Essay Available:
You are here: Home → Essay → Technology
Pages:
1 page/≈275 words
Sources:
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:
Data Transformation (Essay Sample)
Instructions:
The paper was covering aspects and concepts of data communication. It basically dealt with how you convert the data to information that could be used by different stakeholders.
source..Content:
1.Describe how data is transformed into information and how information is transformed into knowledge. Provide examples of how software supports these transformations.
Data refers to facts, opinions and other materials that are collected in the field to be used for analysis in order to gather relevant information. Data is transformed through processing which can be in form of sorting, calculating, organizing or other methods. The information that is got is put in books or other sources after which it is documented for knowledge. This knowledge is used to make decisions since it is a set of existing facts. This knowledge can be used to make new discoveries (Hayes-Roth, Waterman & Lenat, 1983; Langley, Simon, Bradshaw & Sytkow, 1987).
2. Describe cloud computing.  Explain three advantages and disadvantages for organizations that choose to use cloud computing versus owning and installing the software.
Cloud computing is a term used to refer to a process where a program or applications operates on a connected server which is not in the local area network using the internet. All data may also be stored in the cloud which is assumed to have unlimited storage. The advantages of cloud computing is that it is a cost efficient method to use, maintain and upgrade. In other words it is convenient since you can access data at your own will as long as there is an internet connection.
It can also be used as a back-up of the information that is in the local area networks as it is secure and free from interruptions.
The use of cloud computing is user and environmental friendly. This is because it uses very few resources from the environment.
The disadvantages of Cloud Computing are as described below.
Cloud computing is often associated with security breaches and weaknesses. In case the server is tampered or compromised, then a lot of personal and corporate data is compromised and susceptible to loss and fraud.
Clouds computing usually have storage limiting capacities. This can be a setback especially to both big and medium enterprises.
Technical issues and low speeds when uploading large documents is another hitch. These may be caused by slow networks or non-responding servers. This is also affected by the limited features in the cloud.
3. Explain the Five-Component Framework. Using Starbucks, explain how each component is used, be detailed
The 5 components that are used in information system are as explained below: 1.Hardware: this refers to the physical elements of computing and includes the central processing unit (CPU), the monitor and all of its support equipments. Input, output and storage devices are also included. 2. Software: This refers to computer programs or applications that are used by the computer. They are a set of instructions that perform various functions as directed by the programmers. 3. Data: Data refers to facts are used by programs to produce useful information. It also refers to unprocessed and raw facts that has only been collected from the field but has not been modified.4. Procedures: Procedures are the policies that govern the operation of a computer system. These enable the functioning between the hardware and the computer software.5. People: This refers to individual persons who make it happen. This means that they operate the whole functioning of the system, then they table the results produced by the computer for making decisions.
4. Describe why relational databases are more efficient AND effective for data management in organizations. How does the task of restructuring the data help to achieve these goals?
Relational databases can process ad-hoc queries. These can be used to provide system reports that can be relied upon in terms of the data being managed within the organization.
There is also object storage. This is done by creating a data representation of the object – because relational databases only store data. To retrieve the object you would read the data from the database and then create the object, often referred to as restoring the object, based on that data. To store objects successfully in relational databases you need to learn how to map the schema of the object to the relational schema of the database.
With a relational database you can implement some behavior within the database. This is done through stored procedures and/or stored functions that can be invoked internally within the database and often by external applications.
There is concurrency control in terms of the way that the data is organized and input into the database with minimal or no repetitions at all.
Restructuring the data is achieved by through the following:
1 Transaction control. A transaction is a collection of actions on your database which form a work unit.Â
2 Enforcing referential integrity. This is the assurance that a reference from one entity to another entity is valid. This ensures that the data in the tables is well organized and easier to operate on. This is done with the help of primary keys within the tables in the database.
