SlideShare a Scribd company logo
Running head: DATABASE AND DATA WAREHOUSING
DESIGN
DATABASE AND DATA WAREHOUSING DESIGN
10
Database and Data Warehousing Design
Necosa Hollie
Dr. Ford
Information Systems Capstone CIS499
May 5, 2019
Introduction
Somar and Co. Data Collection Company collects and
analyzes data by using operational systems and web analytics.
The data used in the analysis is collected from diverse operating
systems such as ERP software. Various applications such as
payrolls, human resources, and insurance claims are used in,
modern-day enterprises and data from them keep on increasing
day by day (Schoenherr, & Speier‐Pero, 2015). The ever-
increasing data has been overwhelming organizations’ ability to
analyze it due to its complex nature. This challenge has forced
Somar and Co. Data Collection Company to seek a solution to it
to deliver quality results to their clients. As the chief
information officer (CIO) at the company, will be in charge of
designing the solution that will incorporate data warehousing.
This will make it possible to be consolidating large amounts of
data quickly and be creating quality analytical reports within
the shortest time possible.
Need for Data Warehousing
Data warehouses are central storage systems in
companies where vital information from other applications such
as ERP system is deposited. The data is periodically extracted
from these applications. Data is sent to the data warehouse in
different formats as different applications have distinct ways of
keeping information. Then the data warehouse by having a
uniform operational system will process and analyze discrete
data into a more straightforward form. Somar and Co. Data
Collection Company manages data from various clients with the
information having been collected from multiple departments
such as marketing, sales, and finance. To develop an active data
warehouse, data consistency from different applications plays a
crucial part (Waller, & Fawcett, 2013). This enables
establishing of a constant process for all types of data. The
information is analyzed for analytical reports, market research
and decision report. The processed data also gives insight about
the direction of the company to the management. The data is
considered by the management during decision making and
strategic planning.
Due to the importance of the data reposted in the data
warehouse to the management, it should be analyzed in such a
way that it is easy to comprehend and interpret (Schoenherr, &
Speier‐Pero, 2015). As the processed data originates from
different departments of the organization, this makes it be a
reliable source of information to the management. If every
department were to analyze its data, this would result in
different information in different formats hence tricky for the
administration to interpret it accurately. The data warehouse
helps to resolve this problem by offering a centralized system
where data from various departments is interpreted uniformly.
Building a data warehouse will benefit the organization
from data mining tools and techniques. The process of data
mining involves analyzing large amounts of data to find hidden
patterns and relationship between different unrelated sets of
data. As the information processed in the data warehouse comes
in their unstructured and raw format, they do not make any
sense until when analyzed. Data mining tools help to sort out
through vast amounts of information in the data warehouse to
find out any unique patterns (Sivarajah et al., 2017). After
finding out specific patterns and relationship between various
sets of data, it now becomes easy to predict where the
organization is heading based on the current information. The
information produced by data mining tools gives valuable
information such as status reports to the organizational
stakeholders. This kind of information is critical in determining
the future direction of the organization.
In addition to providing data analytics, data warehousing
also offers data visualization tools. The data visualization tools
help people to understand the analyzed data better by using
visual images. The data visualization tools go beyond using the
standard graphs and charts displayed in excel sheets.
Information is displayed using sophisticated methods such as
infographics, gauges, dials, fever charts, sparklines and heat
maps. Users can then access this information in the database
warehouse through an interactive dashboard. Visualization tools
expose some trends and patterns that fail to be recognized in
text-based data. New visualization tools are invented every day
to effectively identify trends, patterns, and correlations in
advanced data analytics. Moreover, visual tools are more
accessible to operate than the earlier statistical analysis
software.
Speed is essential while considering any technological
solution. Data warehouse offers real-time results during data
analysis. The data warehouse has a higher processing capacity
than the traditional operating systems. The ability to complete
tasks within a short time makes the data warehouse to be a
better solution to analyze a vast amount of data. The technology
cannot be compared to human labor which is slower and needs
being in large number to analyze a large amount of data.
Decision making in most organizations is usually urgent and
requires results within the shortest time possible making it
convenient to use a data warehouse to analyze required data
(Waller, & Fawcett, 2013). Also with the use of data warehouse,
data can be accessed from multiple sources at any time. The
system reduces reliance on IT professionals since all the
information can be accessed from a single interface.
Security of confidential data is paramount as data breach may
lead to a bad reputation and unrecoverable loss to the affected
organization. Data warehouse offers limitation to access data
from it. Only authorized users with user accounts can access
data from it. Secure passwords with two identification factor
can be created on users’ accounts to enhance their security
(Sivarajah et al., 2017). The data in the data warehouse can be
encrypted to prevent eavesdropping during information transfer.
Encrypting the data deters users without decrypting keys from
accessing information stored. This comes to Somar and Co.
Data Collection Company at the right time, when they need a
secure database and there are increased data breaches in
companies all over the world.
Database Schema
A database schema is a logical illustration of either a section or
a complete database. The picture includes the name and all
components within the database. Database schema indicates
definitions, attributes, and relationship among different entities
in the data organization. The diagram below shows schema for
a module of the Somar and Co. Data Collection Company
database.
Figure 1: Database Schema
The above illustration indicates workers record for one
of the Somar and Co. Data Collection Company customers. On
the Schema, Workers’ personal information is stated together
with details on their relationship with the employer. Their
relationship information with the employer includes salaries,
positions held, employer number and their employment dates.
Figure 2: Entity -Relationship Model
The above model helps to depict the relationship of
employees with different aspects within the client’s system. For
“works on” item, there is a many-to-many relationship, and on
the works at” item, there is a one-to-many relationship
(Sivarajah et al., 2017). Entity relationship model is essential
because it acts as a remission point in case of unusual
something happening along the way. The model is helpful in
data organization within a company.
Figure 2: Data Flow Diagram (DFD)
The diagram encapsulates the layout and functionalities at
various stages within the system.
Figure 4: Flow of Data used in the Data Warehouse
Operating system
ETL (Extraction, transformation and loading)
Sales
ERP System
Marketing
Data Warehouse
CRM system
OLAP Server
Procurement
SCM system
Human Resources
Flat Files
Senior Management
Conclusion
Data analytics industry has experienced massive growth in
recent years. This has compelled private organizations like
Somar and Co. Data Collection Company to deploy advanced
tools and techniques to process their data to keep up with the
new trend and competition in the business world. Data
warehousing facilitates growth in an organization among other
benefits. More information at the fingertips is helping
organizations with modern data houses have a competitive
advantage and make informed decisions. I, therefore,
recommend Somar and Co. Data Collection Company to the
benefit of this opportunity to be one step ahead of the clients.
References
Schoenherr, T., & Speier‐Pero, C. (2015). Data science,
predictive analytics, and big data in supply chain management:
Current state and future potential. Journal of Business
Logistics, 36(1), 120-132.
Sivarajah, U., Kamal, M. M., Irani, Z., & Weerakkody, V.
(2017). Critical analysis of Big Data challenges and analytical
methods. Journal of Business Research, 70, 263-286.
Waller, M. A., & Fawcett, S. E. (2013). Data science, predictive
analytics, and big data: a revolution that will transform supply
chain design and management. Journal of Business Logistics,
34(2), 77-84.
Running head: BUSINSS REQUIREMENT AND PROJECT
PLAN 1
BUSINSS REQUIREMENT AND PROJECT PLAN
4
Business Requirements
Necosa Hollie
Information Systems Capstone CIS499
Dr Ford
April 28,2019
Describing the project and Scope of the project:
The company named as SOMAR AND CO. DATA
COLLECTION COMPANY is a data collection and analysis
company and is working for less than two years. It wants to
create a repository of the company data and is expected to add
20% data in the database every year. So the company is eyeing
for the best practices in gathering the data in the company's
warehouse.
Scope of the Somar data collection company is full planning
about the data collection and analysis, including the features,
functions, project goals, tasks, and deadlines. So by adopting all
these features of scope, Somar and co. can achieve the results
according to need.
How to control the scope?
Controlling the scope of specific business functions is essential.
It is a check whether the business is functioning correctly or
not. It has three elements:
Know your scope: Somar and co. should know what they want
to do. They aim to build a system for the data collection which
is reliable, and all the annual data is stored and analyzed
correctly.
Train your team: Somar and co. Should, train its team. If the
group is qualified enough, it can be able to do the tasks
accordingly.
Communicate: Communication is vital between the employees
who are involved in the data collection and data analysis
process. It is a systematic process.
Features of the data collection and analysis system (assumed):
Somar and co should hire a dedicated team of data collection
and analysis Experts.
• The company should be equipped with the best data
collection methods and tools and best data analysis skills.
• Experts should be trained enough to evaluate the required
data, and they should have an insight into the data analysis on
time.
• Collection of, raw data to produce the correct meanings.
Project goals: goals for the Somar and co. will be the following:
• Create a repository for the data that is collected
• Analysis of the collected information
• Adopt the best warehousing practices to achieve the target
of 20% data collection every year.
• To wipe off the data which is of no use.
Deadlines: the task deadlines should be under the domain, for
example, building a warehouse practice should be within a year
be because too much pile up of data can affect the efficiency of
the company and its warehousing.
Tools of data analysis: there are the following tools of data
analysis:
· R programming
· Python
· SAS
· Apache Spark
· Hadoop
· Excel
Risks, constraints, and assumptions:
Somar and co. can face security risks. Because security
concerns are increasing day by day. The restrictions can be the
tools used in the whole system, or it can be the warehousing
management techniques, or sometimes the offshoring or
outsourcing techniques are also involved as in offshoring or
outsourcing somar and co. Wants to analyze the data of
inventory that is purchased, and the outsourced service
calculated the data that is sold the stock. In assumptions,
random data samples, normality, independence, equal variances
can be used by somar and co. to test the accuracy of the system
without creating a loophole in the whole system.
Relationship between system and infrastructure:
Physical and virtual components of support can be helpful for
the operation of somar and co. The system is nothing without
the foundations; it can help in flow, storage, and analysis of the
data. It can be the cooling systems to support the hardware of
data centers. The components of internet infrastructure can be
fiber optics cables, satellites, antennas, etc.
Security of infrastructures is critical. For example, somar and
co. should develop a system of physical security of the
company. There should be electronic keys; there should be
operating cameras in all the premises. Access to data should be
limited to the authorized person only (Rouse, 2006).
Design and implementation of infrastructure are affecting the
role of clouding. It is different from the traditional system. The
infrastructure as a service can give a broad outlook of the
system computing to somar and co. It is a very flexible system.
Somar and co. can use the cloud provider’s computer and can
store and analyze the data without exporting the system. The
interface can also be used for example somar and co. and share
two components of the system to share the information
regarding the data storing, sharing and analyzing.
The purpose of the database and data warehouse are very
different from each other. Somar and co. Data warehouse
characteristics will be the following:
• A warehouse in which physical and logical data can be
managed.
• A warehouse that creates a relationship between the existing
system and data storage
• Somar and co should build a warehouse which can store
different department’s data in different sections.
• Somar and co can use the warehouse for the online data
analytical processes.
• Apache Spark shall be embedded in the system, as it will
help to store the massive data.
• Hadoop big data tool can also be used for the storage of big
data because it follows the 3V model
The Apache Spark and Had oop tools will be used to store the
big data because they are designed for the storage of big data so
the problem of big data with Somar and Co. will be resolved, as
they will be storing their data on these engines. Hadoop follows
a 3V model; Volume, Velocity, and Variety. The ample space of
these engines enables them to store data from different resource
simultaneously. The velocity is high as Hadoop does not let the
operation to lag, so the system runs smoothly even, with high
storage. Variety features allow them to store all structured and
unstructured data that includes text, image, video clips, numeric
and all sorts. This makes the storage of data more accessible
and faster as explained by the image below so Somar and Co.
should incorporate it in their system and bring changes in the
servers.
Somar and Co. for security should outsource or hire a CSIRT, as
it is the Computer Security Incident Response Team that
protects the system from any security breach. Somar and co. can
arrange the data in the database as well, in the form of columns
and rows. They can export DBMS software for this purpose.
Analytics can also be used by Somar and co. For example the
tracking information from the websites and emails etc. and then
analyze it to draw the meanings.
Outsourcing and offshoring needs:
Somar and co. can hire other company to help in the collection
and analysis of data and can adopt the best warehousing
practices in its own business that can be helpful in many ways.
The company can focus on the main operation and can exhibit
the outsourcing data collection with the outsourcing partners
which are reliable and trustworthy (Jukic, 2016).
Somar and Co. should outsource an IT-Team for now until they
develop a plan to build a proper, well-equipped IT Department.
For time being the outsourcing will help because the IT
Professionals will know how to handle the big data and perform
the desired tasks. Meanwhile, the existing technical personnel
can manage and communicate with the outsourcing team on day-
to-day business for the updates. Also, for security CSIRT
should be outsourced instead of hiring a full new team because
CSIRT will overlook the network and propose solution for the
security of the data. Somar and co. can focus on the other
business entirely and it can prove an excellent strategic
completion for the company. So outsourcing and offshoring can
be a good idea.
Necessary resources: Somar and co. can obtain the resources
needed from the publically available resources that can be
interviews, observations, questionnaires, documents and
records, and focus groups.
Relevant terms used in the project:
Data collection:
A collection of raw data and giving the meanings to store it for
future use.
Data analysis: to give useful insights to the collected data.
Outsourcing and offshoring:
To help in the collection and analysis of data and can adopt
the best warehousing practices by using outsourcing. The
company can focus on the main operation and can exhibit the
outsourcing data collection with the outsourcing partners who
are reliable and trustworthy.
Sourcing a business through home-based or from the operations
from other countries is called offshoring, and this can be done
for the whole organization or only a part of the organization.
Warehousing management: all the collected and analyzed data is
stored in the warehouse. So warehouse management is
necessary.
Course learning outcomes:
REQUIREMENT NO 1:
Companies and non-IT senior managers nowadays are using the
power of business analytics. The use of advanced data analysis
can result in the boom of the company. It can increase the
smartness and quick business decisions. The use of business
analytics can give an idea about past performance and can
provide the best assumptions and beliefs about future
performance. Analytics as a service can use the new and
advance cloud technologies which can give the best ideas
without implementing the other infrastructures.
REQUIREMENT NO 2:
Technological resources are different kind of tools and devices
that can provide the answers to various questions related to the
research. These can be scanners, whiteboards, and digital
cameras. And the information resources are the data and all kind
of information used by the organization. These can be the
databases and related tools which can help in gathering the data
and analyzing it. These resources can be helpful in research
issues.
REQUIREMENT NO 3:
The strategic issue can be a critical issue that can affect the
company very severely. So there are many planning processes
involved in this matter. It can be international implications on
the company’s decision making processes. For example, there
are following strategic issues a university campus of the USA is
facing:
• What can we do to build a reputation of the brand?
• Where is the market for the students?
• How many accounts are generated and how can be
maintained in a regularity?
• What are the strategic opportunities?
• How can the campus meet critical needs?
• Do you know what is going on?
• Is the analysis we conducted is all good?
• Are we searching for the right content?
• Is the campus flourishing or it is just a fake tail? (University
Of Illinois Springfield, 2016).
References
Jukic, N. S. (2016). Database systems: Introduction to databases
and data warehouses. Prospect Press, NA.
Rouse, M. (2006, October 17). infrastructure (IT infrastructure).
Retrieved from TechTarget:
https://searchdatacenter.techtarget.com/definition/infrastructure
The University Of Illinois Springfield. (2016). Strategic Issues
Facing UIS. Retrieved from University Of Illinois Springfield:
https://www.uis.edu/strategicplan/plan/sectiontwo/issues/
Sheet1TaskStart DateEnd DateDurationTask 1:
Hiring/Outsorucing01-May-198-May-197Task 1.1: Planning 1-
May-192-May-191Task 1.2: Shortlisting and contacting the
companies for outsourcing2-May-193-May-191Task 1.3:
Meetings3-May-196-May-193Task 1.4 : Interviews6-May-197-
May-191Task 1.5: Finalizing7-May-198-May-191Task 2:
Buying of Hardware1-May-1910-May-199Task 2.1: Planning
(Budget allocation)1-May-192-May-191Task 2.2: Finding
Vendor2-May-194-May-192Task 2.3: Buying5-May-196-May-
191Task 2.4: Installing6-May-197-May-191Task 2.5: Alloting
the systems7-May-1910-May-193Task 3: Training10-May-1931-
May-1921Task 3.1: Planning10-May-1911-May-191Task 3.2:
Training Start11-May-1925-May-1916Task 3.3: Mock Trials25-
May-1927-May-192Task 3.4 : Evaluation27-May-1929-May-
192Task 3.5 : Designate according to the performance29-May-
1931-May-192
Start Date Task 1: Hiring/Outsorucing Task 1.1: Planning
Task 1.2: Shortlisting and contacting the companies for
outsourcing Task 1.3: Meetings Task 1.4 : Interviews
Task 1.5: Finalizing Task 2: Buying of Hardware Task
2.1: Planning (Budget allocation) Task 2.2: Finding Vendor
Task 2.3: Buying Task 2.4: Installing Task 2.5:
Alloting the systemsTask 3: Training Task 3.1: Planning
Task 3.2: Training Start Task 3.3: Mock Trials Task
3.4 : Evaluation Task 3.5 : Designate according to the
performance 43586 43586 43587 43588 43591
43592 43586 43586 43587 43590 43591
43592 43595 43595 43596 43610 43612
43614 Duration Task 1: Hiring/Outsorucing Task
1.1: Planning Task 1.2: Shortlisting and contacting the
companies for outsourcing Task 1.3: Meetings Task 1.4 :
Interviews Task 1.5: Finalizing Task 2: Buying of Hardware
Task 2.1: Planning (Budget allocation) Task 2.2: Finding
Vendor Task 2.3: Buying Task 2.4: Installing Task 2.5:
Alloting the systemsTask 3: Training Task 3.1: Planning
Task 3.2: Training Start Task 3.3: Mock Trials Task
3.4 : Evaluation Task 3.5 : Designate according to the
performance 7 1 1 3 1 1 9 1 2 1
1 3 21 1 16 2 2 2
14
Project plan Inception part 2
1
2019-04-15T00:00:00
2019-12-23T00:00:00
1
0
2
$
0
1
08:00:00
480
2400
20
0
2
10
15
7
2
0
0
0
0
0
0
1
0
0
0
1
0
1
0
0
0
0
0
1
2019-04-14T21:54:00
1
1
0
0
0
0
0
0
1
Standard
1
1
0
2
1
08:00:00
12:00:00
13:00:00
17:00:00
3
1
08:00:00
12:00:00
13:00:00
17:00:00
4
1
08:00:00
12:00:00
13:00:00
17:00:00
5
1
08:00:00
12:00:00
13:00:00
17:00:00
6
1
08:00:00
12:00:00
13:00:00
17:00:00
7
0
1
1
Network Design
1
0
1
1
1
500
2019-04-15T08:00:00
2019-12-23T16:59:00
PT1448H0M0S
7
0
0
0
0
0
0
1
0
0
0
0
3
0
0
PT1448H0M0S
4
-1
2019-04-15T08:00:00
0
0
0
0
0
0
1
0
2
2
Planning
1
0
1.1
1.1
2
500
2019-04-15T08:00:00
2019-06-07T16:59:00
PT320H0M0S
7
0
0
0
0
0
0
1
0
0
0
0
3
0
0
PT320H0M0S
0
-1
0
0
0
0
0
0
1
0
3
3
writing the proposal
1
0
1.1.1
1.1.1
3
500
2019-04-15T08:00:00
2019-04-19T16:59:00
PT40H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT40H0M0S
0
-1
0
0
0
0
0
0
1
0
4
4
proposal approvement
1
0
1.1.2
1.1.2
3
500
2019-04-22T08:00:00
2019-04-24T16:59:00
PT24H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT24H0M0S
0
-1
0
0
0
0
0
0
3
1
0
1
0
5
5
Studying the previous network
1
0
1.1.3
1.1.3
3
500
2019-04-25T08:00:00
2019-05-16T16:59:00
PT128H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT128H0M0S
0
-1
0
0
0
0
0
0
3
1
0
4
1
0
1
0
6
6
Taking user requirement of the new network
1
0
1.1.4
1.1.4
3
500
2019-05-17T08:00:00
2019-05-30T16:59:00
PT80H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT80H0M0S
0
-1
0
0
0
0
0
0
5
1
0
1
0
7
7
Budget for the new network design
1
0
1.1.5
1.1.5
3
500
2019-05-31T08:00:00
2019-06-07T16:59:00
PT48H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT48H0M0S
0
-1
0
0
0
0
0
0
4
1
0
6
1
0
1
0
8
8
Analysis
1
0
1.2
1.2
2
500
2019-05-31T08:00:00
2019-07-03T16:59:00
PT192H0M0S
7
0
0
0
0
0
0
1
0
0
0
0
3
0
0
PT192H0M0S
0
-1
0
0
0
0
0
0
1
0
9
9
analysis of network requirment
1
0
1.2.1
1.2.1
3
500
2019-05-31T08:00:00
2019-06-19T16:59:00
PT112H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT112H0M0S
0
-1
0
0
0
0
0
0
6
1
0
1
0
10
10
security analysis
1
0
1.2.2
1.2.2
3
500
2019-06-20T08:00:00
2019-06-28T16:59:00
PT56H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT56H0M0S
0
-1
0
0
0
0
0
0
9
1
0
1
0
11
11
communicating to stakeholders
1
0
1.2.3
1.2.3
3
500
2019-07-01T08:00:00
2019-07-03T16:59:00
PT24H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT24H0M0S
0
-1
0
0
0
0
0
0
9
1
0
10
1
0
1
0
12
12
Documentation of the findings
1
0
1.2.4
1.2.4
3
500
2019-06-20T08:00:00
2019-06-28T16:59:00
PT56H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT56H0M0S
0
-1
0
0
0
0
0
0
9
1
0
1
0
13
13
Design
1
0
1.3
1.3
2
500
2019-07-04T08:00:00
2019-09-20T16:59:00
PT456H0M0S
7
0
0
0
0
0
0
1
0
0
0
0
3
0
0
PT456H0M0S
0
-1
0
0
0
0
0
0
1
0
14
14
take finding from analysis
1
0
1.3.1
1.3.1
3
500
2019-07-04T08:00:00
2019-07-15T16:59:00
PT64H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT64H0M0S
0
-1
0
0
0
0
0
0
11
1
0
12
1
0
1
0
15
15
design the network
1
0
1.3.2
1.3.2
3
500
2019-07-16T08:00:00
2019-08-08T16:59:00
PT144H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT144H0M0S
0
-1
0
0
0
0
0
0
14
1
0
1
0
16
16
design Database
1
0
1.3.3
1.3.3
3
500
2019-08-09T08:00:00
2019-08-28T16:59:00
PT112H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT112H0M0S
0
-1
0
0
0
0
0
0
14
1
0
15
1
0
1
0
17
17
software design to be used
1
0
1.3.4
1.3.4
3
500
2019-08-09T08:00:00
2019-08-22T16:59:00
PT80H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT80H0M0S
0
-1
0
0
0
0
0
0
15
1
0
1
0
18
18
tools to be used in network
1
0
1.3.5
1.3.5
3
500
2019-08-09T08:00:00
2019-08-20T16:59:00
PT64H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT64H0M0S
0
-1
0
0
0
0
0
0
15
1
0
1
0
19
19
network interface design
1
0
1.3.6
1.3.6
3
500
2019-08-29T08:00:00
2019-09-20T16:59:00
PT136H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT136H0M0S
0
-1
0
0
0
0
0
0
15
1
0
16
1
0
1
0
20
20
Implementation
1
0
1.4
1.4
2
500
2019-08-29T08:00:00
2019-12-18T16:59:00
PT640H0M0S
7
0
0
0
0
0
0
1
0
0
0
0
3
0
0
PT640H0M0S
0
-1
0
0
0
0
0
0
1
0
21
21
develoment of network
1
0
1.4.1
1.4.1
3
500
2019-08-29T08:00:00
2019-09-18T16:59:00
PT120H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT120H0M0S
0
-1
0
0
0
0
0
0
15
1
0
16
1
0
1
0
22
22
integrate system modules LAN
1
0
1.4.2
1.4.2
3
500
2019-09-19T08:00:00
2019-10-02T16:59:00
PT80H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT80H0M0S
0
-1
0
0
0
0
0
0
21
1
0
1
0
23
23
connection of all devices and nodes
1
0
1.4.3
1.4.3
3
500
2019-10-03T08:00:00
2019-10-22T16:59:00
PT112H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT112H0M0S
0
-1
0
0
0
0
0
0
22
1
0
1
0
24
24
perform intials testing
1
0
1.4.4
1.4.4
3
500
2019-10-23T08:00:00
2019-11-04T16:59:00
PT72H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT72H0M0S
0
-1
0
0
0
0
0
0
22
1
0
23
1
0
1
0
25
25
perform system testing
1
0
1.4.5
1.4.5
3
500
2019-10-23T08:00:00
2019-11-01T16:59:00
PT64H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT64H0M0S
0
-1
0
0
0
0
0
0
22
1
0
23
1
0
1
0
26
26
documentation of issues found
1
0
1.4.6
1.4.6
3
500
2019-11-05T08:00:00
2019-11-13T16:59:00
PT56H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT56H0M0S
0
-1
0
0
0
0
0
0
24
1
0
25
1
0
1
0
27
27
correcting the issues found
1
0
1.4.7
1.4.7
3
500
2019-11-14T08:00:00
2019-12-03T16:59:00
PT112H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT112H0M0S
0
-1
0
0
0
0
0
0
26
1
0
1
0
28
28
testing to see that all issues have been resolved
1
0
1.4.8
1.4.8
3
500
2019-11-14T08:00:00
2019-11-26T16:59:00
PT72H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT72H0M0S
0
-1
0
0
0
0
0
0
24
1
0
25
1
0
26
1
0
1
0
29
29
installation of security software like antivirus
1
0
1.4.9
1.4.9
3
500
2019-11-27T08:00:00
2019-12-10T16:59:00
PT80H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT80H0M0S
0
-1
0
0
0
0
0
0
28
1
0
1
0
30
30
support plan for the system
1
0
1.4.10
1.4.10
3
500
2019-12-11T08:00:00
2019-12-18T16:59:00
PT48H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT48H0M0S
0
-1
0
0
0
0
0
0
29
1
0
28
1
0
1
0
31
31
Completion
1
0
1.5
1.5
2
500
2019-11-27T08:00:00
2019-12-23T16:59:00
PT152H0M0S
7
0
0
0
0
0
0
1
0
0
0
0
3
0
0
PT152H0M0S
0
-1
0
0
0
0
0
0
1
0
32
32
Network system maintance
1
0
1.5.1
1.5.1
3
500
2019-12-19T08:00:00
2019-12-23T16:59:00
PT24H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT24H0M0S
0
-1
0
0
0
0
0
0
30
1
0
28
1
0
1
0
33
33
Evalution of the network System
1
0
1.5.2
1.5.2
3
500
2019-11-27T08:00:00
2019-12-03T16:59:00
PT40H0M0S
7
0
0
0
0
0
0
0
0
0
0
0
3
0
0
PT40H0M0S
0
-1
0
0
0
0
0
0
28
1
0
1
0
1
1
"john, Alice, Bill"
1
0
1
1
0
2019-04-15T08:00:00
2019-08-20T16:59:00
0
3
3
0
0
0
0
2
2
"George, Alice, Jacobs"
1
0
1
1
0
2019-04-22T08:00:00
2019-04-24T16:59:00
0
3
3
0
0
0
0
3
3
"David,Jacobs, Bill"
1
0
1
1
0
2019-04-25T08:00:00
2019-05-16T16:59:00
0
3
3
0
0
0
0
4
4
"Brack, Don, Mary"
1
0
1
1
0
2019-05-17T08:00:00
2019-06-28T16:59:00
0
3
3
0
0
0
0
5
5
"john, Brack"
1
0
1
1
0
2019-05-31T08:00:00
2019-06-07T16:59:00
0
3
3
0
0
0
0
6
6
"john, Wallace,"
1
0
1
1
0
2019-05-31T08:00:00
2019-06-19T16:59:00
0
3
3
0
0
0
0
7
7
"Alice, Mary, Brack"
1
0
1
1
0
2019-06-20T08:00:00
2019-06-28T16:59:00
0
3
3
0
0
0
0
8
8
"Bill, Mary, Alice"
1
0
1
1
0
2019-07-04T08:00:00
2019-07-15T16:59:00
0
3
3
0
0
0
0
9
9
"john, Brack, Bill"
1
0
1
1
0
2019-07-16T08:00:00
2019-08-08T16:59:00
0
3
3
0
0
0
0
10
10
"john, Brack", "john, Wallace,"
1
0
1
1
0
2019-08-09T08:00:00
2019-08-28T16:59:00
0
3
3
0
0
0
0
11
11
"Wallace, Alice"
1
0
1
1
0
2019-08-09T08:00:00
2019-08-22T16:59:00
0
3
3
0
0
0
0
12
12
"john, Mary, Alice"
1
0
1
1
0
2019-08-29T08:00:00
2019-09-20T16:59:00
0
3
3
0
0
0
0
13
13
"Williams, Jonathan"
1
0
1
1
0
2019-08-29T08:00:00
2019-09-18T16:59:00
0
3
3
0
0
0
0
14
14
"Williams, Jonathan, Alice"
1
0
1
1
0
2019-09-19T08:00:00
2019-10-02T16:59:00
0
3
3
0
0
0
0
15
15
"Peter, Brain, Matthews"
1
0
1
1
0
2019-10-03T08:00:00
2019-10-22T16:59:00
0
3
3
0
0
0
0
16
16
"Matthews, Mary, Jane"
1
0
1
1
0
2019-10-23T08:00:00
2019-11-04T16:59:00
0
3
3
0
0
0
0
17
17
"john, Mathews, Jane"
1
0
1
1
0
2019-10-23T08:00:00
2019-11-01T16:59:00
0
3
3
0
0
0
0
18
18
"Mary, Bill, Alice,Jonathan"
1
0
1
1
0
2019-11-05T08:00:00
2019-11-13T16:59:00
0
3
3
0
0
0
0
19
19
"Brack, Don,George"
1
0
1
1
0
2019-11-14T08:00:00
2019-12-03T16:59:00
0
3
3
0
0
0
0
20
20
"David,Jacobs,Don,Mary"
1
0
1
1
0
2019-11-14T08:00:00
2019-11-26T16:59:00
0
3
3
0
0
0
0
21
21
"Brack, Jonathan, Williams, Alice"
1
0
1
1
0
2019-11-27T08:00:00
2019-12-10T16:59:00
0
3
3
0
0
0
0
22
22
"Peter,Brain, Wallace, Matthews"
1
0
1
1
0
2019-12-11T08:00:00
2019-12-18T16:59:00
0
3
3
0
0
0
0
23
23
"Wallace, Alice,Williams,Jonathan, Peter, Mary"
1
0
1
1
0
2019-12-19T08:00:00
2019-12-23T16:59:00
0
3
3
0
0
0
0
24
24
"john, Brack,Bill, Georgy,"
1
0
1
1
0
2019-11-27T08:00:00
2019-12-03T16:59:00
0
3
3
0
0
0
0
1
3
1
0
2019-04-19T16:59:00
1
0
PT40H0M0S
2019-04-15T08:00:00
2019-04-15T08:00:00
1
PT40H0M0S
2
4
2
0
2019-04-24T16:59:00
1
0
PT24H0M0S
2019-04-22T08:00:00
2019-04-22T08:00:00
1
PT24H0M0S
3
5
3
0
2019-05-16T16:59:00
1
0
PT128H0M0S
2019-04-25T08:00:00
2019-04-25T08:00:00
1
PT128H0M0S
4
6
4
0
2019-05-30T16:59:00
1
0
PT80H0M0S
2019-05-17T08:00:00
2019-05-17T08:00:00
1
PT80H0M0S
5
7
5
0
2019-06-07T16:59:00
1
0
PT48H0M0S
2019-05-31T08:00:00
2019-05-31T08:00:00
1
PT48H0M0S
6
9
6
0
2019-06-19T16:59:00
1
0
PT112H0M0S
2019-05-31T08:00:00
2019-05-31T08:00:00
1
PT112H0M0S
7
10
7
0
2019-06-28T16:59:00
1
0
PT56H0M0S
2019-06-20T08:00:00
2019-06-20T08:00:00
1
PT56H0M0S
8
11
1
0
2019-07-03T16:59:00
1
0
PT24H0M0S
2019-07-01T08:00:00
2019-07-01T08:00:00
1
PT24H0M0S
9
12
4
0
2019-06-28T16:59:00
1
0
PT56H0M0S
2019-06-20T08:00:00
2019-06-20T08:00:00
1
PT56H0M0S
10
14
8
0
2019-07-15T16:59:00
1
0
PT64H0M0S
2019-07-04T08:00:00
2019-07-04T08:00:00
1
PT64H0M0S
11
15
9
0
2019-08-08T16:59:00
1
0
PT144H0M0S
2019-07-16T08:00:00
2019-07-16T08:00:00
1
PT144H0M0S
12
16
10
0
2019-08-28T16:59:00
1
0
PT112H0M0S
2019-08-09T08:00:00
2019-08-09T08:00:00
1
PT112H0M0S
13
17
11
0
2019-08-22T16:59:00
1
0
PT80H0M0S
2019-08-09T08:00:00
2019-08-09T08:00:00
1
PT80H0M0S
14
18
1
0
2019-08-20T16:59:00
1
0
PT64H0M0S
2019-08-09T08:00:00
2019-08-09T08:00:00
1
PT64H0M0S
15
19
12
0
2019-09-20T16:59:00
1
0
PT136H0M0S
2019-08-29T08:00:00
2019-08-29T08:00:00
1
PT136H0M0S
16
21
13
0
2019-09-18T16:59:00
1
0
PT120H0M0S
2019-08-29T08:00:00
2019-08-29T08:00:00
1
PT120H0M0S
17
22
14
0
2019-10-02T16:59:00
1
0
PT80H0M0S
2019-09-19T08:00:00
2019-09-19T08:00:00
1
PT80H0M0S
18
23
15
0
2019-10-22T16:59:00
1
0
PT112H0M0S
2019-10-03T08:00:00
2019-10-03T08:00:00
1
PT112H0M0S
19
24
16
0
2019-11-04T16:59:00
1
0
PT72H0M0S
2019-10-23T08:00:00
2019-10-23T08:00:00
1
PT72H0M0S
20
25
17
0
2019-11-01T16:59:00
1
0
PT64H0M0S
2019-10-23T08:00:00
2019-10-23T08:00:00
1
PT64H0M0S
21
26
18
0
2019-11-13T16:59:00
1
0
PT56H0M0S
2019-11-05T08:00:00
2019-11-05T08:00:00
1
PT56H0M0S
22
27
19
0
2019-12-03T16:59:00
1
0
PT112H0M0S
2019-11-14T08:00:00
2019-11-14T08:00:00
1
PT112H0M0S
23
28
20
0
2019-11-26T16:59:00
1
0
PT72H0M0S
2019-11-14T08:00:00
2019-11-14T08:00:00
1
PT72H0M0S
24
29
21
0
2019-12-10T16:59:00
1
0
PT80H0M0S
2019-11-27T08:00:00
2019-11-27T08:00:00
1
PT80H0M0S
25
30
22
0
2019-12-18T16:59:00
1
0
PT48H0M0S
2019-12-11T08:00:00
2019-12-11T08:00:00
1
PT48H0M0S
26
32
23
0
2019-12-23T16:59:00
1
0
PT24H0M0S
2019-12-19T08:00:00
2019-12-19T08:00:00
1
PT24H0M0S
27
33
24
0
2019-12-03T16:59:00
1
0
PT40H0M0S
2019-11-27T08:00:00
2019-11-27T08:00:00
1
PT40H0M0S
Running Head: PROJECT PLAN INCEPTION
1
PROJECT PLAN INCEPTION
6
Project Plan Inception
Necosa Hollie
Information Systems Capstone CIS 499
Dr. Ford
April 13,2019
Twenty-five-million-dollar data collection and analysis
company were started about two years ago to collect data and
analyze it. Since it has been in operation for the eighteen
months, it has grown thus need Chief Information Officer (CIO)
who would manage the infrastructure of IT and who would take
the Company to the next level. The company currently is using
web analytics together with operational systems data to collect
the data. Web analytics is gaining a lot of popularity as part of
most business marketing plans. The company has employed
twenty employees which four of them are appointed and
dedicated to the Information Technology of the organization.
Web analytics is a way of analyzing the characteristics of
visitors who have visited the web site. It helps the company to
attract more visitors, retain and improve the goods and services
of the company. It also used for prediction if the customer is
likely to need the product and services again. Wen analytics is
used I CRM (customer relationship management). It is used in
analyses and monitoring the behaviors of the customer,
geographical area where a specific product bought mostly. Web
analytics may have tracking to determine when the most
customer comes to the site and the age group they belong.
As a newly appointed Chief of Information Officer, I am
expected to make sure that the company grows by sixty percent
for the next two years. Due to the growth that is assumed, we
are going to deliver a comprehensive information system to
address how the data collected will be handled and supported by
company information technology infrastructure. The current
company based on one floor and due to expected growth, it will
be expanded to a three-level within the next six months. Since it
is a new company as IT guys, we are going to advise the CEO
on technological infrastructures to used. We are going to design
the new network design for the three floors and how it will be
linked together. We are going to incorporate different
technologies from different partners.
The company has several solutions to be implemented thus as
Chief Information Officer we need to choose the best among
them. These solutions are hosted solution, on-site solution, and
a hybrid model. As CIO we are going to select the Hybrid
Model. The hybrid model is an approach to employ computing
in the company to provide and manages some IT infrastructure
and resource in-house while using cloud-based. It allows the
business to maintain centralizes approach to information
technology governance during experiencing with cloud
computing. Since we are going to adopt hybrid model these are
the force behind it.; to maintain control of data, cost-effective
of cloud components like SaaS (Software as a Service) or
(Storage as a service) and respond quickly to business changes.
The main challenges in the current enterprise are migrating to
cloud computing. This applied science gives a new prototype
based on how the payment is demanded information and
communication technologies (ICT). In this consciousness, the
most interesting in the company is supposed to be initial
investments which can be avoided. Cloud computing allows
gradual enforcement; however, we discussed in depth the
characteristics and capabilities of cloud computing. The
technology has lacked an entry in terms of real frameworks, and
practical. These can act as a framework since this research aims
to fill this gap. It is a real tool presenting and already to be put
in place and tested; cloud computing can be adopted and used as
a decision tool. This tool uses diagnosing based on a specific
inquiry to collect the required data and afterward provide the
user with valuable knowledge to the implementation of the
business within the cloud, specifically in the form of Software
as a Service (SaaS) solutions.
The processed data acquired allows the conclusion to be made
by top management makers to bring forth their specific Cloud
computing Road. We have done a pilot survey which has been
carried out with the local level of business at a level with a two-
fold objective: the processed information on cloud computing is
to be confirmed with the degree to identify the most exciting
trend and patterns in the business areas and there related to
tools for this information technology. As predicted, there was
profound knowledge in terms of cloud computing, and results
show high interest in the subject and the device presented aims
to readdress this counterpart, by providing a solution to the
problem.
Digital communication through voice, data, and video is
essential for companies in performing their day to day business
functions. A well-Designed Network LAN is critical to the
management of business because it is necessary to identify
devices that are compatible with the network being designed
and their configurations must be in line with the business goals.
The Network design approach to be used here is the switched
topology network that involves dividing the system into
different layers; each of the layers has its designated functions
within the network. There are business benefits for the
hierarchical approach to LAN design. The design can be
expanded, and the designed interface can be replicated as the
system grows in volume since each of the modules is consistent.
As the network devices become more substantial, the
availability of the network becomes could become more critical.
The availability can be accumulated by a redundant
implementation with the hierarchical systems. The switches can
easily be expanded to ensure path redundancy. Redundancy is
only limited in the media access layer.
In a LAN network, the non-performing switches can be avoided,
and it enhances performance by the transmission of data.
Instead, data is transmitted through the switch ports to the
distribution layer from the access layer. The distribution layer
then uses its switching capabilities to transfer data to its
destination. The security of data is improved: the switches can
be developed through the configurations of the switch
Locations of the Media
The media devices will be positioned on different floors. In the
Second Floor of the company may contain the Main servers of
the company and can be located here. The positioning of the
computers and switches that serve various elements of the
software. During the connection every switch should be
connected to the server in each room, every computer
connected in a bus system.
Topology and Protocol
The Bus Topology can be used since all nodes will be connected
to a single cable. The bus topology is used when having few
computer nodes in a network for example, in this case, and the
interface is connected to three rooms, bus topology will be
quick to deploy. When compared to the star topology, it
requires less cable length [6]. Although bus topology has the
following drawbacks; when the network has a problem, it is
difficult to locate where the problem may be. An additional
cost of terminators which are required at the ends of the cable.
It cannot also be applied to big networks.
Information System it when you integrate various modules for
processing, collecting and storing data to provide information,
digital products, and knowledge. The organization will have to
put an information system to manage the operation and interact
with the customers. Information System has the various
component to support it namely computer hardware and
software; database and data warehouse, telecommunications,
procedures, and human resources. Computer hardware it is own
by everybody thus includes smartphone which can be able to
surf. If we have transmission media, storage, and display media
we classify them as computer hardware. Computer software is a
divide in two systems (operating system- manages hardware
parts, data, and programs) and application (handle specific task)
software. The database is a collection of interrelated data which
is delivered by the information system to data stored. If the data
is kept for long and it will be mined to get new patterns, then it
becomes a data warehouse. When the collected information is
put in the data store, it is being operated and cleaned. Operation
system can support various functions since it can be used to
design new products, predict trends, know the marketing of
products and service. The operating system can be used to
support various task and units in the organization and is called
ERP systems.
During operating data, it is part of analytics since it helps you
to understand the target. It helps to provide insights into the
company. It helps to plan for the future, and the company
primarily deals in collecting and analyses of the data. When we
have analyzed the data, we see the output of the data via the
interface. We have so many interfaces that we interact with
them to deliver the desired results like during the collection of
data to the last step of outputs the data.
In summary, we have talked more on the future of the company
and what is expected of CIO. We have looked at the network
design of the two new floors to be added. We have looked at
virus protocols to be used in-case of security. We have looked
at the infrastructure to be used during the redesigned of the
network. Lastly, we discussed more of information systems its
components; in the information system, we have looked at the
database, operation systems, analytics, and interfaces.
Reference
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business
Intelligence and Analytics: From Big
Data to Big Impact. MIS quarterly, 36(4), 1165-1188.
[1] Carlisle Adams , Steve Lloyd, Understanding Public-Key
Infrastructure: Concepts, Standards, and Deployment
Considerations, Macmillan Technical Publishing, 1999.
[2] William Aiello , John Ioannidis , Patrick McDaniel, Origin
authentication in interdomain routing, Proceedings of the 10th
ACM conference on Computer and communications security,
October 27-30, 2003, Washington D.C., USA.
[3] Barbir, A., Murphy, S., and Yang, Y. 2004. Generic threats
to routing protocols. Internet-Draft.
Steven M. Bellovin, A Look Back at "Security Problems in the
TCP/IP Protocol Suite", Proceedings of the 20th Annual
Computer Security Applications Conference, p.229-249,
December 06-10, 2004.
[4] Bellovin, S. and Gansner, E. 2003. Using link cuts to attack
internet routing. Unpublished manuscript.
[5] Bellovin, S., Ioannidis, J., and Bush, R. 2005. Position
paper: Operational requirements for secure BGP. In DHS Secure
Routing Workshop.
[6] Boneh, D., Boyen, X., and Shacham, H. 2004. Short group
signatures. In Proceedings of Crypto 2004. Vol. 3152. 41--55.
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx

More Related Content

Similar to Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx

Tasks of a data analyst Microsoft Learning Path - PL 300 .pdf
Tasks of a data analyst Microsoft Learning Path - PL 300 .pdfTasks of a data analyst Microsoft Learning Path - PL 300 .pdf
Tasks of a data analyst Microsoft Learning Path - PL 300 .pdf
Tung415774
 
MDM AS A METHODOLOGY
MDM AS A METHODOLOGYMDM AS A METHODOLOGY
MDM AS A METHODOLOGYJanet Wetter
 
Offers bank dss
Offers bank dssOffers bank dss
Offers bank dss
ghada alajlan
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
Sukirti Garg
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
 
Intro to big data and applications - day 1
Intro to big data and applications - day 1Intro to big data and applications - day 1
Intro to big data and applications - day 1
Parviz Vakili
 
Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...
Anastasija Nikiforova
 
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Science Council of America
 
4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx
blondellchancy
 
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET Journal
 
Self-service analytics risk_September_2016
Self-service analytics risk_September_2016Self-service analytics risk_September_2016
Self-service analytics risk_September_2016Leigh Ulpen
 
BIG DATA & BUSINESS ANALYTICS
BIG DATA & BUSINESS ANALYTICSBIG DATA & BUSINESS ANALYTICS
BIG DATA & BUSINESS ANALYTICS
Vikram Joshi
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
healdkathaleen
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
todd271
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
Shahbaz Anjam
 
1. What are the business costs or risks of poor data quality Sup.docx
1.  What are the business costs or risks of poor data quality Sup.docx1.  What are the business costs or risks of poor data quality Sup.docx
1. What are the business costs or risks of poor data quality Sup.docx
SONU61709
 
Introduction-to-Data-Modeling
Introduction-to-Data-Modeling Introduction-to-Data-Modeling
Introduction-to-Data-Modeling
software development company
 
Difference b/w DataScience, Data Analyst
Difference b/w DataScience, Data AnalystDifference b/w DataScience, Data Analyst
Difference b/w DataScience, Data Analyst
3RI Technologies Pvt Ltd
 
Leveraging AI and ML for efficient data integration.pdf
Leveraging AI and ML for efficient data integration.pdfLeveraging AI and ML for efficient data integration.pdf
Leveraging AI and ML for efficient data integration.pdf
ChristopherTHyatt
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business IntelligenceSukirti Garg
 

Similar to Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx (20)

Tasks of a data analyst Microsoft Learning Path - PL 300 .pdf
Tasks of a data analyst Microsoft Learning Path - PL 300 .pdfTasks of a data analyst Microsoft Learning Path - PL 300 .pdf
Tasks of a data analyst Microsoft Learning Path - PL 300 .pdf
 
MDM AS A METHODOLOGY
MDM AS A METHODOLOGYMDM AS A METHODOLOGY
MDM AS A METHODOLOGY
 
Offers bank dss
Offers bank dssOffers bank dss
Offers bank dss
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
Intro to big data and applications - day 1
Intro to big data and applications - day 1Intro to big data and applications - day 1
Intro to big data and applications - day 1
 
Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...
 
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
 
4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx4Emerging Trends in Business IntelligenceITS 531.docx
4Emerging Trends in Business IntelligenceITS 531.docx
 
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
 
Self-service analytics risk_September_2016
Self-service analytics risk_September_2016Self-service analytics risk_September_2016
Self-service analytics risk_September_2016
 
BIG DATA & BUSINESS ANALYTICS
BIG DATA & BUSINESS ANALYTICSBIG DATA & BUSINESS ANALYTICS
BIG DATA & BUSINESS ANALYTICS
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
 
1. What are the business costs or risks of poor data quality Sup.docx
1.  What are the business costs or risks of poor data quality Sup.docx1.  What are the business costs or risks of poor data quality Sup.docx
1. What are the business costs or risks of poor data quality Sup.docx
 
Introduction-to-Data-Modeling
Introduction-to-Data-Modeling Introduction-to-Data-Modeling
Introduction-to-Data-Modeling
 
Difference b/w DataScience, Data Analyst
Difference b/w DataScience, Data AnalystDifference b/w DataScience, Data Analyst
Difference b/w DataScience, Data Analyst
 
Leveraging AI and ML for efficient data integration.pdf
Leveraging AI and ML for efficient data integration.pdfLeveraging AI and ML for efficient data integration.pdf
Leveraging AI and ML for efficient data integration.pdf
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 

More from todd271

Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docxRunning head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
todd271
 
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docxRunning head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
todd271
 
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxRunning Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
todd271
 
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxRunning head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
todd271
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
todd271
 
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxRunning head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
todd271
 
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxRunning head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
todd271
 
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxRunning head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
todd271
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
todd271
 
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxRunning head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
todd271
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
todd271
 
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docxRunning Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
todd271
 
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docxRunning head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
todd271
 
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxRunning Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
todd271
 
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxRunning Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
todd271
 
Running Head CRITICAL ANALYSIS 1 C.docx
Running Head CRITICAL ANALYSIS                      1 C.docxRunning Head CRITICAL ANALYSIS                      1 C.docx
Running Head CRITICAL ANALYSIS 1 C.docx
todd271
 
Running head COUNSELOR ETHICS 1PAGE .docx
Running head COUNSELOR ETHICS           1PAGE  .docxRunning head COUNSELOR ETHICS           1PAGE  .docx
Running head COUNSELOR ETHICS 1PAGE .docx
todd271
 
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxRunning Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
todd271
 
Running head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxRunning head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docx
todd271
 
Running head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxRunning head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docx
todd271
 

More from todd271 (20)

Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docxRunning head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
 
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docxRunning head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
 
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxRunning Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
 
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxRunning head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxRunning head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
 
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxRunning head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
 
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxRunning head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxRunning head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docxRunning Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
 
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docxRunning head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
 
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxRunning Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
 
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxRunning Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
 
Running Head CRITICAL ANALYSIS 1 C.docx
Running Head CRITICAL ANALYSIS                      1 C.docxRunning Head CRITICAL ANALYSIS                      1 C.docx
Running Head CRITICAL ANALYSIS 1 C.docx
 
Running head COUNSELOR ETHICS 1PAGE .docx
Running head COUNSELOR ETHICS           1PAGE  .docxRunning head COUNSELOR ETHICS           1PAGE  .docx
Running head COUNSELOR ETHICS 1PAGE .docx
 
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxRunning Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
 
Running head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxRunning head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docx
 
Running head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxRunning head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docx
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx