Deck 9: Data Mining and Analyzing Intelligence

Full screen (f)
exit full mode
Question
Data mining is sometimes referred to as data discovery
Use Space or
up arrow
down arrow
to flip the card.
Question
Data mining is the process of analyzing data from different perspectives and summarizing them into useful information.
Question
Data mining tells us about very small and simple data sets.
Question
Information Technology has to do with the use of computers to load software
Question
Information technology, over the past two decades, been evolving into separate transaction and analytical systems
Question
A transaction processing system (TPS) supports the processing of a company's or organization's business transactions
Question
TPSs keep an organization running smoothly by only automating the processing of payroll checks.
Question
Data mining systematically searches information to identify relationships and patterns
Question
Several types of analytical software systems are currently available for use in the criminal justice system
Question
A machine learning method called "Series Finder" was designed to assist the police in discovering crime series
Question
An algorithm includes a finite number of steps to solve any given problem
Question
The algorithm used in Series Finder tries to identify the blood type of the offender.
Question
The Computer-Aided Tracking Characterization of Homicides, called CATCH, and CATCHRAPE are software applications that analyze homicide data and sexual assault data
Question
There are four types of relationships sought by analysts; these include Entity extractions, Clusters, Associations and Sequential patterns
Question
The goal of data mining and association rules in crime data analysis is to identify and visualize associations among criminal networks
Question
Data mining is sometimes also called data discovery or ______________.

A) Knowledge discovery
B) Encyclopedia knowledge
C) Book learning
D) Sequence building
Question
Data mining is the process of analyzing data from different perspectives and summarizing that into ______________.

A) Miscellaneous data
B) Useless information
C) Useful information
D) Information for the media
Question
For criminal justice, Information Technology is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange _______.

A) All forms of electronic data
B) Secret information
C) Underground details of crimes
D) Information useful to big businesses
Question
A transaction processing system (TPS) supports the processing of a company's or organization's ______________.

A) Stock tips
B) Email messages
C) Donations
D) Business transactions
Question
Computer-based TPSs are often considered the _______ of the management information system application.

A) Icing on the cake
B) Bread and butter
C) Cherry on the top
D) Fluffy dessert
Question
Although data mining has been used effectively in private industry for a number of years, law enforcement has ______________ in the application of this technology.

A) Led the way
B) Far and away better
C) Trailed
D) Superior
Question
To explore the use of data mining within criminal justice, data mining software analyzes _______ in stored transaction data.

A) This and that
B) Court costs
C) MOs of sex offenders
D) Relationships and patterns
Question
By using data mining software, investigators can initiate database searches and link analyses that extract information describing ______________ between persons, events and other aspects of criminal activities.

A) The DNA
B) Criminal intents
C) Relationships
D) Forensics
Question
Statistical Analysis System (SAS) is a software suite that can mine, alter, manage and retrieve data from a variety of sources and perform ______________ on them.

A) Simple tests
B) Statistical analysis
C) Fancy calculations
D) Word searches
Question
Machine learning is a type of _______ that provides computers with the ability to learn without being explicitly programmed.

A) Robot function
B) Advanced manufacturing
C) Artificial intelligence
D) Easy-to-use intelligence
Question
Both machine learning and data mining is similar in that both systems _______ through data to look for patterns.

A) Search
B) Scroll
C) Slowly pick through
D) Look carefully
Question
The difference between machine learning and data mining is that machine learning focuses on ______________, based on known properties learned from the training data.

A) Simple crimes
B) Identity theft
C) Future knowledge
D) Prediction
Question
In knowledge discovery and data mining (KDD), the key task is the discovery of previously ______________ knowledge.

A) Known
B) Unknown
C) Unknowable
D) Discovered
Question
A machine learning method called "Series Finder" was designed to assist the police in _______.

A) Figuring out how to find corrupt cops
B) Discovering crime series
C) Learning about new non-lethal weapons
D) Finding patterns of shoplifting
Question
An artificial neural network (ANN) is a computing system made up of a number of simple, highly interconnected ______________.

A) Processing elements
B) Neural pathways
C) Blood vessels
D) Electrical wires
Question
The artificial neural network (ANN) system for Classification of Offenders in Murder and Rape Cases project developed two software prototypes that demonstrate developed algorithms for ______________.

A) Helping the police track individual criminals
B) Analyzing and comparing large databases of crime data
C) Comparing business models
D) Analyzing neighborhood crimes
Question
The Computer-Aided Tracking and Characterization of Homicides (CATCH) and CATCHRAPE software applications analyze ______________ .

A) Home break ins and the theft of TVs
B) Shoplifting and petty theft
C) Homicide data and sexual assault data
D) Robberies and simple assaults
Question
Both CATCH and CATCHRAPE use advanced _______ to facilitate the comparison of crime data to find crimes that have similar patterns.

A) Algorithms
B) Math concepts
C) Artificial Intelligence
D) Physics
Question
Generally, any of four types of relationships are sought by analysts; these are Entity extractions, Clusters, Associations and ______________.

A) Forensics
B) Traditional detective work
C) Fast thinking
D) Sequential patterns
Question
Entity extraction identifies particular ______________ from data, such as text, images, or audio materials.

A) Clues
B) Patterns
C) Algorithms
D) Criminal types
Question
Entity extractions have been used to identify a person's addresses, vehicles and ______________.

A) Political preferences
B) Sexual orientation
C) Credit cards owned
D) Personal characteristics
Question
Software such as EntityCube and Rosette Entry Extractor (REX) automatically mine from billions of web pages to _______ entity information and detect relationships.

A) Extract
B) Discard
C) Ignore
D) Erase
Question
A cluster is a subset of objects that are similar and Clustering is the process of grouping data into a set of ______________.

A) Irrelevant data
B) Meaningless categories
C) Statistical predictions
D) Meaningful subclasses called clusters
Question
A cluster is a _______ of crimes or people or other kinds of data that are similar and may represent a geographical region, a hot spot of crime, or a possible crime pattern.

A) Cadre
B) Russian organization
C) Group
D) Mob
Question
In data mining, association rules are useful for analyzing and ______________customer behaviour.

A) Predicting
B) Classifying
C) Reporting
D) Disregarding
Question
Association analysis can be used to address several problems, including predicting who is likely to commit certain crimes and ______________ .

A) When they have hidden past crimes
B) When these crimes might take place
C) Where they will live in the future
D) How they will cover their tracks
Question
Sequential pattern mining is a data mining approach that is concerned with finding statistically ______________ between data examples where the values are delivered in a sequence.

A) Significant misinformation
B) Relevant patterns
C) Irrelevant patterns
D) Insignificant information
Question
In criminal justice, frequent sequence mining could help determine the ______________ between certain types of crimes and the sequence of criminal offenses by offenders involved in certain kinds of offenses.

A) Jet lag
B) Lack of time lag
C) Interval
D) Surveillance time
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/43
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Data Mining and Analyzing Intelligence
1
Data mining is sometimes referred to as data discovery
True
2
Data mining is the process of analyzing data from different perspectives and summarizing them into useful information.
True
3
Data mining tells us about very small and simple data sets.
False
4
Information Technology has to do with the use of computers to load software
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
5
Information technology, over the past two decades, been evolving into separate transaction and analytical systems
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
6
A transaction processing system (TPS) supports the processing of a company's or organization's business transactions
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
7
TPSs keep an organization running smoothly by only automating the processing of payroll checks.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
8
Data mining systematically searches information to identify relationships and patterns
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
9
Several types of analytical software systems are currently available for use in the criminal justice system
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
10
A machine learning method called "Series Finder" was designed to assist the police in discovering crime series
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
11
An algorithm includes a finite number of steps to solve any given problem
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
12
The algorithm used in Series Finder tries to identify the blood type of the offender.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
13
The Computer-Aided Tracking Characterization of Homicides, called CATCH, and CATCHRAPE are software applications that analyze homicide data and sexual assault data
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
14
There are four types of relationships sought by analysts; these include Entity extractions, Clusters, Associations and Sequential patterns
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
15
The goal of data mining and association rules in crime data analysis is to identify and visualize associations among criminal networks
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
16
Data mining is sometimes also called data discovery or ______________.

A) Knowledge discovery
B) Encyclopedia knowledge
C) Book learning
D) Sequence building
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
17
Data mining is the process of analyzing data from different perspectives and summarizing that into ______________.

A) Miscellaneous data
B) Useless information
C) Useful information
D) Information for the media
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
18
For criminal justice, Information Technology is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange _______.

A) All forms of electronic data
B) Secret information
C) Underground details of crimes
D) Information useful to big businesses
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
19
A transaction processing system (TPS) supports the processing of a company's or organization's ______________.

A) Stock tips
B) Email messages
C) Donations
D) Business transactions
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
20
Computer-based TPSs are often considered the _______ of the management information system application.

A) Icing on the cake
B) Bread and butter
C) Cherry on the top
D) Fluffy dessert
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
21
Although data mining has been used effectively in private industry for a number of years, law enforcement has ______________ in the application of this technology.

A) Led the way
B) Far and away better
C) Trailed
D) Superior
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
22
To explore the use of data mining within criminal justice, data mining software analyzes _______ in stored transaction data.

