Privacy and Security Combine Assignment 2023
Privacy and Security Combine Assignment 2023
Figure 1
a) Koo
b) Blind
c) Reddit
d) LinkedIn
2. Which of the following statement(s) is/are true about
Anonymous social networks?
a) Modified, Unmodified
b) Unmodified, modified
c) modified, unstaged
d) Modified, tracked
6. Which command lists all the remote addresses associated with a local repository?
a. git remote -v
b. git pull origin master
c. Git stash
d. Git checkout
7. Which of the following concept is closely related to the fact that infrequent, arms-length
relationships are more beneficial for employment opportunities, promotions, and wages than
strong ties?
a. Six degrees of separation
b. Small world phenomenon
c. Strength of weak ties
d. None of the above
1. What is the primary data format utilised by the Reddit API when returning information?
a. JSON
b. XML
c. HTML
d. CSV
2. JSON stands
a) JavaScript Object Notation
b) JavaScript Object Network
c) JavaScript Oriented Notation
d) JavaScript Oriented Namespace
3. Suppose you want to retrieve the top 5 hottest posts from the subreddit "r/technology"
using the Reddit API. Which Python library would you most likely use to achieve this?
a. PRAW
b. Requests
c. Urllib
d. JSON
Explanation: PRAW (Python Reddit API Wrapper) is a Python library designed explicitly for
interacting with the Reddit API. Using PRAW, you can easily retrieve the top 5 hottest posts from the
subreddit "r/technology" and perform various other interactions with the Reddit platform.
4. You want to fetch the details of the 10 hot posts from the subreddit "r/worldnews" using
the Reddit API in Python. Which is the correct code snippet from below options?
a) import praw
reddit = praw.Reddit(client_id='MY_CLIENT_ID',
client_secret='MY_CLIENT_SECRET', user_agent='MY_USER_AGENT')
posts = reddit.subreddit('worldnews').hot(limit=10)
for post in posts:
print(post.title)
b) import requests
url = "https://www.reddit.com/r/worldnews/new.json?limit=10"
response = requests.get(url)
data = response.json()
for post in data['data']['children']:
print(post['data']['title'])
c) import praw
reddit = praw.Reddit(client_id='MY_CLIENT_ID',
client_secret='MY_CLIENT_SECRET', user_agent='MY_USER_AGENT')
posts = reddit.subreddit('worldnews').new(limit=10)
for post in posts:
print(post.title)
d) None of the above
8. Given a MongoDB collection named "employees" with the following document structure:
{
"_id": ObjectId("615243d88f0ae43f255874c1"),
"name": "Ram",
"department": "CSE",
"age": 35,
"salary": 50000
}
What MongoDB query would you use to retrieve all employees with a salary greater than
or equal to 60000?
9. You are developing a social media platform, and you have a database table, "posts" to
store user posts. The "posts" table schema is given below:
Now, you want to retrieve the 5 most recent posts made by a specific user with the user
ID "12345". Which SQL query would you use?
a) SELECT * FROM posts WHERE user_id = 12345 ORDER BY post_date DESC LIMIT
5;
b) SELECT * FROM posts WHERE user_id = 12345 ORDER BY post_id DESC LIMIT 5;
c) SELECT * FROM posts WHERE user_id = 12345 ORDER BY post_date ASC LIMIT
5;
d) SELECT * FROM posts WHERE user_id = 12345 ORDER BY post_id ASC LIMIT 5;
To which of the three Westin Privacy categories is "they" in the above sentence most
likely to fall?
a. Fundamentalists
b. Pragmatists
c. Unconcerned
d. None of the above
3. Cronbach’s alpha
a. determines the statistical significance of a research study.
b. assess the reliability and internal consistency of a questionnaire.
c. analyze the effect size of an intervention.
d. calculate the standard deviation of a sample population.
