0% found this document useful (0 votes)
82 views52 pages

Ai One Shot Revision Notes - Class 10

Uploaded by

anishvr714
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views52 pages

Ai One Shot Revision Notes - Class 10

Uploaded by

anishvr714
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

VELAMMAL NEXUS

ARTIFICIAL INTELLIGENCE NOTES


PART – A
UNIT 1 Communication Skill II

Communication & their types

Communication is the act of giving, receiving, and sharing information


-- in other words, talking or writing, and listening or reading. Good
communicators listen carefully, speak or write clearly, and respect
different opinions.

Types of Communication-:

Communication can be categorized into four basic types:

1. Verbal Communication
2. Non Verbal Communication
3. Visual Communication
4. Written Communication

1. Verbal Communication-:
Verbal communication is the use of sounds and words to express
yourself, especially in contrast to using gestures or mannerisms (non-
verbal communication). Example-: Orally communicating.

2. Non-verbal Communication-:
Nonverbal communication refers to gestures, facial expressions, tone
of voice, eye contact, (or lack thereof), body language, posture, and other
ways people can communicate without using language.

3. Visual Communication-:
Visual communication is the transmission of information and ideas using
symbols and imagery. Types of visual communication include animated
GIFs, screenshots, videos, pie charts, infographics, and slide deck
presentations. It also includes signs, graphic designs, films, typography,
and countless other examples

4. Written Communication-:
A 'Written Communication' means the sending of messages, orders or
instructions in writing through letters, circulars, manuals, reports,
telegrams, office memos, bulletins, etc. It is a formal method of
communication and is less flexible.

Communication Cycle
Communication is one of the most vital elements of society. People need
people, and to interact, it's essential they be able to convey messages and
understand each other. The communication cycle expresses how the
system of conveying and understanding messages operates.
Sender: the person or entity originating the
communication.
Message: the information that the sender
wishes to convey.
Encoding: how the sender chooses to bring
the message into a form appropriate
forsending.
Channel: the means by which the message is
sent.
Receiver: the person or entity to whom the
message is sent.
Decoding: how the receiver interprets and
understands the message.
Feedback: the receiver's response to the
message.

Feedback in Communication

Feedback in Communication
The observation of the receiver's response is called feedback.
Importance of feedback in communication-:
1. It completes the whole process of communication and makes it
continuous.
2. It sustains communication process.
3. It makes one know if one is really communication or making sense.
4. It is a basis for measuring the effectiveness of communication.
5. It is a good basis for planning on what next to be done especially
statistical report.
6. Communication will be useless without feedback.
7. Feedback paves way for new idea generation.
8. It is a process of effective listening.
9. It serves as basis of problem-solving.
10. Can motivate.
11. It can improve performance.

Types of Feedback-:

Feedback can be various form and of various types.


1. Formal and informal feedback
2. Descriptive and non-descriptive feedback
3. Specific and
nonspecific
EFFECTIVE COMMUNICATION
Introduction:
Effective communication is a two way communication process where
both parties have right and convenience to express their messages
opinions, facts and other information.

Principles of Effective Communication:


 Clarity:-
Message conveyed should be in easily understandable language.
 Attention:-
The receiver should be fully attentive in a communication process.
 Consistency:-
This principle implies that communication should always be consistent
with the planned objective of message being conveyed
 Adequacy:-
The information conveyed should be complete in all respects.
 Timelines:-
The message conveyed should be at the proper time.
 Feedback:-
The communication must have feedback confirmation from the recipient
whether themessages have been understood by the recipient
 Economy:-
The communication should take place in a way that costs optimally.

7Cs of Effective Communication


 Clear: While communicating one should be clear about what he / she say.
 Concise: Use simple words and say only what is needed.
 Concrete: Your arguments should be based on solid facts and opinions
from credible sources and you should share reliable data to support your stand.
 Correct: It’s essential that along with the factual information, the
language and grammar you use are correct.
 Coherent: Your words should make sense .Along with that it should
related with the main topic
 Complete: Your message should be complete .It should have all
the needed information
 Courteous: Be respectful , honest and friendly throughout your
communication
Barriers in communication
 Linguistic Barrier: Language at times can be a barrier to effective
communication
 Physical Barrier: If the surroundings do not support proper
communication, it can also act as a barrier to appropriate
interaction.
 Cultural Barrier: Cultural differences hinder us from communicating
properly.
 Interpersonal Barriers: It refers to the situations when the
intended message is received incorrectly due to many personal
reasons.
 Organizational Barriers: In an organization if there is no clarity
about the roles, structures, responsibilities, it will hinder effective
communication among the members of the organization.
Measures to Overcome Barriers of communication
 Overcoming Lingual Factors: To overcome this one need to prepare
appropriately. One should carefully think about the language needs of
the recipient.
 Overcoming Environmental Factors: Communicators should
ensure that the message is delivered in a distraction free
environment.
 Overcoming Barrier of Cultural Influence: Preparation to be made
keeping the culture of the people you are addressing.
 Overcoming Interpersonal Barriers of Communication:
 Overcoming Organizational Barriers of Communication
Sentences:
A group of words that makes complete sense is called a sentence. The
sentence mustcontain the subject and a predicate.

Kinds of Sentences:
There are four kinds of sentences:
1. Assertive or declarative sentence or Statement
2. Integrative sentence (a Question)
3. Imperative sentence (a Command)
4. Exclamatory sentence (an Exclamation)

Parts of a sentence-:
Every complete sentence contains two parts---
1. Subject
2. Predicate.
 Subject-:
A subject is a word or group up of words which conveys the name of the
person or think that we are asking about.
 Predicate-:
On the other hand, It is the part of the sentence which contains a verb, and
state something about the subject.

MCQ’s
Q1. Which of the following is NOT an element of communication
within the communication process cycle?
A) Channel
B) Receiver
C) Sender
D) Time

Q2. You need to apply for leave at work? Which method of


communication will you use?
A) e-mail
B) Poster
C) Newsletter
D) Blog

Q3 Which of the following is an example of oral communication?


A) Newspapers
B) Letters
C) Phone call
D) E-mail
Q4 Which of these are examples of negative feedback?
A) I hate to tell you this but your drawing skill is poor.
B) You can surely improve your drawing
C) These are good drawings but you can do better.
D) None of the above

Q5. What are the types of words we should use for verbal communication?
A) Acronyms
B) Simple
C) Technical
D) Jargons
Q6. Which of the following is an effective components of good feedback?
A) Detailed and time consuming
B) Indirect
C) Specific
D) Opinion-based

Q 7 Which of these are examples of positive feedback?


A) Excellent, your work has improved
B) I noticed your dedication towards the project.
C) You are always doing it the wrong way.
D) All of the above

Q8 Which of the following statement is true about communication?


A) 50% of our communication is non-verbal
B) 20% communication is done using body movements, face, arms, etc
C) 5% communication is done using voice, tone, pauses, etc.
D) 7% communication is done using words

Q9 Which of these is NOT an appropriate non-verbal communication at


work?
A) Keeping hands in pockets while talking
B) Talking at moderate speed
C) Sitting straight
D) Tilting head a bit to listen

Q10 Which of these is a positive (good) facial expression?


A) Frowning while concentrating
B) Maintaining eye contact
C) Smiling continuously
D) Rolling up your eyes
UNIT 2 S E L F M A N A N G E M E N T S K I L L S

Self-Management Skills
Self-management, which is also referred to as 'self-control' or 'self-
regulation', is the
ability to regulate one's emotions, thoughts, and behavior effectively
in different situations. This includes motivating oneself, and setting
and working towards personal and academic goals.
Domains of Self-Management Skills
i. Stress Management
ii. Self-Awareness – Strength and Weakness Analysis
iii. Self-Motivation
iv. Self-Regulation – Goal Setting
v. Self-Regulation – Time Management
Stress Management
We all face many ups and downs in life. Every individual has different
lifestyle and each lifestyle has its own responsibilities. Everyone has to
shoulder the responsibilities and face the challenge of life. This sometimes
creates a situation of stress when we are not able to handle the situation as
per our requirements or choice.
Stress
In our lives, when we encounter a situation that challenges us, our body
and mind react in certain way as a response. This response sometimes
helps us get past those events and come out as victors but sometimes this
response affects us adversely. This is called stress.
There can be two types of stress - good stress and bad stress.

