CBSE Data Science Class 9 Solution – Introduction
CBSE Data Science Class 9 Solution Student Handbook Chapter 1 Introduction all Questions and Answers Solution by Data Science Teacher. Net Ex. Here provided all Data Science Solution for Class 6. This Exercise includes Objective Type Questions, Standard Questions, Higher Order Thinking Skills (HOTS), Applied Project.
Objective Type Questions
Please choose the correct option in the questions below :-
1) Data and information are the same
a) Yes
b) No
Ans. B)
2) Social media platforms are responsible for creating data footprints.
a) Yes
b) No
Ans. a)
3) There is no risk of losing data
a) Yes
b) No
Ans. B)
4) Websites and mobile apps use our search history to provide personalized offers
a) Yes
b) No
Ans. a)
5) Which of the following is not in DIKW Model?
a) Data
b) Information
c) Security
d) Knowledge
Ans. c)
6) Should you keep a data recovery plan?
a) Yes
b) No
Ans. a)
7) What is your data footprint?
a) The data trail left by you when you surf the internet
b) The time you spend on your computer
c) The number of electronics you buy in a year
d) The number of apps you have on your Mobile
Ans. a)
8) How long is your data footprint visible?
a) It depends on the websites you visit
b) The data footprint wipes clean after a year
c) It creates a permanent record
d) The record expires after a month
Ans. c)
9) Who can use or see data from your data footprint?
a) It is visible to professionals, but they need special access to go through the data
b) No one can access data from your digital footprint
c) Only the police have access to the information
d) Your data footprint is potentially visible to anyone.
Ans. c)
10) You regret posting a particular picture and want to take it down, it is possible, and how would you do that?
a) It is little tricky but can be done by asking a professional to do it. Then no one can see the photo
b) You can delete the picture by clicking on the delete button. Then no one can see the photo anymore
c) Only the police can delete a picture uploaded by you
d) A photo can be deleted from your account, but someone might have already saved it or copied it.
Ans. B)
11) How can you improve your data footprint?
a) It is best not to post anything if you want to stay safe
b) It is not necessary to improve your data footprint.
c) Check your social media accounts privacy settings to make sure you share your posts with people you trust and know.
d) Share your personal details with a good friend or family member so they can help you stay safe for ever.
Ans. c)
Standard Questions
1) Explain the difference between data and information?
Ans :- The difference between data and information are as followed:-
a) Data :- Data is the raw and unprocessed fact. For making the data meaningful, it is required to be processed. Data has no meaning/importance. In bits and bytes the data is been measured. Data can be the combination of numbers, symbols, alphabets etc.
b) Information :- Information is already the processed data which does not require any type of processing for making it much meaningful. Information has much importance/meaning. Time and quantity are the measuring units in which the meaningful information is been measured.
2) Give some examples of how data impacts our daily lives.
Ans :- Below are some fields where the data impacts our daily lives :-
a) Healthcare :- In the different fields of healthcare industry, data has shown a great impact which are
i) In maintaining the records related to medical heath history of any person.
ii) It is helpful in ensuring the disease or epidemic of the person
iii) It is used for recording the medical treatment done on any diseased or ill person.
iv) Nowadays we see different types of heath care devices like wrist band watches, Weight machine, Gluco meter, BP monitors etc around us for maintaining the fitness of the person.
b) Online shopping :- To achieve the desired target in the field of marketing, the online sellers they keep a watch and analyse on the customers purchasing history. On the basis of the analysed purchase history of customers, the online sellers comes out with the exact offers and advertisements as per the expectation of customer. The other customers who had recently brought the similar things they make a comparison by offering various shopping patterns.
c) Education :- As we are much aware that this is the generation of digitization, and hence all the schools and colleges are been digitized specially in terms of seeking admission. After going through the historical records of the relevant university or any educational institute students has the facility of exploring various career paths.
d) Travel :- Nowadays there are various travelling apps which helps us in planning our travel by suggesting about the routes where there is traffic congested. During the vacation when the travellers plans to visit any hotel or resorts, they give their precious feedback in regards of services or facilities provided by the particular hotel or resort which aids us in analysing the feedback form. Depending on the historical data available, some travel systems makes the prediction about the flights cost. Above are some of the impact of the data and its analysis which effects our daily lives.
e) Online shows :- As if the analysing technique is been improved, hence the online streaming platforms are recommending us with the personalized contents. The online platforms makes an analysation on the records of the previously watched history of a person and comes up wit the contents related to which actor, actress, genres etc will be mare appealing by the viewers. Sometimes they even make an assumption about the shows popularity, and also provides the rating to the users based on the other viewers feedback or ratings.
3) What are the different types of data loss?
