AI Notes (Prashant Kirad) Class 10
AI Notes (Prashant Kirad) Class 10
NOTES
1. Introduction to Communication
Definition: Sharing information between individuals or groups for understanding.
Importance:
Helps in expressing thoughts clearly.
Improves relationships and teamwork.
Essential for career and professional growth.
2. Types of Communication
Verbal Communication:
Oral (Spoken): Face-to-face, phone calls, presentations.
Written: Letters, emails, reports.
th
Non-verbal Communication:
Body language, gestures, facial expressions, eye contact.
Visual Communication: 10
&
Charts, diagrams, signs, symbols, infographics. JOSH METER?
h
3. Elements of Communication
9t
4. Barriers to Communication
Language Barriers: Use of difficult or unfamiliar words.
Emotional Barriers: Fear, anger, sadness affecting clarity.
Physical Barriers: Noise, poor internet, distractions.
Cultural Barriers: Different cultural interpretations of words/signs.
Parts of Speech:
th
Conjunction: Joins words/sentences (and, but, or).
10
Interjection: Shows emotions (Wow! Oh no!). &
7. Non-verbal Communication
h
Assertive Communication:
Express yourself confidently and clearly.
EX
Punctuation Rules:
Full stop (.): End of a sentence.
Comma (,): Pauses and lists.
Question mark (?): Asking questions.
Exclamation mark (!): Expressing emotions.
Top 5 MCQ
th
1. What is the main purpose of communication?
10
a) To share information
b) To confuse the listener
&
c) To speak loudly
d) To use difficult words
h
a) Noise
U
b) Clear pronunciation
PH
c) Cultural differences
d) Emotional stress
EX
Top 10 Questions
1. What is communication? Explain its importance.
Answer: Communication is the process of sharing information, thoughts, and ideas
between individuals or groups to create understanding.
Importance of Communication:
Helps in expressing thoughts clearly.
th
Essential for personal and professional success.
Builds strong relationships.
10
Aids in decision-making and problem-solving.
&
2. What are the elements of communication?
Answer: The main elements of communication are:
h
visual).
U
th
10
8. What is assertive communication? Why is it important?
Answer: Assertive communication is a communication style where a person
expresses thoughts, feelings, and needs confidently while respecting others.
&
Importance:
h
th
Responsibility: Embrace accountability for your tasks as a crucial step in self-
10
development. Whether assigned a task by a teacher or employer, taking
complete ownership is paramount. If challenges arise, communicate
proactively, report delays, and take corrective action promptly.
&
Time Management: Efficiently prioritize tasks and eliminate unnecessary
h
circumstances.
What is Stress?
EX
Management Techniques:
Effective stress management techniques include:
1. Time Management: Prioritize tasks to alleviate stress.
2. Physical Exercise and Fresh Air: Engage in activities like yoga or meditation for
th
better blood circulation and relaxation. Outdoor activities provide fresh oxygen,
enhancing overall well-being.
10
3. Healthy Diet: Maintain a balanced diet, incorporating staples like dal, roti,
vegetables, and fruits for sustained energy and efficiency.
&
4. Positivity: Focus on positive aspects rather than dwelling on negatives. Adopting
a constructive attitude can help overcome challenges, such as improving
h
6. Holidays with Family and Friends: Break from routine by spending quality time
U
return.
Emotional Intelligence:
EX
Emotional intelligence involves recognizing and handling both personal and others'
emotions effectively.
1. Emotional Awareness: This skill encompasses the capability to identify and label
one's own emotions.
2. Harnessing Emotions: The adeptness to channel and utilize emotions for
cognitive processes, such as thinking and problem- solving.
3. Managing Emotions: This facet involves the skill to regulate one's own emotions
as needed and assist others in achieving emotional regulation.
Finding Strengths (Abilities):
1. Reflect on consistent successes.
2. Consider positive traits others appreciate in you.
3. Dedicate time to identify your competencies.
Finding Weaknesses:
1. Identify challenging areas and tasks. and tasks.
2. Pay attention to feedback from others.
3. Embrace feedback openly for self-improvement.
PRASHANT KIRAD
Interests:
1. Pleasurable activities in free time.
2. Curiosity-driven or self-motivated pursuits.
3. Future learning or desired activities.
Abilities (Strengths):
1. Natural or acquired capacities.
2. Proficiency in performing specific tasks or jobs.
Self-Motivation:
Internal drive propelling action, fostering goal achievement, happiness, and
enhanced quality of life. It's the capacity to act independently without external
influence.
Types of Motivation:
- Internal Motivation: Driven by personal satisfaction, happiness, and well-being,
such as learning a new skill during an annual function.
th
- External Motivation: Fueled by external rewards like respect, recognition, and
appreciation, as seen when Suresh's prize in a 100m race motivates him to
practice regularly.
10
&
Top 5 MCQ
h
9t
B
(b) Think about the difficult test you will face during the day.
(c) Think about all your accomplishments so far and feel good about them.
EX
(d) Think about the traffic on the road and feel stressed.
Answer: (c)
2. Do you think people living in hill stations can skip taking a bath for many
days?
(a) No, irrespective of the climate, one should take a bath regularly.
(b) Yes, not taking bath for many days is acceptable for people staying in cold
climate.
(c) Yes, if they wipe themselves with a wet cloth, then it is fine.
(d) None of the above
Answer: (a)
4. When you are under __________ for a prolonged period, it can cause health
problems and mental troubles as well.
a. Stress
b. Discipline
c. Timeliness
d. Goal – Setting
Answer: (a)
Top 10 Questions
th
Q1. What do you mean by Self-management?
Ans. Self-management, also referred to as ‘self-control,’ is the abilityto control
10
one’s emotions, thoughts and behavior effectively indifferent situations.
&
Q2.Give any two examples where a small amount of stress is helpful. of
stress is helpful.
h
1. A fire alarm is intended to cause stress and alert you to avoid danger.
2. The stress created by a deadline to finish a paper can motivate you tofinish it
B
on time.
U
PH
a. Headache
b. Sleeplessness
c. Sadness
d. Excessive worrying
e. Nervousness
4. Write four qualities of those people who work independently.
Ans: 1. Possessing self-awareness, self-monitoring skills, and the ability toself-
correct.
2. Taking initiative without needing explicit instructions.
3. Demonstrating a capacity for continuous learning.
4. Acknowledging and learning from their own mistakes.
Interests Abilities
th
Q7. Write the Qualities of self–confidence.
10
Ans: Qualities of self–confident people –
a. Self–belief – Always believe in yourself and respect the failures, that
&
make you successful in life.
b. Hard Work – Work hard to achieve the goal, don’t be afraid of failures.
h
trying to achieve.
B
Ans: There are three steps to build self – confidence are as follows –
PH
th
PROGRAM PROCESSING AND CONTROLLING COMPUTER OPERATIONS. IT
10
PERFORMS SEVERAL KEY FUNCTIONS:
1. Supervising hardware by monitoring each device's status and usage.
2. Ensuring proper functionality of hardware devices.
&
3. Managing software resources.
h
each software.
5. Organizing files and directories within the computer system.
B
deletion.
th
CREATING AND MANAGING FILES AND FOLDERS
Files – Every single thing you keep on your computer is kept as a file. A file
10
system is a method for naming, storing, and retrieving files.
Creating Files:
&
1. Right-click on any empty space within the right column.
h
2. From the shortcut menu, choose "New" and then select the desired file
9t
3. Input the new name or modify the existing one, then press the Enter key.
4. Alternatively, simply select the file/folder and press the function key F2.
EX
Creating a Folder:
1. Double-click the Computer icon.
2. Select the drive where you wish to create the folder, such as Local Disk D:.
3. A window will open, displaying the files and folders on Local Disk D:.
4. Click on "New Folder" in the toolbar.
5. A new folder named "New Folder" will be created, with the name
highlighted.
PRASHANT KIRAD
BASIC SHORTCUTS
CTRL+ z — undo
th
CTRL+ y — redo
10
CTRL+ a — select all
CTRL+ x — cut
CTRL+ c — copy
&
CTRL+ v — paste
h
CTRL+ p — print
9t
CTRL+ s — save.
B
failure may result from poor maintenance. You may be able to keep it in good
working order by giving it routine care and maintenance. Installing updates,
security, creating backups, and scanning are all part of routine system
EX
maintenance
Always ensure the computer system is powered off before beginningthe cleaning
process.
Avoid spraying cleaning fluid directly onto computer components. Instead, apply
the liquid onto a cloth and then use it to wipe the components.
Take care not to allow any cleaning liquid to drip near the circuit board.
It's recommended to use an anti-static wristband to prevent the accumulation
of static electricity near electronic devices.
th
Optical Mouse: Use a clean, lint-free cloth to wipe the bottom of the optical
10
mouse. Air or a cotton swab can be used to clean the lens area.
Digital Camera: Avoid touching the camera's lens directly. Use a soft lens
brush or a dry cloth to remove dust from the lens. For stubborn dust, apply
&
CDs and DVDs: Store CDs and DVDs in their proper cases to prevent damage.
h
Clean any dirt or fingerprints from CDs and DVDs by lightly rubbing them with
9t
longevity.
Some of the maintenance activities are:
EX
th
Cookies:
When a user visits an internet website, a small file called a cookie is stored on
10
their computer. These files are utilized to retain personalized information specific
to a particular client and website. A cookie is transmitted by a website upon your
&
visit and is stored on your computer in a file. Only the website that generated the
h
cookie can read it, and this information remains inaccessible to other servers.
9t
(ii) Screen: Wipe the screen with a soft cloth to remove fingerprints.
(iii) Handle Devices Carefully: Handle and move your laptop carefully to avoid
PH
Maintenance Schedule:
(a) Daily Maintenance:
i. Clean up your email inbox.
ii. Download email attachments and save them in proper folders.
(b) Weekly Maintenance:
i. Clean your keyboard.
ii. Clean your monitor.
PRASHANT KIRAD
th
Backing up data involves saving information from your computer onto another
10
device such as CD/DVD drives. This ensures data recovery in case of computer
failure due to crashes, human errors, or natural disasters like floods.
&
Scanning and Cleaning Viruses: Install antivirus software to prevent and clean
viruses from entering your system, safeguarding your data against potential
h
and data such as temporary files and images to free up hard disk space,
improving computer performance.
B
website. Such mails are called SPAM. We should never respond to SPAM and
delete it on a regular basis.
EX
Threats to Computer
Threats are the ways in which personal information can be leaked from a
computer without our knowledge.
(a) Theft: Theft means stealing of information or hardware. These may be
of three types:
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and assumes your
identity. Using this false identity, the hacker can gain access to your account
information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or distributing
unlicensed and unauthorised copies of a computer program or software.
(b) Virus: Viruses are computer programs that can damage the data and
software programs or steal the information stored on a computer. Major
types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all
files once they Information and Communication Technology Skills 81
PRASHANT KIRAD
th
(a) Use Strong Passwords: Utilize complex passwords that are difficult to guess,
incorporating a mix of lowercase and uppercase letters, numbers, and special
10
characters. This enhances security and prevents unauthorized access to your
computer.
&
(b) Install Anti-virus and Firewall: Implement anti-virus software and a firewall to
monitor incoming and outgoing data, preventing viruses from infiltrating your
h
9t
computer. Anti-virus programs also detect and eliminate viruses that may have
already infected your computer.
(c) Encrypt Data: Encrypt sensitive data stored on your computer, especially
B
encryption features like Bitlocker in Windows to encrypt the entire hard disk,
PH
(d) Use Secure Sites: Only provide credit card or bank account details on secure
sites. Look for "https://" and a lock symbol in the browser's address bar to ensure
the site is secure before entering sensitive information.
Top 5 MCQ
1. Which software manages all the devices of a computer and keeps track of
the status of the device, whether it is busy or not?
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
PRASHANT KIRAD
th
a. DOS
10
b. Windows
c. Linux
d. Disk Defragmentor
&
Answer: d. Disk Defragmentor
h
9t
b. iOS
U
c. Windows Phone
PH
d. Linux
Answer: d. Linux
EX
Top 10 Questions
1. What is ICT?
Answer : Information and Communication Technology (ICT) is an acronym for
information and communication technology. ICT helps in the proper sharing,
receiving, and processing of information, and an ICT device is a device that is used
for processing, storing, and delivering information to others. Examples of ICT
devices are – Laptop, Desktop, Tablets and Smartphones.
The goal of ICT is to bridge the gap between parents, educators, and students by
encouraging sustainable, cooperative, and transparent communication methods.
Advantages of ICT
a. Enhanced the modes of communication
b. Independent learning platforms Cost – efficient
c. Enhanced data and information security
d. Paperless – Eliminate the usage of paper
e. Better teaching and learning methods
f. Web – based LMS tools
Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology
th
3. What is BIOS?
10
Answer : BIOS stands for Basic Input/ Output System, It helps the computer
system to identify (Self-test) the paraperaphal devices which are connected to the
&
computer system and helps computers to load Operating System properly
h
b. Click or Double Click – Mouse allows you to select, open or delete files and
PH
th
Answer : We frequently install a large number of applications, which slows down
the computer. Always attempt to uninstall unnecessary applications, temporary
10
files, and antivirus software updates. &
8. What is a Security Break?
Answer : Security break is leakage of information stored in a computer. Your
h
personal information can be lost or leaked in two ways – We are not cautious
9t
when it comes to disclosing personal information via the internet. We share our
account information and passwords on unsafe websites. A person gets unauthorized
B
access to our computer. This can happen at work if we don’t log out before leaving
U
the computer.
PH
Answer : To protect our data from theft and viruses we can take the following
measures –
a. Use Strong password in your account – Make your passwords difficult to guess.
When creating a new password, attempt to use a combination of Small Character
Capital Character Special Character Numbers
b. Install Antivirus and Firewall –Anti-virus software and a firewall protect your
data from virus and from hackers.
c. Encrypt your data – Keep your information in an encrypted format to keep it
safe from unauthorized users.
d. Open only secure site – Before visiting a website, make sure the address begins
with https://. A website that begins with https:// is a secure website.
th
10
&
h
9t
B
U
PH
EX
PRASHANT KIRAD
1. Introduction to Entrepreneurship
Who is an Entrepreneur?
An entrepreneur is a person who:
✔ Introduces new ideas or improves existing ways of doing business.
✔ Identifies customer needs and provides solutions.
✔ Takes risks to earn a profit.
What is Entrepreneurship?
Entrepreneurship is the process of:
✔ Developing a business idea.
✔ Launching and running a business.
✔ Using innovation to meet customer demands and make a profit.
th
Types of Business Activities
10
Manufacturing Business: Converts raw materials into finished goods.
Example: A company producing packaged drinking water.
&
Trading Business: Buys and sells goods without producing them.
Example: A pharmacy selling medicines from different companies.
h
2. Values of an Entrepreneur
U
1. Confidence
Believing in oneself and taking calculated risks.
EX
3. Attitude of an Entrepreneur
Attitude refers to one’s approach towards a situation, work, or challenges.
An entrepreneur has a different attitude compared to an employee.
PRASHANT KIRAD
th
5. Coming Up with a Business Idea
10
A business idea should be:
Customer-driven – Solves a specific need.
&
Based on the entrepreneur’s interests or skills – Leads to passion and
motivation.
h
th
Selling in multiple markets (Scaling Up).
10
Offering decorative candle holders (Adding Substitutes).
&
Top 5 MCQ
h
9t
B
1. Who is an entrepreneur?
U
Top 10 Questions
th
10
&
1. Who is an entrepreneur?
Answer:
h
An entrepreneur is a person who introduces new business ideas, takes risks, and
9t
provides solutions to customer problems to earn a profit. They use innovation and
creativity to improve business processes.
