Data Handling and Business Intelligence

Verified

Added on  2022/12/30

|14
|3472
|1
AI Summary
This study material focuses on data handling and business intelligence. It covers the uses of different excel formulas, data mining methods, evaluating and saving data, data recovery, formulating analysis, conditional formatting, and more. It is perfect for students studying data analysis and business intelligence. The material is available for various courses and colleges/universities.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
DATA HANDLING AND BUSINESS INTELLIGENCE

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Part 1............................................................................................................................................3
Uses of different excel formulas..................................................................................................3
PART 2............................................................................................................................................7
1. Using the nutrition.csv provided the workings with screenshots and explanation of results
are shown below:.........................................................................................................................7
2. Data mining methods.............................................................................................................11
CONCLUSION..............................................................................................................................13
REFERENCES..............................................................................................................................14
Document Page
INTRODUCTION
The data collection fields in which activities are carried out using an engineering system in
which their expertise is the most important asset to an organisation are data analysis and product
promotion (IşıK, Jones and Sidorova, 2013). The study is focused on two specific activities that
provide comprehensive details about the usage of multiple forms of Excel functions in the first
mission. Different types of mining techniques are listed in the second section of the text, along
with some SPSS operations in the sense of the time series.
MAIN BODY
Part 1
Uses of different excel formulas
The practise of storing, recording, reviewing and displaying useful and collected material in a
format that is very successful for the consumer is known as data handling. Business intelligence
(BI) greatly increases products and technologies to convert data into functional knowledge that
supports the rational decision of an organisation (Bahrami, Arabzad and Ghorbani, 2012). In
papers, overviews, analysis methodology, charts, digital presentations, display and evaluate
software databases and share scientific observations that will provide customers with more
comprehensive facilities on the structure of the company.
Companies can be defined for employees, corporate administrators, home supervisors, data
processing, daily performance reporting, such as Excel Spreadsheets software. Microsoft Excel is
used in the main instructions.
Evaluating AND Saving DATA - Microsoft Excel is a great way to evaluate the method and
exploit the information. Details can be written in numerous columns and rows of paper. Data
analysis is assisted by tables and diagrams. The details collected for measuring reliability was
regarded as the long ranges of the error function owing to the intrinsic mistakes, and its
comparison process. Requirements are used for computer appraisal and also for weighing items.
The programme is visited and reviewed by the external auditors in this stage, referring to the
series of process variables depending on the data types that are deemed to be quality measures.
That is, there seems to be a hypothesis that these structures can contribute to quality results.
Document Page
These procedures, driven by structured performance requirements, are more representative of the
different forms of quality control, like self-assessment and even regular site teams. Knowledge is
accessible from the Spread-sheet from different journals and records. Code is recorded in
sequence. In order to truly appreciate the tests, it allows one to devote a huge amount of time.
Using Pivot Table, data extraction does not help it.
DATA RECOVERY- Which can be accessed from the app by customers before the data is
compromised (Rausch, Sheta and Ayesh, 2013). Data is derived from the MS Excel platform
from the DATA sheet. The conditions of the same system failure used by the application
development tools to produce the replacement and also the description of the reconstruction goal,
the restoring restoration method. Any computer and notebook recovery software devices, for
instance, allow customers to directly restore missing data, but retrieving a deleted archive from a
database archive is a much more complicated procedure requiring IT interference. Data retrieval
methods can be used to restore files from a device that have not been erroneously assisted and
deleted yet but still scattered on the hard disc.
Formulating Analysis- The project report can be written in MS Excel, as well as in MS Word
files or panel type. With Ms Excel, you can use the database to use this info. To perform
simultaneous system differentiation, MS Excel can be used. MS Excel ultimately tracks
organisations, but it also allows workers to record their success reports on a steady basis.
Through the use of charts, diagrams, strategies and projections, instructors will support pupils.
