In Data mining, .............. is a method of incremental conceptual clustering. (A) STRING (B) COBWEB (C) CORBA (D) OLAD

1 Answer

Answer :

(B) COBWEB

Related questions

Description : The data Flow Diagram is the basic component of …………… system A) Conceptual B) Logical C) Physical

Last Answer : A) Conceptual

Description : ………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above

Last Answer : C) Physical

Description : A ……………… system in no more than idea. A) Conceptual B) Logical C) Physical D) None

Last Answer : A) Conceptual

Description : A …………. System is no more than idea A) Conceptual B) Logical C) Physical D) All of the above

Last Answer : A) Conceptual

Description : The conceptual model is (A) dependent on hardware. (B) dependent on software. (C) dependent on both hardware and software . (D) independent of both hardware and software.

Last Answer : (D) independent of both hardware and software.

Description : The view of total database content is (A) Conceptual view. (B) Internal view. (C) External view. (D) Physical View.

Last Answer : (A) Conceptual view.

Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency

Last Answer : (C) Scripts 

Description : Manager's salary details are to be hidden from Employee Table. This Technique is called as (A) Conceptual level Datahiding (B) Physical level Datahiding (C) External level Datahiding (D) Logical level Datahiding

Last Answer : (C) External level Datahiding

Description : Find the false statement: (A) The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999). (B) A weak relationship occurs when two ... Ternary, Quaternary and Quintary relationships are shown through a series of application scenario's and vignette's

Last Answer : (C) Conceptual model is not accurate representation of "Universe of interest".

Description : ............... is a process model that removes defects before they can precipitate serious hazards. (A) Incremental model (B) Spiral model (C) Cleanroom software engineering (D) Agile model

Last Answer : (C) Cleanroom software engineering

Description : Which process model is also called as classic life cycle model? (A) Waterfall model (B) RAD model (C) Prototyping model (D) Incremental model

Last Answer : (A) Waterfall model

Description : The task of correcting and pre processing data is called as (A) Data streaming (B) Data cleaning (C) Data mining (D) Data storming

Last Answer : (B) Data cleaning

Description : Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as (A) Data mining (B) Meta data (C) Data warehousing (D) Database

Last Answer : (C) Data warehousing

Description : ............... model is designed to bring prices down by increasing the number of customers who buy a particular product at once. (A) Economic Order Quantity (B) Inventory (C) Data Mining (D) Demand-Sensitive Pricing

Last Answer : (D) Demand-Sensitive Pricing

Description : Given the following statements: (a) Strategic value of data mining is time stamping (b) Information collection is an expensive process in building an expert system. Which of the following options is correct ? (A) Both (a) and (b) ... true (C) (a) is true, (b) is false (D) (a) is false, (b) is true

Last Answer :  (B) Both (a) and (b) are true

Description : Consider the following two statements: (a) Business intelligence and Data warehousing is used for forecasting and Data mining. (b) Business intelligence and Data warehousing is used for analysis of large volumes of sales data. Which one ... C) (a) is false, (b) is true (D) Both (a) and (b) are false

Last Answer : (B) Both (a) and (b) are true

Description : In Data mining, classification rules are extracted from .............. (A) Data (B) Information (C) Decision Tree (D) Database

Last Answer : (C) Decision Tree 

Description : ................. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions. (A) Data mining (B) Web mining (C) Data warehouse (D) Database Management System

Last Answer : (C) Data warehouse

Description : What would happen if "String[]args" is not included as argument in the main method. A) No error B) Compilation error C) Program won't run D) Program exit

Last Answer : C) Program won't run

Description : The Servlet Response interface enables a servlet to formulate a response for a client using the method ............... (A) void log(Exception e, String s) (B) void destroy() (C) int getServerPort() (D) void setContextType(String Type)

Last Answer : (D) void setContextType(String Type)

Last Answer : The full form of CORBA - Common Object Request Broker Architecture

Description : In java, string is a ............. A) primitive data type B) abstract data type C) combination of boolean D) None of the above

Last Answer : B) abstract data type

Description : Data items grouped together for storage purposes are called a A) record B) title C) list D) string

Last Answer : A) record

Description : In a relational database model, NULL values can be used for all but which one of the following? (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL. (B) To ... D) To fill a column in a tuple when that column does not really exist for that particular tuple.

Last Answer : (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL.

Description : Walking through a dark room barefoot, would you be more freaked out by a huge cobweb to the face or a puddle of 'wet' on the floor?

Last Answer : I have kids and a dog. Puddle of Mudd Puddle of wet wins (loses?) every time.

Description : what strawberry pest leaves a cobweb in the plant?

Last Answer : Need Answer

Description : Choose the odd one out. Bottom, Moth, Mustard seed, Cobweb

Last Answer : Choose the odd one out. (i) Bottom, Moth, Mustard seed, Cobweb (ii) Flute, Snug, Quince, Cobweb

Description : Saxifraga - Cobweb Saxifrage, London Pride, Meadow Saxifrage, Mother-Of-Thousands, Prattling Parnell, Prince's-Feather, Rockfoil, St.-Patrick's-Cabbage, Strawberry Begonia, Strawberry Geranium

Last Answer : DESCRIPTION: Saxifraga is a large group of hardy perennial plants. Only a few are annuals or biennials. They are mostly natives of North and South Temperate and Arctic regions. A few are found in Asia and ... S. Petraschii; S. primulaize; S. Riverslea; S. Salomonii; S. tyrolensis (a natural hybrid).

Description : What do you understand by Clustering , Classification and Regression model. -AI Class 9th

Last Answer : Regression: It predicts continuous valued output.The Regression analysis is the statistical model which is used to predict the numeric data instead of labels. It can also identify the ... very similar and points in different clusters are different. It determines grouping among unlabeled data.

Description : The process of representing Infinite set of values with a much smaller set is called a. Mapping b. clustering c. Quantization d. Sampling

Last Answer : c. Quantization

Description : Artificial neural network used for A. Pattern Recognition B. Classification C. Clustering D. All of these

Last Answer : D. All of these

Description : What are the types of clustering technique?

Last Answer : i. Agglomerative clustering  ii. K-means clustering 

Description : K-means, self-organizing maps, hierarchical clustering are the example of _____. A. Supervised learning B. Unsupervised learning C. Machine learning D. Deep learning

Last Answer : B. Unsupervised learning 

Description : In what way is a file more flexible than a String?

Last Answer : Ans: A file is stored permanently in a storage device.It is easy to access a file whenever required. On the other hand, a string is stored temporarily in RAM, and the contents of a string will be erased automatically when the power is switched off or when the program execution is terminated.

Description : Why is the ‘S’ of String capital?

Last Answer : A: Since String is a class.

Description : Is it compulsory to write String args[] when running a program in BlueJ?

Last Answer : A: No it is not compulsory when we are running it in BlueJ. But normally (in all other cases) it is always better to have it, as the JVM looks for the main method with a String array as a parameter.

Description : Which command is used to concatenate all files beginning with the string 'emp' and followed by a non-numeric characters? A. cat emp[!0-9] B. more [emp][!0-9] C. cat emp[x-z]

Last Answer : A. cat emp[!0-9]

Description : Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3? A. chmod u+x emp[l-3] B. chmod 777 emp* C. chmod u+r ??? emp D. chmod 222 emp? E. None of the above

Last Answer : A. chmod u+x emp[l-3]

Description : Which command is used to copy all files having the string chap and any two characters after that to the progs directory? A. cp chap?? progs B. cp chap* progs C. cp chap[12] /progs/*.*

Last Answer : A. cp chap?? progs

Description : Which of the following methods belong to the string class? A) length( ) B) compare To ( ) C) equals ( ) D) All of them

Last Answer : D) All of them

Description : Which of the following methods belong to the string class? A) length( ) B) compare To ( ) C) equals ( ) D) All of them

Last Answer : D) All of them

Description : The class string belongs to ................... package. A) java.awt B) java.lang C) java.applet D) java.string

Last Answer : B) java.lang

Description : ………… function writes a string of text to a window. A) cputs () B) put () C) gets () D) tputs ()

Last Answer : A) cputs ()

Description : The ..................... is essentially used to search for patterns in target string. A) Like Predicate B) Null Predicate C) In Predicate D) Out Predicate

Last Answer : A) Like Predicate

Description : To remove string “hello” from list1, we use which command ? a) list1.remove(“hello”) b) list1.remove(hello) c) list1.removeAll(“hello”) d) list1.removeOne(“hello”)

Last Answer : d) list1.removeOne(“hello”)

Description : The output of executing string.ascii_letters can also be achieved by: a) string.ascii_lowercase_string.digits b) string.ascii_lowercase+string.ascii_upercase c) string.letters d) string.lowercase_string.upercase

Last Answer : d) string.lowercase_string.upercase

Description : Which is the correct statement(s) for Non Recursive predictive parser? S1: First(α) = {t | α => * t β for some string β } => *tβ S2: Follow(X) = { a | S => * αXa β for some strings ... and S2 is correct. (C) S1 is correct and S2 is incorrect. (D) Both statements S1 and S2 are correct. 

Last Answer : (D) Both statements S1 and S2 are correct.

Description : Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right. (A) Leftmost derivation (B) Leftmost derivation traced out in reverse (C) Rightmost derivation traced out in reverse (D) Rightmost derivation

Last Answer : (A) Leftmost derivation

Description : Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the pages. The page reference string is :  1 2 3 2 5 6 3 4 6 3 7 3 1 5 3 6 3 4 2 4 3 4 5 ... to fill available page frames with pages): (A) 9 and 6 (B) 10 and 7 (C) 9 and 7 (D) 10 and 6

Last Answer : (B) 10 and 7

Description : The control string in C++ consists of three important classifications of characters (A) Escape sequence characters, Format specifiers and Whitespace characters (B) Special characters, White-space ... and Non-white space characters (D) Special characters, White-space characters and Format specifiers

Last Answer : (C) Format specifiers, White-space characters and Non-white space characters