Unit 2: Data Literacy
Q1) What is the DIKW model? Explain all the
levels in the DIKW model with the help of
diagrams & examples.
The DIKW model is a pyramid shaped model of
knowledge management that shows how data
evolves into information, then into knowledge &
finally into wisdom. It helps us understand how
the usefulness of data increases as we keep
adding context, meaning & purpose.
Levels of the DIKW Model:
1. Data – Raw, meaningless facts or figures. It
has no context or interpretation.
Example: “85, 90, 78” (just numbers)
Volume: High | Usefulness: Low
2. Information – When context is added to data,
it becomes meaningful.
Example: “These are a student’s marks in three
exams.”
3. Knowledge – Understanding patterns or
relationships in information.
Example: “The student is performing
consistently well.”
4. Wisdom – Applying knowledge using
experience, judgment & insight.
Example: “Encourage the student to take a
scholarship test.”
➡ As we go up, volume decreases, but
usefulness increases.
The DIKW model shows how data becomes
useful for decision making. With recent
advancements in computer science, even
machines can now process data into
information. However, extracting wisdom &
making decisions is still a task that needs
human experience (though now supported by AI
& data science).
---
Q2) What are cybercrimes? Explain any four
types of cybercrimes with a short description.
Cybercrimes are unlawful activities carried out
using computers, mobile phones, or the internet.
These crimes can harm individuals, steal data,
or spread false information.
Four types of cybercrimes:
1. Spamming – Sending large numbers of
unwanted messages or emails, usually for
advertising or spreading links.
2. Phishing – Attempting to steal personal data
like passwords or bank details by sending fake
emails or messages with malicious links.
3. Impersonation – Using someone’s name,
photo, or details to create fake accounts &
commit fraud or mislead others.
4. Cyberbullying – Repeatedly harassing,
insulting, or threatening someone online using
social media, messages or emails.
---
Q3) Write any important 5 best practices that
should be followed to ensure cybersecurity &
online safety.
Some of the important best practices are:
1. Use Strong Passwords
2. Enable Two-Factor Authentication (2FA)
3. Keep Software Updated
4. Be cautious with Links & Attachments
5. Use Secure Networks
6. Be Mindful of Social Media Settings
7. Backup Your Data Regularly
8. Educate Yourself about Cybersecurity Risks
9. Limit Personal Information Online
10. Follow Secure Browsing Practices
11. Practise Safe Online Gaming
12. Be Aware of Personal Data Rights
---
Q4) Explain in detail the various types of data as
categorized in data science & artificial
intelligence.
Data refers to pieces of information that are
collected & stored for analysis, reference or
processing.
Types of Data:
a) Quantitative Data (Numeric Data):
Associated with numbers & measures quantity,
answering “How many?”, “How much?”, or
“Which is more?”
Examples: Age, height, weight, number of
pages in a book, price, speed of a car.
Discrete Data: Whole numbers (e.g., number of
students in a class, cars in a parking lot).
Continuous Data: Values that can take decimals
(e.g., temperature readings, height & weight,
time taken for a task).
b) Qualitative Data (Textual Data):
Describes qualities or characteristics, answering
“What type?”, “What kind?”
Examples: Eye color, hair color, names, author,
genre, car’s color, body type, organization type.
By Organization:
Structured Data: Predefined formats like tables,
spreadsheets, databases.
Semi-Structured Data: Partial organization, e.g.,
XML, JSON, web logs.
Unstructured Data: No predefined organization,
e.g., text, images, videos, social media posts.
By Application:
Temporal Data: Related to time (e.g., sensor
data, stock market, weather).
Spatial Data: Related to location (e.g., GPS,
maps, satellite images).
Biometric Data: Unique physical/behavioral
traits (e.g., fingerprints, facial recognition).
---
Q5) Explain in detail the difference between
Primary Data & Secondary Data.
Primary Data: Information collected firsthand by
the researcher directly from the source for a
specific research purpose.
Example: Survey among classmates to know
favorite sport.
Secondary Data: Information already collected
by someone else, used for study.
Example: Published statistics of fisheries data
sets.
---
Q6) State any best practices for data acquisition
in AI applications.
Some of the best practices are:
Define clear objectives
Data quality is key
Maintain data privacy & security
Data diversity is essential
Consider ethics & privacy
Documentation is essential