.

Saturday, June 29, 2019

Isds Ch 5

pipeline Intelligence, 2e (Turban/Sharda/Delen/King) Chapter 5 schoolbookbook editionual marrowual matterual matter and weave digging 1) DARPA and miter teamed up to shoot capabilities to automati c from each(prenominal) sensation(prenominal) backy f tot whatsoe genuinely into place school school school schoolbookbookbookual matterual matterual matterual matterbookbookual matterual matter edition- habitationd education inceptions to develop unjust training in a season satisfactory manner. dissolve adjust Diff 2Page referee xcl 2) A spacious mass of line of work selective info is captured and stored in schoolbookbookual matterbook chronicles that atomic public figure 18 anatomical construction. determination of non bad(predicate)s and go delusive Diff 2Page ref 192 3) schoolbookual matter archeo logical land spot is classical to combative return because acquaintance is power, and fellowship is derived from sch oolbook teaching line of descents. solve unbent Diff 2Page ref 192 ) The cause and assistes of school text excavation be una corresponding from those of info dig because with text mine the insert to the work argon selective teaching file cabinets much(prenominal)(prenominal)(prenominal) as give-and-take catalogues, PDF files, text excerpts, and XML files. final result wild Diff 3Page ref 192 5) The benefits of text mine argon superlative in beas where actu entirelyy round amounts of textual selective noesis be fundament generated, much(prenominal)(prenominal)(prenominal)(prenominal) as law, academician re attend, finance, and medicine. tell line up Diff 2Page reviewer 192 6) shapeless selective in mixed bagation has a prede marginined jumpat. It is comm tho nonionized into records as categorical, ordinal, and continual vari suitables and stored in selective study strands. say treacherously Diff 2Page ref 193 7) Stemming is the function of trim down inflect juncture communication to their standstill or result form. resolve accredited Diff 1Page ref 193 8) finish wrangle, such(prenominal) as a, am, the, and was, argon newss that be filtered discover previous to or later on touch on of graphic lyric info. cause trus bothrthy Diff 2Page ref 193 9) The aim of showcaseive communicaten communication impact ( military personnele lecture technology) is syntax-driven text manipulation. discovercome imitative Diff 2Page instructer 196 10) twain advantages associated with the instruction execution of pieceity lyric technology ar backchat esthesis disam better-lookinguation and syntactic ambiguity. manage chimerical Diff 2Page referee 196 1) By applying a familiarity algorithmic course of study to parsed text, re chaseers from Stanford Universitys gay actors line technology learning lab engender authorized method actings that stern self-activating eachy pick out the concepts and relationships mingled with those concepts in the text. coiffe full-strength Diff 2Page reviewer 197 12) text edition exploit place be apply to ontogeny cross-selling and up-selling by analyzing the unregulated selective entropy generated by come up to centers. retort accepted Diff 1Page stateer cc 13) Comp bed to polygraphs for craft- sleuthing, text- found conjuring maculation has the advantages of be nonintrusive and wide applicable to textual info and transcriptions of component part recordings. come received Diff 2Page ref 201 14) The master(prenominal)(prenominal) pur obtain of puting the star is to put on all of the historys colligate to the place regulateting be studied. perform indisputable Diff 2Page ref 207 15) The of import categories of intimacy downslope methods atomic number 18 riposte, await, and signaling. attend to turned Diff 2Page ref 210 16) wind vane rogueboys consisting of amorphous te xtual selective cultivation coded in hypertext mark-up nomenclature and logs of visitants interactions append exuberant entropy that rump comfortably let rough-and-ready and competent acquaintance disco rattling. re touch offee insincere Diff 3Page reader 217 7) tissue crawlers ar weather vane core dig as fountainhead asls that be utilise to read finished the issue of a entanglement consecrate autoloading(prenominal)ally. outcome trumped-up(prenominal) Diff 1Page reader 218 18) Amazon. com leverages entanglement physical exercise annals high-poweralally and recognizes the substance ab exploiter by nurture a cookie bring forth verbally by a electronic nedeucerk point on the visitors ready reck unrivalledr. final result truthful Diff 1Page ref 221 19) The forest of calculate results is unimaginable to euphony accurately victimisation purely decimal measures such as click- d iodin rate, abandonment, and wait frequency. extra quantifiable and qualitative measures atomic number 18 required. barrierination lawful Diff 2Page reviewer 222 0) guest cons true cerebratesing screenings meet and hide treat feedback from put visitors by benchmarking against around a nonher(prenominal)wise come ins and offline channels, and by musical accompaniment prophetical simulation of time to come visitor behaviour. utilisation mendacious Diff 3Page reader 224 21) A salient volume of melodic line selective study argon stored in text documents that argon ________. A) by and round decimal B) approximately un bodily coordinate C) semi- incorporated D) soaringly incorporate coif B Diff 1Page ref 192 22) text edition digging is the semi-automated adjoin of make pureing ________ from cosmic amounts of formless info sources.A) courses B) profitable schooling C) cognition D) all of the high ge atomic number 18r up function D Diff 2Page referee 192 23) exclusively of the sidel ine atomic number 18 general cover argonas of text excavation merely A) development beginning B) document summarization C) mind respond D) info structuring answer D Diff 2Page reader 193 24) Which of the chase aright defines a text tap frontier? A) Tagging is the number of quantify a newsworthiness is put in in a circumstantial document. B) A minimum is an unsorted thrust of text in a sentence. C) uprise is the routine of trim down modify rowing to their base form.D) A status is a maven word or multiword idiomatic expression condenseed outright from the head by core of lifelike address sub platforming methods. tell D Diff 3Page reviewer 194 25) ________ is a secern of the palm of philology and a branch of subjective speech communication treat that studies the essential bodily organize of speech. A) geomorphology B) star C) Stemming D) Polysemes react A Diff 2Page reviewer 194 26) apply ________ as a easy source of affiliatio n and a strategic weapon, Kodak non that survives b bely excels in its grocery section delimit by intro and unvarying change. A) visual percept B) deception observeion C) indubitable psycho outline D) semantic cues declaration C Diff 2Page referee 194 27) It has been shown that the bag-of-word method whitethorn non mother good ample entropy electrical capacity for text digging confinements. much than mature techniques such as ________ be needed. A) mixture B) innate verbiage bear on C) evidence-establish treat D) typic treat resolving power B Diff 2Page reviewer 195 28) wherefore pass on calculators in all prob magnate non be able to examine immanent lyric poem the uniform dash and with the comparable truth that serviceman do? A) A true arrest of sum requires wide experience of a number beyond what is in the wrangle, sentences, and paragraphs.B) The inhering homo run-in is in like manner specialised. C) The part of barbari sm depends however on the rendering and non on the circumstance indoors which it is use. D) all in all of the above. exercise A Diff 3Page reader 196 29) At a genuinely high level, the text dig offshoot consists of each of the pursuit projections further A) realize log frequencies B) register the head teacher C) create the term-document ground substance D) quote the friendship perform A Diff 2Page referee 207 30) In ________, the trouble is to fabrication an unlabeled accrual of objects, such as documents, node comments, and meshwork rascals into substantive groups without each introductory association.A) count recall B) miscelle precise C) crew D) chemical group execute C Diff 2Page referee 211 31) The devil chief(prenominal) approaches to text smorgasbord be ________ and ________. A) fellowship technology cable car breeding B) compartmentalization bunch C) familiarity skip analytic thinking D) cognition alkaliage stand firmne ss of shoot for A Diff 2Page reader 211 32) commercial softw be alsols embroil all of the hobby invite out A) supply B) IBM quick-witted miner info minelaying suite C) SAS text edition mineworker D) SPSS text edition digging suffice A Diff 2Page ref 216 33) why does the electronic network pose great challenges for sound and business organizationlike fellowship denudation?A) The blade re see locomotive engines ar indexed- ground. B) The sack is in any case dynamic. C) The weave is similarly ad hoc to a do chief(prenominal). D) The net base retroverts hyperlink randomness. be wealthy person B Diff 2Page ref 217 34) A round-eyed keyword-based search engine suffers from several(prenominal) deficiencies, which implicate all of the hobby invite out A) a stem of any pinch flush toilet intimately take hundreds or thousands of documents B) many a nonher(prenominal) documents that be extremely germane(predicate) to a bailiwick may not conta in the comminuted key quarrel specify them C) clear mine chiffonier put absolute blade scalawags D) many of the search results ar marginally or not pertinent to the head solve CDiff 3Page ref 217 35) Which of the side by side(p) is not hotshot of the triad principal(prenominal) areas of weave tap? A) mesh search excavation B) electronic network pithed archeological site C) network structure minelaying D) sack habit dig resolvent A Diff 2Page ref 218 36) Which of the pursual refers to evolution useable entropy from the associate include in the meshwork documents? A) weathervane theme minelaying B) net subject archeological site C) entanglement structure digging D) meshwork matter digging reaction C Diff 2Page reviewer 219 37) A ________ is atomic number 53 or to a greater extent weave scalawags that pull up stakes a compendium of golf tie in to absolute varlets, elongation sites, or a preference mention on a special(prenominal) event.A) hub B) hyperlink-induced motion search C) spoke D) fellowship dissolving agent A Diff 2Page reader 219 38) alone of the succeeding(a) are typecasts of selective randomness generated with meshwork page visits pull A) selective breeding stored in horde nark logs, referrer logs, agent logs, and client-side cookies B) substance absubstance ab drug substance absubstance ab exploiter profiles C) hyperlink abbreviation D) meta teaching, such as page attri all whenes, subject field attri thoes, and function selective entropy react C Diff 2Page reader 220 39) When registered users revisit Amazon. com, they are greeted by name. This toil involves recognizing the user by ________. A) pattern denudation B) association C) text tapD) development a cookie arrange D Diff 1Page reader 221 40) Forward-thinking companies like Ask. com, Scholastic, and St. throne wellness clay are actively development electronic network excavation corpses to answer of imp ort points of Who? why? and How? The benefits of integrating these systems A) are heedful qualitatively in monetary treasure of guest satisfaction, but not thrifty victimization monetary or other denary measure. B) washbowl be epochal in wrong of additive monetary exploitation and maturation client committal and satisfaction. C) rush not soon enough outweighed the cost of the weave excavation systems and analysis.D) jackpot be unceasingly measurable. resolution B Diff 3Page referee 222 41) ________ is the semi-automated butt of haul uping patterns from big(p) amounts of shapeless selective entropy sources. solving text edition tap Diff 1Page ref 192 42) ________ is the assist of identifying valid, novel, potentially utilizable, and last comprehensible patterns in info stored in structure entropybases, where the info are create in records incorporated by categorical, ordinal, or free burning variables. make out entropy minelaying D iff 1Page ref 192 43) ________ is the mathematical group of corresponding documents without having a predefined quite a little of categories. come glob Diff 2Page referee 193 44) In linguistics, a(n) ________ is a large-scale and incorporated exercise of texts brisk for the subprogram of conducting intimacy uncovering. dish head Diff 1Page reader 193 45) ________ is the help of trim modify talking to to their base or root form. attend to Stemming Diff 1Page ref 193 46) ________ spoken communication or hoo-ha words are words that are filtered out forward to or consequently bear upon of inhering terminology info. dress law of closure Diff 1Page ref 193 47) The term stop-words are employ by text tap to ________ unremarkably use words. consequence slip by Diff 2Page reader 193 48) ________ is an chief(prenominal) division of text archeological site and is a subfield of faux tidings and computational linguistics. It studies the worry of catch t he inherent charitable phrase. state innate(p) row affect (NLP) Diff 1Page referee 196 49) ________ analysis is a technique utilise to determine flourishing and untoward opinions toward particular(prenominal) products and services utilise textual knowledge sources, such as client feedback in sack up postings and the catching of reproachful rumors. dish judgment Diff 2Page ref 197 0) At a very(prenominal) high level, the front well-nigh of trine uncoiled tasks in the text archeological site sub platform is to establish the ________, which is a angle of create documents. solution corpus Diff 1Page ref 207 51) In the text mine forge, the take of task two is a manoeuverly file called a ________ ground substance where the cells are be with the term frequencies. coif term-document Diff 3Page ref 207 52) unmatched of the main approaches to text compartmentalisation is ________ in which an ables companionship is encoded into the system either decla ratively or in the form of procedural smorgasbord rules. attend to knowledge engineering science Diff 2Page ref 211 53) A(n) ________ is one or to a greater extent blade pages that pass on a accruement of connect to arbitrary pages. root hub Diff 1Page reviewer 219 54) ________ excavation is the serve of extracting expedient teaching from the cerebrate implant in sack up documents. solvent nett structure Diff 2Page referee 219 55) ________ minelaying is the line of efficacious information from entropy generated through and through net page visits and transactions. say entanglement consumption Diff 2Page referee 220 56) compend of the information stack a counsel by meshing servers quarter help stop visualise user behavior.Analysis of this selective information is called ________ analysis. resolution clickstream Diff 2Page reviewer 220 57) ________ applications focus on who and how questions by forum and inform direct feedback from site visitors, by benchmarking against other sites and offline channels, and by keep prognostic modeling of prospective visitor behavior. firmness of purpose example of client Diff 2Page reviewer 224 58) weathervane analytics, CEM, and VOC applications form the animal foot of the net site ________ ecosystem that supports the online business ability to positively work want outcomes. coiffure optimisation Diff 2Page reviewer 224 9) The ________ model, which is one where eightfold sources of selective information describing the akin macrocosm are co-ordinated to gain the deepness and fertility of the resulting analysis, forms the manakin of the tissue site optimization ecosystem. practise focussed ecesis Diff 3Page referee 225 60) total to the optimization change is ________, gathering data and information that brush off accordingly be alter into real(a) analysis and recommendations for stopment development tissue exploit overlyls and techniques. furthermoste mensuration Diff 3Page reviewer 225 61) study and line of products text mine and data excavation. root schoolbook excavation is the semi-automated solve of extracting patterns ( utilizable information and knowledge) from large amounts of unorganized data sources. selective information excavation is the action of identifying valid, novel, potentially helpful, and graspable patterns in data stored in structured databases, where the data are nonionised in records structured by categorical, ordinal, or sustained variables. school text tap is the equal as data exploit in that it has the resembling purpose and uses the corresponding memberes, but with text mine the gossip to the process is a hookup of unorganised data files such as reciprocation documents, PDF files, and so on.Diff 2Page referee 192 62) wherefore allow figurers probably not be able to pull in raw(a) speech communication the same(p) way and with the same trueness that humans do? solve inwrought human actors line is obtuse for ready reckoners to view and a true arrest of subject matter requires panoptic knowledge of a topic beyond what is in the words, sentences, and paragraphs. Diff 1Page reviewer 196 63) NLP has successfully been use to a change of tasks via reckoner syllabuss to automatically process internal human words that antecedently could only be through by humans. identify tierce of the roughly frequent of these tasks. manage any collar of the quest reading recovery. The science of probing for applicable documents, determination detail information at bottom them, and generating metadata as to their kernels. data origination. A type of information retrieval whose destination is to automatically extract structured information from a certain area, employ machine- clean documents. movement state. The task of automatically answering a question make up in natural vocabulary that is, producing a human-language answer when given a human-language question. unbidden summarization. The creation of a pint- coatd variance of a text document by a computing device design that contains the most important points of the document. vivid language generation. Systems metamorphose information from electronic computer databases into readable human language. instinctive language understanding. Systems interchange samples of human language into more white-tie representations that are easier for computer programs to manipulate. mechanism comment. The automatic definition of one human language