Quantitative Techniques for Business Decisions BU BBA SEP Notes

Quantitative Techniques for Business Decisions BU B.COM Notes

Marketing & Financial Analytics Bangalore City University BBA SEP 2024-25 6th Semester Notes

Business Analytics Bangalore City University BBA SEP 2024-25 5th Semester Notes

Artificial Intelligence in Business Bangalore City University B.Com SEP 2024-25 4th Semester Notes

Probability: Definitions and examples, Experiment, Sample space, Event, mutually exclusive events, Equally likely events, Exhaustive events, Sure event, Null event, Complementary event and Independent events

Probability is the measure of the likelihood that a particular event will occur. It is expressed as a number between 0 (impossible event) and 1 (certain event). 

1. Experiment

An experiment is a process or activity that leads to one or more possible outcomes.

  • Example:

Tossing a coin, rolling a die, or drawing a card from a deck.

2. Sample Space

The sample space is the set of all possible outcomes of an experiment.

  • Example:
    • For tossing a coin: S={Heads (H),Tails (T)}
    • For rolling a die: S={1,2,3,4,5,6}

3. Event

An event is a subset of the sample space. It represents one or more outcomes of interest.

  • Example:
    • Rolling an even number on a die: E = {2,4,6}
    • Getting a head in a coin toss: E = {H}

4. Mutually Exclusive Events

Two or more events are mutually exclusive if they cannot occur simultaneously.

  • Example:

Rolling a die and getting a 2 or a 3. Both outcomes cannot happen at the same time.

5. Equally Likely Events

Events are equally likely if each has the same probability of occurring.

  • Example:

In a fair coin toss, getting heads (P = 0.5) and getting tails (P = 0.5) are equally likely.

6. Exhaustive Events

A set of events is exhaustive if it includes all possible outcomes of the sample space.

  • Example:

In rolling a die: {1,2,3,4,5,6} is an exhaustive set of events.

7. Sure Event

A sure event is an event that is certain to occur. The probability of a sure event is 1.

  • Example:

Getting a number less than or equal to 6 when rolling a standard die: P(E)=1.

8. Null Event

A null event (or impossible event) is an event that cannot occur. Its probability is 0.

  • Example:

Rolling a 7 on a standard die: P(E)=0.

9. Complementary Event

The complementary event of A, denoted as A^c, includes all outcomes in the sample space that are not in A.

  • Example:

If is rolling an even number ({2,4,6}, then A^c is rolling an odd number ({1,3,5}.

10. Independent Events

Two events are independent if the occurrence of one event does not affect the occurrence of the other.

  • Example:

Tossing two coins: The outcome of the first toss does not affect the outcome of the second toss.

Classification of Data, Principles, Methods, Importance

Classification of Data is the process of organizing data into distinct categories or groups based on shared characteristics or attributes. This process helps in simplifying complex data sets, making them more understandable and manageable for analysis. Classification plays a crucial role in transforming raw data into structured formats, allowing for effective interpretation, comparison, and presentation. Data can be classified into two main types: Quantitative Data and Qualitative Data. These types have distinct features, methods of classification, and areas of application.

Principles of Classification:

  • Clear Objective:

A good classification scheme has a clear objective, ensuring that the classification serves a specific purpose, such as simplifying data or highlighting patterns.

  • Homogeneity within Classes:

The categories must be homogeneous, meaning data within each class should share similar characteristics or values. This makes the comparison between data points meaningful.

  • Heterogeneity between Classes:

There should be clear distinctions between the different classes, allowing data points from different categories to be easily differentiated.

  • Exhaustiveness:

A classification system must be exhaustive, meaning it should include all possible data points within the dataset, with no data left unclassified.

  • Mutual Exclusivity:

Each data point should belong to only one category, ensuring that the classification system is logically consistent.

  • Simplicity:

Classification should be straightforward, easy to understand, and not overly complex. A simple system improves the clarity and effectiveness of analysis.

Methods of Classification:

  • Manual Classification:

This involves sorting data by hand, based on predefined criteria. It is usually time-consuming and prone to errors, but it may be useful for smaller datasets.

  • Automated Classification:

In this method, computer programs and algorithms classify data based on predefined rules. It is faster, more efficient, and suited for large datasets, especially in fields like data mining and machine learning.

Importance of Classification

  • Data Summarization:

Classification helps in summarizing large datasets, making them more manageable and interpretable.

  • Pattern Identification:

By grouping data into categories, it becomes easier to identify patterns, trends, or anomalies within the data.

  • Facilitating Analysis:

Classification provides a structured approach for analyzing data, enabling researchers to use statistical techniques like correlation, regression, or hypothesis testing.

  • Informed Decision Making:

By classifying data into meaningful categories, businesses, researchers, and policymakers can make informed decisions based on the analysis of categorized data.

Data Analysis for Business Decisions 2nd Semester BU BBA SEP Notes

Unit 1 [Book]  
Introduction, Meaning, Definitions, Features, Objectives, Functions, Importance and Limitations of Statistics VIEW
Important Terminologies in Statistics: Data, Raw Data, Primary Data, Secondary Data, Population, Census, Survey, Sample Survey, Sampling, Parameter, Unit, Variable, Attribute, Frequency, Seriation, Individual, Discrete and Continuous VIEW
Classification of Data VIEW
Requisites of Good Classification of Data VIEW
Types of Classification Quantitative and Qualitative Classification VIEW
Types of Presentation of Data Textual Presentation VIEW
Tabular Presentation VIEW
One-way Table VIEW
Important Terminologies: Variable, Quantitative Variable, Qualitative Variable, Discrete Variable, Continuous Variable, Dependent Variable, Independent Variable, Frequency, Class Interval, Tally Bar VIEW
Diagrammatic and Graphical Presentation, Rules for Construction of Diagrams and Graphs VIEW
Types of Diagrams: One Dimensional Simple Bar Diagram, Sub-divided Bar Diagram, Multiple Bar Diagram, Percentage Bar Diagram Two-Dimensional Diagram Pie Chart, Graphs VIEW
Unit 2 [Book]  
Meaning and Objectives of Measures of Tendency, Definition of Central Tendency VIEW
Requisites of an Ideal Average VIEW
Types of Averages, Arithmetic Mean, Median, Mode (Direct method only) VIEW
Empirical Relation between Mean, Median and Mode VIEW
Graphical Representation of Median & Mode VIEW
Ogive Curves VIEW
Histogram VIEW
Meaning of Dispersion VIEW
Standard Deviation, Co-efficient of Variation-Problems VIEW
Unit 3 [Book]  
Correlation Meaning and Definition, Uses, VIEW
Types of Correlation VIEW
Karl Pearson’s Coefficient of Correlation probable error VIEW
Spearman’s Rank Correlation Coefficient VIEW
Regression Meaning, Uses VIEW
Regression lines, Regression Equations VIEW
Correlation Coefficient through Regression Coefficient VIEW
Unit 4 [Book]  
Introduction, Meaning, Uses, Components of Time Series VIEW
Methods of Trends VIEW
Method of Moving Averages Method of Curve VIEW
Fitting by the Principle of Least Squares VIEW
Fitting a Straight-line trend by the method of Least Squares VIEW
Computation of Trend Values VIEW
Unit 4 [Book]  
Probability: Definitions and examples -Experiment, Sample space, Event, mutually exclusive events, Equally likely events, Exhaustive events, Sure event, Null event, Complementary event and independent events VIEW
Mathematical definition of Probability VIEW
Statements of Addition and Multiplication Laws of Probability VIEW
Problems on Probabilities  
Conditional Probabilities VIEW
Probabilities using Addition and Multiplication Laws of Probabilities VIEW

Business Data Analysis BU B.Com 2nd Semester SEP Notes

Unit 1 [Book]
Introduction, Meaning, Definitions, Features, Objectives, Functions, Importance and Limitations of Statistics VIEW
Important Terminologies in Statistics: Data, Raw Data, Primary Data, Secondary Data, Population, Census, Survey, Sample Survey, Sampling, Parameter, Unit, Variable, Attribute, Frequency, Seriation, Individual, Discrete and Continuous VIEW
Classification of Data VIEW
Requisites of Good Classification of Data VIEW
Types of Classification Quantitative and Qualitative Classification VIEW
Unit 2 [Book]
Types of Presentation of Data Textual Presentation VIEW
Tabular Presentation VIEW
One-way Table VIEW
Important Terminologies: Variable, Quantitative Variable, Qualitative Variable, Discrete Variable, Continuous Variable, Dependent Variable, Independent Variable, Frequency, Class Interval, Tally Bar VIEW
Diagrammatic and Graphical Presentation, Rules for Construction of Diagrams and Graphs VIEW
Types of Diagrams: One Dimensional Simple Bar Diagram, Sub-divided Bar Diagram, Multiple Bar Diagram, Percentage Bar Diagram Two-Dimensional Diagram Pie Chart, Graphs VIEW
Unit 3 [Book]
Meaning and Objectives of Measures of Tendency, Definition of Central Tendency VIEW
Requisites of an Ideal Average VIEW
Types of Averages, Arithmetic Mean, Median, Mode (Direct method only) VIEW
Empirical Relation between Mean, Median and Mode VIEW
Graphical Representation of Median & Mode VIEW
Ogive Curves VIEW
Histogram VIEW
Meaning of Dispersion VIEW
Standard Deviation, Co-efficient of Variation-Problems VIEW
Unit 4 [Book]
Correlation Meaning and Definition, Uses VIEW
Types of Correlation VIEW
Karl Pearson’s Coefficient of Correlation probable error VIEW
Spearman’s Rank Correlation Coefficient VIEW
Regression Meaning, Uses VIEW
Regression lines, Regression Equations VIEW
Correlation Coefficient through Regression Coefficient VIEW
Unit 5 [Book]
Introduction, Meaning, Uses, Components of Time Series VIEW
Methods of Trends VIEW
Method of Moving Averages Method of Curve VIEW
Fitting by the Principle of Least Squares VIEW
Fitting a straight-line trend by the method of Least Squares VIEW
Computation of Trend Values VIEW

WEB Security: Best Practices for Developers

Web Application Security is a critical aspect of software development, and developers play a key role in ensuring the safety and integrity of web applications. Implementing best practices for security helps protect against various threats, vulnerabilities, and attacks. Implementing robust web application security requires a proactive approach from developers. By incorporating these best practices into the development process, developers can create more secure web applications that withstand a range of potential threats. Security is an ongoing concern, and staying informed about emerging threats and continuously updating security measures are crucial components of a comprehensive web security strategy.

  1. Input Validation:
  • Sanitize User Input:

Validate and sanitize all user inputs to prevent common attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Implement input validation on both client and server sides to ensure a robust defense.

  1. Authentication and Authorization:

  • Strong Password Policies:

Enforce strong password policies, including complexity requirements and regular password updates. Use secure password hashing algorithms to store passwords.

  • Multi-Factor Authentication (MFA):

Implement MFA to add an extra layer of security beyond traditional username and password combinations. Utilize authentication factors such as biometrics or one-time codes.

  • Role-Based Access Control (RBAC):

Implement RBAC to ensure that users have the minimum necessary permissions to perform their tasks. Regularly review and update access permissions.

  1. Secure Session Management:
  • Use Secure Session Tokens:

Use secure, random session tokens and ensure they are transmitted over HTTPS. Implement session timeouts to automatically log users out after periods of inactivity.

  • Protect Against Session Fixation:

Regenerate session IDs after a user logs in to prevent session fixation attacks.

 Implement session rotation mechanisms to enhance security.

  1. Secure File Uploads:

  • Validate File Types and Content:

Validate file types and content during the file upload process. Restrict allowed file types, and ensure that uploaded files do not contain malicious content.

  • Store Uploaded Files Safely:

Store uploaded files outside of the web root directory to prevent unauthorized access. Implement file integrity checks to verify the integrity of uploaded files.

  1. Security Headers:

  • HTTP Strict Transport Security (HSTS):

Implement HSTS to ensure that the entire session is conducted over HTTPS. Use HSTS headers to instruct browsers to always use a secure connection.

  • Content Security Policy (CSP):

Enforce CSP to mitigate the risk of XSS attacks by defining a whitelist of trusted content sources. Regularly review and update the CSP policy based on application requirements.

  1. Cross-Site Scripting (XSS) Protection:

  • Input Encoding:

Encode user input to prevent XSS attacks. Utilize output encoding functions provided by the programming language or framework.

  • Content Security Policy (CSP):

Implement CSP to mitigate the impact of XSS attacks by controlling the sources of script content. Include a strong and restrictive CSP policy in the application.

  1. Cross-Site Request Forgery (CSRF) Protection:

  • Use Anti-CSRF Tokens:

Include anti-CSRF tokens in forms and requests to validate the legitimacy of requests. Ensure that these tokens are unique for each session and request.

  • SameSite Cookie Attribute:

Set the SameSite attribute for cookies to prevent CSRF attacks. Use “Strict” or “Lax” values to control when cookies are sent with cross-site requests.

  1. Error Handling and Logging:

  • Custom Error Pages:

Use custom error pages to provide minimal information about system errors to users. Log detailed error information for developers while showing user-friendly error messages to end-users.

  • Sensitive Data Protection:

Avoid exposing sensitive information in error messages. Log errors securely without revealing sensitive data, and monitor logs for suspicious activities.

  1. Regular Security Audits and Testing:

  • Automated Security Scans:

Conduct regular automated security scans using tools to identify vulnerabilities. Integrate security scanning into the continuous integration/continuous deployment (CI/CD) pipeline.

  • Penetration Testing:

Perform regular penetration testing to identify and address potential security weaknesses. Engage with professional penetration testers to simulate real-world attack scenarios.

  1. Security Training and Awareness:

  • Developer Training:

Provide security training to developers on secure coding practices and common security vulnerabilities. Stay updated on the latest security threats and mitigation techniques.

  • User Education:

Educate users about security best practices, such as creating strong passwords and recognizing phishing attempts. Include security awareness training as part of onboarding processes.

error: Content is protected !!