Good Stress
Good stress helps us to go about our daily task and achieve those hard-
to-reach goals. This stress called eustress, helps us learn new things,
adapt to change an engage in creative thinking. Everyone experiences
good stress on a daily basis. Another form of good stress that enable us to
survive in times of trauma. This stress makes us aware of danger and
enables us to escape when we need to.

Bad Stress
Bad stress refers to a stress that is ongoing and does not lower down.
When one can’t stop worrying and is unable to do the required thing in
normal way, it is bad stress. Bad stress is overwhelming and prevent one’s
daily routines also. Bad stress is a negative form of stress and it hinders
your progress. It even affects body’s immune systems and causes
emotional distress too.

Stress Management Techniques


Most common and useful stress management techniques are –
 Physical Exercise
 Healthy Diet and Lifestyle
 Yoga
 Meditation
 Taking Breaks and Good Sleep
Tips for Students for Managing Stress
Students are one of the most common victims of stress. Practical
stress management can help students to deal with their stress level
and become more productive, competent and efficient. Here are a
few tips for managing stress –
 Manage time
 Do some exercise and get some air
 Stay positive
 Organize your academic life
 Stop postponing work or task
 Take one step at a time
 Spent time with friend
 Do something which you like

Independent Working
An independent worker usually means someone who does not need to be
led by anyone at every step. The people who work independently know that
they have to take initiative and act accordingly.
Important things about independent working are:
 Taking initiative rather than waiting to do so
 Take full responsibility of the work
 Ready to do unsupervised work, do not required constant
supervision.
 Learning to work at a pace that you can sustain
 Capable of completing the work within stipulated time and budget
and that too as per stated objectives and deliverables.

Advantage and Disadvantages of Independent Work

Advantage:
 You can work at your own pace not depending on someone else.
 You can concentrate easier and work easier.
 You get the whole credit for the work you do since you are working
alone.
 You get to make your own decisions.
Disadvantage:
 You have to motivate yourself.
 You are the sole person responsible for the job. If you fail, it is your
fault.
 You can get bored working all by yourself. There is no one to talk
to, share ideas with or get help from.
 When you are working alone, if you get sick or need to take
days off, the work will be delayed because there will no
anyone to continue it for you.

Characteristics for Independent Working


 Self – awareness
 Self – motivation
 Self – regulation
Self-Awareness
Self-awareness is the ability to see ourselves clearly and objectively through
reflection and introspection. If we are self-aware then we can identify our
strength and weaknesses. Self-awareness will help you in converting our
weakness into strength and strength into an exceptional talent.

Strength and Weakness Analysis


Understanding who we are, what we like or dislike, what are our beliefs,
what are our opinions, what is our background, what we do well and what
we do not do well are important. It will help us as then only we can
actually measure our strengths and weaknesses.

Techniques for Identifying Strengths and Weaknesses:


 Finding Strength (or abilities)
 Think of anything that you are always successful at.
 Think about what others like in you.
 Take out time and think about what you do well.
 Find what makes you happy and you do with perfection.
 Find what you enjoy doing and do it well.
 Finding Weaknesses
 Find those areas where you struggle and the things you find
difficult to do.
 Listen to the feedback given by others for you.
 Be open to feedback and accept your weaknesses without
feeling ashamed.
 Motivate yourself and note the area of improvement.
Types of Self – awareness
 Internal self-awareness is about focusing on your inner values.
The emotions, values, goals, aspirations, everything which we
posses in our inner feelings. Any self-aware person can introspect
the inner values. This makes them aware of their behaviours and
emotions. One can even manage their feeling and control them if
they are aware of what bother them.
 External self-awareness deals with our feelings and behaviours
with others. It is the ability to look at others. This awareness helps
you decide what others think about you. If you can judge whether
a person is happy with you or not, then you have better external
self-
awareness.

Self – Motivation
Self-motivation is the force inside us that drives us to do things. Self-
motivation is what forces us to achieve our goals, feel happy and improve
our quality of life. It is our ability to so the things that need to be done
without others or something influencing us. Self-motivation is our internal
drive to achieve, produce, develop, and keep moving forward. When we
think we are ready to quit something, or we just do not know how to start,
your self-motivation is what pushes on.
Types of Motivation:
 Intrinsic motivation: This is the force that leads us to achieve a
goal because of personal satisfaction or desire. Examples are:
- Setting up our own business.
- Participating in a competition.
 Extrinsic motivation: This is the driving force that drives us to
achieve your goal, such as:
- Money
- Prize
Self-Regulation (Goal Setting)
Self-regulation is concerned with how you control and manage yourself your
emotions, your inner resources, and abilities. It also includes your ability to
manage your impulses.

Goals Setting:
Goals are those dreams that you want to achieve in life but these dreams
have a deadline to get them, i.e. saving pocket money to buy a favourite
mobile phone by a particular date.
Goal setting is the process of planning and taking active step to achieve the
desired outcome. Setting goal is not enough, rather goals should so chosen
that it should be achievable.

SMART Goals:
SMART is an acronym used for goal setting. To make sure that the chosen
goals are clear and reachable, they should be SMART, i.e.
 Specific (simple and sensible)
 Measurable (meaningful)
 Achievable (attainable)
 Relevant (reasonable, realistic and resourced, result-based)
 Time bound (timely, time-sensitive)
Self – Regulation (Time Management)
Producing expected results in a timely manner determines the
success of our effort. Time management is an extremely important
self-management skill that makes an individual more
productive. Time management helps you to accomplish your goals and
reduce work-related stress. “Time management” is the process of
organizing and planning how to divide your time between specific
activities.

Significance of Time Management:


 It improves performance.
 It delivers better work quality.
 Timely delivery.
 Brings more efficiency.
 Reduce Stress.
Assertion & Reasoning Questions

1. Assertion (A). Our body releases some stress hormones when it


experiences increased stress levels.
Reason (R). Cortisol and Adrenaline are two stress hormones.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

2. Assertion (A). Emotional Intelligence is very useful in stress


management.
Reason (R). Emotional Intelligence is the ability to monitor own and
others' feelings and emotions, understand them, and take
appropriate actions.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

3. Assertion (A). Self-motivation is the ability to things on your own


without being told to do so.
Reason (R). Being self-aware, defining own goal, planning focus, help
in staying motivated.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

4. Assertion (A). Procrastination incurs a big cost directly and indirectly.


Reason (R). Procrastination plays a role in time management.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
UNIT 3 INFORMATION AND COMMUNICATION TECHNOLOGY
SKILLS - II
Basic Computer Operations
Hardware and Software:
A computer system consists of two main parts:-
Hardware- The physical parts that we can see and touch are called
hardware. It is the machinery of a computer. These are the keyboard,
monitor, CPU, etc.
Software: The part which cannot be seen but it makes hardware to work.
Example: Windows, MS office etc. Operating System (OS) is the software
that starts working as soon as we switch on a computer. It displays the
desktop on the monitor. Some of the most commonly used operating
systems for laptops and desktop are Ubuntu, Microsoft Windows and Mac
OS. An operating system is a software that serves as an interface between
the user and computer
Functions of an Operating System:
 Memory Management
 Processor Management
 Device Management.
 File Management
 Security
 Job Accounting
 Control Over System Performance
 Interaction with the Operators
 Error-detecting Aids
Types of Operating System:
 Single-User, Single Task Operating System:
 Single-User, Multi-Task Operating System:
 Multiuser Operating System:
 Multiprocessing Operating System:
 Embedded Operating System:
 Distributed Operating System:

Components of a Windows Desktop :


1) Desktop : The first screen that appears on the monitor is called desktop.
2) Wallpaper : A picture for the desktop background is called wallpaper.
3) Icons : Small pictures on the desktop are called icons.
4) Taskbar : The long bar at the bottom of the desktop is called
taskbar. The main components of Taskbar are : Start button, Active
applications, Notification Area, Date/Time icon
Some of the commonly used icons are :
1) Computer : It displays all storage areas of the computer . Through the
Computer icon, you can access all drives, files and folders on the
computer.
Recycle Bin : Files and folders deleted by the user are stored in the Recycle
Bin. From Recycle Bin, you can retrieve files or folders deleted by mistake.
 Starting a Computer:
To start a computer, press the Power button on the CPU. This will start the
operating system and display thedesktop on the monitor. Basic Functions
performed when a computer starts a computer automatically runs a basic
program called BIOS (Basic Input/Output System) as soon as it is
switched on or the power button is pushed on. The BIOS first does a self-
test. If the self-test shows that the system is fine, the BIOS will load the
Operating System.
• Login and Logout
When you login to the computer with your login-ID and password (as
shown in Figure 3.5), the computer knows that you are an authorised
person and allows you to work on the applications in the computer.
• Shutting Down a Computer
You can shut down the windows computer clicking Star button at the
bottom left corner and then click Shut Down. When you click Shut down,
the Operating System will close all the applications and turn off the
computer.
• Using the Keyboard
A keyboard is an input device used to type text, numbers and commands
into the computer.
Function Keys: Keys labelled from F1 to F12 are function keys. You use
them to perform specific functions. Other keys are:
(a) Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT,
CAPS LOCK and TAB, are special control keys
(b) Enter key: The label on this key can be either ENTER or RETURN,
depending on the brand of computer that you are using. You use the
ENTER or the RETURN key to move the cursor to the beginning of a new
line.
(c) Punctuation keys: Punctuation keys include keys for
punctuation marks, such as colon (:), semicolon (;), question mark
(?), single quotation marks (‘ ’), and double quotation marks (“ ”).
(d) Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE
UP, and PAGE DOWN are navigation keys.
(e) Command keys: Keys, such as INSERT (INS), DELETE (DEL), and
BACKSPACE are command keys. When the INSERT key is turned ON, it
helps you overwrite characters to the right of the cursor
(f) Windows key: Pressing this key opens the Start menu.
Using a Mouse
It is a small device that you can use to move, select and open items on
your computer screen.
Roll Over or Hover: Some actions can be done by simply rolling over or
hovering over an item. When you bring the mouse over a file in File
Explorer, it will show the details of that file.
Point and Click: As you move the mouse on your desk, a pointer moves
correspondingly on your screen. When you click a particular file, it gets
selected.
Drag and Drop: To move an item, you need to click it, and then holding
the mouse button down, move the item to a new location. After you move
the item to the new location, you release the mouse button. This is
called drag and drop.
Double-click: Double-clicking means to quickly click the left mouse
button twice. When we double-click on a file, it will open the file.
Performing Basic File Operations
Files and Folders
A folder is a location where a group of files can be stored. Everything you
store on your computer is stored in the form of a file. File system is a way
in which you give name to a file, store it and retrieve it. Files can be
separately placed into groups, called folders/directories All information
stored in a computer is kept in files. Each file is given a file name and has
a file name extension that identifies the file type. Example: .txt, .jpg,
.mp3.
Computer Care and Maintenance
Computer systems require maintenance so that the system works
efficiently. Poor maintenance may lead to system failure. Regular care
and maintenance may help you detect any issues at an early stage and
keep it functioning well. Computer virus can cause damage to the
working of the computer. If anti-virus is installed in the computer, and is
updated and run periodically, then any loss of data can be prevented.
Both internal and external
parts of the computer system should be taken care of.
• Keep the computer dust free.
• Do not eat or drink while working on the computer.
• To keep the keyboard clean, make sure your hands are clean before using
it.
• CDs and DVDs should be handled carefully so that they do not get
damaged.
• Keep keyboard covered when not in use.
General precautions to be taken while cleaning the computer components
are:
• Always Power Off the computer system before cleaning.
• Never spray cleaning fluid directly on the component of the computer.
• Do not allow the cleaning liquid to drip near the circuit board
• Regular maintenance of the computer system is very important.
Some of the maintenance activities are:
• Run anti-virus periodically.
• A regular disk defragmentation should be done to remove all
unnecessary information that slows down the computer
• Take regular backup of the data on your computer.
• System should be upgraded like increasing RAM, storage space.
• Temporary internet files should be deleted from time to time.
Basic Tips for Taking Care of Devices
• Keyboard: You can clean a keyboard with a soft brush
• Screen: You can wipe the screen with a soft cloth to remove any finger
marks.
• Handle devices carefully: Handle and move your laptop carefully and
avoid dropping or banging it against a hard surface.
• Keep the computer cool: If a computer, laptop or mobile device
gets overheated, the internal parts can be damaged. The CPU has
an internal fan to keep it cool. We should make sure the fan is
functioning.
• Do not overcharge your battery: Sometimes we keep a device
plugged in for charging even after it is fully charged. This reduces
the battery life. Always unplug the device once it is charged 100%.
• Always plug in devices carefully: Any device being connected to a
laptop or computer such as a USB drive or headphones, should be done
gently. It should not be forced into the port.
• Do not run too many programs at a time: When too many programs are
running at the same time, the computer can become slow and even
crash.
Prepare a Maintenance Schedule
(a) Daily Maintenance
i. Clean up your e-mail inbox
ii. Download e-mail attachments and save in proper folders
(b) Weekly Maintenance
i. Clean your keyboard
ii. Clean your monitor
Computer Security and Privacy
A computer virus is a software program that attaches itself to other
programs and alters their behaviour. VIRUS is an acronym for Vital
Information Resource Under Seize. A virus may get attached to e-mail
messages and spread from one computer to another. To prevent our
computer from virus, we should install anti-virus software, run it
periodically and keep it updated. examples of antivirus software are
McAfee Virus Scan, Norton Antivirus, Microsoft Security essentials, and
Quick Heal.

A computer can get infected with virus in any of the following ways:
• Infected files
• Infected pen drives
• Infected CD-ROMs/DVD-ROMs
• Through infected file attachment of e-mails
A computer virus cannot do the following:
• It cannot infect files on CD or DVD, if they are closed for writing.
• It cannot infect computer hardware like, keyboard, mouse, etc.
Common signs of a virus attack are:
• Computer runs very slow
• There is change in the file size
• Computer often stops responding
• There is an increase in number of files (unusual)
• Unusual error message appears on the screen
• Computer restarts on its own

Threats to Computer:
Threats are the ways in which personal information can be leaked from a
computer without our knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be of
three types:
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and
assumes your identity. Using this false identity, the hacker can gain
access to your account information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or
distributing unlicensed and unauthorised copies of a computer
program or software.
(b) Virus: Viruses are computer programs that can damage the data and
software programs or steal the information stored on a computer. Major
types of viruses are Worms and Trojan Horse. Worms are viruses that
replicate themselves and spread to all files once they Information and
Communication Technology Skills 81 attack a
computer. This makes it very difficult to remove them. A Trojan Horse
disguises itself i.e., it appears to be a useful software program but once it
reaches a computer it starts behaving like a virus and destroying data.

(c) Online Predator: Online predators are people who trap you into
inappropriate relationships. They may be older people posing to be your
age, bullying you into doing illegal activities online and sometimes face to
face.
(d) Internet Scams: Sometimes you may receive very attractive offers
saying you have won huge money in a lottery and that you can claim the
prize by depositing a certain amount of money. When you deposit the
money using credit card or online banking, you not only lose the deposit
money but your card/account information may be misused later.

The following points should be kept in mind to prevent virus


infection
• Keep anti-virus software updated.
• Scan all the files that you download from the Internet
• Do not open e-mails of an unknown person/sender
• Don’t allow any untrustworthy person to use your system.

Protecting your Data


(a) Use passwords to login to your computer: Use passwords that are
difficult to guess. Passwords are difficult to hack if they are a mix of small
(For example ‘a b c d’) and capital letters (For example, ‘H J E R’),
numbers (For example ‘8 7 6 5’) and special characters (For example, ’% ^
# $’). This would prevent unauthorised people from using your computer.
(b) Install Anti-virus and Firewall: Anti-viruses and Firewall monitor the
data coming in and out of a computer and prevent and viruses from
entering. Anti-viruses can also detect and clean viruses that may have
entered a computer.
(c) Encrypt Data: This is usually done by banks and companies in which
important customer information is stored. They can encrypt their entire
hard disk using the encrypting feature in Windows (Bitlocker). This would
force users to use a decryption password (or key) before starting the
computer thus preventing unauthorised usage.
(d) Secure sites: Give details of your credit card or bank account only on
secure sites. See in the address bar of the browser. If the site address
starts with https://and a lock symbol, then it is safe to give your credit
card and bank details.
Temporary Files:
Temporary files are created when you are running computer programs.
Microsoft Windows and Windows programs often create a .TMP file as a
temporary file. Temporary files are also created by web browsers to store
your web browser history. These temp files take up a large amount of disk
space so should be removed to clear space.

