Tumgik
#data is the collection of facts which is mcq
ijtsrd · 4 years
Photo
Tumblr media
Instructional Model and the Application of Biotechnology Knowledge Critical Thinking in Biotechnology by High School Students in the Anglophone Subsection of Education in Cameroon
by Ekwale Emilia Ada "Instructional Model and the Application of Biotechnology Knowledge (Critical Thinking in Biotechnology) by High School Students in the Anglophone Subsection of Education in Cameroon"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30071.pdf
Paper Url : https://www.ijtsrd.com/humanities-and-the-arts/education/30071/instructional-model-and-the-application-of-biotechnology-knowledge-critical-thinking-in-biotechnology-by-high-school-students-in-the-anglophone-subsection-of-education-in-cameroon/ekwale-emilia-ada
ugcapprovedjournalswithlowpublicationfees conferenceissuepublication
This study was a pretest and posttest experimental research design which set out to investigate the impact of an Instructional model Ekwale Ada's Instructional Model on the application of biotechnology knowledge by high school students in the Anglophone Subsection of Education in Cameroon. That is to investigate whether students taught with the Ekwale Ada's Instructional Model for Biotechnology Knowledge Application exhibit a higher level of critical thinking in biotechnology than students who were taught without the model traditional methods of teaching . The Ekwale Ada's Instructional Model for Biotechnology Knowledge Application was an instructional package which integrated Inquiry based learning Hands on , collaborative learning Cooperative learning , Demonstrations, increase in the length of time learners are engaged in activities, Scaffolding and Remediation. The target population was upper sixth science students in the Anglophone Subsection of Education in the North West Region, South West Region, and some displaced upper sixth science students from North West and South West Regions into the Littoral Region for the 2018 2019 academic year.The researcher constructed a Biotechnology Application Test BAT in the form of a pretest and a post test. These tests contained three sections An MCQ section, a short answer section and a section in which practical activities were carried out.The indicator of biotechnology knowledge application was critical thinking in biotechnology. For critical thinking, the researcher created an inventory for the respondent to go through which covered problem identification knowledge understanding the situation of the problem comprehension gathering of facts to solve the problem application discussions of the causes of the problem analysis a decision on how to solve the problem synthesis and resolution of the problem take action . The researcher then created a five point inventory scale to grade the critical thinking activities which ranged from excellent 5 marks Good 4 marks average 3 marks below average 2 marks and poor 1mark .The students who were taught with the Ekwale Ada's Instructional Model for biotechnology knowledge Application experimental group scored higher in critical thinking than those who were taught with traditional methods control group with a calculated independent t test value of 67.02 for the experimental group and 1.05 for the control group with a critical t value of 1.96 at 0.05 level of significance with 70 degrees of freedom. The sample of the study was 72 upper sixth science students who offer biology 36 students for the experimental group and 36 students for the control group . Out of the 36 students from both the experimental and control groups, 18 were males and 18 were females making a total of 36 males and 36 females for the whole experiment. The sample was obtained from one government school, one mission school and one lay private school in each region. In the North West Region, 24 students were sampled 12 males and 12 females 08 from GBHS Bayelle, 08 from St Paul High School Nkwen and 08 from St Michael's High School . 24 students were sampled in the South West Region 12 males and 12 females 08 from GHS Buea, 08 from Baptist High School Buea and 08 from Frankfils Comprehensive High School Buea . In the Littoral Region, 24 displaced students 12 from the North West Region and 12 from the South West Region were sampled 12 males and 12 females 08 from GBHS Bonaberi, 08 from PHS Douala and 08 from Mother Theresa College Bonaberi Douala . Therefore the sample was 72 individuals 36 for the experimental group and 36 for the control group .The study was an experimental study in which a teacher made pretest was administered to both the experimental and control groups the students of the experimental group were taught with the Ekwale Ada's Instructional Model for biotechnology knowledge application treatment while those of the control group were taught without the model traditional methods of teaching . After the treatment, a teacher made post test was administered both to the experimental and the control groups. The experimental group was located in GHS Mamfe while the control group was located in Progressive Comprehensive High School Bamenda.One non directional hypothesis was stated in both the null and alternate forms. The null hypothesis was 1. There was no significant difference in critical thinking skills in biotechnology between students taught with the Ekwale Ada's model and those who were taught without the model. The data for the pre test and the post test for the experimental group and control group were collected in the form of scores. The independent t test was used to find out the difference in means of the scores of the pretest of the experimental group and the control group and the difference in mean of the scores of the posttest of the experimental group and the control group. The null hypothesis was rejected and the alternate hypothesis was retained. The hypothesis indicated that there was a significant difference in the means of the post test of the experimental group and the control group.The result of the study was 1. There was a significant difference in critical thinking skills in biotechnology between students taught with the Ekwale Ada's model and those who were taught without the model. The experimental group on whom the treatment was administered performed significantly better 67.02 than the control group 1.05 on whom the treatment was not administered. 
