Accumulation of large amounts of data from multiple sources

Assignment Help Basic Computer Science
Reference no: EM13324968

As we noted in the introduction, data warehousing -- the systematic accumulation of large amounts of data from multiple sources -- and data mining -- techniques for extracting meaning from those data -- have become the hallmarks of virtually all large organizations and many smaller ones. As the costs of acquiring data continued to plummet and the cost of storing it almost approaches zero, network organizational databases have become increasingly important to basic decision-making. While the jury is still out on whether decisions made on the basis of processing large amounts of data are substantially better than those made on other grounds, such as professional judgment and/or experience, there is no doubt that this trend will continue and probably accelerate at least through the next decade. Therefore, it becomes extremely necessary for prospective information technology managers to understand how such databases are constructed and how they can be used for decision purposes.

The first step in this case is to become moderately familiar with the terminology of databases and data processing. Here are two good sources to give you this background; if you are still uncertain about things or want to look into certain aspects in more detail, the optional readings provide additional material for you to consult:

VCILT Web TV (20111) Introduction to Data Warehousing and Data Mining. Youtube video. Retrieved December 20, 2011, from https://www.youtube.com/watch?v=dGDuD10U4-M

Gunther, O. (2011) Database Management Systems. Slideshare Presentation. Retrieved December 20, 2011, from https://www.slideshare.net/Databaseguys/o-gnther-database-management-systems

When you feel somewhat comfortable with this language, please review the following paper describing an exercise in data warehousing and data mining conducted by a Nigerian university using data drawn from its own student records and learning management system. Hopefully, this will resonate with your own experience, since Trident University is hoping to implement its own learning management system soon and use it not only to manage coursework but to collect useful data for planning purposes. Please pay particular attention to the kinds of data being assembled and the kinds of questions being asked of the data:

Akintola K.G., Adetunmbi A.O., and Adeola O.S. (2011) Building Data Warehousing And Data Mining From Course Management Systems: A Case Study of Federal University of Technology (FUTA) Course Management Information Systems. Information Technology for People-Centred Development (ITePED 2011). Retrieved December 20, 2011, from https://www.ncs.org.ng/wp-content/uploads/2011/08/ITePED2011-Paper4.pdf

When you've had a chance to read this article, review information from the background readings and research other sources on your own, please prepare a short paper on the topic:

Important information that A University might be able to obtain by warehousing and mining student records and learning management system data

Your paper should be between three and five pages. Take a definite stand on the issues, and develop your supporting argument carefully. Using material from the background information and any other sources you can find to support specific points in your argument is highly recommended; try to avoid making assertions for which you can find no support other than your own opinion.

  • relate the questions you identify to specific kinds of data

•indicate why you believe that the questions you identify are important to the University, and the kinds of decisions that you expect to be affected
•identify any problems you see in assembling and/or analyzing the data

 

Reference no: EM13324968

Questions Cloud

Explain how many grams of zn have been consumed : If 153 mL of wet H2 is collected over water at 24°C and a barometric pressure of 725 torr, how many grams of Zn have been consumed
Find direction of the electric field halfway between them : Point charges of 30.0 µC and 50.0 µC are placed 0.500 m apart. What is the magnitude and direction of the electric field halfway between them
Evidence of excess supply or excess demand : Examples of actions taken by a company, government, or organization whose effect is to prevent specific markets from reaching equilibrium. What evidence of excess supply or excess demand can you cite in these examples?
Define the relative nucleophilicity of the indicated species : Rank the relative nucleophilicity of the indicated species in ethanol. CH3OH CH3S- CH3COOH CH3O- CH3COO-
Accumulation of large amounts of data from multiple sources : The systematic accumulation of large amounts of data from multiple sources
What is the purpose of the restrict keyword in c99 : Arrays of strings in C and C++ can also be initialized with string literals. In this case, the array is one of pointers to characters.
Theatre-formulate a manifesto for the art of acting : Theatre/formulate a manifesto for the art of acting. a manifesto is a brief passionate and personal statement of belief and purpose include: what you want to do for the world through your acting? what you must do to empower youself to achieve you pur..
Evaluate the equilibrium constant for a reaction : Calculate the equilibrium constant at 40 K for a reaction with ?Ho = 10 kJ and ?So = 100 J/K.
Find the average velocity of the dot : A web page designer creates an animation in which a dot on a computer screen has a position of r? =[ 4.2cm +( 2.3cm/s2 )t2]i^+( 4.5cm/s )tj^

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Expert systems created-deployed in real-world applications

Expert systems have been created and deployed in many real-world applications to support decision making. Discover one recent case study or academic journal article.

  We will compare the performance of a vector processor

In this problem, we will compare the performance of a vector processor with a hybrid system that contains a scalar processor and a GPU-based coprocessor.

  Early proof of concept

Currently our organisation has a sample running application to sell books which has been designed as an early proof of concept. The application can be found in your installation at C:glassfish3glassfishdocsjavaee-tutorialexamplescase-studiesdukes-boo..

  Explain process of extracting contours from edge image

Assume that the edge points in an image are extracted using a robust edge detection. Explain the process of extracting the contours from this edge image.

  Display the most frequently occurring word

the program should count how many times each word appears and display the most frequently occurring word, along with how many times it occurs.

  Illustrate how compiler would unroll loop four times

Illustrate how compiler would unroll loop 4 times. Make sure to include code which compute all the pointers required for operation within each iteration. suppose that processor has as many registers as required.

  Write a program that calculate the speed of sound

write a program that calculate the speed of sound (a) in air of a given temperature t (f) formula to compute the seed in ft/sec a=1086 \(\sqrt{5t+297/247}\) please i need to run this program in visual studio win32 please i need help thank you

  Why is it important to have a body of standard job

Why is it important to have a body of standard job descriptions for hiing information security professionals?

  Write the verilog code for a two-input, two-bit adder

Write the Verilog code for a two-input, two-bit adder. The inputs are to be set by switches SW0-SW3 the three-bit result is to be displayed on LED0-2. Then write the Verilog code to add two hexadecimal integers stored in 4 bits each.

  Explain what is done in each of the risc states

Explain what is done in each of the RISC states for the 5 types of MIPS instructions represented with R, I, and J instruction formats.

  Rewrite this statement so it makes only one comparison

Rewrite this statement so it makes only one comparison and does not use the || operator. (Hint: Use either the toUpperCase method.)

  What technologies should be used to secure these areas

On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd