Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Ch3.

1 DS Review 2023-12-06, 8:46 AM

Data Types Data Data Security Data Uses Data Integrity


Dilemmas
100 100 100 100 100
The traffic light What are the A protocol Big Data is a The count of
I am driving two challenges developed for term students in a
toward has associated with sending characterized classroom.
turned red. manual data information by 4Vs.
Which part of entry that securely over The height of a
DIKW does this impact both the Internet by Please identify person.
belong to? data integrity using an the 4Vs
and data encrypted link Which one is
reliability? between a web continuous
server and a data, discrete
Knowledge. browser. data?
The proneness
to error and
What is this? Volume, Discrete: Count
accidental data
velocity, of students in a
deletion.
Secure Socket variety, veracity classroom
Manual data Layer (SSL)
entry is prone
to errors, and or Transport Continuous:
accidental Layer Security Height of a
deletions can (TLS) person
compromise
both data
integrity and
reliability.
200 200 200 200 200
Please list 2 why might How does a Please provide What is the
characteristics relying on degausser work two examples difference
of qualitative "facts" from to erase data? of real-world between a
data other than two decades use of Big primary key
being non- ago present the degausser Data. and foreign key
statistical and challenges, and disrupts the in a relational
is typically what impact magnetic 1. Healthcare database? Why
unstructured or does it have on structure that Analytics: do we need
semi- decision- holds the data, Analyzing them both?
structured. making? effectively electronic
"scrambling" health records Daily Double:
Relying on the information to predict
Data is not outdated data stored on the disease risk The
measured poses magnetic factors and primary
using challenges as it medium optimize key

https://jeopardylabs.com/print/ch31-ds-review Page 1 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

numbers may not treatment uniquely


to derive a accurately strategies. identifies
conclusion reflect current records
conditions, 2. Financial within its
Based on trends, or Fraud own table.
data circumstances. Detection:
properties, This can lead to Monitoring The
attributes, uninformed credit card foreign
labels etc. decisions, transactions to key
misguided identify unusual establishe
Used as a policies, and an spending s a link
start for inaccurate patterns between
asking understanding indicative of tables by
“why” of the present fraudulent referencin
questions reality. activity. g the
primary
Deals with 3. Smart Cities key of
non- Management: another
numerical Analyzing table.
data traffic patterns,
(concepts, public Together,
description transportation they
s, usage, and maintain
meanings, energy data
words consumption integrity
etc.) data to and
enhance city support
planning and relationshi
resource ps
allocation. between
tables in a
relational
database.

300 300 300 300 300


Please list 3 How can Please compare Explain two What
methods of wearable and contrast different kinds components
quantitative device Symmetric key of metadata together make
data collection. manufacturers encryption and and their uses up a relational
build and Public key with real-life database?
1. maintain trust (asymmetric) examples.
Surveys/Questi in the accuracy encryption Tables of data
onnaire: of health data? Descriptive make up of
Surveys involve Provide three Give me 2 of metadata rows and

https://jeopardylabs.com/print/ch31-ds-review Page 2 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

a set of pros and three each describes the columns


questions cons. content of the
presented to Symmetric: data, making it Fields, primary
participants, Daily Double easier to key, foreign key
who provide Fast but less identify and
responses Pros: secure for key locate. There also
based on their distribution Includes needs to be a
opinions, 1. Transpare because using information like relationship
experiences, or nt Data the same key the title, established
characteristics. Handling: author, and between the
Manufactu Efficient for summary of a tables.
2. rers can bulk data book.
Experiments: build trust encryption.
Experimental by being Structural
research transparen Asymmetric: metadata
involves t about outlines the
manipulating how health Essential for relationships
one or more data is secure between
variables to collected, communication, different pieces
observe the processed, digital of data and
effect on and signatures, and how they form
another shared, key because a larger
variable. fostering there's a structure.
user private and Identifies the
3. Causal- confidence public key chapters or
comparative . being used timestamps,
observational 2. Regular allowing users
Studies: More secure
Software to navigate
Quantitative due to the use
Updates: through the
data is of key pairs.
Providing video in a video
obtained by regular file
Commonly
counting updates used for secure
occurrences, and Administrative
communication,
measuring security metadata
digital
durations, or patches provides
signatures, and
recording demonstra information
key exchange.
numerical tes a about the
values during commitme creation,
observations. nt to maintenance,
maintainin and usage of
g the the data.
integrity Digital image
and file,
security of administrative
the device metadata