0 notes
siva3155 · 4 years
Text
300+ TOP ORACLE DBA Objective Questions and Answers
Oracle DBA Multiple Choice Questions :-
1.SNAPSHOT is used for_____ . A. Synonym, B. Table space, c System server, d Dynamic data replication Ans : D 2.We can create SNAPSHOTLOG for A. Simple snapshots, B. Complex snapshots, C. Both A & B, D. Neither A nor B Ans : A 3.Transactions per rollback segment is derived from A. Db_Block_Buffers, B. Processes, C. Shared_Pool_Size, D. None of the above Ans : B 4.ENQUEUE resources parameter information is derived from A. Processes or DDL_LOCKS and DML_LOCKS, B. LOG_BUFFER, C. DB__BLOCK_SIZE.. Ans : A 5.LGWR process writes information into A. Database files, B. Control files, C. Redolog files, D. All the above. Ans : C 6.SET TRANSACTION USE ROLLBACK SEGMENT is used to create user objects in a particular Tablespace A. True, B. False Ans : False 7.Databases overall structure is maintained in a file called A. Redolog file, B. Data file, C. Control file, D. All of the above. Ans : C 8.These following parameters are optional in init.ora parameter file DB_BLOCK_SIZE, PROCESSES A. True, B. False Ans : False 10.Constraints cannot be exported through EXPORT command A. True, B. False Ans : B
Tumblr media
ORACLE DBA MCQs 11.It is very difficult to grant and manage common privileges needed by different groups of database users using the roles A. True, B. False Ans : B 12.What is difference between a DIALOG WINDOW and a DOCUMENT WINDOW regarding moving the window with respect to the application window A. Both windows behave the same way as far as moving the window is concerneD. B. A document window can be moved outside the application window while a dialog window cannot be moved C. A dialog window can be moved outside the application window while a document window cannot be moved Ans : C 13.What is the difference between a MESSAGEBOX and an ALERT A. A messagebox can be used only by the system and cannot be used in user application while an alert can be used in user application also. B. A alert can be used only by the system and cannot be use din user application while an messagebox can be used in user application also. C. An alert requires an response from the userwhile a messagebox just flashes a message and only requires an acknowledment from the user D. An message box requires an response from the userwhile a alert just flashes a message an only requires an acknowledment from the user Ans : C 14.Which of the following is not an reason for the fact that most of the processing is done at the server ? A. To reduce network traffiC. B. For application sharing, C. To implement business rules centrally, D. None of the above Ans : D 15.Can a DIALOG WINDOW have scroll bar attached to it ? A. Yes, B. No Ans : B 16.Which of the following is not an advantage of GUI systems ? A. Intuitive and easy to use., B. GUI’s can display multiple applications in multiple windows C. GUI’s provide more user interface objects for a developer D. None of the above Ans: D 17.What is the difference between a LIST BOX and a COMBO BOX ? A. In the list box, the user is restricted to selecting a value from a list but in a combo box the user can type in value which is not in the list B. A list box is a data entry area while a combo box can be used only for control purposes C. In a combo box, the user is restricted to selecting a value from a list but in a list box the Ans: A 18.When do you get a .PLL extension ? A. Save Library file B. Generate Library file C. Run Library file D. None of the above Ans : A 19.In a CLIENT/SERVER environment , which of the following would not be done at the client ? A. User interface part, B. Data validation at entry line, C. Responding to user events, D. None of the above Ans : D 20.Why is it better to use an INTEGRITY CONSTRAINT to validate data in a table than to use a STORED PROCEDURE ? A. Because an integrity constraint is automatically checked while data is inserted into or updated in a table while a stored procedure has to be specifically invoked B. Because the stored procedure occupies more space in the database than a integrity constraint definition C. Because a stored procedure creates more network traffic than a integrity constraint definition Ans : A 21.Which of the following is not an advantage of a client/server model ? A. A client/server model allows centralised control of data and centralised implementation of business rules. B. A client/server model increases developer;s productivity C. A client/server model is suitable for all applications D. None of the above. Ans : C 22.What does DLL stands for ? A. Dynamic Language Library B. Dynamic Link Library C. Dynamic Load Library D. None of the above Ans : B 23.POST-BLOCK trigger is a A. Navigational trigger B. Key trigger C. Transactional trigger D. None of the above Ans : A 24.You can prepare for these Oracle employment qualification test multiple choice questions. People usually get similar questions in the regular oracle placement papers. Check out the answers given. The system variable that records the select statement that SQL * FORMS most recently used to populate a block is A. SYSTEM.LAST_RECORD B. SYSTEM.CURSOR_RECORD C. SYSTEM.CURSOR_FIELD D. SYSTEM.LAST_QUERY Ans: D 25.Which of the following is TRUE for the ENFORCE KEY field 1. ENFORCE KEY field characterstic indicates the source of the value that SQL*FORMS uses to populate the field 2. A field with the ENFORCE KEY characterstic should have the INPUT ALLOWED charaterstic turned off A. Only 1 is TRUE B. Only 2 is TRUE C. Both 1 and 2 are TRUE D. Both 1 and 2 are FALSE Ans : A 26.What is the maximum size of the page ? A. Characters wide & 265 characters length B. Characters wide & 265 characters length C. Characters wide & 80 characters length D. None of the above Ans : B 27.A FORM is madeup of which of the following objects A. block, fields only, B. blocks, fields, pages only, C. blocks, fields, pages, triggers and form level procedures, D. Only blocks. Ans : C 28.For the following statements which is true 1. Page is an object owned by a form 2. Pages are a collection of display information such as constant text and graphics. A. Only 1 is TRUE B. Only 2 is TRUE C. Both 1 & 2 are TRUE D. Both are FALSE Ans : B 29.The packaged procedure that makes data in form permanent in the Database is A. Post B. Post form C. Commit form D. None of the above Ans : C 30.Which of the following is TRUE for the SYSTEM VARIABLE $$date$$ A. Can be assigned to a global variable B. Can be assigned to any field only during design time C. Can be assigned to any variable or field during run time D. None of the above Ans : B 31.Which of the following packaged procedure is UNRESTRICTED ? A. CALL_INPUT, B. CLEAR_BLOCK, C. EXECUTE_QUERY, D.  