| November 17, 2015

Your Tasks

Write a 2000-word report on alternative and complementary technologies to be used in the deployment of the database implementation from Assessment 1, in order to fully exploit the corporate data assets. Security, ethical and legal issues should also be considered.

Specifically, you should address the following technical areas:

  1. Data Warehousing and the difference between operational and strategic data sets
  2. Data Mining and OLAP (On-Line Analytical Processing) compared with OLTP Systems
  3. The rise of ‘Big Data’ and its applications
  4. ‘NoSQL’ databases as compared with ‘ACID-compliant’ databases
  5. The impact of the ‘Open Data’ movement

Important Notes and FAQ’s

 Clearly label and number all sections and sub-sections of your report

 Try and incorporate good-quality diagrams into your discussion

 Fully reference all sources using the Harvard notation

 Each technical area carries equal weight – 20 marks each

 For each technical area, cover the following points:

 Describe the essential concepts involved in that technology

 Explain the key advantages and benefits of that technology

 Describe specific real-world applications and users of that technology

 Explain any disadvantages or situations were that technology would be unsuitable

 

 

 

 

 

 

 

 

 

 

 

 

Grading Criteria 70-100% (Excellent/Outstanding)

All five technology areas are fully explained and analysed with many excellent examples/applications

Many high-quality diagrams are employed to support the key concepts discussed in the report

 The data security, ethical and legal aspects are fully explained, analysed and placed within context

 The report is presented to a very high standard, logically sequenced with no spelling or other errors

At least 15 quality external sources are cited within the report

All external sources are fully cited and referenced by strict adherence to the Harvard standard

 

60-69% (Very Good/Commendable)

All five technology areas are well explained and analysed with some excellent examples/applications

Some high-quality diagrams are employed to support the key concepts discussed in the report

 The data security, ethical and legal aspects are well explained, analysed and placed within context

 The report is presented to a high standard, logically sequenced with no spelling or other errors

At least 12 quality external sources are cited within the report

All external sources are fully cited and referenced by strict adherence to the Harvard standard

 

50-59% (Good/Highly Competent)

Most technology areas are well explained and analysed with some excellent examples/applications

Some high-quality diagrams are employed to support the key concepts discussed in the report

 The data security, ethical and legal aspects are adequately explained and analysed

 The report is presented to a good standard, logically sequenced with few spelling or other errors

At least 10 quality external sources are cited within the report

All external sources are fully cited and referenced by strict adherence to the Harvard standard

 

40-49% (Satisfactory/Competent)

Most technology areas are explained and analysed to some degree

Possibly one or more diagrams are employed to support the key concepts discussed in the report

 The data security, ethical and legal aspects are explained and analysed in a very superficial manner

 The report is presented to a basic (but readable) standard

At least 7 quality external sources are cited within the report

All external sources are fully cited and referenced by reasonable adherence to the Harvard standard

 

35-39% (Unsatisfactory)

 Most technology areas are NOT explained and analysed to any serious degree

 No diagrams are employed to support the key concepts discussed in the report

 The data security, ethical and legal aspects are very poorly explained and analysed (if at all)

 The report is presented to a very basic (but readable) standard, possibly with spelling errors

 Fewer than 5 quality external sources are cited within the report

 Few external sources are cited and referenced by any adherence to the Harvard standard

 

1-34% (Very Poor/Nothing of Merit)

 Most technology areas are NOT explained and analysed to any meaningful degree

 No diagrams are employed to support the key concepts discussed in the report

 The data security, ethical and legal aspects are very poorly explained and analysed (if at all)

 The report is presented to a very basic (but readable) standard, with many errors and mistakes

 Fewer than 3 quality external sources are cited within the report

 There is no use of the Harvard system

 

Attachments:

Get a 5 % discount on an order above $ 150
Use the following coupon code :
2018DISC
Module/Week 5 Homework Assignment Chapter 7 Homework PART 1: (1 point) Given the following table, identify the functional dependencies 130055
Kaplan IT499 unit 5 assignment 18132

Category: Homework Help

Our Services:
Order a customized paper today!