Describe the datawarehouse and data mining, Computer Networking

Assignment Help:

Question 1:

‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advantage. That has turned the data storage and management function into a key strategic role of the information age whereby managers need to practice managerial activities such as datawarehousing and datamining'.

Describe the ‘datawarehouse' and ‘data mining' concepts using appropriate examples.

Question 2:

E-Business has allowed for customer-centered retailing, that is, the removal of intermediate levels and allowing for customer self-service. Customer-centered retailing involves the following four elements: direct sales over the web, interactive marketing and personalization, mobile commerce and customer self-service. Show each element with appropriate examples.

Question 3:

a(i) Information systems are becoming increasing vulnerable to security breaches. Discuss with examples.

(ii) Identify the basic guidelines which managers can take to ensure the security of the information systems used in their organizations.

(b) The ‘Prototyping Methodology' makes it possible for organisations to obtain working versions of a system quickly. Discuss the advantages and disadvantages of prototyping and identify the instances when prototyping should be used and when it should not be used.


Related Discussions:- Describe the datawarehouse and data mining

Give the structure of an atm uni cell header, a) Consider a hypothetical a...

a) Consider a hypothetical arrangement of ‘self-learning' bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges B

Thread libraries, The most difficult representatives of shared memory progr...

The most difficult representatives of shared memory programming models are thread libraries present in mainly of the modern operating systems. Some examples for thread libraries ar

Fiber optic extension, FIBER OPTIC EXTENSION:  The LAN extension using f...

FIBER OPTIC EXTENSION:  The LAN extension using fiber optic is given in the figure below:   Figure The fiber-modem translates digital data into pulses of light the

Objective of parallel algorithms, After studying this part the students wil...

After studying this part the students will be able to understand about the following: Analysis of Parallel Algorithms; Different Models of Computation; o   Interco

What is internet, What is Internet? Internet is a collection of network...

What is Internet? Internet is a collection of networks or network of networks. Various networks like LAN and WAN connected by suitable hardware and software to work in a seamle

On which languages intranet works, On which languages Intranet works ...

On which languages Intranet works Language Support The Intranet works on the basis of scripts written in any of the following languages, viz., SGML, HTML, DHTML, XML, AS

Destination port number - transport layer, Destination Port Number Thi...

Destination Port Number This is  port number used by the process  running on the destination host. It is also 16 bits long  if the destination  host if  server ( a client  sen

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd