Documente Academic
Documente Profesional
Documente Cultură
Big data
What many people dont know is that beyond their online presence on Facebook,
YouTube and Google there is a vast wealth of knowledge waiting to be discovered. This
information is commonly referred to as big data, and is largely inaccessible to
conventional web users.
What is big data?
The term big data refers to the part of the internet that is not indexed by regular search
engines. Search engines like Google or Yahoo! are actually web spiders. When you type
in a search term, the web spiders crawl through trails of hyperlinks and give you an index
of pages. This works well for searching the surface of the web, but the internet goes
much deeper, and there are many places that web spiders cannot enter.
What web crawlers are able to access is really only the tip of the iceberg, and no one
knows for sure how deep the iceberg goes. Most of big data is raw data that does not
include the hyperlinks that web spiders rely on to index sites. Library databases, websites
that password protected or have time-limited access, private networks of organizations,
and websites that are new are all excluded from search engine results. These pages are
not necessarily inaccessible, but a typical web user is not aware of their existence, or
where to find them, so they do not have access to the sites.
http://www.brightplanet.com/2012/06/what-is-big-data/
http://www.brightplanet.com/2012/06/structured-vs-unstructured-data/
Chapter 4
Many Web sites today have more than one hundred tracking programs
(bugs) on their home page.
5 moral dimensions of the information age
Spyware
Surreptitiously (Secretly) installed on users computer
May transmit users keystrokes or display unwanted ads
Chapter 6
File org concepts - database
Attribute apa, hierarchy
Problem with traditional file environment
Logical vs physical data?
Relational database management system
Differentiate DBMS and ..
Operations of a relational DBMS - select, join, project
Normalization
What is data warehouse, datamarts? Differentiate it? Discuss?
What is data mining, web mining
Chapter 7 - Telecommunication
Circuit and Packet switching - differentiate
Packet switching
Method of slicing digital messages into parcels
(packets), sending packets along different
communication paths as they become available, and
then reassembling packets at destination
Previous circuit-switched networks required assembly
of complete point-to-point circuit
Packet switching more efficient use of networks
communications capacity
Data are grouped into small packets, which are transmitted independently over various
communications
channels and reassembled at their final destination.
P. 18 layers
TCP/IP
Network, internet, transport, application layer
Note that what happens, when computer A sends a message to computer B, is that
the data that computer A creates is transferred within that computer from the
application layer to subsequent layers in sequence.
In this process it is split into packets, and information is added at each stage,
ultimately translating the packets into a form that can be transferred over the
network interface. After traveling over the network interface, the packets are
reassembled at the recipient computer, from the network interface layer up,
ultimately for use by the application layer.
P. 20 WAN, LAN
Types of networks
Local-area networks (LANs)
Ethernet
Client/server vs. peer-to-peer
Wide-area networks (WANs)
Metropolitan-area networks (MANs)
Campus area networks (CANs)
http://www.diffen.com/difference/LAN_vs_WAN
What is a LAN?
Local area networks (LANs) allow computers and devices that are near each other
and usually making use of the same switch or router to connect to share files and
complete tasks. Consisting only of everyday devices (e.g., desktops, laptops, tablets,
printers), router and/or switch, and Ethernet cables or wireless cards, LANs are
relatively inexpensive to set up and are commonly used in homes.
Ethernet cables, like the Cat5, Cat5e, and Cat6 and Cat6a, can be used to physically
connect computers to the network. In the instances where fiber-to-the-home (or
similar) is available, copper cabling may also be used at some point. Wi-Fi has
become one of the most popular methods for wireless networking over a local
network.
What is a WAN?
A wide area network (WAN) is used to connect computers that are not close to one
another. It is possible and almost always the case that LANs are connected to
WANs. This enables small home or office networks to connect to wider networks,
such as those across state or country lines. Most WANs connect through public
networks, like the telephone system, or via leased lines. The Internet, which connects
computers all around the world, can be considered the largest WAN in existence.
A router is a more sophisticated device than a switch. Traditional routers are designed to
join multiple area networks (LANs and WANs). Routers serve as intermediate
destinations for network traffic. They receive TCP/IP packets, look inside each packet to
identify the source and target IP addresses, then forward these packets as needed
toensure the data reaches its final destination.
A network switch is a small hardware device that joins multiple computers together
within one local area network (LAN). Switches are incapable of joining multiple
networks or sharing an Internet connection. A home network with a switch must
designate one computer as the gateway to the Internet, and that device must possess two
network adapters for sharing, one for the home LAN and one for the Internet WAN. With
a router, all home computers connect to the router equally, and it performs the equivalent
gateway functions.
A VoIP phone call digitizes and breaks up a voice message into data packets that may
travel along different routes before being reassembled at the final destination. A processor
nearest the calls destination, called a gateway, arranges the packets in the proper order
and directs them to the telephone number of the receiver or the IP address of the receiving
computer.
Definitions
data
raw facts
information
collection of facts organized in such a way that they have value
beyond the facts themselves
hardware
software
database
telecommunications
people
procedures
includes the strategies, policies, methods and rules for using the
CBIS; procedures for operations, maintenance, security
Organization
value chain
organizational culture
organizational change
technology diffusion
technology infusion
competitive advantage
Specification
Types of computers
Hand-held
Portable (Laptop, Notebook, Tablet)
Thin Client
Desktop
Workstation
Servers
Mainframes
Supercomputers
Input devices
Keyboard
Mouse
Other Pointing Devices
Wireless pointer
Touch pad
Track ball
Microphone
Digital Camera
Scanner
Touch sensitive screens
Bar-Code Scanners
Optical Data Readers
Point-of-Sale (POS) Devices
Magnetic Ink Character Recognition (MICR) Devices
Hardware (types)
Input devices
Output devices
Processing hardware
Storage devices
Hardware (output)
Monitors
Printers
Plotters
Speakers
Monitors
Screen Size
Resolution
Dot Pitch
Printers
Laser
Ink-jet
Dot Matrix
Ram
Rom
Types of processing
What is software?
System software
Application software
Manipulating Data
Data Warehouse
a database that collects business information from many sources
in the enterprise, covering all aspects of the company's
processes, products, and customers.
Data Mart
Data Mining
Business Intelligience
Competitive intelligience
Counterintelligience
the steps an organization takes to protect information sought by
"hostile" intelligence gatherers
Knowledge Management
Font
Font size (point size)
Font color
Bold Italicize Underline Strikethrough Superscript/ subscript
Alignment
Indentations
Left, Double, First, or hanging indent
Tabs
Line Spacing
Table
Database
Primary Key
Foreign Key