What types of business intelligence could be gathered

Assignment Help Computer Engineering
Reference no: EM132161944

Question: Key Assignment: The case study retail store has expressed a desire to eventually be able to analyze the data that are collected from engaging in business, both in its brick-and-mortar store and in its online store. Because the system had to be redesigned from the ground up, the goal of taking the business online using a Web-based database was pushed back. Eventually, the company wants to be able to run statistical analyses against the data that it is collecting and to be able to drill down through the data to transform them into various desired formats. In addition, the company would like to acquire data sets from other providers to engage in decision-support initiatives. What recommendations can you propose to support these business intelligence goals?

Part 1: Future Database System Implementation Plan (4-5 pages)

1. What fundamental differences exist between object-oriented and object-relational database systems and Web-based database systems?

• Would these differences impact your retail store?

2. Include details of what changes would need to be introduced to the database if it was used to build a data mart or a data warehouse.

3. Include details of what considerations would need to be made if the database were to become a distributed database.

4. What specific types of business intelligence could be gathered from the database?

• How would this information assist in the decision-making process for your retail store?

5. How would your retail store benefit from data warehousing in the following areas?

• Return on investment on business intelligence initiatives (Provide a 3-year estimate.)

• Competitive advantage (based on local or target area)

• Increased productivity of decision-makers (related to business process decision-making)

6. How would you address the following data warehousing problems if they occurred in your retail store?

• Required data were never captured.

• There is a high demand for disk space and other resources.

• There are hidden problems with source systems.

7. Provide your analysis as to how this part of the project fulfills the mission and 1 or more goals of the case study organization.
All sources should be cited both in-text and in References using APA format.

Part 2: Argumentation PowerPoint (5-slide PowerPoint excluding title slide and References)

An argument in problem solving is used to permit the problem solver the opportunity to offer a set of reasons or evidence in support of his or her solution and related conclusions from the inquiry and research process. The argument is not an opinion and is not the conclusion restated, but rather a demonstration of the intellectual inquiry that you have made during the problem-solving process. Naturally, for the argument to gain credibility, it must be reinforced with scholarly references because the support of the conclusion comes from the quality of evidence that has been gathered.

There are some different forms of arguments that could be made, as follows:

I. Categorical Arguments: An assertion that there is 1 of 4 relationships between X and Y. You could show these 4 forms as follows:

1. All Xs are Ys.

• Example: All mice are mammals.

2. No Xs are Ys.

• Example: No mice are mammals.

3. Some Xs are Ys.

• Example: Some mice are mammals.

4. Some Xs are not Ys.

• Example: Some mice are not mammals.

II. Predictive Arguments: A case is made for anticipating or predicting events based on the characteristics of a category (X or Y) or based on the relationship between X and Y. Some sample arguments are below (the combination of X and Y is not represented).

1. All Xs have this characteristic, behave this way, or are in this state. Therefore, I predict __ about X.

• Example: All mice eat cheese. Therefore, the cheese on the table will be eaten by the mouse on the table.

2. All Ys have this characteristic, behave this way, or are in this state. Therefore, I predict __ about Y.

• Example: All cheese will be eaten by mice. Therefore, the cheese on the table will be eaten by the mouse on the table.

3. Some Xs have this characteristic, behave this way, or are in this state. Therefore, I predict __ about X.

• Example: Some gray mice eat cheese. Therefore, the cheese on the table may be eaten by the gray mouse on the table.

4. Some Ys have this characteristic, behave this way, or are in this state. Therefore, I predict __ about Y.

• Example: Some yellow cheeses are desired by mice. Therefore, the yellow cheese on the table may eaten by the mouse on the table.

5. No Xs have this characteristic, behave this way, or are in this state. Therefore, I predict __ about X.

• Example: No mice have been found to have 2 tails in this region. Therefore, the mouse in this region will have 1 tail.

6. No Ys have this characteristic, behave this way, or are in this state. Therefore, I predict __ about Y.

• Example: No ballots were left uncounted. Therefore, the voting system should be fair and equitable.

