Sponsored Links


Results 1 to 1 of 1

Thread: cs614 current subjective and objective paper fall 2010 on 19-02-2011

  1. #1
    Administrator Xpert's Avatar
    Join Date
    May 2010
    Location
    Jhelum
    Posts
    6,239

    Icon19 cs614 current subjective and objective paper fall 2010 on 19-02-2011

    Sponsored Links1


    Write a query to extract total number of female students registered in BS Telecom.
    Explain Analytic Applications Specification Phase of Analytic Applications Track of Kimball’s Model.
    How data mining differs from statistics? Which one is better?
    While saving a package we get different options as destination location for the package. One of the option is to save a package is SQL Server Meta Data Services. What are its advantages?
    Explain Document Architecture Requirements of Kimball’s Model with an example.
    What will be the normal form if every non-key column is fully dependent on the primary key? Describe the process to achieve this normal form with a suitable example.
    After completion of data profiling for Lahore campus data, we are required to correct the records in the error table. After corrections the corresponding records in the actual table are required to be updated. Explain factors on which the methodology to correct the exception table is dependent on.
    What is the Partition skew problem in Hash based join? How this problem can be solved?
    What is meant by the “House of Quality”, explain? What type of risks can be dealt with this technique?
    Do you think it will create the problem of non-standardized attributes, if one source uses 0/1 and second source uses 1/0 to store male/female attribute respectively? Give a reason to support your answer.
    Which scripting languages are used to perform complex transformation in DTS package?
    Write down the steps which are performed in Clustering process?
    Define Simple One-to-Many transformation.
    What are the two extremes for technical architecture design? Which one is better?
    What is the difference between non-keyed and keyed data access options?
    If _________ is missing we are not required to consult golden copy.
    Gender
    Date
    Both Gender and Date
    None of the given
    If the dates are missing we must need to consult _________.
    Golden Copy
    Default System
    DateSilver Copy
    None of the given
    To judge effectiveness we perform data profiling twice.
    One before Extraction and the other after Extraction
    One before Transformation and the other after Transformation
    One before Loading and the other after Loading
    To identify the __________________ required we need to perform data profiling
    Degree of Transformation
    Complexity
    Cost
    Time
    Execution can be completed successfully or it may be stopped due to some error. If some error occurs, execution will be terminated abnormally and all transactions will be ___________
    Committed to the database
    Rolled back
    DTS allows us to connect through any data source or destination that is supported by ____________
    OLE DB
    OLAP
    OLTP
    Data Warehouse
    Companies collect and record their own operational data, but at the same time they also use reference data obtained from _______ sources such as codes, prices etc.
    Operational
    None of these
    Internal
    External
    Ad-hoc access means to run such queries which are known already.
    True
    False
    ____________ in agriculture extension is that pest population beyond which the benefit of spraying outweighs its cost.
    Profit Threshold Level
    Economic Threshold Level
    Medicine Threshold Level
    None of these
    People that design and build the data warehouse must be capable of working across the organization at all levels
    True
    False
    The _________ is only a small part in realizing the true business value buried within the mountain of data collected and stored within organizations business systems and operational databases.
    Independence on technology
    Dependence on technology
    None of these
    Many data warehouse project teams waste enormous amounts of time searching in vain for a ___________________.
    Silver Bullet
    Golden Bullet
    Suitable Hardware
    Compatible Product
    The application development quality-assurance activities cannot be com*pleted until the data is ________.
    Stabilized
    Identified
    Finalized
    Computerized
    Data Staging design and development phase fall in the _______________ of Kimball’s approach of business dimensional lifecycle.
    Lifecycle Technology Track
    Lifecycle Data Track
    Lifecycle Analytic Applications Track
    None of these
    One-way and Two-way clustering are types of
    Supervised
    Semi-Supervised
    Un-Supervised
    Reinforcement
    The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by _____________ tools typical of decision support systems.
    Introspective
    Intuitive
    Reminiscent
    Retrospective
    The technique that is used to perform these feats in data mining is called modeling, and this act of model building is something that people have been doing for a long time, certainly before the _________ of computers or data mining technology.
    Access
    Advent
    Ascent
    Avowal
    There are many variants of the traditional nested-loop join. If the index is built as part of the query plan and subsequently dropped, it is called
    None of these
    Naive nested-loop join
    Index nested-loop join
    Temporary index nested-loop join
    During business hours, most ______ systems should probably not use parallel execution.
    OLTP
    OLAP
    DSS
    Data Mining
    An optimized structure which is built primarily for retrieval, with update being only a secondary consideration is
    OLTP
    OLAP
    DSS
    Inverted Index
    Parallelism can ________system performance on over-utilized systems or systems with small I/O bandwidth.
    Reduce
    Enhance
    Maintain’
    Boost
    NUMA stands for __________
    Non-uniform Memory Access
    Non-updateable Memory Architecture
    New Universal Memory Architecture
    A dense index, if fits into memory, costs only ______ disk I/O access to locate a record by given key.
    One
    Two
    lg (n)
    n
    Without Change Data Capture, database ___________ is a cumbersome process in which you move the entire contents of tables into flat files, and then load the files into the data warehouse.
    Extraction
    Loading
    Loading
    Cleansing
    Transformation
    During ETL process of an organization, suppose you have data which can be transformed using any of the transformation method. Which of the following strategy will be your choice for least complexity?
    One-to-One Scalar Transformation
    One-to-Many Element Transformation
    Many-to-Many Element Transformation
    Many-to-One Element Transformation
    In full extraction, data is extracted completely from the source system. Therefore there is no need to keep track of changes to the ________
    Data Source
    DWH
    Data Mart
    Full and Incremental extraction techniques are types of ____________
    Logical Extraction
    Physical Extraction
    Both Logical and Physical Extraction
    None of these
    Query “How many members were paid claims during last year?” will perform better when tables are
    Normalized
    De-normalized
    Equally in both normalized and de-normalized case
    Pre-joining is used to identify frequent joins and append the corresponding tables together in the physical data model. This technique is generally used when two or more tables have
    One to many relationship
    One to one relationship
    Many to many relationship
    Fourth normal form (4NF) has an additional requirement, which is
    Data is in 2NF and there is no Multi-valued dependency
    Data is in 3NF and there is no foreign key in tables
    Data is in 3NF and there is no Multi-valued dependency
    Data is in 3NF and there is no NULL key dependency

    Sponsored Links
    Attached Files Attached Files

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 0
    Last Post: 02-21-2011, 04:43 AM
  2. Replies: 0
    Last Post: 02-21-2011, 04:42 AM
  3. Replies: 0
    Last Post: 02-21-2011, 04:40 AM
  4. Replies: 0
    Last Post: 02-19-2011, 11:45 PM
  5. Replies: 0
    Last Post: 02-19-2011, 11:37 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
-: Vuhelp Disclaimer :-
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator's or staff of Vuhelp.net cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms. If you have any doubts about legality of content or you have any suspicions, feel free to contact us.
Online Education | JhelumSoft