Answer:
1. Data Cleaning
2. Data Integration
3. Data Selection
4. Data transformation
5. Data Mining
6. Pattern Evaluation
7. Knowledge presentation
Explanation:
The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:
Step 1. Data cleaning: this involves the elimination of inconsistent data.
Step 2. Data integration: this involves the combination of data from multiple sources.
Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.
Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.
Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.
Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.
Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.
The best way to increase collaboration between a supervisor and her or his subordinates, which in this case is the computer programmers, would be through option (A) remove the private offices and cubicles and replace them with large desks and conference tables out in the open.
By choosing to implement an open office layout, greater communication between the supervisor and computer programmers would occur compared to when they were separated.
Answer:
If( on_time == True) {
print("Coffee")
} else {
print("No Coffee")
}
Explanation:
Step 1 evaluate with a boolean variable if you are on time
If( on_time == True) {
Step 2 if true you have coffee
print("Coffee")
Step 3 if false you have not coffee
print("No Coffee")
Answer/Explanation:
Get out of sight of the intruder
Intruder On Campus
Answer: VLAN
Explanation: VLAN(Virtual local area network) is the network technology that lets the user to connect in a virtual( fake) environment and displaying as if they are working in the LAN environment.
It is the used for obtaining the scalability and protection of information while communication. It also helps in adapting the change that occurs in the network and nodes of the server. Thus, VLAN is the network that should be used in the business to keep sensitive data secure and hosts of the network to connect and communicate .