A) Row Data
B) Data Pre Processing
C) Building Data mining model
D) Assessing the model
E) Knowledge
Is a sequence of events where the next event is determined by one or more of the preceding events
A) Association
B) Clustering
C) Classification d) Time series
e) Prediction
It identifies the relationships between objects
A) Clustering
B) Classification
C) Prediction d) Association
e) Time-Series analysis
It is used to identify data objects that are similar to one another. The similarity can be decided based on a number of factors like purchase behavior, responsiveness to certain actions, geographical locations and so on
A) Classification
B) Prediction
C) Time-Series analysis
D) Association analysis e) Clustering
This field includes big number of different approaches such as statistical and information analysis, decision trees, similarity measures, neural networks, genetic algorithms, fuzzy logic, etc
A) Summarization
B) Clustering c) Data Mining
D) Classification
E) Prediction
There is a computational approach, which is based on a large collection of neural units, loosely modeling the way a biological brain solves problems with large clusters of biological neurons connected by axons
A) Neural network
B) Artificial neuron
C) Fuzzy logic
D) Genetic algorithm
E) Decision tree
229. To GA operators relate:
A) Evolution b) Mutation
C) Fitness value
D) Population
E) Evolution environment
230.... based on a system of non-digital (continuous & fuzzy without crisp boundaries) set theory and rules
A) Genetic algorithm b) Fuzzy logic
C) Decision tree
D) Neural network
E) Artificial neuron
231. (Excel) This is an absolute cell reference a) $d$9
b) d$9
c) $d9
D) d9
E) 9d
232. (Excel) We have a function SUM(1,2,3,4,5). The value of this function is: a) 15
b) SUM
c) 1,2,3,4 and 5
D) 3
E) 5
233. (Excel) We have a function SUM(1,2,3,4,5). The name of the function is:SUM
Excel) Cell is too narrow to display the results of the formula
a) #NAME?
b) #VALUE! c) #######
d) #DIV/0!
E) Circular Reference
Is a group of computers that shares information across wireless or wired technology
A) A protocol
B) A server
C) A client
D) A mouse
E) A computer network
Is an integral part of a computer network because it provides the computer a way to send and retrieve data
A) A router
|
|
B) A network card
C) A server
D) A client
E) A laptop
Is a set of rules that governs the communications between computers on a network
A) A server
B) A client
C) A laptop
D) A cable
E) A protocol
It is NOT correct topology of the network a) Triangle topology
B) Linear Bus topology
C) Star topology
D) Ring topology
E) Mesh topology
239. What is it topology? In such type of topology, long backbone cable is used to link all the devices in the network
A) Star topology
B) Ring topology
C) Mesh topology d) Bus Topology
e) Tree Topology
Not all hosts have point-to-point connection to every other host
A) Tree Topology
B) Partially Mesh Topology
C) Bus Topology
D) Star topology
E) Ring topology
241. The middle layer of the Hierarchical Topology is known as
A) distribution layer b) access-layer
C) core layer
D) bus layer
E) extended layer
It is the medium through which information usually moves from one network device to another
A) Personal computer
B) Mouse
C) User d) Cable
e) Monitor
It is protection of information and systems within networks that are connected to the Internet
A) Authorization b) Cyber Security
C) Authentication
D) Information Assurance
E) Passwords
The ability to ensure that data is an accurate and unchanged representation of the original secure information
A) Availability
B) Criminal attacks
C) Publicity attacks
D) Confidentiality e) Integrity
It is the process of encoding a message so that its meaning is not obvious
A) Decryption
B) Cryptosystem
C) Criminal attacks d) Encryption
e) Publicity attacks
It is an attempt to break the cipher text
A) Plaintext
B) Cryptanalysis
C) Cipher-text
D) Key
E) Encryption algorithm