Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Digital Fluency Notes Chapter Wise 2023

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Unit 1.

ARTIFICIAL INTELLIGENCE, MACHINE LEARNING, DEEP LEARNING


Two marks Questions.

1. Expand AI, ML, DL.


AI – Artificial Intelligence
ML – Machine Learning
DL – Deep Learning

2. What is AI?
Artificial Intelligence is composed of two words Artificial and Intelligence,
where Artificial defines "man-made," and intelligence defines "thinking power",
hence AI means "a man-made thinking power. "It is a branch of computer
science by which we can create intelligent machines which can behave like a
human, think like humans, and able to make decisions."
3. Write any 5 Examples of AI.
1.Typing using software
2.Shopping online
3.Chatbots
4.Chat GPT
5.Self driving cars

4. What is machine learning?


Machine learning (ML) is a type of artificial intelligence (AI) that allows
software applications to become more accurate at predicting outcomes without
being explicitly programmed to do so. Machine learning algorithms use
historical data as input to predict new output values.

5. Write the uses Machine Learning?


 Financial Services
 Government Agencies
 Healthcare
 Retail
 Oil and Gas

6. Why Artificial Intelligence?


Following are some main reasons to learn about AI:
 With the help of AI, you can create such software or devices which
can solve real-world problems very easily and with accuracy such as
health issues, marketing, traffic issues, etc.
 With the help of AI, you can create your personal virtual Assistant,
such as Cortana, Google Assistant, Siri, etc.
 With the help of AI, you can build such Robots which can work in an
environment where survival of humans can be at risk.

7. What is Deep Learning?


Deep learning is a subset of machine learning that's based on artificial
neural networks that
permits a machine to train itself to perform a task. The learning process is
deep because the structure of artificial neural networks consists of
multiple input, output, and hidden layers.

8. What are neural networks?


Neural Networks is the old name for Deep Learning. Neural networks are
a means of doing
machine learning, in which a computer learns to perform some tasks by
analysing training
examples.

9. What are the Machine Learning Methods?


• Supervised Learning
• Unsupervised Learning
• Semi-supervised Learning
• Reinforcement Learning
10. What are AI Trends in various sectors?
AI is increasingly being used by businesses in a wide range of sectors. AI
is helping businesses to monitor data, analyse trends, strategize policies
and help in decision making.
• Health care
• Finance
• Manufacturing
• Retail
• Entertainment
• Data security
• Automotive

Five Marks Questions

1. What are the Advantages of Artificial Intelligence?


 High Accuracy with less errors: AI machines or systems are prone to less
errors and high accuracy as it takes decisions as per pre-experience or
information.
 High-Speed: AI systems can be of very high-speed and fast-decision
making, because of that AI systems can beat a chess champion in the
Chess game.
 High reliability: AI machines are highly reliable and can perform the
same action multiple times with high accuracy.
 Digital Assistant: AI can be very useful to provide digital assistant to the
users such as AI technology is currently used by various E-commerce
websites to show the products as per customer requirement.

2. What are the Disadvantages of Artificial Intelligence?


 High Cost: The hardware and software requirement of AI is very costly as
it requires lots of maintenance to meet current world requirements.
 Can't think out of the box: Even we are making smarter machines with AI,
but still they cannot work out of the box, as the robot will only do that
work for which they are trained, or programmed.
 No feelings and emotions: AI machines can be an outstanding performer,
but still it does not have the feeling so it cannot make any kind of
emotional attachment with human, and may sometime be harmful for
users if the proper care is not taken.
 No Original Creativity: As humans are so creative and can imagine some
new ideas but still AI machines cannot beat this power of human
intelligence and cannot be creative and imaginative.

