0% found this document useful (0 votes)
20 views6 pages

Summative Data Management

The document consists of a series of questions and answers related to data management concepts, including types of data, data analytics, and data security. Key topics include the importance of structured and unstructured data, the role of metadata, and various data analysis methods. It also addresses ethical concerns and best practices in data management.

Uploaded by

Benjamin Fallet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views6 pages

Summative Data Management

The document consists of a series of questions and answers related to data management concepts, including types of data, data analytics, and data security. Key topics include the importance of structured and unstructured data, the role of metadata, and various data analysis methods. It also addresses ethical concerns and best practices in data management.

Uploaded by

Benjamin Fallet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1. What is the main purpose of Data Management?

a) To create random datasets


b) To ensure data accuracy, security, and accessibility
c) To increase the size of stored data
d) To remove duplicate data
Answer: b) To ensure data accuracy, security, and accessibility
2. Which of the following is an example of structured data?
a) A customer database table
b) A video file
c) A handwritten letter
d) A social media post
Answer: a) A customer database table
3. What is the term for “data about data”?
a) Metadata
b) Raw data
c) Semi-structured data
d) Big Data
Answer: a) Metadata
4. Which type of data does NOT have a predefined format?
a) Structured data
b) Semi-structured data
c) Unstructured data
d) Metadata
Answer: c) Unstructured data
5. What does SQL stand for?
a) System Query Language
b) Structured Query Language
c) Sequential Query Logic
d) Standard Query Link
Answer: b) Structured Query Language
6. Why is metadata useful?
a) It increases storage capacity
b) It speeds up internet connections
c) It helps organize and describe data
d) It converts structured data into unstructured data
Answer: c) It helps organize and describe data
7. Which best describes semi-structured data?
a) Data that has no organization
b) Data that combines structured and unstructured elements
c) Data that only exists in relational databases
d) Data that must be converted before storage
Answer: b) Data that combines structured and unstructured elements
8. Which of the following data types is typically stored in a relational database?
a) Social media comments
b) HTML files
c) Employee payroll records
d) Scanned images
Answer: c) Employee payroll records
9. How does unstructured data differ from structured data?
a) Unstructured data has a fixed format
b) Unstructured data is easier to search
c) Unstructured data lacks predefined organization
d) Unstructured data can only be stored in tables
Answer: c) Unstructured data lacks predefined organization
10. A hospital manages electronic health records of patients. What type of data is this?
a) Unstructured Data
b) Structured Data
c) Real-Time Data
d) Metadata
Answer: b) Structured Data
11. A retail store tracks sales transactions as they happen. What type of data is being processed?
a) Metadata
b) Big Data
c) Real-Time Data
d) Semi-Structured Data
Answer: c) Real-Time Data
12. Which data collection method is best for gathering customer preferences?
a) Case Studies
b) Surveys
c) Experiments
d) Observations
Answer: b) Surveys
13. A company wants to analyze customer feedback from online reviews. What type of data is this?
a) Structured Data
b) Semi-Structured Data
c) Unstructured Data
d) Real-Time Data
Answer: c) Unstructured Data
14. Which of the following best explains why data visualization is important?
a) It eliminates the need for raw data
b) It makes complex data easier to understand
c) It reduces data storage requirements
d) It prevents data corruption
Answer: b) It makes complex data easier to understand
15. A business wants to compare customer purchases across different regions. What type of data
analysis should they use?
a) Real-time analytics
b) Predictive analytics
c) Descriptive analytics
d) Metadata analysis
Answer: c) Descriptive analytics
16. What is the main difference between data validation and data verification?
a) Validation ensures data accuracy, while verification ensures data security
b) Validation checks data formats, while verification checks data accuracy
c) Validation prevents unauthorized access, while verification removes errors
d) Validation checks spelling errors, while verification checks data completeness
Answer: b) Validation checks data formats, while verification checks data accuracy
17. Which data type is most likely to require Natural Language Processing (NLP) for analysis?
a) Customer transaction records
b) Financial spreadsheets
c) Social media posts
d) Inventory reports
Answer: c) Social media posts
18. A company wants to protect customer data from cyber threats. Which of the following is the best
approach?
a) Using cloud storage only
b) Implementing encryption and access controls
c) Deleting all sensitive data
d) Avoiding data collection altogether
Answer: b) Implementing encryption and access controls
19. What is the biggest risk of poor data management in healthcare?
a) Increased storage costs
b) Loss of patient trust and incorrect treatments
c) Limited access to online medical journals
d) Slow internet speed in hospitals
Answer: b) Loss of patient trust and incorrect treatments
20. Which of the following is a key ethical concern in data management?
a) Increasing data storage capacity
b) Keeping all data indefinitely
c) Ensuring data privacy and consent
d) Using only structured data
Answer: c) Ensuring data privacy and consent
21. A company wants to predict future sales based on past trends. What type of analytics should they
use?
a) Descriptive analytics
b) Predictive analytics
