Tuesday, February 19, 2019
Information Systems in Business Essay
List of the entropybases in which tuition about you exists Flat- commove entropy bases. The flat file informationbases be utilise to store sm altogether told amounts of selective information that is take to be modify by the hand. They atomic number 18 made up of files strings that combine unrivaled or more files and they be effective in storing simple(a) entropy lists but they become complex if the selective information structures argon replicated. Flat file informationbases require a simple approach to the methods of storing selective information, therefrom if complex data cases argon stored, the file become unread adequate for the individual using the data bases.M any companies utilise the flat file data bases in storing their data since they ar advantageously assessed and edited (Matthias, 2003). Server databases The server databases uses the internet and it is easily accessed by the clients at any time, for instance, 24 hours, champion week. The clients ar able to access the websites in order to retrieve the data. Server databases ar relevant to many companies that require to make applications and communications on data issues anyplace in the world.Server databases have a special feature that each(prenominal)ows the clients to generate precise data requests from the database and then it is the obligation of the database to perform the function (Matthias, 2003). relational databases An example of a rational database includes the SQL server databases. These types of databases uses a logical cooking in the exercisees that they store data. For instance presentation of prorogues in data storing where by each field is described by a certain character.The realtions in the databases are described when the characters are linked with one another. many companies uses the relational data,bases since they are effective when they are designed propely and therfre resulting to clear data summary without any duplication (Bing, 2011). ii) Make a list of the databases in which data about you exists. How is the data in each database captured, updated and how often? What data concealing concerns do you have? Explain briefly. entropy authors are defined by their portability mechanisms and the independent approaches that compounds the connection of the databases.There are different types of data sources and they are introduced to define a certain database. An application provoke be utilize to define different types of database by changing the components of the data source. There are three different types of data sources, managed data sources,native data source and running(a) data sources (Pang,2001). Managed data sources Managed data sources define the approaches employ in actus reus handling mechanisms, connections pooling as well as global transaction wariness. Since they are applicable on global transactions they are usually updated on daily basis.A managed data source in a data storage warehouse provides all the implementation mechanisms and interfaces that are issued in the data source. The warehouse nookie be able to use the managed data source in the participation of global transactions (Pang,2001). Native data sources Native data sources are significant in the warehouse interface and are provided by the vendors sich as oracle. The native data source are different from the managed data source since the connections cannot be retrieved in global transaction.They are updated with several approaches depending on the information to be retrieved. Operational data sources totally operational data sources applicable in a warehouse are used in the management of data in different sectors. The data sources are retrieved through and through the application of connections that enhance the operational address of data retrieving and enhancement effective. In a datawarehouse basis, information of data is retrieved from more than one ideal source therefore the application of the operational d ata source defines different strategies of connection to effectively define a certain data. ii) use your company of choice example from above, explain the type of decision restrain that thecompany can benefit from implementation of a data warehouse. Within this context, what would bethe government agency of data mining? Decision represent arrangements are important computerized information that enhances the strategies that are used in decision making (Power, 2002). The decision makers are able to use the networking communication engine room, data information and other lessons to enhance the approach of decision making.Decision support systems are significant in the company since they provide information on graphical approaches and include expertise application on artificial intelligence (Power, 2002). BLM Company is entitled to use the communication driven decision support system that has a responsibility in targeting internal patterns. The importance of the communication dr iven decision support system is to enhance individual collaboration. The technology that is applied in this type of decision support system includes the client services for instance, instant messaging. business office of data mining analyzing entropy mining computer softwares are important in analyzing data from different perspectives (Bing, 2011). It analyses, categories,summaries and indicates the relationship that occurs in a given data. Data mining procedures are effective since they analyses the total components that the user wants prefers effectively. Determination of expensive information Data mining is defined as the processes that are used by data software to analyses, summaries useful mental object. Data mining provides all the knowledge that is required to uncover certain figures related with information convalescence for several applications.In such cases, cross tabulation information, decision trees applications can assist in the retrieving of certain valuable info rmation. QUESTION 2 go-ahead Content Management (ECM) helps companies to capture, organize and analyze particularly unstructured content to deliver better business. ECM technologies cover a broad beat of capabilities. With the help of examples name and briefly explain three of such capabilities. memorandum management capability Every department in an brass is informed with document management capabilities.The role of ECM In most of the shaping is to assist the establishment on the approaches associated with document management through the groundwork of policies that requires documentation cycle. ECM applies centralized methods repositories that enhance the mechanisms of discovering the information effectively and therefore the set policies enable tracking of information in the make-up through the application of bar codes and labels(Handy, 2009).The centralized mechanisms have come acrossd that storage and protection of informations against any unauthorized use, hence they o ffer security on information. Record management capabilities Record management capabilities has been known as a secondary task, strategies that are associated with this capability include, the requirements on clear cross-files assignments within the departments. Record management capabilities ensure that records are well updated in the organization to ensure that the organization maximizes transparency. The record management capabilities provides the managers with an opportunity to set up the records according to the organizations filing plans. web content management capabilitiesThe development of web content management capabilities ensures that the organization is able to communicate effectively with employees and customers. Web content management capabilities ensures that the organizations is in a position to manage different sectors for instance multilingual Internet sites and mobile services while it ensures that these sectors are effectively updated. Summary of the findings I BM is a worldwide known company that applies the enterprise content management with software application. They provide semantic data management software within the organization. enquiry 3Write the lecture summary relating to Week 9 affair Data Warehouse and Data Mining data warehouse Companies are entitled with different sorts of information. The traditional methods of data storage include, invoices, sales and dispersal were developed by many companies and it was a hard task that required a lot of computing producing biased and inaccurate information. With the recent innovations of technology and information systems data management and store has become an easy process (Michael, 2009). The effective use of Data warehousing provides an approach of combining all the information that is required by the company.Data warehousing includes the application of all the companies data storage and the retrieving of any information is made easy. Data warehousing is made effectively through t he strategies that are associated with the retrieving of information for instance, the selection process of a certain area to retrieve the data, keying of individual as the area matter and any data information is retrieved and the group team of the organization develops extraction programs. Data warehousing is applicable in coordination of information and write of data within the organization and outside the organization(Michael, 2009).Trusting data sources. Data warehouse is subjected with different departments with a large number of data sources from the foreign departments. An organization can lack the control on the quality recovery of data into the data warehouse, and sometimes it can be a rocky process to access how the data is refreshed. The data sources used by the organization are diverse therefore there is the need to determine strategies that can be applied in trusting data sources. Tools The tools include the simple reporting query tools which are used to tell us wha t has happened. on-line(a) analytical processing gives a reason of the happenings executive information system extracts information on the users who want to mess with the data warehouse data mining processes includes the all the statistical techniques that are advanced with intellectual inquiry properties. Data mining components include, cross z softwares and the IBM . The architecture- centralised or distributed. If the data is termed as centralized then it means that only one database is applicable to a specific hardware for the access of all users. QUESTION 4 Features and tools in face bookThe features and tools in facebook have different importances on the representation of the companies, public figures, bands. They are the key tools of the entities and they include pages and the profile subscribers. The pages Pages are used to represent companys public figures, bands. The pages can be applicable to Profiles with subscribe Profiles with subscribe consists of the strategies th at an individual uses to subscribe to another person. In this case the profile with subscribes are used by multiple individuals and they include, intelligence activity feed, find friendsEntity attribute value model(EAV) Entity attribute value model is a data model that is used to define entity where by the parametric quantitys and properties are used to explain them. The number that is used to describe each entity is relatively modest. This model is also known as the space matrix model. Structure of an EAV table The data that is represented is defined in a spacious approach that is capable of storing the entire space matrix that is composed of occupied values. In the EAV model each parameter and property describes the entire entity and each language that is represented.In EAV model, it stores a single component. The EAV tables are also described as long and skinny in which the long strategies describe a specific number of rows while the skinny description defines the number of th e columns (Michael, 2009). Data in EAV table is recorded and retrieved in three columns, entity, the parameters and the values. The entity colum defines the item description and the parameter column defines the attribute characters for instance, name, and ID and the value define the attributes.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.