MCQ on Data Mining with Answers set-1



1. ...................... is an essential process where intelligent methods are applied to extract data patterns.


MCQ on Data Mining with AnswersA) Data warehousing

B) Data mining

C) Text mining

D) Data selection



2. Data mining can also applied to other forms such as ................


i) Data streams

ii) Sequence data

iii) Networked data

iv) Text data

v) Spatial data

A) i, ii, iii and v only

B) ii, iii, iv and v only

C) i, iii, iv and v only

D) All i, ii, iii, iv and v



3. Which of the following is not a data mining functionality?

A) Characterization and Discrimination

B) Classification and regression

C) Selection and interpretation

D) Clustering and Analysis



4. ............................. is a summarization of the general characteristics or features of a target class of data.

A) Data Characterization

B) Data Classification

C) Data discrimination

D) Data selection





5. ............................. is a comparison of the general features of the target class data objects against the general features of objects from one or multiple contrasting classes.

A) Data Characterization

B) Data Classification

C) Data discrimination

D) Data selection



6. Strategic value of data mining is ......................

A) cost-sensitive

B) work-sensitive

C) time-sensitive

D) technical-sensitive



7. ............................. is the process of finding a model that describes and distinguishes data classes or concepts.

A) Data Characterization

B) Data Classification

C) Data discrimination

D) Data selection



8. The various aspects of data mining methodologies is/are ...................

i) Mining various and new kinds of knowledge

ii) Mining knowledge in multidimensional space

iii) Pattern evaluation and pattern or constraint-guided mining.

iv) Handling uncertainty, noise, or incompleteness of data


A) i, ii and iv only

B) ii, iii and iv only

C) i, ii and iii only

D) All i, ii, iii and iv



9. The full form of KDD is ..................

A) Knowledge Database

B) Knowledge Discovery Database

C) Knowledge Data House

D) Knowledge Data Definition



10. The out put of KDD is .............

A) Data

B) Information

C) Query

D) Useful information



Answers:




1. ...................... is an essential process where intelligent methods are applied to extract data patterns.

B) Data mining

2. Data mining can also applied to other forms such as ................

i) Data streams

ii) Sequence data

iii) Networked data

iv) Text data

v) Spatial data

D) All i, ii, iii, iv and v

3. Which of the following is not a data mining functionality?

C) Selection and interpretation


4. ............................. is a summarization of the general characteristics or features of a target class of data.

A) Data Characterization


5. ............................. is a comparison of the general features of the target class data objects against the general features of objects from one or multiple contrasting classes.

C) Data discrimination


6. Strategic value of data mining is ......................

C) time-sensitive


7. ............................. is the process of finding a model that describes and distinguishes data classes or concepts.

B) Data Classification


8. The various aspects of data mining methodologies is/are ...................

i) Mining various and new kinds of knowledge

ii) Mining knowledge in multidimensional space

iii) Pattern evaluation and pattern or constraint-guided mining.

iv) Handling uncertainty, noise, or incompleteness of data

D) All i, ii, iii and iv


9. The full form of KDD is ..................

B) Knowledge Discovery Database


10. The out put of KDD is .............

D) Useful information




Related Posts



Solved Objective Questions for IT Officer Exam Part-3

Solved Objective Questions for IT Officer Exam Part-3


Network topology Mesh topology
Mesh topology (Photo credit: Wikipedia)

1. What is the name of the network topology in which there are bi-directional links between each possible node?

A) Ring


B) Star

C) Tree

D) Mesh




2. Which scheduling policy is most suitable for time-shared operating system?

A) Shortest job first

B) Round-robin

C) Elevator

D) First-come-first-serve



3. A next-generation web content development language, ................ typically refers to a suite of technologies that allow developers to store data in a readable format.

A) HTML

B) XML

C) XSL

D) PHP



4. A(n) ................... is a private corporate network that uses standard Internet protocols and interfaces.

A) Internet

B) Extranet

C) Local Area Network

D) Intranet



5. Integrated Circuit is related to .......................... generations computers.

A) Second

B) Third

C) Fourth

D) Fifth




6. Which of the following is the most suitable scheduling scheme in a real time operating system?

A) Round robin

B) First come first serve

C) Preemptive scheduling

D) Random Scheduling



7. Kernel is .........

A) Considered as the critical part of the operating system

B) The software which monitors the operating system

C) The set of primitive functions upon which the rest of operating system functions are build up

D) None of the above



8. Which of the following storage is fastest?

A) RAM

B) ROM

C) Register

D) Blu-ray disc



9. A polymorphic virus .........

A) Modifies its program code each time it attaches itself to another program or file.

B) Is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.

C) A malicious-logic program that hides within or looks like a legitimate program.

D) Infects a program file, but still reports the size and creation date of the original, uninfected program.



10. Cache Memory ......

A) Helps to store more data in hard disk

B) Placed between main memory and microprocessor

C) Stores data permanently

D) Holds last time visited web site only





Answers:


1. What is the name of the network topology in which there are bi-directional links between each possible node?

D) Mesh

Explanation: A mesh network is a local area network (LAN) that employs one of two connection arrangements, full mesh topology or partial mesh topology. In the full mesh topology, each node (workstation or other device) is connected directly to each of the others. Read More: mesh network -whatis.techtarget.com and Network Topology - wikipedia.org


2. Which scheduling policy is most suitable for time-shared operating system?

B) Round-robin

Explanation: In the round robin scheduling, processes are dispatched in a FIFO manner but are given a limited amount of CPU time called a time-slice or a quantum. If a process does not complete before its CPU-time expires, the CPU is preempted and given to the next process waiting in a queue. Read More: CPU/Process Scheduling -personal.kent.edu


3. A next-generation web content development language, ................ typically refers to a suite of technologies that allow developers to store data in a readable format.

B) XML

Explanation: Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. It is a textual data format with strong support via Unicode for the languages of the world. Although the design of XML focuses on documents, it is widely used for the representation of arbitrary data structures. Read More: Extensible Markup Language (XML) -wikipedia.org


4. A(n) ................... is a private corporate network that uses standard Internet protocols and interfaces.

D) Intranet

Explanation: An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or network operating system within that organization. Read More: Intranet - princeton.edu


5. Integrated Circuit is related to .......................... generations computers.

B) Third

Explanation:The mass increase in the use of computers accelerated with 'Third Generation' computers. These generally relied on Jack Kilby's invention of the integrated circuit (or microchip), starting around 1965. Read More: History of computing hardware - wikipedia.org


6. Which of the following is the most suitable scheduling scheme in a real time operating system?

C) Preemptive scheduling

Explanation: A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time application requests. It must be able to process data as it comes in, typically without buffering delays.

A scheduling decipline is preemptive if, once a process has been given the CPU can taken away. The strategy of allowing processes that are logically runable to be temporarily suspended is called Preemptive Scheduling and it is contrast to the "run to completion" method.


7. Kernel is .........

C) The set of primitive functions upon which the rest of operating system functions are build up

Explanation: The Operating System Kernel does Basic set of primitive operations and processes Like a function call or macro expansion, Part of the calling process, Critical section for the process etc. Read more: Process Scheduling -cs.umsl.edu


8. Which of the following storage is fastest?

C) Register


Explanation: Register is faster than RAM, ROM and Blu-ray disc.


9. A polymorphic virus .........

A) Modifies its program code each time it attaches itself to another program or file.

Explanation: Polymorphic viruses create varied (though fully functional) copies of themselves as a way to avoid detection by anti-virus software. Some polymorphic virus use different encryption schemes and require different decryption routines. Read More: Polymorphic viruses


10. Cache Memory ......

B) Placed between main memory and microprocessor

Explanation: The Performance of a microcomputer system can be improved significantly by introducing a small expensive but fast memory between microprocessor and main memory. Read more: Cache Memory



Solved MCQ for IT Officer Exam Part-2

Solved MCQ for IT Officer Exam Part-2


SWIFT Logo
SWIFT Logo (Photo credit: Wikipedia)
1. SWIFT stands for:

A) Society for Worldwide Interbank Financial Telecommunication

B) Society for Worldwide International Financial Telecommunication

C) Society for Worldwide Interbank Financial Transmission

D) Society for Worldwide Interbank Financial Transfer



2. Which one is the correct statement?

A) XML is a technology used only on the internet.