c) Prescriptive analytics
d) Metadata analysis
Answer: b) Predictive analytics
22. You are designing a mobile application that tracks user activity. What is the best approach for
managing the collected data?
a) Store everything on the user’s device
b) Use a cloud-based database with proper security measures
c) Save all data in an Excel file
d) Do not collect any data
Answer: b) Use a cloud-based database with proper security measures
23. A researcher is designing a study on consumer preferences. What is the best method for collecting
accurate data?
a) Guessing based on previous research
b) Conducting structured surveys and interviews
c) Reading customer reviews only
d) Using random online opinions
Answer: b) Conducting structured surveys and interviews
24. A data analyst wants to identify patterns in customer purchase behavior. Which tool would be most
useful?
a) Word processor
b) Data visualization software (e.g., Power BI, Tableau)
c) Handwritten reports
d) Social media comments
Answer: b) Data visualization software (e.g., Power BI, Tableau)
25. You are tasked with designing a secure online data storage system. What is the most important
factor to consider?
a) The number of users accessing the data
b) The availability of unlimited storage
c) Strong encryption and user authentication
d) The speed of internet connectivity
Answer: c) Strong encryption and user authentication
26. A company collects customer purchase history to suggest personalized product
recommendations. What type of analytics is being used?
a) Descriptive analytics
b) Predictive analytics
c) Diagnostic analytics
d) Prescriptive analytics
Answer: b) Predictive analytics
27. A researcher wants to analyze text from customer feedback to determine common themes. Which
method is most appropriate?
a) Data encryption
b) Text mining
c) File compression
d) Data normalization
Answer: b) Text mining
28. Which type of database is best suited for handling highly interconnected data, such as social
networks?
a) Relational database
b) Graph database
c) Key-value store
d) Document database
Answer: b) Graph database
29. A business manager wants to visualize sales performance across different regions using an
interactive dashboard. What tool is best suited for this task?
a) PowerPoint
b) SQL Query Editor
c) Tableau
d) Notepad
Answer: c) Tableau
30. A company finds that customers who buy laptops often purchase accessories like mouse and
keyboard. Which type of data analysis is being used?
a) Market Basket Analysis
b) Real-Time Analytics
c) Sentiment Analysis
d) Time-Series Analysis
Answer: a) Market Basket Analysis
31. Why is data cleaning an important step in data management?
a) It ensures faster data entry
b) It improves the accuracy and reliability of data analysis
c) It reduces data storage costs
d) It eliminates the need for backups
Answer: b) It improves the accuracy and reliability of data analysis
32. A company's sales report shows a sudden drop in revenue. What type of analytics should be used
to determine the cause?
a) Descriptive analytics
b) Diagnostic analytics
c) Predictive analytics
d) Prescriptive analytics
Answer: b) Diagnostic analytics
33. Which of the following is a challenge in managing big data?
a) Limited data storage options
b) Ensuring data privacy and security
c) The inability to process structured data
d) The requirement to use paper-based storage
Answer: b) Ensuring data privacy and security
34. A marketing team wants to analyze customer engagement on different social media platforms.
What kind of data should they focus on?
a) Structured data
b) Semi-structured data
c) Unstructured data
d) Metadata
Answer: c) Unstructured data
35. What is the best reason for implementing role-based access control in a database?
a) To reduce server storage usage
b) To ensure that only authorized users can access certain data
c) To make all data publicly accessible
d) To allow users to delete any records freely
Answer: b) To ensure that only authorized users can access certain data
36. Why is real-time data processing essential for financial transactions?
a) It reduces the need for customer support
b) It ensures immediate fraud detection and faster transactions
c) It helps businesses generate more advertisements
d) It eliminates the need for data security measures
Answer: b) It ensures immediate fraud detection and faster transactions
37. A company is considering using cloud storage for data management. What is a major disadvantage
of cloud storage?
a) It requires physical storage space
b) It is more expensive than traditional storage
c) It depends on internet connectivity and security risks
d) It cannot store structured data
Answer: c) It depends on internet connectivity and security risks
38. Which of the following best describes ethical concerns related to artificial intelligence in data
management?
a) AI ensures unbiased decision-making
b) AI can sometimes reinforce biases in data sets
c) AI removes the need for human involvement
d) AI does not impact data privacy
Answer: b) AI can sometimes reinforce biases in data sets
39. You are designing a new data security policy for a company. What should be a top priority?
a) Reducing the number of employees who access data
b) Encrypting sensitive data and implementing access controls
c) Allowing employees full access to all data
d) Keeping only physical copies of records
Answer: b) Encrypting sensitive data and implementing access controls
40. A university wants to improve student engagement by using data analytics. Which of the following
is the best approach?
a) Analyzing attendance and performance trends to offer personalized learning
b) Increasing the number of classrooms
c) Reducing the amount of digital learning tools
d) Collecting student data without informing them
Answer: a) Analyzing attendance and performance trends to offer personalized learning

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy