12.5: Chapter 8
( \newcommand{\kernel}{\mathrm{null}\,}\)
Chapter Review
1.
a. To ensure individuals are aware of the potential risks and benefits of the research
2.
d. Data scientists
3.
c. Ensuring secure storage and access protocols
4.
d. All of the above
5.
a. Have strong data security policies and protocols in place
6.
d. All of the above
7.
d. Quantitative, qualitative, tabular, text-based, and audio-based data
8.
c. Anyone who is directly involved in the project and has a legitimate need for the data
9.
c. Legal and compliance teams
10.
a. To increase the accuracy of the model by avoiding bias
11.
b. Dataset 2, the results of an extensive survey of people from various backgrounds and demographic segments who may or may not be familiar with the new social media platform
12.
b. Data points that are rare or abnormal in comparison to the rest of the data
13.
a. To ensure models are not overfitting
14.
a. Name, address, and email address
15.
a. When the individual has given consent for anonymization
16.
d. All of the above
17.
d. Any person who will use the data
18.
a. Data attribution
19.
c. Ensuring accessibility and inclusivity
20.
c. Graph C