1. Trang chủ
  2. » Giáo Dục - Đào Tạo

ôn tập tacn kma

8 2 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Ôn Tập Tacn Kma
Định dạng
Số trang 8
Dung lượng 37,39 KB

Nội dung

Mining tools can work with all types of data storage, from large data warchouses to smaller desktop databases to flat files.. What types of datastorage can be used in data mining?all typ

Trang 1

Câu 1: How many major portions of the process are there in the lifecycle of mobile

development? What are they?

There are 5 major portions of the process: Inception, Design, Development, Stabilization, Deployment

Câu 2: What are the differences between RAM and ROM?

ROM ( Read only memory ): is a type of storage medium that permanently stores data on PCs and other electronic devices RAM ( Random access memory ): is a form of computer data storage that stores data and machine code currently being used

Câu 3: What is information security and what is cybersecurity?

Cyber security is the activity of securing computer systems, networks, devices, and applications from cyber attacks of any kind Information security (commonly known as InfoSec) refers to the procedures and practices that corporations use to protect their data

Câu 4: What are the advantages of the computer mouse over the keyboard?

It is easier to use and handle a mouse as compared to the keyboard It is quicker to work with a mouse It takes less time to learn how to use a mouse Mouse requires less space Mouse can be used to draw graphics Mouse is light to carry Therefore it is portable

Câu 5: What is the motherboard? What components are included in the motherboard?

The motherboard is the main printed ciruit board found in computers and other expandable systems The mother board includes many components such as: central processing unit (CPU), random access memory (RAM), firmware, and internal and external buses

Câu 6: What is a source program? What is an application program?

A source programe is the original high-level language program which has to be converted

to machine code before it may be executed Application program is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users

Câu 7: How do computer viruses spread in the early time and today? How many types of

computer virus should you be aware of? What are they?

In the early, pre-internet days, viruses often spread from computer to computer via infected floppy disks Today, viruses spread via the internet They are: Resident vs non-resident viruses, Macro viruses, Boot sector viruses, Email viruses, Polymorphic viruses

5 What are the 3 basic steps in the data process?

Trang 2

A accept data – process data – give the result

B process data – provide output – give the result

C accept data – sava data – process data

D A & B

4 When switched off, the information in the ……….is lost

A RAM

B ROM

C CD Disk

D All of them

5 Why is graphical user interface successful?

A All are correct

B It is easy to use

C It is fast

D It helps users more creative

6 Power of a computer depends on speed and ……….

A processor

B monitor

C motherboard

D capacity

7 The data flows in ……… Round the ring topology

A one direction

B two direction

C some direction

D no direction

8 HTML is ………

A software

B Internet service provider

C A & C

9 A specialist computer which provides a service to a network is ………

A internet service provider

B computer website

C server

D mainframe

10 The distribution of devices and circuits in a network is …………

A topology

B configuration

C gateway

D transceiver

11 PIP in video conferencing means………

A people in people

Trang 3

B picture in picture

C people in picture

D picture in people

12 What has the same meaning as monitor?

A Visual display unit

B Screen

C A & B

D None

13 How can computer become miraculous?

A Due to CPU

B Due to main memory

C Due to hardware and software

D Due to peripherals

14 ……… are not used for permanent storage.

A Rams

B Roms

C Disk drivers

D Hard disks

15 What are the results produced by a computer?

A Input

B Devices

C monitor

D information

16 Information is the form of data is called………

A hardware

B software

C data

D peripheral

17 What is arithmetic logic unit (ALU)?

A Examines instructions and active other PC’s components

B Store and control information

C Performs mathematic calculators

D Convert programming language into machine code

18 How can processor differ with one another?

A The quality of output

B The ammount of data

C The capacity of RAM

D All are correct

19 Before the data is processed by the microprocessor, it is loaded into……….

A RAM

Trang 4

B ROM

C storage devices

D All are correct

III Reading the passages

Reading 1:

The most popular tool used when mining is artificial intellgence (AI) AI technologies try

to work the way the human brain works, by making intelligent guesses, learning by example, and using deductive reasoning Some of the more – popular AI methods userd

in data mining include neural network, clustering, and decision trees

Neural networks look at the rules of using data, which are based on the connections found

or on a sample set of data As a result, the software continually analyses value and compares it to the other factors, and it compares these factors repeatedly until it finds patterns emerging These patterns are known as rules The software then looks for other patterns based on these rules or sends out an alarm when a trigger value is hit