4. Suppose we have five tweets (TW1, TW2, TW3, TW4, and TW5) with their relevances based
on user feedback or relevance labels:
TW1: Highly relevant tweet (Relevance = 2)
TW2: Moderately relevant tweet (Relevance = 1)
TW3: Not relevant tweet (Relevance = 0)
TW4: Relevant tweet (Relevance = 1)
TW5: Highly relevant tweet (Relevance = 2)
Now, let's assume the ranking algorithm generates a ranked list of tweets:
a. 0.5
b. .513
c. .975
d. None of the above
Solution:
Step 1: Calculate DCG@5 (Discounted Cumulative Gain at rank 5).
Step 2: Calculate IDCG@5 (Ideal Discounted Cumulative Gain at rank 5).
Step 3: Divide DCG@5 by IDCG@5 to get NDCG@5.
Given relevances: rel1 = 2 (for TW5) rel2 = 2 (for TW1) rel3 = 0 (for TW3) rel4 = 1 (for TW2) rel5
= 1 (for TW4)
Step 2: Calculate IDCG@5 (Ideal DCG@5) To calculate IDCG@5, we consider the ideal ranking
based on relevance:
Ideal ranking: TW5 (Highly relevant tweet) > TW1 (Highly relevant tweet) > TW2 (Moderately
relevant tweet) > TW4 (Relevant tweet) > TW3 (Not relevant tweet)
5. How many participants have changed their default settings on their social network?
a. 75%
b. 60%
c. 50%
d. 25%
6. What is the primary purpose of a Focus Group Discussion (FGD) in the above report?
7. “When you hear the word privacy, what comes to mind”. Which is the most common
respondent answer according to the above report?
a. Information Privacy
b. Bodily privacy
c. Communication privacy
d. Territorial privacy
10. TweetCred is
a. a real-time web-based system to automatically evaluate the credibility of content on
Twitter.
b. a real-time app-based system to automatically evaluate the score of tweets on Twitter.
c. a real-time app-based system to automatically assess the quality of content on Twitter.
d. None of the above
Week-4 PSOSM 2023
Question 1: What is the critical challenge that Latanya Sweeney's research on k-anonymity
addresses?
a) make datasets larger for analysis
b) eliminate data from datasets
c) anonymise data without losing utility
d) ignore research utility for better privacy
Suppose you're working on a project that involves analysing sales data for a chain of stores.
You are provided with a list of daily sales figures for a particular product over some time. The
task is to calculate various statistics such as the total sales, average sales, and maximum sales
for that product. Answer the following questions [2-4]:
Question 2: Which data structure can significantly enhance the efficiency and simplicity of your
calculations?
a. Python numpy list
b. Python numpy array
c. Python variables
d. None of these
Question 3: Fill in the correct function calculate_total_sales(sales_list) which calculates the total
sales from a list of daily sales figures using NumPy in the below code
import numpy as np
def calculate_total_sales(sales_list):
<<<write your code here>>>>
return total_sales
a. sales_array = np.array(sales_list)
total_sales = np.sum(sales_array)
b. sales_array = np.list(sales_list)
total_sales = np.sum(sales_array)
c. sales_array = np.array(sales_list)
total_sales = np.sum(np.concatenate(sales_array,sales_list))
d. None of the above
import numpy as np
def calculate_maximum_sales(sales_list):
<<<write your code here>>>>
return max_sales
a. sales_array = np.array(sales_list)
max_sales = np.max(sales_array)
b. sales_array = np.list(sales_list)
max_sales = np.max(sales_array)
c. sales_array = np.array(sales_list)
max_sales = np.max(np.concatenate(sales_array,sales_list))
d. None of the above
Imagine you have a NumPy array representing your monthly expenses for the past year. Each
array element corresponds to the total expenses (in dollars) for a specific month. The task is to
analyze and extract specific information.
import numpy as np
expenses_array = np.array([1200, 1500, 1300, 1400, 1800, 1600, 1400, 1250, 1350, 1500,
1700, 1900])
Question 5: How would you extract expenses for the second half of the year (July to
December)?
