You are on page 1of 4

Answer grid A

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 B A C A B B A C D D F F T T T T F T F T

Answer grid B
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 A C B D A C A C D C T F T T T F F T T T

Q-What makes data mining an important business tool? What types of information does data mining produce? In what type of circumstance would you advise a company to use data mining? Answer: Data mining is one of the data analysis tools that helps users make better business decisions and is one of the key tools of business intelligence. Data mining allows users to analyze large amounts of data and find hidden relationships between data that otherwise would not be discovered. For example, data mining might find that a customer that buys product X is ten times more likely to buy product Y than other customers. Data mining finds information such as: Associations or occurrences that are linked to a single event. Sequences, events that are linked over time. Classification, patterns that describe the group to which an item belongs, found by examining existing items that have been classified and by inferring a set of rules. Clusters, unclassified but related groups. I would advise a company to use data mining when they are looking for new products and services, or when they are looking for new marketing techniques or new markets. Data mining might also be helpful when trying to analyze unanticipated problems with sales whose causes are difficult to identify. Q-You have been hired by a tax preparation firm to set up a network connecting several new branches in a metropolitan area. What type of network hardware and transmission media will you choose and why? Answer: Because of security issues, I wouldn't choose wireless transmission. The offices themselves can each have an Ethernet-based LAN, and they can connect to each other and to an Intranet via a secure, encrypted VPN over the Internet. Network hardware anticipated is: coaxial cable, network server, a switch. Because the LANs will be connected through a VPN, a router may not be needed. In anticipation of the need for a lot of data transmission, the connection to the Internet will be through cable modems. A firewall, or several, for security purposes is anticipated.

Q-Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least five Internet security challenges. Answer: Large public networks, including the Internet, are more vulnerable because they are virtually open to anyone and because they are so huge that when abuses do occur, they can have an enormously widespread impact. When the Internet becomes part of the corporate network, the organization's information systems can be vulnerable to actions from outsiders. Computers that are constantly connected to the Internet via cable modem or DSL line are more open to penetration by outsiders because they use a fixed Internet address where they can be more easily identified. The fixed Internet address creates the target for hackers. To benefit from electronic commerce, supply chain management, and other digital business processes, companies need to be open to outsiders such as customers, suppliers, and trading partners. Corporate systems must be extended outside the organization so that employees working with wireless and other mobile computing devices can access them. This requires a new security culture and infrastructure, allowing corporations to extend their security policies to include procedures for suppliers and other business partners.

Q- How does packet switching work? Answer: Packet switching is a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destinations. Packet switching makes much more efficient use of the communications capacity of a network than did circuit-switching. In packet-switched networks, messages are first broken down into small fixed bundles of data called packets. The packets include information for directing the packet to the right address and for checking transmission errors along with the data. The packets are transmitted over various communications channels using routers, each packet traveling independently. Packets of data originating at one source will be routed through many different paths and networks before being reassembled into the original message when they reach their destinations. Q-How are RFID systems used in inventory control and supply chain management? Answer: In inventory control and supply chain management, RFID systems capture and manage more detailed information about items in warehouses or in production than bar coding systems. If a large number of items are shipped together, RFID systems track each pallet, lot, or even unit item in the shipment. This technology may help companies improve receiving and storage operations by enhancing their ability to "see" exactly what stock is stored in warehouses or on retail store shelves. Q-What are the differences between data mining and OLAP? When would you advise a company to use OLAP? Answer: Data mining uncovers hidden relationships and is used when you are trying to discover data and new relationships. It is used to answer questions such as: Are there any product sales that are related in time to other product sales? In contrast, OLAP is used to analyze multiple dimensions of data and is used to find by month and geographical region, and how did those sales compare to sales forecasts? Data warehouses support multidimensional data analysis, also known as online analytical processing (OLAP), which enables users to view the same data in different ways using multiple dimensions. Each aspect of information represents a different dimension. OLAP represents relationships among data as a multidimensional structure, which can be visualized as cubes of data and cubes within cubes of data, enabling more sophisticated data analysis. OLAP enables users to obtain online answers to ad hoc questions in a fairly rapid amount of time, even when the data are stored in very large databases. Online analytical processing and data mining enable the manipulation and analysis of large volumes of data from many perspectives, for example, sales by item, by department, by store, by region, in order to find patterns in the data. Such patterns are difficult to find with normal database methods, which is why a data warehouse and data mining are usually parts of OLAP. OLAP represents relationships among data as a multidimensional structure, which can be visualized as cubes of data and cubes within cubes of data, enabling more sophisticated data analysis. Q-

Q- VPN Question 28 in type A, pic see ch 7 slid 3.22,323 Virtual private networks are secure, encrypted, private networks that have been configured within a public network to take advantage of the economies of scale and management facilities of large networks, such as the Internet. VPNs are low-cost alternatives to private WANs. VPNs give businesses a more efficient network infrastructure for combining voice and data networks.

Q- Define and explain the difference between intranets and extranets. Explain how they provide value to businesses. Web technology and Internet networking standards provide the connectivity and interfaces for internal private intranets and private extranets that can be accessed by many different kinds of computers inside and outside the organization. Intranet is an internal (private) organizational network that provides access to data across the enterprise and is protected from public users by firewalls. It uses the existing company network infrastructure along with Internet connectivity standards and software developed for the World Wide Web. Intranets create networked applications that can run on many different kinds of computers throughout the organization, including mobile handheld computers and wireless remote access devices. Extranet is an intranet that is restricted to an organization and authorized outside users like customers and suppliers. A company uses firewalls to ensure that access to its internal data is limited and remains secure. Both intranets and extranets reduce operational costs by providing additional connectivity for coordinating disparate business processes within the firm and for linking electronically to customers and suppliers. Extranets often are employed for collaborating with other companies for supply chain management, product design and development, and training efforts. Q- Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least five Internet security challenges. Answer: Large public networks, including the Internet, are more vulnerable because they are virtually open to anyone and because they are so huge that when abuses do occur, they can have an enormously widespread impact. When the Internet becomes part of the corporate network, the organization's information systems can be vulnerable to actions from outsiders. Computers that are constantly connected to the Internet via cable modem or DSL line are more open to penetration by outsiders because they use a fixed Internet address where they can be more easily identified. The fixed Internet address creates the target for hackers. To benefit from electronic commerce, supply chain management, and other digital business processes, companies need to be open to outsiders such as customers, suppliers, and trading partners. Corporate systems must be extended outside the organization so that employees working with wireless and other mobile computing devices can access them. This requires a new security culture and infrastructure, allowing corporations to extend their security policies to include procedures for suppliers and other business partners.

You might also like