Ans :- There are various forms of data loss which are as followed :-
a) System failure : – Sometimes there is a loss in the data due to the system failure in terms of sudden power failure, when suddenly computer stops working (system crash), when there is failure in the hard disk or any storage drives (disk failure) etc. Ex :-Failures in the disk may occur due to the bad sectors of the hard disk, or damage to the storage drives.
b) Disaster :- The data can be lost due to occurrence of unexpected actions/events such as by natural disaster (flood, earthquakes etc) or due to fire.
c) Crime :- There is lost in data due to performing of illegal activities such as criminal activities which includes or hacking, (accessing of computer without the authorized permission of a person) theft (stealing of personal information or making online transactions without the knowledge of the person) , computer virus (by sending virus and infecting one’s computer through spam email or different internet files etc), ransomware etc.
d) Unintentional action :- Sometimes the data can be lost due to performance of unintentional actions like accidental deletion of files from the computer system, loss of pen drives or laptops etc
e) Intentional action :- The data is lost by withholding the motive of losing of data. This action is performed intentionally. For ex :-Making deletion of system files or system programs from the computer system.
4) What are data footprints? What are the different types of data footprints?
Ans :- Today’s era is an era of digital world, where most of the people makes use of internet. As internet has became an inseparable part of human life. When we are on internet, we perform some activities such as surfing on the internet, sending and receiving of messages, chatting with friends or relatives. Whatever activities are been conducted on the internet, their data trails (records) are been created automatically. Such data trails (data records) are to known as data footprints.
Visiting of different websites, sending and receiving of messages while chatting etc on the internet are the main reasons for the creation of data footprints. Recording of every data’s trace is done. There two main types of data footprints which are :-
a) Active footprints :- Many of us are habitat of uploading different types of images or contents on various social media platforms. Such images or contents are been uploaded as if they are been stored on the media. Hence such are the forms of active data footprints as we already know that we had already share our information. Active data footprints is not only applicable to individuals but to the business organizations or to the corporate company.
b) Passive footprints :- On the internet whatever the sites we browse, or whatever information we make a search for all such records are been stored on the search engines which we are using. On the other hand some organizations makes use of these records for marketing purpose. Such is the form of passive footprint. Data footprints can be normally created in online and offline mode. Ex :- offline data footprints can be images, files, or documents which may get stored in our personal computers.
5) Explain the DIKW model.
Ans :- After the change/conversion of data into information it can be used for knowledge or wisdom. It is known as DIKW (Data to Information to Knowledge to Wisdom) model. For ex :- 1000o C can be treated as an information but in real term it is considered as the boiling temperature of water. Hence it acts as knowledge. In case if we go near to it and touch, our hand will get burnt as result becomes wisdom.
Hence it is proved that only the data does not have any importance but if the data is been analysed that it more important and useful too. DIKW model is type of pyramid (DIKW) that is explained/represented below :-
6) Why should you keep a data recovery plan
Ans :- We are much aware that whatever data we keep stored in our system is very important. We do not want to take a risk of losing. But sometimes the which is been stored in our system gets lost. The data in the system gets lost due to several reasons which are :-
a) System failure : – Sometimes there is a loss in the data due to the system failure in terms of sudden power failure, when suddenly computer stops working (system crash), when there is failure in the hard disk or any storage drives (disk failure) etc. Ex :-Failures in the disk may occur due to the bad sectors of the hard disk, or damage to the storage drives.
b) Disaster :- The data can be lost due to occurrence of unexpected actions/events such as by natural disaster (flood, earthquakes etc) or due to fire.
c) Crime :- There is lost in data due to performing of illegal activities such as criminal activities which includes or hacking, (accessing of computer without the authorized permission of a person) theft (stealing of personal information or making online transactions without the knowledge of the person) , computer virus (by sending virus and infecting one’s computer through spam email or different internet files etc), ransomware etc.
d) Unintentional action :- Sometimes the data can be lost due to performance of unintentional actions like accidental deletion of files from the computer system, loss of pen drives or laptops etc
e) Intentional action :- The data is lost by withholding the motive of losing of data. This action is performed intentionally. For ex :-Making deletion of system files or system programs from the computer system.
To avoid such problem occurrence, it essential for us to keep the backup of the data recovery plan and updated frequently. In large organisations they keep their data stored through which they can recover it back if the data is been lost.
7) How do online streaming platforms use data?
Ans :- Further with the help of Real-World examples of data, well get an idea about how the data is used by online streaming platforms. Many of us likes to watch videos on the internet. You might have also observed that when you are watching any video, before its completion you notice the suggested videos is been shown on the platform. Have you noticed that whatever videos you are getting on the screen in the form of suggested videos are related with content of currently watching videos or the content you like?
Now you must be having question in your mind that how come such type of online streaming platforms knows your choices. It is just only because of the data and its analysis. Such type of online streaming platforms include many videos in their content. Such platforms analysis the videos which people usually play post watching a video. These platforms stores and studies the preferences of the peoples choice related to the videos and contents. Later on algorithm is created at the background which creates a peoples preferences and shows the same content in the suggested videos that maximum number of the people have watched which the current clip.