B
U
2. What are the three types of business activities? Explain with examples.
PH
Answer:
The three types of business activities are:
EX
Entrepreneur Employee
Takes risks and makes independent Works under a manager and follows
decisions. instructions.
th
Identify competitors – Who else is selling similar products.
✔ Decide pricing – What price customers are willing to pay.
10
✔ Plan marketing strategies – How to attract more customers.
&
6. What are the different types of customer needs?
h
Answer:
9t
3. Unserved Needs – No solutions exist (e.g., solar lamps for villages without
U
electricity).
PH
4. Unknown Needs – Customers don’t realize they need them (e.g., video calls
before smartphones).
EX
th
2. Expand to More Customers – Open new shops or sell online. (Example: Selling
handmade bags on Amazon.)
10
3. Offer Related Products – Sell similar products to attract more buyers. (Example:
A candle shop also selling decorative candle stands.)
&
h
9t
B
U
PH
EX
PRASHANT KIRAD
th
Environmental Protection: Reduces pollution and environmental degradation.
10
Intergenerational Equity: Ensures resources are available for future generations.
chemical fertilizers.
9t
environmental harm.
PH
th
2. Environmental Issues Caused by Humans
10
Air Pollution – Smoke from industries, vehicles, and burning fossil fuels.
Water Pollution – Dumping garbage and untreated sewage into rivers and oceans.
&
Deforestation – Cutting down trees for urbanization, leading to soil erosion and
climate change.
h
Plastic Waste – Tons of plastic waste end up in the ocean, harming marine life.
9t
1. Individual Contributions
U
initiatives.
Clean Water and Sanitation: Practice water conservation and promote hygiene.
EX
th
Top 5 MCQ
1. What is the primary goal of Green Skills? 10
&
a) Increasing the use of fossil fuels
h
c) Coal energy
d) Hydropower
Answer: c) Coal energy
Top 10 Questions
1. What do you understand by Green Skills?
Answer: Green Skills refer to the knowledge, abilities, values, and attitudes
required to support a sustainable and resource-efficient society. These skills help
individuals contribute to environmental conservation and climate-friendly industries.
th
2. How do Green Skills contribute to sustainable development?
10
Answer: Green Skills help industries and individuals adopt environmentally friendly
practices, reduce pollution, conserve natural resources, and create eco-friendly jobs
&
that support long-term economic growth.
h
9t
power, hydropower).
Non-renewable resources are finite and take millions of years to form (e.g., coal,
U
th
10. How can businesses contribute to environmental sustainability?
10
Answer: Businesses can adopt green practices such as:
Using renewable energy sources
Reducing industrial waste
&
Implementing recycling programs
h
What is Intelligence?
Intelligence is the ability to think, learn, and apply knowledge to solve problems.
It involves:
Reasoning – Solving new problems and making logical decisions.
Learning – Adapting based on past experiences.
Understanding – Grasping complex concepts.
Perception – Processing sensory data (vision, sound).
Decision Making – Choosing the best possible outcome.
th
3. Spatial Intelligence – Understanding space and visuals (e.g., artists, architects).
4. Musical Intelligence – Sensitivity to sound patterns (e.g., musicians).
10
5. Bodily-Kinesthetic Intelligence – Physical coordination (e.g., athletes, dancers).
6. Interpersonal Intelligence – Understanding others (e.g., psychologists, teachers).
&
7. Intrapersonal Intelligence – Self-awareness (e.g., philosophers).
h
Decision Making
U
Applications of AI Around Us
1. Speech Recognition: Google Assistant, Siri, Alexa.
2. Image Recognition: Face unlock, Google Lens.
3. Self-Driving Cars: AI makes driving decisions.
4. Recommendation Systems: YouTube, Amazon, Netflix.
5. Healthcare: AI diagnoses diseases from X-rays and scans.
6. Security Systems: AI-powered CCTV surveillance.
7. Customer Support: AI chatbots on websites.
th
Internet of Things (IoT) – Smart devices connected to the internet (e.g., Smart
AC).
10
Rule-based Programs – Fixed instructions, no learning (e.g., Calculators).
&
2. Basics of AI
h
Artificial Intelligence Broad team for machines that Virtual Assistants like Siri,
PH
AI Domains
1. Data Science – Extracting meaningful insights from large datasets.
Example: Price comparison websites, fraud detection in banking.
2. Computer Vision – Machines understanding and analyzing visual information.
Example: Face recognition, medical image analysis.
3. Natural Language Processing (NLP) – Machines understanding human language.
Example: Google Translate, chatbots, spam filters.
PRASHANT KIRAD
3. AI Ethics
Moral Issues in AI (Self-Driving Car Example)
AI may have to choose between saving a pedestrian or the car’s passengers.
Who should be held responsible?
1. The Car Owner?
2. The AI Developer?
3. The Pedestrian?
These moral dilemmas show why ethical AI programming is important.
Data Privacy
AI collects personal data from:
Websites (Google, Facebook).
Smartphones (location tracking).
Social media (user preferences).
th
Issues:
10
Misuse of private data.
Targeted ads based on personal conversations.
Cybersecurity risks.