5. Why is the security essential to the overall system plan for an organization? How do IS managers ...
Data refers to facts, opinions and other materials that are collected in the field to be used for analysis in order to gather relevant information. Data is transformed through processing which can be in form of sorting, calculating, organizing or other methods. The information that is got is put in books or other sources after which it is documented for knowledge. This knowledge is used to make decisions since it is a set of existing facts. This knowledge can be used to make new discoveries (Hayes-Roth, Waterman & Lenat, 1983; Langley, Simon, Bradshaw & Sytkow, 1987).
2. Describe cloud computing.  Explain three advantages and disadvantages for organizations that choose to use cloud computing versus owning and installing the software.
Cloud computing is a term used to refer to a process where a program or applications operates on a connected server which is not in the local area network using the internet. All data may also be stored in the cloud which is assumed to have unlimited storage. The advantages of cloud computing is that it is a cost efficient method to use, maintain and upgrade. In other words it is convenient since you can access data at your own will as long as there is an internet connection.
It can also be used as a back-up of the information that is in the local area networks as it is secure and free from interruptions.
The use of cloud computing is user and environmental friendly. This is because it uses very few resources from the environment.
The disadvantages of Cloud Computing are as described below.
Cloud computing is often associated with security breaches and weaknesses. In case the server is tampered or compromised, then a lot of personal and corporate data is compromised and susceptible to loss and fraud.
Clouds computing usually have storage limiting capacities. This can be a setback especially to both big and medium enterprises.
Technical issues and low speeds when uploading large documents is another hitch. These may be caused by slow networks or non-responding servers. This is also affected by the limited features in the cloud.
3. Explain the Five-Component Framework. Using Starbucks, explain how each component is used, be detailed
The 5 components that are used in information system are as explained below: 1.Hardware: this refers to the physical elements of computing and includes the central processing unit (CPU), the monitor and all of its support equipments. Input, output and storage devices are also included. 2. Software: This refers to computer programs or applications that are used by the computer. They are a set of instructions that perform various functions as directed by the programmers. 3. Data: Data refers to facts are used by programs to produce useful information. It also refers to unprocessed and raw facts that has only been collected from the field but has not been modified.4. Procedures: Procedures are the policies that govern the operation of a computer system. These enable the functioning between the hardware and the computer software.5. People: This refers to individual persons who make it happen. This means that they operate the whole functioning of the system, then they table the results produced by the computer for making decisions.
4. Describe why relational databases are more efficient AND effective for data management in organizations. How does the task of restructuring the data help to achieve these goals?
Relational databases can process ad-hoc queries. These can be used to provide system reports that can be relied upon in terms of the data being managed within the organization.
There is also object storage. This is done by creating a data representation of the object – because relational databases only store data. To retrieve the object you would read the data from the database and then create the object, often referred to as restoring the object, based on that data. To store objects successfully in relational databases you need to learn how to map the schema of the object to the relational schema of the database.
With a relational database you can implement some behavior within the database. This is done through stored procedures and/or stored functions that can be invoked internally within the database and often by external applications.
There is concurrency control in terms of the way that the data is organized and input into the database with minimal or no repetitions at all.
Restructuring the data is achieved by through the following:
1 Transaction control. A transaction is a collection of actions on your database which form a work unit.Â
2 Enforcing referential integrity. This is the assurance that a reference from one entity to another entity is valid. This ensures that the data in the tables is well organized and easier to operate on. This is done with the help of primary keys within the tables in the database.
5. Why is the security essential to the overall system plan for an organization? How do IS managers ...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Innovations in technology: 21st century InnovationsDescription: Innovations in technology Technology Essay...2 pages/≈550 words| APA | Technology | Essay |
- Transportation corridors in North AmericaDescription: A transportation corridor is a linear space or tract of land occupied by one main and developed transportation system that tends to connect major transport destinations such as cities...3 pages/≈825 words| APA | Technology | Essay |
- Second Language LearningDescription: With recent development in computer technologies, second language teachers have adopted latest technologies to aid students in the learning process...4 pages/≈1100 words| APA | Technology | Essay |