a. second_half_expenses = expenses_array[6:]
b. second_half_expenses = expenses_array[5:]
c. second_half_expenses = expenses_array[:12]
d. second_half_expenses = expenses_array[7:]
Question 6: Identify the months where expenses exceeded $1600.
a. high_expense_months = np.where(expenses_array < 1600)[0]
b. high_expense_months = np.where(expenses_array > 1600)[0]
c. high_expense_months = np.where(expenses_array > 1600))
d. high_expense_months = np.where(expenses_array > 1600)[0] + 1
Question 7: Calculate the average expenses for the first quarter of year.
a. first_quarter_average = np.mean(expenses_array[:4])
b. first_quarter_average = np.mean(expenses_array[:2])
c. first_quarter_average = np.mean(expenses_array[:3])
d. first_quarter_average = np.mean(expenses_array[:6])
import pandas as pd
data = {
'Product': ['A', 'B', 'A', 'B', 'C', 'A', 'C', 'B', 'C', 'A'],
'Category': ['Electronics', 'Clothing', 'Electronics', 'Clothing', 'Home', 'Electronics', 'Home',
'Clothing', 'Home', 'Electronics'],
'Price': [500, 40, 600, 35, 100, 550, 80, 30, 90, 480]
}
sales_df = pd.DataFrame(data)
grouped = sales_df.groupby('Category')
result = grouped.agg({
'Price': ['sum', 'mean']
}).reset_index()
# Rename the columns
result.columns = ['Category', 'Total Revenue', 'Average Price']
print(result)
a.
Category Total Revenue Average Price
c.
Category Total Revenue Average Price
Solutions
Question 1: How do Online Social Networks improve public Communication between police and
residents?
a. provide actionable information and collective action
b. provide mutual accountability
c. understand fear and victimisation effects
d. help to contact concerned authorities
Question 3: What type of actionable information is highlighted in (bold) the below example?
a. Temporal data
b. Spatial data
c. Linguistic data
d. None of the above
Question 4: Given below are two types of communication as discussed in the lecture.
a. Formal and Formal
b. Informal and Formal
c. Informal and Informal
d. Formal and Informal
Question 5: How would you identify emotional and psychological states based on the written
text?
a. LIWC
b. K-means clustering
c. N-gram analysis
d. All of the above
Question 8: A sentiment analysis study analyses a text passage for valence and arousal values.
On a scale of -1 to 1, the valence and arousal score is 0.75 and 0.85. What do these values
suggest about the emotional characteristics of the text?
a. Negative sentiment, low emotional intensity
b. Positive sentiment, High emotional intensity
c. Negative sentiment, high emotional intensity
d. Positive sentiment, low emotional intensity
Question 9: A social media analyst is studying the engagement characteristics (likes, comments,
and shares) of three different posts on a platform. The engagement counts for each post over a
week are as follows:
Calculate the mean engagement (average likes, comments, and shares) for each post and then
find the standard deviation of engagement for the entire set of posts. Based on the standard
deviation, which post shows the highest variability in engagement characteristics?
A) Post 1
B) Post 2
C) Post 3
D) All posts show similar variability.
Question 10: What kind of post and sentiment is depicted in the below example?
“Absolutely disgusted by the state of our local park! It's been months since we reported the
broken playground equipment, and nothing has been done. Our kids deserve better!”
a. Citizen-initiated and positive
b. Public authority-initiated and negative
c. Citizen-initiated and negative
d. Public authority-initiated and positive
Solutions:
Question 9:
Calculate the square root of the average (which is the standard deviation): √17.05 ≈ 4.13
Based on the standard deviation values, Post 1 shows the highest variability in engagement
characteristics among the three posts.
(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)
Media (course)
If already
registered, click
to check your
Week 6: Assignment 6
payment status The due date for submitting this assignment has passed.
Due on 2023-09-06, 23:59 IST.
Calculate the betweenness centrality for A, B, C, and D. Identify the individual having the highest
Prerequisite
betweenness centrality.
Assignment
() A
B
Welcome to
PSOSM C
class () All of them have the same betweenness centrality
Yes, the answer is correct.