Firewall:
Computer firewall could be a programmable device or a software or a
network security system that monitors and controls incoming and
outgoing network traffic based on user-defined security rules.

Cookies:
Cookies are small files which are stored on a user’s computer when you visit a
website on the internet. These files typically contain information about your visit to
the webpage or record your login information. This may not always be bad. For
example, if you are exploring an online shopping website, most of the online
retailers use cookies to keep track of the items in a user’s shopping cart, otherwise,
your shopping cart would be reset to zero every time you click on a new link on the
website

Assertion and Reasoning Questions


1. Assertion (A). Clipboard is a very useful area of primary memory.
Reason (R). Clipboard is a temporary memory buffer that stores cut or
copied data for short-term, for a computer application.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

2. Assertion (A). Files once deleted cannot be restored.


Reason (R). Deleted files become part of Recycle Bin, from where they can
be undeleted.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

3. Assertion (A). Malware, worms, Trojan horses are threat to computer


data.
Reason (R). Anti-virus software scans a computer for computer viruses
and removes them.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

UNIT – 4 ENTREPRENEURIAL SKILLS II

Entrepreneurship is the type of self employment where one is running a


business to satisfy the needs of people and looking for ways to make the
business better to make profits
Qualities of an Entrepreneur
 They are confident. They believe in themselves and their abilities.
 They keep trying new ideas in their business.
 They are patient
 They are creative and think differently about business ideas.
 They take responsibility for their actions.
 They take decisions after thinking about them.
 They work hard.
 They do not give up when they face a difficulty.

Wage employed VS Self employed:


Wage employed people are people who work for a person or an organization
and get paid for that work. Self-employed people are those who start
businesses to satisfy the needs of people.
A self employed person who is always trying to make his/her business
better by taking risks and trying new ideas is an entrepreneur.

What do entrepreneurs do when they run their business?


 Fulfil Customer Needs
 Use Local Materials
 Help Society
 Create Jobs
 Sharing of Wealth
 Lower Price of Products

FUNCTIONS OF AN ENTREPRENUER:

Making decisions- an entrepreneur makes decisions everyday.


Managing the business- an entrepreneur plans the future of his or her
business
Divide income - the entrepreneur divides the business money to many
groups.
Taking risk - risk is the chance of something going wrong.

Create a new method, idea or product - an entrepreneur is always trying


things.

MISCONCEPTIONS/MYTHS:
 Every business idea needs to be unique or special.
 A needs a lot of money to start a business.
 Only a person having a big business is an entrepreneur.
 Entrepreneurs are born, not made.

Entrepreneurship as a Career Option:


Enter - when an entrepreneur is starting, they are just entering the market
to do business. Survive - the entrepreneur has to remain in a competitive
market.
Grow -once the business is stable, an entrepreneur thinks about expanding
his or her business.
Assertion and Reasoning Questions

1. Assertion (A). Entrepreneurship helps raise the standard of living.


Reason (R). Entrepreneurship creates jobs, wealth and contributes to
overall
Economy.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
2. Assertion (A). A doctor works for a renowned hospital.
Reason (R). The statement given above is an example of wage
employment.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
3. Assertion (A). Entrepreneurship requires the understanding of risks
involved.
Reason (R). There are no risks involved in entrepreneurship.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

4. Assertion (A). Equity financing and Debt financing are two ways of
funding a startup.
Reason (R). In equity financing, some share is given to the financer and in
debt financing, interest is given to the financer.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
UNIT – 4 GREEN SKILLS
SUSTAINABLE DEVELOPMENT
Sustainable development means meeting today’s needs without
harming future generations' ability to meet their own needs. It balances
economic growth, environmental protection, and social equality,
ensuring resources are used responsibly and fairly so that both people
and the planet can thrive now and in the future.

4 R’S AND 1U OF SUSTAINABILITY


The 4 R’s of sustainability are Reduce, Reuse, Recycle, and Recover.
Reduce involves cutting down on waste and resource use to minimize
environmental impact.
Reuse means using items again to extend their life and avoid waste.
Recycle refers to processing materials to make new products, reducing the
need for raw materials.
Recover involves reclaiming valuable materials from waste.
Upcycle (the 1 U) enhances the value of items by creatively repurposing
them into higher-quality products, promoting sustainability and reducing
waste.

IMPORTANCE OF SUSTAINABLE DEVELOPMENT


Future Preservation: Ensures that resources and the environment are
preserved for future generations.
Environmental Protection: Reduces pollution, conserves natural
resources, and combats climate change.
Economic Balance: Promotes economic growth while preventing
resource depletion and environmental damage.
Social Equity: Ensures fair access to resources and opportunities,
supporting social justice and equality.
Informed Actions: Encourages students to adopt responsible behaviors
and make informed decisions for a sustainable future.
Global Awareness: Helps students understand global challenges and their
role in creating a more sustainable world.
PROBLEMS RELATED TO SUSTAINABLE DEVELOPMENT
Resource Depletion: Overuse of natural resources like water, minerals,
and forests.
Pollution: Air, water, and soil pollution impacting health and ecosystems.
Climate Change: Rising temperatures and extreme weather due to
greenhouse gas emissions.
Loss of Biodiversity: Habitat destruction leading to species extinction.
Inequality: Unequal access to resources and opportunities affecting social
equity.
Sustainable Development Goals
Assertion and Reasoning Questions
1. Assertion (A). Sustainable development is the development that meets
the needs of the present without compromising the ability of future
generations to meet their own needs.
Reason (R). Sustainability is the goal of sustainable development.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

2. Assertion (A). Poverty and Environment are closely related.


Reason (R). Poor are forced to deplete the resources to survive, and this
degradation of the environment further impoverishes the people.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

3. Assertion (A). United Nations has devised 17 SDGs (Sustainable


Development Goals).
Reason (R). Each country defines own SDGs.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
4. Assertion (A). Each SDG has to meet some defined targets.
Reason (R). For 17 SDGs, there 169 targets defined by UN.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

5. Assertion (A). Monitoring and ownership is a big challenge in sustainable


development.
Reason (R). Social inclusion helps in monitoring and ownership.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

6. Assertion (A). One should not overbuy.


Reason (R). Reusing and recycling leads to responsible consumption.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
PART B
UNIT- 1 INTRODUCTION TO AI

What is Intelligence?
According to researchers, an intelligence is the 'ability to perceive or
infer information and as knowledge to be applied towards adaptive
behaviors within an environment or context

Artificial Intelligence can be defined as


 Ability to interact with the real world
o To perceive, understand and act
 Example: Speech Recognition--Understanding and
synthesis
 Example: Image Recognition
 Example: Ability to take action: to have an effect
 Reasoning and planning
o Modelling the external world, given input
 Solving new problems, planning and making decisions
 Ability to deal with unexpected problems, uncertainties
 Learning and adaptation
o Continuous learning and adapting graph
 Our internal models are always being updated
 Example: Baby learning to categorize and recognize
animals
How do you make decisions?
The basis of decision making depends upon the availability of
information and how we experience and understand it.

Types of Intelligence
What is Artificial Intelligence?
AI is a form of Intelligence; a type of technology and a field of study. When a
machine possesses the ability to mimic human traits, i.e., make decisions,
predict the future, learn and improve on its own, it is said to have artificial
intelligence. In other words, you can say that a machine is artificially
intelligent when it can accomplish tasks by itself - collect data, understand
it, analyse it, learn from it, and improve it.

How do machine become Artificially Intelligent


A machine becomes intelligent by training with data and algorithm. AI
machines keep updating their knowledge to optimize their output.

DATA + ALGORITH = AI MACHINE


M
Applications of Artificial Intelligence around us
 Google Search
 Hey Siri
 Google Map
 FIFA
 Amazon
 Social Media
 Health APP
 Humanoid
 Chatbots
What is not AI?
Any machine that has been trained with data and can make
decisions/predictions on its own can be termed as AI
AI machine Not AI machine
1. Al machines are trained with 1. Smart machines which are not
data and algorithm. Al, do not require training data,
they work on algorithms only.

2. Al machines learn from 2. Smart machines work on fixed


mistakes and experience. They algorithms and they always work
try to improvise on their next with the same level of efficiency,
iterations. which is programmed into them.

3. Al machines can analyses the 3. Machines which are not Al


situation and can take decisions cannot take decisions on their
accordingly. own.

4. Al based drones capture the 4. An automatic in a shopping


real-time data during the flight, mall, seems to be Al-enabled, but
processes it in real-time, and it is built with only sensor
makes a human independent technology
decision based on the processed
data.

KWLH CHART

• What I Know?
K
• What I Want to know?
W
• What have I learned?
L
H • How I learnt this?
Artificial Intelligence (AI)
Refers to any technique that enables computers to
mimic human intelligence. It gives the ability to
machines to recognize a human’s face; to move and
manipulate objects; to understand the voice
commands by humans, and also do other tasks.
The AI-enabled machines think algorithmically
and execute what they have been asked for
intelligently.

Machine Learning (ML)


It is a subset of Artificial Intelligence which
enables machines to improve at tasks with experience (data). The
intention of Machine Learning is to enable machines to learn by
themselves using the provided data and make accurate Predictions/
Decisions.
Deep Learning (DL)
It is a subset of ML. It enables software to train itself to perform
tasks with vast amounts of data. In Deep Learning, the machine is
trained with huge amounts of data which helps it in training itself
around the data. Such machines are intelligent enough to develop
algorithms for themselves. Deep Learning is the most advanced form of
Artificial Intelligence out of these three. Then comes Machine Learning
which is intermediately intelligent and Artificial Intelligence covers all
the concepts and algorithms which, in some way or the other mimic
human intelligence.

Machine learning Deep learning


A subset of AI A subset of machine learning
Can train on smaller data Requires large amounts of data
sets
Requires more human Learns on its own from environment
intervention to correct and and past mistakes
learn
Shorter training and lower Longer training and higher accuracy
accuracy
Makes simple, linear Makes non-linear, complex correlations
correlations
Can train on a CPU (central Needs a specialized GPU (graphics
processing unit) processing unit) to train

Introduction to AI Domains
Artificial Intelligence becomes intelligent according to the training
which it gets. For training, the machine is fed with datasets.
According to the applications for which the AI algorithm is being
developed, the data which is fed into it changes. With respect to the
type of data fed in the AI model, AI models can be broadly categorised

Data Sciences Computer Vision Natural Language Processing


into three domains:
Data Sciences
Data sciences is a domain of AI related to data systems and processes,
in which the system collects numerous data, maintains data sets and
derives meaning/sense out of them.
Applications of Data Sciences
 Fraud and Risk Detection
 Genetics & Genomics
 Internet Search
 Targeted Advertising
 Website Recommendations
 Airline Route Planning
Computer Vision
Computer Vision, abbreviated as CV, is a domain of AI that depicts the
capability of a machine to get and analyse visual information and afterwards
predict some decisions about it. The entire process involves image acquiring,
screening, analysing, identifying and extracting information.

Applications of Computer Vision


 Facial Recognition*
 Face Filters
 Google’s Search by Image
 Self-Driving Cars
 Medical Imaging
 Google Translate App
Natural Language Processing
Natural Language Processing, abbreviated as NLP, is a branch of
artificial intelligence that deals with the interaction between computers
and humans using the natural language. Natural language refers to
language that is spoken and written by people, and natural language
processing (NLP) attempts to extract information from the spoken and
written word using algorithms.

Applications of Natural Language Processing


 Automatic Summarization
 Sentiment Analysis
 Text classification
 Virtual Assistants

AI Ethics
A set of principles that guide how artificial intelligence (AI) is
developed and used. The goal AI ethics is to ensure that AI is used
responsibly and safely, and that it is environmentally friendly and
humane.

Data Privacy
The world of Artificial Intelligence revolves around Data
Data privacy ensures the ethical and lawful use of data. It focuses on how
data is collected, used, shared, and stored so that the rights of individuals
over their data is protected.

Data security
Data security ensures the protection of data from unauthorised access and
breaches. It focuses on safeguarding personal data, business data,
intellectual property, and many more from various threats
Different types of data security controls
 Strong password
 Authentication
 Access Controls
 Data Backup
 Encryption
 Firewall and Antivirus Software
Al Bias:
It refers to Al systems that produce biased results that reflect and
perpetuate human biases within a society, including historical and current
social inequality.
Al Access
Artificial Intelligence is still a budding technology, not everyone has the
opportunity to access it. The people who can afford AI enabled devices make
the most ofi t while others who cannot are left behind.
Competency Based Questions
1. Raja has great rhythm, a knack for creating, singing or playing melodies.
At a young age he has created many compositions and won many awards.
She possesses intelligence
(a) logical (b) musical (c) linguistic (d) bodily-kinesthetic
2. Whenever Navya faces a problem about anything and starts feeling
anxious, he likes to play time within herself clearly understands her own
views and opinions, feelings and anxieties, and even goals dreams. He
possesses intelligence.
(a) interpersonal (b) intrapersonal (c) naturalistic (d) social
3. Mr. Dinakar, a Computer Science teacher, has developed an educational
humanoid namely Siju, which can converse in 47 languages. Which Al
technology helps the robot, converse with us humans?
(a) NLP (b) Computer Vision (c) ML (d) Data
Science
4. To help the field of agriculture, the government is using many AI
technologies. One such usage optimizing yield production by using data
from sensors and satellites while considering climatic conditions. This
requires a great computation and complex models having many-many
computational layers. Which Al technology do you think it may be based on?
(a) ML (b) Computer Vision (c) DL (d) NLP
5. BEWell is a health service that serves as a trusted, personalized health
guide. BEWell guides people through the right health journey based on their
pre-existing conditions, ongoing health concerns and gaps in general health
knowledge. The health engine combines both personal and external health
and medical reports to provide informed advice based on other user
experiences. Which of these Al domains are the prime factor of BEWell
services ?
(a) Computer Vision (b) NLP (c) Data (d) All of these
6. Google Maps, the search giant's technology, with Al-enabled mapping,
scans road information and uses algorithms to determine the optimal route
to take, be it on foot or in a car, bike, bus or train. It also gives voice
instructions about the route. Which of these Al domains are the prime factor
of Google Maps services?
(a) Computer Vision (b) Data (c) NLP (d)
All of these
7. Facebook research developed two Al based chatbots namely Alice and
Bob. But after some time facebook shutdown these chatbots. The reason
told behind it was that Alice and Bob developed own language after few
exchanges and started interacting in that language. This case is clear
indicator of AI ethics ___________________
(a) Trust, Privacy and Control (b) Accountability (c) Human rights and AI
(d) All of these
Assertion and Reasoning questions
8. Assertion (A). Al means mimicking human intelligence.
Reason (R). Al does not mean just the automation.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
9. Assertion (A). The inter-personal and intra-personal intelligence is about
knowing understanding the moods, feelings and gestures,
Reason (R). The inter-personal and intra-personal intelligence are the same
thing
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
10. Assertion (A). Deepfake is a technology that can generate fake digital
photos, sound recording and video, which look just as original as possible.
Reason (R). Deepfake falls in the domain of Al ethics.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

UNIT- 2 AI PROJECT CYCLE

1.Problem Scoping
It is a fact that we are surrounded by problems. They could be small or big,
sometimes ignored or sometimes even critical. Many times, we become so
used to a problem that it becomes a part of our life. Identifying such a
problem and having a vision to solve it, is what Problem Scoping is
about.

4Ws Problem Canvas

Who
The “Who” block helps in analysing the people getting affected directly or
indirectly due to it. Under this, we find out who the ‘Stakeholders’ to this
problem are and what we know about them.
What

Who? What? Where? Why


Under the “What” block, you need to look into what you have on hand. At
this stage, you need to determine the nature of the problem.
Where?
Now that you know who is associated with the problem and what the
problem actually is; you need to focus on the context/situation/location
of the problem
Why?
You have finally listed down all the major elements that affect the problem
directly. Now it is convenient to understand who the people that would be
benefitted by the solution are; what is to be solved; and where will the
solution be deployed.

2.Data Aqusition:
This is the second stage of Al Project cycle. According to the term, this stage
is about acquiring data for the project.Data can be a piece of information or
facts and statistics collected together for reference or analysis.
 Training Data collected during the initial stage of processing
 Testing Data-used for Evaluating the model
Data Features

3. Data Exploration:
 Data exploration is the process of analyzing raw data to identify
patterns, characteristics, and relationships
 Data exploration is the first step in data analysis
 To visualise data, we can use various types of visual representations
like Bargraph, Histogram, Line Chart, Pie Chart.
 Why to explore data:
o Quickly get a sense of the trends, relationships and patterns
contained within the data
o Define strategy for which model to use at a later stage.
o Communicate the same to others effectively.
4.Data modelling
Rule-based approach Learning-based approach
In this approach, the machine In this approach, the machine
follows rules or instructions learns by itself
mentioned by the developer.
The machine once trained, doesn’t This type of approach facilitates the
take into consideration any changes acquisition of new knowledge.
made in the original dataset
Learning is static Learning is dynamic

Supervised Learning:
In a supervised learning model, the dataset which is fed to the machine is
labelled. A label is some information which can be used as tag for data.
Classification: This model works on
discrete dataset which means the data
need not be continuous.
Regression : This model works on
continuous data.
Unsupervised Learning:
An unsupervised learning model
works on unlabelled dataset. This
means that the data which is fed to
the machine is random. This model is
used to identify relationships, patterns
and trends out of the data which is fed into it.
Clustering: It refers to the unsupervised learning algorithm which can
cluster the unknown data according to the patterns or trends identified out
of it.
Dimensionality Reduction: We humans are able to visualise upto 3-
Dimensions only but, there are various entities which exist beyond 3-
Dimensions. Dimensionality reduction algorithm is used to reduce their
dimensions.
5.Evaluation
Once a model has been made and trained, it needs to go through proper
testing so that one can calculate the efficiency and performance of the
model.
Efficiency of the model is calculated on the basis of the parameters
mentioned below:

Accurac Precision Recal F1


y l Score
Neural Networks
Neural networks are loosely modelled after how neurons in the human
brain behave. The key advantage of neural networks are that they are
able to extract data features automatically without needing the
input of the programmer. A neural network is essentially a system of
organizing machine learning algorithms to perform certain tasks. It is a
fast and efficient way to solve problems for which the dataset is very
large, such as in images.
A Neural Network is divided into multiple layers and each layer is further
divided into several blocks called nodes. Each node has its own task to
accomplish which is then passed to the next layer. The first layer of a
Neural Network is known as the input layer. The job of an input layer is
to acquire data and feed it to the Neural Network. No processing occurs
at the input layer. Next to it, are the hidden layers. Hidden layers are the
layers in which the whole processing occurs. Their name essentially
means that these layers are hidden and are not visible to the user.
Each node of these hidden layers has its own machine learning
algorithm which it executes on the data received from the input layer.
The processed output is then fed to the subsequent hidden layer of the
network. There can be multiple hidden layers in a neural network
system and their number depends upon the complexity of the function
for which the network has been configured. Also, the number of nodes in
each layer can vary accordingly. The last hidden layer passes the final
processed data to the output layer which then gives it to the user as the
final output. Similar to the input layer, output layer too does not process
the data which it acquires. It is meant for user-interface.

Some of the features of a Neural Network are listed below:

Competency Based Questions


1. Under the Sashakt bharat Abhiyan, your state government wants to get
deployed Smart Speakers for farmers. These smart speakers will be able to
alert the farmers about the climate conditions, any emergency situations
such as extreme winds of rains/squalls etc. update farmers about the latest
news and policies related to farming. So the governments wants to identify
the issues that the smart speakers will address. This is being done
under__________ stage of Al Project Cycle.
(a) Modelling (b) Problem Scoping (c) Data Acquisition (d) Data
Exploration
2. After shortlisting some problems on which smart speakers will keep you
updated, the government wants to zero upon one of two major farming
problems to be addressed via smart speakers. This is being done
to_____________ for the Smart Speaker Project.
(a) Collect Data (b) Develop Model (c) Set Goal (d) Clean Data
3. Maryam belong to family of farmers. To help her family, she wants to
develop a device based AI system that will help in detecting and targeting
weeds. This will help to prevent over-application of herbicides and will
eventually prevent high levels of toxins toxins in food. For this, what will be
the best source of capture data so as to identify weeds from crops ?
(a)Internet (b) Web Scraping (c) Camera (d) Sensors
4.Rajat has made a model which predicts the performance of Indian Cricket
players in upcoming matches. He collected the data of players’ performance
with respect to stadium, bowlers, opponent team and health. His model
works with good accuracy and precision value. Which of the statement given
below is incorrect?
(a) Data gathered with respect to stadium, bowlers, opponent team and
health is known as Testing Data.
(b) Data given to an Al model to check accuracy and precision is Testing
Data.
(c) Training data and testing data are acquired in the Data Acquisition stage.
(d) Training data is always larger as compared to testing data.
5. After representing the budget in the parliament, the government has
released a chart/graph where the percentage share of the budget allocated
is shown for different parameters such as military, education, agriculture,
women and child development, health & family welfare and so forth. Which
chart type could it be?
a) Line Chart (b) Scatter Chart (c) Bar Chart (d) Pie Chart
6. ______________learning provides essential features to medical imaging devices,
such as image detection, classification and segmentation, used in radiology and
pathology to diagnose patients quickly and accurately while having an eye for
new pattern discoveries.
(a) Supervised learning (b) Rule based (c) Unsupervised learning
(d) Semi-supervised learning
7. Suppose you have a dog that is not so well trained. Every time the dog messes
up the living room you reduce the amount of tasty foods you give it
(punishment) and every time it behaves well, you double the tasty snacks
(reward). What will the dog eventually learn? This concept
signifies__________________ learning.
(a) Supervised learning (b) Rule based (c) Unsupervised learning
(d) Reinforcement learning

Assertion and Reasoning Questions


1. Assertion (A). Machine Learning (ML) and Deep Learning (DL) enable
machines to automatically learn and I improve at tasks with experience.
Reason (R). ML. and DL are interlinked.
a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
2. Assertion (A). A virtual assistant is an application program that
understands natural language commands and completes tasks for a user.
Reason (R). NLP is the ability of machines/software to understand natural
languages input given in the form of speech and produce natural language
based speech output.
a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
UNIT – 6 Natural Language Processing
Natural Language Processing, or NLP, is the sub-field of AI that is
focused on enabling computers to understand and process human
languages
Applications of Natural Language Processing
Automatic Summarization
Automatic summarization is useful for gathering data from social media and
other online sources, as well as for summarizing the meaning of documents
and other written materials
Sentiment Analysis
To better comprehend what internet users are saying about a company's
goods and services, businesses use natural language processing tools like
sentiment analysis to understand the customer requirement.
Text classification-Text classification enables you to classify a document
and organise it to make easier to find the information you need or to carry
out certain tasks. Spam screening in email is one example of how text
categorization is used.
Virtual Assistants-These days, digital assistants like Google Assistant,
Cortana, Siri, and Alexa play a significant role in our lives. Not only can we
communicate with them, but they can also facilitate our life
Chatbots
a computer program designed to simulate conversation with human users,
especially over the internet:
Examples :
Mitsuku Bot, CleverBot, Jabberwacky, Haptik, Rose, Ochatbot
Difference between Script bot and Smart-bot

Script bot Smart-bot


 Script bots are easy to make Smart –bots are comparatively
difficult to make
Script bot functioning is very limited Smart-bots are flexible and
as they are less powerful. powerful.
Script bots work around a script Smart bots work on bigger
which is programmed in them databases and other resources
directly
No or little language processing skills NLP and Machine learning skills
are required
Limited functionality Wide functionality

Human Language VS Computer Language

1. Our brain keeps on processing the sounds that it hears around itself
and tries to make sense of them all the time.
2. The sound reaches the brain through a long channel. As a person
speaks, the sound travels from his mouth and goes to the listener’s
eardrum. The sound striking the eardrum is converted into neuron
impulses, gets transported to the brain, and then gets processed.
3. After processing the signal, the brain gains an understanding of its
meaning of it. If it is clear, the signal gets stored. Otherwise, the
listener asks for clarity from the speaker. This is how human
languages are processed by humans.

Computer Language

1. Computers understand the language of numbers. Everything that is


sent to the machine has to be converted to numbers.
2. While typing, if a single mistake is made, the computer throws an
error and does not process that part. The communications made by
the machines are very basic and simple.

Difference between Human language and computer language

Human Language Computer Language


Natural Synthetic
Ambiguous Precise
Context-dependent Context-independent
Dynamic Static
Evolving Fixed
Uses grammar and syntax rules Uses strict syntax and semantic
rules
Varies by culture and region Universal
Used for communication between Used for communication between
humans computers and humans
Can have different interpretations Has a set of predefined instructions
that produce specific outputs

Data Processing
Data processing is the collection and manipulation of digital data to produce
meaningful information.It is usually performed in a step-by-step process

1.Text Normalisation

In-Text Normalization, we undergo several steps to normalize the text to a


lower level. That is, we will be working on text from multiple documents and
the term used for the whole textual data from all the documents altogether
is known as corpus.

2. Sentence Segmentation

Under sentence segmentation, the whole corpus is divided into sentences.


Each sentence is taken as a different data so now the whole corpus gets
reduced to sentences.
3.Tokenisation

After segmenting the sentences, each sentence is then further divided into
tokens. A “Token” is a term used for any word or number or special
character occurring in a sentence.

4.Removal of Stopwords

In this step, the tokens which are not necessary are removed from the token
list. To make it easier for the computer to focus on meaningful terms, these
words are removed.

Stopwords are the words that occur very frequently in the corpus but do not
add any value to it.

Examples: a, an, and, are, as, for, it, is, into, in, if, on, or, such, the, there,
to.

5.Converting text to a common case

As the name suggests, we e convert the whole text into a similar case,
preferably lower case. This ensures that the case sensitivity of the machine
does not consider the same words as different just because of different
cases.

6.Stemming
Stemming is a technique used to extract the base form of the words by
removing affixes from them. It is just like cutting down the branches of a
tree to its stem
7.Lemmatization
In lemmatization, the word we get after affix removal (also known as lemma)
is a meaningful one and it takes a longer time to execute than stemming.
Difference between Stemming and Lemmatization
Lemmatization Stemming

Converts words to their base or Reduces words to their root


dictionary form (lemma). form (stem), which may not be
Higher complexity, context-aware. a valid word.
Lower complexity, context-
agnostic.
Uses dictionaries and morphological Uses rule-based algorithms like
analysis. Porter, Snowball, and Lancaster
Produces more accurate and Stemmers.
Less accurate, may produce
meaningful words. non-meaningful stems.
"Running" → "run", "Better" → "Running" → "run" or "runn",
"good". "Better" → "bett".
Slower due to more complex Faster due to simpler rules.
processing.
Better search results through Useful for quick search
understanding context. indexing
Essential for tasks needing accurate Used for initial stages of
word forms (e.g., sentiment analysis, preprocessing to reduce word
topic modeling)
Helps in producing grammatically variability
Less common due to potential
correct translations inaccuracy

Bag of Words
Bag of Words
Bag of Words is a Natural Language Processing model which helps in
extracting features out of the text which can be helpful in machine
learning algorithms. In bag of words, we get the occurrences of each
word and construct the vocabulary for the corpus.
Here is the step-by-step approach to implement bag of words algorithm:
1. Text Normalisation: Collect data and pre-process it
2. Create Dictionary: Make a list of all the unique words occurring in
the corpus. (Vocabulary)
3. Create document vectors: For each document in the corpus, find
out how many times the word from the unique list of words has
occurred.
4. Create document vectors for all the documents.
Competency based questions

1. Rutgers Archive is one of the oldest repositories of many art and science
articles and research papers. In last few years, it has started feeling that its
database now contains lakhs of articles and searching in these articles is
becoming slower. So, they want that there should be a way that should
bring out the main keywords and the synopsis of the articles so that
searching becomes easier and faster. Which NLP technique would be the
most useful in this?
(a) Text classification (b) Automatic text summarisation (c) Sentiment
analysis (d) None of these
2. XYZ university has sensed something in the changing behaviour of its
students. The management of the university wants to know what exactly is
going in students' minds. So it has hired an expert to study the social media
posts of the students to gauge out the real mood of the students. Which NLP
technique will make it possible?
(a) Sentiment analysis (b) Automatic text summarisation
(c) Text classification (d) None of these

3. Siri and Google Assistant can interact with you through chats also, just
like other chatbots. But last time when you asked Siri about your preferred
ice-cream, it did not know. After you told it, it now can easily take about
your favourite flavour of the ice-creams. Every time it learns something new
about you, it registers it in its memory. What type of chatbot is it?
(a) Text based (b) Script bot (c) Voice based (d) Smart bot

4. Rutgers' archive has installed a Chabot for its users where users can ask
about the articles and papers stored in the archive. However, all the details,
rules and information about the article and research papers is already fed in
the Chabot program and won't alter anytime. What type of chatbot is it?

(a) Text based (b) Voice based (c) Script bot (d) Smart bot

5. Nikita is learning to create NLP based programs. In one of her text


normalisation programs, she used the following words:

'crying', 'cry', 'cried', 'smiling', 'smile', 'smiled', 'smiles'

And the program returned :

'cry', 'cry', 'cri', 'smili', 'smile', 'smile', 'smile'

Which of the following techniques did she use in her program?

(a) Tokenisation (b) Bag of Words(c) Stemming(d) Lemmatisation

6. Nikita has now changed her text normalisation programs. She used the
same words:

'crying', 'cry', 'cried', 'smiling', 'smile', 'smiled', 'smiles'

And the program returned the following this time:

'cry', 'cry', 'cry', 'smile', 'smile', 'smile', 'smile'

Which of the following techniques did she use in her program this time ?

(a) Tokenisation (b) Bag of Words (c) Stemming (d) Lemmatisation

7. Maryam, Nikita's friend, is also working on NLP techniques. She has


created a program where she used two documents D1 and D2 and created
the following:
D1: He is a lazy boy. She is also lazy.

D2: Bantu is a lazy person.

He She Lazy Boy Bantu Person


D1 1 1 2 1 0 0
D2 0 0 1 0 1 1
Which of the following techniques did she use in her program ?

(a) Tokenisation (b) Stemming (c) Bag of Words (d) Lemmatisation


Assertion & Reasoning Questions

1. Assertion (A). Siri and Alexa like smart assistants make use of NLP
(Natural Language Processing).
Reason (R). NLP enables technology to process human languages in the form
of text or voice data, to understand its full meaning.

(a) Both A and R are true and R is the correct explanation of A.


(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

2. Assertion (A). Chatbots and Alexa have one similarity.


Reason (R). Both chatbots and voice assistants use NLP based technology.
a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

3. Assertion (A). Sentiment analysis uses linguistic analysis to detect


emotional and other language tones in speech.
Reason (R). Sentiment analysis systems may also use computer vision to
analyse facial expressions.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

4. Assertion (A). Text classification is the process of understanding,


analysing and categorising unstructured text into organized groups
Reason (R) . Automatic text summarization is the sub category of text
classification
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

5. Assertion (A). An NLP project also undergoes Al project cycle.


Reason (R). An NLP project may use datasets of computer vision project.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
6. Assertion (A). Chatbots may or may not use AI.
Reason (R). Script bots are rule based and smartbots use Al enabled
programs.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

7. Assertion (A). Sentence segmentation is the process of dividing the whole


text into individual sentences
Reason (R). Sentence segmentation is a part of text normalisation.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

8. Assertion (A). Bag of words, is an NLP technique.


Reason (R). A Bag of Words (BoW) model is a model used for extracting
features from text for use in modelling for an Al algorithm.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

9. Assertion (A). In BoW, whole collection of textual data is called corpus.


Reason (R). TF-IDF is calculated for a Corpus.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

10. Assertion (A). TF-IDF (Term Frequency-Inverse Document Frequency)


helps in removing the unnecessary words out of a text body.
Reason (R). TF-IDF is a statistical measure that evaluates how relevant a
word is in a document and in a collection of documents.

(a) Both A and R are true and R is the correct explanation of A.


(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
UNIT – 7 Evaluation
Evaluation is the process of understanding the reliability of any AI model,
based on outputs by feeding test dataset into the model and comparing
with actual answers. There can be different Evaluation techniques,
depending of the type and purpose of the model.
Confusion matrix
The result of comparison between the prediction and reality can be
recorded in what we call the confusion matrix.
Terminologies

Evaluation Methods
Accuracy
Accuracy is defined as the percentage of correct predictions out of all the
observations.

Precision
Precision is defined as the percentage of true positive cases versus all the

cases where the prediction is true.


Recall
It can be defined as the fraction of positive cases that are correctly
identified

F1 Score

F1 score can be defined as the measure of balance between precision and


recall.
As you can see in the above diagram, the blue line talks about the model’s
output while the green one
is the actual output along with the data samples.
The model’s output does not match the true function at all.
Figure 1 Hence the model is said to be underfitting and its accuracy
is lower.
In the second one, the model’s performance matches well
Figure 2
with the true function which states that the model has
optimum accuracy and the model is called a perfect fit.
In the third case, model performance is trying to cover all
Figure 3 the data samples even if they are out of alignment to the
true function. This model is said to be overfitting and
this too has a lower accuracy.
Competency Based Questions
1. An Al model has been developed to filter spam mails. In the detection of
spam mail, it is okay if any spam mail remains undetected (false negative),
but what if we miss any critical mail because it is classified as spam (false
positive). In this situation, False Positive should be as low as possible. Thus,
here, ________________is more vital as compared to recall.
(a) accuracy (b) f1 score (c) precision (d) confusion matrix
2. An Al model has been developed to detect credit card fraud detections.
The aim is not to miss any fraud transactions. Therefore, we want False-
Negative to be as low as possible. In these situations, we can compromise
with the low precision, but _______________should be high.
(a) accuracy (b) recall (c) fl score (4) confusion matrix
Assertion and Reasoning Question
1. Assertion (A). The confusion matrix is a performance measuring
technique for an Al model.
Reason (R). The confusion matrix lists the predicted value of an Al model
and the actual/ correct outcome values.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
2. Assertion (A). Higher Precision means minimum false positives and higher
Recall means maximum true positives.
Reason (R). F1 score balances Precision and Recall.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
3. Assertion (A). Increase in precision decreases recall.
Reason (R). Precision metric is used for minimising false positives and Recall
metric is used for minimising false negatives.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
4. Assertion (A). Precision metric refers to how accurate it truly predicted
positive out of all its positive predictions.
Reason (R). Precision metric is used to judge the impact of false positives.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
5. Assertion (A). For all Al models developed, the Al model with higher F1
Score is chosen.
Reason (R). F1 Score metric balances Precision and Recall and hence
balances the impact of False Positives and False Negatives.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.

UNIT – 4 DATA SCIENCE


Data Sciences
Data sciences is a domain of AI related to data systems and processes,
in which the system collects numerous data, maintains data sets and
derives meaning/sense out of them.
Applications of Data Sciences
 Fraud and Risk Detection
 Genetics & Genomics
 Internet Search
 Targeted Advertising
 Website Recommendations
 Airline Route Planning
Data Science Tools and Techniques
Various tools and Programming libraries are essential in Data Science,
helping y analyze, and visualize data.
1. Data Collection Methods:
a. Offline: Surveys, observations, and interviews conducted manually.
b. Online: Data gathered from open-source websites (e.g., Kaggle) or
government portals.Examples of Data:
c. Banking: Account holder details, transaction histories, and loan
applications.
d. Movie Theaters: Ticket sales, refreshment purchases, and customer
demographics.
2. Data Storage Formats:
a. CSV (Comma Separated Values): A simple text format where each data
field is separated by a comma
b. Spreadsheet: A grid format used for tabular data (e.g., Excel).
c. SQL: Structured Query Language, used to manage and manipulate
relational databases.
3. Python Libraries:
a. NumPy: For numerical computing and working with arrays.
b. Pandas: For data manipulation and handling tabular datasets (e.g.,
DataFrames).
c. Matplotlib: For data visualization, including plotting graphs like bar
charts, histograms, and scatter plots
KNN Alogorithm
KNN stands for K-nearest neighbour, it’s one of the Supervised learning
algorithm mostly used for classification of data on the basis how it’s
neighbour are classified. KNN stores all available cases and classifies
new cases based on a similarity measure. K in KNN is a parameter
that refers to the number of the nearest neighbours to include in the
majority voting process.

UNIT – 5 COMPUTER VISION

Computer vision is the same as the human eye, It enables us see-through


images or visual data, process and analyzes them on the basis of
algorithms and methods in order to analyze actual phenomena with
images.
Applications of Computer Vision
 Facial Recognition
 Face Filters
 Google’s Search by Image
 Self-Driving Cars
 Medical Imaging
 Google Translate App
Basics of images
Pixels
 Pixels are the fundamental element of a photograph.
 They are the smallest unit of information that make up a picture.
 They are typically arranged in a 2-dimensional grid.
 In general term, the more pixels you have, the more closely the image
resembles the original.
Resolution
 The number of pixels covered in an image is sometimes called the
resolution
 Term for area covered by the pixels in conventionally known as resolution.
For eg :1080 x 720 pixels is a resolution giving numbers of pixels in width
and height of that picture.
 A megapixel is a million pixels
Pixel value
 Pixel value represent the brightness of the pixel.
 The range of a pixel value in 0-255(2^8-1)
 where 0 is taken as Black or no colour and 255 is taken as white
Grayscale Images
 Grayscale images are images which have a range of shades of grey without
apparent colour. The lightest shade is white total presence of colour or 255
and darkest colour is black at 0.
 Intermediate shades of grey have equal brightness levels of the three
primary coloursRGB.
 The computers store the images we see in the form of these numbers.
RGB colours
 All the coloured images are made up of three primary colours Red, Green
and Blue.
 All the other colour are formed by using these primary colous Red Green
and Blue.
 Computer stores RGB Images in three different channels called different
proper channel and the B channel.
Image Features
 A feature is a description of an image.
 Features are the specific structures in the image such as points, edges or
objects.
 Other examples of features are related to tasks of CV motion in image
sequences, or to shapes defined in terms of curves or boundaries between
different image regions.

Convolution
Convolutions are one of the most critical, fundamental building blocks in
computer vision and image processing.

Convolution Neural Network


CNN is an efficient recognition algorithm that is widely used in image
recognition and processing that is specially designed to process pixel data

The first Convolution Layer is responsible for capturing the Low-Level


features such as edges, color, gradient orientation, etc. In the convolution
layer, there are several kernels that help us in processing the image
further produce several features. The output of this layer is called the
feature map

The next layer in the CNN is the Rectified Linear Unit function or the
ReLU layer. This layer simply gets rid of all the negative numbers in the
feature map and lets the positive number the stay as it is. It has become
the default activation function for many types of neural networks because
a model that uses it is easier to train and often achieves better
performance.

The Pooling layer is responsible for reducing the spatial size of the
Convolved Feature while still retaining the important features. Image is
more resistant to small transformations, distortions, and translations to
the input image.
Two types of Pooling:
1. Max pooling: The maximum pixel value of the batch is selected.
2. Average pooling: The average value of all the pixels in the batch is
selected.

The final layer in the CNN is to connect all the dots and make a conclusion
within the input and output of the image. The output from the
convolutional/pooling layers represents high-level features in the data.
That output needs to be connected to the output layer, A fully-connected
layer is a cheap way of learning non-linear combinations of these features.
***ALL THE BEST***

You might also like