
Lesson 2 - Data Vs Information
Presentation
•
Computers
•
6th - 8th Grade
•
Easy
Ayomikun J Sodipe
Used 9+ times
FREE Resource
34 Slides • 34 Questions
1
2
3
4
Match
Match the Keywords to their Definitions
Threat
Security
Cyber
Malicious
Causes could cause danger or harm
Protecting something valuable from harm.
To do with computers or the internet.
done on purpose to cause harm or damage.
Causes could cause danger or harm
Protecting something valuable from harm.
To do with computers or the internet.
done on purpose to cause harm or damage.
5
Multiple Choice
Which of the following best describes the main purpose of cybersecurity?
To protect computers, networks, and data from unauthorised access, damage, or theft
To increase the speed of internet connections
To make computers more expensive
To allow everyone access to all information
6
Multiple Choice
Which of the following are examples of what cybersecurity protects?
Computers
Networks
Information
All of the above
7
Multiple Choice
What is a cyber threat?
A malicious attempt to harm or steal information or systems
A way to speed up your computer
A method for improving internet safety
A type of computer hardware
8
Multiple Choice
Which of the following best describes a cyber threat?
A malicious activity aimed at stealing and causing harm to a computer, network, or data stored on them.
A software update for a computer system.
A backup process for important files.
A method of improving internet speed.
9
Multiple Select
Why do people carry out cyber attacks?
Financial Gain
Fun/Challenge
To disrupt the business
Personal grudge
10
Multiple Choice
Access a computer without permission (hacking) is in breach of the...
Communications Act
Data Protection Act
Computer Misuse Act
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Multiple Choice
What is the key difference between data and information?
Data is organised, while information is raw.
Data is raw, unprocessed facts, while information is processed and organised.
Data is meaningful, while information is irrelevant.
Data and information are the same.
25
Categorize
13
552025
0.022
London
98765
3.14
2022
New York
A, B, B, C, D
Student age - 15
Grades: A, B, C, C
Location: London
Shopping list: 6 Eggs
Offices: Aberdeen, London
Average speed: 34
Data or Information?
26
Multiple Choice
Which of the following is an example of how businesses benefit from data?
Data helps businesses understand customer behaviour and improve business.
Businesses sell data to customers at a profit.
Businesses stop collecting data to avoid privacy issues.
Businesses delete all data after a purchase is made.
27
Multiple Choice
What is Monetisation of data?
Encrypting data to make it more secure.
Analysing data for research purposes only.
Selling or using data to generate income for a company
Deleting data after it has been used.
28
Multiple Choice
How do companies use data for targeted marketing?
Guessing what customers might like.
To offer personalised ads and products.
By randomly assigning ads to users.
By ignoring customer preferences.
29
Multiple Choice
What is targeted marketing?
Using customer data to offer personalised ads and services.
Marketing only through social media.
Selling personal data to third parties without consent.
Advertising products without using any customer data.
30
Multiple Choice
Why is personal data valuable to individuals?
It can help track habits and make informed decisions.
It is always available for public use.
It has no practical use in daily life.
It is only valuable to businesses.
31
Multiple Choice
Which is an example of data being useful for a person?
A hacker stealing bank details
A teacher losing homework sheets
A company selling phone numbers
A student tracking their fitness to make healthier choices
32
33
34
35
36
37
38
39
40
41
42
43
Multiple Choice
What is a common risk to data security?
Regular data backups
Installing antivirus software
Using strong passwords
Hacking and unauthorised access
44
Multiple Choice
How can human error cause data security risks?
Employees frequently change their passwords.
Personal data is shared with unauthorised individuals by mistake.
Data is stored securely in cloud systems.
Users report phishing emails.
45
Multiple Choice
Which situation shows human error?
A worker emailing customer details to the wrong person
A hacker using malware to break into a system
A school encrypting exam results
A company selling customer preferences
46
Multiple Choice
Which of the following is a potential consequence of a data breach?