Introduction Score: 1
to Social Accepted Answers:
Media API () All of them have the same betweenness centrality
Misinformati 2) What does indegree centrality measure in the social media and network analysis 1 point
on and context?
Privacy ()
The level of activity a user has on the platform.
Privacy and The number of outgoing connections a user has with other users.
Pictures on
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=47&assessment=130 1/4
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 8 - E-crime and social media
E-crime and 3) What does betweenness centrality depict about the node? 1 point
social media
() One who is quickly approachable
Who is close to everyone
Week 6.1:
eCrime on One who is most influential
Online Social All of the above
Media (unit?
No, the answer is incorrect.
unit=47&lesso
Score: 0
n=48)
Accepted Answers:
Week 6.2 One who is quickly approachable
eCrime on
Online Social 4) What is link farming? 1 point
Media (unit?
unit=47&lesso Agricultural practice that involves cultivating crops in a vertical arrangement.
n=49)
Rapidly growing links on a website through unethical or manipulative means.
Tutorial 4 A strategy for developing social connections by attending networking events.
Social Network
All of the above
Analysis (unit?
unit=47&lesso Yes, the answer is correct.
n=50) Score: 1
Accepted Answers:
Quiz: Week 6: Rapidly growing links on a website through unethical or manipulative means.
Assignment 6
(assessment?
5) Spamming the index of search engines is called 1 point
name=130)
Week 6 Spamdexing
Feedback Spamexing
Form : Privacy
Spamming
and Security in
Online Social None of the above
Media (unit?
Yes, the answer is correct.
unit=47&lesso Score: 1
n=51) Accepted Answers:
Spamdexing
Social media
Spamexing
and ecrime ()
6) Calculate the Klout score based on the following engagement metrics for a user on 0 points
Identity
online social media.
resolution
and social
Number of retweets: 50
media ()
Number of likes: 150
Number of comments: 100
Research
papers: Number of followers: 500
Location Number of mentions: 30
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=47&assessment=130 2/4
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 8 - E-crime and social media
based 230
Privacy ()
330
Research 430
Papers Part - 530
II ()
Yes, the answer is correct.
Score: 0
Week 11: Accepted Answers:
Summary () 330
7) Which of the following is considered as “social etiquette” on online social media 1 point
Lecture
such as Twitter?
materials/Not
es ()
Following back
Comment on the post of an influential person
Text
Transcripts () Giving likes to the post of an influential person
Saying “Thank you” to any appreciation by an influential person
Download
Yes, the answer is correct.
videos () Score: 1
Accepted Answers:
Books () Following back
Problem 8) A psychological principle where individuals feel compelled to return favours and 1 point
Solving interactions they receive is called
Session -
July 2023 () Spamming
Reciprocity
Link farming
All of the above
Eigen centrality
Node degree
Betweenness centrality
Closeness centrality
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=47&assessment=130 3/4
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 8 - E-crime and social media
A
B
C
S
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=47&assessment=130 4/4
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime
(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)
Media (course)
If already
registered, click
to check your
Week 7: Assignment 7
payment status The due date for submitting this assignment has passed.
Due on 2023-09-13, 23:59 IST.
Prerequisite
Assignment
()
Welcome to
PSOSM
class ()
Introduction
to Social
Media API ()
Misinformati
on and
Privacy ()
Privacy and
Pictures on
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 1/5
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime
E-crime and
social media
()
Week-7.1: Link
Farming in
Online Social
Media (unit?
unit=52&lesso
n=53)
Which of the following is the correct option?
Week-7.2:
Nudges (unit? This code is used to retrieve an ascending sorted list having two tuples.
unit=52&lesso This code is used to retrieve a descending sorted list having two tuples.
n=54)
This code retrieves two tuples in a sorted or unsorted manner.
Week-7.3: This code returns a logical error.
Semantic
attacks: Spear Yes, the answer is correct.
Score: 1
phishing (unit?
