Found 6702 Articles for Database

What are the Processes of Data Warehouse?

Ginni
Updated on 09-Feb-2022 12:56:54

201 Views

Data staging is a major process that includes the following subprocesses which are as follows −Extracting − The extract step is the first phase of getting information into the data warehouse environment. Extracting defines reading and learning the source data, and copying the elements that are required to the data staging area for more work.Transforming − Because the data is extracted into the data staging area, there are several possible transformation processes, are as follows −It can be cleaning the data by correcting misspellings, resolving domain conflicts (including a city name that is inconsistent with a postal code), dealing with ... Read More

What are the elements of a data warehouse system?

Ginni
Updated on 09-Feb-2022 07:28:17

654 Views

There are various elements of a data warehouse system which are as follows −Source System − An operational system of data whose service it is to capture the transactions of the business. A source system is known as a “legacy system” in a mainframe environment.The features of the source system are uptime and availability. Queries opposite to source systems are definite, “account-based” queries that are elements of the normal transaction flow and firmly restricted in their demands on the legacy system.Data Staging Area − A storage area and group of processes that simple, transform, combine, de-duplicate, household, archive, and produce ... Read More

Floyd's triangle in PL/SQL

sudhir sharma
Updated on 01-Feb-2022 10:59:10

427 Views

PL/SQL is a combination of SQL along with the procedural features of programming languagesFLOYD’s triangle − it is a triangle formed by natural numbers. It is the triangle formed by filling numbers in rows starting from 1 at the top-left corner. It is a right-angled triangle i.e. the count of numbers in each row is the same as the row number.In this problem, we are given a natural number N. Our task is to create Floyd’s triangle in PL/SQL.Let’s take an example to understand the problemInput: 16 Output: 1 2 3 4 5 6 7 8 9 10 11 12 ... Read More

Finding sum of first n natural numbers in PL/SQL

sudhir sharma
Updated on 01-Feb-2022 10:26:35

7K+ Views

In this problem, we are given a number N. Our task is to finding sum of first n natural numbers in PL/SQL.PL/SQL is a combination of SQL along with the procedural features of programming languages.PL/SQL has the following features −PL/SQL is tightly integrated with SQL.It offers extensive error checking.It offers numerous data types.It offers a variety of programming structures.It supports structured programming through functions and procedures.It supports object-oriented programming.It supports the development of web applications and server pages.PL/SQL has the following advantages −SQL is the standard database language and PL/SQL is strongly integrated with SQL. PL/SQL supports both static and ... Read More

Find the area and perimeter of right triangle in PL/SQL

sudhir sharma
Updated on 27-Jan-2022 08:57:10

658 Views

In this problem, we are given three values: base, height and hypotenuse of a right triangle. Our task is to find the area and perimeter of the right triangle in PL/SQL.PL/SQL is a combination of SQL along with the procedural features of programming languagesLet's take an example to understand the problem, Input : height = 4, base = 3, hypotenuse = 5 Output : area = 6, perimeter = 12Explanation −1 + 22 + 333 + 4444 = 4800 Solution ApproachA simple approach to solve the problem is using the formula for the area and perimeter of the triangle.Area = ... Read More

What are the trends in data mining?

Ginni
Updated on 30-Nov-2021 10:38:22

545 Views

The trends in data mining are as follows −Application exploration − Early data mining applications targeted generally on helping businesses gain a competitive edge. The exploration of data mining for businesses continues to expand as e-commerce and e-marketing have become mainstream components of the retail market.Data mining is increasingly used for the exploration of applications in several areas, including financial analysis, telecommunications, biomedicine, and science. Emerging software areas contain data mining for counterterrorism (including and beyond intrusion detection) and mobile (wireless) data mining. As generic data mining systems can have limitations in dealing with application-specific issues, it can view a ... Read More

What are the features of data mining?

Ginni
Updated on 30-Nov-2021 10:33:46

3K+ Views

There are various features of data mining that are as follows −Data types − Most data mining systems that are accessible in the industry handle formatted, record-based, relational-like data with statistical, categorical, and symbolic attributes. The data can be in the form of ASCII text, relational database data, or data warehouse data. It is essential to test what exact format(s) each system it is treating can handle.Some types of data or applications can require specialized algorithms to search for patterns, and so their requirements cannot be managed by off-the-shelf, generic data mining systems. Rather than, specialized data mining systems can ... Read More

Which of the following areas data mining technology can be applied?

Ginni
Updated on 30-Nov-2021 10:31:25

107 Views

The following are areas in which data mining technology can be used or created for intrusion detection which are as follows −Development of data mining algorithms for intrusion detection − Data mining algorithms can be used for misuse detection and anomaly detection. In misuse detection, training information is labeled as either “normal” or “intrusion.” A classifier can then be changed to detect known intrusions.There is multiple research in this area that has contained the application of classification algorithms, association rule mining, and cost-sensitive modeling. Anomaly detection constructs models of normal behavior and automatically detects significant deviations from it and supervised ... Read More

How can intrusion be detected?

Ginni
Updated on 30-Nov-2021 10:25:50

92 Views

The security of our computer systems and information is at constant risk. The extensive growth of the web and increasing accessibility of tools and tricks for intruding and attacking networks have prompted intrusion detection to become an important element of network administration. An intrusion can be represented as any set of events that threaten the integrity, confidentiality, or availability of a network resource (including user accounts, file systems, system kernels, etc).Some commercial intrusion detection systems are limiting and do not support a whole solution. Such systems generally employ misuse detection approaches. Misuse detection searches for designs of program or user ... Read More

What are the aspects of data mining for Biological Data Analysis?

Ginni
Updated on 30-Nov-2021 10:15:21

1K+ Views

There are the following aspects of data mining for biological data analysis which are as follows −Semantic integration of heterogeneous, distributed genomic and proteomic databases − Genomic and proteomic data sets are generated at multiple labs and by various methods. They are distributed, heterogeneous, and of a wide variety. The semantic integration of such data is important to the cross-site analysis of biological records.Furthermore, it is essential to find correct linkages among research literature and their related biological entities. Such integration and linkage analysis can support the systematic and coordinated analysis of genome and biological records. This has promoted the ... Read More

Advertisements