1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
6

Describe the steps involved in data mining or data analytics when viewed as a process of knowledge discovery.

Computers and Technology
1 answer:
Aleksandr [31]3 years ago
6 0

Answer:

1. Data Cleaning

2. Data Integration

3. Data Selection

4. Data transformation

5. Data Mining

6. Pattern Evaluation

7. Knowledge presentation

Explanation:

The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:

Step 1. Data cleaning: this involves the elimination of inconsistent data.

Step 2. Data integration: this involves the combination of data from multiple sources.

Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.

Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.

Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.

Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.

Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.

You might be interested in
The involvement of the United States in the ______ and ______ resulted in _______ .
Aleksandr-060686 [28]

The involvement of the United States in the <u>Iraq</u> and <u>Kuwait conflict</u> resulted in <u>Persian Gulf War</u>.

<h3>What is the Persian Gulf War?</h3>

The Persian Gulf War can be defined as an international conflict that was led by the United States of America alongside the forces of the United Nations (UN) against the larger state of Iraq, in response to her invasion and annexation of the smaller country of Kuwait.

In this context, we can infer and logically deduce that the involvement of the United States in the <u>Iraq</u> and <u>Kuwait conflict</u> resulted in <u>Persian Gulf War</u>.

Read more on Persian Gulf War here: brainly.com/question/1105731

#SPJ1

8 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
tiny-mole [99]

Answer:

Modern CPUs contain multiple cores.  Think of it as multiple smaller CPU's on the single CPU chip.  The multiple cores can handle different processes in parallel allowing for multiple programs to be running at the same time.  This is not considered true multi-processing since the architecture still has a single I/O bus and can be subject to a single point of failure.  But the operating system will take advantage of the additional cores as if they were multiple physical CPU's - enhancing performance and productivity.

Explanation:

7 0
3 years ago
HURRY HELP THIS IS FOR CODING !!!! What are some real-life situations that require a program that is iterative? Include at least
Degger [83]

Answer:

A health service, a sales service, a social network, all because they require you to make a request to return a result

5 0
3 years ago
Read 2 more answers
(tco 8) when asp.net receives a request for an application that uses forms-based authentication from a user who hasn't been auth
leonid [27]
Hi,

This what you are looking for: "records incorrect prompt"

Hope this helps.
r3t40
7 0
3 years ago
Of the measures of feasibility, questions such as "Does the proposed platform have sufficient capacity for future needs?" and "W
larisa [96]
Operational feasibility !!!!!!!
8 0
4 years ago
Other questions:
  • Carmen wanted to clear up space on her computer and remove unwanted files. What would be the best for her to delete?
    6·2 answers
  • This toolbar has icons representing the application's basic operations such as Save and Copy. Drawing Formatting Standard Task
    11·2 answers
  • How long is a subnet mask? (Please select one of the four options)
    5·1 answer
  • )duplicate hash code
    15·1 answer
  • You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a
    7·1 answer
  • Suppose the daytime processing load consists of 65% CPU activity and 35% disk activity. Your customers are complaining that the
    15·1 answer
  • Write method reverseString, which takes a string str and returns a new string with the characters in str in reverse order. For e
    8·1 answer
  • Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
    9·1 answer
  • In an etl process, data is loaded into a final target database such as:______
    14·1 answer
  • The following image shows the number of orders Company A received in 2015-2020. A financial analyst wants to calculate the year-
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!