Chapter 1 Introduction to Data Science.
Objective Type Questions
Please choose the correct option in the questions below :-
1) Data and information are the same
a) Yes
b) No
Ans. B)
2) Social media platforms are responsible for creating data footprints.
a) Yes
b) No
Ans. a)
3) There is no risk of losing data
a) Yes
b) No
Ans. B)
4) Websites and mobile apps use our search history to provide personalized
offers
a) Yes
b) No
Ans. a)
5) Which of the following is not in DIKW Model?
a) Data
b) Information
c) Security
d) Knowledge
Ans. c)
6) Should you keep a data recovery plan?
a) Yes
b) No
Ans. a)
7) What is your data footprint?
a) The data trail left by you when you surf the internet
b) The time you spend on your computer
c) The number of electronics you buy in a year
d) The number of apps you have on your Mobile
Ans. a)
8) How long is your data footprint visible?
a) It depends on the websites you visit
b) The data footprint wipes clean after a year
c) It creates a permanent record
d) The record expires after a month
Ans. c)
9) Who can use or see data from your data footprint?
a) It is visible to professionals, but they need special access to go through the data
b) No one can access data from your digital footprint
c) Only the police have access to the information
d) Your data footprint is potentially visible to anyone.
Ans. c)
10) You regret posting a particular picture and want to take it down, it is possible,
and how would you do that?
a) It is little tricky but can be done by asking a professional to do it. Then no one can see
the photo
b) You can delete the picture by clicking on the delete button. Then no one can see the
photo anymore
c) Only the police can delete a picture uploaded by you
d) A photo can be deleted from your account, but someone might have already saved it
or copied it.
Ans. B)
11) How can you improve your data footprint?
a) It is best not to post anything if you want to stay safe
b) It is not necessary to improve your data footprint.
c) Check your social media accounts privacy settings to make sure you share your posts
with people you trust and know.
d) Share your personal details with a good friend or family member so they can help you
stay safe for ever.
Ans. c)
Standard Questions
1) Explain the difference between data and information?
Ans :- The difference between data and information are as followed:-
a) Data :- Data is the raw and unprocessed fact. For making the data meaningful, it is
required to be processed. Data has no meaning/importance. In bits and bytes the data is
been measured. Data can be the combination of numbers, symbols, alphabets etc.
b) Information :- Information is already the processed data which does not require any
type of processing for making it much meaningful. Information has much
importance/meaning. Time and quantity are the measuring units in which the meaningful
information is been measured.
2) Give some examples of how data impacts our daily lives.
Ans :- Below are some fields where the data impacts our daily lives :-
a) Healthcare :- In the different fields of healthcare industry, data has shown a great
impact which are
i) In maintaining the records related to medical heath history of any person.
ii) It is helpful in ensuring the disease or epidemic of the person
iii) It is used for recording the medical treatment done on any diseased or ill person.
iv) Nowadays we see different types of heath care devices like wrist band watches,
Weight machine, Gluco meter, BP monitors etc around us for maintaining the fitness of
the person.
b) Online shopping :- To achieve the desired target in the field of marketing, the online
sellers they keep a watch and analyse on the customers purchasing history. On the
basis of the analysed purchase history of customers, the online sellers comes out with
the exact offers and advertisements as per the expectation of customer. The other
customers who had recently brought the similar things they make a comparison by
offering various shopping patterns.
c) Education :- As we are much aware that this is the generation of digitization, and
hence all the schools and colleges are been digitized specially in terms of seeking
admission. After going through the historical records of the relevant university or any
educational institute students has the facility of exploring various career paths.
d) Travel :- Nowadays there are various travelling apps which helps us in planning our
travel by suggesting about the routes where there is traffic congested. During the
vacation when the travellers plans to visit any hotel or resorts, they give their precious
feedback in regards of services or facilities provided by the particular hotel or resort
which aids us in analysing the feedback form. Depending on the historical data available,
some travel systems makes the prediction about the flights cost. Above are some of the
impact of the data and its analysis which effects our daily lives.
e) Online shows :- As if the analysing technique is been improved, hence the online
streaming platforms are recommending us with the personalized contents. The online
platforms makes an analysation on the records of the previously watched history of a
person and comes up wit the contents related to which actor, actress, genres etc will be
mare appealing by the viewers. Sometimes they even make an assumption about the
shows popularity, and also provides the rating to the users based on the other viewers
feedback or ratings.
3) What are the different types of data loss?
Ans :- There are various forms of data loss which are as followed :-
a) System failure : – Sometimes there is a loss in the data due to the system failure in
terms of sudden power failure, when suddenly computer stops working (system crash),
when there is failure in the hard disk or any storage drives (disk failure) etc. Ex :-Failures
in the disk may occur due to the bad sectors of the hard disk, or damage to the storage
drives.
b) Disaster :- The data can be lost due to occurrence of unexpected actions/events such
as by natural disaster (flood, earthquakes etc) or due to fire.
c) Crime :- There is lost in data due to performing of illegal activities such as criminal
activities which includes or hacking, (accessing of computer without the authorized
permission of a person) theft (stealing of personal information or making online
transactions without the knowledge of the person) , computer virus (by sending virus and
infecting one’s computer through spam email or different internet files etc), ransomware
etc.
d) Unintentional action :- Sometimes the data can be lost due to performance of
unintentional actions like accidental deletion of files from the computer system, loss of
pen drives or laptops etc
e) Intentional action :- The data is lost by withholding the motive of losing of data. This
action is performed intentionally. For ex :-Making deletion of system files or system
programs from the computer system.
4) What are data footprints? What are the different types of data footprints?
Ans :- Today’s era is an era of digital world, where most of the people makes use of
internet. As internet has became an inseparable part of human life. When we are on
internet, we perform some activities such as surfing on the internet, sending and
receiving of messages, chatting with friends or relatives. Whatever activities are been
conducted on the internet, their data trails (records) are been created automatically.
Such data trails (data records) are to known as data footprints.
Visiting of different websites, sending and receiving of messages while chatting etc on
the internet are the main reasons for the creation of data footprints. Recording of every
data’s trace is done. There two main types of data footprints which are :-
a) Active footprints :- Many of us are habitat of uploading different types of images or
contents on various social media platforms. Such images or contents are been uploaded
as if they are been stored on the media. Hence such are the forms of active data
footprints as we already know that we had already share our information. Active data
footprints is not only applicable to individuals but to the business organizations or to the
corporate company.
b) Passive footprints :- On the internet whatever the sites we browse, or whatever
information we make a search for all such records are been stored on the search
engines which we are using. On the other hand some organizations makes use of these
records for marketing purpose. Such is the form of passive footprint. Data footprints can
be normally created in online and offline mode. Ex :- offline data footprints can be
images, files, or documents which may get stored in our personal computers.
5) Explain the DIKW model.
Ans :- After the change/conversion of data into information it can be used for knowledge
or wisdom. It is known as DIKW (Data to Information to Knowledge to Wisdom) model.
For ex :- 1000o C can be treated as an information but in real term it is considered as
the boiling temperature of water. Hence it acts as knowledge. In case if we go near to it
and touch, our hand will get burnt as result becomes wisdom.
Hence it is proved that only the data does not have any importance but if the data is
been analysed that it more important and useful too. DIKW model is type of pyramid
(DIKW) that is explained/represented below :-
6) Why should you keep a data recovery plan
Ans :- We are much aware that whatever data we keep stored in our system is very
important. We do not want to take a risk of losing. But sometimes the which is been
stored in our system gets lost. The data in the system gets lost due to several reasons
which are :-
a) System failure : – Sometimes there is a loss in the data due to the system failure in
terms of sudden power failure, when suddenly computer stops working (system crash),
when there is failure in the hard disk or any storage drives (disk failure) etc. Ex :-Failures
in the disk may occur due to the bad sectors of the hard disk, or damage to the storage
drives.
b) Disaster :- The data can be lost due to occurrence of unexpected actions/events such
as by natural disaster (flood, earthquakes etc) or due to fire.
c) Crime :- There is lost in data due to performing of illegal activities such as criminal
activities which includes or hacking, (accessing of computer without the authorized
permission of a person) theft (stealing of personal information or making online
transactions without the knowledge of the person) , computer virus (by sending virus and
infecting one’s computer through spam email or different internet files etc), ransomware
etc.
d) Unintentional action :- Sometimes the data can be lost due to performance of
unintentional actions like accidental deletion of files from the computer system, loss of
pen drives or laptops etc
e) Intentional action :- The data is lost by withholding the motive of losing of data. This
action is performed intentionally. For ex :-Making deletion of system files or system
programs from the computer system.
To avoid such problem occurrence, it essential for us to keep the backup of the data
recovery plan and updated frequently. In large organisations they keep their data stored
through which they can recover it back if the data is been lost.
7) How do online streaming platforms use data?
Ans :- Further with the help of Real-World examples of data, well get an idea about how
the data is used by online streaming platforms. Many of us likes to watch videos on the
internet. You might have also observed that when you are watching any video, before its
completion you notice the suggested videos is been shown on the platform. Have you
noticed that whatever videos you are getting on the screen in the form of suggested
videos are related with content of currently watching videos or the content you like?
Now you must be having question in your mind that how come such type of online
streaming platforms knows your choices. It is just only because of the data and its
analysis. Such type of online streaming platforms include many videos in their content.
Such platforms analysis the videos which people usually play post watching a video.
These platforms stores and studies the preferences of the peoples choice related to the
videos and contents. Later on algorithm is created at the background which creates a
peoples preferences and shows the same content in the suggested videos that
maximum number of the people have watched which the current clip.
8) What is personal data, and how can you keep your data safe online?
Ans :- Personal data is the personal information of a particular person like his financial
information, basic information, health information etc. This is the data, which no one
wants to share with anyone, but they want to keep it confidential/ secret. Whenever we
surf or browse on the internet for gaining information, the data gets stored on some sites
such as social networking sites in the form of data footprints. So there may be a risk of
misuse of personal data by the hackers. So you can keep your personal data safe
whenever you are online by taking some precautions which are as followed :-
a) You must make sure that you create a very strong password to your accounts online.
No body should be able to crack the password. In order to avoid the risk of data
exploitation, it is a must for one to change the passwords frequently.
b) You should even make sure that you avoid sharing your personal data on the social
networking site.
c) You must try to make use of free Wi-Fi connection but with some caution.
d) If you receive any sorts of links or attachments via email or by normal text message,
make sure you don’t open it. This messages or emails can be spam which is purposely
sent for gaining your personal data details. Before opening any unknown link or
attachments just be very careful.
e) On whatever website we are surfing or browsing on the internet, it is a must for us to
check that the website is secure or not. If not secured, avoid visiting.
f) You can make some extra protection in order to keep your personal data safe when
ever you are on the internet.
High Order Thinking Skills (HOTS)
1) Explain what data footprint is, where it is stored, how you can manage your
data footprint, who can follow your digital footprint for your social media account
where you post picture.
Ans :- The answer to this questions is give step by step :-
❖ What is data foot print is?
Today’s era is an era of digital world, where most of the people makes use of internet.
As internet has became an inseparable part of human life. When we are on internet, we
perform some activities such as surfing on the internet, sending and receiving of
messages, chatting with friends or relatives.
Whatever activities are been conducted on the internet, their data trails (records) are
been created automatically. Such data trails (data records) are to known as data
footprints.
❖ Where it is stored?
A data foot print is stored online and offline (offline data footprints can be images, files,
or documents which may get stored in our personal computers) databases.
❖ How you can manage data footprint?
We can manage the data footprints by keeping in mind that when ever we are browsing
on the net, we should make sure that we should not leave any kind of data footprints,
and if data footprints are created then it is our duty to clear it out from the history of the
search engine or from any social media platform. If the data footprint is been created,
then it should e the positive one.
❖ Who can follow your digital footprint for your social media account where you post
picture. The friends and relative, employers, police etc can make a follow of your digital
footprint for your social media account where you post picture.
2) Give a few examples of how your data can be lost and why it is essential to
have a data recovery plan, please make a list of all the data which are needed to
be kept safe so that you do not lose it Example – Birth Certificate
Ans :- We are much aware that whatever data we keep stored in our system is very
important. We do not want to take a risk of losing. But sometimes the which is been
stored in our system gets lost. The data in the system gets lost due to several reasons
which are :-
a) System failure : – Sometimes there is a loss in the data due to the system failure in
terms of sudden power failure, when suddenly computer stops working (system crash),
when there is failure in the hard disk or any storage drives (disk failure) etc. Ex :-Failures
in the disk may occur due to the bad sectors of the hard disk, or damage to the storage
drives.
b) Disaster :- The data can be lost due to occurrence of unexpected actions/events such
as by natural disaster (flood, earthquakes etc) or due to fire.
c) Crime :- There is lost in data due to performing of illegal activities such as criminal
activities which includes or hacking, (accessing of computer without the authorized
permission of a person) theft (stealing of personal information or making online
transactions without the knowledge of the person) , computer virus (by sending virus and
infecting one’s computer through spam email or different internet files etc), ransomware
etc.
d) Unintentional action :- Sometimes the data can be lost due to performance of
unintentional actions like accidental deletion of files from the computer system, loss of
pen drives or laptops etc
e) Intentional action :- The data is lost by withholding the motive of losing of data. This
action is performed intentionally. For ex :-Making deletion of system files or system
programs from the computer system.
To avoid such problem occurrence, it essential for us to keep the backup of the data
recovery plan and updated frequently. In large organisations they keep their data stored
through which they can recover it back if the data is been lost.
The list of the data are needed to be kept safe, so that you don’t lose it are Passport,
Driving License, Caste certificate, Residential Domicile Certificate, Educational
Marksheets and Educational Institutions Leaving Certificates, Bank Passbook, Aadhar
Card, Pan Card, Voter Id Card, Credit and Debit Card, Work Experience letters issued
by different companies/organizations etc.
What Does Netiquette Mean?
Netiquette represents the importance of proper manners and behavior online. In general, netiquette
is the set of professional and social etiquettes practiced and advocated in electronic communication
over any computer network. Common guidelines include being courteous and precise, and avoiding
cyber-bullying. Netiquette also dictates that users should obey copyright laws and avoid overusing
emoticons.
THE “9 KEY PS” OF DIGITAL CITIZENSHIP
1. PASSWORDS- we must create secure password.
2. PRIVATE INFORMATION-Always protect information that can be used to identify a person such as
address, email, and phone number.
3. PERSONAL INFORMATION- Do not share your personal information with everyone.
4. PHOTOGRAPHS-Turn off a geotagging feature
5. PROPERTY-Respect the property rights of those who create intellectual property
6. PERMISSION-Get permission for work used, or cite it
7. PROTECTION-To protect from viruses, malware, phishing, ransomware, and identity theft
8. PROFESSIONALISM-netiquette and online grammar
9. PERSONAL BRAND- how do you want to be and how are you perceived online?