网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
We have data mining and loading tools for both maintenance task data and component data, which means a considerable ___ in implementation time.

A.stop
B.saving
C.consumption
D.economy

参考答案

参考解析
解析:本题考察词义辨析,题目意为“对于维护任务数据和组件数据,我们拥有数据挖掘技术和装载工具,这意味着大量时间的节约。”A选项意为“停止”,B选项意为“节约”,C选项意为“消耗”,D选项意为“经济”。根据句意应为节约时间。
  
更多 “We have data mining and loading tools for both maintenance task data and component data, which means a considerable ___ in implementation time.A.stop B.saving C.consumption D.economy” 相关考题
考题 In which case would you use a FULL OUTER JOIN? () A. Both tables have NULL values.B. You want all unmatched data from one table.C. You want all matched data from both tables.D. You want all unmatched data from both tables.E. One of the tables has more data than the other.F. You want all matched and unmatched data from only one table.

考题 _______, we keep records on all the experiments so that we can have enough data. A. As a wholeB. As a ruleC. On the averageD. By all means

考题 In data communication, data link is those parts of two data terminal equipments that are controlled by a protocol along with the(71) data circuit, which together enable data(72). So-called protocol means, in short, a set of rules that determines the behavior. of functional units in achieving communication.Data circuit, however, consists of a pair of(73) transmission channels that provides a means of two-way data transmission. Between data switching exchanges, the data circuit may or may not include data circuit-terminating equipment (DCE), depending on the type of(74) used at the data switching exchange. Between a data station and a data switching exchange or data concentrator, the data circuit includes the DCE at the data station end, and may include equipment(75) to a DCE at the data switching exchange or dam concentrator location.A.handshakingB.interconnectingC.linkageD.joining

考题 Data mining is an(66)research field in database and artificial intelligence. In this paper, the data mining techniques are introduced broadly including its producing background, its application and its classification. The principal techniques used in the data mining are surveyed also, which include rule induction, decision(67), artificial(68)network, genetic algorithm, fuzzy technique, rough set and visualization technique. Association rule mining, classification rule mining, outlier mining and clustering method are discussed in detail. The research achievements in association rule, the shortcomings of association rule measure standards and its(69), the evaluation methods of classification rules are presented. Existing outlier mining approaches are introduced which include outlier mining approach based on statistics, distance-based outlier mining approach, data detection method for deviation, rule-based outlier mining approach and multi-strategy method. Finally, the applications of data mining to science research, financial investment, market, insurance, manufacturing industry and communication network management are introduced. The application(70)of data mining are described.A.intractableB.emergingC.easyD.scabrous

考题 Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new generation of computational theories and tools to assist humans in(96)useful information(knowledge) from the rapidly growing(97)of digital data. These theories and tools are the subject of the emerging field of knowledge discovery in database(KDD). At an abstract level, the KDD field is concerned with the development of methods and techniques for making(98)of data. The basic problem addressed by the KDD process is one of mapping low-level data(which are typically too voluminous to understand and digest easily) into other forms that might be more(99)(for example, a short report), more(100)(for example, a descriptive approximation or model of the process that generated the data), or more useful(for example, a predictive model for estimating the value of future cases). At the core of the process is the application of specific data-mining methods for pattern discovery and extraction.A.expiringB.examiningC.extractingD.extricating

考题 You are the administrator of SQL Server 2000 computer named FABSQL2K01. You create a Data Transformation Services package that contains definition for two transform. data tasks.The tasks gets data from two text files named Customers and Sales. The DTS package is configured as shown in the exhibit.You do not want the DTS package to add any data to the server unless both transform. data tasks complete successfully.You select the use transactions check box of DTS package and the Join transaction of present check box of both transform. data tasks. You then select the fail package on step failure check box of both transform. data tasks.You want to use the DTS package to import data from the text files to the server. You want to ensure that changes are committed if all imported data is successfully transformed.What should you do?A.Select the commit on successful completion check box of the DTS package.B.Select the commit transaction on successful completion of this step check box of the customers transform. data task.C.Select the commit transaction on successful completion of this step check box of the sales transform. data task.D.Select the commit transaction on successful completion of this step check box of both transform. data tasks.

考题 Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and (1) it into useful information information that can be used to increase revenue, (2) costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It (3) users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases.Although data mining is a (4) new term, the technology is not. Companies have used powerful computers to sift through volumes of supermarket scanner data and analyze market research reports for years. However, continuous innovations in computer processing power, disk storage, and statistical software are dramatically increasing the accuracy of analysis while driving (5) the cost.A.organizingB.summarizingC.composingD.constituting

考题 Business intelligence (BI) is the integrated application of data warehouse data mining and ______A.OLAPB.OLTPC.MRPIID.CMS

考题 ()is a collection of data sets,which is so large and complet that is because difficult to process using on hand database management tools or traditional data peocessing applicationsA.big dataB.clusterC.parallel computingD.data warehouse

考题 Which component of VPN technology ensures that data can be read only by its intended recipient?() A. data integrityB. encryptionC. key exchangeD. authentication

考题 ( ) is a collection of data sets, which is so large and complex that is becomes difficult to process using on-hand database management tools or traditional data processing applications.A.Big data B.Cluster C.Parallel computing D.Data warehouse

考题 We have experience in loading data ___ several A/C-manufacturers such as Boeing,Airbus,British Aerospace,Fokker,De Havilland and ATR.A.in B.to C.beside D.from

考题 An application architecture specifies the technologies to be used to implement one or more information systems. It serves as an outline for detailed design, construction, and implementation. Given the models and details, include ( ), we can distribute data and processes to create a general design of application architecture. The design will normally be constrained by architecture standards, project objectives, and ( ). The first physical DFD to be drawn is the ( ). The next step is to distribute data stores to different processors. Data(请作答此空)are two types of distributed data which most RDBMSs support. There are many distribution options used in data distribution. In the case of( ), we should record each table as a data store on the physical DFD and connect each to the appropriate server. A.vertical partitioning and horizontal replication B.vertical replication and horizontal partitioning C.integration and distribution D.partitioning and replication

考题 ( ) is a collection of data sets,which is so large and complex that is becomes difficult to process using on-hand database management tools or traditional data processing applications. A.Big data B.Cluster C.Parallel computing D.DatA.warehouse

考题 ( )is a collection of data sets, which is so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications.A、Big dataB、ClusterC、Parallel computingD、Data warehouse

考题 In which two cases would you use an outer join? ()A、The tables being joined have NOT NULL columns.B、The tables being joined have only matched data.C、The columns being joined have NULL values.D、The tables being joined have only unmatched data.E、The tables being joined have both matched and unmatched data.F、Only when the tables have a primary key-foreign key relationship.

考题 Which component of VPN technology ensures that data can be read only by its intended recipient?()A、data integrityB、encryptionC、key exchangeD、authentication

考题 An existing cluster has an application node and database node. Changes in the application  require both nodes to have access to the other’s data all of the time.  Which facility managed by HACMP can be implemented with the least amount of impact?()   A、 NFSB、 AFSC、 DFSD、 GPFS

考题 You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. Thepackage consists of three components.The first component is a data acquisition application that monitors continuous data output fromscientific instruments. The second component is a data analysis application that receives data from thedata acquisition application by using shared memory. The third component is a data graphingapplication that displays the processed data in real time.The data analysis application communicates with the data graphing application by using OLE. When youattempt to analyze large data sets, your computer is not able to display data in real time. You install asecond processor in your computer. Only one processor is used while the package is running, even thoughtask manager shows both processors.You want your data analysis package to use both processors. What should you do?()A、Configure the data acquisition application to run in its own virtual DOS machine (VDM). B、Configure the data analysis application to run in its own virtual DOS machine (VDM). C、Configure the data graphing application to run in its own virtual DOS machine (VDM). D、Configure the virtual DOS machine for the data acquisition and data analysis applications to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1. E、Configure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0.Configure the VDM for the data graphing application to have a hard affinity for processor1.

考题 单选题You are creating the DEPT_SAL data block from the PAYHIST form. Users should be able to enter a valid department ID number, which will then display the employee salary information for that department. This data block could potentially retrieve a large number of records. Since users will probably only view a small number of these records, only 10 records should be fetched at one time. How would you create the data block?()A Select The Data Blocks node in the Object Navigator and click the Create button. Choose to build the data block manually, enter the procedure name in the Query Data Source Columns property, and the procedure code in the Query Data Source Arguments property. B Choose Tools - Data Block Wizard, select Table as the data source type, and base the block on the columns from the tables. C Choose Tools - Data Block Wizard, select, View as the data source type, and base the block on the columns from the tables. D Select the Data Blocks node in the Object Navigator and click the Create button. Choose to build the data block manually, alter the Query Data Source Type property to 'FROM clause query', and enter the SELECT statement in the Query Data Source Name property. E Select the Data Block node in the Object Navigator and click the Create button. Alter the Query Data Source Type, Query Data Source Name, Query Data Sources Columns, and Query Data Source Arguments properties to create a stored procedure that uses a red cursor.

考题 多选题For which two tasks would it be best NOT to use the utility SQL*Loader?()AWhen loading selected rows into each table.BWhen loading data from an export dump file.CWhen loading data from disk, tape, or named pipes.DWhen your data is NOT being inserted from a flat file.EWhen using a record management system to access data files.

考题 多选题You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. The package consists of three components. The first component is a data acquisition application that monitors continuous data output from scientific instruments. The second component is a data analysis application that receives data from the data acquisition application by using shared memory. The third component is a data graphing application that displays the processed data in real time.  The data analysis application communicates with the data graphing application by using OLE. When you attempt to analyze large data sets, your computer is not able to display data in real time. You install a second processor in your computer; only one processor is used while the package is running, even though task manager shows both processors.   You want your data analysis package to use both processors. What should you do?()AConfigure the data acquisition application to run in its own virtual DOS machine (VDM).BConfigure the data analysis application to run in its own virtual DOS machine (VDM).CConfigure the data graphing application to run in its own virtual DOS machine (VDM).DConfigure the virtual DOS machine for the data acquisition and data analysis applications to.have a hard affinity for processor 0. Configure the VDM for the data graphing application to.have a hard affinity for processor1.EConfigure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1.

考题 多选题In which two cases would you use an outer join? ()AThe tables being joined have NOT NULL columns.BThe tables being joined have only matched data.CThe columns being joined have NULL values.DThe tables being joined have only unmatched data.EThe tables being joined have both matched and unmatched data.FOnly when the tables have a primary key-foreign key relationship.

考题 单选题You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()A Upgrade the hardware/memory to accommodate the data.B Load the data into your database by using the PARALLEL clause.C Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.D Use an external table so you can have the metadata available in your database, but leave the data in the operating system files.

考题 单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while restoring the file. Which option must you consider for this task?()A using only the RMAN SWITCH command to set the new location for the data fileB placing the database in the MOUNT state for the restore and recovery operations.C using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.D configuring two channels: one for the restore operation and the other for the recovery operation

考题 单选题In which case would you use a FULL OUTER JOIN? ()A Both tables have NULL values.B You want all unmatched data from one table.C You want all matched data from both tables.D You want all unmatched data from both tables.E One of the tables has more data than the other.F You want all matched and unmatched data from only one table.

考题 单选题An existing cluster has an application node and database node. Changes in the application  require both nodes to have access to the other’s data all of the time.  Which facility managed by HACMP can be implemented with the least amount of impact?()A  NFSB  AFSC  DFSD  GPFS