3. What are the Applications of Artificial Intelligence?


Robotics: Today, most of the industrial world is using robots to automate
repetitive tasks. We see
robots used to assemble cars, pack food items, paint vehicles and to even
serve as your personal
assistants/servants in homes. Artificial Intelligence or AI gives robots a
computer vision to navigate, sense and calculate their reaction Accordingly.
Real Time Translation: Most of us use Google translate to get text
translated from one language to another.
Digital Assistants (Virtual Companions) like Alexa and Siri are being used
in homes to converse and perform simple tasks.
Autonomous systems are defined as systems that are able to accomplish a
task, achieve a goal, or
interact with its surroundings with minimal to no human involvement.
Autonomous vehicles,
autonomous robots, autonomous warehouse and factory systems and
autonomous drones are
some examples of autonomous systems.
Gaming and Simulation is fast changing the ways in which we have been
traditionally doing things. Especially in the fields of training, marketing and
entertainment, Augmented Reality (AR) and Virtual Reality (VR) are two
technologies that are forging a revolution. Driving lessons, flight training,
shopping without actually visiting a physical store, special effects in movies
& shows, architectural walkthroughs, prototyping and school classes are
some of the areas of application of this technology.

4. How Machine learning works and why we need it?


 Machine learning is a method of data analysis that automates analytical
model building. It is a branch of artificial intelligence based on the idea
that systems can learn from data, identify patterns and make decisions
with minimal human intervention.
 Machine learning is a type of artificial intelligence that helps computers
―learn‖ without someone having to program them.
 The computers are programmed in a way that focuses on data that they
receive. This new data can then help the machine ―learn‖ what your
preferences are and adjust itself accordingly.
 For instance, when a video website suggests a movie you might like, it’s
likely learned your preferences based on your past choices.

5. Explain the different Machine Learning Methods.


Supervised Learning: Supervised learning is commonly used in
applications where historical data predicts likely future events. For example,
it can anticipate when credit card transactions are likely to be fraudulent or
which insurance customer is likely to file a claim.
Unsupervised Learning: Unsupervised learning works well on transactional
data. For example, it can identify segments of customers with similar
attributes who can then be treated similarly in marketing campaigns. Or it
can find the main attributes that separate customer segments from each other.
Semi-supervised Learning: Semi-supervised learning is useful when the
cost is too high to allow for a fully supervised process. Examples of this
include identifying a person's face on a web cam.
Reinforcement Learning: This is often used for robotics, gaming and
navigation. With reinforcement learning, the system discovers through trial
and error which actions yield the greatest rewards.

6. Explain the Applications of Machine Learning.


Financial Services: Banks and other businesses in the financial industry use
machine learning technology for two key Purposes: to identify important
insights in data, and prevent fraud. The insights can identify investment
opportunities, or help investors know when to trade. Data mining can also
identify clients with high-risk profiles, or use cyber-surveillance to pinpoint
warning signs of fraud.
Government Agencies: Government agencies such as public safety and
utilities have a particular need for machine learning since they have multiple
sources of data that can be mined for insights. Analysing sensor data, for
example, identifies ways to increase efficiency and save money. Machine
learning can also help detect fraud and minimize identity theft.
Healthcare: Machine learning is a fast-growing trend in the health care
industry, thanks to the advent of wearable devices and sensors that can use
data to assess a patient's health in real time. The technology can also help
medical experts analyze data to identify trends or red flags that may lead to
improved diagnoses and treatment.
Retail: Websites recommending items you might like based on previous
purchases are using machine learning to analyze your buying history.
Retailers rely on machine learning to capture data, analyze it and use it
Oil and Gas: Finding new energy sources. Analyzing minerals in the ground.
Predicting refinery sensor failure. Streamlining oil distribution to make it
more efficient and cost-effective. The number of machine learning use cases
for this industry is vast – and still expanding.

7. What are the advantages and dis advantages of deep learning?


Advantages of Deep learning are -
 Ability to generate new features from the limited available training
data sets.
 Can work on unsupervised learning techniques helps in generating
actionable and reliable task outcomes.
 It reduces the time required for feature engineering, one of the tasks
that requires major time in practicing machine learning.
 With continuous training, its architecture has become adaptive to
change and is able to work on diverse problems.
Disadvantages of Deep learning are –
 The complete training process relies on the continuous flow of the
data, which decreases the scope for improvement in the training
process.
 The cost of computational training significantly increases with an
increase in the number of datasets.
 Lack of transparency in fault revision. No intermediate steps to
provide the arguments for a certain fault. In order to resolve the issue,
a complete algorithm gets revised.
 Need for expensive resources, high-speed processing units and
powerful GPU’s for training the data sets.
Unit 2 BigData Analytics
Two Marks Questions

1. What is Big Data?


Big Data is a collection of data that is huge in volume, yet growing
exponentially with time. It is a data with so large size and complexity that
none of traditional data management tools can store it or process it
efficiently.
2. What is an Example of Big Data?
Social media .., like facebook, Instagram, Twitter, whatsapp,sharechat…..
3. What are the types of Big Data?
• Structured
• Unstructured
• Semi-structured
4. What is Big Data Analytics?
Big Data analytics is a process used to extract meaningful insights, such as
hidden patterns,
unknown correlations, market trends, and customer preferences.
5. What is data science?
Data science is an interdisciplinary field that uses scientific methods,
processes, algorithms and systems to extract knowledge and insights from
noisy, structured and unstructured data, and apply knowledge and actionable
insights from data across a broad range of application domains.

5 Marks Questions

1. Explain different types of Big Data Analytics?


➢ Descriptive Analytics
This summarizes past data into a form that people can easily read. This helps
in creating reports, like a company’s revenue, profit, sales, and so on. Also,
it helps in the tabulation of social media metrics.
➢ Diagnostic Analytics
This is done to understand what caused a problem in the first place.
Techniques like drill-down, data mining, and data recovery are all examples.
Organizations use diagnostic analytics because they provide an in-depth
insight into a particular problem.
➢ Predictive Analytics
This type of analytics looks into the historical and present data to make
predictions of the future. Predictive analytics uses data mining, AI, and
machine learning to analyze current data and make predictions about the
future. It works on predicting customer trends, market trends, and so on.
➢ Prescriptive Analytics
This type of analytics prescribes the solution to a particular problem.
Perspective analytics works with both descriptive and predictive analytics.
Most of the time, it relies on AI and machine learning.

2. What is Big Data Lifecycle? Explain


1. Data creation, ingestion, or capture: Whether you generate data from
data entry, acquire existing data from other sources, or receive signals
from devices, you get information somehow. This stage describes when
data values enter the firewalls of your system.
2. Data Processing: Data preparation typically includes integrating data
from multiple sources, validating data, and applying the transformation.
3. Data Analysis: However you analyze and interpret your data, this is
where the magic happens. Exploring and interpreting your data may
require a variety of analyses. This could mean statistical analysis and
visualization.
4. Data sharing or publication: This stage is where forecasts and insights
turn into decisions and direction.
5. Archiving: Once data has been collected, processed, analyzed, and
shared, it is typically stored for future reference.

3. Write the applications of big data analytics.


Applications of Big Data:
•Healthcare
•Media & Entertainment
•Traffic Optimization
•Real-time Analytics to Optimize Flight Route
•E-commerce Recommendation
•Big data applications in agriculture
Unit -
Internet of Things (IoT) and Industrial Internet of Things (IIoT)

2Marks Questions

1. Expand IoTand IIoT.


IoT - Internet of things IIoT – Industrial Internet of Things
2. What is Internet of things?
The Internet of Things (IoT) describes the network of physical objects—
―things‖—that are embedded with sensors, software, and other technologies for
the purpose of connecting and exchanging data with other devices and systems
over the internet.
3. Write any 4 examples of IoT.
Google Nest, smart parking, wearables, soil sensor.
4. Which is the first stage in every IoT architecture?
Sensors and actuators.
5. What is industrial IoT?
Industrial IoT (IIoT) refers to the application of IoT technology in industrial
settings, especially with respect to instrumentation and control of sensors and
devices that engage cloud technologies.

