网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()
A

Microsoft Clustering

B

Microsoft Decision Tree

C

Microsoft Nave Bayes

D

Microsoft Association


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()A Microsoft ClusteringB Microsoft Decision TreeC Microsoft Nave BayesD Microsoft Association” 相关考题
考题 Exhibit: You are developing a Web application. The Web application uses a GridView control to display data. You build your Web Forms for the Web application by dragging and dropping tables from the Data Connections tree in Server Explorer. You need to add a connection to your data by using the Add Connection dialog box as shown in the exhibit. During the process, you need to configure the .NET Data Provider that you use to create the data source objects. What should you do?()A. Right-click the connection, and click Properties. Modify the Provider property of the data connection.B. Click the Change button, and change the data provider for the selected data source.C. Click the Advanced button, and change the Data Source property to the target provider.D. Click the Advanced button, and change the Application Name property to the target provider.

考题 analytical data mining(名词解释)

考题 Data mining is an(66)research field in database and artificial intelligence. In this paper, the data mining techniques are introduced broadly including its producing background, its application and its classification. The principal techniques used in the data mining are surveyed also, which include rule induction, decision(67), artificial(68)network, genetic algorithm, fuzzy technique, rough set and visualization technique. Association rule mining, classification rule mining, outlier mining and clustering method are discussed in detail. The research achievements in association rule, the shortcomings of association rule measure standards and its(69), the evaluation methods of classification rules are presented. Existing outlier mining approaches are introduced which include outlier mining approach based on statistics, distance-based outlier mining approach, data detection method for deviation, rule-based outlier mining approach and multi-strategy method. Finally, the applications of data mining to science research, financial investment, market, insurance, manufacturing industry and communication network management are introduced. The application(70)of data mining are described.A.intractableB.emergingC.easyD.scabrous

考题 You delete content from a file named Speed.doc that is stored in the C:\Data folder. You edit 20 files in this folder over the next two days. You need to restore the version of the file that had the correct data. You also need to ensure that the other fiels in the folder remain unaffected.What should you do?()A.AB.BC.CD.D

考题 You need to identify if malware is causing performance issues on your computer.What should you do?() A.AB.BC.CD.D

考题 Which two statements are correct regarding the Flashback Versions Query feature?()A、 You can use this feature to identify the committed versions of the rows, but not the uncommitted versions.B、 You can use this feature to identify the versions of V$ views.C、 You can use this feature to identify the inserts, deletes, and updates performed on a particular row but not the data definition language (DDL) operations performed on the table.D、 You can use this feature for a table only if row movement is enabled for the table.E、 You can use this feature to identify the versions of external and fixed tables.

考题 You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A、 You do not need to restore all the data files.B、 You do not need to open the database with the RESETLOGS operationC、 You do not need to perform a full backup after the RESETLOGS operation.D、 You do not need to recover all the data files to the same system change number (SCN).

考题 You need to recommend a monitoring solution for the file server that meets the technical  requirements.   What should you include in the recommendation?()A、Data Collector SetsB、File Server Resource Manger quotasC、File Server Resource Manger storage reportsD、NTFS disk quotas

考题 Your network consists of a single Active Directory domain.? All domain controllers run Windows Server 2008. You need to identify the Lightweight Directory Access Protocol (LDAP) clients that are using the largest amount of available CPU resources on a domain controller. What should you do()A、Review performance data in Resource Monitor.B、Review the Hardware Events log in the Event Viewer.C、Run the LAN Diagnostics Data Collector Set. Review the LAN Diagnostics report.D、Run the Active Directory Diagnostics Data Collector Set. Review the Active DirectoryDiagnostics

考题 You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()A、a data recovery agentB、a recovery keyC、a recovery password printed and stored in a secure locationD、a recovery password stored in Active Directory

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Analysis Services (SSAS) database. The database contains a data mining structure that uses a SQL Server 2008 table as a data source. A table named OrderDetails contains detailed information on product sales. The OrderDetails table includes a column named Markup. You build a data mining model by using the Microsoft Decision Trees algorithm. You classify Markup as discretized content.  The algorithm produces a large number of branches for Markup and results in low confidence ratings on predictable columns. You need to verify whether the Markup values include inaccurate data. What should you do? ()A、 Modify the content type of Markup as Continuous.B、 Create a data mining dimension in the SSAS database from OrderDetails.C、 Create a data profile by using SQL Server 2008 Integration Services (SSIS).D、 Create a cube in SSAS. Use OrderDetails as a measure group. Recreate the data mining structure and mining model from the cube data.

考题 You need to identify a type that meets the following criteria:          Is always a number.          Is not greater than 65,535.  Which type should you choose?()A、System.UInt16B、intC、System.StringD、System.IntPtr

考题 You need to meet the fraud detection requirements. What should you do?()A、Use Percentage Sampling in SSIS.B、Use a Neural Network Data mining algorithm.C、Create an SSAS Key Performance Indicator for each account.D、Monitor transactions by using SQL Server Profiler.

考题 单选题You need to identify a type that meets the following criteria:          Is always a number.          Is not greater than 65,535.  Which type should you choose?()A System.UInt16B intC System.StringD System.IntPtr

考题 单选题You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()A a data recovery agentB a recovery keyC a recovery password printed and stored in a secure locationD a recovery password stored in Active Directory

考题 单选题You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()A From Reliability Monitor, review the informational events.B From System Information, review the Software Environment.C From Performance Monitor, review the System Diagnostics Report.D From Performance Monitor, run the System Performance Data Collector Set.

考题 单选题You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters:  The byte array to be decrypted, which is named cipherMessage  The key, which is named key   An initialization vector, which is named iv  You need to decrypt the message by using the TripleDES class and place the result in a string.  Which code segment should you use?()A AB BC CD D

考题 单选题You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You plan to implement a test strategy for the application. You need to ensure that the test strategy meets the following requirements: Test data can be added to the test project without recompiling. Multiple variations of a test can be executed at run time. What should you do? ()A Use IntelliTrace.B Use data-driven tests.C Create a single test class.D Create a test method for each data variation.

考题 单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution contains a SQL Server 2008 Analysis Services (SSAS) database. A measure group in the database contains log entries of manufacturing events. These events include accidents, machine failures, production capacity metrics, and other activities. You need to implement a data mining model that meets the following requirements: Predict the frequency of different event types. Identify short-term and long-term patterns. Which algorithm should the data mining model use?()A  the Microsoft Time Series algorithmB  the Microsoft Decision Trees algorithmC  the Microsoft Linear Regression algorithmD  the Microsoft Logistic Regression algorithm

考题 单选题You have a computer that runs Windows 7. You need to identify which hardware is required to create a system repair disc.  Which hardware should you identify?()A CD/DVD burnerB floppy diskC tape driveD USB disk

考题 多选题Identify two situations in which the block header grows in a data block. ()Awhen row directories need more row entriesBwhen there is row migration in the data blockCwhen there is an increase in the PCTFREE value for the data blockDwhen more transaction slots are required than are initially configured

考题 单选题You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A  You do not need to restore all the data files.B  You do not need to open the database with the RESETLOGS operationC  You do not need to perform a full backup after the RESETLOGS operation.D  You do not need to recover all the data files to the same system change number (SCN).

考题 单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Analysis Services (SSAS) database. The database contains a data mining structure that uses a SQL Server 2008 table as a data source. A table named OrderDetails contains detailed information on product sales. The OrderDetails table includes a column named Markup. You build a data mining model by using the Microsoft Decision Trees algorithm. You classify Markup as discretized content.  The algorithm produces a large number of branches for Markup and results in low confidence ratings on predictable columns. You need to verify whether the Markup values include inaccurate data. What should you do? ()A  Modify the content type of Markup as Continuous.B  Create a data mining dimension in the SSAS database from OrderDetails.C  Create a data profile by using SQL Server 2008 Integration Services (SSIS).D  Create a cube in SSAS. Use OrderDetails as a measure group. Recreate the data mining structure and mining model from the cube data.

考题 单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A 802.1XB DHCPC IPSecD VPN

考题 单选题You need to identify the hardware failures have occurred on your computer in the past six months. What should you do?()A Open Device Manager.B Open Reliability Monitor.C Create a User Defined Data Collector Set.D Create a new Event Trace Sessions Data Collector Set.

考题 单选题You need to identify which tool the help desk users must use to perform administrative tasks.  Which tool should you identify?()A RemoteAppB Remote AssistanceC Remote DesktopD Remote Server Administration Tools (RSAT)

考题 单选题You need to recommend a data management solution that meets the company’s technical requirements.   What should you include in the recommendation?()A DFS ManagementB File Server Resource Manager (FSRM)C Share and Storage ManagementD Storage Explorer