Big Data Assignment
Big Data Assignment
The Data Privacy Act of 2012 (DPA) was created to safeguard confidential info in both public
and private sector communications and data networks. Monitoring compliance is the duty of the
National Privacy Commission (NPC), which was established under the DPA. It addresses the
use of sensitive personal information as well as general confidential information, and its
fundamental tenet is that a data subject must directly consent before personal information
handling is permitted.
Big Data
Big Data is a mass of data that is enormous in amount and is always expanding tremendously.
No typical data management systems can effectively store or process this data because of its
magnitude and complexity. Big data is a type of data that is extremely large.
● Volume - This refers to how huge the amount of data is. This can be measured through
Gigabytes, Zettabytes, and Yotabytes
● Variety - This refers to types of data and which source it is coming from.
● Velocity - .This refers to how fast data comes in.
● Variability - This refers to the lack of consistency of data, which greatly affects the proper
handling of data.
● Value - This refers to how important the data obtained for a certain business or
organization is.
● Veracity - This refers to the correctness of data.
● Validity - This refers to how relevant the data is and if it matches the initial purpose of
why it is being obtained.
How much do I value my private information and what steps do I take to protect it?
I place a high emphasis on my privacy. I'm being as cautious as I can with what I share. I
always have a tendency to question the purpose of requests for too much information. I verify
the security of websites before entering them. I can tell a website is secure if its URL begins
with "https". To keep my computer's data secure, I also install some anti-virus software. In terms
of social media usage, I also prefer not to reveal too much. I'm in the habit of keeping my entire
name, address, phone number, and email private. Also, I avoid using any public wifi networks
because some hackers utilize them to access users' devices. Even when an email is from
someone I know, I do not readily click on links in emails. To find any discrepancies, I first verify
the sender's email address and each piece of material. I also make very secure passwords for
my government and social media accounts. It always has a mix of uppercase and lower case
letters, numbers, and special characters. In that way, it would be difficult for anybody who tried
to acquire access to guess or even memorize it.