You are on page 1of 4

Big Idea 2

Review Questions

1. A videographer stores videos on his laptop. In this case the videos are considered the data. Each
video includes metadata such as: -Date: The date the video was shot. -Time: The time the video was
shot. -Location: The location the video was shot. -Device: The camera the video was recorded with.
Which of the following could the videographer NOT do based on this metadata?

A. Filter videos to those recorded within the city

B. Filter videos to those recorded in the last 3 months

C. Filter videos to those recorded in a particular city.

D. Filter videos to those recorded with his favorite camera

2. This type of data makes working with other data easier - allowing the user to sort or locate specific
information. It is also referred to as "data about data". What type of data is this?

A. Quantitative Data

B. Programming Data

C. Metadata

D. Machine Data

3. A coffee shop is interested in learning about the beverage preferences of coffee drinkers living
nearby to the coffee shop and intends to use survey data to help decide which new beverage options
to add to the menu. Which of the following is LEAST likely to be part of the process used to analyze
the data?

A. Filtering data to view responses based off of gender.

B. Cleaning data to remove inconsistencies.

C. Filtering data to view responses based off of age.

D. Cleaning up data visualization to remove unwanted patterns.


4. An ornithologist is interested in learning more about the different kinds of birds living in different
areas of the state he lives in. The ornithologist creates an app that allows residents of the town to
photograph birds in their area using a smartphone and record date, time, and location of the
photograph. Afterwards the ornithologist will analyze the data to try to determine where different
kinds of birds living in the state.

Which of the following does this situation best demonstrate?

A. Crowd Sourcing

B. Crowd funding

C. Citizen Science

D. Open Data

5. A local health department decides to publicize data it has collected about the spread of Covid-19
around the city. The data is freely available for all to use and analyze in the hopes that it is possible to
identify more efficient strategies to avoid the spread of the virus.

Which of the following does this situation best demonstrate?

A. Open Data

B. Citizen Science

C. Crowd funding

D. Machine Data

6. A videographer stores videos on his laptop. In this case the videos are considered the data. Each
video includes metadata such as: -Date: The date the video was shot. -Time: The time the video was
shot. -Location: The location the video was shot. -Device: The camera the video was recorded with.
Filtering the data to analyze specific portions of the metadata would be considered what?

A. Machine Data

B. Data Filtering

C. Crowd funding

D. Crowd Sourcing

7. Data that showed Individuals who smoked 5 packs of cigarettes a week all developed lung cancer
was an example of what?

A. Machine Data

B. Correlation

C. Open Data

D. Citizen Science
8. Providing users to read-only access to data is an example of

A. Security

B. Privacy

C. Encryption

D. Filtering

9. Which data compression technique comes at the expense of losing data?

A. Classification

B. Filtering

C. Lossless

D. Lossy

10. Information about the location of a photograph within the data of a picture is

A. Content

B. Open Data

C. Metadata

D. Maxdata

11. The ability to add or remove resources to store large data sets is called

A. Filtering

B. Metadata

C. Scalability

D. Routing

12. This process ensures that incomplete data does not hid or skew results, it repairs bad or
incomplete data. What is this process called?

A. Scalability

B. Cleaning Data

C. Filtering

D. Encryption
13. Why is it important to analyze big data?

A. It helps humans to identify patterns that humans cannot see or consistently discover naturally

B. It verifies existing issues and solutions within the internet

C. It increases the speed and protection of internet access.

D. It increases redundancy, liability, and scalability

14. This compression technique requires no data to be lost and ensures that the original image can be
restored.

A. Data Storage

B. Lossless

C. Lossy

D. Ciphering

15. Large data sets can be defined by grouping data with common features and values based on
criteria provided by the data analysts. This process is called

A. Cleaning

B. Patterns

C. Classifying

D. Filtering

You might also like