Stronger encryption standards
Increased productivity
Improved business reputation
Identity theft and financial loss
47
Multiple Choice
A data breach could lead to:
Losing customer trust
Faster internet speeds
Easier shopping online
Better advertising
48
49
50
51
52
Multiple Choice
Why is a strong password important?
It saves memory on your device
It prevents computers from crashing
It makes logging in faster
It makes accounts harder to guess
53
Multiple Choice
Which of the following best describes encryption?
Deleting old files to save space
Copying files to a backup drive
Scrambling data so it can’t be read without a special key
Sharing passwords with friends
54
Multiple Choice
Why is Encryption important in data security?
It organises data in a way companies like
It improves data analysis.
It prevents unauthorised access by converting data into a coded format.
It deletes irrelevant data
55
Multiple Choice
Which of the following is an example of a Data breach?
A company encrypts all its data.
A user installs updates to their operating system.
Employees receive regular cybersecurity training.
A hacker gains access to a company's customer database.
56
Multiple Choice
What is the main purpose of the Data Protection Act 2018?
To allow companies to sell personal data freely.
Protect personal data and ensure it is used fairly
To encourage companies to collect as much data as possible.
To prevent individuals from accessing their own data.
57
Multiple Choice
Under the Data Protection Act, you can:
Ask for your data to be corrected or deleted
Sell your friend’s data to a company
Refuse to pay for stolen goods
Download music illegally
58
Multiple Choice
What does GDPR stand for?
General Data Privacy Regulation
Global Data Protection Regulation
General Data Protection Regulation
Government Data Protection Regulation
59
Multiple Choice
Which of the following is an example of turning data into information?
"Recording temperatures: "20°C, 25°C, 22°C"
"The average temperature this week is 22°C based on daily readings."
Listing customer ages: "35, 42, 29, 50"
Collecting phone numbers: "123-456-7890, 234-567-8901"
60
61
62
63
Multiple Choice
Which best explains why companies collect data?
To understand customers and improve services
To reduce internet use
To slow down devices
To make random guesses
64
Multiple Choice
Which is an example of personal data?
“The capital of Spain is Madrid”
“Your home address is 12 Oak Street”
“Water freezes at 0°C”
“The moon orbits the Earth”
65
Multiple Choice
Which action is the best way to protect your data?
Sharing your password with a classmate
Ignoring software updates
Using two-factor authentication
Leaving accounts logged in on a public computer
66
Multiple Choice
What could happen to a company after a large data breach?
Gain more trust from customers
Lose money and damage its reputation
Improve its advertisements
None of the above
67
Multiple Choice
Which statement is true about data vs information?
Data is always numbers, information is always words
Data is raw facts, information is processed with meaning
Data and information mean the same thing
Information is less useful than data
68
Open Ended
Name two (2) possible risks to data.
Show answer
Auto Play
Slide 1 / 68
SLIDE
Similar Resources on Wayground
64 questions
Global Winds and Currents
Presentation
•
6th - 8th Grade
64 questions
Operations Using Scientific Notation
Presentation
•
6th - 8th Grade
66 questions
Lab Safety
Presentation
•
6th - 8th Grade
61 questions
Matter Unit Powerpoint Review
Presentation
•
6th - 8th Grade
64 questions
waves through different media
Presentation
•
6th - 8th Grade
61 questions
Plate Motion @Home Lesson 13 Slides
Presentation
•
6th - 8th Grade
63 questions
What is an Engineer?
Presentation
•
6th - 8th Grade
63 questions
Change Over Time Lesson
Presentation
•
6th - 8th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
20 questions
Revising & Editing practice
Quiz
•
7th Grade
10 questions
Box Plots
Quiz
•
6th - 7th Grade
8 questions
Amoeba Sister Asexual vs Sexual Reproduction
Interactive video
•
8th Grade
10 questions
April Fool's Day Pranks and Tips
Interactive video
•
3rd - 6th Grade
14 questions
Volume of rectangular prisms
Quiz
•
7th Grade