a.
Explanation of Solution
Given: The following statement:
Based on the financial as well as demographic data, decide whether a loan should be issued to an applicant or not.
To find: Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. To issue a loan, an applicant is already registered in their
b.
Explanation of Solution
Given: The following statement:
Based on the buying patterns in prior transactions, make recommendations to the customers regarding additional items to buy.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. The online bookstore recommends various types of books to the customers which will not provide any possible outcome whether the recommendation was followed or not.
c.
Explanation of Solution
Given: The following statement:
Recognize the risk of data packet in network based on comparison to the other packets whose status is well-known.
To find: Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. The network data packet can easily be recognized as dangerous (hacker attack, virus) or safe if the status of other packets is known.
d.
Explanation of Solution
Given: The following statement:
Identification of similar customer segments.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. In this, the dependency of an outcome is not known. To identify the segment, unsupervised learning is used so that it can easily be utilized and classify the new customers and its segments with the help of supervised learning.
e.
Explanation of Solution
Given: The following statement:
To forecast whether a company might go bankrupt on the basis of financial data from similar bankrupt and non-bankrupt companies.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning as both the companies are comparing the financial data of both bankrupt and nonbankrupt firms, and the status of similar companies is known.
f.
Explanation of Solution
Given: The following statement:
Predict the recovery time of an aircraft depending on a trouble ticket.
Â
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. It analyzes both the historical repairs and actual repair concerning which part is having a similar repair.
g.
Explanation of Solution
Given: The following statement:
The automated mail sorting by scanning the zip code.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. In scanning the zip code, it is likely to have the knowledge regarding whether the sorting was correct or not.
h.
Explanation of Solution
Given: The following statement:
Generate the personalized discount coupons based on the products that have been purchased recently and previously on the grocery store.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. In this, the purchase may vary in the grocery store where the future prediction of purchase is not cleared as compared to the previous purchases.
Want to see more full solutions like this?
Chapter 2 Solutions
Data Mining for Business Analytics: Concepts, Techniques, and Applications with XLMiner
- Does the process of authentication have a special purpose? Consider both the benefits and the drawbacks of the different authentication methods.arrow_forwardThe term "data leakage" refers to the following: What caused it to occur? How and by whom was this accomplished? How can confidential data be protected and detected?arrow_forwardIn what particular ways can authentication serve a function, both now and in the future? What are the benefits and drawbacks associated with the various authentication techniques that are available?arrow_forward
- Is authentication needed in any unusual situations? When comparing authentication methods, which ones offer the biggest upsides and downsides?arrow_forwardIn what ways does authentication serve a purpose? Do we have the ability to examine and contrast the benefits and drawbacks of various forms of authentication?arrow_forwardIs authentication needed in any unusual situations? Weighing the pros and cons, which authentication methods stand out?arrow_forward
- Computer Science Please use your own words Why is Identity Theft so disastrous? Who does it affect? Have you ever been a victim or do you know someone who was a victim of ID theft? Did they ever recover their Identity? What did they do to recover whatever was lost? How might you prevent and/or mitigate it?arrow_forwardIs encryption of the connection and data from end to end possible? What is the advantage? Describe a scenario in which all encryption methods would be beneficial.arrow_forwardTo what extent may the word "phishing" be defined?arrow_forward
- What are "the objectives of authentication"? Before choosing a system, consider its pros and cons.arrow_forwarddesign a mechanism for securing Hospital’s records with the help of encryptionarrow_forwardTo what extent are you familiar with the concept of "data leaking"? Can you explain what took place? Who came to this conclusion? how can private data be safeguarded and monitored?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education