Clustering divides data into groups based on similar features data ranges, clusters are used when data isn’t labelled in a way that is favorable to mining For instance, an insurance company that wants to find instances of fraud wouldn’t have its records labelled as fraudulent or not fraudulent But after analyzing patterns within clusters, the mining software can start to figure our rules that point to which claims are likely to the false

Decision trees, like clusters, separate the data into subsets and then analyze the subsets to divide them into further subsets The final subsets are then small enough that the mining process can find interesting patterns and relationships within the data

Once the data to be mined is identified, it should be cleansed, cleansing data frees it from duplicate information and erroneous data Next, the data should be stored in a uniform format within relevant categories of fields Mining tools can work with all types of data storage, from large data warchouses to smaller desktop databases to flat files Data warehouses and data marts are storage methods that involve archingving large amounts of data in a way that makes it easy to access when necessary When the process is complete, the mining software generates a report An analyst goes over the report to see if futher work needs to be done, such as refilling parameters, using other data analysis tools to examine the data, or even scrapping the data if it’s unusable If no further work is required, the report proceeds to the decision makers for appropriate action The power of data mining is being used for many purposes, such as analyzing Supreme Court decisions, discovering patterns in health care, pulling stories about competitors from newswires, resolving bottlenecks in production processes, and analyzing sequences in the human genetic makeup There really is no limit to the type of business or area of study data mining can be beneficial

Answer the questions:

1 What tool is often used in data mining?

Trang 5

popular AI methods such as: neural network, clustering, and decision trees

2 What AI method is used for the following processes?

a Separate data into subsets and then analyze the subsets to devide them into further

subsets for a member of levels

b Continually analyze and compare data until patterns emerge.

c Divide data into groups based on similar features or limited data ranges

Decision trees – Neural networks – Clustering

3 What term is used for the patterns found by neural networks?

rules

4 When are clusters used in data mining?

clusters are used when data isn’t labelled in a way that is favorable to mining

5 What types of datastorage can be used in data mining?

all types of data storage, from large data warchouses to smaller desktop databases to flat files

6 What can an analyst do to improve the data mining results?

refilling parameters, using other data analysis tools to examine the data, or even scrapping the data if it’s unusable

7 Name some of the ways in which data mining is currently used

analyzing Supreme Court decisions, discovering patterns in health care, pulling stories about competitors from newswires, resolving bottlenecks in production processes, and analyzing sequences in the human genetic makeup

8 How many AI methods are used in data mining? What are they?

3 : neural network, clustering, and decision trees

Reading 2:

Large computer systems, or mainframes, as they are referred to in the field of computer science, are those computer systems found in computer installations processing immense amounts of data These powerful computers make use of very high – speed main memories into which data and programes to be dealt with are transferred for rapid access These powerful machines have a larger repertoire of more complex instructions which can be executed more quickly Whereas smaller computer may take serveral steps to perform a particular operation, a larger machine may accomplish the same thing with one instruction

These computers can be of two types: digital or analog, The digital computer or general – purpose computer as it is often known, makes up about 90 percent of the large computers now in use It gets its name because the data that are presented to it are made up of code consisting of digits single character numbers The digital computer is like a gigantie eash register in that it can do calculations in steps, one after another at tremendous speed and with great accuracy Digital computer programming is by far the most commonly used in

Trang 6

electronic data processing for business or statistical purposes The analog computer works something like a car speedometer, in that it continuously works out calculations It

í used essentially for problems involving measurements It can simulate, or imitate different measurements by electronic means Both of these computer types the digital and the analog – are made up of electronic components that may require a large room to accommodate them At present, the digital computer is capable of doing anything the analog once did Moreover, it is easier to program and cheaper to operate A new type of scientific computer systems called the hybrid computer has now been produced that combines the two types into one Really powerful computers continue to be bulky and require special provision of their housing, refrigeration systems, air filtration and power suppliers This is because much more space is taken up by the input output devices the magnetic tape and disk unit and other peripheral equipment than by the electronic components that do not make up the bulk of the machine in powerful installation The power consumption of these machines is also quite high, not to mention the price that runs into hundreds of thousand of dollars The future will bring great developments in the mechanical devices associated with computer systems For a long time these have been the weak link, from the point of view of both effciency and reliability

Decide if the following sentences are True, False or No Information

9 A mainframe is the type of computer that can sit on top of a desk.

A True

B False

C No Information

10 Digital computers are used more than analog computers.

A True

B False

C No Information

11 The analog computer is far smaller than a digital computer and therefore occupies

very little space

A True

B False

C No Information

12 The hybrid computer is a combination of both the digital and the analog

computer

A True

B False

C No Information

13 The analog computer does its calculations one step at a time.

A True

B False

Trang 7

C No Information

14 The digital computer continuously works out calculations

A True

B False

C No Information

15 Mainframes technology has reached the end of the road No further development is

needed

A True

B False

C No Information

IV Translation: Translate into Vietnamese.