8) What is personal data, and how can you keep your data safe online?
Ans :- Personal data is the personal information of a particular person like his financial information, basic information, health information etc. This is the data, which no one wants to share with anyone, but they want to keep it confidential/ secret. Whenever we surf or browse on the internet for gaining information, the data gets stored on some sites such as social networking sites in the form of data footprints. So there may be a risk of misuse of personal data by the hackers. So you can keep your personal data safe whenever you are online by taking some precautions which are as followed :-
a) You must make sure that you create a very strong password to your accounts online. No body should be able to crack the password. In order to avoid the risk of data exploitation, it is a must for one to change the passwords frequently.
b) You should even make sure that you avoid sharing your personal data on the social networking site.
c) You must try to make use of free Wi-Fi connection but with some caution.
d) If you receive any sorts of links or attachments via email or by normal text message, make sure you don’t open it. This messages or emails can be spam which is purposely sent for gaining your personal data details. Before opening any unknown link or attachments just be very careful.
e) On whatever website we are surfing or browsing on the internet, it is a must for us to check that the website is secure or not. If not secured, avoid visiting.
f) You can make some extra protection in order to keep your personal data safe when ever you are on the internet.
High Order Thinking Skills (HOTS)
1) Explain what data footprint is, where it is stored, how you can manage your data footprint, who can follow your digital footprint for your social media account where you post picture.
Ans :- The answer to this questions is give step by step :-
❖ What is data foot print is?
Today’s era is an era of digital world, where most of the people makes use of internet. As internet has became an inseparable part of human life. When we are on internet, we perform some activities such as surfing on the internet, sending and receiving of messages, chatting with friends or relatives.
Whatever activities are been conducted on the internet, their data trails (records) are been created automatically. Such data trails (data records) are to known as data footprints.
❖ Where it is stored?
A data foot print is stored online and offline (offline data footprints can be images, files, or documents which may get stored in our personal computers) databases.
❖ How you can manage data footprint?
We can manage the data footprints by keeping in mind that when ever we are browsing on the net, we should make sure that we should not leave any kind of data footprints, and if data footprints are created then it is our duty to clear it out from the history of the search engine or from any social media platform. If the data footprint is been created, then it should e the positive one.
❖ Who can follow your digital footprint for your social media account where you post picture. The friends and relative, employers, police etc can make a follow of your digital footprint for your social media account where you post picture.
2) Give a few examples of how your data can be lost and why it is essential to have a data recovery plan, please make a list of all the data which are needed to be kept safe so that you do not lose it Example – Birth Certificate
Ans :- We are much aware that whatever data we keep stored in our system is very important. We do not want to take a risk of losing. But sometimes the which is been stored in our system gets lost. The data in the system gets lost due to several reasons which are :-
a) System failure : – Sometimes there is a loss in the data due to the system failure in terms of sudden power failure, when suddenly computer stops working (system crash), when there is failure in the hard disk or any storage drives (disk failure) etc. Ex :-Failures in the disk may occur due to the bad sectors of the hard disk, or damage to the storage drives.
b) Disaster :- The data can be lost due to occurrence of unexpected actions/events such as by natural disaster (flood, earthquakes etc) or due to fire.
c) Crime :- There is lost in data due to performing of illegal activities such as criminal activities which includes or hacking, (accessing of computer without the authorized permission of a person) theft (stealing of personal information or making online transactions without the knowledge of the person) , computer virus (by sending virus and infecting one’s computer through spam email or different internet files etc), ransomware etc.
d) Unintentional action :- Sometimes the data can be lost due to performance of unintentional actions like accidental deletion of files from the computer system, loss of pen drives or laptops etc
e) Intentional action :- The data is lost by withholding the motive of losing of data. This action is performed intentionally. For ex :-Making deletion of system files or system programs from the computer system.
To avoid such problem occurrence, it essential for us to keep the backup of the data recovery plan and updated frequently. In large organisations they keep their data stored through which they can recover it back if the data is been lost.
The list of the data are needed to be kept safe, so that you don’t lose it are Passport, Driving License, Caste certificate, Residential Domicile Certificate, Educational Marksheets and Educational Institutions Leaving Certificates, Bank Passbook, Aadhar Card, Pan Card, Voter Id Card, Credit and Debit Card, Work Experience letters issued by different companies/organizations etc.
Applied Project
In this project, you can use a dataset of popular dog breed characteristics to determine the best breed of dog for a hypothetical friend. You can consider various factors like the dog’s lifespan, maximum weight, and the whether the breed is good with children. You will collect, summarize and compare data on finding the perfect dog breed.
Data science