Professional Documents
Culture Documents
Data warehousing is a method of organizing and compiling data into one database,
whereas data mining deals with fetching important data from databases. Data
mining attempts to depict meaningful patterns through a dependency on the data
that is compiled in the data warehouse.
1. Subject Oriented:
2. Integrated:
3. Time-Variant:
4. Nonvolatile:
APPLICATIONS OF DATA WAREHOUSES:
1. Consumer goods
2. Banking services
3. Financial services
4. Manufacturing
5. Retail sectors
DATA MINING:
Data mining uses statistics, artificial intelligence, machine learning systems, and
some databases to find hidden patterns in the data. It supports business-related
queries that are time-consuming to resolve.
Clustering:
It is used to find similarities in data by putting related data together and helping to
identify different variations in the dataset. It helps to find hidden patterns. An
example of clustering is text mining, medical diagnostics, etc.
Association Rules:
They are used to identify a connection of two or more items. For example, if-then
scenarios of items that are frequently purchased in tandem in a grocery store can
calculate the proportion of items that are bought by customers together. Lift,
confidence, and support are techniques used in association rules.
Outlier Detection:
It is used to identify patterns that do not match the normal behavior in the data, as
the outlier deviates from the rest of the data points. It helps in fraud detection,
intrusion, etc. Boxplot and z-score are ways to detect outliers
What exactly is big data?
This is also known as the three Vs.Put simply, big data is larger, more complex data
sets, especially from new data sources.
Velocity Velocity is the fast rate at which data is received and (perhaps) acted on.
Normally, the highest velocity of data streams directly into memory
versus being written to disk.
Variety Variety refers to the many types of data that are available. Traditional
data types were structured and fit neatly in a relational database. With
the rise of big data, data comes in new unstructured data types.
Unstructured and semistructured data types, such as text, audio, and
video, require additional preprocessing to derive meaning and support
metadata.
Product Companies like Netflix and Procter & Gamble use big data to anticipate
development customer demand.
Predictive Factors that can predict mechanical failures may be deeply buried in
maintenance structured data, such as the year, make, and model of equipment, as well as
in unstructured data that covers millions of log entries, sensor data.By
analyzing these indications of potential issues before the problems happen.
Customer
experience
Fraud and Big data helps you identify patterns in data that indicate fraud and aggregate
compliance large volumes of information to make regulatory reporting much faster.
Machine The availability of big data to train machine learning models makes that
learning possible.
Operational With big data, you can analyze and assess production, customer feedback and
efficiency returns, and other factors to reduce outages and anticipate future demands.
Drive Big data can help you innovate by studying interdependencies among
innovation humans, institutions, entities, and process and then determining new ways to
use those data insights.
Data analytics requires a wide range of skills to be performed effectively. these are
the top in-demand data science skills:-
Structured Query Language (SQL), a programming language commonly used for
databases
Statistical programming languages, such as R and Python, commonly used to create
advanced data analysis programs
Machine learning, a branch of artificial intelligence that involves using algorithms to
spot data patterns
Probability and statistics, in order to better analyze and interpret data trends
Data management, or the practices around collecting, organizing and storing data
Data visualization, or the ability to use charts and graphs to tell a story with data
Econometrics, or the ability to use data trends to create mathematical models that
forecast future trends based
Decentralization Centralization
Definition
Flow of Information
Ideal for
Decision-making speed
People Involved
In decentralization, a higher number of people In centralization, only a few handpicked
from each level are involved in the decision- people are involved in the decision-
making process making process
Employee Motivation
Conflict in Decision
Burden
The burden gets shared among many levels Only one group is carrying the burden
Stability
Prone to instability due to multiple conflicting Relatively stable as decisions are made
decisions by a central authority sharing a common
ideology
Data is transferred in the form of bits between two or more digital devices. There
are two methods used to transmit data between digital devices: serial transmission
and parallel transmission. Serial data transmission sends data bits one after another
over a single channel. Parallel data transmission sends multiple data bits at the
same time over multiple channels.
Asynchronous Transmission
Network The LAN is private. The MAN can be The WAN can also be
Ownership Hospitals, homes, both private or both private or public.
schools, offices, etc., public. Many
may own it. organizations and
telecom operators
may own them.
Speed LAN offers a very high MAN offers a WAN offers a low
Internet speed. moderate Internet Internet speed.
speed.
Faulty Tolerance The LAN exhibits a The MAN exhibits a The WAN also exhibits
better fault tolerance lesser fault a lesser fault
than the rest of the tolerance. tolerance.
networks.
Modem
A computer may send and receive data through phone or cable lines with the help of
a modem. In contrast to a telephone line or cable wire, which can only carry analog
data, the data saved on a computer is digital.
The modem’s primary job is to transform digital signals between analog and digital
and vice versa. Combining a modulator and a demodulator creates a modem. When
digital data is sent by the computer, the modulator turns it into analog data. When
analog data signals are received by the computer, they are demodulated into digital
data.
Types of Modem
The direction in which a modem can transfer data, the type of connection it has to
the transmission line, the manner of transmission, etc., are all ways in which it can
be classified.
There are several different types of modems depending on the direction of data
transmission:
Simplex − Using a simplex modem, data can only be transferred from a digital
device to a network (modulator) or from a network to a digital device in one
direction (demodulator).
Half duplex − While a half-duplex modem can transport data in both ways, it
can do so only in one direction at a time.
Full duplex − A full duplex modem may simultaneously send data in both
directions.
RJ45 Connector
Registered Jack 45 is referred to as RJ45. Devices physically connect to Ethernet-
based local area networks using the 8-pin RJ45 connector (LANs). Ethernet is a
technology that specifies LAN setup procedures. Twisted pair cables with RJ45
connector pins are used for Ethernet LANs. These pins fit into the appropriate
socket on the device and link it to the network.
Ethernet Card
A network interface card (NIC), commonly referred to as an Ethernet card, is a piece
of hardware that computers use to connect to Ethernet LANs and communicate with
other LAN-connected devices. Earlier, Ethernet cards required manual installation
because they were external to the system. It is a piece of internal hardware in
contemporary computers. The network connection is physically inserted into the
NIC’s RJ45 socket.
The protocols an Ethernet card supports may affect its speed. The top speed of older
Ethernet cards was 10 Mbps. Modern cards, however, support 100 Mbps-capable
fast Ethernets. Some cards even have a 1 Gbps capacity.
Router
If both LANs implement the same set of protocols, a router would be a network layer
hardware device that transports data from one LAN to another. Therefore, the ISP
(internet service provider) and at least two LANs are commonly connected to a
router. Data frames with the destination address added are called packets, and this
is how it receives data. Before sending the signals, the router also amplifies them.
Because of this, it is also known as a repeater.
Routing Table
A router consults its routing table to determine the fastest and most precise path a
packet can take to get to its destination. There are two different types of routing
tables:
Switch
A switch is a type of network equipment that utilises twisted pair wires to join other
devices to Ethernet networks. To receive, store and forward data packets across the
network, it employs packet switching technology. All of the connected devices’
network addresses are kept on file by the switch.
When it receives a packet, it examines the destination address before transmitting it
to the appropriate port. The packets are examined for network issues such as
collisions before being forwarded. Full duplex transmission is used for the data.
Switches have the potential to transmit data twice as quickly as other networking
equipment like hubs. This is due to the switch’s shared maximum speed with all
connected devices. This aids in keeping network speed even during periods of heavy
traffic. In reality, using several switches allows networks to operate at larger data
rates.
Gateway
A network device called a gateway is used to link two or more diverse networks.
Networks that use various protocols are referred to as dissimilar networks. A
computer with numerous NICs connected to various networks serves as a gateway
most of the time. The software can also be used to set up a gateway fully. These
gateways, which allow networks to connect to other networks, are typically hosts or
the endpoints of a network.
Gateways transmit data from any network to another using the packet switching
mechanism. It is comparable to a router in this regard, with the exception that a
router can only transport data over networks that employ the same protocols.
Wi-Fi Card
Wireless fidelity is known as Wi-Fi. Any network can be connected wirelessly using
Wi-Fi technology. Any device can connect wirelessly to the local network using a Wi-
Fi card. The term “Wi-Fi hotspot” refers to the actual area of the network that offers
internet access via Wi-Fi. Any public area, including your house or office, can host a
hotspot. The hotspots themselves are wired into the network.
An outdated device can be upgraded with a Wi-Fi card to add features like
teleconferencing, image transfer from a digital camera, video chat etc. The wireless
network adaptor is built into most modern gadgets
INTERNET INTRANET
It’s a public network with more traffic A private network and traffic is less
Can transfer unlimited data Can transfer only limited data
Can be widely accessed and used Company or organisation employees or admin with
access to login details can only use this
More data or information can be Data or information accessible over intranet will be
accessed or availed limited and specific to the company records or
detail
Difference between Client-Server and Peer-to-Peer Network
3. Here, we mainly prefer the centralised server Here, every peer stores its own
to keep the data. data.
6. They are a more stable network form. They are comparatively less stable.
7. These can be used both in small and large It is mostly preferred for short
networks. networks.
OPERATING SYSTEM:-
An Operating System is the interface between the computer hardware and the end-
user. Processing of data, running applications, file management and handling the
memory is all managed by the computer OS. Windows, Mac, Android etc. Are
examples of Operating systems which are generally used nowadays.
All modern computing devices including Laptops, Tablet, mobile phones, etc.
comprise an Operating System which helps in the smooth working of the device.
Types of Operating System
1. Batch Operating System
Multiple people at various terminals can use a program at the same time
The main motive is to minimize the response time
4. Distributed Operating System
When two or more systems are connected to each other and one can open
files which are not present in their system but in other devices connected in
the network
Its usage has now increased over the years
They use multiple central processors to serve real-time applications
Failure of one system does not affect the other systems connected in the
network
5. Embedded Operating System
They have one main server which is connected to other client servers
All the management of files, processing of data, access to sharing files, etc. are
performed over this small network
It is also a secure operating system for working with multiple users
7. Mobile Operating System
With the advancement in the field of technology, smartphones now are
released with an Operating system.
They are designed in a manner that they can help a small device work
efficiently
1. It helps with memory management. It keeps a track of the files being saved in
the Main memory and the primary memory of the computer device
2. Whenever a computer is turned on, the Operating system automatically starts
to work. Thus, the booting and rebooting process of a computer device is also
an important function of the OS
3. It provides a user interface
4. Managing of basic peripheral devices is done by the operating system
5. Using the password protection option of an operating system, the data in the
device can be kept secure
6. It coordinates with the software and the user
7. Easy navigation and organisation of files and programs are managed by the
OS
8. Any kind of program which needs to be run through the system is done by the
operating system
9. If any kind of error or bug is found during the program is detected using the
operating system
Location-based
Location-based MFA usually looks at a user’s IP address and, if possible, their geo
location. This information can be used to simply block a user’s access if their
location information does not match what is specified on a whitelist .
MFA for Office 365:-Office 365 by default uses Azure Active Directory (AD) as its
authentication system. And there are a few limitations. For example, you only have
four basic options when it comes to what type of additional authentication factor
they can use: Microsoft Authenticator, SMS, Voice and Oauth Token. You also might
have to spend more on licensing depending on the types of options you want
available
1. Malware attack
Attacks use many methods to get malware into a user’s device, most often social
engineering. Users may be asked to take an action, such as clicking a link or
opening an attachment.Once malware is installed, it can monitor user activities,
send confidential data to the attacker, assist the attacker in penetrating other
targets within the network, and even cause the user’s device to participate in a
botnet leveraged by the attacker for malicious intent.
Trojan virus — tricks a user into thinking it is a harmless file. A Trojan can
launch an attack on a system and can establish a backdoor, which attackers
can use.
Ransomware — prevents access to the data of the victim and threatens to
delete or publish it unless a ransom is paid. Learn more in our guide
to ransomware prevention.
Wiper malware — intends to destroy data or systems, by overwriting
targeted files or destroying an entire file system. Wipers are usually
intended to send a political message, or hide hacker activities after data
exfiltration.
Worms — this malware is designed to exploit backdoors and vulnerabilities
to gain unauthorized access to operating systems. After installation, the
worm can perform various attacks, including Distributed Denial of Service
(DDoS).
Spyware — this malware enables malicious actors to gain unauthorized
access to data, including sensitive information like payment details and
credentials. Spyware can affect mobile phones, desktop applications, and
desktop browsers.
Fileless malware — this type of malware does not require installing
software on the operating system. It makes native files such as PowerShell
and WMI editable to enable malicious functions, making them recognized as
legitimate and difficult to detect.
Multiple data elements are accessible together Individual access of data elements
Data in the form of a table are linked together No connection between data
Here, redundancy of data is reduced with the help of Data redundancy is common
key and indexes in RDBMS
It features multiple layers of security while handling There is only low security while
data handling data
The software and hardware requirements are higher The software and hardware
requirements are low
Introduction
Encryption is a security method in which information is encoded in such a way that
only authorized user can read it. It uses encryption algorithm to generate ciphertext
that can only be read if decrypted.
There are two types of encryptions schemes as listed below:
Symmetric Key encryption
Public Key encryption
Symmetric key encryption algorithm uses same cryptographic keys for both
encryption and decryption of cipher text.
Public Key encryption
Public key encryption algorithm uses pair of keys, one of which is a secret key and
one of which is public. These two keys are mathematically linked with each other.
Hashing
In terms of security, hashing is a technique used to encrypt data and generate
unpredictable hash values. It is the hash function that generates the hash code,
which helps to protect the security of transmission from unauthorized users.
Hash function algorithms
Hashing algorithm provides a way to verify that the message received is the same
as the message sent. It can take a plain text message as input and then computes a
value based on that message