
a.
Explanation of Solution
Given: The following statement:
Based on the financial as well as demographic data, decide whether a loan should be issued to an applicant or not.
To find: Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. To issue a loan, an applicant is already registered in their
b.
Explanation of Solution
Given: The following statement:
Based on the buying patterns in prior transactions, make recommendations to the customers regarding additional items to buy.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. The online bookstore recommends various types of books to the customers which will not provide any possible outcome whether the recommendation was followed or not.
c.
Explanation of Solution
Given: The following statement:
Recognize the risk of data packet in network based on comparison to the other packets whose status is well-known.
To find: Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. The network data packet can easily be recognized as dangerous (hacker attack, virus) or safe if the status of other packets is known.
d.
Explanation of Solution
Given: The following statement:
Identification of similar customer segments.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. In this, the dependency of an outcome is not known. To identify the segment, unsupervised learning is used so that it can easily be utilized and classify the new customers and its segments with the help of supervised learning.
e.
Explanation of Solution
Given: The following statement:
To forecast whether a company might go bankrupt on the basis of financial data from similar bankrupt and non-bankrupt companies.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning as both the companies are comparing the financial data of both bankrupt and nonbankrupt firms, and the status of similar companies is known.
f.
Explanation of Solution
Given: The following statement:
Predict the recovery time of an aircraft depending on a trouble ticket.
Â
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. It analyzes both the historical repairs and actual repair concerning which part is having a similar repair.
g.
Explanation of Solution
Given: The following statement:
The automated mail sorting by scanning the zip code.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. In scanning the zip code, it is likely to have the knowledge regarding whether the sorting was correct or not.
h.
Explanation of Solution
Given: The following statement:
Generate the personalized discount coupons based on the products that have been purchased recently and previously on the grocery store.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. In this, the purchase may vary in the grocery store where the future prediction of purchase is not cleared as compared to the previous purchases.
Want to see more full solutions like this?
Chapter 2 Solutions
Data Mining for Business Analytics: Concepts, Techniques, and Applications with XLMiner
- You cannot add 3-dimensional effects to a shape. Question 18Select one: True Falsearrow_forwardWhich gallery shows available shapes for WordArt text? Question 10Select one: a. Transform b. Shape Styles c. Themes d. WordArt Stylesarrow_forwardWhen you press [Shift][Ctrl] while dragging a corner sizing handle on a graphic, the graphic is ____. Question 9Select one: a. resized while keeping the center position fixed and maintaining its proportions b. resized proportionally c. re-positioned diagonally d. resized diagonally while changing proportionallyarrow_forward
- What is the term used to describe trimming away part of a graphic to expose only some of it? Question 8Select one: a. Resizing b. Hiding c. Cropping d. Scalingarrow_forwardTo insert a SmartArt graphic in a document, click the SmartArt button in the _____ group on the Insert tab. Question 6Select one: a. Text b. Shapes c. Illustrations d. Pagesarrow_forwardBriefly define and discuss the following classes of problems: P, NP, NP-Complete, co-NP, NC, P-Complete.arrow_forward
- A3Q3.c - You are to write a C program that implements the following disk scheduling algorithms: a. FCFS [10 marks] b. SCAN [10 marks] c. C-SCAN [10 marks] d. SSTF [10 marks] e. LOOK [10 marks] f. C-LOOK [10 marks] • Your program will service a disk with 300 cylinders numbered 0 to 299. • • • • The program will service the requests (a list of 20 cylinder numbers) given in the file request.bin. This file contains (4 byte) integer values representing requests ranging from 0-299. Your program will take the initial position of the disk head as the first command line argument and the direction of the head as the second command line argument. It will then output the requests in the order in which they are serviced, and the total amount of head movements required by each algorithm. In particular, your program needs to do the following: Your program should take two command line arguments a) First command line argument - initial position of the disk head (an integer value) b) Second command line…arrow_forward2. The memory management has contiguous memory allocation, dynamic partitions, and paging. Compare the internal fragmentation and external fragmentation for these three approaches. [2 marks] 3. Suppose we have Logical address space = 24 = 16 (m = 4), Page size=2² =4 (n = 2), Physical address space = 26 = 64 (r = 6). Answer the following questions: [4 marks] 1) Total # of pages ? 2) Total # of frames ? 3) Number of bits to represent logical address? 4) Number of bits to represent offset ? 5) Number of bits to represent physical address? 6) Number of bits to represent a page number? 7) Number of bits to represent a frame number / 4. What is translation look-aside buffers (TLBS)? Why we need them to implement the page table? [2 marks] 5. Why we need shared pages for multiple processes? Give one example to show the benefits. [2 marks] 6. How to implement the virtual memory by using page out and page in? Explain with an example. [2 marks] 7. We have a reference string of referenced page…arrow_forward8. List three HDD scheduling algorithms. [2 marks] 9. True or False? The NVM has the same scheduling algorithms with HDD. Explain why? [2 marks] 10. Why the modern mouses use polling to detect movements instead of interrupts? [2 marks] 11. What is thrashing? How does it happen? [2 marks] 12. Given a reference string of page numbers 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1 and 4 frames show how the page replacement algorithms work, and how many page faults? [6 marks], 1) FIFO algorithm? [2 marks] 2) Optimal algorithm? [2 marks] 3) LRU algorithm? [2 marks] 13. List at least three file systems that you know. [2 marks] 14. In C programming, how the seek to a specific position in the file by offset? [2 marks]arrow_forward
- Is developed App in play store much easier than in app store because i look app like human anonymus and like walter labs prioritize iphone app store first is it difficult to developed app on play store ? And btw i want to move to iphone anroid suckarrow_forwardQ12- A three phase transformer 3300/400 V,has D/Y connected and working on 50Hz. The line current on the primary side is 12A and secondary has a balanced load at 0.8 lagging p.f. Determine the i) Secondary phase voltage ii) Line current iii) Output power Ans. (230.95 V, 99.11 A, 54.94 kW)arrow_forwardmake corrections of this program based on the errors shown. this is CIS 227 .arrow_forward
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning





