1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
11

9) All of the following statements about data mining are true EXCEPT: a. Its techniques have their roots in traditional statisti

cal analysis and artificial intelligence. b. The term is relatively new. c. Intense, global competition make its application more important. d. The ideas behind it are relatively new.
Computers and Technology
1 answer:
VikaD [51]3 years ago
7 0

Answer:

b. The term is relatively new.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Data mining can be defined as a process which typically involves extracting and analyzing data contained in large databases through the use of specialized software to generate new information.

All of the following statements about data mining are true;

I. Its techniques have their roots in traditional statistical analysis and artificial intelligence.

II. Intense, global competition make its application more important.

III. The ideas behind it are relatively new.

However, data mining is a process that has been in existence for a very long time and has significantly impacted workflow management, communication and other areas.

In conclusion, computer database contain the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data users when required or needed.

You might be interested in
Explain what mistake Miranda made in the following scenario. Situation: Miranda suspects that there may be a problem with the ha
Dennis_Churaev [7]

Answer: Answer below.

Explanation:

I'm not fully sure myself, so don't agree with me fully.

I believe what she may have done wrong is tell the technician about a "program." A program doesn't have to do anything with physical hardware.

5 0
3 years ago
Read 2 more answers
Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
Galina-37 [17]
<span>The statement that IPv6 includes a native information security framework (IPsec) that provides both data and control packets is false.
</span>IPSec is a mandatory component for IPv6, and is used to natively protect IPv6 data <span>as it is sent over the network,. and not control packets.
</span>The IPv6 IPSec is a set of Internet standards that uses cryptographic security services to provide confidentiality ,data origin authentication and data integrity<span>
</span>

5 0
3 years ago
Lena is completing her senior year of college and is living in an apartment with three friends. Her family has a subscription to
vladimir1956 [14]

Answer:

d) consumer misbehavior

Explanation:

This is an example of consumer misbehavior. What Lena is doing is not technically piracy or illegal because HBO has created the family feature on their accounts for the account to be used by multiple people at the same time. Yet, the feature was not intended to be used by individuals that are not technically family or even under the same roof. Therefore, what Lena is doing goes against HBO's reason for this feature and sharing the account as Lena is doing is ultimately hurting HBO's streaming service.

4 0
3 years ago
Which function prompts the user to enter information?
Rzqust [24]

Answer:

input() prompts the user to enter information

6 0
3 years ago
Read 2 more answers
Data in the form of digits is called
Flauer [41]
Numeric data because it consist of numbers
5 0
2 years ago
Other questions:
  • The IP address is a _____ bit number.
    5·1 answer
  • Can a spreadsheet be filtered only by one column at a time?
    11·1 answer
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • Which function is going to find the lowest value in a range of numbers? MIN MAXAVERAGE COUNT
    5·1 answer
  • End user needs assessment is a formal procedure to analyze a user's computer needs; it involves a specific set of steps that are
    8·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • Describe five examples of civil engineering projects.
    6·1 answer
  • At the start of the school year, Brianna’s history teacher announces that students’ final grades will be weighted based on how t
    8·2 answers
  • A field value is currently not in any group. what happens when you try adding it to an existing group?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!