5Marks Questions
1. What are the advantages of IoT
• Improved productivity of staff and reduced human labor
• Efficient operation management
• Better use of resources and assets
• Cost-effective operation
• Improved work safety
• Thorough marketing and business development
• Improved customer service and retention
• Better business opportunities
• More trustworthy image of the company
2. Explain 4 stages of IOT Architecture.
The four stages of IoT Architecture are –
1. Sensors and actuators – Sensing layer for Data Gathering
2. Internet gateways and Data Acquisition Systems – Network layer for
Data Transmission
3. Edge IT - Data Analytics, pre-processing
4. Data center and cloud – Apps & services
 Sensors/Actuators: Sensors or Actuators are the devices that are able to
emit, accept and process data over the network. These sensors or actuators
may be connected either through wired or wireless. This contains GPS,
Electrochemical, Gyroscope, RFID, etc. Most of the sensors need
connectivity through sensors gateways. The connection of sensors or
actuators can be through a Local Area Network (LAN) or Personal Area
Network.
 Gateways and Data Acquisition: As the large numbers of data are
produced by this sensors and actuators need the high-speed Gateways and
Networks to transfer the data. This network can be of type Local Area
Network (LAN such as WiFi, Ethernet, etc.), Wide Area Network (WAN
such as GSM, 5G, etc.).
 Edge IT: Edge in the IoT Architecture is the hardware and software
gateways that analyze and pre-process the data before transferring it to the
cloud. If the data read from the sensors and gateways are not changed from
its previous reading value then it does not transfer over the cloud, this saves
the data used.
 Data center/ Cloud: The Data Centre or Cloud comes under the
Management Services which process the information through analytics,
management of device and security controls. Beside this security controls
and device management the cloud transfers the data to the end user’s
application such as Retail, Healthcare, Emergency, Environment, and Energy,
etc.

3. What are the difference of IoT and IIoT.


Sl IoT IIoT
No
It focuses on general applications It focuses on industrial applications
ranging from wearables to robots such as manufacturing, power plants,
& machines. oil & gas, etc.
Its implementation starts with It uses critical equipment & devices
small scale level so there is no connected over a network which will
need to worry about life- cause a life-threatening or other
threatening situations. emergency situation on failure
therefore uses more sensitive and
precise sensors.
It deals with small scale networks. It deals with large scale networks
It offers easy off-site It can be programmed remotely i.e.,
programming. offers remote on-site programming.
It handles very high volume of It handles data ranging from medium
data. to high.
It requires identity and privacy. It requires robust security to protect
the data
It needs moderate requirements. It needs stringent requirements.
It is having short product life It having very long-life cycle.
cycle.
It is less reliable. It has high- reliability.

4. What are the Benefits of IIoT.


• Increase efficiency : The biggest benefit of IIoT is that it gives manufacturers
the ability to automate, and therefore optimize their operating efficiency.
Robotics and automated machinery can work more efficiently and accurately,
boosting productivity and helping manufacturers streamline their functions.
• Reduce Errors Industrial IoT empowers manufacturers to digitize nearly
every part of their business. By reducing manual process and entries,
manufacturers are able to reduce the biggest risk associated with manual labor –
human error.
• Predictive Maintenance: Nothing negatively impacts a manufacturing
operation more than machine downtime. When maintenance in the
manufacturing world is reactive rather than proactive, manufacturers are stuck
trying to identify what the issue is, how it can be repaired, and what it will cost.
• Improve Safety: All of the data and sensors required of a fully functioning
IIoT manufacturing operation are also helping to bolster workplace safety.
―Smart manufacturing‖ is turning into ―smart security‖ when all of the IIoT
sensors work together to monitor workplace and employee safety.
• Reduce Costs: Knowledge is power, and the knowledge provided to
manufacturers via IIoT solutions is giving them the tools they need to reduce
costs and generate more revenue. Data-driven insights into operations,
production, marketing, sales, and more can steer businesses in a profitable
direction.
Unit - 4. Cloud computing and its service models

