Search Header Logo
Y12 EC Data Science Wk3 Lesson

Y12 EC Data Science Wk3 Lesson

Assessment

Presentation

Computers

12th Grade

Practice Problem

Hard

Created by

Alex Song

FREE Resource

26 Slides • 36 Questions

1

media

2

Multiple Choice

What are the key issues to consider when collecting and storing data in software features and data warehousing or data mining?

1

Privacy and security

2

Data volume

3

Data variety

4

Data velocity

3

media

4

Multiple Choice

What are the potential risks associated with using the autofill feature in software?

1

Data leakage

2

Phishing attacks

3

Unwanted sharing

4

All of the above

5

media

6

Multiple Choice

Which of the following is a characteristic of asymmetric encryption?

1

It uses the same key for both encryption and decryption

2

It is faster than symmetric encryption

3

It uses a public key for encryption and a private key for decryption

4

It is only used for sending emails

7

media

8

Multiple Choice

What are the implications of checking or unchecking checkboxes in software and online forms?

1

They have no implications

2

They can affect privacy and security

3

They are only for aesthetic purposes

4

They are mandatory for all users

9

media

10

Multiple Choice

What are the key components of Terms of Agreement (TOA) that help users protect their data privacy and security?

1

Data collection

2

Data sharing

3

Data management

4

All of the above

11

Multiple Choice

What is a key consideration when sharing data with third parties to ensure compliance with confidentiality laws?

1

Ensure the third party is located in a different country

2

Verify that the third party has adequate data protection measures in place

3

Share all company data without restrictions

4

Only share data with third parties that offer the lowest cost

12

Multiple Choice

When sharing data with third parties, what is a critical step to ensure compliance with confidentiality laws?

1

Ensure the third party signs a non-disclosure agreement

2

Share data without any agreements

3

Allow the third party to use the data for any purpose

4

Provide the third party with unrestricted access to all company data

13

Multiple Choice

Under student privacy laws, what is a school's responsibility when a third party requests access to student records?

1

Automatically grant access to the third party

2

Verify the third party's authorization and obtain consent if necessary

3

Refuse all third-party requests

4

Charge a fee for access to the records

14

media

15

Multiple Choice

What should you reflect on in Activity 20?

1

Privacy

2

Security

3

Data

4

All of the above

16

media

17

Multiple Select

What are the three key characteristics of big data as mentioned in the text?

1

Volume

2

Variety

3

Velocity

4

Value

18

media

19

Multiple Choice

Which of the following is an open-source big data platform used for distributed processing of large datasets?

1

Spark

2

Hadoop

3

PowerBI

4

Talend

20

media

21

media

22

media

23

Multiple Choice

What are the success criteria for analyzing the impact of data scale?

1

Volume of raw data

2

Storage

3

Real-time streaming

4

All of the above

24

Multiple Choice

Big data has increased the demand for

1

ethical scientists

2

Information management specialists

3

hackers

4

innovators

25

Multiple Choice

A mobile game tracks players’ locations using GPS. The game offers special in-game items to players when they visit real-world points of interest. Which of the following best explains how bias could occur in the game?

1

Points of interest may be more densely located in cities, favoring players in urban areas over players in rural areas.

2

Some players may engage in trespassing, favoring players in urban areas over players in rural areas.

3

Special items may not be useful to all players, favoring players in urban areas over players in rural areas.

4

Weather conditions may be unpredictable, favoring players in urban areas over players in rural areas.

26

Multiple Choice

What do businesses often develop to be able to store and analyze data for the purpose of making business decisions?

1

advertisements

2

employee policies

3

information systems

4

machinery operating guides

27

Multiple Choice

Definition: Ability to accommodate larger amounts of data and/or more users as time progresses
1
Scalability 
2
Metadata
3
Frequency
4
Privacy

28

media

29

Multiple Choice

What challenges are associated with large datasets?

1

Computational challenges

2

Privacy concerns

3

Data quality issues

4

Increased efficiency

30

Multiple Choice

What are the advantages and disadvantages of large data scale?

1

Improved accuracy

2

Greater detail

3

Increased efficiency

4

Data quality issues

31

media

32

Multiple Choice

What are the disadvantages of large volume raw data?

1

Storage and processing costs

2

Data quality issues

3

Privacy concerns

4

All of the above

33

Multiple Choice

What are the advantages of large volume raw data?

1

More comprehensive insights

2

Increased granularity

3

Better predictions

4

All of the above

34

media

35

Multiple Choice

What impact does the volume of data being stored have on data scale?

1

It affects the amount of storage required and the speed of data retrieval.

2

It has no impact on data scale.

3

It only affects the speed of data retrieval.

4

It only affects the amount of storage required.

36

media

37

Multiple Choice

What are the challenges associated with real-time and continuous data streaming?

1

Data overflow

2

Slow performance

3

Data loss

4

All of the above

38

Multiple Choice

example of real time data processing ?

1
Recording historical data
2
Monitoring stock prices and executing trades based on real-time market data
3
Calculating monthly expenses
4
Sending emails

39

media

40

Multiple Choice

What are the opportunities and challenges associated with machine learning (ML) in terms of data scale?

1

Opportunities include improved accuracy and efficiency

2

Challenges include increased computing power requirements

3

Opportunities include reduced data management costs

4

Challenges include limited data availability

41

media

42

Multiple Choice

The data to be processed is classified into ____ types based on the urgency of

processing:

1

4

2

2

3

3

4

1

43

Multiple Choice

______ primarily created by using length-limited data fields

1

Structured Data

2

Unstructured Data

3

Text Data

4

None

44

media

45

Multiple Choice

What are the ethical implications of increasing data scale and the use of personal information?

1

Informed consent

2

Data storage

3

Digital footprints

4

All of the above

46

media

47

Multiple Choice

What is the focus of Activity 21?

1

Smart agriculture

2

Data management

3

Scenario questions

4

All of the above

48

Multiple Choice

.A ________is raw fact
1
DATA
2
INFORMATION
3
SCHEMA
4
table

49

Multiple Choice

What is the term for a collection of data so large and complex that it is difficult to store and process using traditional database software?
1
Big data
2
Relational data
3
Unrelated data
4
Spreadsheet data

50

media

51

media

52

media

53

Multiple Select

What are the advantages and disadvantages of local storage?

1

Speed: fast access and retrieval times

2

Control: full control over data security

3

Cost: one-time cost for hardware

4

Scalability: limited by hardware capacity

54

media

55

Multiple Select

What are the advantages and disadvantages of cloud storage?

1

Scalability

2

Accessibility

3

Security

4

Speed

56

media

57

Multiple Select

What are the advantages and disadvantages of portable storage media?

1

Portability

2

Cost

3

Control

4

Durability

58

media

59

Multiple Select

What are the advantages and disadvantages of data warehouses?

1

Integration of data from multiple sources

2

High-speed data retrieval

3

Costly to set up and maintain

4

Requires specialized knowledge

60

media

61

Multiple Choice

What is the focus of Activity 22 mentioned in the image?

1

Data storage scenario

2

Data retrieval process

3

Data analysis techniques

4

Data encryption methods

62

Poll

How confident do you feel about this topic now?

Very confident
Somewhat confident
Not confident
media

Show answer

Auto Play

Slide 1 / 62

SLIDE