Q#1 What are the types of tasks that are carried out during
Data Mining?
•Data Description task:
Concrete information gleaned from large amount of known data. Data you may not
have known, but which is supported by recorded facts or given patterns .
Concrete information gleaned from large amount of known data. Data you may not
have known, but which is supported by recorded facts or given patterns .
Knowledge Prediction task:
From users known data it forecast future trends, events, etc.(e.g: Stock market predictions)
From users known data it forecast future trends, events, etc.(e.g: Stock market predictions)
Q#2
What is the effect of data mining on business?
Q#3 what is the
Government role in protecting your digital information ?
Ans:
Ans:
Corporation compromise is needed to resolve the growing tension between security and privacy. Many Cyber laws are introduced to secure your digital online information but still its not enough.Because Grovt. is not pay head to Ethical Hacking and White hat hackers.
Corporation compromise is needed to resolve the growing tension between security and privacy. Many Cyber laws are introduced to secure your digital online information but still its not enough.Because Grovt. is not pay head to Ethical Hacking and White hat hackers.
Q#4 How has technology
affected your personal Privacy?
Ans:
Technology
has a number of social and ethical implications that cause debate and concern.
One specific issue is privacy. Information Technology has opened us society and
described privacy.
For More Click Here
Q#5 Should low enforcement have “back door” access to encrypted data if it helps to solves crimes?
Ans::
Yes low enforcement should have “back door” access to encrypted data . It May can helps to solves crimes And find clues about crimnals . But it should be in safe hands otherwise it can use for negaitve pupouses like Hacking etc..
OR
For More Click Here
Q#5 Should low enforcement have “back door” access to encrypted data if it helps to solves crimes?
Ans::
Yes low enforcement should have “back door” access to encrypted data . It May can helps to solves crimes And find clues about crimnals . But it should be in safe hands otherwise it can use for negaitve pupouses like Hacking etc..
OR
This is concern to US law enforcement and security forces who say the produces of highly encrypted Communication devices must make available to them. They Argue they need access to private emails, social media messages and other electronic communication.
Q# 6 What is Difference Between Knowledge
Prediction and Knowledge Description in D.M?
•Knowledge Prediction -
Data mining uses known data for prediction/forecasting. It is also known as predictive data.•Knowledge Prediction -
•Knowledge Description -
Concrete information gleaned from data is known as data description.It is also known as descriptive data.
Concrete information gleaned from data is known as data description.It is also known as descriptive data.
Q# 7 Jot down the sources of data mining?
- Data Base
- Text Documents
- Pictures(images)
- Web.
- Hard Drive
- CD/DVD etc.....
Q#8 Differentiate between Data privacy and Data Security?
Q#9 What steps do/should you take to protect your data?
- Back up early and often
- Use file-level and share-level security.
- Password-protect document.
- Use EFS(encrypting file explorer system) encryption.
- Use disk encryption
- Make use of a public key infrastructure.
- Hide data with stenography.
- Protect data in transit with IP security.
- Secure wireless transmissions.
- Use rights management to retain control Etc....
Q# 10 What do you know About data warehousing?
Ans..
Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical reporting, structured and/or ad HOC queries, and decision making.
OR
A data warehouse is a subject-oriented, integrated, time-variant and non-volatile collection of data in support of management's decision making process. Subject-Oriented: A data warehouse can be used to analyze a particular subject area.
Q#_11 What are advantages of Data Mining?
Ans::Following are some important advantages....
- Rapid computerization of businesses produce huge amount of data
- How to make best use of data?
- A growing realization: knowledge discovered from data can be used for competitive advantage.
- Make use of your data assets
- There is a big gap from stored data to knowledge; and the transition won’t occur automatically.
- Many interesting things you want to find cannot be found using database queries
“find me people likely to buy my
products”
“Who are likely to respond to my
promotion”
Q#12 What alternative
methods could showdown used to make their respective points about
government surveillance?
Ans::
By exposing the secrets of the government they claim to have related its systematic disregard for individual freedom and privacy. Theirs are not the politics of left against right or literals conversations or democrats against republicans.
nice work bro thanks
ReplyDeleteThanks dear for the questions... Finally, got the answers.
ReplyDeletethanku its :-)
ReplyDelete:)
ReplyDeletethanx a lot
Deletehahahahaha..... yeah finely got answers
ReplyDelete:)
(k) (k) (k) (k) (k) (k) (k) (k) (k) (k)
ReplyDelete