The ________ data mining technique derives rules from real-world case examples.

A. Rule discover

B. Signal processing

C. Neural nets

D. Case-based reasoning

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. The first microprocessor built by the Intel corporation was called
  2. A set of information that defines the status of resources allocated to a process is
  3. The list of coded instructions is called
  4. Machine language is
  5. Which of the following is used as a primary storage device?
  6. What type of virus uses computer hosts to reproduce itself?
  7. A stand-alone system which produces one page of printed output at a time is
  8. What is a compiler?
  9. The metal disks, which are permanently housed in, sealed and contamination free containers are called
  10. To prevent the loss of data during power failures, use a(n):
  11. A byte consists of
  12. When was vacuum tube invented?
  13. Which of the following memories must be refreshed many times per second?
  14. IBM 1401 is
  15. Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate
  16. Memory is made up of
  17. Slide Rules was invented in
  18. The common name for the crime of stealing passwords is:
  19. Which of the following is the most powerful computers?
  20. The 2's compliment of a binary no. is obtained by adding________to its 1's compliment.
  21. ________ is the ability of a device to "jump" directly to the requested data
  22. Floppy disks typically in diameter
  23. 1 Byte =?
  24. What is an interpreter?
  25. Excessive parallel processing is related to
  26. Which unit converts computer data into human readable form?
  27. CD-ROM is a
  28. Which of the following is the first computer to use Stored Program Concept?
  29. The computer code for the interchange of information between terminals is
  30. A device that connects to a network without the use of cables is said to be-