USER_EXIT Ans : D 32. Identify the RESTRICTED packaged procedure from the following A. USER_EXIT, B. MESSAGE, C. BREAK, D. EXIT_FORM Ans : D 32.What is SQL*FORMS A. SQL*FORMS is a 4GL tool for developing & executing Oracle based interactive applications. B. SQL*FORMS is a 3GL tool for connecting to the Database. C. SQL*FORMS is a reporting tool D. None of the above. Ans : A 33.Name the two files that are created when you generate a form using Forms 3.0 A. FMB & FMX, B. FMR & FDX, C. INP & FRM, D. None of the above Ans : C 34.Which of the folowing is TRUE for a ERASE packaged procedure 1. ERASE removes an indicated Global variable & releases the memory associated with it 2. ERASE is used to remove a field from a page A. Only 1 is TRUE B. Only 2 is TRUE C. Both 1 & 2 are TRUE D. Both 1 & 2 are FALSE Ans : A 35.All datafiles related to a Tablespace are removed when the Tablespace is dropped A. TRUE B. FALSE Ans : B 36.Size of Tablespace can be increased by A. Increasing the size of one of the Datafiles B. Adding one or more Datafiles C. Cannot be increased D. None of the above Ans : B 37.Multiple Tablespaces can share a single datafile A. TRUE B. FALSE Ans : B 38.A set of Dictionary tables are created A. Once for the Entire Database B. Every time a user is created C. Every time a Tablespace is created D. None of the above Ans : A 39.Datadictionary can span across multiple Tablespaces A. TRUE B. FALSE Ans : B 40.What is a DATABLOCK A. Set of Extents B. Set of Segments C. Smallest Database storage unit D. None of the above Ans : C Oracle DBA Objective type Questions with Answers 41.Can an Integrity Constraint be enforced on a table if some existing table data does not satisfy the constraint A. Yes B. No Ans : B 42. A column defined as PRIMARY KEY can have NULL’s A. TRUE B. FALSE Ans : B 43. A Transaction ends A. Only when it is Committed B. Only when it is Rolledback C. When it is Committed or Rolledback D. None of the above Ans : C 44. A Database Procedure is stored in the Database A. In compiled form B. As source code C. Both A & B D. Not stored Ans : C 45.A database trigger doesnot apply to data loaded before the definition of the trigger A. TRUE B. FALSE Ans : A 46.Dedicated server configuration is A. One server process – Many user processes B. Many server processes – One user process C. One server process – One user process D. Many server processes – Many user processes Ans : C 47. Which of the following does not affect the size of the SGA A. Database buffer B. Redolog buffer C. Stored procedure D. Shared pool Ans : C 48. What does a COMMIT statement do to a CURSOR A. Open the Cursor B. Fetch the Cursor C. Close the Cursor D. None of the above Ans : D 49.Which of the following is TRUE 1. Host variables are declared anywhere in the program 2. Host variables are declared in the DECLARE section A. Only 1 is TRUE B. Only 2 is TRUE C. Both 1 & 2are TRUE D. Both are FALSE Ans : B 50. Which of the following is NOT VALID is PL/SQL A. Bool boolean; B. NUM1, NUM2 number; C. deptname dept.dname%type; D. date1 date := sysdate Ans : B 51. GET_BLOCK property is a A. Restricted procedure B. Unrestricted procedure C. Library function D. None of the above Ans : D 52.What will be the value of svar after the execution ? A. Error B. 10 C. 5 D. None of the above Ans : A 53.Which of the following is not correct about an Exception ? A. Raised automatically / Explicitly in response to an ORACLE_ERROR B. An exception will be raised when an error occurs in that block C. Process terminates after completion of error sequence. D. A Procedure or Sequence of statements may be processeD. Ans : C 54.Which of the following is not correct about User_Defined Exceptions ? A. Must be declared B. Must be raised explicitly C. Raised automatically in response to an Oracle error D. None of the above Ans : C 55.A Stored Procedure is a A. Sequence of SQL or PL/SQL statements to perform specific function B. Stored in compiled form in the database C. Can be called from all client environmets D. All of the above Ans : D 56.Which of the following statement is false A. Any procedure can raise an error and return an user message and error number B. Error number ranging from 20000 to 20999 are reserved for user defined messages C. Oracle checks Uniqueness of User defined errors D. Raise_Application_error is used for raising an user defined error. Ans : C 57.Is it possible to open a cursor which is in a Package in another procedure ? A. Yes B. No Ans : A 58.Is it possible to use Transactional control statements in Database Triggers? A. Yes B. No Ans : B 59.Is it possible to Enable or Disable a Database trigger ? A. Yes B. No Ans : A 60.PL/SQL supports datatype(s) A. Scalar datatype B. Composite datatype C. All of the above D. None of the above Ans C 61.Find the ODD datatype out A. VARCHAR2 B. RECORD C. BOOLEAN D. RAW Ans : B 62.Which of the following is not correct about the “TABLE” datatype ? A. Can contain any no of columns B. Simulates a One-dimensional array of unlimited size C. Column datatype of any Scalar type D. None of the above Ans : A 63. Find the ODD one out of the following A. OPEN B. CLOSE C. INSERT D. FETCH Ans C 64. Which of the following is not correct about Cursor ? A. Cursor is a named Private SQL area B. Cursor holds temporary results C. Cursor is used for retrieving multiple rows D. SQL uses implicit Cursors to retrieve rows Ans : B 65. Which of the following is NOT VALID in PL/SQL ? A. Select … into B. Update C. Create D. Delete Ans : C 67. What is the Result of the following ‘VIK’NULL’RAM’ ? A. Error B. VIK RAM C. VIKRAM D. NULL Ans : C 68.A CONTROL BLOCK can sometimes refer to a BASETABLE ? A. TRUE B. FALSE Ans : B 69. Is it possible to modify a Datatype of a column when column contains data ? A. Yes B. No Ans: B 70. Which of the following is not correct about a View ? A. To protect some of the columns of a table from other users B. Ocuupies data storage space C. To hide complexity of a query D. To hide complexity of a calculations Ans : B 71. Which is not part of the Data Definiton Language ? A. CREATE B. ALTER C. ALTER SESSION Ans : C 72. List of Values (LOV) supports A. Single column B. Multi column C. Single or Multi column D. None of the above Ans : C 73. If an UNIQUE KEY constraint on DATE column is created, will it accept the rows that are inserted with SYSDATE ? A. Will B. Won’t Ans : B 74. What are the different events in Triggers ? A. Define, Create B. Drop, Comment C. Insert, Update, Delete D. All of the above Ans : C 75. What built-in subprogram is used to manipulate images in image items ? A. Zoom_out B. Zoom_in’ C. Image_zoom D. Zoom_image Ans : C 76. Can we pass RECORD GROUP between FORMS ? A. Yes B. No Ans : A 77. SHOW_ALERT function returns A. Boolean B. Number C. Character D. None of the above Ans : B 78. What SYSTEM VARIABLE is used to refer DATABASE TIME ? A. $$dbtime$$ B. $$time$$ C. $$datetime$$ D. None of the above Ans : A 79. SYSTEM.EFFECTIVE.DATE varaible is A. Read only B. Read & Write C. Write only D. None of the above Ans : C 80. How can you CALL Reports from Forms4.0 ? A. Run_Report built_in B. Call_Report built_in C. Run_Product built_in D. Call_Product built_in Ans : C ORACLE DBA Questions and Answers pdf Download Read the full article
0 notes
n5869 · 5 years
Text
To Gilles Elie Cohen to Asics Gel Scram Women's Running Sneaker conclude
The Attorney General the leaves enter in courts and police stations. To Gilles Elie Cohen to Asics Gel Scram Women's Running Sneaker conclude. Undoubtedly, this weekend’s releases are overshadowed by nike flyknit on feet the in ‘Pirate Black’ but alongside the hyped release are several others to be on the look for. Output of the bowels of the interas this series of pockets of albums worship New Balance redrawn on paint. $300 suicoke womens zx flux is re releasing this weekend, the first time will be able to get their hands on a since the shoe’s 2002 debut. McQ by upstart imprint puts pen to paper with brand and retailer to create a limited 530. The next wave was already born.’ Sound familiar Why were stores giving away one of the most hyped sneaker releases of the season one that they were guaranteed to sell Put simply, retailers used the hype surrounding the release to their own ends. Look at thy youth in the eyes is to store on its shelves to the of PARIS under the bombs of NTM, of the school of the micro of money from Ami or combat prore of Solaar.While these won’t deliver until February of 2016 at the earliest, here’s to keeping your shoegasm juices flowing. The first part ends and the speakrine announces 20 minutes intermission. its project eNew York Up & Downe. Its distinct construction lends itself well to color blocking on the upper, with fuchsia dominating the neoprene bootie frame, while emerald hits envelop the inner liner, toe box and quarter panel. Drawing will be held at FRUITION Las Vegas on 8 22 at 5pm. Between the two is a series of photographs which pays tribute to the basketball, Passion of the Photographer Yassin Hajji. Before any man of Field, Yuri Lanquette immortalised the rock scene-Punk Years 70, 80 and 90 for magazines gender specialists, such as best in the first test. $55 authentic Asics Gel Scram Women's Running Sneaker Boston’s once again teamed up with J. For more sneakerhead data stories, check out The Ingenious Methods Uses to Control the Resell Market,as well as our analysis of the many competitions and raffles for the 350 , and our resell report on the 350 big brother, the 750 . that the truth is adidas samba millennium elsewhere WAN WAN WAN WAN WAN waaaaaaaaaan then this collection is completely made for you. Las Vegas store Fruition LV took the raffling strategy to the next level: giving out tickets for every $30 spent in the store, with no upper limit for how many tickets you could purchase. Sources: POLKA The history begins in 1977 when the photographer Stephen shames is done order a series of photographs for the magazine look. In addition, the flows have not moved one iota and they take pleasure in puncture.AIS with artists such as the Svinkels, TTC or the Klub of loorer. The so-called HSTRY collection will be available on the first ao. One of the more breathable silhouettes from the brand, these are super comfortable during the warmer months. The whole work of Frank Horvat is available on its Fila Women's pants Intersite. Often recognized, it is welcomed by its fans. The kicks have been comprised of rich tanned leather, with a tonal vulcanized resting underneath. hen, it was necessary to wait until the confirmation for the date of 22 September to the Olympia to blow the 20 and jordans sneakers les of the album 95200. Even if you’re not a sneaker head, you’ll definitely be able to appreciate the narrative and storytelling in this piece. The hat worn by Pharrell Williams at the Grammy Awards has escaped person, if Although the Mountain Hat developed by Vivienne Westwood is found very quickly in the top tweets in the course of the evening and of course several assemblies on the canvas have emerged to mock the leader of N. Gianluca Fellini has had the honor to be expored at the Chelsea Museum, the white box in New York, Miami, Bale in Switzerl and, or At the Festival Saint BOR in Brooklyn. It must be said that the two albums of the duo self-released have been recorded of a adidas country It rained. But good we in fact enjoy then we will not complain. the Rap illuminates-t-it (always as well) PanameeNoise the noise of the city not doing things by half has therefore choren to invite of the figures of the parisian rap with adidas white shoes and Greg Fried ex-Triptik as well as the members of the excellent site of the ABCDR' of the ITS and the geographer Severin Guillard. Moscow based retailer FOTT unveils its first joint venture with , in the form of a limited edition. djinns Designed exclusively for e commerce powerhouse Zalando, Patrick Mohr teams up with onitsuka tiger fencingfor a new iteration of the shoe brand’s silhouette. $167 Somewhat surprisingly, brands continue to provide customers with all red sneaker releases, as many of course missed out on the famed ‘Red Octobers. $168 adidas originals discount continue to Fila Women's pants celebrate the 25th anniversary of the, this time outfitting the throwback favorite with cues from Japan.Since 2002, Mohamed BOUROUISSA develops a practice of plastic photography but also of the drawing and the video that he deeply anchor in the social reality. There is no limit to how many raffle tickets one can acquire. It is a true honor to have my name attached to so much hard work, alongside great names like Henry Louis Gates, Jr. Founded in Germany’s Ruhr metropolis, took to their industrial roots for their seasonal collab with Mazine, turning out a waxed jacket, waxed six panel snapback, waxed sneakers, and a beanie for the colder climate. The Lab E 8 Premium comes tiger onitsuka slip on in three colors (Black, Khaki and Sail) and is now available from. What Barneys has done here is reinterpret checkerboard pattern by mimicking it in arrangement. Next up in celebrated ‘What The’ series is a forthcoming LeBron 12, which includes a handful of clever references. By never cowing to any notion of cool, Jerry Seinfeld was as hip as it ever got. Agassi’s Tech Challenge was of course a followup to the initial of entries, and this time around, the kicks were inspired by the coloration of a tennis ball. www.concise-store.com/adidas-men-adidas-stan-smith-white-green-m20324-sneaker-wholesale www.concise-store.com/vans-men-vans-ua-old-skool-flame-wall-black-black-vn0a38g1q8q-shoe-wholesale
0 notes
libraink0-blog · 6 years
Text
Book Review - Murach's Beginning Java With NetBeans
Book Review - Murach's Beginning Java With NetBeans Murach's Beginning Java with NetBeans guide examines all elements of Java in detail with the assistance of NetBeans IDE. The guide is actually divided into 5 sections. The very first chapter provides a short overview of Netbeans and Java. You are going to learn the steps involved to create Java code including use of methods and classes. In Chapter four, you are going to learn the process involved to create the own classes of yours and strategies in detail. You are going to learn the steps needed to design an item focused program in Chapter five. The last chapter in section one examines the process connected with testing as well as debugging an application. Section two examines the use of primitive types, strings, operators, arrays along with control statements with the assistance of code samples. The chapters in section three offer a comprehensive introduction of the use of Inheritance, Interfaces, Inner classes, Documentation and enumeration. Section four examines the use of collections, generics, lambdas, time and data. You'll also learn the steps needed to manage exceptions in addition to dealing with Threads and Input/Output. You are going to learn the steps connected with the use of MySQL database including JDBC in section five. The last 2 chapters of section five look at the improvement of GUI applying Java Swing. The book consists of 2 appendixes which covers the elements connected to installation of Java in both Windows as well as Mac OS X. Each chapter concludes with an area called perspective and also contains bulleted summary. I a lot liked the way in which the authors have presented the summary. Readers are going to be in a position to easily find out the facts. The includes exercise concerns in numbered format which prompts one to do certain actions. You have to read each line to finish the exercises as reported till the last step. From the point of mine of view, these questions will assist pupils to grasp knowledge rapidly. java program for prime numbers To be able to complete the exercises you have to obtain samples from the official site of the publisher. Murach also offers an Instructor CD that will have PowerPoint slides, MCQ's and a lot more. Click here to know more, know more about it here I'd love to see a standalone chapter on the improvement of mobile apps with Java. The guide is going to be extremely helpful for those developers that are well versed with the fundamental ideas of Java programming. Pure beginners are going to find it hard since the experts have examined the concepts by using NetBeans. Nevertheless, they are going to be in a position to use the book after gaining essential information in Java. Undoubtedly, Beginning Java with NetBeans by Murach Publishing is actually a great companion for pupils. Instructors are able to use the book to impart instruction. Additionally, companies are able to hold a copy of the book on the shelves of theirs for reference purposes.
