In the name of ALLAH, the most beneficient, the most merciful

Data Warehousing (CS614)

Multiple Choice Questions (MCQs)

 

Objective Questions

Question

__________ modeling technique is more appropriate for data warehouses.

  1. entity-relationship
  2. dimensional
  3. physical
  4. None of the given

Answer: 3 Chapter No.  

Question

The STAR schema used for data design is a __________ consisting of fact and dimension tables.

  1. Network model
  2. Relational model
  3. Hierarchical data model
  4. None of the given

Answer: 2 Chapter No.  

Question

If someone told you that he had a good model to predict customer usage, the first thing you might try would be to ask him to apply his model to your customer _______, where you already knew the answer.

  1. Base
  2. Drive
  3. File
  4. Log

Answer: 1 Chapter No.  

Question

__________ in agriculture extension is that pest population beyond which the benefit of spraying outweighs its cost.

  1. Profit Threshold Level
  2. Economic Threshold Level
  3. Medicine Threshold Level
  4. None of the given

Answer: 4 Chapter No.  

Question

An optimized structure which is built primarily for retrieval, with update being only a secondary consideration is __________.

  1. OLTP
  2. OLAP
  3. DSS
  4. Inverted Index

Answer: Chapter No.  

Question

Companies collect and record their own operational data, but at the same time they also use reference data obtained from __________ sources such as codes, prices etc.

  1. Operational
  2. Internal
  3. External
  4. None of the given

Answer: 3 Chapter No.  

Question

Execution can be completed successfully or it may be stopped due to some error. If some error occurs, execution will be terminated abnormally and all transactions will be ___________

  1. Committed to the database
  2. Rolled back

Answer: 2 Chapter No.  

Question

Many data warehouse project teams waste enormous amounts of time searching in vain for a ____________.

  1. Silver Bullet
  2. Golden Bullet
  3. Suitable Hardware
  4. Compatible Product

Answer: 1 Chapter No.  

Question

People that design and build the data warehouse must be capable of working across the organization at all levels

  1. True
  2. False

Answer: 1 Chapter No.  

Question

The _________ is only a small part in realizing the true business value buried within the mountain of data collected and stored within organizations business systems and operational databases.

  1. Independence on technology
  2. Dependence on technology
  3. None of these

Answer: 2 Chapter No.  

Question

The goal of ideal parallel execution is to completely parallelize those parts of a computation that are not constrained by data dependencies. The smaller the portion of the program that must be executed __________, the greater the scalability of the computation.

  1. In Parallel
  2. Distributed
  3. Sequentially
  4. None of the given

Answer: 3 Chapter No.  

Question

To identify the __________ required we need to perform data profiling

  1. Degree of Transformation
  2. Complexity
  3. Cost
  4. Time

Answer: 1 Chapter No.  

Question

Which of the following is not an "Orr’s Law of Data Quality"?

  1. “Data that is not used cannot be correct!”
  2. “Data quality is a function of its use, not its collection!”
  3. “Data will be no better than its most stringent use!”
  4. “Data duplication can be harmful for the organization!”

Answer: Chapter No.  

Question

Which of the following is not an activity of Data Quality Analysis Project?

  1. “Define”
  2. “Measure”
  3. “Analyze”
  4. “Compression”

Answer: Chapter No.  

Question

The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by retrospective tools typical of __________.

  1. OLTP
  2. OLAP
  3. Decision Support Systems
  4. None of the given

Answer: 3 Chapter No.  

Question

In nested-loop join case, if there are ‘M’ rows in outer table and ‘N’ rows in inner table, time complexity is __________.

  1. O (M log N)
  2. O (log MN)
  3. O (MN)
  4. O (M + N)

Answer: 2 Chapter No.  

Question

In contrast to statistics, data mining is ______ driven.

  1. Assumption
  2. Knowledge
  3. Human
  4. Database

Answer: 1 Chapter No.  

Question

With data mining, the best way to accomplish this is by setting aside some of your data in a vault to isolate it from the mining process; once the mining is complete, the results can be tested against the isolated data to confirm the model's _______.

  1. Validity
  2. Security
  3. Integrity
  4. None of the given

Answer: 1 Chapter No.  

Question

The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by _________ tools typical of decision support systems.

  1. Introspective
  2. Intuitive
  3. Reminiscent
  4. Retrospective

Answer: 4 Chapter No.  

Question

Data mining, the ________ of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses.

  1. Extraction
  2. Insertion
  3. Inclusion
  4. Enclosure

Answer: 1 Chapter No.  

Question

During business hours, most ________ systems should probably not use parallel execution.

  1. OLAP
  2. DSS
  3. Data Mining
  4. OLTP

Answer: Chapter No.  

Question

The goal of ideal parallel execution is to completely parallelize those parts of a computation that are not constrained by data dependencies. The _______ the portion of the program that must be executed in parallel, the greater the scalability of of the computation.

  1. Larger
  2. Smaller
  3. Unambigious
  4. Slighter

Answer: 2 Chapter No.  

Question

Data mining derives its name from the similarities between searching for valuable business information in a large database, for example, finding linked products in gigabytes of store scanner data, and mining a mountain for a _______ of valuable ore.

  1. Furrow
  2. Streak
  3. Trough
  4. Vein

Answer: 2 Chapter No.  

Question

The technique that is used to perform these feats in data mining is called modeling, and this act of model building is something that people have been doing for a long time, certainly before the _______ of computers or data mining technology.

  1. Access
  2. Advent
  3. Ascent
  4. Avowal

Answer: 1 Chapter No.  

Question

The growth of master files and magnetic tapes exploded around the mid- _______.

  1. 1950s
  2. 1960s
  3. 1970s
  4. 1980s

Answer: 2 Chapter No. 1 

Question

__________ is an application of information and data.

  1. Knowledge
  2. Intelligence
  3. Power
  4. Education

Answer: 1 Chapter No. 1 

Question

Naturally Evolving architecture occurred when an organization had a _______ approach to handling the whole process of hardware and software architecture.

  1. Relaxed
  2. Good
  3. Not Relaxed
  4. None of the given

Answer: 1 Chapter No. 1 

Question

Taken jointly, the extract programs or naturally evolving systems formed a spider web, also known as

  1. Distributed Systems Architecture
  2. Legacy Systems Architecture
  3. Online Systems Architecture
  4. Intranet Systems Architecture

Answer: 2 Chapter No. 1 

Question

The need to synchronize data upon update is called

  1. Data Imitation
  2. Data Manipulation
  3. Data Replication
  4. Data Coherency

Answer: 4 Chapter No. 1 

Question

In _________ system, the contents change with time.

  1. OLTP
  2. ATM
  3. DSS
  4. OLAP

Answer: 1 Chapter No. 2 

Question

Ad-hoc access means to run such queries which are known already.

  1. true
  2. false

Answer: 2 Chapter No. 2 

Question

Suppose the amount of data recorded in an organization is doubled every year. This increase is __________.

  1. Linear
  2. Quadratic
  3. Exponential
  4. Logarithmic

Answer: 3 Chapter No. 2 

Question

__________ gives total view of an organization.

  1. OLAP
  2. OLTP
  3. Data Warehouse
  4. Database

Answer: 3 Chapter No. 2 

Question

Relational databases allow you to navigate the data in ____________ that is appropriate using the primary, foreign key structure within the data model.

  1. Only One Direction
  2. Any Direction
  3. Two Direction
  4. None of the given

Answer: 2 Chapter No. 2 

Question

The input to the data warehouse can come from OLTP or transactional system but not from other third party database.

  1. true
  2. false

Answer: 2 Chapter No. 2 

Question

The users of data warehouse are knowledge workers in other words they are _________ in the organization.

  1. DWH Analyst
  2. Decision maker
  3. Database Administrator
  4. Manager

Answer: 2 Chapter No. 2 

Question

B-Tree is used as an index to provide access to records __________

  1. Without scanning the entire table
  2. By scanning the entire meta data
  3. By scanning the entire table
  4. None of the given

Answer: 1 Chapter No. 3 

Question

Data warehousing and on-line analytical processing (OLAP) are _______ elements of decision support system.

  1. Unusual
  2. Essential
  3. Optional
  4. None of the given

Answer: 2 Chapter No. 10 

Question

Data Warehouse provides the best support for analysis while OLAP carries out the _________ task.

  1. Mandatory
  2. Whole
  3. Analysis
  4. Prediction

Answer: 3 Chapter No. 10 

Question

Analytical processing uses __________ , instead of record level access.

  1. multi-level aggregates
  2. Single-level aggregates
  3. Single-level hierarchy
  4. None of the Given

Answer: 1 Chapter No. 10 

Question

In a traditional MIS system, there is an almost linear sequence of queries.

  1. true
  2. false

Answer: 1 Chapter No. 10 

Question

Slice and Dice is changing the view of the data.

  1. true
  2. false

Answer: 2 Chapter No. 11 

Question

The performance in a MOLAP cube comes from the O(1) look-up time for the array data structure.

  1. true
  2. false

Answer: 1 Chapter No. 11 

Question

DOLAP allows download of "cube" structures to a desktop platform with the need for shared relational or cube server.

  1. true
  2. false

Answer: 2 Chapter No. 11 

Question

Multi-dimensional databases (MDDs) typically use ___________ formats to store pre-summarized cube structures.

  1. SQL
  2. proprietary file
  3. Object oriented
  4. Non- proprietary file

Answer: 2 Chapter No. 11 

Question

Virtual cube is used to query two similar cubes by creating a third "virtual" cube by a join between two cubes.

  1. true
  2. false

Answer: 2 Chapter No. 11 

Question

The divide&conquer cube partitioning approach helps alleviate the __________ limitations of MOLAP implementation.

  1. Flexibility
  2. Maintainability
  3. Security
  4. Scalability

Answer: 4 Chapter No. 11 

Question

The goal of ideal parallel execution is to completely parallelize those parts of a computation that are not constrained by data dependencies. The ______ the portion of the program that must be executed sequentially, the greater the scalability of the computation.

  1. Larger
  2. Smaller
  3. Unambiguous
  4. Superior

Answer: 2 Chapter No. 24 

Question

__________, if fits into memory, costs only one disk I/O access to locate a record by given key.

  1. An Inverted Index
  2. A Sparse Index
  3. A Dense Index
  4. None of the given

Answer: 3 Chapter No. 26 

Question

A dense index, if fits into memory, costs only __________ disk I/O access to locate a record by given key.

  1. One
  2. Two
  3. Linear
  4. Quadratic

Answer: 1 Chapter No. 26 

Question

The goal of __________ is to look at as few blocks as possible to find the matching records(s).

  1. Indexing
  2. Partitioning
  3. Joining
  4. None of the given

Answer: 1 Chapter No. 26 

Question

__________, if too big and does not fit into memory, will be expensive when used to find a record by given key.

  1. An Inverted Index
  2. A Sparse Index
  3. A Dense Index
  4. None of the given

Answer: 3 Chapter No. 26 

Question

If every key in the data file is represented in the index file then index is _________.

  1. Dense Index
  2. Sparse Index
  3. Inverted Index
  4. None of the given

Answer: 1 Chapter No. 26 

Question

There are many variants of the traditional nested-loop join. If the index is built as part of the query plan and subsequently dropped, it is called _________.

  1. Naive nested-loop join
  2. Index nested-loop join
  3. Temporary index nested-loop join
  4. None of the given

Answer: 3 Chapter No. 28 

Question

There are many variants of the traditional nested-loop join. If there is an index and that index is exploited, then it is called _________.

  1. Naive nested-loop join
  2. Index nested-loop join
  3. Temporary index nested-loop join
  4. None of the given

Answer: 2 Chapter No. 28 

Question

There are many variants of the traditional nested-loop join. When the entire table is scanned it is called

  1. Index nested-loop join
  2. Naive nested-loop join
  3. Temporary index nested-loop join
  4. None of the given

Answer: 2 Chapter No. 28 

Question

Data mining is a/an __________ approach, where browsing through data using data mining techniques may reveal something that might be of interest to the user as information that was unknown previously.

  1. Non-Exploratory
  2. Exploratory
  3. Computer Science
  4. None of the given

Answer: 2 Chapter No. 29 

Question

Data mining evolve as a mechanism to cater the limitations of ________ systems to deal massive data sets with high dimensionality, new data types, multiple heterogeneous data resources etc.

  1. OLTP
  2. OLAP
  3. DSS
  4. DWH

Answer: 1 Chapter No. 29 

Question

Data mining uses _________ algorithms to discover patterns and regularities in data.

  1. Mathematical
  2. Computational
  3. Statistical
  4. None of the given

Answer: 3 Chapter No. 29 

Question

As opposed to the outcome of classification, estimation deal with __________ valued outcome.

  1. Discrete
  2. Isolated
  3. Continuous
  4. Distinct

Answer: 3 Chapter No. 30 

Question

Classification consists of examining the properties of a newly presented observation and assigning it to a predefined ____________.

  1. Object
  2. Container
  3. Subject
  4. Class

Answer: 4 Chapter No. 30 

Question

__________ is the technique in which existing heterogeneous segments are reshuffled, relocated into homogeneous segments.

  1. Clustering
  2. Aggregation
  3. Segmentation
  4. Partitioning

Answer: 1 Chapter No. 30