closing

94
Closing August 9, 2011

Upload: madge

Post on 25-Feb-2016

45 views

Category:

Documents


0 download

DESCRIPTION

Closing. August 9, 2011. The Internet. Administration. Final I’ll post final grades by Wednesday night on my Web site. You have ONE DAY to argue anything. I’ll send in the final grades, Friday morning. Animal Lingo. AWARDS!. Most Visited. Furthest Away Visitor. Most “Impulsive” Game. - PowerPoint PPT Presentation

TRANSCRIPT

Closing

Animal Lingo

The InternetAdministrationFinalIll post final grades by Wednesday night on my Web site. You have ONE DAY to argue anything. Ill send in the final grades, Friday morning.

Define MIS.AWARDS!Most VisitedFurthest Away VisitorHow can you benefit from the flat world?What is wrong with this ER diagram?

List an example of an expert system?What is the difference between Web 1.0 and Web 2.0?What are the benefits of a Service Oriented Architecture?What is the difference between Descriptive and Predictive data mining?What is the difference between a decision support system and an expert system?Name three ways to make money online.Define the Long Tail.List the three rules of the long tail.Define Service Oriented Architecture.When you convert this ER diagram to a relational schema, where would the foreign key go?

In reference to knowledge management systems, what is the difference between explicit and tacit knowledge?What are some signs that the worlds is not Flat according to Thomas Friedman?What are the cardinalities for the following weak entity class?

What are the three phases of e-government?According to Friedman, what are four flatteners that have lead to globalization?When you convert the following ER diagram to a relational schema, how many tables will you have?

Expert systems use artificial intelligence to make decision. What is the difference between the hill-climbing and the genetic algorithm?What is the difference between the waterfall approach and interactive and incremental development in systems analysis and design?

What happens in the planning phase?

What is wrong with this diagram?

What is are the three constraints focused on in project management? Name an application of HCI or interface design? What are the four steps of Search Engine Optimization (SEO)?What is the bullwhip effect, and how can supply chain management, enterprise resource management, or customer relationship systems help?

How do you prevent hackers from sniffing your internet activity? List one difference between a virus and a Trojan horse?

Sell productsSell servicesSubscriptionsAdvertising Affiliate programs

The statistical property that a larger share of population rests within the tail of a probability distribution than observed under a 'normal' or Gaussian distribution

Rule 1: Make Everything Available

Rule 2: Cut the Price in Half; Now Lower it.

Rule 3: Help Me Find it.

Business-to-ConsumerBusiness-to-BusinessConsumer-to-ConsumerBusiness-to-EmployeeE-GovernmentMobile Commerce

Fall of the Berlin WallAvailability of NetscapeWorkflow SoftwareUploadingOutsourcingOff-shoringSupply Chain ManagementInsourcingInformingThe Steroids

People are too sickPeople are too disempoweredPeople are too frustrated

You can compete with anyone!

Improved integration and interoperabilityInherent reuse Inherent reuseStreamlined architectures, standards, and solutionsLeverage existing legacy codeEstablishing standardized XML data representationBest of the breedAgilityBusiness Intelligence -> Collaborative IntelligenceIntegrationInternal cloud -> external Make to order vs. make to stockMicro-business and micro-outsourcingCo-creationCustomer-driven innovations and delivery

Deployment of loosely coupled services to complete a business process, independent from the specific technologies or platforms used

MedicalWeb developmentTechnology developmentetc.

Pick keywordsOn Page optimizationGet people to link to youSocial interaction

Missing Cardinalities

4

In the Courses table

Prediction Methods:Use some variables to predict unknown or future values of other variables.

Description Methods:Find human-interpretable patterns that describe the data.

Decision Support Systems combine models and data in an attempt to solve semi structured and some unstructured problems with extensive user involvement

Expert Systems are computer systems that attempt to mimic human experts by applying expertise in a specific domain

Deep BlueTopioDeception Detection AvatarWatson

Exploitation (mate) and exploration (mutation)

Explicit Knowledge: Deals with more objective, rational, and technical knowledge

Tacit Knowledge: The cumulative store of subjective or experiential learning

The oscillating demand magnification upstream in a supply chain

. Define the Problem

2. Produce the Project Schedule***

3. Confirm Project Feasibility

4. Staff the Project

5. Launch the ProjectWhat is wrong with this event table?

A

Black hole?

Also.. .what is a miracle in DFD fragments?

1. PublishCanada has one of the best portals for governmental info in the world2. InteractNamibian Parliament allows people to participate in political discussions through its website3. TransactVietnamese website offers one-stop shopping for businesses and investors seeking to obtain government licenses

Use a secure wireless network!

A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system.[1] Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.

A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system.[1] Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.