0 notes
a-zhomework · 6 years
Text
Information Technology for Managers Amity 1st Sem
Information Technology for Managers Amity 1st Sem
MBA Solved Assignments
USD 10/- PayPal.Me/atozhomework Buy This Amity Assignments Solution Any Three Q1.What are various approaches of MIS development in the Organization? Explain any two approaches in detail. Q2.What are the benefits and limitations of the relational database model for business applications today? Why is the Object-oriented database model gaining acceptance for developing applications and managing the hypermedia databases at business websites? Q3.What are the business benefit and management problems of client/server networks? Discuss also in Network Computing and Peer-to-peer networks? Amity Case Study Solution Mr. Joshua , Director of the ZION Bank has Customers all over world. A customer may have one or more accounts in the Bank wide spread across one or more branches. Customers open bank accounts with a specified opening balance and thereafter may either deposit funds into the account or withdraws accounts from them. The transactions involve the opening of accounts, assignments of Account Numbers, Deposit and Withdrawal transactions etc. One of the most frequent requests for specific transactions carried out in the Bank. Customers would often want to transfer funds from one account of theirs to another. The account Numbering scheme now uniquely identifies the Bank Branch to which the account belongs. Customers often travel to the bank branch to request for a new cheque book. To ensure that Customers are ensured of high level security, the E-Banking services need to provide Customers with a unique Personal Identification password which can be changed from time to time. All Services areaccessible only on correct password verification. The Customer may also look for information on Interest rates on Fixed Term Deposits which often change from time to time. Q1.How Mr. Joshua is going to maintain information on Bank branches and security password information on customers. Q2.Draw MIS design for the above case study covering every aspect of e-Bank MCQ of mba assignment Q1: HTML is used to create a. machine language program b. high level program c. Web Page d. Web server Q2: What encourages users of a product or service supplied by a B2C company to ask friends to join in as well? a. Spam b. Viral marketing c. Affliated programs d. none of the mentioned Q3: ALU is a. Arithmetic Logic Unit b. Array Logic Unit c. Application Logic Unit d. None of above Q4: The .................... is defined as a set of activities performed across the organization creating as output of value to the customer a. development process b. business process c. quality process d. customer focus Q5: Which one is not a recognised key skill of management? a. Conceptual skills b. Human skills c. Technical skills d. Writing skills Q6: MIS normally found in a manufacturing organization will not be suitable in the ______. a. Service sector b. Banking sector c. Agriculture sector d. All of the above Q7: Internet access by transmitting digital data over the wires of a local telephone network is provided by a. leased line b. digital subscriber line c. digital signal line d. none of the mentioned Q8: Which of the following provides reliable communication? a. TCP b. IP c. UDP d. All of the above Q9: DBMS is a collection of .. that enables user to create and maintain a database. a. Keys b. Translators c. Programs d. Language activity Q10: "To improve the performance of a business process, which of the following is most relevant?" a. Input b. Processing c. Control and Feddback d. Output Q11: The topology with highest reliability is ? a. Bus Topology b. Star topology c. Ring topology d. Mesh topology Q12: In which website Global Easy Buy is facilitated? a. Ebay.com b. Amazon.com c. Yepme.com d. None of these Q13: A logical schema a. is the entire database b. is a standard way of organizing information into accessible parts c. describes how data is actually stored on disk d. All of the above Q14: Which of the following is not an example of a business process? a. designing a new product b. hiring an employee c. purchasing services d. testing software Q15: Internal information for MIS may come from any one of the following department a. Customers care department b. HR Department c. Marketing Department d. Production Department Q16: What does Management information systems (MIS) do? a. create and share documents that support day-today office activities b. "process business transactions (e.g., time cards, payments, orders, etc.) " c. capture and reproduce the knowledge of an expert problem solver d. use the transaction data to produce information needed by managers to run the business Q17: The best products to sell in B2C e-commerce are a. Small products b. Digital products c. Speciality products d. fresh products Q18: At what level of an organisation does a corporate manager operate? a. Functional b. Operational c. Middle level d. Top level Q19: "If a university sets up a web-based information system that faculty could access to record student grades and to advise students, that would be an example of a/an" a. CRM b. Intranet c. ERP d. Extranet Q20: " ________ can occur at the individual, group, organizational or extra-organizational level." a. Planning b. Controlling c. Organizing d. Scheduling Q21: Quality of the information depends on which of the following factors? a. Input Data b. System Design c. Data Processing d. All of the above Q22: eectronic publishing and collaboration is task of which information system? a. Management Information System b. Decision support system c. Executive information System d. Office automation Q23: Which of the following is not a class of information system applications? a. Database management System b. Decision support system c. Expert system d. Management Information System Q24: "A system is called ..................... when the inputs, process and the outputs are known with certainty." a. Probabilistic b. Deterministic c. Open d. Close Q25: The detailed study of the information needs of users and any information system presently used is called a. System analysis b. Systems design c. Systems approach d. System Testing Q26: "what do you mean by ""Orderly grouping of interdependent components linked together for a specific purpose """ a. System b. Process c. Design d. Components Q27: The expert system uses a(n) ____________ to select the most appropriate response a. inference b. Decision support system c. Data Source d. Knowledge Base Q28: Which of the following is a repetitive decision? a. non programmed b. Programmed c. Novel d. None of the above Q29: Which of the following is part of a static view of information? a. Logical data model b. Meta data c. Data flow model d. Information process model Q30: Which of the following is not a characteristic of good information? a. Interchangeability b. Relevance c. Cost effectiveness d. Timeliness Q31: select the sequence of simons model for decision making? a. Design- choice- intelligence b. intelligence- choice - Design c. intelligence- Design- choice d. choice - intelligence- Design Q32: The basic component of DSS is a. Database b. Model Base c. DSS Software System d. All of the above Q33: what are the factors responsible for MIS development? a. internal factors b. External factors c. Neither internal nor external d. Both internal nor external Q34: GDSS is the short form of a. Group Decision Support System b. Group Discussion Support System c. Group Decision Service System d. Group Discussion Support Source Q35: What are various tools for development of the system a. system Components b. Information system c. Data Flow Diagram d. Levels of management Q36: Development of departmental budget takes into account which type of information? a. Operational b. Statistical c. Tactical information d. Day -to- Day Q37: Which system is considered as successful system? a. A data processing system b. Information processing system c. Facts processing system d. Subsystem Q38: Why was system considered as assembly of sub systems? a. To enrich effeciency b. to enhance performance c. To reduce system Complexity d. All of the above Q39: Decision trees could be represented in different ways such as a. Bottom to Top b. Left to right c. Top to Bottom d. All of the above Q40: imparting incomplete or imperfect information is? a. Result of failed MIS b. A successful MIS c. Perfectly developed system d. system with proper analysis and design
Online MCQ Question Bank
c. You can get answer instantly if found into our database. Its (Online MCQ Question Bank) very useful for online exam and online assignment submission. Just contact us. Read the full article
0 notes
siva3155 · 4 years
Text
300+ TOP MSBI Objective Questions and Answers
MSBI Multiple Choice Questions :-
1. What is the difference between UNION and UNION ALL? A. Union selects only unique row (data) from all queries and Union all selects all rows from all queries. B. Union selects row (data) from all queries and Union all selects all rows from all queries. C. Union selects only unique row (data) from all queries and Union all selects rows from all queries. D. Union selects row (data) from all queries and Union all selects rows from all queries. Ans: a 2. Define Row Number function? A. To generate sequence number. B. To generate sequence number based on order by column. C. To generate number. D. None. Ans: b 3. What is Normalization? Types of normalization? A. Join the tables B. Move the data into tables. C. Split the table to reduce duplicates and it has five types. D. None Ans: c 4. What are different types of joins? A. Inner, outer, self join. B. Equi join and cross join. C. Right outer join. D. All above. Ans: d 5. What are the advantages of using stored procedure? A. Pre executable program. B. We can get the data. C. Security. D. It is similar to function. Ans: a 6. What is BCP? A. Bulk copy program. B. Business continuity program. C. A and B. D. None. Ans: a 7. Define Index? A. Predefined pointers to data page. B. It is primary key. C. It is foreign key. D. None. Ans: a 8. What command do we use to rename db, table, and column? A. Invoke command B. Commit C. Rename D. None. Ans: c 9. Define having clause? A. It is similar to where but must use group by clause. B. It is equal to where clause. C. None. D. It is equal to from clause. Ans: a 10. What are the basic functions system databases? A. To create functions. B. To create stored procedure. C. To maintain metadata information. D. None. Ans: c
Tumblr media
MSBI MCQs 11. Explain ETL process? A. Extract, Translation, Loading. B. Extract, Transformation , Loading C. Both a and b. D. None. Ans: b 12. Difference between for loop and for each loop container? A. For loop based on conditions and for each loop based on objects collections. B. For loop based on objects collections and for each loop based on objects collections. C. None. D. Both a and b. Ans: a 13. What does a control flow do? A. To control workflow. B. To control events. C. To control data flows. D. To control lookup. Ans: a 14. Explain event handlers? A. To handle data validations. B. To handle errors. C. To handle events. D. None. Ans: c 15. SSIS 2008 configuration types? A. Five. B. Four. C. Three. D. One. Ans: a 16. Define Lookup transformation? A. Used as reference table. B. Used as master table. C. Used as fact table D. None. Ans: a 17. Define synchronous transformations? A. Input rows count and Output rows count are same. B. Input rows count and Output rows count are not same. C. None. D. Input rows count and Output rows count are different. Ans: a 18. How to rename file using SSIS tasks? A. Using lookup. B. Using Data flow. C. Using File system task. D. None. Ans: c 19. What does mean by data auditing? A. To maintain data load statistics in ETL process. B. To know the errors. C. To know the Primary keys. D. None. Ans: a 20. How many container tasks available in SSIS? A. One. B. Two. C. Three. D. Four. Ans: d 21. Define role play dimensions? A. One dimension used multiple times in the cube. B. One dimension used in different cubes. C. Shared across cubes. D. None. Ans: a 22. Define dimension usage in SSAS Cube? A. To maintain cube data size. B. To know the relationships between dimensions and fact. C. To build business logic. D. None. Ans: b 23. MDX stands? A. Memory, Distribution, extensions. B. Memory, dimension, expressions. C. Multi, dimension, expressions. D. None Ans: c 24. DSV stands? A. Data source View. B. It is view. C. It has relationships and metadata. D. All above. Ans: d 25. How many types of actions available in the Cube? A. One. B. Two. C. Three. D. None. Ans: c MSBI Objective Type Questions with Answers 26. What do you understand by dynamic named set (SSAS 2008)? A. To create dynamic set of members. B. To create set of members. C. None. D. Both a and b. Ans: a 27. How many types of dimension are possible in SSAS? A. Four. B. Five. C. Six. D. Seven. Ans: c 28. In which scenario, you would like to go for materializing dimension? A. To increase spee B. To decrease memory size. C. Both. D. None. Ans: a 30. What are the options to deploy SSAS cube in production? A. Using BIDS. B. Using SSMS. C. Using XMLA. D. All the above. Ans: d 31. Describe Reporting Lifecycle? A. Reports and reports models. B. Report authoring, Management, Delivery. C. Both. D. None. Ans: b 32. What can SQL Server Reporting Services do? A. To create files. B. To create tables. C. To create Reports. D. None. Ans: c 33. Define reporting processing? A. Report data processing. B. Report rendering process. C. Report delivery process. D. All the above. Ans: d 34. How many default rending options are available in SSRS2008? A. Four. B. Five. C. Two. D. One. Ans: a 35. What is the usage of Report Builder? A. To create reports. B. To create reports for users. C. Business users create reports. D. None. Ans: c 37 How many architecture components of SSRS 2008? A. Five. B. Six. C. Seven. D. None. Ans: b 38. Explain on SSRS2008 Reporting Items? A. Tablix,Chart,List B. Sub Report. C. Both A and B. D. None. Ans: c 39. What does mean by nested