People prefer open source software to proprietary software for a number of reasons, including:

Control: Many people prefer open source software because they have more control over that kind of software They can examine the code to make sure it’s not doing anything they don’t want to do, and they can change parts of it they don’t like Users who aren’t programmers also benefit from open source software, because they can use this software for any purpose wish – not merely the way somone else thinks they should

Training: Other people like open source software because it helps them become better programmers Because open source code is publicly accessible, students can easily study

it as they learn to make better sofrware Students can also share their work with others, inviting comment and critique, as they develop their skills When people discover mistakes in programe source code, they can share those mistakes with others to help them avoid making those same mistakes themselves

Security: Some people prefer open source software because they consider it more secure and stable than proprietary software Because anyone can view and modify open source software, someone might spot and correct errors or omissions that a program’s original authors might have missed And because so many programmers can work on a piece of open source software without asking for permission from original authors, they can fix, update, and upgrade open source software more quickly than they can proprietary software

Stability: Many users prefer open source software to proproetary software for important, long – term projects Because programmers publicly distribute the source code for open source software, users relying on that software for critical taks can be sure their tools won’t disappear or fall into disrepair if their original creators stop working on them Additionally, open source software tends to both incorporate and operate according to open standards

Trang 8

Mọi người thích phần mềm nguồn mở hơn phần mềm độc quyền vì một số lý do, bao gồm:

Kiểm soát: Nhiều người thích phần mềm nguồn mở hơn vì họ có nhiều quyền kiểm soát hơn đối với loại phần mềm đó Họ có thể kiểm tra mã để đảm bảo mã không làm bất cứ điều gì họ không muốn làm và họ có thể thay đổi các phần mà họ không thích Người dùng không phải là lập trình viên cũng được hưởng lợi từ phần mềm nguồn mở, bởi vì họ

có thể sử dụng phần mềm này cho bất kỳ mục đích nào mong muốn – không chỉ theo cách mà người khác nghĩ rằng họ nên làm

Đào tạo: Những người khác thích phần mềm nguồn mở vì nó giúp họ trở thành những lập trình viên giỏi hơn Vì mã nguồn mở có thể truy cập công khai nên sinh viên có thể dễ dàng nghiên cứu nó khi họ học cách tạo ra phần mềm tốt hơn Học sinh cũng có thể chia

sẻ công việc của mình với những người khác, mời bình luận và phê bình, khi họ phát triển kỹ năng của mình Khi mọi người phát hiện ra những sai lầm trong mã nguồn chương trình, họ có thể chia sẻ những sai lầm đó với những người khác để giúp họ tránh mắc phải những sai lầm tương tự

Bảo mật: Một số người thích phần mềm mã nguồn mở hơn vì họ cho rằng nó an toàn và

ổn định hơn phần mềm độc quyền Bởi vì bất kỳ ai cũng có thể xem và sửa đổi phần mềm

mã nguồn mở, nên ai đó có thể phát hiện và sửa các lỗi hoặc thiếu sót mà các tác giả ban đầu của chương trình có thể đã bỏ sót Và bởi vì rất nhiều lập trình viên có thể làm việc trên một phần mềm nguồn mở mà không cần xin phép tác giả gốc, nên họ có thể sửa chữa, cập nhật và nâng cấp phần mềm nguồn mở nhanh hơn so với phần mềm sở hữu độc quyền

Tính ổn định: Nhiều người dùng thích phần mềm mã nguồn mở hơn phần mềm độc quyền cho các dự án dài hạn, quan trọng Bởi vì các lập trình viên phân phối công khai

mã nguồn cho phần mềm nguồn mở, người dùng dựa vào phần mềm đó để thực hiện các nhiệm vụ quan trọng có thể chắc chắn rằng công cụ của họ sẽ không biến mất hoặc rơi vào tình trạng hư hỏng nếu người tạo ban đầu của họ ngừng làm việc với chúng Ngoài

ra, phần mềm nguồn mở có xu hướng kết hợp và vận hành theo các tiêu chuẩn mở

Ngày đăng: 20/04/2024, 23:15

w