a. Why does Namira need to process data to make it information? Briefly explain with an example. b. Which information collection method will be the best suited for Namira and why? Which information collection method should she avoid to be safe from personal bias? Briefly differentiate between them. c. Which possible malware could attack Namira’s device? Differentiate it with any two other types of malware.
Namira is a young researcher, who’s recently conducting a study on the impact of the pandemic on mental health. For this study, Namira will need a huge amount of data that needs to be processed and she also does not want the information to be influenced by personal bias. Namira’s co-researcher suggested that she should collect information through an information collection method that will collect information on this specific topic from interested people to make her work easier. Namira took her co-researcher’s advice and successfully collected and stored the information in her device to start her research work. As the research was regarding people’s mental health, the collected information was sensitive and highly confidential. One day, Namira received an email from her co-researcher with an email attachment. Upon asking her co-researcher, Namira got to know that her co-researcher never sent any sort of email, it could be a malware-infected email attachment from someone disguised as a person Namira trusts which could infect Namira’s device without her permission and steal all the sensitive information she had to cause harm.
a. Why does Namira need to process data to make it information? Briefly explain with an example.
b. Which information collection method will be the best suited for Namira and why? Which information collection method should she avoid to be safe from personal bias? Briefly differentiate between them.
c. Which possible malware could attack Namira’s device? Differentiate it with any two other types of malware.
Step by step
Solved in 3 steps