MCQOPTIONS
Saved Bookmarks
This section includes 3246 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 851. |
is a form of supply chain where a series of assembly operations are carried out toobtain the final product |
| A. | Converging supply chain |
| B. | Diverging supply chain |
| C. | Any of these |
| D. | None |
| Answer» B. Diverging supply chain | |
| 852. |
A is a software that scours the internet collecting data about every websiteand every webpage within it |
| A. | spider |
| B. | Search Engines |
| C. | robots |
| D. | none of these |
| Answer» C. robots | |
| 853. |
Which among the following product is suitable for E-Commerce ? |
| A. | Book |
| B. | Vegetables |
| C. | All of these |
| D. | None of these |
| Answer» B. Vegetables | |
| 854. |
Web pages are prepared using their language as………………… |
| A. | html |
| B. | FTP |
| C. | HTTP |
| D. | None of these |
| Answer» B. FTP | |
| 855. |
e-commerce involves customers gathering information, purchasing and receivingproducts over an electronic network |
| A. | B2G |
| B. | B2E |
| C. | B2B |
| D. | B2C |
| Answer» E. | |
| 856. |
streamlines the flow of information and self service capabilities throughautomation |
| A. | SCC |
| B. | CRM |
| C. | CRP |
| D. | SCM |
| Answer» B. CRM | |
| 857. |
Which among the following is not a B2E application |
| A. | Online Insurance policy management |
| B. | Online supply requests |
| C. | Special employee offers |
| D. | Locate application and tax forms |
| Answer» E. | |
| 858. |
……………….in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer |
| A. | customer |
| B. | issuer |
| C. | Merchant |
| D. | Acquirer |
| Answer» B. issuer | |
| 859. |
The non-root node of item-prefix-tree consists of fields |
| A. | Two |
| B. | Three |
| C. | Four |
| D. | Five |
| Answer» C. Four | |
| 860. |
Metadata contains at least__________. |
| A. | The structure of the data |
| B. | The algorithms used for summarization |
| C. | The mapping from the operational environment to the data warehouse |
| D. | All of the above |
| Answer» E. | |
| 861. |
The second phase of A Priori algorithm is____________ |
| A. | Candidate generation |
| B. | Itemset generation |
| C. | Pruning |
| D. | Partitioning |
| Answer» D. Partitioning | |
| 862. |
The absolute number of transactions supporting X in T is called _______. |
| A. | Confidence |
| B. | Support |
| C. | Support count |
| D. | None of the above |
| Answer» D. None of the above | |
| 863. |
The key used in operational environment may not have an element of _________. |
| A. | Time |
| B. | Cost |
| C. | Frequency |
| D. | Quality |
| Answer» B. Cost | |
| 864. |
The A Priori algorithm is a____________ |
| A. | Top-down search |
| B. | Breadth first search |
| C. | Depth first search |
| D. | Bottom-up search |
| Answer» E. | |
| 865. |
Data scrubbing is___________. |
| A. | A process to reject data from the data warehouse and to create the necessary indexes |
| B. | A process to load the data in the data warehouse and to create the necessary indexes |
| C. | A process to upgrade the quality of data after it is moved into a data warehouse |
| D. | A process to upgrade the quality of data before it is moved into a data warehouse |
| Answer» E. | |
| 866. |
________consists of information in the enterprise that is not in classical form. |
| A. | Mushy metadata |
| B. | Differential metadata |
| C. | Data warehouse |
| D. | Data mining |
| Answer» B. Differential metadata | |
| 867. |
The threshold function is replaced by continuousfunctions called______functions. |
| A. | Activation. |
| B. | Deactivation. |
| C. | Dynamic. |
| D. | Standard |
| Answer» B. Deactivation. | |
| 868. |
is the way of studying the web link structure. |
| A. | Computer network |
| B. | Physical network |
| C. | Social network |
| D. | Logical network |
| Answer» D. Logical network | |
| 869. |
_________is the heart of the warehouse. |
| A. | Data mining database servers |
| B. | Data warehouse database servers |
| C. | Data mart database servers |
| D. | Relational data base servers |
| Answer» C. Data mart database servers | |
| 870. |
___________are responsible for running queries and reports against data warehouse tables. |
| A. | Hardware |
| B. | Software |
| C. | End users |
| D. | Middle ware |
| Answer» D. Middle ware | |
| 871. |
Bill Inmon has estimated___________of the time required to build a datawarehouse, is consumed in the conversion process. |
| A. | 10 percent |
| B. | 20 percent |
| C. | 30 percent |
| D. | 40 percent |
| Answer» E. | |
| 872. |
Link Analysis is otherwise called as ____. |
| A. | Affinity analysis |
| B. | Association rules |
| C. | Both A & B |
| D. | Prediction |
| Answer» D. Prediction | |
| 873. |
is the most well-known association rule algorithm and is used in most commercialproducts |
| A. | Apriori algorithm |
| B. | Partition algorithm |
| C. | Distributed algorithm |
| D. | Pincer-search algorithm |
| Answer» B. Partition algorithm | |
| 874. |
__________ is a subject-oriented, integrated, time-variant, nonvolatile collection of data insupport of management decisions. |
| A. | Data Mining |
| B. | Data Warehousing |
| C. | Web Mining |
| D. | Text Mining |
| Answer» C. Web Mining | |
| 875. |
Classification rules are extracted from____________. |
| A. | Root node |
| B. | Decision tree |
| C. | Siblings |
| D. | Branches |
| Answer» C. Siblings | |
| 876. |
are a different paradigm for computing which draws its inspiration fromneuroscience |
| A. | Computer networks |
| B. | Neural networks |
| C. | Mobile networks |
| D. | Artificial networks |
| Answer» C. Mobile networks | |
| 877. |
Training may be used when a clear link between input data sets and target outputvalues does not exist. |
| A. | Competitive |
| B. | Perception |
| C. | Supervise |
| D. | D Unsupervised |
| Answer» E. | |
| 878. |
is the most widely applied neural network technique. |
| A. | ABC |
| B. | PLM |
| C. | LMP |
| D. | MLP |
| Answer» E. | |
| 879. |
An operational system is________. |
| A. | Used to run the business in real time and is based on historical data |
| B. | Used to run the business in real time and is based on current data |
| C. | Used to support decision making and is based on current data |
| D. | Used to support decision making and is based on historical data |
| Answer» C. Used to support decision making and is based on current data | |
| 880. |
_____________are designed to overcome any limitations placed on the warehouse by thenature of the relational data model. |
| A. | Operational database |
| B. | Relational database |
| C. | Multidimensional database |
| D. | Data repository |
| Answer» D. Data repository | |
| 881. |
Data transformation includes___________. |
| A. | A process to change data from a detailed level to a summary level |
| B. | A process to change data from a summary level to a detailed level |
| C. | Joining data from one source into various sources of data |
| D. | Separating data from one source into various sources of data |
| Answer» B. A process to change data from a summary level to a detailed level | |
| 882. |
Any subset of a frequent set is a frequent set. This is_________ |
| A. | Upward closure property |
| B. | Downward closure property |
| C. | Maximal frequent set |
| D. | Border set |
| Answer» C. Maximal frequent set | |
| 883. |
An algorithm called________is used to generate the candidate item sets for each pass afterthe first |
| A. | Apriori |
| B. | Apriori-gen |
| C. | Sampling |
| D. | Partition |
| Answer» C. Sampling | |
| 884. |
Research on mining multi-types of data is termed as__________data. |
| A. | Graphics |
| B. | Multimedia |
| C. | Meta |
| D. | Digital |
| Answer» C. Meta | |
| 885. |
______is a good alternative to the star schema. |
| A. | Star schema |
| B. | Snowflake schema |
| C. | Fact constellation |
| D. | Star-snowflake schema |
| Answer» D. Star-snowflake schema | |
| 886. |
The KDD process consists of ____steps. |
| A. | Three |
| B. | Four |
| C. | Five |
| D. | Six |
| Answer» D. Six | |
| 887. |
Genetic algorithms are search algorithms based on the mechanics of natural . |
| A. | Systems |
| B. | Genetics |
| C. | Logistics |
| D. | Statistics |
| Answer» C. Logistics | |
| 888. |
The most common source of change data in refreshing a data warehouse is__________. |
| A. | Query able change data |
| B. | Cooperative change data |
| C. | Logged change data |
| D. | Snapshot change data |
| Answer» B. Cooperative change data | |
| 889. |
SOM is an acronym of . |
| A. | Self-organizing map |
| B. | Self-origin map |
| C. | Single organizing map |
| D. | Simple origin map |
| Answer» B. Self-origin map | |
| 890. |
__________are designed to overcome any limitations placed on the warehouse by the natureof the relational data model. |
| A. | Operational database |
| B. | Relational database |
| C. | Multidimensional database |
| D. | Data repository |
| Answer» D. Data repository | |
| 891. |
The cluster features of different subclusters are maintained in a tree called_________ |
| A. | CF tree |
| B. | FP tree |
| C. | FP growth tree |
| D. | B tree |
| Answer» B. FP tree | |
| 892. |
The network topology is constrained to be . |
| A. | Feed forward |
| B. | Feed backward |
| C. | Feed free |
| D. | Feed busy |
| Answer» B. Feed backward | |
| 893. |
The terms equality and roll up are associated with__________. |
| A. | OLAP |
| B. | Visualization |
| C. | Data mart |
| D. | Decision tree |
| Answer» D. Decision tree | |
| 894. |
______ are needed to identify training data and desired results. |
| A. | Programmers |
| B. | Designers |
| C. | Users |
| D. | Administrators |
| Answer» D. Administrators | |
| 895. |
The human brain consists of a network of . |
| A. | Neurons |
| B. | Cells |
| C. | Tissue |
| D. | Muscles |
| Answer» B. Cells | |
| 896. |
__________predicts future trends & behaviors, allowing business managers to make proactive, knowledge-driven decisions. |
| A. | Data warehouse |
| B. | Data mining |
| C. | Data marts |
| D. | Metadata |
| Answer» C. Data marts | |
| 897. |
Each neuron is made up of a number of nerve fibers called________. |
| A. | Electrons |
| B. | Molecules |
| C. | Atoms |
| D. | Dendrites |
| Answer» E. | |
| 898. |
_________are effective tools to attack the scalability problem. |
| A. | Sampling |
| B. | Parallelization |
| C. | Both A & B |
| D. | None of the above |
| Answer» D. None of the above | |
| 899. |
The partition algorithm uses scans of the databases to discover all frequent sets |
| A. | Two |
| B. | Four |
| C. | Six |
| D. | Eight |
| Answer» B. Four | |
| 900. |
The term that is not associated with data cleaning process is____________. |
| A. | Domain consistency |
| B. | Deduplication |
| C. | Disambiguation |
| D. | Segmentation |
| Answer» E. | |