Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
2 views9 pages

Unit 2 Data Literacy Session 1 Basic of Data Literacy

The document consists of multiple-choice questions and fill-in-the-blank exercises focused on data literacy, data security, and privacy. It emphasizes the importance of understanding, analyzing, and communicating with data effectively, as well as the role of data literacy in making informed decisions and combating misinformation. Additionally, it outlines best practices for cybersecurity and the Data Literacy Process Framework.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views9 pages

Unit 2 Data Literacy Session 1 Basic of Data Literacy

The document consists of multiple-choice questions and fill-in-the-blank exercises focused on data literacy, data security, and privacy. It emphasizes the importance of understanding, analyzing, and communicating with data effectively, as well as the role of data literacy in making informed decisions and combating misinformation. Additionally, it outlines best practices for cybersecurity and the Data Literacy Process Framework.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

(Check Point

Multiple Choice Questions


1. Data literacy refers to the ability to :
(a) Write computer code (b) Understand and analyze data
(c) Create databases (d) Operate software programs
2. Which of the following is N T an example of how data literacy can be beneficial?
(a) Fact-checking claims and spotting misinformation
(b) Understanding trends and patterns in your community
(c) Making decisions about your health based on data
() Writing computer programs
3. The first step in the Data Literacy Process Framework is :
(a) Explore and Visualize (b) Analyze and Communicate
(c) Import and Tidy Data (d) Practice and Repeat

UNIT II: DATA LITERACY


S.26 ARTIFICIAL INTELLIGENCE-IX (Supplement)

4. Which of the following is NOT apart of the Data Literacy Process Framework ?
(a) Import and Tidy Data (b) Explore and Visualize
(c) Analyze and Communicate (d) Write Code
5. Data security refers to:
(a) Protecting personal information
(b) Preventing unauthorized access to data
(c) Ensuring data accuracy (d) Analyzing data for insights
6. Which of the following is a benefit of data literacy ?
(a) Helps in making informed decisions
(b) Enhances critical thinking skills
(c) Enables effective communication with data
(d) All of these
7. Which of the following is NOT a step in the Data Literacy Process Framework ?
(a) Import and Tidy Data (b) Explore and Visualize
(c) Analyze and Communicate (d) Build Machine Learning Models
8. What does it mean to "tidy" data ?
(a) Remove any errors or inconsistencies
P (6) Organize data in a structured format
A (c) Visualize data in charts or graphs
(a) Interpret data and draw insights
9. Which of the following is a measure for ensuring data
security ?
(a) Obtaining user consent (b) Data minimization
B (c) Encryption (d) Anonymization
10. Data privacy aims to :
(a) Prevent unauthorized access to data
(b) Give individuals control over their personal data
(c) Protect data from being lost or damaged
(d) Detect and respond to cyber threats
11. Which of the following is NOT a potential security risk
associated with AI systems ?
(a) Vulnerabilities that can be exploited (b) Manipulated data
(c) Challenges to existing privacy regulations
(a) Improved detection of cyber threats
12. What does "Privacy by Design" refer to ?
(a) Developing AI systems with privacy in mind from the start
(b) Implementing strict access controls for sensitive data
(c) Obtaining explicit consent from users for data collection
(d) Regularly updating privacy policies and terms of service
13. Which of the following is NOT a best practice for cyber security ?
(a) Using strong passwords and multi-factor authentication
(b) Keeping software and systems updated with latest security
patches
(c) Being cautious with emails and links from unknown sOurces
(d) Sharing personal intormation treely over unsecured channels.
Sosn RASICS OF DATA uTEPACr S.27