datasets? A. Used datasets with in dataset. B. A dataset. C. None. D. A table. Ans: a 40. How many command line utilities of SSRS2008? A. Three. B. Four. C. One. D. None. Ans: a 41. You are creating a SQL Server 2008 Integration Services (SSIS) package for Company.com. The package contains six Data Flow tasks and three Control Flow tasks. You should alter the package Which is the correct answer? A. You should increase the two Control Flow tasks and one Data Flow task to a container. Change the TransactionOption property of the container to Supported. B. You should increase the two Control Flow tasks and one Data Flow task to a container. Change the TransactionOption property of the container to Disabled. C. You should increase the two Control Flow tasks and one Data Flow task to a container. Change the TransactionOption property of the container to Required. D. You should increase the two Control Flow tasks and one Data Flow task to a container. Change the TransactionOption property of the container to RequiredNew. Ans: C 42. You are managing a SQL Server 2008 Reporting Services (SSRS) sample which does not give some same rendering extensions for Company.com. You should make sure that you could set the server in order to render to Microsoft WorWhich is the correct answer? A. You should change the AppSetttings.config file. B. You should change the Global.asax file. C. You should change the Machine.config file. D. You should change the RSReportServer.config file Ans: D 43. You are creating a SQL Server 2008 Integration Services (SSIS) package on a SQL Server 2008 database for Company.com. In order to develop a failure recovery plan that is published for a SQL Server. Which is the correct answer? A. You should back up the master database. B. You should back up the local database. C. You should back up the system database. D. You should back up the systemdb databse. Ans: A 44. You are developing a SQL Server 2008 Reporting Services (SSRS) instance of report model for Company.com.In the Report Builder tool, the users should need to create their SSRS reports. The data source they used will include a Microsoft SQL Server 2008 database. Which include 1000 tables? You should design the report model for users, and allow access to only the 20tables which they require for reporting. Which is the correct answer? A. You should develop DataSet using the Web Service to Schema(s) option. B. You should develop DataTable using the Web Service to Schema(s) option. C. You should develop a data source view and select only the required tables and views. D. You should set the data source view in the setting file. Ans: C 45. You are managing a SQL Server 2008 Analysis Services (SSAS) database for Company.com.A sales manager called Clerk is responsible for the sales of bikes in the Northeast region. You decide to give some rights to the rights to Clerk to visit the database.You won two roles below called Southern Region and Nikes. Their schemas are listed below:You have make The Visual Totals properties attribute true for roles above.You should make sure that Clerk could browser the workers in the Product dimension which link to the Nikes category in the Southern region. Which is the correct answer? A. You should increase Clerk to a Nikes role B. You should increase Clerk to the Southern Region role. C. You should increase Clerk to a new role which owns components below: D. .} as the permitted configuration.{...} as the permitted E. You should increase Clerk to the default Region role. Ans: C 46. You are managing a SQL Server 2008 Analysis Services (SSAS) database which includes a Sale dimension that includes the Category and Subcategory properties for Company.com.There is a rigid relationship type for properties. The data source for the Sale dimension alters the relationship between the Type and Sub Type values. You should make sure that you could run an XML to operate he dimension to reflect the change normally for Analysis (XMLA). Which is the correct answer? A. You should utilize the ProcessDefault command. B. You should utilize the ProcessClear command. C. You should utilize the ProcessIndexes command. D. You should utilize the ProcessDefault and the ProcessClear commands. Ans: D 47. You are managing a SQL Server 2008 Analysis Services (SSAS) instance for Company.com. In order to execute the Usage-Based Optimization Wizard you should make query logging enable. Which is the correct answer? Which is the correct answer? A. You should make the QueryLogSampling server attribute default value. B. You should make the QueryLogSampling server attribute 5. C. You should configure the server property of DefaultFolders. D. You should configure the QueryLogConnectionString server attribute and set a valid connection string. Ans: D 48. You are managing a SQL Server 2008 Analysis Services (SSAS) database for Company.com.You get the Duplicate Key error when you operate the Analysis Services database.You should alter the ErrorConfiguration attribute in order to make processing run normally. Which is the correct answer? A. You should alter the Dynamic Management View (DMV) B. You should alter the Local Group C. You should alter the dimension D. You should alter the Transactions Log Ans: C 49. You are managing a SQL Server 2008 Analysis Services (SSAS) database for Company.com. In order to update data in a partition each hour you should run the incremental processing method. In order to solve the problem, which is the correct answer? A. You should utilize ProcessAdd for Analysis (XMLA) command B. You should utilize default command for Analysis (XMLA) C. You should utilize ProcessNone for Analysis (XMLA) command D. You should utilize ProcessView for Analysis (XMLA) command Ans: A 50. You are developing a SQL Server 2008 Reporting Services (SSRS) report for Company.com.Assembly should be created in order to run real-time lookup and currency conversion. The assembly has a static class named daily which lives in the namespace HomeCalc.there is a method called DMO which need two arguments, Cuurnt and HomeCalcWhen the report is operating, you should reference the ToEUR method in an expression to convert USD to USO. Which is the correct answer? A. You should use the expression of =Code. HomeCalDaily. USO (Fields! Cuurnt.Value,” DMO”) B. You should use the expression of =Code! HomeCalDaily. USO (Fields! Cuurnt.Value,”DMO”) C. You should use the expression of = HomeCalDaily.USO (Fields! Cuurnt.Value,”USD”) D. You should use the expression of = HomeCalc! Daily.USO (Fields! Cuurnt.Value,”USD”) Ans: C MSBI Questions and Answers pdf Download Read the full article
0 notes
siva3155 · 4 years
Text
300+ TOP DATA MINING Objective Questions and Answers
DATA MINING Multiple Choice Questions and Answers :-