Marks Questions

1. What Is Cloud Computing?


Cloud computing is the delivery of different services through the Internet. These
resources include tools and applications like data storage, servers, databases,
networking, and software.
2. Expand IaaS, PaaS, SaaS.
IaaS - Infrastructure as a service
PaaS - Platform as a Service
SaaS - Software as a Service
3. What is IaaS (Infrastructure as a service)?
IaaS is also known as Hardware as a Service (HaaS). It is a computing
infrastructure managed over the internet. The main advantage of using IaaS is
that it helps users to avoid the cost and complexity of purchasing and managing
the physical servers.
4. What is PaaS (Platform as a Service)?
PaaS cloud computing platform is created for the programmer to develop, test,
run, and manage the applications.
5. What is Saas (Software as a Service)?
SaaS is also known as "on-demand software". It is software in which the
applications are hosted by a cloud service provider. Users can access these
applications with the help of internet connection and web browser.
6. Name the types of clouds.
Private cloud, public cloud, hybrid cloud and community cloud.
7. Which is Cloud Platform by Amazon?
Amazon Web Services (AWS)
8. Who is the father of cloud computing?
In 1960s J.C.R. Licklider wanted to connect people and share data anytime from
anywhere, hence he invented Cloud Computing.

5Marks Questions
1) What are the Advantages of Cloud Computing?
Back-up and restore data
Once the data is stored in cloud, it is easier to get back-up and restore
that data using the cloud.
2. Improved collaboration
Cloud applications improve collaboration by allowing groups of people
to quickly and easily share information in the cloud via shared storage.
3. Excellent accessibility
Cloud allows us too quickly and easily store and access information
anytime, anywhere in the whole world, using an internet connection.
4. Low maintenance cost
Cloud computing reduces both hardware and software maintenance
costs for organizations.
5. Mobility
Cloud computing allows us to easily access all cloud data via any device.
Services in the pay-per-use model
Cloud computing offers Application Programming Interfaces (APIs) to the
users for access services on the cloud and pays the charges as per the
usage of service.
7. Unlimited storage capacity
Cloud offers a huge amount of storing capacity for storing important
data such as documents, images, audio, video, etc. in one place.
8. Data security
Cloud offers many advanced features related to security and ensures
that data is securely stored and handled.

Explain the different types of Clouds.


Private Cloud: Private cloud is also known as an internal cloud or corporate
cloud. It is used by organizations to build and manage their own data centers
internally or by the third party. It can be deployed using Open source tools such
as Open stack and Eucalyptus.

Public Cloud: Public cloud is open to all to store and access information via the
Internet using the pay-per-usage method. In public cloud, computing resources
are managed and operated by the Cloud Service Provider (CSP). Example:
Amazon elastic compute cloud (EC2), IBM Smart Cloud Enterprise, Microsoft,
Google App Engine, Windows Azure Services Platform.
Hybrid Cloud Hybrid Cloud is a combination of the public cloud and the
private cloud. We can say: Hybrid Cloud = Public Cloud + Private Cloud.
Hybrid cloud is partially secure because the services which are running on the
public cloud can be accessed by anyone, while the services which are running
on a private cloud can be accessed only by the organization's users. Example:
Google Application Suite (Gmail, Google Apps,).

Community Cloud: Community cloud allows systems and services to be


accessible by a group of several organizations to share the information between
the organization and a specific community. It is owned, managed, and operated
by one or more organizations in the community, a third party, or a combination
of them. Example: Health Care community cloud.
3) Write Difference between public cloud, private cloud, hybrid cloud, and
community cloud.

4) Write the difference between IaaS, PaaS, and SaaS


Unit – Cyber Security And Types Of Cyber Attack
Two marks Questions.

1. What is Cyber security?


Cyber security is the application of technologies, processes and controls to
protect systems, networks, programs, devices and data from cyber-attacks. It
aims to reduce the risk of cyber-attacks and protect against the unauthorized
exploitation of systems, networks and technologies.

