Professional Documents
Culture Documents
Ch3.1 DS Jeopardy Review
Ch3.1 DS Jeopardy Review
https://jeopardylabs.com/print/ch31-ds-review Page 1 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM
https://jeopardylabs.com/print/ch31-ds-review Page 2 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM
https://jeopardylabs.com/print/ch31-ds-review Page 3 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM
https://jeopardylabs.com/print/ch31-ds-review Page 4 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM
data,
creating
potential
trust
issues.
2. Data
Breach
Risks:
Despite
efforts,
the risk of
data
breaches
always
exists, and
a single
breach can
significantl
y erode
user trust
in the
security of
health
data.
3. Changing
Regulation
s: Evolving
privacy
regulation
s may
require
manufactu
rers to
adapt their
practices,
and any
perceived
lag in
complianc
e can
impact
user trust.
https://jeopardylabs.com/print/ch31-ds-review Page 5 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM
Once data has When Discuss the Please explain Please explain
been collected, considering the significance of explain the the 3 methods
it must be ethics of a implementing steps of how of weakening
processed from fitness tracking data encryption deepfake is Data Integrity.
its raw format. app collecting in a business created with
detailed environment. data. Commission:
Which stage of personal data, Creating data
data lifecycle what should Daily Double 1. Data from nothing
does this users question Collection: (ex. Doing a
belong to? and consider Protection Gather a lab, you did not
when using of substantial actually do
What are the 3 fitness tracking Sensitive amount of your lab,
methods that apps? Informatio video footage instead, you
can be used n: featuring the decided to just
during this Encryption
Users should target make up data
stage? serves as
question the individual for the lab
extensive data a crucial result. Lying.)
Process/usage collection safeguard 2. Training the
stage: practices of the for Neural Omission:
fitness tracking sensitive Network: The Removing,
1. Data data, collected data reducing data,
app, which
Wrangling: preventing is fed into a erasing data
includes
Raw data unauthoriz deep neural (Cherry-
recording
cleaned ed access network, allows picking, fake
activities,
and and the algorithm news by mixing
locations, and
transforme ensuring to understand both legit and
health metrics.
d into confidentia and mimic the fake
The security
useful and lity. subject's facial information
level of the
accessible features, together,
company is also
data Legal expressions, propaganda
a concern.
Complianc and vocal etc.)
2. Data e: Many
The ethical patterns.
Compressi industries Manipulation:
concerns
on: Data are 3. Algorithm Changing the
revolve around
transforme subject to Integration data, modifying
issues of
d into a data with Graphics the data to be
privacy,
format protection Technology: he more appealing
consent, and
that can laws. By trained learning (Gaslighting,
the responsible
be employing algorithm is editing an
use of sensitive
efficiently encryption combined with essay,
personal
stored , computer photoshop,
information.
organizati graphics snapchat filter)
3. Data
Users should ons fulfill technologies to
Encryption
debate whether legal overlay AI-
: Data
the benefits requireme generated facial
https://jeopardylabs.com/print/ch31-ds-review Page 6 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM
Supporting
Regulatory
Complianc
e: In
industries
governed
by data
protection
regulation
s,
maintainin
g regular
backups is
often a
complianc
e
requireme
https://jeopardylabs.com/print/ch31-ds-review Page 9 of 10
Ch3.1 DS Review 2023-12-06, 8:46 AM
requireme
nt,
ensuring
that
organizati
ons can
recover
and
protect
sensitive
informatio
n as
mandated
by law.
Facilitating
Data
Migration:
During
transitions
to new
systems or
platforms,
backups
ease the
process of
data
migration,
enabling
the
transfer of
informatio
n without
compromis
ing its
integrity
or risking
loss.
https://jeopardylabs.com/print/ch31-ds-review Page 10 of 10