C. Pruning.
D. Partitioning.
160. The second phaase of A Priori algorithm is ____________.
A. Candidate generation.
B. Itemset generation.
C. Pruning.
D. Partitioning.
161. The _______ step eliminates the extensions of (k-1)-itemsets which are not found to be frequent, from
being considered for counting support.
A. Candidate generation.
B. Pruning.
C. Partitioning.
D. Itemset eliminations.
162. The a priori frequent itemset discovery algorithm moves _______ in the lattice.
A. upward.
B. downward.
C. breadthwise.
D. both upward and downward.
163. After the pruning of a priori algorithm, _______ will remain.
A. Only candidate set.
B. No candidate set.
C. Only border set.
D. No border set.
164. The number of iterations in a priori ___________.
A. increases with the size of the maximum frequent set.
B. decreases with increase in size of the maximum frequent set.
C. increases with the size of the data.
D. decreases with the increase in size of the data.
165. MFCS is the acronym of _____.
A. Maximum Frequency Control Set.
B. Minimal Frequency Control Set.
C. Maximal Frequent Candidate Set.
D. Minimal Frequent Candidate Set.
166. Dynamuc Itemset Counting Algorithm was proposed by ____.
A. Bin et al.
B. Argawal et at.
C. Toda et al.
D. Simon et at.
167. Itemsets in the ______ category of structures have a counter and the stop number with them.
A. Dashed.
B. Circle.
C. Box.
D. Solid.
168. The itemsets in the _______category structures are not subjected to any counting.
A. Dashes.
B. Box.
C. Solid.
D. Circle.
169. Certain itemsets in the dashed circle whose support count reach support value during an iteration
move into the ______.
A. Dashed box.
B. Solid circle.
C. Solid box.
D. None of the above.
170. Certain itemsets enter afresh into the system and get into the _______, which are essentially the
supersets of the itemsets that move from the dashed circle to the dashed box.
A. Dashed box.
B. Solid circle.
C. Solid box.
D. Dashed circle.
171. The itemsets that have completed on full pass move from dashed circle to ________.
A. Dashed box.
B. Solid circle.
C. Solid box.
D. None of the above.
172. The FP-growth algorithm has ________ phases.
A. one.
B. two.
C. three.
D. four.
173. A frequent pattern tree is a tree structure consisting of ________.
A. an item-prefix-tree.
B. a frequent-item-header table.
C. a frequent-item-node.
D. both A & B.
174. The non-root node of item-prefix-tree consists of ________ fields.
A. two.
B. three.
C. four.
D. five.
175. The frequent-item-header-table consists of __________ fields.
A. only one.
B. two.
C. three.
D. four.
176. The paths from root node to the nodes labelled ‘a’ are called __________.
A. transformed prefix path.
B. suffix subpath.
C. transformed suffix path.
D. prefix subpath.
177. The transformed prefix paths of a node ‘a’ form a truncated database of pattern which co-occur with a
is called _______.
A. suffix path.
B. FP-tree.
C. conditional pattern base.
D. prefix path.
178. The goal of _____ is to discover both the dense and sparse regions of a data set.
A. Association rule.
B. Classification.
C. Clustering.
D. Genetic Algorithm.
179. Which of the following is a clustering algorithm?
A. A priori.
B. CLARA.
C. Pincer-Search.
D. FP-growth.
180. _______ clustering technique start with as many clusters as there are records, with each cluster having
only one record.
A. Agglomerative.
B. divisive.
C. Partition.
D. Numeric.
181. __________ clustering techniques starts with all records in one cluster and then try to split that cluster
into small pieces.
A. Agglomerative.
B. Divisive.
C. Partition.
D. Numeric.
182. Which of the following is a data set in the popular UCI machine-learning repository?
A. CLARA.
B. CACTUS.
C. STIRR.
D. MUSHROOM.
183. In ________ algorithm each cluster is represented by the center of gravity of the cluster.
A. k-medoid.
B. k-means.
C. STIRR.
D. ROCK.
184. In ___________ each cluster is represented by one of the objects of the cluster located near the
center.
A. k-medoid.
B. k-means.
C. STIRR.
D. ROCK.
185. Pick out a k-medoid algoithm.
A. DBSCAN.
B. BIRCH.
C. PAM.
D. CURE.
186. Pick out a hierarchical clustering algorithm.
A. DBSCAN
B. BIRCH.
C. PAM.
D. CURE.
187. CLARANS stands for _______.
A. CLARA Net Server.
B. Clustering Large Application RAnge Network Search.
C. Clustering Large Applications based on RANdomized Search.
D. CLustering Application Randomized Search.
188. BIRCH is a ________.
A. agglomerative clustering algorithm.
B. hierarchical algorithm.
C. hierarchical-agglomerative algorithm.
D. divisive.
189. The cluster features of different subclusters are maintained in a tree called ___________.
A. CF tree.
B. FP tree.
C. FP growth tree.
D. B tree.
190. The ________ algorithm is based on the observation that the frequent sets are normally very few in
number compared to the set of all itemsets.
A. A priori.
B. Clustering.
C. Association rule.
D. Partition.
191. The partition algorithm uses _______ scans of the databases to discover all frequent sets.
A. two.
B. four.
C. six.
D. eight.
192. The basic idea of the apriori algorithm is to generate________ item sets of a particular size & scans
the database.
A. candidate.
B. primary.
C. secondary.
D. superkey.
193. ________is the most well known association rule algorithm and is used in most commercial products.
A. Apriori algorithm.
B. Partition algorithm.
C. Distributed algorithm.
D. Pincer-search algorithm.
194. An algorithm called________is used to generate the candidate item sets for each pass after the first.
A. apriori.
B. apriori-gen.
C. sampling.
D. partition.
195. The basic partition algorithm reduces the number of database scans to ________ & divides it into
partitions.
A. one.
B. two.
C. three.
D. four.
196. ___________and prediction may be viewed as types of classification.
A. Decision.
B. Verification.
C. Estimation.
D. Illustration.
197. ___________can be thought of as classifying an attribute value into one of a set of possible classes.
A. Estimation.
B. Prediction.
C. Identification.
D. Clarification.
198. Prediction can be viewed as forecasting a_________value.
A. non-continuous.
B. constant.
C. continuous.
D. variable.
199. _________data consists of sample input data as well as the classification assignment for the data.
A. Missing.
B. Measuring.
C. Non-training.
D. Training.
200. Rule based classification algorithms generate ______ rule to perform the classification.
A. if-then.
B. while.
C. do while.
D. switch.
201. ____________ are a different paradigm for computing which draws its inspiration from neuroscience.
A. Computer networks.
B. Neural networks.
C. Mobile networks.
D. Artificial networks.
202. The human brain consists of a network of ___________.
A. neurons.
B. cells.
C. Tissue.
D. muscles.
203. Each neuron is made up of a number of nerve fibres called _____________.
A. electrons.
B. molecules.
C. atoms.
D. dendrites.
204. The ___________is a long, single fibre that originates from the cell body.
A. axon.
B. neuron.
C. dendrites.
D. strands.
205. A single axon makes ___________ of synapses with other neurons.
A. ones.
B. hundreds.
C. thousands.
D. millions.
206. _____________ is a complex chemical process in neural networks.
A. Receiving process.
B. Sending process.
C. Transmission process.
D. Switching process.
207. _________ is the connectivity of the neuron that give simple devices their real power. a. b. c. d.
A. Water.
B. Air.
C. Power.
D. Fire.
208. __________ are highly simplified models of biological neurons.
A. Artificial neurons.
B. Computational neurons.
C. Biological neurons.
D. Technological neurons.
209. The biological neuron’s _________ is a continuous function rather than a step function.
A. read.
B. write.
C. output.
D. input.
210. The threshold function is replaced by continuous functions called ________ functions.
A. activation.
B. deactivation.
C. dynamic.
D. standard.
211. The sigmoid function also knows as __________functions.
A. regression.
B. logistic.
C. probability.
D. neural.
212. MLP stands for ______________________.
A. mono layer perception.
B. many layer perception.
C. more layer perception.
D. multi layer perception.
213. In a feed- forward networks, the conncetions between layers are ___________ from input to output.
A. bidirectional.
B. unidirectional.
C. multidirectional.
D. directional.
214. The network topology is constrained to be __________________.
A. feedforward.
B. feedbackward.
C. feed free.
D. feed busy.
215. RBF stands for _____________.
A. Radial basis function.
B. Radial bio function.
C. Radial big function.
D. Radial bi function.
216. RBF have only _______________ hidden layer.
A. four.
B. three.
C. two.
D. one.
217. RBF hidden layer units have a receptive field which has a ____________; that is, a particular input
value at which they have a maximal output.
A. top.
B. bottom.
C. centre.
D. border.
218. ___________ training may be used when a clear link between input data sets and target output values
does not exist.
A. Competitive.
B. Perception.
C. Supervised.
D. Unsupervised.
219. ___________ employs the supervised mode of learning.
A. RBF.
B. MLP.
C. MLP & RBF.
D. ANN.
220. ________________ design involves deciding on their centres and the sharpness of their Gaussians.
A. DR.
B. AND.
C. XOR.
D. RBF.
221. ___________ is the most widely applied neural network technique.
A. ABC.
B. PLM.
C. LMP.
D. MLP.
222. SOM is an acronym of _______________.
A. self-organizing map.
B. self origin map.
C. single organizing map.
D. simple origin map.
223. ____________ is one of the most popular models in the unsupervised framework.
A. SOM.
B. SAM.
C. OSM.
D. MSO.
224. The actual amount of reduction at each learning step may be guided by _________.
A. learning cost.
B. learning level.
C. learning rate.
D. learning time.
225. The SOM was a neural network model developed by ________.
A. Simon King.
B. Teuvokohonen.
C. Tomoki Toda.
D. Julia.
226. SOM was developed during ____________.
A. 1970-80.
B. 1980-90.
C. 1990 -60.
D. 1979 -82.
227. Investment analysis used in neural networks is to predict the movement of _________ from previous
data.
A. engines.
B. stock.
C. patterns.
D. models.
228. SOMs are used to cluster a specific _____________ dataset containing information about the patient’s
drugs etc.
A. physical.
B. logical.
C. medical.
D. technical.
229. GA stands for _______________.
A. Genetic algorithm
B. Gene algorithm.
C. General algorithm.
D. Geo algorithm.
230. GA was introduced in the year __________.
A. 1955.
B. 1965.
C. 1975.
D. 1985.
231. Genetic algorithms are search algorithms based on the mechanics of natural_______.
A. systems.
B. genetics.
C. logistics.
D. statistics.
232. GAs were developed in the early _____________.
A. 1970.
B. 1960.
C. 1950.
D. 1940.
233. The RSES system was developed in ___________.
A. Poland.
B. Italy.
C. England.
D. America.
234. Crossover is used to _______.
A. recombine the population’s genetic material.
B. introduce new genetic structures in the population.
C. to modify the population’s genetic material.
D. All of the above.
235. The mutation operator ______.
A. recombine the population’s genetic material.
B. introduce new genetic structures in the population.
C. to modify the population’s genetic material.
D. All of the above.
236. Which of the following is an operation in genetic algorithm?
A. Inversion.
B. Dominance.
C. Genetic edge recombination.
D. All of the above.
237. . ___________ is a system created for rule induction.
A. RBS.
B. CBS.
C. DBS.
D. LERS.
238. NLP stands for _________.
A. Non Language Process.
B. Nature Level Program.
C. Natural Language Page.
D. Natural Language Processing.
239. Web content mining describes the discovery of useful information from the _______contents.
A. text.
B. web.
C. page.
D. level.
240. Research on mining multi-types of data is termed as _______ data.
A. graphics.
B. multimedia.
C. meta.
D. digital.
241. _______ mining is concerned with discovering the model underlying the link structures of the web.
A. Data structure.
B. Web structure.
C. Text structure.
D. Image structure.
242. _________ is the way of studying the web link structure.
A. Computer network.
B. Physical network.
C. Social network.
D. Logical network.
243. The ________ propose a measure of standing a node based on path counting.
A. open web.
B. close web.
C. link web.
D. hidden web.
244. In web mining, _______ is used to find natural groupings of users, pages, etc.
A. clustering.
B. associations.
C. sequential analysis.
D. classification.
245. In web mining, _________ is used to know the order in which URLs tend to be accessed.
A. clustering.
B. associations.
C. sequential analysis.
D. classification.
246. In web mining, _________ is used to know which URLs tend to be requested together.
A. clustering.
B. associations.
C. sequential analysis.
D. classification.
247. __________ describes the discovery of useful information from the web contents.
A. Web content mining.
B. Web structure mining.
C. Web usage mining.
D. All of the above.
248. _______ is concerned with discovering the model underlying the link structures of the web.
A. Web content mining.
B. Web structure mining.
C. Web usage mining.
D. All of the above.
249. The ___________ engine for a data warehouse supports query-triggered usage of data
A. NNTP
B. SMTP
C. OLAP
D. POP
250. ________ displays of data such as maps, charts and other graphical representation allow data to be
presented compactly to the users.
A. Hidden
B. Visual
C. Obscured
D. Concealed