Accepted Answers:
unit=52&lesso
This code is used to retrieve a descending sorted list having two tuples.
n=55)
Tutorial 5: 3) Which of the following are not stopwords in the following list? 1 point
Analyzing text
using Python
stopwords = ["i", "me", "my", "myself", "we", "our", "ours", "ourselves", "you", "your", "yours",
NLTK (unit?
"yourself", "yourselves", "he", "him", "his", "himself", "she", "her", "hers", "herself", "it", "its",
unit=52&lesso
n=56) "itself", "they", "them", "their", "theirs", "themselves", "what", "which", "who", "whom", "this", "that",
"these", "those", "am", "is", "are", "was", "were", "be", "been", "being", "have", "has", "had",
Quiz: Week 7: "having", "do", "does", "did", "doing", “apple”, "a", "an", "the", "and", "but", "if", "or", "because",
Assignment 7
"as", "until", "while", "of", "at", "by", "for", "with", "about", "against", "between", "into", "through",
(assessment?
"during", "before", "after", "above", "below", "to", "from", "up", "down", "in", "out", "on", "off", "over",
name=131)
"under", "again", "further", "then", "once", "here", "there", "when", "where", "why", "how", "all",
Week 7 "any", "both", "each", "few", "more", "most", "other", "some", "such", "no", "nor", "not", "only",
Feedback "own", "same", "so", "than", "too", "very", "s", "t", "can", "will", "just", "don", "should", "now"]
Form : Privacy
and Security in All of the above are stopwords.
Online Social
Further, again, apple
Media (unit?
unit=52&lesso While, apple
n=57) apple
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 2/5
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime
and social
4) Which elements in the below sample mail make it potentially phishing email, as 1 point
media ()
discussed in the lecture?
Research
papers:
Location
based
Privacy ()
Research
Papers Part -
II ()
Week 11:
Summary ()
Lecture
materials/Not
es ()
Text
Transcripts () Urgency in subject
Regrettable information in the body
Download
Potential phishing link along with body
videos ()
All of the above
Observational group
Comparison group
Control group
Experimental group
S 1
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 3/5
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime
Score: 1
Accepted Answers:
Experimental group
7) Which of the following is/are the advantages of having privacy policies? 1 point
To help users make informed decisions with the information that is presented to them
To help individuals avoid regrettable online disclosures
Both a and b are correct
None of the above
Timer nudge
Picture nudge
Sentiment nudge
All of the above
9) As discussed in the lecture, which of the following is/are not a social media nudge? 1 point
Timer Nudge
Picture Nudge
Sentiment Nudge
Voice Nudge
10) Which of the following has the property of having high indegree and high outdegree 1 point
on online social media?
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 4/5
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 5/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 10 - Identity resolution and social media
(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)
Media (course)
If already
registered, click
to check your
Week 8 : Assignment 8
payment status The due date for submitting this assignment has passed.
Due on 2023-09-20, 23:59 IST.
How does an Study and analyse common attributes (place of work, profile picture, name, etc.) across
NPTEL different social media platforms
online
Check important attributes such as the same emails, locations, and contact numbers (if
course
available) used across multiple platforms
work? ()
Only looking at the user posting behaviour on social media platforms will help in profile
linking.
Prerequisite
Assignment It is not possible to find the same user profiles on different social media platforms.
() Yes, the answer is correct.
Score: 1
Welcome to Accepted Answers:
PSOSM Study and analyse common attributes (place of work, profile picture, name, etc.) across
class () different social media platforms
Check important attributes such as the same emails, locations, and contact numbers (if
Introduction available) used across multiple platforms
to Social
Media API () 2) Which of the following statements is/are true regarding username change on social 1 point
media?
Misinformati
on and S1: Changes to any profile attribute other than username do not lead to unreachability to the user
Privacy () profile.
S2: The potential benign reasons for username change include space gain, suiting a trending
Privacy and event, gaining/losing anonymity, adjusting to real-life events, and avoiding boredom.
