How does data visualization use database technology

Assignment Help Management Information Sys
Reference no: EM131233925

Information systems in organizations week 4 discussion board

Part A

Please I need good and quality answers. Also please I want good citation and good references. I want it in APA format.

This week we're talking about Databases and Data Security. Database technologies are foundational to practically all modern systems. To understand how the systems work it is helpful to understand about the underlying technologies on which nearly all of them depend.
In IFSM 201 there is also a section on Security, but that is about how to keep yourselfsafe in an increasingly dangerous world. This class differs, since we must consider Security in the broader context of organizations.
Databases Questions:

A. What is data visualization?
B. What effects might poor information have on a data visualization project?
C. How does data visualization use database technology?
D. How could a business use data visualization to identify new trends?
E. Is data visualization a form of business intelligence? Why or why not?

PART B

I need a reply/response to these discussion board answers. Just read the discussion board answers, and respond to the information you read by also adding your own point of information about the topic to each discussion board answers. Just three to five Lines response each. Please I need good and quality response to these discussion board answers

LaminSesay

What might happen to a data visualization project if it failed to cleanse or scrub its data?

Data scrubbing, also called data cleansing, is the process of cleaning Updating and Using data scrubbing tool can save a database administrator a significant amount of time. And this can remove data that are incorrect, improperly formatted, incomplete, or duplicated in a database.The organization might use a data scrubbing tool to systematically examine data for flaws by using rules, a data-intensive field like banking, insurance, retailing, telecommunications, or transportation.Data scrubbing programs include such programs that will correct some any type of mistakes.

Kristy Johnson

What are the five characteristics of high-quality information? Consider the needs of users at different levels of the organization. Which characteristics are of the most importance to users at each level? Do the most important data quality characteristics change or not, as you move "up" or "down" the management chain?

The characteristics of high quality information include accuracy, completeness, timeliness, uniqueness, validity and consistency. The information in a system is more important than the system itself. If information is found to be incorrect or unreliable, the system will not be trusted and people will discontinue using it.

Different people will operate in different roles of maintaining the integrity of the database. Managers of departments are required to work collaboratively with IT specialists and developers to support a good data stewardship program. As data is collected and recorded on a large scale, the lower level employees will refine the data and deliver it to upper management for strategic planning and decision making purposes.
Geiger, J. G. (n.d.). Data Quality Management The Most Critical Initiative You Can Implement. Retrieved September 27, 2016, from https://www2.sas.com/proceedings/sugi29/098-29.pdf

Kendall Lollis

What are the advantages and disadvantages of having a normalized data base design? Are there circumstances where you would NOT want to normalize your database?

According to the course text, the simple way to understand what a normalized data base is that it is designed in a way that "1) reduces duplication of data between tables and 2) gives the table as much flexibility as possible" (Bourgeois, 2014). This creates an efficient organizational structure.

Some of the advantages to having a normalized data base design are data that is grouped logically and have reduced duplication. Some of the disadvantages of having a normalized data base design are that having a normalized data base containing a lot of joins and tables slows it down (Chester, 2016). Normalized databases that are well made and efficient can also be difficult and complex to create (Chappel, 2016).
Classle suggests that a circumstance when you would not want to normalize your database would be on smaller computers.

"Denormalization" could be used on mobile devices and cash registers to improve performance "since these may use the data for look-up only" or for quick look-ups without changes being made (Classle).

Bourgeois, D. T., Ph.D. (Ed.). (2014). Information Systems for Business and Beyond. Retrieved September 30, 2016.

Chappel, M. (2016). Should I Normalize My Database? Retrieved September 30, 2016.

Chester, A. (2016). Advantages & Disadvantages of Normalizing a Database | Techwalla.com. Retrieved September 30, 2016.

Classle. (n.d.). Denormalization. Retrieved September 30, 2016.

Arthur Jackson

Is data loss or data theft the bigger threat?

YES-In an age in which data can move about in the blink of an eye and mobile devices take on many forms, corporations are more at risk of losing sensitive data than ever. Large security breaches from professional hackers aside, an increasingly critical concern for industry is the risk factor associated with employees themselves. The growth in information leaks through employee negligence or malice is becoming a key conversation piece in risk discussions. A recently published global study by Symantec makes it clear that the risk is significant. The study indicates that a large number of employees are now moving and storing corporate information off premises. Half of employees surveyed say they transfer work documents to their home computers using less secure personal accounts such as Gmail. Data theft is a growing problem for individual computer users as well as large corporations and organizations. Data theft occurs both outside and inside companies, and reducing the risk of insider data theft at the corporate level is anything but easy. This is especially true because system administrators and employees have access to technology such as database servers, desktop computers, and external devices including USBs, smart phones, and other removable and mobile devices.

Reference no: EM131233925

Questions Cloud

What is role and responsibility of chief analytics officer : What is the role and responsibility of a chief analytics officer (CAO) in an organization?
Advocate trade barriers and often oppose imports : Unions in developed countries advocate trade barriers and often oppose imports from low-wage countries to protect jobs from what they characterize as "unfair' import competition. Is such competition truly "unfair"?
Find the fraction of the inlet flow that comes out at 0?c. : The tube has no external heat transfer and no work, and all the flows are steady and have negligible kinetic energy. Find the fraction of the inlet flow that comes out at 0?C. Is this setup possible?
Results of external environmental scan findings in analysis : Use the environmental analysis for toyota company. Create a 10- to 12-slide presentation including detailed speaker notes in which you include the following: Examine the results of the internal environmental scan findings in the analysis. Examine the..
How does data visualization use database technology : What are the five characteristics of high-quality information? Consider the needs of users at different levels of the organization. Which characteristics are of the most importance to users at each level? Do the most important data quality charac..
State your personal definition of service : State your personal definition of service, and give an example of a time when you received quality service and an example of when you did not receive quality service. Determine what they could have done to correct the quality of service.
Determine specific heat transfer and the specific work : Assume that an actual compressor has the same exit pressure and specific heat transfer as the ideal isothermal compressor in Problem 7.27, with an isothermal efficiency of 80%. Find the specific work and exit temperature for the actual compressor.
Minimize expected total overage and shortage costs : PEC is a manufacturer of party hats and costumes. 80% of its yearly sales occur over a 6-week period. One of its popular products is the Elvis wig. The wig is produced in China so PEC must make a single order well in advance of the upcoming season. H..

Reviews

Write a Review

Management Information Sys Questions & Answers

  How many servers total are needed

The Windows Server 2012 operating system should be used for all aspects of the solution. How many servers total are needed? Which roles will be combined

  Contrast two major erp systems from different erp software

Create a 7- to 10- slide presentation comparing and contrasting two major ERP systems from different ERP software providers.

  Specific innovation of the airmouse technology

Specific innovation of the airmouse technology, Potential risks in using this technology for an organization, How this technology can be 'integrated' in the organization

  Graph supply and demand functions to find equilibriumch 3

graph supply and demand functions to find equilibriumch. 3 study question 7b economics principles problems and policies

  Discuss the purpose and goals of the project

Reach consensus about (or impose) a structure, make sure everyone in your group signs on to your decision making process. Get each member's signature on a document that states individual responsibilities to the group and the consequence for not me..

  What would the pros and cons be of dedicated private fleet

What would the pros and cons be of using each technique listed below, Distribution center, Public warehouse, Third-party logistics

  Encryption methods for the available electronic services

You have been charged with the task of providing a report about the necessity of using encryption methods for the available electronic services to achieve a higher security level

  Supply chain managementjackson health system is located in

supply chain managementjackson health system is located in miami-dade county a highly populated approximately 2.253

  Describe the most effective advanced filtering

Describe the most effective advanced filtering and search interface. Argue why the interface you chose is more effective than others, and describe who benefits most from the interface you are describing.

  How customer-driven business involves and affects scm

Write a 2- to 3-page paper or develop a Microsoft PowerPoint presentation to use that information to present how the various aspects of customer-driven business involves and affects SCM, CRM, and ERP systems

  Design an appropriate network

Define the requirements and then design an appropriate network that would support this merged law firm.  Your paper should:Analyze the case given and must provide a clear set of requirements for the network solution Identify the information that is t..

  Explain activities required to develop the tracking system

Explain the activities required to develop the tracking system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd