Page 116 - Data Science class 11
P. 116

B.  Long answer type questions:
            1.  Explain in detail how data has evolved over time.                                 [CBSE Handbook]
            2.  Differentiate between insider and outsider threats with examples.

            3.  “Most organisations have in store a lot of sensitive data that could be very important and possibly damaging to the
              company's reputation if it was leaked to the outside world.” Enlist some examples of such sensitive data.
            4.  Differentiate between Password Attack and IP Spoofing.

            5.  What measures should an organisation take to ensure it has policies and training in place, to prevent data breaches
              before hackers get through?


             Higher Order Thinking Skills                                                               (HOTS)
             Answer the questions below in no less than 200 words.

            1.  What, according to you, should be the ethical principles for conducting a research that  involves dealing with other
              people's data?                                                                      [CBSE Handbook]

            2.  Should there be differences in expectations about what is ethical online versus offline regarding handling of data?
                                                                                                  [CBSE Handbook]
            3.  “Not every cybercriminal aims to make money”. What are the other motives behind a cyber attack that you can think of?


              Applied Project

             Suppose you have visited a restaurant for dining. At the end of the meal, the restaurant manager provides you with a
             form, wherein you need to fill up your details along with your contact number. According to the manager, the purpose
             for collecting this data is to enable them to inform you of the exciting deals as and when they come up. Explain in detail,
             the precautions you need to take before handing out your details to the restaurant manager.   [CBSE Handbook]





































         Answers
         A.    1. a.   2. a.    3. b.    4. d.    5. c.    6. d.   7. b.    8. d.    9. b.   10. d.
         B.   1. Physical theft   2. Corporate   3. Defining goal   4. Cyber attack   5. Malicious Insiders



          114   Touchpad Data Science-XI
   111   112   113   114   115   116   117   118   119   120   121