

MCQOPTIONS
Saved Bookmarks
This section includes 3246 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
851. |
is a form of supply chain where a series of assembly operations are carried out toobtain the final product |
A. | Converging supply chain |
B. | Diverging supply chain |
C. | Any of these |
D. | None |
Answer» B. Diverging supply chain | |
852. |
A is a software that scours the internet collecting data about every websiteand every webpage within it |
A. | spider |
B. | Search Engines |
C. | robots |
D. | none of these |
Answer» C. robots | |
853. |
Which among the following product is suitable for E-Commerce ? |
A. | Book |
B. | Vegetables |
C. | All of these |
D. | None of these |
Answer» B. Vegetables | |
854. |
Web pages are prepared using their language as………………… |
A. | html |
B. | FTP |
C. | HTTP |
D. | None of these |
Answer» B. FTP | |
855. |
e-commerce involves customers gathering information, purchasing and receivingproducts over an electronic network |
A. | B2G |
B. | B2E |
C. | B2B |
D. | B2C |
Answer» E. | |
856. |
streamlines the flow of information and self service capabilities throughautomation |
A. | SCC |
B. | CRM |
C. | CRP |
D. | SCM |
Answer» B. CRM | |
857. |
Which among the following is not a B2E application |
A. | Online Insurance policy management |
B. | Online supply requests |
C. | Special employee offers |
D. | Locate application and tax forms |
Answer» E. | |
858. |
……………….in the e-commerce may be a holder of a payment card such as credit card ordebit card from an issuer |
A. | customer |
B. | issuer |
C. | Merchant |
D. | Acquirer |
Answer» B. issuer | |
859. |
The non-root node of item-prefix-tree consists of fields |
A. | Two |
B. | Three |
C. | Four |
D. | Five |
Answer» C. Four | |
860. |
Metadata contains at least__________. |
A. | The structure of the data |
B. | The algorithms used for summarization |
C. | The mapping from the operational environment to the data warehouse |
D. | All of the above |
Answer» E. | |
861. |
The second phase of A Priori algorithm is____________ |
A. | Candidate generation |
B. | Itemset generation |
C. | Pruning |
D. | Partitioning |
Answer» D. Partitioning | |
862. |
The absolute number of transactions supporting X in T is called _______. |
A. | Confidence |
B. | Support |
C. | Support count |
D. | None of the above |
Answer» D. None of the above | |
863. |
The key used in operational environment may not have an element of _________. |
A. | Time |
B. | Cost |
C. | Frequency |
D. | Quality |
Answer» B. Cost | |
864. |
The A Priori algorithm is a____________ |
A. | Top-down search |
B. | Breadth first search |
C. | Depth first search |
D. | Bottom-up search |
Answer» E. | |
865. |
Data scrubbing is___________. |
A. | A process to reject data from the data warehouse and to create the necessary indexes |
B. | A process to load the data in the data warehouse and to create the necessary indexes |
C. | A process to upgrade the quality of data after it is moved into a data warehouse |
D. | A process to upgrade the quality of data before it is moved into a data warehouse |
Answer» E. | |
866. |
________consists of information in the enterprise that is not in classical form. |
A. | Mushy metadata |
B. | Differential metadata |
C. | Data warehouse |
D. | Data mining |
Answer» B. Differential metadata | |
867. |
The threshold function is replaced by continuousfunctions called______functions. |
A. | Activation. |
B. | Deactivation. |
C. | Dynamic. |
D. | Standard |
Answer» B. Deactivation. | |
868. |
is the way of studying the web link structure. |
A. | Computer network |
B. | Physical network |
C. | Social network |
D. | Logical network |
Answer» D. Logical network | |
869. |
_________is the heart of the warehouse. |
A. | Data mining database servers |
B. | Data warehouse database servers |
C. | Data mart database servers |
D. | Relational data base servers |
Answer» C. Data mart database servers | |
870. |
___________are responsible for running queries and reports against data warehouse tables. |
A. | Hardware |
B. | Software |
C. | End users |
D. | Middle ware |
Answer» D. Middle ware | |
871. |
Bill Inmon has estimated___________of the time required to build a datawarehouse, is consumed in the conversion process. |
A. | 10 percent |
B. | 20 percent |
C. | 30 percent |
D. | 40 percent |
Answer» E. | |
872. |
Link Analysis is otherwise called as ____. |
A. | Affinity analysis |
B. | Association rules |
C. | Both A & B |
D. | Prediction |
Answer» D. Prediction | |
873. |
is the most well-known association rule algorithm and is used in most commercialproducts |
A. | Apriori algorithm |
B. | Partition algorithm |
C. | Distributed algorithm |
D. | Pincer-search algorithm |
Answer» B. Partition algorithm | |
874. |
__________ is a subject-oriented, integrated, time-variant, nonvolatile collection of data insupport of management decisions. |
A. | Data Mining |
B. | Data Warehousing |
C. | Web Mining |
D. | Text Mining |
Answer» C. Web Mining | |
875. |
Classification rules are extracted from____________. |
A. | Root node |
B. | Decision tree |
C. | Siblings |
D. | Branches |
Answer» C. Siblings | |
876. |
are a different paradigm for computing which draws its inspiration fromneuroscience |
A. | Computer networks |
B. | Neural networks |
C. | Mobile networks |
D. | Artificial networks |
Answer» C. Mobile networks | |
877. |
Training may be used when a clear link between input data sets and target outputvalues does not exist. |
A. | Competitive |
B. | Perception |
C. | Supervise |
D. | D Unsupervised |
Answer» E. | |
878. |
is the most widely applied neural network technique. |
A. | ABC |
B. | PLM |
C. | LMP |
D. | MLP |
Answer» E. | |
879. |
An operational system is________. |
A. | Used to run the business in real time and is based on historical data |
B. | Used to run the business in real time and is based on current data |
C. | Used to support decision making and is based on current data |
D. | Used to support decision making and is based on historical data |
Answer» C. Used to support decision making and is based on current data | |
880. |
_____________are designed to overcome any limitations placed on the warehouse by thenature of the relational data model. |
A. | Operational database |
B. | Relational database |
C. | Multidimensional database |
D. | Data repository |
Answer» D. Data repository | |
881. |
Data transformation includes___________. |
A. | A process to change data from a detailed level to a summary level |
B. | A process to change data from a summary level to a detailed level |
C. | Joining data from one source into various sources of data |
D. | Separating data from one source into various sources of data |
Answer» B. A process to change data from a summary level to a detailed level | |
882. |
Any subset of a frequent set is a frequent set. This is_________ |
A. | Upward closure property |
B. | Downward closure property |
C. | Maximal frequent set |
D. | Border set |
Answer» C. Maximal frequent set | |
883. |
An algorithm called________is used to generate the candidate item sets for each pass afterthe first |
A. | Apriori |
B. | Apriori-gen |
C. | Sampling |
D. | Partition |
Answer» C. Sampling | |
884. |
Research on mining multi-types of data is termed as__________data. |
A. | Graphics |
B. | Multimedia |
C. | Meta |
D. | Digital |
Answer» C. Meta | |
885. |
______is a good alternative to the star schema. |
A. | Star schema |
B. | Snowflake schema |
C. | Fact constellation |
D. | Star-snowflake schema |
Answer» D. Star-snowflake schema | |
886. |
The KDD process consists of ____steps. |
A. | Three |
B. | Four |
C. | Five |
D. | Six |
Answer» D. Six | |
887. |
Genetic algorithms are search algorithms based on the mechanics of natural . |
A. | Systems |
B. | Genetics |
C. | Logistics |
D. | Statistics |
Answer» C. Logistics | |
888. |
The most common source of change data in refreshing a data warehouse is__________. |
A. | Query able change data |
B. | Cooperative change data |
C. | Logged change data |
D. | Snapshot change data |
Answer» B. Cooperative change data | |
889. |
SOM is an acronym of . |
A. | Self-organizing map |
B. | Self-origin map |
C. | Single organizing map |
D. | Simple origin map |
Answer» B. Self-origin map | |
890. |
__________are designed to overcome any limitations placed on the warehouse by the natureof the relational data model. |
A. | Operational database |
B. | Relational database |
C. | Multidimensional database |
D. | Data repository |
Answer» D. Data repository | |
891. |
The cluster features of different subclusters are maintained in a tree called_________ |
A. | CF tree |
B. | FP tree |
C. | FP growth tree |
D. | B tree |
Answer» B. FP tree | |
892. |
The network topology is constrained to be . |
A. | Feed forward |
B. | Feed backward |
C. | Feed free |
D. | Feed busy |
Answer» B. Feed backward | |
893. |
The terms equality and roll up are associated with__________. |
A. | OLAP |
B. | Visualization |
C. | Data mart |
D. | Decision tree |
Answer» D. Decision tree | |
894. |
______ are needed to identify training data and desired results. |
A. | Programmers |
B. | Designers |
C. | Users |
D. | Administrators |
Answer» D. Administrators | |
895. |
The human brain consists of a network of . |
A. | Neurons |
B. | Cells |
C. | Tissue |
D. | Muscles |
Answer» B. Cells | |
896. |
__________predicts future trends & behaviors, allowing business managers to make proactive, knowledge-driven decisions. |
A. | Data warehouse |
B. | Data mining |
C. | Data marts |
D. | Metadata |
Answer» C. Data marts | |
897. |
Each neuron is made up of a number of nerve fibers called________. |
A. | Electrons |
B. | Molecules |
C. | Atoms |
D. | Dendrites |
Answer» E. | |
898. |
_________are effective tools to attack the scalability problem. |
A. | Sampling |
B. | Parallelization |
C. | Both A & B |
D. | None of the above |
Answer» D. None of the above | |
899. |
The partition algorithm uses scans of the databases to discover all frequent sets |
A. | Two |
B. | Four |
C. | Six |
D. | Eight |
Answer» B. Four | |
900. |
The term that is not associated with data cleaning process is____________. |
A. | Domain consistency |
B. | Deduplication |
C. | Disambiguation |
D. | Segmentation |
Answer» E. | |