Answer grid A Answer grid B 1 B 1 A 2 A 2 C 3 C 3 B 4 A 4 D 5 B 5 A

advertisement
Answer grid A
Answer grid B
1
B
1
A
2
A
2
C
3
C
3
B
4
A
4
D
5
B
5
A
6
B
6
C
7
A
7
A
8
C
8
C
9
D
9
D
10
D
10
C
11
F
11
T
12
F
12
F
13
T
13
T
14
T
14
T
15
T
15
T
16
T
16
F
17
F
17
F
18
T
18
T
19
F
19
T
20
T
20
T
Q-What makes data mining an important business tool? What types of information does
data mining produce? In what type of circumstance would you advise a company to use
data mining?
Answer: Data mining is one of the data analysis tools that helps users make better business
decisions and is one of the key tools of business intelligence. Data mining allows users to
analyze large amounts of data and find hidden relationships between data that otherwise would
not be discovered. For example, data mining might find that a customer that buys product X is
ten times more likely to buy product Y than other customers.
Data mining finds information such as:
•
Associations or occurrences that are linked to a single event.
•
Sequences, events that are linked over time.
•
Classification, patterns that describe the group to which an item belongs, found by
examining existing items that have been classified and by inferring a set of rules.
•
Clusters, unclassified but related groups.
I would advise a company to use data mining when they are looking for new products and
services, or when they are looking for new marketing techniques or new markets. Data mining
might also be helpful when trying to analyze unanticipated problems with sales whose causes are
difficult to identify.
Q-You have been hired by a tax preparation firm to set up a network connecting several
new branches in a metropolitan area. What type of network hardware and transmission
media will you choose and why?
Answer: Because of security issues, I wouldn't choose wireless transmission. The offices
themselves can each have an Ethernet-based LAN, and they can connect to each other and to an
Intranet via a secure, encrypted VPN over the Internet. Network hardware anticipated is: coaxial
cable, network server, a switch. Because the LANs will be connected through a VPN, a router
may not be needed. In anticipation of the need for a lot of data transmission, the connection to
the Internet will be through cable modems. A firewall, or several, for security purposes is
anticipated.
Q-Discuss the issue of security challenges on the Internet as that issue applies to a global
enterprise. List at least five Internet security challenges.
Answer: Large public networks, including the Internet, are more vulnerable because they are
virtually open to anyone and because they are so huge that when abuses do occur, they can have
an enormously widespread impact. When the Internet becomes part of the corporate network, the
organization's information systems can be vulnerable to actions from outsiders. Computers that
are constantly connected to the Internet via cable modem or DSL line are more open to
penetration by outsiders because they use a fixed Internet address where they can be more easily
identified. The fixed Internet address creates the target for hackers. To benefit from electronic
commerce, supply chain management, and other digital business processes, companies need to
be open to outsiders such as customers, suppliers, and trading partners. Corporate systems must
be extended outside the organization so that employees working with wireless and other mobile
computing devices can access them. This requires a new security culture and infrastructure,
allowing corporations to extend their security policies to include procedures for suppliers and
other business partners.
Q- How does packet switching work?
Answer: Packet switching is a method of slicing digital messages into parcels called packets,
sending the packets along different communication paths as they become available, and then
reassembling the packets once they arrive at their destinations. Packet switching makes much
more efficient use of the communications capacity of a network than did circuit-switching. In
packet-switched networks, messages are first broken down into small fixed bundles of data
called packets. The packets include information for directing the packet to the right address and
for checking transmission errors along with the data. The packets are transmitted over various
communications channels using routers, each packet traveling independently. Packets of data
originating at one source will be routed through many different paths and networks before being
reassembled into the original message when they reach their destinations.
Q-How are RFID systems used in inventory control and supply chain management?
Answer: In inventory control and supply chain management, RFID systems capture and manage
more detailed information about items in warehouses or in production than bar coding systems.
If a large number of items are shipped together, RFID systems track each pallet, lot, or even unit
item in the shipment. This technology may help companies improve receiving and storage
operations by enhancing their ability to "see" exactly what stock is stored in warehouses or on
retail store shelves.
Q-What are the differences between data mining and OLAP? When would you advise a company
to use OLAP?
Answer: Data mining uncovers hidden relationships and is used when you are trying to discover
data and new relationships. It is used to answer questions such as: Are there any product sales
that are related in time to other product sales?
In contrast, OLAP is used to analyze multiple dimensions of data and is used to find
by month and geographical region, and how did those sales compare to sales forecasts?
Data warehouses support multidimensional data analysis, also known as online analytical
processing (OLAP), which enables users to view the same data in different ways using multiple
dimensions. Each aspect of information represents a different dimension.
OLAP represents relationships among data as a multidimensional structure, which can be
visualized as cubes of data and cubes within cubes of data, enabling more sophisticated data
analysis. OLAP enables users to obtain online answers to ad hoc questions in a fairly rapid
amount of time, even when the data are stored in very large databases. Online analytical
processing and data mining enable the manipulation and analysis of large volumes of data from
many perspectives, for example, sales by item, by department, by store, by region, in order to
find patterns in the data. Such patterns are difficult to find with normal database methods, which
is why a data warehouse and data mining are usually parts of OLAP. OLAP represents
relationships among data as a multidimensional structure, which can be visualized as cubes of
data and cubes within cubes of data, enabling more sophisticated data analysis.
Q-
Q- VPN Question 28 in type A, pic see ch 7 slid 3.22,323
Virtual private networks are secure, encrypted, private networks that have been configured
within a public network to take advantage of the economies of scale and management facilities
of large networks, such as the Internet. VPNs are low-cost alternatives to private WANs. VPNs
give businesses a more efficient network infrastructure for combining voice and data networks.
Q- Define and explain the difference between intranets and extranets. Explain how they provide
value to businesses.
Web technology and Internet networking standards provide the connectivity and interfaces for
internal private intranets and private extranets that can be accessed by many different kinds of
computers inside and outside the organization.
Intranet is an internal (private) organizational network that provides access to data across the
enterprise and is protected from public users by firewalls. It uses the existing company network
infrastructure along with Internet connectivity standards and software developed for the World
Wide Web. Intranets create networked applications that can run on many different kinds of
computers throughout the organization, including mobile handheld computers and wireless
remote access devices.
Extranet is an intranet that is restricted to an organization and authorized outside users like
customers and suppliers. A company uses firewalls to ensure that access to its internal data is
limited and remains secure.
Both intranets and extranets reduce operational costs by providing additional connectivity for
coordinating disparate business processes within the firm and for linking electronically to
customers and suppliers. Extranets often are employed for collaborating with other companies
for supply chain management, product design and development, and training efforts.
Q- Discuss the issue of security challenges on the Internet as that issue applies to a global
enterprise. List at least five Internet security challenges.
Answer: Large public networks, including the Internet, are more vulnerable because they are
virtually open to anyone and because they are so huge that when abuses do occur, they can have
an enormously widespread impact. When the Internet becomes part of the corporate network, the
organization's information systems can be vulnerable to actions from outsiders. Computers that
are constantly connected to the Internet via cable modem or DSL line are more open to
penetration by outsiders because they use a fixed Internet address where they can be more easily
identified. The fixed Internet address creates the target for hackers. To benefit from electronic
commerce, supply chain management, and other digital business processes, companies need to
be open to outsiders such as customers, suppliers, and trading partners. Corporate systems must
be extended outside the organization so that employees working with wireless and other mobile
computing devices can access them. This requires a new security culture and infrastructure,
allowing corporations to extend their security policies to include procedures for suppliers and
other business partners.
Download