Understanding PageRank, DGIM Algorithm, and Hadoop Ecosystem
PageRank Concept
Basic PageRank Formula: PR(A) = (1−d) + d × (C(T1)/PR(T1) + … + C(Tn)/PR(Tn)
Teleporting & Damping Factor
Concept of ‘teleporting’ in random surfer model to avoid issues like rank sinks & spider traps. Damping factor represents the probability that a user will continue clicking on links.
Handling Dead Ends & Spider Traps
Dead ends: Pages with no outbound links, causing ‘leakage’ of PageRank. Spider traps: Pages or groups of pages that only link to each other, trapping
Read MoreUnderstanding Information Systems and Computing
Quiz 1&2
To effectively and efficiently use computers, you need to know the parts of an information system, which include people, procedures, software, hardware, data and the Internet. Here between data and information, the total amount you are paid for the week should be information and the number of hours you worked in a week and your pay rate are data. There are two major kinds of software discussed in Chapter1: system software and application software. Midrange computers are computers with
Read MoreDigital Marketing: Strategies, Elements, and Tools
Marketing is the process by which companies create value for customers and society, resulting in strong customer relationships that capture value from the customers in return.
Digital marketing, also known as online marketing, refers to advertising delivered through digital channels to promote brands and connect potential customers using the internet and other forms of digital communication such as: Search engines. Websites. Social media.
MAIN ELEMENTS OF DIGITAL MARKETING
– User Experience in digital
Java Inheritance and Polymorphism: Examples and Explanation
Single Inheritance Example
…
Multilevel Inheritance Example
…
Hierarchical Inheritance Example
…
Method Overriding
…
Abstract Class that has Abstract Method
…
Java Package
…
Wrapper class Example: Primitive to Wrapper
…
Wrapper class Example: Wrapper to Primitive
…
Dynamic method dispatch
…
Read Morepp
1.- What are the main risks if someone is using our wifi, without our Permission?
-They can prevent the connection of our equipment.-An inappropriate configuration of our wireless network can allow an attacker to steal the information we transmit.
–Direct connection to our devices. An intruder with sufficient knowledge could access computers connected to the network, which would involve giving you access to all of our information.
–Responsibility for illegal actions.
2.- a) How can we detect if an intruder
Read MoreDatabase Management and Optimization
Schema:
4 control processing/storage efficiency: choice of indexes * file organizations 4 base tables & indexes *data clustering // creating indexes *speed up random/sequential access 2 base table data.
Select Statement:
select from where groupby having orderby
Views:
* provide users controlled access 2 tables * base table–table containing the raw data // dynamic view a “virtual table” created upon request by a user * no data actually stored; instead data from base table made available
Read More