B) XML is a programming language.

C) XML is highly suitable data exchange between two different systems.

D) XML is scripting language.



3. Decision support systems usually

A) serve managers interested in weekly, monthly and yearly results, not day-to-day activities.

B) help managers make decisions that are unique, rapidly changing and not easily specified in advance.

C) provide managers with a generalized computing and telecommunications capacity that can be applied to a changing array of problems.

D) perform and record the daily routine transactions necessary to the conduct of business.



4. Identifying customers and markets using data on demographics, markets, consumer behavior and trends is an example of a (n):

A) operational-level sales and marketing information system

B) knowledge-level sales and marketing information system

C) strategic-level sales and marketing information system

D) management-level sales and marketing information system



5. Enterprise systems support:

A) manufacturing process

B) financial and accounting process

C) human resource processes

D) all of the above



6. An example of an information to support a strategic management is:

A) spreadsheet model of income projections

B) business intelligence system

C) electronic document management system

D) financial information system



7. Which type of software is focused in supporting communication, collaboration and coordination?

A) E-business software

B) CRM software

C) groupware

D) SCM software



8. A data warehouse is .........

A) updated by end users

B) contains numerous naming conventions and formats

C) organized around important subject areas

D) contains only current data



9. Capability of data mining is to build ................ models.

A) retrospective

B) interrogative

C) predictive

D) imperative



10. A link is said to be ............... link if it is between pages with different domain names.

A) intrinsic

B) transverse

C) direct

D) contrast



Answers:




1. SWIFT stands for:

A) Society for Worldwide Interbank Financial Telecommunication

Explanation: The Society for Worldwide Interbank Financial Telecommunication provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. Read More at: wikipedia.org


2. Which one is the correct statement?

C) XML is highly suitable data exchange between two different systems.

Explanation: XML data is stored in plain text format. This provides a software and hardware independent way of storing data. XML is highly suitable data exchange between two different systems, since the data can be read by different incompatible applications. Read More at: How Can XML be Used?-w3schools.com.


3. Decision support systems usually

B) help managers make decisions that are unique, rapidly changing and not easily specified in advance.

Explanation: Decision support systems usually help managers make decisions that are unique, rapidly changing and not easily specified in advance. Read More at: Decision support systems -books.google.com


4. Identifying customers and markets using data on demographics, markets, consumer behavior and trends is an example of a (n):

B) knowledge-level sales and marketing information system

Explanation: Identifying customers and markets using data on demographics, markets, consumer behavior and trends is an example of a knowledge-level sales and marketing information system.


5. Enterprise systems support:

D) all of the above

Explanation: Enterprise systems support manufacturing process, financial and accounting process and human resource processes. Read More: Enterprise systems -books.google.com


6. An example of an information to support a strategic management is:

B) business intelligence system

Explanation: An example of an information to support a strategic management is business intelligence system. Read More: Business Intelligence System -books.google.com


7. Which type of software is focused in supporting communication, collaboration and coordination?

C) groupware

Explanation: Groupware is a type of software is focused in supporting communication, collaboration and coordination. Read More: Groupware -wikipedia.org


8. A data warehouse is .........

C) organized around important subject areas

Explanation: A data warehouse can be used to analyze a particular subject area. Read more: Data warehouse definition -1keydata.com


9. Capability of data mining is to build ................ models.

C) predictive

Explanation: Capability of data mining is to build predictive models.



10. A link is said to be ............... link if it is between pages with different domain names.

B) transverse

Explanation: A link is said to be transverse link if it is between pages with different domain names and A link is said to be intrinsic link if it is between pages with same domain names. Read More: transverse and intrinsic link -books.google.com





Related Posts: