Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Describe how the chosen knowledge system (beyond those discussed by your peers) can improve an organization or a department within an organization.
Create the basic design for the research DBMS that you propose including the main tables in the database, using Microsoft Word Shapes.
Which DBMS Architecture would you choose from Section 2.5? Why? Why would the other architectures not be a good choice?
Using search engines and find two different recent articles involving data mining. Describe the role of data mining in the story using your own words.
What is knowledge discovery in databases (KDD)? Note how data mining integrates with the components of statistics and AL, ML, and Pattern Recognition.
Using data governance techniques like data cleansing and de-duplication. Why is this effort necessary? Briefly explain and support from your readings.
Organizations struggling to reduce and right-size their information foot-print using data governance technique like data cleansing. Why is the effort necessary?
Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential for really messing things up.
Was Napster responsible for the actions of its users? Why did the court find in favor of Diamond in the Rio case? What is Digital Rights Management?
Develop a Data model for the above scenario in NoSQL. Write a program (in python, java, javascript-based UI, visual studio) that connects to a NoSQL database.
Give a working definition of Data Washing Machines (DWM) from your perspective. Propose a conceptual framework on DMW's.
Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had victim organization deployed these technologies.
Write a cursor to loop the set of records and perform the data update. Write a select statement using Common Table Expressions (CTE).
What NIST Is and how it should be used by a DBA: 500 words. Creating Database security cultures advantages methodologies: 200 words.
Discuss the challenges that the organization have with a particular business problem around data mining.
Identify at least two relationship strength types that can be used within the entity relationship model.
Explain in 500 words or more what is NIST (National Institute of Standards and Technolog) and how it should be used by a dba.
Discuss efficient Disaster Recovery for Databases essay with proper references from Danforth library.
What is the Document Object Model? What is the principle of containership and how does it apply to JavaScript?
What is/are the datasets you are using? Where can we get them (publicly available (URL) or company data)?
Describe your understanding of big data and give an example of how you've seen big data used either personally or professionally.
Requirement structuring - Process modelling: Draw a DFD diagram (all the possible level) based on the identified function requirements.
How does data and classifying data impact data mining? Explain what an anomaly is and how to avoid it. Discuss methods to avoid false discoveries.
Analyze the visualization within the context of the data visualization workflow. Create a proposal of enhancements to create a better user/viewer experience.