Big Data Assignment 1
Big Data Assignment 1
[1] Why big data is important? What are the advantages of big data
[2] Write note on digital data
[3] What are various types of digital data?
[4] List any five Big Data platform.
[5] Discuss in detail the different forms of Big Data
[6] Detail about the three dimensions of Big Data
[7] Describe the drivers of big data
[8] What is big data? Write the characteristics of big data
[9] Explain the components of big data architecture.
[10] What is big data security? What are the steps of big data security?
[11] Write the applications of big data.
[12] What is big data privacy? Mention big data privacy concerns.
[13] Write note on big data and compliance.
[14] Explain the challenges of conventional systems.
[15] What is analysis and reporting? Differentiate between analysis and reporting.
[16] What are the modern tools for analytic processing
[17] Explain the Analytics process. What are the steps of analysis process?
[18] What is quantitative and qualitative data?
[19] What are big data security issues
[20] What is primary and secondary data?
[21] Write the ways of collecting the primary and secondary data.
•Distributed frameworks - Most big data implementations actually distribute huge processing
jobs across many systems for faster analysis. Distributed processing may mean less data
processed by any one system, but it means a lot more systems where security issues can crop up.
•Non-relational data stores - Think NoSQL databases, which by themselves usually lack
security.
•Storage - In big data architecture, the data is usually stored on multiple tiers, depending on
business needs for performance vs. cost. For instance, high-priority “hot” data will usually be
stored on flash media. So locking down storage will mean creating a tier-conscious strategy.
Access controls - It’s critically important to provide a system in which encrypted
authentication/validation verifies that users are who they say they are, and determine who can
see what.
Data provenance - primarily concerns metadata (data about data), which can be extremely
helpful in determining where data came from, who accessed it, or what was done with it.
•Privileged users engaged in this type of activity must be thoroughly vetted and closely
monitored to ensure they don’t become their own big data security issues.
such as –
•hidden patterns,
•unknown correlations,
•market trends,