Pictures on
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=58&assessment=133 1/4
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 10 - Identity resolution and social media
Online Social S3: The malicious intentions for username change may include obscured username promotion
Media () and username squatting.
S4: Search by the user’s old username results in a failed attempt to reach the user’s profile,
Policing and potentially making others falsely believe that the user account has been deactivated.
Social Media
() Only S1 and S4 are correct
Only S1, S2, and S3 are correct
E-crime and S1, S2, and S4 are correct
social media
All S1, S2, S3, S4 are correct.
()
No, the answer is incorrect.
Social media Score: 0
and ecrime () Accepted Answers:
All S1, S2, S3, S4 are correct.
Identity 3) Below is the graph of username change. Which of the following is correct inference 0 points
resolution from the graph (as discussed in the lecture)?
and social
media ()
Week 8.1:
Profile Linking
on Online
Social Media
(unit?
unit=58&lesso
n=59)
Week 8.2:
Anonymous
Networks
(unit? Around 35 per cent, of the users change their profile picture at least 3 times.
unit=58&lesso Around 60-70 percent of the users change their usernames atleast once.
n=60)
Around 35 percent of the users change their profile picture atmost 3 times.
Tutorial 6: Around 50-55 per cent of users have changed their descriptions thrice.
Gephi Network
Visualization Yes, the answer is correct.
(unit?
Score: 0
unit=58&lesso Accepted Answers:
n=61) Around 35 per cent, of the users change their profile picture at least 3 times.
Quiz: Week 8
4) Why do whisper users have a low clustering coefficient over the network? 1 point
: Assignment
8 Whisper users are likely to interact with complete strangers who are highly unlikely to
(assessment?
interact with each other.
name=133)
Users interact with a large sample of other users
Week 8
New users make 20% of the contribution in the whisper content.
Feedback
Form : Privacy All of the above
and Security in
No, the answer is incorrect.
Online Social Score: 0
Media (unit? Accepted Answers:
unit=58&lesso Whisper users are likely to interact with complete strangers who are highly unlikely to interact
n=62)
with each other.
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=58&assessment=133 2/4
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 10 - Identity resolution and social media
Secret
Wickr
Yak yak
Blind
Partially Correct.
Score: 0
Accepted Answers:
Secret
Wickr
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=58&assessment=133 3/4
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 10 - Identity resolution and social media
Yak yak
Blind
Imagine you're a student in a university, and you decide to survey to determine the number of
friends each of your classmates has on social media. You ask everyone to report the number of
friends they have on one popular social media platform (say Facebook).
When you collect the data and calculate the average number of friends reported by your
classmates, 300 friends. However, when you individually examine the number of friends reported
by each of your classmates, you notice that many of them have fewer than 300 friends, perhaps
ranging from 50 to 200 friends.
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=58&assessment=133 4/4
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy
(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)
Media (course)
If already
registered, click
to check your
Week 9 : Assignment 9
payment status The due date for submitting this assignment has passed.
Due on 2023-09-27, 23:59 IST.
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 1/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy
E-crime and 3) You have two datasets and want to measure the strength and direction of the 1 point
social media relationship between them. One set of data consists of the ranks or ordinal values of the
() observations, while the other set consists of continuous numerical data. Which correlation
coefficient is most appropriate for this scenario?
Social media
and ecrime () Spearman's rank correlation coefficient
Pearson's correlation coefficient
Identity Either Spearman or Pearson correlation can be used interchangeably.
resolution
None of the above because correlation coefficients are not applicable in this scenario.
and social
media () Yes, the answer is correct.
Score: 1
Accepted Answers:
Research
Spearman's rank correlation coefficient
papers:
Location
based 4) Which of the following are open text fields, whose validity is not enforced by the 1 point
Privacy () system and may carry noise/invalid locations?
Tutorial 7:
Visualization -
Highcharts
(unit?
unit=63&lesso
n=66)
Quiz: Week 9
: Assignment
9
(assessment?
name=139)
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 2/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy
Research
Papers Part -
II ()
Week 11:
Summary ()
Lecture
materials/Not
es ()
Text The distributions are very skewed, with a few cities having as many as 100 mayorships,
Transcripts ()
tips or dones.
