.


:




:

































 

 

 

 


Last step of knowledge discovery process

A) Row Data


B) Data Pre Processing

C) Building Data mining model

D) Assessing the model

E) Knowledge

Is a sequence of events where the next event is determined by one or more of the preceding events

A) Association

B) Clustering

C) Classification d) Time series

e) Prediction

It identifies the relationships between objects

A) Clustering

B) Classification

C) Prediction d) Association

e) Time-Series analysis

It is used to identify data objects that are similar to one another. The similarity can be decided based on a number of factors like purchase behavior, responsiveness to certain actions, geographical locations and so on

A) Classification

B) Prediction

C) Time-Series analysis

D) Association analysis e) Clustering

This field includes big number of different approaches such as statistical and information analysis, decision trees, similarity measures, neural networks, genetic algorithms, fuzzy logic, etc

A) Summarization

B) Clustering c) Data Mining

D) Classification

E) Prediction

There is a computational approach, which is based on a large collection of neural units, loosely modeling the way a biological brain solves problems with large clusters of biological neurons connected by axons

A) Neural network

B) Artificial neuron

C) Fuzzy logic

D) Genetic algorithm

E) Decision tree

229. To GA operators relate:

A) Evolution b) Mutation

C) Fitness value

D) Population

E) Evolution environment

230.... based on a system of non-digital (continuous & fuzzy without crisp boundaries) set theory and rules


A) Genetic algorithm b) Fuzzy logic

C) Decision tree

D) Neural network

E) Artificial neuron

231. (Excel) This is an absolute cell reference a) $d$9

b) d$9

c) $d9

D) d9

E) 9d

232. (Excel) We have a function SUM(1,2,3,4,5). The value of this function is: a) 15

b) SUM

c) 1,2,3,4 and 5

D) 3

E) 5

233. (Excel) We have a function SUM(1,2,3,4,5). The name of the function is:SUM

Excel) Cell is too narrow to display the results of the formula

a) #NAME?

b) #VALUE! c) #######

d) #DIV/0!

E) Circular Reference

Is a group of computers that shares information across wireless or wired technology

A) A protocol

B) A server

C) A client

D) A mouse

E) A computer network

Is an integral part of a computer network because it provides the computer a way to send and retrieve data

A) A router

B) A network card

C) A server

D) A client

E) A laptop

Is a set of rules that governs the communications between computers on a network

A) A server

B) A client

C) A laptop

D) A cable

E) A protocol

It is NOT correct topology of the network a) Triangle topology

B) Linear Bus topology

C) Star topology


D) Ring topology

E) Mesh topology

239. What is it topology? In such type of topology, long backbone cable is used to link all the devices in the network

A) Star topology

B) Ring topology

C) Mesh topology d) Bus Topology

e) Tree Topology

Not all hosts have point-to-point connection to every other host

A) Tree Topology

B) Partially Mesh Topology

C) Bus Topology

D) Star topology

E) Ring topology

241. The middle layer of the Hierarchical Topology is known as

A) distribution layer b) access-layer

C) core layer

D) bus layer

E) extended layer

It is the medium through which information usually moves from one network device to another

A) Personal computer

B) Mouse

C) User d) Cable

e) Monitor

It is protection of information and systems within networks that are connected to the Internet

A) Authorization b) Cyber Security

C) Authentication

D) Information Assurance

E) Passwords

The ability to ensure that data is an accurate and unchanged representation of the original secure information

A) Availability

B) Criminal attacks

C) Publicity attacks

D) Confidentiality e) Integrity

It is the process of encoding a message so that its meaning is not obvious

A) Decryption

B) Cryptosystem

C) Criminal attacks d) Encryption

e) Publicity attacks

It is an attempt to break the cipher text


A) Plaintext

B) Cryptanalysis

C) Cipher-text

D) Key

E) Encryption algorithm



<== | ==>
A) A list of commands b) A menu | Same key for encryption and decryption. This encryption algorithm called
:


: 2018-11-11; !; : 242 |


:

:

.
==> ...

1664 - | 1611 -


© 2015-2024 lektsii.org - -

: 0.012 .