0% found this document useful (0 votes)
104 views6 pages

417 AI Handbook Class9!74!79

Uploaded by

1131387
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views6 pages

417 AI Handbook Class9!74!79

Uploaded by

1131387
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Unit 2 - Data Literacy

Unit 2.1 - Basics of Data Literacy


Lesson Title: Basics of Data Literacy Approach: Session + Activity
Summary: In this module, students are familiarized with the concept of Data Literacy. Further, they
would be able to recognize the different categories of data and will be introduced to the culture of data
literacy.
Learning Objectives
● Define data literacy and explain its importance with a real-world example
● Relate to the impact created by data literacy in everyday life
● Develop awareness about personal data, data privacy, and data security
Learning Outcomes
● Define data literacy and recognize its importance
● Understand how data literacy enables informed decision-making and critical thinking
● Apply the Data Literacy Process Framework to analyze and interpret data effectively
● Differentiate between data privacy and security
● Identify potential risks associated with data breaches and unauthorized access.
● Learn measures to protect data privacy and enhance data security
Pre-requisites: Basic knowledge of AI and data

Key-concepts
● Understanding of data literacy
● Identify the difference between Quantitative (Numerical) and Qualitative (Categorical) Data
● Impact of data literacy with the help of case studies and scenarios
● Best practices for Cyber Security

2.1.1 Introduction to Data Literacy


Data literacy means knowing how to understand, work with, and talks about data. It's about being able
to collect, analyze, and show data in ways that make sense.
Reference Video: https://www.youtube.com/watch?v=yhO_t-c3yJY

74
Data Pyramid is made of different stages of working with data

Let us understand different parts of Data pyramid

Moving up from the bottom


● Data is available in a raw form. Data in this form is not very useful.
● Data is processed to give us information about the world.
● Information about the world leads to knowledge of how things are happening.
● Wisdom allows us to understand why things are happening in a particular way.

Let’s understand Data Pyramid with a simple Traffic Light example:

Rahul rated the 3 films he watched consecutively as bad, best and average respectively"
Can you filter the data from this statement? Are they of the same type?

75
2.1.2 Impact of Data Literacy
Activity: Impact of News Articles (Select any trending news)
Session Preparation Logistics: For a class of 40 Students [Pair Activity]
Materials Required:
ITEM QUANTITY
Online Data Sources Clues NA
Computers 20

How was the situation Key figures in the


Author of the Source Weblink to the Source
described by the Source source

You have to rank the sources of the news articles from most accurate to least, state reasons for your
choice.

Rank Data Source Remarks

So, we can conclude that every data tells a story, but we must be careful before believing the story
Data literacy is essential because it enables individuals to make informed decisions, think critically, solve
problems, and innovate.

76
2.1.3 How to become Data Literate?
Every data tells a story, but we must be careful before believing the story. Data Literate is a person who
can interact with data to understand the world around them.
Let’s understand it with following example:

Scenario: Buying a Video game online

Data literacy helps people research about products while shopping over the
internet
How do you decide the following things when we are shopping online?
● Which is the cheapest product available?
● Which product is liked by the users the most?
● Does a particular product meet all the requirements?

A data literate person can –


● Filter the category as per the requirement – If the budget is low, select the price filter as low to high
● Check the user ratings of the products
● Check for specific requirements in the product

Data Literacy Process Framework

The data literacy framework provides guidance on using data efficiently and with all levels of awareness.
Data literacy framework is an iterative process.

77
2.1.4 What are Data Security and Privacy? How are they related to
AI?
Data Privacy and Data Security are often used interchangeably but they are different from each other.

What is Data Privacy?


Data privacy referred to as information privacy is concerned with the proper handling of sensitive data
including personal data and other confidential data, such as certain financial data and intellectual
property data, to meet regulatory requirements as well as protecting the confidentiality and
immutability of the data.

Here are examples of two things which may compromise our data privacy

Why is it important?

78
The following best practices can help you ensure data privacy:
● Understanding what data, you have collected, how it is handled, and where it is stored.
● Necessary data required for a project should only be collected.
● User consent while data collection must be of utmost importance.

What is Data Security?


Data security is the practice of protecting digital information from
unauthorized access, corruption, or theft throughout its entire lifecycle.

Why is it important?

Due to the rising amount of data in the cloud there is an increased risk of
cyber threats. The most appropriate step for such an amount of traffic being generated is how we
control and protect the transfer of sensitive or personal information at every known place.
The most possible reasons why data security is more important now are:
• Cyber-attacks affect all the people
• The fast-technological changes will boom cyber attacks

2.1.5 Best Practices for Cyber Security


Cyber security involves protecting computers, servers, mobile devices,
electronic systems, networks, and data from harmful attacks.

Reference Links:
Video: https://www.youtube.com/watch?v=aO858HyFbKI

CBSE Manual on Cyber Security:


https://www.cbse.gov.in/cbsenew/documents/Cyber%20Safety.pdf

Do’s

• Use strong, unique passwords with a mix of characters for each account.
• Activate Two-Factor Authentication (2FA) for added security.
• Download software from trusted sources and scan files before opening.
• Prioritize websites with "https://" for secure logins.
• Keep your browser, OS, and antivirus updated regularly.
• Adjust social media privacy settings for limited visibility to close contacts.
• Always lock your screen when away.
• Connect only with trusted individuals online.
• Use secure Wi-Fi networks.
• Report online bullying to a trusted adult immediately.

79

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy