0% found this document useful (0 votes)
110 views3 pages

Digital Fluency Module 1

Artificial intelligence is when software can perform complex tasks without human assistance. It involves fields like machine learning, deep learning, neural networks, computer vision and natural language processing. Neural networks are a type of machine learning where a computer learns tasks by analyzing examples. Cybersecurity protects computer systems from unauthorized access or harm using technologies, policies and procedures. The advantages of AI include completing repetitive tasks without errors, working continuously, and fast computations with precise results.

Uploaded by

vinay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views3 pages

Digital Fluency Module 1

Artificial intelligence is when software can perform complex tasks without human assistance. It involves fields like machine learning, deep learning, neural networks, computer vision and natural language processing. Neural networks are a type of machine learning where a computer learns tasks by analyzing examples. Cybersecurity protects computer systems from unauthorized access or harm using technologies, policies and procedures. The advantages of AI include completing repetitive tasks without errors, working continuously, and fast computations with precise results.

Uploaded by

vinay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Module-1

● What is Artificial Intelligence?


Artificial Intelligence is when a software or a particular model developed can
perform complex tasks on its own without requiring any assistance from
humans. Artificial Intelligence is a field of study consisting of various
sub-fields, including machine learning, deep learning, neural networks,
computer vision, natural language processing, and so much more.

● What are neural networks?


Neural Networks is the old name for Deep learning.
Neural networks are a means of doing machine learning, in which a computer
learns to perform some task by analyzing training examples. Usually, the
examples have been hand-labeled in advance. An object recognition system,
for instance, might be fed thousands of labeled images of cars, houses,
coffeecups, and so on, and it would find visual patterns in the images that
consistently correlate with particular labels.

● What is Cyber Security?


Cybersecurity refers to the specialization of computer network security
that consists of technologies, policies, and procedures that protect
networked computer systems from unauthorized use or harm.

● What are the advantages of AI?


• Apart from the massive job opportunities created by AI, it also has other
advantages, such as the completion of looping or repetitive tasks that
humans need to perform without making errors.
• Artificial Intelligence, similar to a computer program, cannot tire and hence
has the capacity to work all day long on a particular task until the desired
results are accomplished.
• They have the ability to perform faster computations compared to human
speed on a wide range of problems with precise results. They also have tons
of real-life applications to make our daily lives simpler.

● What is a Cyber Attack?


An offensive action by a malicious actor that is intended to undermine
the functions of networked computers and their related resources, including
unauthorized access, unapproved changes, and malicious destruction.
Examples of cyber attacks include Distributed Denial of Service (DDoS) and
Man- in-the-Middle (MITM) attacks.
● What are the differences among the terms cyber attack, cyber threat &
cyber risk?
The terms cyber attack, cyber threat, and cyber risk are interrelated as
follows. A cyber attack is an offensive action, whereas a cyber threat is the
possibility that a particular attack may occur, and the cyber risk associated
with the subject threat estimates the probability of potential losses that may
result.
For example, a Distributed Denial of Service (DDoS) cyber attack by a botnet
is a cyber threat for many enterprises with online retail websites, where the
associated cyber risk is a function of lost revenues due to website downtime
and the probability that a DDoS cyber attack will occur.

● What is malware?
Malware is an umbrella term derived from "malicious software", and
refers to any software that is intrusive (unauthorized access), disruptive, or
destructive to computer systems and networks. Malware may take many
forms (executable code, data files) and includes, but is not limited to,
computer viruses, worms, trojan horses (trojans), bots (botnets), spyware
(system monitors, adware, tracking cookies), rogueware (scareware,
ransomware), and other malicious programs. The majority of active malware
threats are usually worms or trojans rather than viruses.

● What is data science?


Data science is an interdisciplinary field that uses scientific methods,
processes, algorithms and systems to extract knowledge and insights from
noisy, structured and unstructured data, and apply knowledge and
actionable insights from data across a broad range of application domains.

● What is the need for Data Science?


The reason why we need data science is the ability to process and interpret
data. This enables companies to make informed decisions around growth,
optimization, and performance. Demand for skilled data scientists is on the
rise now and in the next decade.

● What is cyberspace?
Cyberspace is the virtual environment that consists of computer
systems and networks, where all computers communicate via networks and
all networks are connected. The term originated in science fiction during the
1980s and became popular during the 1990s. More recently computer vendors
are attempting to brand cyberspace as the "Internet of Things" (IoT).

● What is a firewall?
A firewall is a network security system that monitors incoming and
outgoing network message traffic and prevents the transmission of malicious
messages based on an updatable rule set. In effect, a firewall establishes a
barrier between a trusted, secure internal network and external networks
(e.g., the Internet) that are assumed to be untrustworthy and non-secure.
Firewalls can be implemented assoftware that runs on general-purpose
hardware (e.g., an open source firewall on a Windows PC or Mac OS X
computer) or a dedicated hardware device (appliance).

● What is anti-virus software?


Anti-virus software, also known as, anti-malware software, is computer
software used to scan files to identify and eliminate malicious software
(malware). Although anti-virus software was originally developed to detect
and remove computer viruses (hence its name), it has been broadened in
scope to detect other malware, such as worms, Trojan horses, adware,
spyware, ransom-ware, etc.

● What is the relation between cybersecurity and cryptography?


Cyber security defenses are typically based on strong authentication
and encryption techniques(cryptography techniques), cryptography is a key
enabling technology for cybersecurity. In other words, cryptography helps to
implement cyber security.

You might also like