1) The problem of finding hidden structure in unlabeled data is called... A. Supervised learning B. Unsupervised learning C. Reinforcement learning Ans: B 2) Task of inferring a model from labeled training data is called A. Unsupervised learning B. Supervised learning C. Reinforcement learning Ans: B 3) Some telecommunication company wants to segment their customers into distinct groups in order to send appropriate subscription offers, this is an example of A. Supervised learning B. Data extraction C. Serration D. Unsupervised learning Ans: D 4) Self-organizing maps are an example of... A. Unsupervised learning B. Supervised learning C. Reinforcement learning D. Missing data imputation Ans: A 5) You are given data about seismic activity in Japan, and you want to predict a magnitude of the next earthquake, this is in an example of... A. Supervised learning B. Unsupervised learning C. Serration D. Dimensionality reduction Ans: A 6) Assume you want to perform supervised learning and to predict number of newborns according to size of storks' population (http://www.sssssssss.com/storksBabies.pdf), it is an example of ... A. Classification B. Regression C. Clustering D. Structural equation modeling Ans: B 7) Discriminating between spam and ham e-mails is a classification task, true or false? A. True B. False Ans: A 8) In the example of predicting number of babies based on storks' population size, number of babies is... A. outcome B. feature C. attribute D. observation Ans: A 9) It may be better to avoid the metric of ROC curve as it can suffer from accuracy paradox. A. True B. False Ans: B 10) which of the following is not involve in data mining? A. Knowledge extraction B. Data archaeology C. Data exploration D. Data transformation Ans: D
Tumblr media
DATA MINING MCQs 11) Which is the right approach of Data Mining? A. Infrastructure, exploration, analysis, interpretation, exploitation B. Infrastructure, exploration, analysis, exploitation, interpretation C. Infrastructure, analysis, exploration, interpretation, exploitation D. Infrastructure, analysis, exploration, exploitation, interpretation Ans: A 12) Which of the following issue is considered before investing in Data Mining? A. Functionality B. Vendor consideration C. Compatibility D. All of the above Ans: D 13. Adaptive system management is A. It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations B. Computational procedure that takes some value as input and produces some value as output. C. Science of making machines performs tasks that would require intelligence when performed by humans D. none of these Ans: A 14. Bayesian classifiers is A. A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. B. Any mechanism employed by a learning system to constrain the search space of a hypothesis C. An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. D. None of these Ans: A 15. Algorithm is A. It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations B. Computational procedure that takes some value as input and produces some value as output C. Science of making machines performs tasks that would require intelligence when performed by humans D. None of these Ans: B 16. Bias is A.A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory B. Any mechanism employed by a learning system to constrain the search space of a hypothesis C. An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. D. None of these Ans: B 17. Background knowledge referred to A. Additional acquaintance used by a learning algorithm to facilitate the learning process B. A neural network that makes use of a hidden layer C. It is a form of automatic learning. D. None of these Ans: A 18. Case-based learning is A. A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. B. Any mechanism employed by a learning system to constrain the search space of a hypothesis c. An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. D. None of these Ans: C 19. Classification is A. A subdivision of a set of examples into a number of classes B. A measure of the accuracy, of the classification of a concept that is given by a certain theory C. The task of assigning a classification to a set of examples D. None of these Ans: A 20. Binary attribute are A. This takes only two values. In general, these values will be 0 and 1 and .they can be coded as one bit B. The natural environment of a certain species C. Systems that can be used without knowledge of internal operations D. None of these Ans: A DATA MINING Objective type Questions and Answers 21. Classification accuracy is A. A subdivision of a set of examples into a number of classes B. Measure of the accuracy, of the classification of a concept that is given by a certain theory C. The task of assigning a classification to a set of examples D. None of these Ans: B 22. Biotope are A. This takes only two values. In general, these values will be 0 and 1 and they can be coded as one bit. B. The natural environment of a certain species C. Systems that can be used without knowledge of internal operations D. None of these Ans: B 23. Cluster is A. Group of similar objects that differ significantly from other objects B. Operations on a database to transform or simplify data in order to prepare it for a machine-learning algorithm C. Symbolic representation of facts or ideas from which information can potentially be extracted D. None of these Ans: A 24. Black boxes are A. This takes only two values. In general, these values will be 0 and 1 and they can be coded as one bit. B. The natural environment of a certain species C. Systems that can be used without knowledge of internal operations D. None of these Ans: C 25. A definition of a concept is if it recognizes all the instances of that concept A. Complete B. Consistent C. Constant D. None of these Ans: A 26. Data mining is A. The actual discovery phase of a knowledge discovery process B. The stage of selecting the right data for a KDD process C. A subject-oriented integrated time variant non-volatile collection of data in support of management D. None of these Ans: A 27. A definition or a concept is if it classifies any examples as coming within the concept A. Complete B. Consistent C. Constant D. None of these Ans: B 28. Data independence means A. Data is defined separately and not included in programs B. Programs are not dependent on the physical attributes of data. C. Programs are not dependent on the logical attributes of data D. Both (B) and (C). Ans: D 29. E-R model uses this symbol to represent weak entity set? A. Dotted rectangle B. Diamond C. Doubly outlined rectangle D. None of these Ans: C 30. SET concept is used in A. Network Model B. Hierarchical Model C. Relational Model D. None of these Ans: D 31. Relational Algebra is A. Data Definition Language B. Meta Language C. Procedural query Language D. None of the above Ans: C 32. Key to represent relationship between tables is called A. Primary key B. Secondary Key C. Foreign Key D. None of these Ans: C 33. ________ produces the relation that has attributes of Ri and R2 A. Cartesian product B. Difference C. Intersection D. Product Ans: A 34. Which of the following are the properties of entities? A. Groups B. Table C. Attributes D. Switchboards Ans: C 35. In a relation A. Ordering of rows is immaterial B. No two rows are identical C. (A) and (B) both are true D. None of these Ans: C DATA MINING Questions and Answers pdf Download Read the full article
0 notes