BCOR 2205 final
BCOR 2205 final what are the 4 V's of data? Velocity, veracity, volume, variety Velocity the analysis of streaming data as it travels around the internet veracity the uncertainty of data, including biases, noise, and abnormalities; the untrustworthiness of data volume the scale of data variety different forms of structured and unstructured data big data a collection of large, complex data sets, including structure & unstructured data, which cannot be analyzed using traditional database methods and tools data raw facts that describe the characteristics of an event or object (order date, amount sold, customer #) information data converted into a meaningful and useful context (best selling product, best customer, worst selling product, etc.) Business Intelligence information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making (best selling product by month compared to sports seasons and city team wins & losses) knowledge the skills, experience, and expertise coupled with information and intelligence that create a person's intellectual resources (choosing not to fire a sales rep who is underperforming, knowing that person is experiencing family problems) regression model a statistical process for estimating the relationships among variables (predicting the winners of a marathon based on gender, hight, weight, hours of training) optimization model a statistical process that finds the way to make a design, system, or decision as effective as possible (choose a combination of projects to maximize overall earnings) forecasting model predictions based on time-series information, allowing users to manipulate the time series for forecasting activities classification analysis assigns records to one of a predefined set of classes estimation analysis determines values for an unknown continuous variable behavior or estimated future value affinity grouping analysis determines which things go together clustering analysis segments a heterogenous population of records into a number of more homogenous subgroups data mining the process on analyzing data to extract information not offered by the raw data alone data profiling the process of collecting statistics and information about data in an existing source descriptive analytics use techniques that describe past performance history predictive analytics use techniques that extract information from data to predict future trends and identify behavioral patterns prescriptive analytics use techniques to create models indicating the best decision to make or course of action to take structured data stored in a traditional system such as a relational database or spreadsheet unstructured data not defined and does not follow a specific format internet of things (IoT) a world where interconnected internet-enabled devices or things have the ability to collect and share data without human intervention collaboration outside the organization Crowdsourcing and Crowdfunding blog an online journal that allows users to post their own comments, graphics, and video wiki collaborative website that allows users to add, remove, and change content (wikipedia) mashup content from more than one source to create a new product or service (zilow) Digital Subscriber Line (DSL) provides high speed digital data transmission over standard telephone lines using broadband modem technology bandwidth the maximum amount of data that can pass from one point to another in a unit of time broadband A high-speed Internet connection that is always connected Wireless Fidelity (Wi-Fi) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves packet a single unit of binary data routed through a network worm a type of virus that spreads itself, not only from file to file, but also from computer to computer malware software that is intended to damage or disable computers and computer systems adware software that allows internet advertisers to display advertisements without the consent of the computer user spyware a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission ransomware a form of malicious software that infects your computer and asks for money scareware a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software downtime refers to a period of time when a system if unavailable information secruity the protection of information from accidental or intentional misuse by person inside or outside the organization black-hat hacker breaks into other people's computer systems and may just look around or may steal and destroy information crackers have criminal intent when hacking cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction Hactivists have philosophical and political reasons for breaking into systems and will often deface the website as a protest script kiddie find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses white-hat hacker work at the request of the system owners to find system vulnerabilities and plug the holes phishing type of fraud in which an attacker tricks the victims into providing person or private information via email or instant message pharming seeks to obtain personal or private information through domain spoofing or redirecting the user to a different website first line of defense people second line of defense technology biometrics
Written for
- Institution
- BCOR 2205
- Course
- BCOR 2205
Document information
- Uploaded on
- May 1, 2024
- Number of pages
- 9
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
bcor 2205 final what are the 4 vs of data veloc
Also available in package deal