The distributions are evenly balanced, with cities having a nearly equal number of
Download
mayorships, tips, or dones.
videos ()
The distributions are normally distributed, with no cities having an exceptionally high
Books () number of mayorships, tips, or dones.
None of the above
Problem
Yes, the answer is correct.
Solving Score: 1
Session - Accepted Answers:
July 2023 () The distributions are very skewed, with a few cities having as many as 100 mayorships, tips or
dones.
6) What is the key difference between a scatter plot and a bar chart? 1 point
Scatter plots display categorical data, while bar charts are used for numerical data.
Scatter plots show the relationship between two numerical variables, while bar charts
display the frequency or distribution of categorical data.
Scatter plots are only used for displaying data with a single variable, while bar charts can
visualize data with multiple variables.
All of the above
Mayorships
Tips
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 3/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy
Dones
Checkins
Scatter plot
Bar chart
Bubble plot
Histogram
Yes, the answer is correct.
Score: 1
Accepted Answers:
Bubble plot
They allow users to share text-based posts with their friends and followers.
They provide a platform for online gaming and virtual reality experiences.
They enable users to connect with others and share their physical locations and activities.
They focus exclusively on professional networking and job searching.
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 4/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy
10) As discussed in lecture, Choose the correct inference (s) for figures below (Figure 4 1 point
and Figure 5). Here mayorships (blue), Tips (red), and Dones (green).
Reference: https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/TP_lbsn_2012.pdf (
https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/TP_lbsn_2012.pdf)
In Figure 4, The distribution of minimum inter-activity times is very skewed towards short
periods of time, with almost 50% of the users posting consecutive tips/dones 1 hour apart.
In Figure 4, On average, median and maximum, users do tend to experience very long
periods of time between consecutive tips and dones. For instance, around 50% of the users
have an average interactivity time of at least 450 hours, whereas around 80% of the users
have a maximum inter-activity time above 167 hours (roughly a week).
In Figure 5, Around 36% of the users have average and maximum displacements of 0
kilometer, indicating very short distances (within a few metres)
In Figure 5, About 10% of the users have a maximum displacement of at least 6,000
kilometers.
Yes, the answer is correct.
Score: 1
Accepted Answers:
In Figure 4, The distribution of minimum inter-activity times is very skewed towards short
periods of time, with almost 50% of the users posting consecutive tips/dones 1 hour apart.
In Figure 4, On average, median and maximum, users do tend to experience very long periods
of time between consecutive tips and dones. For instance, around 50% of the users have an
average interactivity time of at least 450 hours, whereas around 80% of the users have a
maximum inter-activity time above 167 hours (roughly a week).
In Figure 5, Around 36% of the users have average and maximum displacements of 0
kilometer, indicating very short distances (within a few metres)
In Figure 5, About 10% of the users have a maximum displacement of at least 6,000
kilometers.
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 5/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II
(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)
(course)
If already
registered, click
to check your
Week 10 : Assignment 10
payment status The due date for submitting this assignment has passed.
Due on 2023-10-04, 23:59 IST.
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 1/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II
Identity 3) Given the following figure depicts the quality of valid UGI, what is the correct 1 point
resolution inference(s) from the figure ?
and social
media ()
Research
papers:
Location
based Privacy
()
Research
Papers Part - In figure (a), the vast majority (80%) of Foursquare users and venues have location
II () information at the city level.
Week 10.1:
In figure (b), majority of users provide home location information at country level
Beware of What In figure (c), 60% of the users have provided their location information at the district level
You Share
In figure (b), 80% of the users have provided location information at city level.
Inferring Home
Location in Yes, the answer is correct.
Social Networks Score: 1
(unit? Accepted Answers:
unit=68&lesson In figure (a), the vast majority (80%) of Foursquare users and venues have location information at
=69) the city level.
