Calculate the difference in CLV using the spreadsheet data compiled by Boulogne and Scott in Exhibit 8.

Data Analytics

Calculate the difference in CLV using the spreadsheet data compiled by Boulogne and Scott in Exhibit 8. If you opt to use the simplified formula shared by the professor, assume that the first contributions from customers acquired would occur in the next, rather than the current reporting period. As discussed in class, the professor’s recommended formula understates contribution by about one period of revenue contribution. You will need to adjust your calculations accordingly. You are free to use bullets to explain your calculation, if needed. Be concise. Keep it simple and get to the point quickly. Please limit responses to no more than 100 words.

For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).

m*r/(1 +i-r)

576*

B /

U Paragraph v* Arial

1Opt

A

Tx

 

 

Briefly explain the 3 models describing the attacker behaviors in respect to the source IP, the target IP and the time interval.

Programming

Briefly explain the 3 models describing the attacker behaviors in respect to the source IP, the target IP and the time interval. (6)

Cyber security applications result in large amounts of data. Such “Big Data” can be extracted from sensors, computer network traffic, or massive topology datasets. What are some of the ways by which you can perform data analytics on such large petabyte level datasets in a feasible and efficient manner? Provide Specific Examples. (10)

 

Assume you are not given the probability distributions P(Y), P(Xi iY) or P(X2IY), and are asked to estimate them from data instead. How many parameters would you need to estimate?

Machine Learning

Problem 1: Naive Bayes Classifiers (20 pts) Consider the binary classification problem where class label Y E {0, 1} and each training example X has 2 binary attributes X = [X1, X2] E {0,1}2. Assume that class priors are given P(Y = 0) = P(Y = 1) = 0.5, and that the conditional probabilities P(X1 I Y) and P(X2IY) are given as follows:

p(Xi IY) Y = 0 Y = 1 X1 = 0 0.7 0.2 X1 = 1 0.3 0.8

p(X2 1Y) Y = 0 Y = 1 X2 = 0 0.9 0.5 X2 = 1 0.1 0.5

(a) [6 ptsJ What is the naive Bayes prediction “(x) for the input x = [x1, x2] = [0, 0]? Explain your reasoning.

(b) Assume you are not given the probability distributions P(Y), P(Xi iY) or P(X2IY), and are asked to estimate them from data instead. How many parameters would you need to estimate?

(c) Assume you want to estimate the conditional probability distribution P(YiXi, X2) directly, without making the naive Bayes assumption. How many parameters would you need to estimate from data?

(d) Assume you now want to estimate the joint probability distribution P(Y, Xi, X2) directly. How many parameters would you need to estimate from data?

 

What is ODBC? How is it related to SQL/CLI? What is JDBC? Is it an example of embedded SQL or of using function calls?List the three main approaches to database programming. What are the advantages and disadvantages of each approach?

Comparing the Three Approaches

What is ODBC? How is it related to SQL/CLI?

What is JDBC? Is it an example of embedded SQL or of using function calls?List the three main approaches to database programming. What are the advantages and disadvantages of each approach?

What is the impedance mismatch problem? Which of the three programming approaches minimizes this problem?

Describe the concept of a cursor and how it is used in embedded SQL.

10.6. What is SQLJ used for? Describe the two types of iterators available in SQLJ.

Exercises

Consider the database shown in Figure 1.2, whose schema is shown in Figure 2.1. Write a program segment to read a student’s name and print his or her grade point average, assuming that A = 4, B = 3, C = 2, and D = 1 points.

Use embedded SQL with C as the host language.

Repeat Exercise 10.7, but use SQLJ with Java as the host language.

Consider the library relational database schema in Figure 6.6. Write a program segment that retrieves the list of books that became overdue yesterday and that prints the book title and borrower name for each. Use embedded SQL with C as the host language.

Repeat Exercise 10.9, but use SQLJ with Java as the host language

 

Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the six clauses. Which of the six clauses are required and which are optional?

The ALTER Command

Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the six clauses. Which of the six clauses are required and which are optional?

Describe conceptually how an SQL retrieval query will be executed by specifying the conceptual order of executing each of the six clauses.

Discuss how NULLs are treated in comparison operators in SQL. How are NULLs treated when aggregate functions are applied in an SQL query? How are NULLs treated if they exist in grouping attributes?

Discuss how each of the following constructs is used in SQL, and discuss the various options for each construct. Specify what each construct is useful for.

  1. Nested queries
  2. Joined tables and outer joins
  3. Aggregate functions and grouping
  4. Triggers
  5. Assertions and how they differ from triggers
  6. The SQL WITH clause
  7. SQL CASE construct
  8. Views and their updatability
  9. Schema change commands

 

Identify the critical missing information from the Local_phone and Cell_phone attributes. Would you store this additional information in the Local_phone and Cell_phone attributes or add new attributes to the schema for STUDENT?

DISCUSSION QUESTION

Consider a STUDENT relation in a UNIVERSITY database with the following attributes . Note that the cell phone may be from a different city and state  from the local phone. A possible tuple of the relation is shown below:

Name Ssn Local_phone Address Cell_phone Age Gpa

George Shaw 123-45-6789 555-1234 123 Main St., 555-4321 19 3.75

William Edwards Anytown, CA 94539

  1. Identify the critical missing information from the Local_phone and Cell_phone attributes.
  2. Would you store this additional information in the Local_phone and Cell_phone attributes or add new attributes to the schema for STUDENT?
  3. Consider the Name attribute. What are the advantages and disadvantages of splitting this field from one attribute into three attributes ?
  4. What general guideline would you recommend for deciding when to store information in a single attribute and when to split the information?
  5. Suppose the student can have between 0 and 5 phones. Suggest two different designs that allow this type of information.

5.20. Recent changes in privacy laws have disallowed organizations from using Social Security numbers to identify individuals unless certain restrictions are satisfied. As a result, most U.S. universities cannot use SSNs as primary keys . In practice, Student_id, a unique identifier assigned to every student, is likely to be used as the primary key rather than SSN since Student_id can be used throughout the system.

  1. Some database designers are reluctant to use generated keys for primary keys because they are artificial. Can you propose any natural choices of keys that can be used to identify the student record in a UNIVERSITY database?
  2. Suppose that you are able to guarantee uniqueness of a natural key that includes last name. Are you guaranteed that the last name will not change during the lifetime of the database? If last name can change, what solutions can you propose for creating a primary key that still includes last name but remains unique?
  3. What are the advantages and disadvantages of using generated keys?

What types of constraints would you expect to check? Which of these constraints are key, entity integrity, and referential integrity constraints, and which are not? Specify all the referential integrity constraints that hold on the schema.

 AIRLINE relational database schema

Consider the AIRLINE relational database schema, which describes a database for airline flight information. Each FLIGHT is identified by a Flight_number, and consists of one or more FLIGHT_LEGs with Leg_numbers 1, 2, 3, and so on. Each FLIGHT_LEG has scheduled arrival and departure times, airports, and one or more LEG_INSTANCEs—one for each Date on which the flight travels. FAREs are kept for each FLIGHT. For each FLIGHT_LEG instance, SEAT_RESERVATIONs are kept, as are the AIRPLANE used on the leg and the actual arrival and departure times and airports. An AIRPLANE is identified by an Airplane_id and is of a particular AIRPLANE_TYPE. CAN_LAND relates AIRPLANE_TYPEs to the AIRPORTs at which they can land. An AIRPORT is identified by an Airport_code. Consider an update for the AIRLINE database to enter a reservation on a particular flight or flight leg on a given date.

  1. Give the operations for this update.
  2. What types of constraints would you expect to check?
  3. Which of these constraints are key, entity integrity, and referential integrity constraints, and which are not?
  4. Specify all the referential integrity constraints that hold on the schema.

Think of different users for the database . What types of applications would each user need? To which user category would each belong, and what type of interface would each need?

Database System Concepts and Architecture

Think of different users for the database . What types of applications would each user need? To which user category would each belong, and what type of interface would each need?

Choose a database application with which you are familiar. Design a schema and show a sample database for that application, using the notation of Figures 1.2 and 2.1. What types of additional information and constraints would you like to represent in the schema? Think of several users of your database, and design a view for each.

If you were designing a Web-based system to make airline reservations and sell airline tickets, which DBMS architecture would you choose from Section 2.5?

Why? Why would the other architectures not be a good choice?

In addition to constraints relating the values of columns in one table to columns in another table, there are also constraints that impose restrictions on values in a column or a combination of columns within a table. One such constraint dictates that a column or a group of columns must be unique across all rows in the table. For example, in the STUDENT table, the Student_number column must be unique .

Identify the column or the group of columns in the other tables that must be unique across all rows in the tab

 

Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2.  What is the difference between controlled and uncontrolled redundancy?

Figure 1.2 database

Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2.

What is the difference between controlled and uncontrolled redundancy? Illustrate with examples.

Specify all the relationships among the records of the database shown in Figure 1.2.

Give some additional views that may be needed by other user groups for the database shown in Figure 1.2.

Cite some examples of integrity constraints that you think can apply to the database shown in Figure 1.2.

Give examples of systems in which it may make sense to use traditional file processing instead of a database approach.

What four main types of actions involve databases? Discuss the main characteristics of the database approach and how it differs from traditional file systems.

Databases

In this chapter we defined a database as a collection of related data, where data means recorded facts. A typical database represents some aspect of the real world and is used for specific purposes by one or more groups of users. A DBMS is a generalized software package for implementing and maintaining a computerized database. The database and software together form a database system.

Define the following terms: data, database, DBMS, database system, data- base catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application.

1.2. What four main types of actions involve databases? Briefly discuss each.

1.3. Discuss the main characteristics of the database approach and how it differs from traditional file systems.

1.4. What are the responsibilities of the DBA and the database designers?

1.5. What are the different types of database end users? Discuss the main activities of each.

1.6. Discuss the capabilities that should be provided by a DBMS.

1.7. Discuss the differences between database systems and information retrieval systems.