Write a query to extract total number of female students registered in BS Telecom.View more random threads:
- Current paper of midterm of CS614 on 6 Dec, 2010
- current paper of PAK 301 9 December fall 2010
- Final Term Paper Current CS504- Software Engineering - I 10...
- Current Paper of STA630 Research Methods 7 August 2010
- My today's paper of cs504
- Final Term Paper Current MGT503 Principles of Management 9...
- FIN623 MY TODAY PAPER SUBJECTIVE QUESTIONS fall 2010
- MGT613 solved subjective and objective paper of fall 2010...
- Current Final Term Paper CS504 Software Engineering - I 9...
- Final Term Paper Current IT430 E-Commerce 9 August 2010
Explain Analytic Applications Specification Phase of Analytic Applications Track of Kimball’s Model.
How data mining differs from statistics? Which one is better?
While saving a package we get different options as destination location for the package. One of the option is to save a package is SQL Server Meta Data Services. What are its advantages?
Explain Document Architecture Requirements of Kimball’s Model with an example.
What will be the normal form if every non-key column is fully dependent on the primary key? Describe the process to achieve this normal form with a suitable example.
After completion of data profiling for Lahore campus data, we are required to correct the records in the error table. After corrections the corresponding records in the actual table are required to be updated. Explain factors on which the methodology to correct the exception table is dependent on.
What is the Partition skew problem in Hash based join? How this problem can be solved?
What is meant by the “House of Quality”, explain? What type of risks can be dealt with this technique?
Do you think it will create the problem of non-standardized attributes, if one source uses 0/1 and second source uses 1/0 to store male/female attribute respectively? Give a reason to support your answer.
Which scripting languages are used to perform complex transformation in DTS package?
Write down the steps which are performed in Clustering process?
Define Simple One-to-Many transformation.
What are the two extremes for technical architecture design? Which one is better?
What is the difference between non-keyed and keyed data access options?
If _________ is missing we are not required to consult golden copy.
Gender
Date
Both Gender and Date
None of the given
If the dates are missing we must need to consult _________.
Golden Copy
Default System
DateSilver Copy
None of the given
To judge effectiveness we perform data profiling twice.
One before Extraction and the other after Extraction
One before Transformation and the other after Transformation
One before Loading and the other after Loading
To identify the __________________ required we need to perform data profiling
Degree of Transformation
Complexity
Cost
Time
Execution can be completed successfully or it may be stopped due to some error. If some error occurs, execution will be terminated abnormally and all transactions will be ___________
Committed to the database
Rolled back
DTS allows us to connect through any data source or destination that is supported by ____________
OLE DB
OLAP
OLTP
Data Warehouse
Companies collect and record their own operational data, but at the same time they also use reference data obtained from _______ sources such as codes, prices etc.
Operational
None of these
Internal
External
Ad-hoc access means to run such queries which are known already.
True
False
____________ in agriculture extension is that pest population beyond which the benefit of spraying outweighs its cost.
Profit Threshold Level
Economic Threshold Level
Medicine Threshold Level
None of these
People that design and build the data warehouse must be capable of working across the organization at all levels
True
False
The _________ is only a small part in realizing the true business value buried within the mountain of data collected and stored within organizations business systems and operational databases.
Independence on technology
Dependence on technology
None of these
Many data warehouse project teams waste enormous amounts of time searching in vain for a ___________________.
Silver Bullet
Golden Bullet
Suitable Hardware
Compatible Product
The application development quality-assurance activities cannot be com*pleted until the data is ________.
Stabilized
Identified
Finalized
Computerized
Data Staging design and development phase fall in the _______________ of Kimball’s approach of business dimensional lifecycle.
Lifecycle Technology Track
Lifecycle Data Track
Lifecycle Analytic Applications Track
None of these
One-way and Two-way clustering are types of
Supervised
Semi-Supervised
Un-Supervised
Reinforcement
The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by _____________ tools typical of decision support systems.
Introspective
Intuitive
Reminiscent
Retrospective
The technique that is used to perform these feats in data mining is called modeling, and this act of model building is something that people have been doing for a long time, certainly before the _________ of computers or data mining technology.
Access
Advent
Ascent
Avowal
There are many variants of the traditional nested-loop join. If the index is built as part of the query plan and subsequently dropped, it is called
None of these
Naive nested-loop join
Index nested-loop join
Temporary index nested-loop join
During business hours, most ______ systems should probably not use parallel execution.
OLTP
OLAP
DSS
Data Mining
An optimized structure which is built primarily for retrieval, with update being only a secondary consideration is
OLTP
OLAP
DSS
Inverted Index
Parallelism can ________system performance on over-utilized systems or systems with small I/O bandwidth.
Reduce
Enhance
Maintain’
Boost
NUMA stands for __________
Non-uniform Memory Access
Non-updateable Memory Architecture
New Universal Memory Architecture
A dense index, if fits into memory, costs only ______ disk I/O access to locate a record by given key.
One
Two
lg (n)
n
Without Change Data Capture, database ___________ is a cumbersome process in which you move the entire contents of tables into flat files, and then load the files into the data warehouse.
Extraction
Loading
Loading
Cleansing
Transformation
During ETL process of an organization, suppose you have data which can be transformed using any of the transformation method. Which of the following strategy will be your choice for least complexity?
One-to-One Scalar Transformation
One-to-Many Element Transformation
Many-to-Many Element Transformation
Many-to-One Element Transformation
In full extraction, data is extracted completely from the source system. Therefore there is no need to keep track of changes to the ________
Data Source
DWH
Data Mart
Full and Incremental extraction techniques are types of ____________
Logical Extraction
Physical Extraction
Both Logical and Physical Extraction
None of these
Query “How many members were paid claims during last year?” will perform better when tables are
Normalized
De-normalized
Equally in both normalized and de-normalized case
Pre-joining is used to identify frequent joins and append the corresponding tables together in the physical data model. This technique is generally used when two or more tables have
One to many relationship
One to one relationship
Many to many relationship
Fourth normal form (4NF) has an additional requirement, which is
Data is in 2NF and there is no Multi-valued dependency
Data is in 3NF and there is no foreign key in tables
Data is in 3NF and there is no Multi-valued dependency
Data is in 3NF and there is no NULL key dependency
Sponsored Links
Urgent call: 03455242488. | Virtual University Assignments
Virtual University GDBs | Virtual University Papers | Vu Projects | Vu Handouts
About Expert
There are currently 1 users browsing this thread. (0 members and 1 guests)