You are on page 1of 2

Data Mining Mid-II Important Questions

1.Explain in detail Rule based classification.

2.Write a brief note on Overview of Outlier Detection Techniques


3.Explain about K-nearest neighbors algorithm?

4.Explain different types of data types used in cluster analysis ?

5. Explain briefly types of cluster analysis techniques ?


6.Explain sequence mining in Transactional databases.

7..Explain about clustering algorithm and types of clustering algorithms.

Objective Questions

1. To know the unknown or missing values which one is used __________

2. Data preparation includes

3. ______________ algorithm is most sensitive to outlines

4. A PAM signal can be detected using ___________

5. In _Baysian Belief __ networks the computations can be very lengthy or


complex.

6. In ___ Greedy __ algorithm tree is constructed in a top-down recursive


divide and conquer manner.

7. Non hierarchical clustering faster than __Hierarchical method.

8. The distance between two _ Clusters is the distance between their centroids.

9. The divisive clustering is also known as _________


10. The model search the data space for areas

11. Web structure mining is the process of discovering ______________


Information from the Web.

12. ______________ is in web server data


13.K-means is the simplest __________________________ learning algorithm.

14. Web mining is an application of _________________________ technique.

15. ___________________________ describes the discovery of useful information from the web
content.

16. _______________________________ mining is used to study the topology of hyperlinks.

17 . Which of the following is, finding and ranking documents

18.Which of the following are features of unstructured data

19.The _____________________________ data includes web server access logs, proxy logs, browser
logs & user profiles.

20.The textual part of web consistant __________________________ data.

You might also like