Chandra G. answered 02/19/21
Software Engineering, C++, C, Python, Java, SQL, Data Structures, O S
- Automation - such as auto-scheduled processes that start whenever the event occurs. An event occurs when conditions leading to the event become true. Example: WHEN a record with attribute A.value == RARE_VALUE and another record with attribute B.value = COMMON_VALUE happen, then event E1 has occurred. Event E1 initiates Activity A1. Separately, when A1 has run x number of times, Process P1 starts as a regularly scheduled process.
- Qs 2-- 6 : Temporal Databases : I'm not interested in them at the present time;
Q 7: Data cleaning -
First step in the Knowledge Discovery Process is Data cleaning in which noise and inconsistent data is removed.
2 Data Integration -
Second step is Data Integration in which multiple data sources are combined.
3 Data Selection -
Next step is Data Selection in which data relevant to the analysis task are retrieved from the database.
4 Data Transformation -
In Data Transformation, data are transformed into forms appropriate for mining by performing summary or aggregation operations.
5 Data Mining -
In Data Mining, data mining methods (algorithms) are applied in order to extract data patterns.
6 Pattern Evaluation -
In Pattern Evaluation, data patterns are identified based on some interesting measures.
7 Knowledge Presentation -
In Knowledge Presentation, knowledge is represented to user using many knowledge representation techniques.
Chandra G.
31: Encryption of data has the biggest problem of affecting performance of queries02/19/21
Chandra G.
32 : To understand public key infrastructure scheme, study SSH and RSH encryption algorithms02/19/21
Chandra G.
34: How can privacy of data be preserved in Databases. - AH. This is the highest priority item, it supersedes temporal databases, data mining, data warehouses. Security of data, preventing data breaches - especially when very green technologists, with a few months of Bootcamp training or a handful of certifications, supplemented and supported training (such as spoonfeeding, tutoring, obtaining degrees and shuffling through education systems and programs WITHOUT understanding concepts) are taking up jobs by passing hiring process interview questions expertly, but not having sufficient, depth and experience and knowledge of the impact of working with large scale databases. All in all, cloud and databases are are big area of secure databases technologies, of automations and of preventing slack administration02/19/21
Chandra G.
22: Discuss what is meant by each of the following terms: database authorization, access control, data encryption, privileged (system) account, database audit, audit trail. Read the RADIUS AAA protocol to understand why there are 3 steps - authentication, authorization and (access/accounting) in databases AND in networks02/19/21