Ch 13 - Emerging Issues: Big Data & the IoT Flashcards
Benefits of using big data include which of the following?
a. Can be obtained from a large variety of sources
b. Low cost to store data
c. Available for data mining as a basis for analytics
d. All of the above
d. All of the above
Which of the following aspects of data mining provide the basis of analytics?
a. Providing transparency
b. Drawing connections
c. Making predictions
d. All of the above
d. All of the above
Which of the following best describes a reason using big data for modern analytics may make it difficult to adhere to Fair Information Privacy Practices?
a. The data may be incomplete
b. No clear notice of data use to the data subject
c. Data may have been disclosed to a third party
d. None of the above
b. No clear notice of data use to the data subject
Which of the following is an example of a data collecting device?
a. Cell phones
b. Street light sensors
c. Car fuel injectors sensors
d. All of the above
d. All of the above
Moore’s Law is used to predict which of the following?
a. Number of transactions performed by a teller machine
b. Increase of the expanding universe
c. Exponential increase of computing power and data
d. All of the above
c. Exponential increase of computing power and data
Gordon Moore, Cofounder of Intel predicted the exponential increase in computing power when he observed the number of transistors on a circuit board doubled every 18 to 24 months.
What is the relationship between Moore’s Law and Big Data?
a. Moore’s Law predicts that Big Data will eventually drop off and become a thing of the past
b. Moore’s Law predicts the amount of data produced doubles about every 12 months
c. Moore’s Law predicts the amount of data collected is equal to the amount of data used
d. None of the above
b. Moore’s Law predicts the amount of data produced doubles about every 12 months
How frequently is data produced predicted to double by 2025?
Data produced is predicted to double every 12 hours at its current rate by 2025.
What are the “3 Vs”?
Characteristics of big data:
- Velocity (how fast the data is available)
- Volume (how much data is available)
- Variety (different forms from different sources being analyzed)
An important positive aspect of having a large variety of sources of big data is:
a. The ability to turn data from different sources into more uniform categories for analysis
b. The cycle time to turn data into distinct categories
c. The ability to quickly review the data records
d. None of the above
a. The ability to turn data from different sources into more uniform categories for analysis.
What is Asimov’s Law of Robotics as it pertains to Artificial Intelligence?
A robot:
- may not injure a human being or allow a human being to come to harm;
- must obey an order given by a human being, except when it would cause a human being harm;
- must protect its own existence except when it would cause harm or prevent it from obeying an order given by a human being.
Which of the following is a privacy related rule added to the rules of Asimov’s Law of Robotics by EPIC founder, Marc Rotenberg?
a. A robot should always reveal the name of the programmer
b. A robot should always reveal the basis of their decisions
c. A robot should always reveal their identities
d. b and c
A robot:
- should always reveal the basis of their decisions; and
- should always reveal their identities.
Which of the following is a standard included in Satya Nadella’s design principles for AI designed to help humans?
a. Must be designed for intelligent privacy
b. Must be transparent
c. Includes algorithmic accountability to undo unintended harm
d. All of the above
d. All of the above
- Which of the following is a financial risk of a security breach on big data?
a. Responding to and providing notice
b. Fraudulent account activity
c. Identity theft
d. All of the above
d. All of the above
What are the 2 primary security risks related to big data?
- Insiders stealing information
2. External hackers
Which of the following is not an important preventive consideration during development of a comprehensive information security plan?
a. Firewalls
b. Surveillance cameras
c. Intrusion detection
d. Threat models
b. Surveillance cameras