https://jeopardylabs.com/print/ch31-ds-review Page 3 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

and its includes details


data. about the
3. Third- camera
Party settings, date
Audits: of creation, and
Independe photographer's
nt audits name.
by trusted
third Rights
parties can metadata
validate specifies
the information
accuracy about
and intellectual
security property rights,
measures permissions,
of health and restrictions
data, associated with
enhancing the data.
user trust. In a digital
document,
Cons: rights metadata
indicates
1. Limited whether the
Control document is
over under copyright
Third- and any usage
Party restrictions.
Apps: If
the
wearable
device
integrates
with third-
party
apps,
manufactu
rers may
have
limited
control
over how
those apps
handle
health

https://jeopardylabs.com/print/ch31-ds-review Page 4 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

data,
creating
potential
trust
issues.
2. Data
Breach
Risks:
Despite
efforts,
the risk of
data
breaches
always
exists, and
a single
breach can
significantl
y erode
user trust
in the
security of
health
data.
3. Changing
Regulation
s: Evolving
privacy
regulation
s may
require
manufactu
rers to
adapt their
practices,
and any
perceived
lag in
complianc
e can
impact
user trust.

400 400 400 400 400

https://jeopardylabs.com/print/ch31-ds-review Page 5 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

Once data has When Discuss the Please explain Please explain
been collected, considering the significance of explain the the 3 methods
it must be ethics of a implementing steps of how of weakening
processed from fitness tracking data encryption deepfake is Data Integrity.
its raw format. app collecting in a business created with
detailed environment. data. Commission:
Which stage of personal data, Creating data
data lifecycle what should Daily Double 1. Data from nothing
does this users question Collection: (ex. Doing a
belong to? and consider Protection Gather a lab, you did not
when using of substantial actually do
What are the 3 fitness tracking Sensitive amount of your lab,
methods that apps? Informatio video footage instead, you
can be used n: featuring the decided to just
during this Encryption
Users should target make up data
stage? serves as
question the individual for the lab
extensive data a crucial result. Lying.)
Process/usage collection safeguard 2. Training the
stage: practices of the for Neural Omission:
fitness tracking sensitive Network: The Removing,
1. Data data, collected data reducing data,
app, which
Wrangling: preventing is fed into a erasing data
includes
Raw data unauthoriz deep neural (Cherry-
recording
cleaned ed access network, allows picking, fake
activities,
and and the algorithm news by mixing
locations, and
transforme ensuring to understand both legit and
health metrics.
d into confidentia and mimic the fake
The security
useful and lity. subject's facial information
level of the
accessible features, together,
company is also
data Legal expressions, propaganda
a concern.
Complianc and vocal etc.)
2. Data e: Many
The ethical patterns.
Compressi industries Manipulation:
concerns
on: Data are 3. Algorithm Changing the
revolve around
transforme subject to Integration data, modifying
issues of
d into a data with Graphics the data to be
privacy,
format protection Technology: he more appealing
consent, and
that can laws. By trained learning (Gaslighting,
the responsible
be employing algorithm is editing an
use of sensitive
efficiently encryption combined with essay,
personal
stored , computer photoshop,
information.
organizati graphics snapchat filter)
3. Data
Users should ons fulfill technologies to
Encryption
debate whether legal overlay AI-
: Data
the benefits requireme generated facial

https://jeopardylabs.com/print/ch31-ds-review Page 6 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

transforme provided by the nts, and vocal


d into app justify the avoiding patterns onto
another extent of data penalties real-time video
code to collection and and footage.
prevent whether the maintainin
easy company is g
access transparent complianc
about its e.
practices.
Preventing
Data
Breaches:
In the
event of a
security
breach,
encrypted
data
remains
unreadabl
e,
mitigating
the impact
and
reducing
the risk of
unauthoriz
ed
exploitatio
n.

500 500 500 500 500


Evaluate the To what extent To what extent Explain the Please
significance of should social does Blockchain fundamental differentiate
data media impact our concepts of a between
archiving/backu platforms be digital society? blockchain. Misinformation,
p in the responsible for How does it Disinformation
broader context exposing users Pros: achieve and
of the data to diverse decentralization Malinformation.
lifecycle, please viewpoints? Extremely and data
provide one secure, integrity? Misinformation:
real-world Pros requires Provide a real- Inaccurate but
example. consensus world example not necessarily
Minimizes Echo from large intentional.
Ensuring Chambers: group of Blockchain May cause
https://jeopardylabs.com/print/ch31-ds-review Page 7 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

Ensuring Chambers: group of Blockchain May cause


Data Social media people achieves confusion but
Integrity: platforms decentraliz not necessarily
Backups encouraging Transpare ation harm.
play a diverse content nt, once through a Unintentional
crucial role reduce the risk recorded, network of spread.
in of users being it is nodes that
preserving confined to publicly reach Disinformation:
data echo chambers shown to consensus Deliberately
integrity the world Data false
by Mitigates integrity is information.
providing Polarization: By It’s ensured Intended to
a means promoting collaborati through mislead or
to recover diverse ve (p2p) cryptograp manipulate,
informatio viewpoints, hic potentially
social media It’s
n in case hashing causing harm.
platforms can unregulate
of and Deliberate
contribute to d by a
corruption, consensus intent to
reducing centralized
accidental mechanis deceive
societal entity and
deletion, ms
polarization. you have a Malinformation:
or other Bitcoin
lot more True
forms of blockchain
Cons freedom information
data loss. ensures
secure and used for
Technical Cons
Disaster transparen harmful
Recovery: Challenges: purposes.
Too secure t financial
In the The algorithms Intentionally
and transactio
event of a that determine immutable ns harmful,
catastroph content targeting
visibility may so you
ic failure, cannot reputation or
such as unintentionally well-being.
reinforce tamper
hardware with it Intent to cause
malfunctio certain harm using
n or viewpoints true
Creates
natural digital information.
Concerns about
disasters, divide
Censorship:
backups because
Implementing
serve as a you need
measures to
key to invest
expose users to
componen in a GPU
diverse
t of to start
viewpoints
disaster
could be
recovery Inefficient
perceived as a
strategies, as it takes
form of
facilitating time to
the censorship. mine each
https://jeopardylabs.com/print/ch31-ds-review Page 8 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

the censorship. mine each


restoration block
of User
operations Resistance: Anonymou
. Some users s,
may resist malicious
Long-Term exposure to users can
Preservati diverse use it to
on: Data viewpoints, their
backups leading to advantage
contribute quitting the
to the social media
long-term platform.
preservati
on of
essential
informatio
n,
preventing
loss due to
evolving
technologi
es,
hardware
upgrades,
or
software
changes.

Supporting
Regulatory
Complianc
e: In
industries
governed
by data
protection
regulation
s,
maintainin
g regular
backups is
often a
complianc
e
requireme
https://jeopardylabs.com/print/ch31-ds-review Page 9 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM

requireme
nt,
ensuring
that
organizati
ons can
recover
and
protect
sensitive
informatio
n as
mandated
by law.

Facilitating
Data
Migration:
During
transitions
to new
systems or
platforms,
backups
ease the
process of
data
migration,
enabling
the
transfer of
informatio
n without
compromis
ing its
integrity
or risking
loss.

https://jeopardylabs.com/print/ch31-ds-review Page 10 of 10

You might also like