A) This and that
B) Court costs
C) MOs of sex offenders
D) Relationships and patterns
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
23
By using data mining software, investigators can initiate database searches and link analyses that extract information describing ______________ between persons, events and other aspects of criminal activities.

A) The DNA
B) Criminal intents
C) Relationships
D) Forensics
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
24
Statistical Analysis System (SAS) is a software suite that can mine, alter, manage and retrieve data from a variety of sources and perform ______________ on them.

A) Simple tests
B) Statistical analysis
C) Fancy calculations
D) Word searches
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
25
Machine learning is a type of _______ that provides computers with the ability to learn without being explicitly programmed.

A) Robot function
B) Advanced manufacturing
C) Artificial intelligence
D) Easy-to-use intelligence
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
26
Both machine learning and data mining is similar in that both systems _______ through data to look for patterns.

A) Search
B) Scroll
C) Slowly pick through
D) Look carefully
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
27
The difference between machine learning and data mining is that machine learning focuses on ______________, based on known properties learned from the training data.

A) Simple crimes
B) Identity theft
C) Future knowledge
D) Prediction
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
28
In knowledge discovery and data mining (KDD), the key task is the discovery of previously ______________ knowledge.

A) Known
B) Unknown
C) Unknowable
D) Discovered
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
29
A machine learning method called "Series Finder" was designed to assist the police in _______.

A) Figuring out how to find corrupt cops
B) Discovering crime series
C) Learning about new non-lethal weapons
D) Finding patterns of shoplifting
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
30
An artificial neural network (ANN) is a computing system made up of a number of simple, highly interconnected ______________.

A) Processing elements
B) Neural pathways
C) Blood vessels
D) Electrical wires
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
31
The artificial neural network (ANN) system for Classification of Offenders in Murder and Rape Cases project developed two software prototypes that demonstrate developed algorithms for ______________.

A) Helping the police track individual criminals
B) Analyzing and comparing large databases of crime data
C) Comparing business models
D) Analyzing neighborhood crimes
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
32
The Computer-Aided Tracking and Characterization of Homicides (CATCH) and CATCHRAPE software applications analyze ______________ .

A) Home break ins and the theft of TVs
B) Shoplifting and petty theft
C) Homicide data and sexual assault data
D) Robberies and simple assaults
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
33
Both CATCH and CATCHRAPE use advanced _______ to facilitate the comparison of crime data to find crimes that have similar patterns.

A) Algorithms
B) Math concepts
C) Artificial Intelligence
D) Physics
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
34
Generally, any of four types of relationships are sought by analysts; these are Entity extractions, Clusters, Associations and ______________.

A) Forensics
B) Traditional detective work
C) Fast thinking
D) Sequential patterns
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
35
Entity extraction identifies particular ______________ from data, such as text, images, or audio materials.

A) Clues
B) Patterns
C) Algorithms
D) Criminal types
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
36
Entity extractions have been used to identify a person's addresses, vehicles and ______________.

A) Political preferences
B) Sexual orientation
C) Credit cards owned
D) Personal characteristics
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
37
Software such as EntityCube and Rosette Entry Extractor (REX) automatically mine from billions of web pages to _______ entity information and detect relationships.

A) Extract
B) Discard
C) Ignore
D) Erase
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
38
A cluster is a subset of objects that are similar and Clustering is the process of grouping data into a set of ______________.

A) Irrelevant data
B) Meaningless categories
C) Statistical predictions
D) Meaningful subclasses called clusters
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
39
A cluster is a _______ of crimes or people or other kinds of data that are similar and may represent a geographical region, a hot spot of crime, or a possible crime pattern.

A) Cadre
B) Russian organization
C) Group
D) Mob
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
40
In data mining, association rules are useful for analyzing and ______________customer behaviour.

A) Predicting
B) Classifying
C) Reporting
D) Disregarding
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
41
Association analysis can be used to address several problems, including predicting who is likely to commit certain crimes and ______________ .

A) When they have hidden past crimes
B) When these crimes might take place
C) Where they will live in the future
D) How they will cover their tracks
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
42
Sequential pattern mining is a data mining approach that is concerned with finding statistically ______________ between data examples where the values are delivered in a sequence.

A) Significant misinformation
B) Relevant patterns
C) Irrelevant patterns
D) Insignificant information
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
43
In criminal justice, frequent sequence mining could help determine the ______________ between certain types of crimes and the sequence of criminal offenses by offenders involved in certain kinds of offenses.

A) Jet lag
B) Lack of time lag
C) Interval
D) Surveillance time
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 43 flashcards in this deck.