14 What is the purpose of data encryption ?


(a)To prevent unauthorized access tosensitive data
() To ensure data acutacy and integrity
() To backup and restore data in case of loss
(d) Toanalyze and interpret data effectively
15. Which of the following is an example of asecure connection?
(a) HTTIP website (b) Public Wi-Fi network
() HTTPS websitev (d) Unencrypted email
16. What is the purpose of limiting access to sensitive data ?
(a) To enhance data security
(b) To comply with privacy regulations
(c) To facilitate data sharing and collaboration
(d) Both (a) and (b) V
17. Which of the following is NOT a way to protect data privacy ?
(a) Using data minimization techniques
(b) Obtaining user consent for data collection
(c) Implementing strong encryption measures
(d) Sharing personal data freely with third parties
18. What does it mean to "fact-check" information using data literacy skills?
(a) Verifying the accuracy of claims or information using data
(b) Creating visualizations to present data effectively
(c) Organizing and cleaning data before analysis
(d) Applying statistical techniques to analyze data
19. Which of the following is NOT acritical question to ask when practicing data literacy ?
(a) What is the source of the data ?
(b) Are there any potential biases or errors in the data ?
(c) How much is the storage cost of data ?
(d) Are there alternative interpretations or explanations for the data ?
20. What does it mean to "explore" data in the Data Literacy Process Framework ?
(a) Gather and organize data from various sources
(b) Examine patterns and trends within the data,
(c) Draw insights and communicate findings from the data
(d) Validate the accuracy andcompleteness of the data
21. Which of the following is NOT a potential risk associated with data breaches?
(a) Financial losses (b) Reputational damage
(c) Legal consequences (d) Improved cybersecurity measures
22. What is the purpose of maintaining offline backups of important data ?
(a) To protect against ransomware or data loss incidents
(b) To enhance data processing speed
(c) To comply with data retention regulations
(d)To facilitate data sharing across multiple devices

UNIT Il: DATA LITERACY


S.28 ARTIEICIAL INTHIGE NCE X (Supplement)
cyber ecurity ?
2 What is the inportance of educating onecl and others about
(a) To inrease awareness and promote best practices
() To comply with legal and regulatery requirements
() To develoj new yberseurity technologies
(d) Tocam certifications or degrees in cybersecurity
Fill in the Blanks

1. Data literacy is the ability to and with data effectively.


2. Being data literate helps you claims and spot misleading information.
3. The Vaio uuhoc Framework guides you through working with data effectively.
4 Dataprivacy concens safeguarding from misuse.

5. A involves measures like encryption, access controls, and network security.


6. The goal of data literacy is to enable decision-making.
7. and are two key steps in the Data Literacy Process Framework.
8. Data security helps prevent
by Design" refers to developing Al systems with security and privacy in mind from the
start.

10. Using passwords is one of the best practices for cyber security.
A
11. Regularly installing is important for maintaining system security.
R 12. Be cautious with emails and links fromVnnon sources.
13. Use to protect sensitive data stored on devices or in transit.
T
14. Connect toHIwebsites and useVNS when possible for secure connections.
B
15. Stay updated on the latest CyDe Thxaßand best practices for cyber security.
16. Raise about data security and privacy in your community.
17. Data literacy empowers you to navigate our Daig-dstiven world confidently.
True / False
1. Data literacy is only important for data scientists and analysts.F
2. Developing data literacy is a one-time process.
3. Data literacy can help you make better decisions based on facts:T
4. Data security and data privacy are the same thing.
5. Al systems do not require any personal or sensitive data.
6. Data literacy only involves reading and interpreting charts and
7. Being data literate can help you make better decisions based on
graphs. F
data.
8. The Data Literacy Prpcess Framework does not include any
steps related to data visualization.{
9. Data security and data privacy are completely unrelated
concepts. E
10, Al systems do not require any data for training or operation.
11. Al systems do not pose any challenges to existing data
privacy regulations. F
12. Using strong passwords is not an immportant practice for cyber security. F
13 It is safe to share sensitive intormation over
unsecured email or websites,E
14 Maintaining offline backups of data can
protect against ransomware attacks.
Sossion I : BASICS OF DATA ITERACY S.29
15. Encryption is used to ensure data accuracy and integrity. =
16. Connecting to HTTPS websites provides a secure connection.
17. It is recommended to share personal data freely with third parties.
18. Fact-checking claims using data is an example of applying data literacy skills. T
19. Asking about potentialbiases or errors in data is not acritical question in data literacy. F
20. Exploring data involves examining patterns and trends within the data. T
21. Data breaches can only result in financial losses, but not legal or reputational consequences.
22. Educating oneself and others about cyber security is important for increasing awareness. T