Growing understanding-The usual attempt to reach degrees of success in the past, but
development still allows us to achieve the future research. Why did we waste a lot of years living
that way? The strategy applies to dealing with the issue of what is or truly is. Via involving
cognitive and current data, users create future prospects. As per this report, the growth and
implementation is carried out by organizations. It has since appeared to be the global benchmark
for quality, adding all manner of features and functions. As such, certain essential, excellent
formulas are available to help all kinds of clients. There are about infinite amount of useful Excel
formulas as well as events. The app can be used for all kinds of uses, such as budgeting, database
management, maps and graph development, and many more. There were formulations back then
that could support unique cases. It will concentrate on the option of excellent Excel formulas that
can be used in practically any situation. They will assist with the customer's efficiency and make
it a lot easier to handle it.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CONDITIONAL FORMATTING- It is possible to list all related individuals under the
conditional classification. Other instances of a conditional model can still exist. This also applies
to awareness of conception meanings and recognition. Conditional Formatting (CF) is a method
involving the configuration of an object or a sequence of lines as well as the adjustment of the
performance evaluation or equation meaning to the requirement income. For starters, if the cell's
value is greater than 100, this can only render a cell seem brazen (Rahman, Aldhaban and
Akhter, 2013). The configuration you choose is added to the cells if the cell output exceeds the
layout requirements. If the protection of the device doesn't really reach the format requirements,
the standard container style is used.
Safe- MS Excel offers rigorous device security for panels, helping employees to monitor their
output quickly. Using fundamental visual software, the two MS Excel files were placed within an
excellent archive. They file the basic information in MS Scatter as well as maintain the organised
data so that time is saved. Everybody wants their documents to be secure, and MS Excel is very
good at solving this issue. Yet no one is capable of substituting or removing it.
IF Function
In Excel, in the IF function or IF statement, a 3-part time clause has been used. In this scenario, it
is easy and seeing what income and profit thresholds are lowered or what period that seller's
payout is, and even how point for point the IF functions is applied.
For the first example, cut / paste the taxable date, sales and profit again on various websites.
Reorganize past files into a first structure of the manufacturing process claim.
• Use the form 'IF Part' Form the sort code = if (type of virus: B2>C3),
If the client follows the criteria, proceed to add the wireless key to be tested as well.
• Pick a semi colon: Choose "Rise"
• Remove the box; and whether the condition is not met, press Start.
If a function stresses the importance of B3, if the worth of B3 is greater than those of the section
of B3, the design of B1 will imply that perhaps the parameters might be much more essential
than B3.' As this option could be seen, as they click the Enter key, customers would get the
structure of cell B4. Shift the dealing from D4 to portable D8400 to see the impact.
Document Page
If people were to know which H Lookup and V lookup will be in a process, they will not be
annoyed. If the consumers like it or not is an essential skill. When they work with low numbers,
they will discuss this in depth (Mungree, Rudra and Morien, 2013).
Lookup Value: A line or base together with the query item. That's the basis of the string,
actually.
Table’s series: A fitting history outline. It is difficult to pick what the client needs from their
board.
Row list quantity: The required state is displayed in the row columns. It'll have to be the original
row 1.
Lookup range]: In the table, two versions of the identical set are included, one right (1) and one
inaccurate (1) (0).
Usage of the feature Lookup
Lookup value: A section or line region matches a query and recovers the same consistency by the
action of the normal section or line area within which LOOKUP supersedes such issues
(Kemper, Baars and Lasi, 2013). In terms of the time, payments and revenues required, Cell G2,
H2 and I2 were used. It involves the delivery of G3, H3 and I3. Use the Cached key as a G3 cell
to connect the H3 cell to the Iterate portion.
Series: Quality selection A2 to C8400 (A2:C8400) for the entire data set
[Range search]: for the cells to be purchased, B2 to B8400 (B2:B8400).
Charts
Steps:
Select a cell for even a bar chart which will be made.
To claim clarity, select a line graph.
Document Page
01/01/2009
03/04/2009
04/07/2009
04/10/2009
04/01/2010
06/04/2010
07/07/2010
07/10/2010
07/01/2011
09/04/2011
10/07/2011
10/10/2011
10/01/2012
11/04/2012
12/07/2012
12/10/2012
-20000
0
20000
40000
60000
80000
100000
Sales
Profit
Description: The relevant figures state that in January, too the firm had the highest profits and
the lowest expenditures. In 2012, on the other side, double the highest profit as recorded. The
figures show that revenues and earnings differ dramatically; the business suffered significant
losses from 2009 through 2010, except 2012. Real sales rose through 2009, although there was
no reduction in subsequent years in 2009.
PART 2
1. Using the nutrition.csv provided the workings with screenshots and explanation of
results are shown below:
The following analysis was carried out with the support of various SPSS tasks from the sample
population issued. The findings can be seen and listed below:
Descriptive analysis of Gender and rice consumption
Statistics
Gender Rice
N Valid 100 100
Missing 9 9
Mean 1.50 .60
Median 1.50 1.00
Mode 1a 1
Std. Deviation .503 .492
Range 1 1

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
a. Multiple modes exist. The smallest
value is shown
Gender
Frequency Percent
Valid
Percent
Cumulative
Percent
Valid 1 50 45.9 50.0 50.0
2 50 45.9 50.0 100.0
Total 100 91.7 100.0
Missing System 9 8.3
Total 109 100.0
Rice
Frequency Percent
Valid
Percent
Cumulative
Percent
Valid 0 40 36.7 40.0 40.0
1 60 55.0 60.0 100.0
Total 100 91.7 100.0
Missing System 9 8.3
Total 109 100.0
Descriptive analysis between age group consuming the rice
Statistics
Rice Age
N Valid 100 100
Missing 9 9
Mean .60 20.35
Document Page
Median 1.00 19.00
Mode 1 22
Std. Deviation .492 3.560
Range 1 13
Rice
Frequency Percent
Valid
Percent
Cumulative
Percent
Valid 0 40 36.7 40.0 40.0
1 60 55.0 60.0 100.0
Total 100 91.7 100.0
Missing System 9 8.3
Total 109 100.0
Age
Frequency Percent
Valid
Percent
Cumulative
Percent
Valid 13 5 4.6 5.0 5.0
15 5 4.6 5.0 10.0
17 8 7.3 8.0 18.0
18 13 11.9 13.0 31.0
19 20 18.3 20.0 51.0
20 5 4.6 5.0 56.0
22 21 19.3 21.0 77.0
23 1 .9 1.0 78.0
25 12 11.0 12.0 90.0
26 10 9.2 10.0 100.0
Document Page
Total 100 91.7 100.0
Missing System 9 8.3
Total 109 100.0
The other statistical test are presented below:
One way Anova test between gender and age.
Correlation test
One sample T test;
One-Sample Statistics
N Mean
Std.
Deviation
Std. Error
Mean

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Gender 100 1.50 .503 .050
Rice 100 .60 .492 .049
One-Sample Test
Test Value = 0
t df
Sig. (2-
tailed)
Mean
Difference
95% Confidence Interval of
the Difference
Lower Upper
Gender 29.850 99 .000 1.500 1.40 1.60
Rice 12.186 99 .000 .600 .50 .70
2. Data mining methods
Statistical tools: At a specific moment, the theoretical nation faces the same major problem as
machine learning: if inadequate observations of the subsurface can be accurately extracted. The
most effective data approach is a brief and detailed description of the interaction between
findings (Winter, Marjanovic and Wixom, 2013). The same protocol coincides with this simple
text and discusses a variety of fundamental issues emerging from empirical evidence:
presumption control, trust measurement and contradictory number review. Data analysis is a
division that collects computational math results and describes them. Approaches to information
science are yet another technique that others do not accept as a way to interpret results. But it is
also recommended to research forecast data and patterns. In statistics, the application server is
also attentive to other approaches. The earth currently consists of massive large data and critical
problems of molecular spectroscopy.
View: Imagining data models to grasp them is the easiest way. This methodology can be used
from the start of data analysis. A few research projects, referred to as time trials, are actively
designing innovative operations. A variety of techniques of data mining yield valuable research
patterns. Graphical image is also a technique that converts bad data into efficient findings for
data analysis use and different approaches.
Document Page
Induction Decision Tree Technique- Yes, a random forest is a secluded unit; it also means tree
by word. In this procedure, every other tree division is often used as a binary classification, as
well as to explain the tree breaks for the database portion (Deng and Chi, 2012). In exploratory
studies, this technique can be used for both preceding and studying. For a certain task, the data
collection may be used as a subset of the training study. In their estimate of their performance,
the data in the chapter indicates certain variations. The Decision Tree has clear consequences for
student entry.
Clustering Strategies- One of the main statistical approaches is clustering, and it is a process by
which data clustering is clustered fairly. It gives explanations of contradictions and relations
through study. It is also recognized as isolation, which enables users to define the server's
activities. Deductible will for instance, categorise its consumers by job, age, compensation and
type of claims.
Convolution Network- The popular approach that is used mainly by individuals is neural
networks. This process is typical for early information mining (Rouhani, Asgari and Mirhosseini,
2012). Since they are designed, artificial intelligence is easy to obtain and consumers do not need
to be technically or software. The neuronal method was implemented by an artificial intelligence
company.
Methodology of Association Rule: A relationship between objects in the image is created. The
interaction inside the database between different variables is also important. Proof for the
identification of parameters and the persistent occurrence of individual's environment at the same
amounts is given in the hidden template database.
SPSS is user and simple tutor applications, but still allows research, even though knowledge
selection is broader. The statistical approach is a software package which is used in statistics to
evaluate rational data aggregation and non-batching.
This program is one of the most common succinct programmes with basic rules that can conduct
incredibly complicated data research and calculation.
To create collated files, dispersed and pattern graphs and maps, factor stats, and also to analyse
data, SPSS can collect and then use information from any medium.
Procedural aspects may be more rigorous for all those who need specialised protocols, as in R
amount, not necessarily on SPSS, but not as stable and useful as R and other technology may be
required (Angelaccio, Basili and Liguori, 2012).
Document Page
A Social Science Statistical Kit that can then be used exclusively by forecasters. That will need
additional sales, amongst other packs.
Standard graphics are very distinct from the output of retailers. Using other applications with
graphics is normally easier.
With such methods, knowledge of optimal doses and sample sizes is lacking.
CONCLUSION
On the basis of the aforementioned project paper, it can be inferred that excellent functions are
helpful for enterprises in order to minimise the uncertainty of the data set and to efficiently find a
clear result. Detailed review of provided consumer usage data was carried out in the next section
of the report in conjunction with different types of SPSS functions.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
IşıK, Ö., Jones, M.C. and Sidorova, A., 2013. Business intelligence success: The roles of BI
capabilities and decision environments. Information & management, 50(1), pp.13-23.
Bahrami, M., Arabzad, S.M. and Ghorbani, M., 2012. Innovation in market management by
utilizing business intelligence: introducing proposed framework. Procedia-Social and
Behavioral Sciences, 41, pp.160-167.
Rausch, P., Sheta, A.F. and Ayesh, A. eds., 2013. Business intelligence and performance
management: Theory, systems and industrial applications. Springer Science & Business
Media.
Rahman, N., Aldhaban, F. and Akhter, S., 2013, July. Emerging technologies in business
intelligence. In 2013 Proceedings of PICMET'13: Technology Management in the IT-
Driven Services (PICMET) (pp. 542-547). IEEE.
Kemper, H.G., Baars, H. and Lasi, H., 2013. An integrated business intelligence framework.
In Business Intelligence and Performance Management (pp. 13-26). Springer, London.
Winter, R., Marjanovic, O. and Wixom, B.H., 2013, January. Introduction to Business Analytics,
Business Intelligence, and Big Data Minitrack. In 2013 46th Hawaii International
Conference on System Sciences (pp. 3767-3767). IEEE Computer Society.
Rouhani, S., Asgari, S. and Mirhosseini, S.V., 2012. Review study: business intelligence
concepts and approaches. American Journal of Scientific Research, 50(1), pp.62-75.
Angelaccio, M., Buttarazzi, B., Basili, A. and Liguori, W., 2012, October. Using geo-business
intelligence to improve quality of life. In 2012 IEEE First AESS European Conference on
Satellite Telecommunications (ESTEL) (pp. 1-6). IEEE.
Deng, X. and Chi, L., 2012. Understanding postadoptive behaviors in information systems use:
A longitudinal analysis of system use problems in the business intelligence
context. Journal of Management Information Systems, 29(3), pp.291-326.
Mungree, D., Rudra, A. and Morien, D., 2013. A framework for understanding the critical
success factors of enterprise business intelligence implementation.
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]