
Unit 1: Loss of Data D1.3.1-1.3.3
Presentation
•
Information Technology (IT)
•
Vocational training
•
Practice Problem
•
Hard
Kimberly O'Brien
FREE Resource
23 Slides • 25 Questions
1
2
3
Multiple Choice
Which of the following is a technical failure that can lead to data loss in modern systems?
Silent Data Corruption (SDC)
Reputation damage
Financial losses
Legal liability
4
Open Ended
Why is understanding the causes and consequences of data loss important for organizations today?
5
6
Open Ended
If a college loses student data due to a hack, which specific Data Protection principle has been breached?
7
8
9
Multiple Choice
Which type of technical failure is described as 'The Silent Killer' in modern computing systems, and why is it particularly dangerous?
Silent Data Corruption (SDC); because it occurs without warning and can contaminate entire datasets
System crash; because it stops all operations immediately
Network outage; because it disconnects users from the system
Power failure; because it can damage hardware
10
11
Multiple Choice
Based on the Spark architecture diagram, at which stage in the RDD pipeline could silent data corruption during decompression cause files to be skipped?
Map stage
Flatmap stage
ReduceByK stage
Collect stage
12
13
14
Multiple Choice
Which of the following is NOT a primary suspect in human-caused data loss according to the lesson?
Accidental Deletion
Migration Errors
Social Engineering
Hardware Failure
15
Open Ended
Explain how migration errors can lead to data loss during system upgrades or data transfers. Provide an example scenario.
16
Fill in the Blank
The most common cause of data loss in organizations is ___ error.
17
18
Multiple Choice
Which of the following is NOT listed as a common threat to data loss in modern IT systems?
Ransomware / Malware
Human Error
Hardware Failure
Phishing Attacks
19
20
21
Open Ended
Explain how data breaches can lead to reputational damage for organizations, using the Equifax case as an example.
22
23
Fill in the Blank
After a major data breach, companies often increase ___ to demonstrate investment in employee wellbeing and retention.
24
Multiple Select
Which actions do companies most commonly take to restore moral capital after a data breach, according to research by Akey et al.?
Charitable contributions
Employee compensation rises
Rebuilding trust
Increasing product prices
25
26
Multiple Select
Based on the crisis management simulation, which TWO actions are recommended to restore public trust and stakeholder confidence after a data breach?
Run TV Advertising Campaign
Donate to Charity
Increase Employee Wages
Ignore It Entirely
27
28
Multiple Choice
What is the primary focus of damages in English law as introduced in the chapter 'Legal Reckoning'?
Punishing the wrongdoer
Compensating the victim
Restoring moral capital
Preventing future breaches
29
30
Multiple Select
Which of the following are necessary for a claimant to prove their losses in court according to the burden of proof?
Detailed records
Vague thoughts
Supporting documentation
Immediate payment
31
Open Ended
Explain the difference between direct loss and consequential loss in the context of contract law damages.
32
Multiple Choice
Which principle in contract law aims to restore the claimant to their original position as if the contract had been properly performed?
Punitive Principle
Compensatory Principle
Restitution Principle
Deterrence Principle
33
34
Fill in the Blank
The principle of ___ is used in English law to prevent suppliers from being liable for losses that are too remote.
35
36
37
Open Ended
Based on the evidence provided in the courtroom activity, was the £500,000 loss reasonably foreseeable by the supplier at the time of contract formation? Justify your answer using the remoteness test.
38
39
40
Multiple Select
Which of the following are hardware defence strategies against data loss?
Redundancy Computing
Fault-Tolerant Libraries
ECC Memory
Data Encryption
41
42
43
Multiple Choice
Which of the following terms refers to hardware-level data corruption that occurs without error messages or system crashes?
Silent Data Corruption (SDC)
Bitflip
Human Error
Software Redundancy
44
45
Fill in the Blank
Reputational shocks erase ___% of a firm's value within 30 days after a data breach is disclosed.
46
Open Ended
Explain how a single CPU error can impact a company's reputation and what steps firms might take to rebuild after such an incident.
47
Open Ended
What aspect of data loss would you like to explore further or discuss in more detail after this session?
48
Multiple Choice
Reflecting on today's lesson, which of the following is NOT a primary learning objective when investigating data loss?
Analyze technical failures and human errors
Evaluate consequences such as downtime and financial loss
Apply English law principles to determine legal responsibility
Design new data storage systems
Show answer
Auto Play
Slide 1 / 48
SLIDE
Similar Resources on Wayground
42 questions
3.3 Inequalities on the Number Line
Lesson
•
KG
40 questions
Siêu nhân màu hồng
Lesson
•
KG
44 questions
How much and How Many
Lesson
•
Professional Development
39 questions
Properties of Multiplication
Lesson
•
4th Grade
44 questions
Primary Academic Refresher
Lesson
•
KG
38 questions
Rhetorical Appeals and Strategies
Lesson
•
9th Grade
42 questions
Mga Katulong sa Komunidad Lesson
Lesson
•
KG
44 questions
G1 Sc CA 1 Revision
Lesson
•
KG
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
13 questions
SMS Cafeteria Expectations Quiz
Quiz
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
12 questions
SMS Restroom Expectations Quiz
Quiz
•
6th - 8th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
10 questions
Pi Day Trivia!
Quiz
•
6th - 9th Grade