Data Literary
Data Literary
• Defin e data litera cy and explain its importan ce with a real-world example
• Relate to the impa ct created by data literacy in everyday life
• Develop awareness about personal data, data privacy, and data security
Defining Data Literacy refers t o the ability to read, comprehend and use information
effectively.
Data + Literacy= Data Literacy Data literacy means knowing how to understand, work with,
and talks about data. It's ab out being able to collect, analyse, and show data in ways that
m ake sense.
Data literacy is essential because it enables individuals to make informed decisions, think
critica lly, solve problems , and inn ovat e.
I ll€'r..:t<V
I) s d It ( l 4j ( y I~ t I • , :I t 1' l C
l
r tt1'r rti.,. a d co 1 m11r i <1
How to become Data Literate?
Every data tells a story, but we must be careful before believing the story. Data Literate is a
person who can interact with data to understand the world around them.
• Filter the category as per the requirement - If the budget is low, select the price filter as low
to high
• Check the user ratings of the products
• Check for specific requirements in the product
, What is Data Pyramid:
• It's the data pyramid that is made up of different stages of working data.
• Let us understand different parts of Data pyramid ,Moving up from the bottom .
• Data is available in a raw form. Data in this form is not very useful.
• Data is processed to give us information about the world.
• Information about the world leads to knowledge of how things are happening.
• Wisdom allows us to understand why things are happening in a particular way.
1
~awl\ilaund
t ~llO'.', ei!~jt- i,,!om .,1ii't1 - t:-:::::::::~---~~·---
Q Ii\ , . . 10\ in! ,11111 1 1 11 1hdt t <i:!, 'O tJ dee:ier undw:c1.11dm1
.rm, 1\ ~ cn.tLal. i'\'-. nq ,.,. Bf er re~ data a'll 'll,1~.i ~wu1I u)11~i\1en1 de: "i:1•',
111 rl •,. ) I l ,.
Pv1,ir11id lor pldlll llll(l u PIUIIL us ..1 :stude nt dt~ef reu:,vmg tlie
I el 11 ·,d(, rHICd l ,,.3r t~·•. d rri pff., ('( CrPrt tinq rl 0,Jfd
·.. := ~~ ~- -- -- -- -- - -
r :c,JrO \' 1Hr..a. ,on, r h,
What _are Data Security and Privacy? How are they related to Al? Data Privacy and Data
Security are often used interchangeably but they are different from each other.
What is Data Privacy? Data privacy referred to as information privacy is concerned with the
proper handling of sensitive data including personal data and other confidential data, such as
certain financial data and intellectual property data, to meet regulatory requirements as well
as protecting the confidentiality and immutability of the data.
The following best practices can help you ensure data privacy: • Understanding what data,
you have collected, how it is handled, and where it is stored. • Necessary data required for a
project should only be collected. • User consent while data collection must be of utmost
importance.
What is Data Security? Data security is the practice of protecting digital information from
unauthorized access, corruption, or theft throughout its entire lifecycle. Why is it important?
Due to the rising amount of data in the cloud there is an increased risk of cyber threats. The
most appropriate step for such an amount of traffic being generated is how we control and
protect the transfer of sensitive or personal information at every known place. The most
th
possible reasons why data security is more important now are: • Cyber-attacks affect all e
people • The fast-technological changes will boom cyber attacks
Best Practices for Cyber Security Cybersecurity invol
ves prote cting computers,servers, mobile
devices, electronic systems, networks, and data from
harm ful attacks.
Do's
• Use strong, unique passwords with a mix of chara
cters for each account.
• Activate Two-Factor Auth entic ation (2FA) for adde
d security.
• Download softw are from trust ed sources and scan
files before opening.
• Prioritize websites with "http s://" for secure login
s.
• Keep your browser, OS, and antivirus updated regul
arly.
• Adjust social media privacy settings for limited visib
ility to close contacts.
• Always lock your screen when away.
• Connect only with trust ed individuals online.
• Use secure Wi-Fi netw orks .
• Report onlin e bully ing to a trust ed adult immediate
ly
Don' t 's
• Avoid sharing personal info like real name or phon
e number.
• Don' t send pictu res to strangers or post them on
social media.
• Don' t open emails or attac hme nts from unknown
sources.
• Ignore suspicious requests for personal info like bank
account details.
• Keep passwords and security questions private.
• Don' t copy copy right ed softw are with out permissio
n.
• Avoid cyber bully ing or using offensive language
online.
model for a self-
~-~ .. , . . . , .... ',-:.~,'! ~ e \\\rn t to collect data for making a CV
, ·' ~,'\•.'\ , .... \ L "':- ~,,\ \\
data
2 2 ..:g·-- 12r:2.:·.::-- ;---,22 . . s ::-:c .. eas ing the am oun t of data by adding copies o· ex:sting
• :,5:
=.::l,
\ '• -. . - _-: : ....I '-::: I c t • .__::: - -:,'-"-
1
e::. :-:e:-e doe s ;;o~ cha nge , but we get data on t~e :ma ge b',1 chang:ng
• y ... e ·-~ 2ge g\
: ·.:..:e .. e,...: :2 ...a'":le:e ...s .:ke cc .o:- and brig
htness
existing data Acquirin g Data - Sample Data
• N2""" :2:2 is acd ed bys :g.~tiy c:ianging the
Ge: ... er; tion
~::e",'s .,...
v . •... "'-•
cre" • •:ng
• 'era
or rec ord ing data using sensors
111 ..._ :: -... ,·,....,...
r;:;"' np.r:
1
... :::-::: ~ ... v b 1.. ~
__
,,,,,_ ,, ,,..
- ,,,,. ,.,. ~,, .. ,-.,,,,.,...
, r.,,,,,_
Textual DI
• The data is mentioned in th e text form, usually
in a paragraph.
llem of Expcndituro
Year
Salary Fuel and Transport Bonus I terest on Lo n TX s
Graphical DI
Bar Graphs: In a Bar Graph, data is represented using verflcal and horizontal bars.
Pie Charts: Pie Charts have the shape of a pie and each sli ~e of the pie represents the
portion of the entire pie allocated to each category. j
Line Graphs: A line graph is created by connecting variou~ data points. It shows the change
in quantity over time.
https:/ /www.youtube .com/watch ?v=N LCzpPRCc7U
• https://www.yo utube.com/wa tch ?v= _M8BnosAD78
Note: You may also use Ms Excel or Datawrapper (https: ( /www.datawrap per.de/) for the