a.
Explanation of Solution
Given: The following statement:
Based on the financial as well as demographic data, decide whether a loan should be issued to an applicant or not.
To find: Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. To issue a loan, an applicant is already registered in their
b.
Explanation of Solution
Given: The following statement:
Based on the buying patterns in prior transactions, make recommendations to the customers regarding additional items to buy.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. The online bookstore recommends various types of books to the customers which will not provide any possible outcome whether the recommendation was followed or not.
c.
Explanation of Solution
Given: The following statement:
Recognize the risk of data packet in network based on comparison to the other packets whose status is well-known.
To find: Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. The network data packet can easily be recognized as dangerous (hacker attack, virus) or safe if the status of other packets is known.
d.
Explanation of Solution
Given: The following statement:
Identification of similar customer segments.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. In this, the dependency of an outcome is not known. To identify the segment, unsupervised learning is used so that it can easily be utilized and classify the new customers and its segments with the help of supervised learning.
e.
Explanation of Solution
Given: The following statement:
To forecast whether a company might go bankrupt on the basis of financial data from similar bankrupt and non-bankrupt companies.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning as both the companies are comparing the financial data of both bankrupt and nonbankrupt firms, and the status of similar companies is known.
f.
Explanation of Solution
Given: The following statement:
Predict the recovery time of an aircraft depending on a trouble ticket.
Â
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. It analyzes both the historical repairs and actual repair concerning which part is having a similar repair.
g.
Explanation of Solution
Given: The following statement:
The automated mail sorting by scanning the zip code.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is supervised learning. In scanning the zip code, it is likely to have the knowledge regarding whether the sorting was correct or not.
h.
Explanation of Solution
Given: The following statement:
Generate the personalized discount coupons based on the products that have been purchased recently and previously on the grocery store.
To find:Â Whether the data mining techniques to be used belong to supervised or unsupervised learning.
Solution:
The given statement acknowledges that it is unsupervised learning. In this, the purchase may vary in the grocery store where the future prediction of purchase is not cleared as compared to the previous purchases.
Want to see more full solutions like this?
Chapter 2 Solutions
Data Mining for Business Analytics: Concepts, Techniques, and Applications with XLMiner
- Analyze any of the two relevant machine learning techniques for the given problem “Identifying Spam”, and then suggest which will be the best suitable for the aforementioned problem. Also put reason for the suggested one.arrow_forwardConcoct a make-believe scenario involving the administration of user accounts. Establish a wide variety of means of checking one's identity. Do people seem to be using passwords less and less?arrow_forwarda) How does the P-Boxes improved security in the block encryption algorithm? b) What will happen if a block encryption algorithm were to use only S-Boxes and no P-Boxes?arrow_forward
- 19 To eliminate fraud and abuse caused by messages being altered, which two separate algorithms are applied to a message? A. Hash algorithm and Digital Envelope B. Hash algorithms and Digital Signatures C. Digital Envelop and Digital Signature D. digital signature and Time Stamparrow_forwardb.What is the maximum amount of time that it would take a computer that can test keys per second to carry out a brute-force attack on a file encrypted using 256-bit AES? Give your answer in seconds and years, using scientific notation, correct to 2 significant figures. You may assume a year is seconds and you may use a calculator to help work out the answer. Show all your working clearly in a way that will help your tutor understand how you arrived at your answer.arrow_forward1. Assume an 8-letter password from the 95 printable ASCII characters is used in acomputer system.a. If passwords are chosen by the users, what is the total password population? What isthe probability of an adversary guessing a password correctly?b. If passwords are generated automatically by a pseudorandom number generator,what is the total password population? What is the probability of an adversary guessinga password correctly? 2.Explain why, for the biometric authentication protocols, the biometric capture device isauthenticated in the case of static biometric but not authenticated for a dynamic biometric.arrow_forward
- We may evaluate the two modes of cypher encryption, cypher block chaining and cypher feedback mode, by looking at how many encryption operations are needed to transport a large file.To what extent is the more efficient option preferred?arrow_forwardIs encryption of the connection and data from end to end possible? What is the advantage? Describe a scenario in which all encryption methods would be beneficial.arrow_forwardIs there a difference between logical caching and physical caching, and if so, what does that difference consist of? Also, if there is a difference between the two, what precisely is that difference?arrow_forward
- To what extent do you agree with the following statements on the significance of data protection during transmission and storage: Which of these methods produces the greatest outcomes in terms of protecting sensitive information and verifying the identity of users?arrow_forwardFind out if or not there is any testing of penetration. In the realm of the protection of sensitive data?arrow_forwardA number of companies have been invited to prepare and submit a tender for a contract using e-mail. To provide a high level of privacy and to authenticate each tender and ensure nonrepudiation, each company has been asked to encrypt their tender using PGP. By means of a block schematic diagram, assuming no compression is to be used, show the various steps that are followed to carry out: the authentication and nonrepudiation steps, and the encryption and decryption of the tender contents.arrow_forward
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,