2. What are the types of Cyber Security


1. Critical infrastructure security
2. Application security
3. Network security
4. Cloud security
5. Internet of things (IoT) security

3. What are the common types of cyber attacks?


Malware, Phishing, Man in the Middle attack, Denial of service attack,
Password attack.

5 Marks Questions

What are the tips to avoid Cyber Attacks?


1. Train employees in cyber security principles
2. Install, use and regularly update antivirus and anti-spyware software on every
computer
3. Use a firewall for Internet connection
4. Download and install software for operating systems and applications as they
become available
5. Make backup copies of important business data and information
6. Control physical access to your computers and network components
7. Secure the Wi-Fi network
8. Require individual user accounts for each employee
9. Limit employee access to data and information, and limit authority to install
software
. Regularly change passwords.
2. Explain the different types of cyber security.
1. Critical infrastructure security: Critical infrastructure security consists of
the cyber physical systems that modern societies rely on. Common examples of
critical infrastructure:
•electricity grid
•water purification
•traffic lights
•shopping centres
•hospitals
2. Application security: Applications are much more accessible over networks,
causing the adoption of security measures during the development phase to be
an imperative phase of the project.
Types of application security:
• Antivirus programs
• Firewalls
• Encryption programs.
3. Network security: As cyber security is concerned with outside threats,
network security guards against unauthorized intrusion of your internal
networks due to malicious intent. Network security ensures that internal
networks are secure by protecting the infrastructure and inhibiting access to it.
Common examples of network security implementation:
• Extra logins
• New passwords
• Application security
4. Cloud security: Improved cyber security is one of the main reasons why the
cloud is taking over. Cloud security is a software-based security tool that
protects and monitors the data in your cloud resources. Cloud providers are
constantly creating and implementing new security tools to help enterprise users
better secure their data.
5. Internet of things (IoT) security: IoT refers to a wide variety of critical and
non-critical cyber physical systems, like appliances, sensors, televisions, Wi-Fi
routers, printers, and security cameras. According to Bain & Company’s
prediction…
• The combined markets of IoT will grow to about $52 billion in 2 2 ;
• More than double the $235 billion spent in 2 7.

. Explain the common types of Cyber Attacks.


Common Types of Cyber Attacks
1. Malware: The term ―malware‖ encompasses various types of attacks
including spyware, viruses, and worms. Malware uses a vulnerability to
breach a network when a user clicks a ―planted‖ dangerous link or email
attachment, which is used to install malicious software inside the system.
Malware and malicious files inside a computer system can:
• Deny access to the critical components of the network
• Obtain information by retrieving data from the hard drive
• Disrupt the system or even rendering it inoperable
2. Phishing: Phishing attacks are extremely common and involve sending mass
amounts of fraudulent emails to unsuspecting users, disguised as coming from a
reliable source. The fraudulent emails often have the appearance of being legit,
but link the recipient to a malicious file or script designed to grant attackers
access to your device to control it or gather recon, install malicious scripts/files,
or to extract data such as user information, financial info, and more.
Man-in-the-Middle (MitM) Attacks : Occurs when an attacker intercepts a
two-party transaction, inserting themselves in the middle. From there, cyber
attackers can steal and manipulate data by interrupting traffic. This type of
attack usually exploits security vulnerabilities in a network, such as an
unsecured public WiFi, to insert themselves between a visitor’s device and the
network. The problem with this kind of attack is that it is very difficult to detect,
as the victim thinks the information is going to a legitimate destination.
Phishing or malware attacks are often leveraged to carry out a MitM attack.
Denial-of-Service (DOS) Attack: DOS attacks work by flooding systems,
servers, and/or networks with traffic to overload resources and bandwidth. This
result is rendering the system unable to process and fulfil legitimate requests. In
addition to denial-of-service (DoS) attacks, there are also distributed denial-of-
service (DDoS) attacks.
Password Attack : Passwords are the most widespread method of
authenticating access to a secure information system, making them an attractive
target for cyber attackers. By accessing a person’s password, an attacker can
gain entry to confidential or critical data and systems, including the ability to
manipulate and control said data/systems.

You might also like