Competency Based Questions


1. Your local community organization is planning a fundraising event, and they have collected data
on past attendance, donation amounts, and demographics of supporters. Apply steps to analyze
this data and provide actionable insights to the organization. Your analysis should help them
determine the optimal event format, target audience, and marketing strategies to maximize
participation and fundraising efforts. How would you accomplish this ?
(a) Ignore the data and plan the event based on personal preferences.
(b) Analyze the data but provide vague or irrelevant insights.
(c) Apply the Data Literacy Process Framework, analyze the data, and provide actionable
insights for event planning. V
(d) Outsource the data analysis to a third-party without providing any guidance.
transportation). What would
2. Investigate the use of AI in various industries (e.g., healthcare, finance,
be the best approach to use this report.
on the benefits of AI.
(a) Ignore the potential concernsand focus only
guidelines or recommendations.
(b) Investigate the use of AI but fail to provide any
without investigating the use of AI or
(c) Develop a set of guidelines or recommendations
potential concerrns.
develop guidelines or
(d) Investigate the use of AI, identify potential concerns, and
recommendations to address them.
interest (e.g., environmnental issues, social
3. Examine a real-world dataset related to atopic of your
trends, global health). Which of the following approaches would you follow
to present your
analysis of the same highlighting the importance of critical questioning and data literacy skills.
interpretations.
(a) Examine the dataset without any critical analysis or alternative
analyzing the dataset.
(b) Prop0se alternative interpretations without examining or
interpretations, and
(c) Critically analyze the data, identify biases/limitations, propose alternative
present findings.
(d) Ignore the dataset and present personal opinions on the topic.
of the
4. To investigate the role of data literacy in combating misinformation and fake news, which
following approaches could have been used to identify and counter the spread of misinformation.
(a) Investigate the role of data literacy without any real-world case study
(b) Analyze a real-world case study general way
(c) Investigate the role of data literacy, analyze areal-world case study, and present findings and
recommendations V
(d) Compile incidents of misinformation and fake news from real-world data

UNIT II: DATA LITERACY


S.30 ARTIFICIAL INTELLIGENCE-IX (Supplement)
Questions
Assertion &Reasoning

Directions
followed by a statement of reason (R).
questions, a statement of assertion (A) is
In the following
Mark the correct choice as :
R is the correct explanation of A.
(a) Both A and R are true and
the correct explanation of A.
(b) Both A and R are true but R is not
(c) Ais true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both Aand R are false or not fully true.
analyzing various types of data, including
1. Assertion (A). Data literacy involves understanding and
numbers, graphs, and charts.
ansl=(C) interpret data in only numerical formats.
Keason (K). Data literacy is the ability to read and
interconnected steps.
2. Assertion (A). The Data Literacy Process Framework is a linear process with no
As2=(d /Reason (R). The Data Literacy Process Framework incudes steps for exploring, visualizing, and
communicating data.
3. Assertion (A). Data security measures, such as encryption and access controls, help prevent
AS1C unauthorized access to data.
Reason (R). Data security and data privacy are interchangeable terms that refer to the same concept.
A
4. Assertion (A). AI systems can enhance certain security measures by detecting cyber threats or
Ard)anomalies.
T
Reason (R). AIsystems themselves cannot introduce any security risks or vulnerabilities.
B 5. Assertion (A). Implementing "Privacy by Design'" principles involves developing AI systems with
a privacy considerations from the outset.
Reason (R). Privacy by Design is a concept that is useful in establishing robust data security and
privacy protections controls.
6. Assertion (A). Using strong passwords and enabling multi-factor authentication are best practices
cyber security.
Reason (R). Regularly updating software and systems with the latest security patches is not an
important cyber security practice.
7. Assertion (A). Educating oneself and others about cyber threats and best practices
can increase
awareness and promote better security practices.
Reason (R). Raising awareness about data security and privacy is only relevant for IT professionals
and not the general public.

LET US REVISE
Data literacy is the ability to understand, analyze, and communicate
with data effectively.
Data literacy involves three things: Reading data, Working with Data, and
Communicating with data.
Data literacy offers benefits like: spotting data trends, fostering critical
informed decisions, effective communication, and helping in thinking, helping in making
solving complex problems.
Becoming proficient in data iteracy involves following a structured process
Process Framework. called the Data Literacy
Session 1 . BASICS OF DATA LITERACY S.31
The Data Literacy Process Framework involves majorly three steps : Identify (to
understand data).
Analyse (to uncover patterns in data), and Interpret (to get insights from data).
Data visualisation is the qraphical or visual representation of information and data, such as graphs or
charts like bar charts, scatter plots etc.
3 Data security refers to taking steps for safequarding data and information from unauthorized access,
theft, or alteration, and involves preventives measures to stop data breaches.
* Data privacy refers to controlling the access to our personal information and its use.
* Data security and privacy haveamixed relation with AI. Data used to train AI should be secure. from
authentic sources. Comprised data can impact the performance of Al. At the same time. Al can play an
important role in detecting and protecting against data breaches.
* Best Practices for Cyber Security inciude: using strong passwords, keeping systems and software updated,
being cautious with emails and links, backing up data regularly, using encryption for stored sensitive
data, visiting secure sites and using secure connections, limiting access and sharing of data, and keep
educating oneself about latest threats and protection measures.

Soluton Time

1. What is data literacy ?


Ans. Data literacy is the ability to understand, analyze, and communicate with data effectively.
2. Why is data literacy important in today's world ?
Ans. Data literacy is important because it helps individuals think critically, make better decisions
based on facts, communicate effectively using data, and solve complex problems involving large
amounts of data.
3. Describe the three main steps of the Data Literacy Process Framework.
Ans.The three main steps are: () Import and Tidy Data (gather and organize data), (i) Explore and
Visualize (examine patterns and create visualizations), (ii) Analyze and Communicate (draw insights
and share findings).
4. Differentiate between data security and data privacy.
Ans. Data security refers to protecting data from unauthorized access, theft, or damage. Data
privacy concerns safeguarding personal or sensitive information from misuse and giving individuals
control over how their data is collected and used.
5. How can Al enhance data security measures ?
Ans. AI can enhance security measures by using machine learning models to detect cyber threats,
anomalies, or potential data breaches.
6. What are some potential security risks associated with Al systems ?
Ans. Al systems may have vulnerabilities that can be exploited, be susceptible to adversarial
attacks with manipulated data, and challenge existing data privacy regulations.
7. What is the purpose of "Privacyby Design"?
Ans. Privacy by Design refers to developing AI systems with privacy considerations and
protections in mind from the very beginning, rather than as an afterthought.
8. Why is it important to use strong passwvords and enable multi-factor authentication ?
Ans. Using strong, unique passwords and enabling multi-factor authentication are best practices
for cyber security as they help prevent unauthorized access to accounts and data.

UNIT II: DATA LITERACY


S.32 ARTIFICIAL
AR INTELLIGENCE-IX (Supplement)
with the latest security patches.
Explain the importance of keeping software and systems updated
address kno
Ans. Regularly installing software updates and security patches helps known
vulnerabilities and protect against potential cyber threats or attacks.
10. What is the role of data encryption in ensuring datasecurity ?
converting it into
Ans. Data encryption is used to prevent unauthorized access to sensitive data by
acoded format that can only be read with the correct decryption key.
?
11. Why is it recommended to limit access to sensitive dataon a"need-to-know" basis
Ans. Limiting access to sensitive data on a need-to-know basis enhances data security and helps
Comply with data privacy regulations by restricting access to only those whO require it for their work.
12. How can educating oneself and others about cyber security promote better practices?
Ans. Educating oneself and others about cyber threats, best practices, and the importance of data
security arnd privacy can increase awareness and encourage the adoption of safer practices.

GLOSSARY
Data Literacy Ability to understand, analyze, and communicate with data effectively.
Data Privacy Controlling the access to our personal information and its use.
Data Security Taking steps for safeguarding data and information from unauthorized access.
P
Data Visualisation Graphical or visual representation of information and data.
A
R
Unit Il: Data Literacy
Session 1:Basics of Data Literacy (Page S.25)
Multiple Choice Questions 6. (d)
2. (d) 3. (c) 4. (d) 5. (b)
1. (b) 12 (a)
9. (c) 10. (b) 11. (d)
7. (d) 8. (b) 18. (a)
16. (d) 17. (d)
13. (d) 14. (a) 15. (c)
21. (d) 22, (a) 23. (a)
19. (c) 20. (b)
Fill in the Blanks
2. fact-check 3. Data Literacy Process
1. understand, analyze, communicate
4. personal infornation
5. Data Security
6. infomed 7. Explore & Visualize, Analyze & Communicate
8. data breaches 9. Security/Privacy
10. strong 11. software updates /security patches
unknown/ untrusted 13. encryption 14. HTTPS, VPNs
12.
16. awareness 17. data-driven
15. cvber threats

True/Folse Questions
3. T 4. F 5. F 6. F
1. F 2. F
9. F 10. F 11. F 12. F
7. I 8. F
15. F 16. T 17. F 18. T
13. F 14. T
21. F 22. T
19. F 20. T

Competency-Bosed Questions
2. (d) 3. (c) 4. (C)
1. (c)

Assertions and Reasons


3. (c) 4. (d) 5. (a) 6. (b)
1. (c) 2. (d)
7. (c)

You might also like