Điểm của bài asm còn tùy thuộc vào người chấm. Chỉ cần paraphase bài này là có thể pass. 1 trong nhưng tool paraphase mình recommend là quillbot.The submission is in the form of 1 document.● You must use the Times font with 12pt size, turn on page numbering; set line spacing to 1.3 andmargins to be as follows: left = 1.25cm, right = 1cm, top = 1cm, bottom = 1cm. Citation andreferences must follow the Harvard referencing style. ASSIGNMENT FRONT SHEET Qualification BTEC Level HND Diploma in Computing Unit number and title Unit 2: Networking Infrastructure Submission date Date Received 1st submission Resubmission Date Date Received 2nd submission Student Name Student ID Class Assessor name Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism I understand that making a false declaration is a form of malpractice Student’s signature Grading grid P1 P2 P3 P4 M1 M2 D1 ❒ Summative Feedback: Grade: Lecturer Signature: ❒ Resubmission Feedback: Assessor Signature: Date: Table of Contents I Network Network definiton Ξ First of all, network also known as computer networking, which can be understand as a group of computers utilizing a principles of general communication protocols over digital connections for the intention of sharing resources located upon or accommodated by network nodes ... https:www.dnsstuff.comdatabreach 10 1 Dobran, B., 2 019 Information Security Risk Management: Build a Strong Program Online Available at: https:phoenixnap.combloginformation security riskmanagement garg, r., 20 21 Threats... List and give examples with dates 12 Propose a method to assess and treat IT security risks (M1) 18 TASK DESCRIBE AT LEAST ORGANIZATIONAL SECURITY PROCEDURES (P2) .20 Definition... Dan Swinhoe, 20 21 The 15 biggest data breaches of the 21st century, s.l.: s.n Ohri, A., 20 21 What Is DMZ Network Online Available at: https:www.jigsawacademy.comblogscyber security whatisdmz
Trang 1Business processes and decision making
Trang 2TABLE OF CONTENTS
Trang 3- Process is a connected sequence of actions to provide a service or
product
- Defined as a set of actions and
tasks to complete organization goals
BUSINESS PROCESS
Trang 41 Login Process
2 Upgrade Account Process
3 Search Movie Process
BUSINESS PROCESS OF NETFLIX
Trang 5Sign In Process
Trang 6Upgrade Account Process
Trang 7Seaching Process
Trang 8Data and software
List the types of data
Trang 9 In structured data, all row in a table has the same set of columns.
Trang 10as numbers, dates, and facts as well.
Videos, audio, and binary data files might not have a specific structure They’re assigned to as unstructured data
Trang 11Unstructured Data
Semi-structured data is information that doesn’t consist of Structured data (relational database) but still has some structure to it.
semi-structured data is a combination
of 2 formats Structured data and
Unstructured data
Trang 12Data and software
Basic types of application software
Word processing software: Allows users to create,
edit a document
Spreadsheet Software: Allows users to create
documents and perform the calculation
Database software: Allows the user to store and
retrieve the various amount of data
Presentation Graphic Software: Allows users to
create a visual presentation
Multimedia Software: Allows the user to create the
image, audio, video, etc
MS Word, Word Pad, etc
Excel, Lotus, etc
MS Access, MySQL, Oracle, SQL Server, etc
MS power Point, Digital DashboardReal Player, Media Player, etc
Trang 13Data and software
Advantages and Disadvantages
• Can manage big data in real time, we may
need to make a split-second decision on
occasion
• Application developers don't need to give time
and attention to lower-level processes and
execution
• It helps to maintain the system in good
condition and detect viruses
• Developers can focus on their application
development
• Operations team can review and graphically
represent their KPIs and other useful
information
• Costly
• Some software is designed specifically for a certain business, may not be compatible with other generic software
• Data Security: Unless system is totally detached from an internet portal, the risk of a security breach must always be considered ahead of time
Trang 14Decision making
Decision making types
Decisions are often changed
based on external and internal
variables
• Influence range: small
• Time durations: daily, weekly
and even months
• Decision maker: leader of a
group, junior manager
• Risk level: low
• Complexity: simple
Tactical
A corporation's medium-term application of the directors' broader strategy
• Time durations: several months to 1-5 years
• Decision maker: Officers (CEO,CTO,COO…)
• Risk level: medium
• Complexity: complexity
Less-Strategic
Decisions that affect the business's environment, resources, and people
• Influence range: the whole company
• Time durations: 5-10 years
Trang 15Decision making
List decisions made for each level in the company
Trang 16Activity diagrams to illustrate decision making process
Trang 17Operational decision
Trang 18Tactical decision
Trang 19Features Of BI Help to Make Operational n Tactical Decision
Easy-to-understand KPIs and summary information on a regular, scheduled basis.
Ranking Reports:
Easily view the best – worst statistic
Better Understanding User Search Intent
Identifying Opportunities for Future Content
Drill- Drill-downs allow the user to review
a specific metric in detail.
Trang 20Features Of BI Help to Make Operational n Tactical Decision
Data warehousing
Comprise the data in raw
form, data from diverse
sources and apply new logic
to merge all of them.
Predictive Analytics
Tool/Technique to do that
AWS Redshift / SageMaker
Easy-to-use predictions generated by ML models with data in queries, reports,
and dashboards.
Fully managed petabytes-scale data warehouse
Analyze current and historical data to make accurate forecasts.
Predicting fraudulent transactions, determining a credit score,
forecasting market behavior
Trang 21Strategic decision
Trang 22THANKS FOR WATCHING