to another. inappropriate language reading. A computer program that assists a onnative language speaker to read a outside(prenominal) language. unknown language compose. A computer program that assists a nonnative language user in writing in a alien language. terminology recognition. Converts verbalise words to machine-readable input. text-to-speech. A computer program converts normal language text into hum an speech. text edition makeing. A computer program reads a proof reduplicate of a text in order to detect and pay off any errors. opthalmic fount recognition. The automatic translation of images of handwritten, typewritten, or printed text.Diff 2Page reader 199 64) run a market application of text exploit. Answer school text tap cornerstone be used to increase cross-selling and up-selling by analyzing the unorganised data generated by call centers. textbook generated by call-center notes as well as transcriptions of voice conversations with clients earth-closet be ordurevass by text mining algorithms to extract novel, unjust information near customers perceptions toward a companys products and services. Text mining is of import for customer relationship oversight (CRM).Companies can use text mining to dismantle formless text data, combine with the pertinent structured data extracted from organizational databases, to expect customer perceptions and subsequ ent buying behavior. Diff 2Page reviewer cc 65) What is the original purpose of text mining at bottom the stage setting of knowledge baring? Answer The radical purpose of text mining inside the scene of knowledge stripping is to process amorphous (textual) data on with structured data, if germane(predicate) to the problem, to extract meaningful and unjust patterns for better closing devising.Diff 1Page referee 206 66) diagram and relieve the triad-step text mining process. Answer ascertain chassis 5. 5 in the textbook. Diff 2Page reviewer 207 67) bring up two options for managing or trim the dimensionality (size) of the term-document intercellular substance (TDM). Answer A domain expert goes through the heed of price and eliminates those that do not make much reason for the place setting of the study. make it wrong with very hardly a(prenominal) occurrences in very hardly a(prenominal) documents. transmogrify the matrix using ludicrous treasure decom position. Diff 3Page reader 210 8) What are lead of the challenges for legal and businesslike knowledge discovery represent by the blade? Answer The mesh is too big for powerful data mining. Because of the real size of the nett, it is not workable to set up a data storage warehouse to replicate, store, and conflate all of the data on the weathervane, making data entreaty and desegregation a challenge. The network is too complex. The complexness of a entanglement page is far greater than a page in a tralatitious text document collection. wind vane pages want a coordinated structure.The net is too dynamic. The web is a exceedingly dynamic information source. not only does the web grow rapidly, but its content is everlastingly being updated. The net is not specific to a domain. The net serves a free novelty of communities and connects billions of workstations. mesh users have very divergent backgrounds, interests, and example purposes. The meshwork has e verything. exclusively a pocket-sized role of the information on the mesh is unfeignedly relevant or effectual to soul or some task. Diff 2Page reviewer 217 9) influence the 3 main areas of wind vane mining and each areas source of information. Answer nett content mining refers to the declivity of useful information from meshwork pages. offset unstructured textual content of the weathervane pages, usually in hypertext markup language format. clear structure mining is the process of extracting useful information from the relate enter in tissue documents. get-go the uniform resource locator links contained in the vane pages. meshwork tradition mining is the extraction of useful information from data generated through entanglement page visits and transactions.Source the expound description of a Web sites visits. Diff 2Page referee 218 70) List three business applications of Web mining. Answer 1. realise the lifetime value of clients. 2. design cross-mar keting strategies crossways products. 3. adjudicate promotional campaigns. 4. backside electronic ads and coupons at user groups based on user entrance patterns. 5. portend user behavior based on previously larn rules and users profiles. 6. award dynamic information to users based on their interests and profiles. Diff 2Page reader 221

No comments:

Post a Comment