In figure (b), 80% of the users have provided location information at city level.
Week 10.2: On
the dynamics of
username
change Please go through the following paper, “On the dynamics of username change behavior on Twitter”
behavior on
Twitter (unit?
https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/04-Jain.pdf
unit=68&lesson
=70)
(https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/04-Jain.pdf)
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 2/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II
Week 11:
Summary ()
Lecture
materials/Not
es ()
Text
Transcripts ()
Download
videos ()
Books ()
Problem
Solving 20% of users rarely change user names in short intervals and 80% change user names
Session - July frequently after longer intervals.
2023 ()
80% of users rarely change user names in short intervals, and 20% change user names
frequently after longer intervals.
35% of users choose a user name unrelated to an old one, and 65% of users reuse an old
user name.
20% of users frequently change user names in short intervals, and 80% change user name
rarely after longer intervals.
This paper aims at finding how and why users change their usernames within a social network
like Twitter.
Most users created new usernames unrelated to the old username when they changed
usernames within a social network.
The authors believe that unrelated usernames over time could be credited to the absence of
cognitive load to remember a past dumped username.
All of the above
S 1
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 3/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II
Score: 1
Accepted Answers:
All of the above
Please go through the following paper, “Boston Marathon Analyzing Fake Content on Twitter”
https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/ecrs2013_ag_hl_pk.pdf
(https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/ecrs2013_ag_hl_pk.pdf)
Twin blasts occurred during the Boston Marathon on April 15th, 2013 at 18:50 GMT
Twin blasts occurred during the Boston Marathon on April 15th, 2009 at 18:50 GMT
Four people were killed and 264 were injured in the incident
All of the above
S 1
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 4/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II
Score: 1
Accepted Answers:
All of the above
The authors characterised the spread of fake content on Twitter using temporal, source and
user attributes.
The authors used linear regression to predict how viral a rumour would be in the future based
on its current user characteristics.
The authors analysed the activity and interaction graphs for the suspended user profiles
created during the Boston blasts.
None of the above
The figure shows the temporal distribution of tweets after the Boston blast
The figure shows the spatial distribution of tweets after the Boston blast
Both of the above
None of the above
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 5/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 6/6
17/10/2023, 00:12 Privacy And Security In Online Social Media - - Unit 13 - Week 11: Summary
(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)
Media (course)
If already
registered, click
to check your
Week 11 : Assignment 11
payment status The due date for submitting this assignment has passed.
Due on 2023-10-11, 23:59 IST.
Presence of pronouns
Introduction
to Social No. of followers
Media API () No. of retweets
Mention of self words (I;my;mine)
Misinformati
on and Yes, the answer is correct.
Score: 1
Privacy ()
Accepted Answers:
Presence of pronouns
Privacy and
Mention of self words (I;my;mine)
Pictures on
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=73&assessment=141 1/4
17/10/2023, 00:12 Privacy And Security In Online Social Media - - Unit 13 - Week 11: Summary
Online Social 3) Who among the following are most likely to engage in link farming? 1 point
Media ()
Highly active users
Policing and Legitimate users
Social Media Popular users
()
Bloggers and experts
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=73&assessment=141 2/4
17/10/2023, 00:12 Privacy And Security In Online Social Media - - Unit 13 - Week 11: Summary
es () 7) Latanya Sweeney's research highlighted how two seemingly unrelated pieces of 1 point
information can be linked to reidentify an individual. Which term best describes this concept?
Text
Transcripts () Data Anonymization
Data Aggregation
Download Reidentification
videos ()
All of the above
9) What is the primary purpose of link farming in the context of SEO (Search Engine 1 point
Optimization)?
10) Which V of social media represents “Viral trends that spread rapidly across social 1 point
media platforms.”
Value
Velocity
Volume
Veracity
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=73&assessment=141 3/4
17/10/2023, 00:12 Privacy And Security In Online Social Media - - Unit 13 - Week 11: Summary
https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=73&assessment=141 4/4