How the data is analyzed and used with structured data

Assignment Help Computer Engineering
Reference no: EM132492913

Assignment: Unstructured Data Analytics Paper

Introduction: Much data today is unstructured and comes from a variety of arenas of the organization. Unstructured data cannot be analyzed in the same manner and with the same techniques as structured data. However, they both may be used to make decisions. As you can recall from previous weeks structured data would be something like sales data for a region, by salespeople, by quarters and annual. Unstructured data however cannot be categorized or have a defined linear order.

Instructions: Write a 1 to 2-page paper. In the paper review the concept of unstructured data, outline the areas where this data can come from, evaluate the process on how this data is analyzed and used with structured data to make decisions. While evaluating the process make sure you discuss data mining (including text and web), multi-platform data architecture, data warehouse, data lakes and Hadoop.

After looking at the concept of unstructured data comprise a scenario where an organization may need or can search unstructured data for a specific purpose. For example, in 2001, the company Enron, went into financial ruins. The company was hiding financial losses through blatant accounting fraud by misrepresenting earning reports. This went on for several years before the practice was uncovered by the government. There were many corporate executives believed associated with the scandal and the government wanted to gather evidence on these officials for prosecution. The company had millions upon millions of emails during this period and needed to find emails pertinent to individuals and the case. The company used text mining to look for keywords to discover emails associated with the situation.

Writing Requirements: • 1-2-page paper (minimum 400 words per page) not including title page or reference page

• Cite 2 different sources in paper.

Reference no: EM132492913

Questions Cloud

Discuss about impact on it and economic globalization : Research and create a 3000 word paper on your thoughts for the great impact(s) on IT and Economic Globalization. This paper must be an MS Word document in APA.
Analyzes the key aspects of the case : Compose a 1500 word report that analyzes the key aspects of the Case and responds to the questions found on page 376. Your report should be submitted.
Difference between research paper and research proposal : What's the primary difference between a research paper and a research proposal?
Estimate number of theoritical stages required : Estimate number of theoritical stages required and The overall extraction efficiency has set at 80%, determine number of actual stages for this process
How the data is analyzed and used with structured data : Write a 1 to 2-page paper. In the paper review the concept of unstructured data, outline the areas where this data can come from, evaluate the process.
What is the effect of the opposite approach if used : Which approach, direct or indirect, is most effective for routine messages? Why? What is the effect of the opposite approach if used?
Discuss the concept of a decision tree : For a simple decision it is either a question of taking one path or another path. With multifaceted decisions it can be a more complicated process because.
Benefits of blogging is the personal : If one of the benefits of blogging is the personal, intimate style of writing, is it a good idea to limit your creativity by adhering to conventional rules of g
How does it interact with smart home devices : Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the interesting and uninteresting information

Describe the interesting and uninteresting information that these rules provide. Is this model practical for predicting the outcome of a new auction?

  How each method benefits multilayered access control

Identify what implementation method(s) can be used to incorporate multilayer access control. Describe and how each method benefits multilayered access control.

  Determine that all data should be encrypted

Do you believe that all data should be encrypted? Many computing professionals think this is good idea. But small number of computing experts feel that no data.

  Graph the amplitude-modulated pam signal

Repeat Illustrative Problem II with a rectangular pulse shape in the presence of AWGN for SNR values of 20, 10, 5, and 2 dB.

  Describe the operation of the hcs12s timer output

For an HCS12 operating at a clock frequency of 96MHz and prescalar value set to 32, 20000 ticks of TCNT will cause how much delay (in msec)?

  What technologies would be necessary to facilitate plan

Explain how electronic document management is or could be used in your Information Systems class to eliminate all paper flow between the students and professor.

  Explain the embarrassing privacy issue

WikiLeaks is an international non- profit organisation that publishes secret information, news leaks and classified media from anonymous sources.

  How might database auditing be utilized in sox compliance

Discuss SOX in 300 words or more. How do logging and separation of duties help comply with SOX? How might database auditing and monitoring be utilized in SOX.

  Identifying the information security problem

In relation to the project management tools, discuss and give two examples or scenarios in order to demonstrate how the work breakdown structure could recognize and plan an information security problem or issue in the organisation.

  What is the probability that a player wins the jackpot

The player wins the jackpot if the first five numbers picked match the first five numbers drawn and the sixth number matches the sixth number drawn.

  Explain the context-level diagram

Explain the differences between a context-level diagram and a diagram level 0.

  Why do you think disks so seldom have multiple disk arm

Discussion. Some high-end disks in the 1980s had multiple disk arm assemblies per disk enclosure in order to allow them to achieve higher performance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd