Digital Fluency Last Min Reference

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

Artificial Intelligence, Machine Learning, Deep Learning

1. What is artificial Intelligence? Give Some Examples.

Ans. It is the branch of Computer Science, by which we can create an intelligent


machine which can behave like a human, think like human and able to make decisions.

“In simple, AI is concerned with the design of Intelligence in artificial devices, so


building, intelligence into manmade systems is known as AI”

“Man Made thinking Power”

Ex: Manufacturing robots, Self-driving cars, Smart assistants, Proactive


healthcare management, Disease mapping, automated financial investing, Virtual
travel booking agent, Social media monitoring.

2. What is Machine learning? Give some real time example.

Ans. Machine learning is a branch of artificial intelligence (AI) and computer science
which focuses on the use of data and algorithms to imitate the way that humans learn,
gradually improving its accuracy.

Machine learning (ML) is a type of artificial intelligence (AI) that allows software
applications to become more accurate at predicting outcomes without being
explicitly programmed to do so. Machine learning algorithms use historical data as
input to predict new output values.

Ex: Image Recognition, Speech recognition, Medical diagnosis, statistical


Arbitrage, Google Maps

3. Define Deep Learning? Give some Examples

Ans. Deep learning is a machine learning technique that teaches computers to do what
comes naturally to humans: learn by example. Deep learning is a key technology behind
driverless cars, enabling them to recognize a stop sign, or to distinguish a pedestrian
from a lamppost.
 Ex: Virtual assistants, Translations, Vision for driverless delivery trucks,
drones and autonomous cars, Chatbots and service bots, Image colorization, Facial
recognition, Medicine and pharmaceuticals, Personalized shopping and
entertainment.

4. Write Abbreviation of AI, ML, DL?

5. Define supervised machine learning with Example.


Ans. In this type of machine learning, data scientists supply algorithms with labeled
training data and define the variables they want the algorithm to assess for correlations.
Both the input and the output of the algorithm is specified.

EX: classification, categorical, Regression.

6. What is Unsupervised Machine Learning? Give Example.

Ans. This type of machine learning involves algorithms that train on unlabeled data.
The algorithm scans through data sets looking for any meaningful connection. The data
that algorithms train on as well as the predictions or recommendations they output are
predetermined.

Unsupervised learning, also known as unsupervised machine learning, uses machine


learning algorithms to analyze and cluster unlabeled datasets. These algorithms discover
hidden patterns or data groupings without the need for human intervention.

Ex. Customer segmentation or understanding different customer groups around


which to build marketing or other business strategies.

7. Define Reinforcement Learning with some Examples.

Ans. Reinforcement learning is a machine learning training method based on rewarding


desired behaviors and/or punishing undesired ones.
In general, a reinforcement learning agent is able to perceive and interpret its
environment, take actions and learn through trial and error. Ex. parking can be
achieved by learning automatic parking policies.

8. Write Some Advantage and Disadvantages of AI.

Ans. Advantages of AI.

1. Reduction of Human Error.

2. Zero Risk

3.24/7 Availability

4. Digital Assistance

5. New Inventions

6. Unbiased Decisions

Disadvantage of AI

1. High cost

2. No creativity

3. Increase in Unemployment

4. Make Humans Lazy

5. No ethics.
Database Management for Data Science, Big Data Analytics

1. Define Data? Give some Examples

Ans. factual information (such as measurements or statistics) used as a basis for


reasoning, discussion, or calculation

In simple, Data is defined as facts or figures, or information that's stored in or used by a


computer.

The main examples of data are weights, prices, costs, numbers of items sold, employee
names, product names, addresses, tax codes, registration marks etc.

2. Define Database? Give some Examples

Ans. A database is an organized collection of structured information, or data, typically


stored electronically in a computer system. A database is usually controlled by a
database management system (DBMS).
In simple words, A database is an organized collection of data, so that it can be easily
accessed and managed. You can organize data into tables, rows, columns, and index it
to make it easier to find relevant information.

A collection of files storing related data.

Ex: Accounts database, payroll database, student database, amazon’s products database,
Airline Reservation database.

3. Write the types of Database.

Ans. 1. Rational Database.

2. No SQL (Structured Query Language) Database.

4. Write uses of database?

Ans. Uses for database systems include:

 They store data and provide facilities (tools) to search for specific records in a
given set of data.
 They store special information used to manage the data. This information is
called metadata and it is not shown to all the people looking at the data.
 They can solve cases where many users want to access (and possibly change) the
same entries of data.
 They manage access rights (who is allowed to see the data, who can change it)
 When there are many users asking questions to the database, the questions must
be answered faster. In this way, the last person to ask a question can get an answer in a
reasonable time.
 Certain attributes are more important than others and can be used to find other
data. This is called indexing. An index contains all the important data and can be used
to find other data.
 They ensure that the data always has context. There are a lot of different rules
that can be added to tell the database system if the data makes sense. One of the rules
might say November has 30 days. This means if someone wants to enter November
31 as a date, this change will be rejected.
5. What is data science useful for?

Ans. Data science is a process that empowers better business decision-making


through interpreting, modeling, and deployment. This helps in visualizing data that
is understandable for business stakeholders to build future roadmaps and trajectories.

6. How face book uses data analytics to understand your posts and recognizes
your face?

Ans. Face book uses a DL application called Deep Face to teach it to recognize people
in photos. It says that its most advanced image recognition tool is more successful than
humans in recognizing whether two different images are of the same person or not –
with Deep Face scoring a 97% success rate compared to humans with 96%.
Internet of Things (IOT) and Industrial Internet of Things (IIOT)

1. What is IOT? Give some Examples of IOT?

Ans.

The Internet of Things (IoT) describes the network of physical objects—“things”—that


are embedded with sensors, software, and other technologies for the purpose of
connecting and exchanging data with other devices and systems over the internet.

For example, the Ring doorbell camera security system allows users to see, hear,
and speak to visitors at their door via a computer, tablet, or mobile phone.
2. Write 4 stages of IOT Architecture?

Ans.

STAGE 1: Sensors and actuators.

STAGE2: Internet gateways and Data Acquisition Systems.

STAGE 3: Edge IT Data Processing.

STAGE 4: Datacenter and cloud.


3. Write some Difference between IOT and IIOT?

Ans.

S.No IIOT IOT


1 It focuses on industrial It focuses on general
applications such as applications ranging from
manufacturing, power plants, oil wearables to robots &
& gas, etc. machines.
2 It uses critical equipment & Its implementation starts
devices connected over a with small scale level so
network which will cause a life- there is no need to worry
threatening or other emergency about life-threatening
situations on failure therefore situations.
uses more sensitive and precise
sensors.
3 It deals with large scale It deals with small scale
networks. networks.
4 It can be programmed remotely It offers easy off-site
i.e., offers remote on-site programming.
programming.
5 It handles data ranging from It handles very high
medium to high. volume of data.
6 It requires robust security to It requires identity and
protect the data. privacy.
7 It needs stringent requirements. It needs moderate
requirements.
8 It having very long life cycle. It having short product life
cycle.
9 It has high- reliability. It is less reliable.

4. Write the fullform of IOT and IIOT?

Ans. IOT – Internet of things.

IIOT – Industrial Internet of Things.


5. Which language is used for IOT?

Ans. C or C++

6. Write some examples of IOT in Banking?

Ans.

Ex: in todays world all the transactions happens through IOT devices which get
connected with network each other to fulfil day to day needs.

1.Gpay. 2.Point of Sales(POS) Machine. 3.Bar code scanners etc.

7. Write some applications of IOT used in day 2 day life.

 Home Automation. Home automation is one of the best examples of IoT.


 Wearable Health Monitors. Wearable health monitors are both captivating and
useful.
 Disaster Management.
 Biometric Security Systems.
 Smart Cars.
 Process Automation.
 Farming.
 Shopping Malls.
Cloud Computing and its Service Models

1. What is cloud computing?

Ans. Cloud computing is the delivery of on-demand computing services -- from


applications to storage and processing power -- typically over the internet and on a pay-
as-you-go basis.

2. Write some operations that we do using cloud computing?

Ans. 1.File Storage

2.Big Data analytics

3.Data backup and archiving

4.Disaster Recovery

5.Software testing and Development.

6.Communication

7.Social Network

8.Business Process.
3. How dose Cloud Computing Works?

Ans. It uses a software, middleware, to ensure seamless connectivity between


devices/computers linked via cloud computing. Cloud computing service providers
usually maintain multiple copies of the data to mitigate instances of security threats,
data loss, data breach, etc.

4. Write the types of Cloud Services Models?

Ans. Cloud Services Models is classified into 3 catogories they are:-

1IaaS(Infrastructure as a Services)

2.PaaS(Platform as a Services)

3.Saas(Software as a Services)
5. Write differences between IaaS, PaaS and SaaS?

IaaS Paas SaaS

It provides a virtual data center It provides virtual platforms and It provides web software and apps to
to store information and create tools to create, test, and deploy complete business tasks.
platforms for app apps.
development, testing, and
deployment.

It provides access to resources It provides runtime It provides software as a service to


such as virtual machines, environments and deployment the end-users.
virtual storage, etc. tools for applications.

It is used by network It is used by developers. It is used by end users.


architects.

IaaS provides only PaaS provides SaaS provides


Infrastructure. Infrastructure+Platform. Infrastructure+Platform +Software.

6. Write types of Cloud?

Ans. Types of Cloud


1. Public cloud
2. Private cloud
3. Hybrid cloud
4. Community cloud
7. Define Public cloud and Private Cloud.

Ans. The public cloud is defined as computing services offered by third-party


providers over the public Internet, making them available to anyone who wants to
use or purchase them. They may be free or sold on-demand, allowing customers to
pay only per usage for the CPU cycles, storage or bandwidth they consume.

Private clouds are distributed systems that work on private infrastructure and provide
the users with dynamic provisioning of computing resources. Instead of a pay-as-you-
go model in private clouds, there could be other schemes that manage the usage of the
cloud and proportionally billing of the different departments or sections of an
enterprise.
8. Define Hybrid Cloud and Community Cloud.

Ans. A hybrid cloud is a heterogeneous distributed system formed by combining


facilities of public cloud and private cloud.

Community clouds are distributed systems created by integrating the services of


different clouds to address the specific needs of an industry, a community, or a business
sector.

In the community cloud, the infrastructure is shared between organizations that have
shared concerns or tasks. The cloud may be managed by an organization or a third
party.
9. Write some differences between Public cloud, Private cloud, Hybrid cloud
and Community cloud?
Ans.

10. How do vendor charge for Cloud services?

Ans. The key cost factors which decide cloud hosting prices are storage, networking
and computing. ... So, the vendor will consider the total virtual memory or RAM
used in public clouds and divides this into costs for every rack unit of the hardware.
Costs will include licensing fees depending on the OS you use.

11. What are the benefits of Cloud computing?

Ans. Cost Savings

Cost saving is one of the biggest Cloud Computing benefits. It helps you to save
substantial capital cost as it does not need any physical hardware investments. Also, you
do not need trained personnel to maintain the hardware. The buying and managing of
equipment is done by the cloud service provider.
Strategic edge

Cloud computing offers a competitive edge over your competitors. It is one of the best
advantages of Cloud services that helps you to access the latest applications any time
without spending your time and money on installations.

High Speed

Cloud computing allows you to deploy your service quickly in fewer clicks. This faster
deployment allows you to get the resources required for your system within fewer
minutes.

Back-up and restore data

Once the data is stored in a Cloud, it is easier to get the back-up and recovery of that,
which is otherwise very time taking process on-premise.

Automatic Software Integration

In the cloud, software integration is something that occurs automatically. Therefore,


you don’t need to take additional efforts to customize and integrate your applications as
per your preferences.

Reliability

Reliability is one of the biggest benefits of Cloud hosting. You can always get instantly
updated about the changes.

Mobility

Employees who are working on the premises or at the remote locations can easily
access all the could services. All they need is an Internet connectivity.
Unlimited storage capacity

The cloud offers almost limitless storage capacity. At any time you can quickly expand
your storage capacity with very nominal monthly fees.

Collaboration

The cloud computing platform helps employees who are located in different
geographies to collaborate in a highly convenient and secure manner.

Quick Deployment

Last but not least, cloud computing gives you the advantage of rapid deployment. So,
when you decide to use the cloud, your entire system can be fully functional in very few
minutes. Although, the amount of time taken depends on what kind of technologies are
used in your business.

12. How does Cloud storage work?

Ans. Cloud storage works by using at least one data server connected to the Internet.
When a user sends files over the Internet to the data server, the cloud storage saves a
copy. When the user wants to retrieve this information, they access the data server
through a web-based interface.
Cyber Security and types of Cyber Attacks

1. What is Cyber Security?

Ans. Cyber security is the practice of protecting systems, networks, and


programs from digital attacks.

These cyber attacks are usually aimed at accessing, changing, or destroying


sensitive information; extorting money from users; or interrupting normal
business processes.

Or

Cyber security consists of technologies, processes and controls designed to


protect systems, networks, Programs, devices and data from cyber attacks

2. Write the types of cyber security?

Ans. Types of cyber security are as below.

1.Network security.

2.Information security.

3.Application Security.

4.Cloud security.

5.IOT security.

6.Mobile security.

Network security:- Network security is the process of taking precautionary


measures to protect the devices from the devices from unauthorized access,
modification or destruction.

Threats: Data threat, insider threat, malware attack, password attack, social
engineering.

Ways to secure Network: Encryption, VPN, Multi factor authentication,


Intrusion prevention system, web filtering, network segmentation.
Information security: - it is also known as infosec is the process of securing
data from any kind of violations in the form of theft, abuse or loss.

It is based on three main aspects of data security, referred to as the CIA-


Namely, confidentiality, Integrity and availability.

Threats: botnets, phishing attacks, ransomware, virus and worms, distributed


denial or service attack.

Ways to secure information: create unique and strong passwords, delete


inactive accounts, keep changing your passwords regularly, avoid using free
wifi network, and avoid disclosing your personal information on social media.

Application security:- it is the process of increasing security of web and


mobile applications to protect the data from attackers.

Threats:- Brute force attack, malware, injection attacks, security


misconfiguration.

Ways to secure application:- Update your application frequently, encrypt,


conduct application security audit, keep back up of important data.

Cloud security:- it is defined as a set of policies and procedures that mainly


aims at protecting cloud-based applications and systems.

Threats: data breaches, misconfiguration and inadequate change control, lack


of cloud security architecture and strategy, account hijack, control plane,
metastructure failures.

Ways to secure cloud: educate your employees, data backup plan, encryption
is key, strong password, testing often should be your priority.

3. What is secure web gateway?

Ans. A secure web gateway is a cyber barrier or checkpoint that keeps


unauthorized traffic from entering an organization's network.
4. What is unified Threat Management?

Ans. It is an information security term that refers to a single security solution,


and usually a single security appliance, that provides multiple security
functions at a single point on the network.

5. Write a note on cyber Security attack?

Ans. A Cyber security attack is any form of malicious activity that targets IT
systems, or the people using them, to gain unauthorized access to the systems
and the data or information they contain. In most cases, the cyber-attackers are
criminals looking to exploit the attack for financial gain.

You might also like