Understanding PageRank, DGIM Algorithm, and Hadoop Ecosystem

PageRank Concept

Basic PageRank Formula: PR(A) = (1−d) + d × (C(T1)/PR(T1) + … + C(Tn)/PR(Tn)

Teleporting & Damping Factor

Concept of ‘teleporting’ in random surfer model to avoid issues like rank sinks & spider traps. Damping factor represents the probability that a user will continue clicking on links.

Handling Dead Ends & Spider Traps

Dead ends: Pages with no outbound links, causing ‘leakage’ of PageRank. Spider traps: Pages or groups of pages that only link to each other, trapping

Read More

Understanding Information Systems and Computing

Quiz 1&2

To effectively and efficiently use computers, you need to know the parts of an information system, which include people, procedures, software, hardware, data and the Internet. Here between data and information, the total amount you are paid for the week should be information and the number of hours you worked in a week and your pay rate are data. There are two major kinds of software discussed in Chapter1: system software and application software. Midrange computers are computers with

Read More

Digital Marketing: Strategies, Elements, and Tools

page1image32015168

Marketing is the process by which companies create value for customers and society, resulting in strong customer relationships that capture value from the customers in return.
Digital marketing, also known as online marketing, refers to advertising delivered through digital channels to promote brands and connect potential customers using the internet and other forms of digital communication such as: Search engines. Websites. Social media.


MAIN ELEMENTS OF DIGITAL MARKETING

User Experience in digital

Read More

Java Inheritance and Polymorphism: Examples and Explanation

Single Inheritance Example

Multilevel Inheritance Example

Hierarchical Inheritance Example

Method Overriding

Abstract Class that has Abstract Method

Java Package

Wrapper class Example: Primitive to Wrapper

Wrapper class Example: Wrapper to Primitive

Dynamic method dispatch

Read More

pp

1.- What are the main risks if someone is using our wifi, without our Permission?

-They can prevent the connection of our equipment.-An inappropriate configuration of our wireless network can allow an attacker to steal the information we transmit.

Direct connection to our devices. An intruder with sufficient knowledge could access computers connected to the network, which would involve giving you access to all of our information.

Responsibility for illegal actions.

2.- a) How can we detect if an intruder

Read More

Database Management and Optimization

Schema:

4 control processing/storage efficiency: choice of indexes * file organizations 4 base tables & indexes  *data clustering // creating indexes *speed up random/sequential access 2 base table data.

Select Statement:

select from where groupby having orderby

Views:

* provide users controlled access 2 tables * base table–table containing the raw data // dynamic view  a “virtual table” created upon request by a user * no data actually stored; instead data from base table made available

Read More