Ai One Shot Revision Notes - Class 10
Ai One Shot Revision Notes - Class 10
Types of Communication-:
1. Verbal Communication
2. Non Verbal Communication
3. Visual Communication
4. Written Communication
1. Verbal Communication-:
Verbal communication is the use of sounds and words to express
yourself, especially in contrast to using gestures or mannerisms (non-
verbal communication). Example-: Orally communicating.
2. Non-verbal Communication-:
Nonverbal communication refers to gestures, facial expressions, tone
of voice, eye contact, (or lack thereof), body language, posture, and other
ways people can communicate without using language.
3. Visual Communication-:
Visual communication is the transmission of information and ideas using
symbols and imagery. Types of visual communication include animated
GIFs, screenshots, videos, pie charts, infographics, and slide deck
presentations. It also includes signs, graphic designs, films, typography,
and countless other examples
4. Written Communication-:
A 'Written Communication' means the sending of messages, orders or
instructions in writing through letters, circulars, manuals, reports,
telegrams, office memos, bulletins, etc. It is a formal method of
communication and is less flexible.
Communication Cycle
Communication is one of the most vital elements of society. People need
people, and to interact, it's essential they be able to convey messages and
understand each other. The communication cycle expresses how the
system of conveying and understanding messages operates.
Sender: the person or entity originating the
communication.
Message: the information that the sender
wishes to convey.
Encoding: how the sender chooses to bring
the message into a form appropriate
forsending.
Channel: the means by which the message is
sent.
Receiver: the person or entity to whom the
message is sent.
Decoding: how the receiver interprets and
understands the message.
Feedback: the receiver's response to the
message.
Feedback in Communication
Feedback in Communication
The observation of the receiver's response is called feedback.
Importance of feedback in communication-:
1. It completes the whole process of communication and makes it
continuous.
2. It sustains communication process.
3. It makes one know if one is really communication or making sense.
4. It is a basis for measuring the effectiveness of communication.
5. It is a good basis for planning on what next to be done especially
statistical report.
6. Communication will be useless without feedback.
7. Feedback paves way for new idea generation.
8. It is a process of effective listening.
9. It serves as basis of problem-solving.
10. Can motivate.
11. It can improve performance.
Types of Feedback-:
Kinds of Sentences:
There are four kinds of sentences:
1. Assertive or declarative sentence or Statement
2. Integrative sentence (a Question)
3. Imperative sentence (a Command)
4. Exclamatory sentence (an Exclamation)
Parts of a sentence-:
Every complete sentence contains two parts---
1. Subject
2. Predicate.
Subject-:
A subject is a word or group up of words which conveys the name of the
person or think that we are asking about.
Predicate-:
On the other hand, It is the part of the sentence which contains a verb, and
state something about the subject.
MCQ’s
Q1. Which of the following is NOT an element of communication
within the communication process cycle?
A) Channel
B) Receiver
C) Sender
D) Time
Q5. What are the types of words we should use for verbal communication?
A) Acronyms
B) Simple
C) Technical
D) Jargons
Q6. Which of the following is an effective components of good feedback?
A) Detailed and time consuming
B) Indirect
C) Specific
D) Opinion-based
Self-Management Skills
Self-management, which is also referred to as 'self-control' or 'self-
regulation', is the
ability to regulate one's emotions, thoughts, and behavior effectively
in different situations. This includes motivating oneself, and setting
and working towards personal and academic goals.
Domains of Self-Management Skills
i. Stress Management
ii. Self-Awareness – Strength and Weakness Analysis
iii. Self-Motivation
iv. Self-Regulation – Goal Setting
v. Self-Regulation – Time Management
Stress Management
We all face many ups and downs in life. Every individual has different
lifestyle and each lifestyle has its own responsibilities. Everyone has to
shoulder the responsibilities and face the challenge of life. This sometimes
creates a situation of stress when we are not able to handle the situation as
per our requirements or choice.
Stress
In our lives, when we encounter a situation that challenges us, our body
and mind react in certain way as a response. This response sometimes
helps us get past those events and come out as victors but sometimes this
response affects us adversely. This is called stress.
There can be two types of stress - good stress and bad stress.
Good Stress
Good stress helps us to go about our daily task and achieve those hard-
to-reach goals. This stress called eustress, helps us learn new things,
adapt to change an engage in creative thinking. Everyone experiences
good stress on a daily basis. Another form of good stress that enable us to
survive in times of trauma. This stress makes us aware of danger and
enables us to escape when we need to.
Bad Stress
Bad stress refers to a stress that is ongoing and does not lower down.
When one can’t stop worrying and is unable to do the required thing in
normal way, it is bad stress. Bad stress is overwhelming and prevent one’s
daily routines also. Bad stress is a negative form of stress and it hinders
your progress. It even affects body’s immune systems and causes
emotional distress too.
Independent Working
An independent worker usually means someone who does not need to be
led by anyone at every step. The people who work independently know that
they have to take initiative and act accordingly.
Important things about independent working are:
Taking initiative rather than waiting to do so
Take full responsibility of the work
Ready to do unsupervised work, do not required constant
supervision.
Learning to work at a pace that you can sustain
Capable of completing the work within stipulated time and budget
and that too as per stated objectives and deliverables.
Advantage:
You can work at your own pace not depending on someone else.
You can concentrate easier and work easier.
You get the whole credit for the work you do since you are working
alone.
You get to make your own decisions.
Disadvantage:
You have to motivate yourself.
You are the sole person responsible for the job. If you fail, it is your
fault.
You can get bored working all by yourself. There is no one to talk
to, share ideas with or get help from.
When you are working alone, if you get sick or need to take
days off, the work will be delayed because there will no
anyone to continue it for you.
Self – Motivation
Self-motivation is the force inside us that drives us to do things. Self-
motivation is what forces us to achieve our goals, feel happy and improve
our quality of life. It is our ability to so the things that need to be done
without others or something influencing us. Self-motivation is our internal
drive to achieve, produce, develop, and keep moving forward. When we
think we are ready to quit something, or we just do not know how to start,
your self-motivation is what pushes on.
Types of Motivation:
Intrinsic motivation: This is the force that leads us to achieve a
goal because of personal satisfaction or desire. Examples are:
- Setting up our own business.
- Participating in a competition.
Extrinsic motivation: This is the driving force that drives us to
achieve your goal, such as:
- Money
- Prize
Self-Regulation (Goal Setting)
Self-regulation is concerned with how you control and manage yourself your
emotions, your inner resources, and abilities. It also includes your ability to
manage your impulses.
Goals Setting:
Goals are those dreams that you want to achieve in life but these dreams
have a deadline to get them, i.e. saving pocket money to buy a favourite
mobile phone by a particular date.
Goal setting is the process of planning and taking active step to achieve the
desired outcome. Setting goal is not enough, rather goals should so chosen
that it should be achievable.
SMART Goals:
SMART is an acronym used for goal setting. To make sure that the chosen
goals are clear and reachable, they should be SMART, i.e.
Specific (simple and sensible)
Measurable (meaningful)
Achievable (attainable)
Relevant (reasonable, realistic and resourced, result-based)
Time bound (timely, time-sensitive)
Self – Regulation (Time Management)
Producing expected results in a timely manner determines the
success of our effort. Time management is an extremely important
self-management skill that makes an individual more
productive. Time management helps you to accomplish your goals and
reduce work-related stress. “Time management” is the process of
organizing and planning how to divide your time between specific
activities.
A computer can get infected with virus in any of the following ways:
• Infected files
• Infected pen drives
• Infected CD-ROMs/DVD-ROMs
• Through infected file attachment of e-mails
A computer virus cannot do the following:
• It cannot infect files on CD or DVD, if they are closed for writing.
• It cannot infect computer hardware like, keyboard, mouse, etc.
Common signs of a virus attack are:
• Computer runs very slow
• There is change in the file size
• Computer often stops responding
• There is an increase in number of files (unusual)
• Unusual error message appears on the screen
• Computer restarts on its own
Threats to Computer:
Threats are the ways in which personal information can be leaked from a
computer without our knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be of
three types:
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and
assumes your identity. Using this false identity, the hacker can gain
access to your account information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or
distributing unlicensed and unauthorised copies of a computer
program or software.
(b) Virus: Viruses are computer programs that can damage the data and
software programs or steal the information stored on a computer. Major
types of viruses are Worms and Trojan Horse. Worms are viruses that
replicate themselves and spread to all files once they Information and
Communication Technology Skills 81 attack a
computer. This makes it very difficult to remove them. A Trojan Horse
disguises itself i.e., it appears to be a useful software program but once it
reaches a computer it starts behaving like a virus and destroying data.
(c) Online Predator: Online predators are people who trap you into
inappropriate relationships. They may be older people posing to be your
age, bullying you into doing illegal activities online and sometimes face to
face.
(d) Internet Scams: Sometimes you may receive very attractive offers
saying you have won huge money in a lottery and that you can claim the
prize by depositing a certain amount of money. When you deposit the
money using credit card or online banking, you not only lose the deposit
money but your card/account information may be misused later.
Firewall:
Computer firewall could be a programmable device or a software or a
network security system that monitors and controls incoming and
outgoing network traffic based on user-defined security rules.
Cookies:
Cookies are small files which are stored on a user’s computer when you visit a
website on the internet. These files typically contain information about your visit to
the webpage or record your login information. This may not always be bad. For
example, if you are exploring an online shopping website, most of the online
retailers use cookies to keep track of the items in a user’s shopping cart, otherwise,
your shopping cart would be reset to zero every time you click on a new link on the
website
FUNCTIONS OF AN ENTREPRENUER:
MISCONCEPTIONS/MYTHS:
Every business idea needs to be unique or special.
A needs a lot of money to start a business.
Only a person having a big business is an entrepreneur.
Entrepreneurs are born, not made.
4. Assertion (A). Equity financing and Debt financing are two ways of
funding a startup.
Reason (R). In equity financing, some share is given to the financer and in
debt financing, interest is given to the financer.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
UNIT – 4 GREEN SKILLS
SUSTAINABLE DEVELOPMENT
Sustainable development means meeting today’s needs without
harming future generations' ability to meet their own needs. It balances
economic growth, environmental protection, and social equality,
ensuring resources are used responsibly and fairly so that both people
and the planet can thrive now and in the future.
What is Intelligence?
According to researchers, an intelligence is the 'ability to perceive or
infer information and as knowledge to be applied towards adaptive
behaviors within an environment or context
Types of Intelligence
What is Artificial Intelligence?
AI is a form of Intelligence; a type of technology and a field of study. When a
machine possesses the ability to mimic human traits, i.e., make decisions,
predict the future, learn and improve on its own, it is said to have artificial
intelligence. In other words, you can say that a machine is artificially
intelligent when it can accomplish tasks by itself - collect data, understand
it, analyse it, learn from it, and improve it.
KWLH CHART
• What I Know?
K
• What I Want to know?
W
• What have I learned?
L
H • How I learnt this?
Artificial Intelligence (AI)
Refers to any technique that enables computers to
mimic human intelligence. It gives the ability to
machines to recognize a human’s face; to move and
manipulate objects; to understand the voice
commands by humans, and also do other tasks.
The AI-enabled machines think algorithmically
and execute what they have been asked for
intelligently.
Introduction to AI Domains
Artificial Intelligence becomes intelligent according to the training
which it gets. For training, the machine is fed with datasets.
According to the applications for which the AI algorithm is being
developed, the data which is fed into it changes. With respect to the
type of data fed in the AI model, AI models can be broadly categorised
AI Ethics
A set of principles that guide how artificial intelligence (AI) is
developed and used. The goal AI ethics is to ensure that AI is used
responsibly and safely, and that it is environmentally friendly and
humane.
Data Privacy
The world of Artificial Intelligence revolves around Data
Data privacy ensures the ethical and lawful use of data. It focuses on how
data is collected, used, shared, and stored so that the rights of individuals
over their data is protected.
Data security
Data security ensures the protection of data from unauthorised access and
breaches. It focuses on safeguarding personal data, business data,
intellectual property, and many more from various threats
Different types of data security controls
Strong password
Authentication
Access Controls
Data Backup
Encryption
Firewall and Antivirus Software
Al Bias:
It refers to Al systems that produce biased results that reflect and
perpetuate human biases within a society, including historical and current
social inequality.
Al Access
Artificial Intelligence is still a budding technology, not everyone has the
opportunity to access it. The people who can afford AI enabled devices make
the most ofi t while others who cannot are left behind.
Competency Based Questions
1. Raja has great rhythm, a knack for creating, singing or playing melodies.
At a young age he has created many compositions and won many awards.
She possesses intelligence
(a) logical (b) musical (c) linguistic (d) bodily-kinesthetic
2. Whenever Navya faces a problem about anything and starts feeling
anxious, he likes to play time within herself clearly understands her own
views and opinions, feelings and anxieties, and even goals dreams. He
possesses intelligence.
(a) interpersonal (b) intrapersonal (c) naturalistic (d) social
3. Mr. Dinakar, a Computer Science teacher, has developed an educational
humanoid namely Siju, which can converse in 47 languages. Which Al
technology helps the robot, converse with us humans?
(a) NLP (b) Computer Vision (c) ML (d) Data
Science
4. To help the field of agriculture, the government is using many AI
technologies. One such usage optimizing yield production by using data
from sensors and satellites while considering climatic conditions. This
requires a great computation and complex models having many-many
computational layers. Which Al technology do you think it may be based on?
(a) ML (b) Computer Vision (c) DL (d) NLP
5. BEWell is a health service that serves as a trusted, personalized health
guide. BEWell guides people through the right health journey based on their
pre-existing conditions, ongoing health concerns and gaps in general health
knowledge. The health engine combines both personal and external health
and medical reports to provide informed advice based on other user
experiences. Which of these Al domains are the prime factor of BEWell
services ?
(a) Computer Vision (b) NLP (c) Data (d) All of these
6. Google Maps, the search giant's technology, with Al-enabled mapping,
scans road information and uses algorithms to determine the optimal route
to take, be it on foot or in a car, bike, bus or train. It also gives voice
instructions about the route. Which of these Al domains are the prime factor
of Google Maps services?
(a) Computer Vision (b) Data (c) NLP (d)
All of these
7. Facebook research developed two Al based chatbots namely Alice and
Bob. But after some time facebook shutdown these chatbots. The reason
told behind it was that Alice and Bob developed own language after few
exchanges and started interacting in that language. This case is clear
indicator of AI ethics ___________________
(a) Trust, Privacy and Control (b) Accountability (c) Human rights and AI
(d) All of these
Assertion and Reasoning questions
8. Assertion (A). Al means mimicking human intelligence.
Reason (R). Al does not mean just the automation.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
9. Assertion (A). The inter-personal and intra-personal intelligence is about
knowing understanding the moods, feelings and gestures,
Reason (R). The inter-personal and intra-personal intelligence are the same
thing
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
10. Assertion (A). Deepfake is a technology that can generate fake digital
photos, sound recording and video, which look just as original as possible.
Reason (R). Deepfake falls in the domain of Al ethics.
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true but R is not the correct explanation of A.
(c) A is true but R is false (or partly true).
(d) A is false (or partly true) but R is true.
(e) Both A and R are false or not fully true.
1.Problem Scoping
It is a fact that we are surrounded by problems. They could be small or big,
sometimes ignored or sometimes even critical. Many times, we become so
used to a problem that it becomes a part of our life. Identifying such a
problem and having a vision to solve it, is what Problem Scoping is
about.
Who
The “Who” block helps in analysing the people getting affected directly or
indirectly due to it. Under this, we find out who the ‘Stakeholders’ to this
problem are and what we know about them.
What
2.Data Aqusition:
This is the second stage of Al Project cycle. According to the term, this stage
is about acquiring data for the project.Data can be a piece of information or
facts and statistics collected together for reference or analysis.
Training Data collected during the initial stage of processing
Testing Data-used for Evaluating the model
Data Features
3. Data Exploration:
Data exploration is the process of analyzing raw data to identify
patterns, characteristics, and relationships
Data exploration is the first step in data analysis
To visualise data, we can use various types of visual representations
like Bargraph, Histogram, Line Chart, Pie Chart.
Why to explore data:
o Quickly get a sense of the trends, relationships and patterns
contained within the data
o Define strategy for which model to use at a later stage.
o Communicate the same to others effectively.
4.Data modelling
Rule-based approach Learning-based approach
In this approach, the machine In this approach, the machine
follows rules or instructions learns by itself
mentioned by the developer.
The machine once trained, doesn’t This type of approach facilitates the
take into consideration any changes acquisition of new knowledge.
made in the original dataset
Learning is static Learning is dynamic
Supervised Learning:
In a supervised learning model, the dataset which is fed to the machine is
labelled. A label is some information which can be used as tag for data.
Classification: This model works on
discrete dataset which means the data
need not be continuous.
Regression : This model works on
continuous data.
Unsupervised Learning:
An unsupervised learning model
works on unlabelled dataset. This
means that the data which is fed to
the machine is random. This model is
used to identify relationships, patterns
and trends out of the data which is fed into it.
Clustering: It refers to the unsupervised learning algorithm which can
cluster the unknown data according to the patterns or trends identified out
of it.
Dimensionality Reduction: We humans are able to visualise upto 3-
Dimensions only but, there are various entities which exist beyond 3-
Dimensions. Dimensionality reduction algorithm is used to reduce their
dimensions.
5.Evaluation
Once a model has been made and trained, it needs to go through proper
testing so that one can calculate the efficiency and performance of the
model.
Efficiency of the model is calculated on the basis of the parameters
mentioned below:
1. Our brain keeps on processing the sounds that it hears around itself
and tries to make sense of them all the time.
2. The sound reaches the brain through a long channel. As a person
speaks, the sound travels from his mouth and goes to the listener’s
eardrum. The sound striking the eardrum is converted into neuron
impulses, gets transported to the brain, and then gets processed.
3. After processing the signal, the brain gains an understanding of its
meaning of it. If it is clear, the signal gets stored. Otherwise, the
listener asks for clarity from the speaker. This is how human
languages are processed by humans.
Computer Language
Data Processing
Data processing is the collection and manipulation of digital data to produce
meaningful information.It is usually performed in a step-by-step process
1.Text Normalisation
2. Sentence Segmentation
After segmenting the sentences, each sentence is then further divided into
tokens. A “Token” is a term used for any word or number or special
character occurring in a sentence.
4.Removal of Stopwords
In this step, the tokens which are not necessary are removed from the token
list. To make it easier for the computer to focus on meaningful terms, these
words are removed.
Stopwords are the words that occur very frequently in the corpus but do not
add any value to it.
Examples: a, an, and, are, as, for, it, is, into, in, if, on, or, such, the, there,
to.
As the name suggests, we e convert the whole text into a similar case,
preferably lower case. This ensures that the case sensitivity of the machine
does not consider the same words as different just because of different
cases.
6.Stemming
Stemming is a technique used to extract the base form of the words by
removing affixes from them. It is just like cutting down the branches of a
tree to its stem
7.Lemmatization
In lemmatization, the word we get after affix removal (also known as lemma)
is a meaningful one and it takes a longer time to execute than stemming.
Difference between Stemming and Lemmatization
Lemmatization Stemming
Bag of Words
Bag of Words
Bag of Words is a Natural Language Processing model which helps in
extracting features out of the text which can be helpful in machine
learning algorithms. In bag of words, we get the occurrences of each
word and construct the vocabulary for the corpus.
Here is the step-by-step approach to implement bag of words algorithm:
1. Text Normalisation: Collect data and pre-process it
2. Create Dictionary: Make a list of all the unique words occurring in
the corpus. (Vocabulary)
3. Create document vectors: For each document in the corpus, find
out how many times the word from the unique list of words has
occurred.
4. Create document vectors for all the documents.
Competency based questions
1. Rutgers Archive is one of the oldest repositories of many art and science
articles and research papers. In last few years, it has started feeling that its
database now contains lakhs of articles and searching in these articles is
becoming slower. So, they want that there should be a way that should
bring out the main keywords and the synopsis of the articles so that
searching becomes easier and faster. Which NLP technique would be the
most useful in this?
(a) Text classification (b) Automatic text summarisation (c) Sentiment
analysis (d) None of these
2. XYZ university has sensed something in the changing behaviour of its
students. The management of the university wants to know what exactly is
going in students' minds. So it has hired an expert to study the social media
posts of the students to gauge out the real mood of the students. Which NLP
technique will make it possible?
(a) Sentiment analysis (b) Automatic text summarisation
(c) Text classification (d) None of these
3. Siri and Google Assistant can interact with you through chats also, just
like other chatbots. But last time when you asked Siri about your preferred
ice-cream, it did not know. After you told it, it now can easily take about
your favourite flavour of the ice-creams. Every time it learns something new
about you, it registers it in its memory. What type of chatbot is it?
(a) Text based (b) Script bot (c) Voice based (d) Smart bot
4. Rutgers' archive has installed a Chabot for its users where users can ask
about the articles and papers stored in the archive. However, all the details,
rules and information about the article and research papers is already fed in
the Chabot program and won't alter anytime. What type of chatbot is it?
(a) Text based (b) Voice based (c) Script bot (d) Smart bot
6. Nikita has now changed her text normalisation programs. She used the
same words:
Which of the following techniques did she use in her program this time ?
1. Assertion (A). Siri and Alexa like smart assistants make use of NLP
(Natural Language Processing).
Reason (R). NLP enables technology to process human languages in the form
of text or voice data, to understand its full meaning.
Evaluation Methods
Accuracy
Accuracy is defined as the percentage of correct predictions out of all the
observations.
Precision
Precision is defined as the percentage of true positive cases versus all the
F1 Score
Convolution
Convolutions are one of the most critical, fundamental building blocks in
computer vision and image processing.
The next layer in the CNN is the Rectified Linear Unit function or the
ReLU layer. This layer simply gets rid of all the negative numbers in the
feature map and lets the positive number the stay as it is. It has become
the default activation function for many types of neural networks because
a model that uses it is easier to train and often achieves better
performance.
The Pooling layer is responsible for reducing the spatial size of the
Convolved Feature while still retaining the important features. Image is
more resistant to small transformations, distortions, and translations to
the input image.
Two types of Pooling:
1. Max pooling: The maximum pixel value of the batch is selected.
2. Average pooling: The average value of all the pixels in the batch is
selected.
The final layer in the CNN is to connect all the dots and make a conclusion
within the input and output of the image. The output from the
convolutional/pooling layers represents high-level features in the data.
That output needs to be connected to the output layer, A fully-connected
layer is a cheap way of learning non-linear combinations of these features.
***ALL THE BEST***