III. Change Arguments: A case can be made that something is different in the characteristics (or state) of X and/or Y between 2 or more observations made at different times. A change argument is simply a comparison of before and after and any differences that are noted from the first observation to the subsequent observations. When making a case for observed change, you would typically use a different form of argument (categorical or predictive) to explain why that change occurred.

1. Example:

• At observation 1, all Xs had this characteristic (or were in this state).

• At observation 2, all Xs do not have this characteristic (or were not in this state).

• Therefore, X no longer possesses this characteristic (or is no longer in this state).

Envision that you now have to present your solution to your retail store client. You need to make a formal presentation to a group of stakeholders, and you need to be prepared to answer their questions. Create a PowerPoint presentation in which you provide the following:

• In the Notes pages of each slide and based on the context of the information on that slide, provide a narrative of 2-3 paragraphs of your rationale for the solution to the problem described in the IP.

• On each slide, identify the type(s) of argument(s) that you are making for the problem presented in the unit IP and the evidence that you have to support the argument(s)

• All sources used to support your argument and solution should be cited both in-text (on slide or in Notes page) and on a References slide using APA format.

Reference no: EM132161944

Questions Cloud

Creating er database model for question : Need assistance with creating ER database model for question below and how to do the ER diagram. Please include "maximum" and "minimum" cardinality in answer.
Implement depth first search : Could you please provide a programming in Python, Java, or C/C++ to Implement Depth First Search (Traversal) and Breadth First Traversal
How are scw policies tied with windows firewall : What types of Windows Firewall are built-in with the Windows 2012 operating system? What are the differences? How are SCW policies tied with Windows Firewall?
Valid grades entered are passing grades : We also would like to see what percentage of the valid grades are passing.
What types of business intelligence could be gathered : What specific types of business intelligence could be gathered from the database? How would this information assist in the decision-making process.
What was the carrying amount of the van at the date of sale : On January 1, 2014, Jumping Rock Brewery purchased a van for $39,000. What was the carrying amount of the van at the date of sale
Provide an example case : Provide an example case of when you as a web developer would consider obtaining permissions to use an asset of a creator in your website.
What is the most important thing : What is the most important thing to know when programming in C#?
Contrast different types of steganography methods : Compare and contrast different types of Steganography methods that are used for hiding confidential data.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What information does an action event object carry

What information does an action event object carry? What additional information does a mouse event object carry?

  Create class named pet that have age property holds pets age

Create a class named Pet (similar to the one discussed in this chapter), which has the following properties: The Age property holds the pet's age.

  Reasons to incorporate the venturing

Explain how are corporate ventures differentiated from other projects within the large organizations and from the entrepreneurial start-ups? List some of the reasons which incorporate the venturing has had a relatively poor track record?

  Determine the effective memory access time in terms

The access time from the processor to either cache is c clock cycles, and the block is transfer time between the caches and main memory is b block cycles.

  Define the concept of inheritance can be utilized

Discuss with your classmates an example of an object or concept where the concept of inheritance can be utilized

  How can an attacker find the three keys with effort

How can an attacker find the three keys with effort in the order of 2112 instead of 2168? Describe the attack in detail.

  Why digital computers use binary numbers for their operation

Why do digital computers use binary numbers for their operation? Convert the following decimal numbers to equivalent binary numbers.

  Write the code for an ordered linked list module

Select Makefile from the file list and hit Compile/Validate. This will compile ordereList.c and main.c, producing an executable named main. If you double click main, the program will execute and should produce the output shown in the example below..

  Define hansen or mesa semantics for condition variables

As noted in the previous problem, our implementation of the blocking bounded queue in Figure does not guarantee freedom from starvation.

  Congress lacks the necessary time and expertise to produce

congress lacks the necessary time and expertise to produce legislation for every area of conduct in society. this is

  Write the array back to a new file and in reverse order

Write a program that asks the user for a file name, and then ask the user for up to 100 input values. Write the user input values to the file.

  Why use asymptotic notation instead of running time

Why use asymptotic notation instead of running time or operation counts and when does it make more or less sense?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd