Data mining, Database Management System

1.Why we need data mining? Give an example to illustrate your answer.

2. Why data mining is considered as "misleading name"?

3. Distinguish the difference between database and data warehouse? Give 4 differences at least.

4. Discus the major difference between relational database and object oriented database?

5. Text databases may be highly unstructured, semi structured and well structured. Give an example for each. 

6. How can data mining affect our privacy? Give examples to illustrate your answer.

Posted Date: 2/20/2013 5:03:02 AM | Location : United States







Related Discussions:- Data mining, Assignment Help, Ask Question on Data mining, Get Answer, Expert's Help, Data mining Discussions

Write discussion on Data mining
Your posts are moderated
Related Questions
Describe briefly models which define the operations on classes. The three models which are used to define operations on classes are as: Object Model = data dictionary + Obje

What is meant by buffer blocks and disk buffer   The blocks residing temporarily in main memory are referred to as buffer blocks. The area of memory where blocks reside t

Question: This Question refers to the database schema given in the Appendix. (a) The integrity of a database is enforced by integrity rules. Discuss what should happen on a

Discuss The difference between drop table R and delete from R.  DROP TABLE command deletes all the records with the table definition. This command will automatically committed

Data Base Management System 1. Draw the Architecture of MySQL and explain about its subsystems briefly. 2. Elaborate with the help of an example the concept of Primary key a

Define the categories of SQL Statements? 1) Statements that don't return a result set. This statement class includes INSERT, DELETE, and UPDATE. 2)Statements that return

Q.  What is relational algebra and calculus? Explain the relational algebra operators :- Selection and predicate, set operation, joins and division. Sol. Relational Algebra

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

what is bogus empowerment. And what is genuine empowerment

Though all the ABAP/4 Dictionary Structures that exists in the structure of the LDB, being described in Database Program, we are explaining the Dictionary Structures in the Report.