MCQOPTIONS
Saved Bookmarks
This section includes 32 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
__________ is a subject-oriented, integrated, time-variant, nonvolatile collection of data in support of management decisions. |
| A. | Data Mining |
| B. | Data Warehousing |
| C. | Web Mining |
| D. | Text Mining |
| Answer» C. Web Mining | |
| 2. |
The important aspect of the data warehouse environment is that data found within the data warehouse is__________. |
| A. | subject-oriented |
| B. | time-variant |
| C. | integrate |
| D. | D All of the above |
| Answer» E. | |
| 3. |
__________maps the core warehouse metadata to business concepts, familiar and useful to end users. |
| A. | Application level metadata |
| B. | User level metadata |
| C. | Enduser level metadata |
| D. | Core level metadata |
| Answer» B. User level metadata | |
| 4. |
___________defines the structure of the data held in operational databases and used by operational applications. |
| A. | User-level metadata |
| B. | Data warehouse metadata |
| C. | Operational metadata |
| D. | Data mining metadata |
| Answer» D. Data mining metadata | |
| 5. |
The main organizational justification for implementing a data warehouse is to provide__________. |
| A. | Cheaper ways of handling transportation |
| B. | Decision support |
| C. | Storing large volume of data |
| D. | Access to data |
| Answer» D. Access to data | |
| 6. |
Bill Inmon has estimated___________of the time required to build a data warehouse, is consumed in the conversion process. |
| A. | 10 percent |
| B. | 20 percent |
| C. | 30 percent |
| D. | 40 percent |
| Answer» E. | |
| 7. |
The biggest drawback of the level indicator in the classic star-schema is thatit limits_________. |
| A. | Quantify |
| B. | Qualify |
| C. | Flexibility |
| D. | Ability |
| Answer» D. Ability | |
| 8. |
The ______of data could result in the disclosure of information that is deemed to be confidential. |
| A. | Authorized use |
| B. | Unauthorized use |
| C. | Authenticated use |
| D. | Unauthenticated use |
| Answer» C. Authenticated use | |
| 9. |
Reducing the number of attributes to solve the high dimensionality problem is called as_____________. |
| A. | Dimensionality curse |
| B. | Dimensionality reduction |
| C. | Cleaning |
| D. | Over fitting |
| Answer» C. Cleaning | |
| 10. |
All set of items whose support is greater than the user-specified minimum support are called as_____________ |
| A. | Border set |
| B. | Frequent set |
| C. | Maximal frequent set |
| D. | Lattice |
| Answer» C. Maximal frequent set | |
| 11. |
If a set is a frequent set and no superset of this set is a frequent set, then it is called____________ |
| A. | Maximal frequent set |
| B. | Border set |
| C. | Lattice |
| D. | Infrequent sets |
| Answer» B. Border set | |
| 12. |
Certain itemsets in the dashed circle whose support count reach support value during an iteration move into the______________ |
| A. | Dashed box |
| B. | Solid circle |
| C. | Solid box |
| D. | None of the above |
| Answer» B. Solid circle | |
| 13. |
________of data means that the attributes within a given entity are fully dependent on the entire primary key of the entity. |
| A. | Additively |
| B. | Granularity |
| C. | Functional dependency |
| D. | Dimensionality |
| Answer» D. Dimensionality | |
| 14. |
clustering technique start with as many clusters as there are records, with each cluster having only one record |
| A. | Agglomerative |
| B. | Divisive |
| C. | Partition |
| D. | Numeric |
| Answer» B. Divisive | |
| 15. |
The_______algorithm is based on the observation that the frequent sets are normally very few in number compared to the set of all itemsets |
| A. | A priori |
| B. | Clustering |
| C. | Association rule |
| D. | Partition |
| Answer» E. | |
| 16. |
The basic idea of the Apriori algorithm is to generate_____item sets of a particular size & scans the database |
| A. | Candidate |
| B. | Primary |
| C. | Secondary |
| D. | Superkey |
| Answer» B. Primary | |
| 17. |
An algorithm called________is used to generate the candidate item sets for each pass after the first |
| A. | Apriori |
| B. | Apriori-gen |
| C. | Sampling |
| D. | Partition |
| Answer» C. Sampling | |
| 18. |
The basic partition algorithm reduces the number of database scans to __________ & divides it into partitions |
| A. | One |
| B. | Two |
| C. | Three |
| D. | Four |
| Answer» C. Three | |
| 19. |
is the most well-known association rule algorithm and is used in most commercial products |
| A. | Apriori algorithm |
| B. | Partition algorithm |
| C. | Distributed algorithm |
| D. | Pincer-search algorithm |
| Answer» B. Partition algorithm | |
| 20. |
__________are designed to overcome any limitations placed on the warehouse by the nature of the relational data model. |
| A. | Operational database |
| B. | Relational database |
| C. | Multidimensional database |
| D. | Data repository |
| Answer» D. Data repository | |
| 21. |
_____________are designed to overcome any limitations placed on the warehouse by the nature of the relational data model. |
| A. | Operational database |
| B. | Relational database |
| C. | Multidimensional database |
| D. | Data repository |
| Answer» D. Data repository | |
| 22. |
In a feed- forward networks, the connections between layers are________from input to output. |
| A. | Bidirectional |
| B. | Unidirectional |
| C. | Multidirectional |
| D. | Directional |
| Answer» C. Multidirectional | |
| 23. |
Training may be used when a clear link between input data sets and target output values does not exist. |
| A. | Competitive |
| B. | Perception |
| C. | Supervise |
| D. | D Unsupervised |
| Answer» E. | |
| 24. |
Investment analysis used in neural networks is to predict the movement of_________from previous data. |
| A. | Engines |
| B. | Stock |
| C. | Patterns |
| D. | Models |
| Answer» C. Patterns | |
| 25. |
SOMs are used to cluster a specific dataset containing information about the patient s drugs etc. |
| A. | Physical |
| B. | Logical |
| C. | Medical |
| D. | Technical |
| Answer» D. Technical | |
| 26. |
Mining is concerned with discovering the model underlying the link structures of the web. |
| A. | Data structure |
| B. | Web structure |
| C. | Text structure |
| D. | Image structure |
| Answer» C. Text structure | |
| 27. |
___________is data that is distilled from the low level of detail found at the current detailed leve. |
| A. | Highly summarized data |
| B. | Lightly summarized data |
| C. | Metadata |
| D. | Older detail data |
| Answer» C. Metadata | |
| 28. |
Effect of one attribute value on a given class is independent of values of other attribute is called____________. |
| A. | Value independence |
| B. | Class conditional independence |
| C. | Conditional independence |
| D. | Unconditional independence |
| Answer» B. Class conditional independence | |
| 29. |
A directory to help the DSS analyst locate the contents of the data warehouse isseen in __________. |
| A. | Current detail data |
| B. | Lightly summarized data |
| C. | Metadata |
| D. | Older detail data |
| Answer» D. Older detail data | |
| 30. |
__________contains information that gives users an easy-to-understand perspective of the information stored in the data warehouse. |
| A. | Business metadata |
| B. | Technical metadata |
| C. | Operational metadata |
| D. | Financial metadata |
| Answer» B. Technical metadata | |
| 31. |
displays of data such as maps, charts and other graphical representation allow data to be presented compactly to the users. |
| A. | Hidden |
| B. | Visual |
| C. | Obscure |
| D. | D Concealed |
| Answer» C. Obscure | |
| 32. |
are a different paradigm for computing which draws its inspiration from neuroscience |
| A. | Computer networks |
| B. | Neural networks |
| C. | Mobile networks |
| D. | Artificial networks |
| Answer» C. Mobile networks | |