Page 116 - Data Science class 11
P. 116
B. Long answer type questions:
1. Explain in detail how data has evolved over time. [CBSE Handbook]
2. Differentiate between insider and outsider threats with examples.
3. “Most organisations have in store a lot of sensitive data that could be very important and possibly damaging to the
company's reputation if it was leaked to the outside world.” Enlist some examples of such sensitive data.
4. Differentiate between Password Attack and IP Spoofing.
5. What measures should an organisation take to ensure it has policies and training in place, to prevent data breaches
before hackers get through?
Higher Order Thinking Skills (HOTS)
Answer the questions below in no less than 200 words.
1. What, according to you, should be the ethical principles for conducting a research that involves dealing with other
people's data? [CBSE Handbook]
2. Should there be differences in expectations about what is ethical online versus offline regarding handling of data?
[CBSE Handbook]
3. “Not every cybercriminal aims to make money”. What are the other motives behind a cyber attack that you can think of?
Applied Project
Suppose you have visited a restaurant for dining. At the end of the meal, the restaurant manager provides you with a
form, wherein you need to fill up your details along with your contact number. According to the manager, the purpose
for collecting this data is to enable them to inform you of the exciting deals as and when they come up. Explain in detail,
the precautions you need to take before handing out your details to the restaurant manager. [CBSE Handbook]
Answers
A. 1. a. 2. a. 3. b. 4. d. 5. c. 6. d. 7. b. 8. d. 9. b. 10. d.
B. 1. Physical theft 2. Corporate 3. Defining goal 4. Cyber attack 5. Malicious Insiders
114 Touchpad Data Science-XI