&
h
Solution:
9t
AI Bias
PH
AI learns from data, and biased data can cause unfair decisions.
Examples of Bias in AI:
EX
Solution:
Use diverse training data to make AI fair and unbiased.
Top 5 MCQ
1. Which of the following is an example of AI in daily life?
a) Washing clothes manually
b) Playing a musical instrument
c) Google Assistant
d) Writing a book
Answer: c) Google Assistant
th
d) Non-Linear Processing
10
Answer: c) Natural Language Processing
b) Computer Vision
9t
c) NLP
d) Robotics
B
c) Super AI
d) Basic AI
Answer: d) Basic AI
Top 10 Questions
1. Define Artificial Intelligence.
Answer : Artificial Intelligence (AI) is the simulation of human intelligence in
machines, allowing them to perform tasks such as learning, reasoning, problem-
solving, and decision-making.
Example: AI chatbots like ChatGPT can understand and respond to human
conversations.
th
Alexa help users with queries and tasks.
2. Recommendation Systems – Platforms like Netflix, YouTube, and Amazon suggest
10
movies, videos, or products based on user preferences.
3. Self-Driving Cars – AI enables autonomous vehicles like Tesla Autopilot and
&
Waymo to navigate roads safely.
h
Answer :
B
Artificial Intelligence Broad team for machines that Virtual Assistants like Siri,
(AI) mimic human intelligence. Alexa.
EX
Key Points:
AI is the broad concept, while ML and DL are specialized fields within AI.
ML involves learning from data, and DL focuses on deep neural networks for
more complex tasks.
th
unfair data.
10
6. What is the difference between Narrow AI and General AI?
Answer : Narrow AI: AI designed for a specific task (e.g., voice assistants, spam
&
filters).
General AI: AI that can perform multiple tasks and reason like a human (still under
h
research).
9t
Examples:
Narrow AI: Google Assistant, Chess-playing AI, Email spam filters.
B
General AI: Theoretical AI that can think and make decisions like humans.
U
PH
th
2. Recommendation Systems – Netflix recommends shows based on user preferences.
10
3. Fraud Detection – Banks use AI to detect fraudulent transactions.
&
h
9t
B
U
PH
EX
PRASHANT KIRAD
AI Project Cycle
The AI Project Cycle is a structured approach to developing AI-based solutions. It
has five stages:
1. Problem Scoping
Problem scoping is the process of identifying a problem and understanding its
impact. To define the problem clearly, we use the 4W Problem Canvas:
Who is facing the problem? This includes individuals, businesses, or
organizations affected by the issue.
What is the nature of the problem? Evidence such as surveys, news reports, or
real-life experiences can help define the problem.
Where does the problem occur? Identifying the context or location where the
problem happens frequently is important.
th
Why is it important to solve? Understanding the benefits of solving the problem
helps justify the AI solution.
10
For example, if food wastage in restaurants is a problem, stakeholders like
restaurant owners and customers are affected. The problem happens in
&
restaurants due to poor demand prediction. Solving it would help reduce costs and
minimize waste.
h
9t
2. Data Acquisition
Data acquisition involves gathering relevant and reliable data to train an AI model.
B
observations.
Secondary Data is obtained from existing sources like government reports,
EX
3. Data Exploration
Data exploration is the process of analyzing and understanding the data to find
useful patterns.
values. It also helps in identifying trends that can improve AI model performance.
PRASHANT KIRAD
Different types of data visualization techniques are used to make sense of the
data:
Bar Graphs help compare quantities, such as the number of customers visiting
a restaurant each day.
Line Charts show trends over time, like food wastage increasing on weekends.
Pie Charts represent proportions, such as the percentage of different food
items wasted.
Scatter Plots identify relationships between two variables, like the effect of
discounts on food sales.
For example, analyzing restaurant sales data may reveal that food wastage is
highest on weekends due to incorrect demand forecasting.
4. Modelling
Modelling is the process of developing an AI system that can analyze data and
make predictions.
th
There are two main approaches to building AI models:
10
Rule-Based Approach: The AI follows predefined conditions set by humans. For
example, a chatbot that gives fixed responses based on user inputs.
&
Learning-Based Approach (Machine Learning): The AI learns patterns from
data and improves over time. For example, AI predicting future food demand
h
5. Evaluation
Evaluation is the process of testing the AI model to check its accuracy and
efficiency.
To assess model performance, various metrics are used:
Accuracy measures the percentage of correct predictions.
Precision checks how many of the predicted positive cases were actually
correct.
Recall measures how many of the actual positive cases were correctly
identified.
F1 Score balances precision and recall to give an overall performance score.
PRASHANT KIRAD
Neural Networks
Neural networks are advanced AI models inspired by the human brain. They
consist of layers of interconnected nodes (neurons) that process data.
Structure of a Neural Network
A neural network has three main layers:
1. Input Layer: Takes raw data, such as image pixels in face recognition.
2. Hidden Layers: Process the data and extract meaningful patterns.
3. Output Layer: Provides the final prediction or classification.
Neural networks work by adjusting their internal connections (weights and biases)
to improve accuracy. The more hidden layers a neural network has, the more
complex tasks it can perform.
th
How Neural Networks Work?
10
Each neuron processes information and passes it to the next layer. The network
learns by adjusting its weights and biases based on training data. This process
&
helps the AI recognize patterns, classify objects, and make predictions.
For example, in face recognition technology, a neural network analyzes facial
h
Face Recognition: AI scans and matches facial features for security systems
and phone unlocking.
EX
Top 5 MCQ
1. Which of the following is the first step in an AI project?
a) Model Selection
b) Data Collection
c) Problem Identification
d) Model Deployment
Answer: c) Problem Identification
th
d) To deploy AI solutions
10
Answer: b) To make the model learn from data
b) Model interpretability
9t
Top 10 Questions
1. What are the key stages of an AI project?
Answer : AI projects follow a structured lifecycle to ensure success. The key stages
are:
1. Problem Identification: Define the problem AI will solve.
2. Data Collection: Gather relevant data from various sources.
3. Data Preparation: Clean, preprocess, and transform data for model training.
4. Model Selection: Choose the right AI/ML model based on problem type.
5. Model Training & Testing: Train the model on data and test its performance.
6. Evaluation: Measure accuracy using metrics like precision, recall, and F1-score.
7. Deployment: Integrate the model into an application for real-world use.
th
10
2. Why is data important in AI projects?
Answer : AI models learn patterns from data to make predictions. If the data is
&
incomplete or biased, the model will be inaccurate.
Example: A self-driving car needs high-quality road and traffic data to function
h
safely.
9t
improve over time. It identifies patterns from historical data and applies them to
PH
new inputs.
Example: A spam filter in emails uses ML to classify messages as spam or not.
EX
th
unfairly reject certain candidates.
10
Data privacy: AI systems processing personal data (like facial recognition) raise
concerns.
Job displacement: Automation in industries may lead to unemployment.
&
h
users.
U
PH
th
1. Healthcare: AI analyzes medical images (X-rays, MRIs) to detect diseases.
10
Predicts patient conditions based on medical history.
Example: AI detecting cancer in CT scans.
&
2. E-commerce: AI recommends products based on browsing and purchase history.
Example: Amazon suggests products based on previous purchases.
h
ads.
U
5. Search Engines:
AI ranks search results based on relevance and user behavior.
EX
th
4. Data Storage Formats
10
After collection, data must be stored in proper formats for easy access and
analysis. Common formats include:
&
1. CSV (Comma-Separated Values): Stores tabular data in plain text.
h
4. JSON & XML: Formats used for data exchange between applications.
PH
Mean (Average): The sum of all values divided by the number of values.
Example: The average score of students in a class test.
Median: The middle value in a sorted dataset.
Example: The middle salary in a list of employee salaries.
Mode: The most frequently occurring value in a dataset.
Example: The most common customer rating in a survey.
Standard Deviation: Measures how spread out the data is from the mean.
Example: A high standard deviation in stock prices indicates high volatility.
6. Data Visualization
Data visualization makes complex data easy to understand. Common visualization
techniques include:
1. Bar Graphs: Used to compare different categories.
Example: Comparing sales in different cities.
2. Line Charts: Shows trends over time.
Example: Tracking temperature changes over a month.
PRASHANT KIRAD
3. Pie Charts: Represents proportions or percentages.
Example: Percentage of products sold by category.
4. Histograms: Shows the distribution of numerical data.
Example: Examining the age distribution of customers.
th
8. K-Nearest Neighbors (KNN) Algorithm
10
Introduction to KNN
KNN (K-Nearest Neighbors) is a machine learning algorithm used for
&
classification and regression.
It classifies a new data point by comparing it with K nearest existing data
h
2. Calculate the distance between the new data point and all existing data points.
PH
Top 5 MCQ
1. Which of the following is a supervised learning algorithm?
a) K-Means Clustering
b) Decision Tree
c) Apriori Algorithm
d) DBSCAN
Answer: b) Decision Tree
PRASHANT KIRAD
th
c) To visualize model output
10
d) To preprocess data
Answer: b) To measure the difference between predicted and actual values
&
5. Which tool is commonly used for big data processing?
h
a) NumPy
9t
b) Pandas
c) Apache Spark
B
d) Matplotlib
Answer: c) Apache Spark
U
PH
Top 10 Questions
EX
th
its performance.
This workflow helps in making informed decisions and improving predictions.
10
3. What is Feature Engineering and why is it important?
&
Answer: Feature Engineering is the process of creating new variables (features) or
modifying existing ones to improve the performance of a machine learning model.
h
It involves:
9t
th
6. What is Exploratory Data Analysis (EDA) and why is it important?
Answer: Exploratory Data Analysis (EDA) is the process of analyzing and
10
visualizing data to understand its structure, patterns, and relationships before
applying machine learning models. It helps in identifying trends, outliers, and
&
missing values in a dataset.
h
Steps in EDA:
9t
1. Understanding the Data: Checking data types, structure, and summary statistics
(e.g., using df.describe() in Python).
B
2. Handling Missing Values: Identifying and imputing missing data using techniques
like mean, median, or mode replacement.
U
3. Checking for Outliers: Using box plots or scatter plots to detect outliers that
PH
find correlations.
5. Feature Selection & Engineering: Identifying important features and
transforming variables if needed.
Importance of EDA:
Helps in understanding data distributions and anomalies.
Reduces noise by identifying irrelevant or redundant features.
Provides insights into relationships between variables, which improves model
accuracy.
For example, if we analyze customer data for a loan approval model, EDA helps in
identifying factors like income, credit score, and debt that influence approval rates.
th
For example, in an image classification problem, reducing the number of pixels as
10
features while maintaining essential information can improve model efficiency.
&
8. What are different types of data in Data Science, and how are they used?
Answer: In Data Science, data is categorized into four main types, each serving
h
1. Nominal Data (Categorical): Data that represents categories without any order.
Example: Colors (Red, Blue, Green), Gender (Male, Female, Other), Customer IDs.
B
2. Ordinal Data: Data with a meaningful order but no fixed difference between
PH
values.
Example: Movie Ratings (Poor, Average, Good, Excellent), Education Levels (High
EX
9. What are Bias and Variance in Machine Learning, and how do they affect
model performance?
Answer: Bias and Variance are two sources of error in machine learning models
that affect their accuracy and generalization:
1. Bias (Underfitting): Occurs when a model is too simple and cannot capture
patterns in the data.
Leads to high training and testing error.
Example: A linear regression model trying to fit complex data.
Solution: Use more complex models like Decision Trees, Neural Networks, or
Polynomial Regression.
2. Variance (Overfitting): Occurs when a model is too complex and captures noise
in training data instead of generalizing well.
Leads to low training error but high testing error.
Example: A deep neural network memorizing training data but failing on unseen
data.
Solution: Use regularization (L1, L2), cross-validation, dropout, or pruning to
th
simplify the model.
Bias-Variance Tradeoff:
10
A good model finds a balance between bias and variance, ensuring optimal
generalization on unseen data.
&
Techniques like cross-validation and ensemble learning (e.g., Random Forest,
Gradient Boosting) help in achieving this balance.
h
9t
For instance, in fraud detection models, high variance can lead to too many false
positives, while high bias may fail to detect fraudulent transactions.
B
learning models by splitting data into multiple subsets. This ensures that the model
is tested on different parts of the dataset, reducing the risk of overfitting.
EX
th
10
&
h
9t
B
U
PH
EX
PRASHANT KIRAD
th
1. Facial Recognition
Used in security systems, unlocking phones, and surveillance cameras.
10
Example: Face ID on iPhones verifies identity using facial features.
2. Self-Driving Cars
&
AI detects pedestrians, road signs, and vehicles to navigate safely.
h
Example: Tesla’s Autopilot system processes live camera feeds for automatic
9t
driving.
3. Medical Imaging
B
stores).
5. Google Translate Camera
Uses Optical Character Recognition (OCR) to read and translate text from images.
Example: Translating a restaurant menu from Chinese to English.
th
Edges – Sharp transitions between colors or brightness. Helps in object recognition.
10
Corners – Intersection points of two edges. Used in 3D object detection.
Blobs – Regions with similar color intensity. Used in medical image processing.
Example: AI detects edges of license plates for automatic number plate recognition.
&
h
6. Introduction to OpenCV
9t
What is OpenCV?
Open Source Computer Vision (OpenCV) is a widely used library for image
B
processing.
U
th
Helps in faster computation and less memory usage.
10
Types of Pooling:
Max Pooling – Takes the highest pixel value in a region (best for feature
extraction).
&
Average Pooling – Takes the average pixel value in a region.
h
Determines the final classification (e.g., whether an image contains a cat or dog).
PH
Top 5 MCQ
1. Which of the following is NOT an application of Computer Vision?
a) Facial Recognition
b) Speech Recognition
c) Object Detection
d) Medical Imaging
Answer: b) Speech Recognition
th
d) To store raw pixel values
Answer: a) To reduce the dimensions of feature maps
10
5. Which of the following libraries is widely used for Computer Vision tasks?
&
a) TensorFlow
h
b) Pandas
9t
c) Matplotlib
d) NumPy
B
Answer: a) TensorFlow
U
PH
Top 10 Questions
EX
th
4. What are Convolutional Neural Networks (CNNs) in Computer Vision?
10
Answer : CNNs are deep learning models specifically designed to process image
data. They consist of multiple layers, including:
Convolutional Layers – Extract features from the input image.
&
Pooling Layers – Reduce the dimensions of the image while preserving
h
important features.
9t
autonomous driving.
U
PH
th
Real-time Processing – Analyzing large amounts of image/video data quickly.
Bias in AI Models – Models trained on biased datasets may perform poorly in
10
diverse scenarios. &
9. What is Edge Detection in Computer Vision?
Answer : Edge Detection is a technique used to identify object boundaries within an
h
image. It highlights areas where there are sharp changes in brightness or color.
9t
Edge Detection is used in medical imaging, robotics, and industrial quality control.
PH
library that provides tools for image and video processing. It includes functionalities
for:
Image Filtering – Enhancing image quality.
Face Detection – Recognizing faces in real time.
Object Tracking – Monitoring objects in video streams.
Motion Detection – Detecting movements in security cameras.
It is widely used in AI research, robotics, and software development.
PRASHANT KIRAD
1. Introduction to NLP
Definition: NLP is a field of Artificial Intelligence (AI) that enables computers to
understand, interpret, and generate human language.
Goal: To bridge the gap between human communication and machine
understanding.
Example: When you ask Siri or Google Assistant a question, NLP helps them
process your request and respond.
th
Extracting meaning from text
10
Identifying emotions and intent
Understanding grammar and sentence structure
&
(B) Natural Language Generation (NLG)
h
Tasks in NLG:
Summarizing long texts
B
(A) Text Preprocessing Techniques (Used to clean and prepare text data)
1. Tokenization – Splitting text into words or sentences.
Example: "I love AI" → ["I", "love", "AI"]
2. Stemming & Lemmatization – Converting words to their base form.
Example: "Running" → "Run" (Lemmatization)
3. Stop-word Removal – Removing common words like is, the, and.
4. Named Entity Recognition (NER) – Identifying names, places, and dates.
Example: "Elon Musk founded Tesla" → ["Elon Musk" (Person), "Tesla"
(Organization)]
5. Parts of Speech Tagging (POS) – Assigning word categories (noun, verb,
adjective).
Example: "AI is amazing" → AI (Noun), is (Verb), amazing (Adjective)
4. Applications of NLP
NLP is widely used in many real-world applications:
Chatbots & Virtual Assistants: (e.g., Siri, Alexa, Google Assistant)
Search Engines: Google improves search results using NLP.
Machine Translation: Google Translate translates languages automatically.
Email Spam Detection: Gmail filters spam using NLP-based keyword detection.
Text Prediction: AI suggests words while typing (e.g., SwiftKey, Grammarly).
Customer Support Automation: Companies use chatbots to answer customer
queries.
th
5. Challenges in NLP
10
Despite its advancements, NLP still faces challenges:
1. Ambiguity:
&
Words may have multiple meanings.
Example: "I saw a bat" (Bat: an animal or a cricket bat?).
h
2. Context Understanding:
9t
4. Bias in AI Models:
PH
2. Bias in AI Models:
AI may favor certain languages, dialects, or opinions unfairly.
3. Fake News & Misinformation:
NLP-generated content can be misused to spread misinformation.
8. Future of NLP
Conversational AI: More advanced AI chatbots and virtual assistants.
Improved Machine Translation: More accurate real-time translation.
Emotion AI: AI detecting human emotions more accurately.
th
10
&
h
9t
B
U
PH
EX
PRASHANT KIRAD
Top 5 MCQ
1. Which of the following is an application of NLP?
a) Image Recognition
b) Speech Recognition
c) Circuit Design
d) Video Editing
Answer: (b) Speech Recognition
th
c) Break text into words or sentences
d) Remove punctuation from text
10
Answer: (c) Break text into words or sentences
&
3. Which component of NLP helps in identifying names of people, places, and
organizations?
h
a) Tokenization
9t
d) Stemming
U
a) Artificial
b) Intelligence
c) The
d) Learning
Answer: (c) The
Top 10 Questions
1. What is Natural Language Processing (NLP)?
Answer: Natural Language Processing (NLP) is a subfield of Artificial Intelligence
(AI) that focuses on the interaction between humans and computers using natural
language. It enables machines to read, interpret, and generate human language.
Examples of NLP Applications:
Chatbots (e.g., ChatGPT, Google Assistant, Alexa, Siri)
Language Translation (e.g., Google Translate, Microsoft Translator)
Spam Detection (e.g., Filtering spam emails)
Sentiment Analysis (e.g., Analyzing customer reviews)
Speech Recognition (e.g., Voice-to-text software like Dragon NaturallySpeaking)
th
2. What are the key components of NLP?
10
Answer: NLP consists of several sub-components that help machines process and
analyze text efficiently.
&
1. Tokenization: Splits text into individual words or sentences.
h
th
Definition form by removing dictionary based root
suffixes. form.
Example 10
"Running"-"Run", "Running"-"Run",
&
"Caring"-"Car" "Caring"-"Car"
h
Answer: Stop words are common words that do not carry significant meaning and
are usually removed from text processing.
Examples of Stop Words: "is," "the," "and," "to," "in," "of," "at," "on," "for"
Example Before and After Stop Word Removal:
Before: "The quick brown fox jumps over the lazy dog."
After Stop Word Removal: "quick brown fox jumps lazy dog."
th
Words Sentence 1 Sentence 2
I 1
10 0
&
Love 1 1
h
AI 1 1
9t
is 0 1
B
U
PH
BoW Representation:
Both sentences will be considered similar because they contain the same words,
even though the order is different.
th
10
&
h
9t
B
U
PH
EX
PRASHANT KIRAD
1. What is Evaluation?
Evaluation is the process of testing an AI model to measure its accuracy,
reliability, and effectiveness. It helps determine whether the model makes correct
predictions and meets performance expectations.
Why is Evaluation Important?
Ensures the AI model functions correctly and makes accurate predictions.
Identifies errors and weaknesses in the model’s predictions.
Helps compare multiple models to choose the most efficient one.
Prevents biases and unfair decision-making in AI systems.
Ensures AI systems work well before deployment in real-world applications.
th
Understanding these terms helps analyze an AI model’s performance:
True Positive (TP): The model correctly predicts a positive case.
10
Example: A spam filter correctly identifies a spam email.
True Negative (TN): The model correctly predicts a negative case.
&
Example: A medical AI correctly predicts that a person does not have a disease.
False Positive (FP): The model incorrectly predicts a positive case (Type I
h
Error).
9t
Error).
U
Example: A medical AI fails to detect a disease in a patient who actually has it.
PH
4. F1-Score:
A balance between Precision and Recall.
Formula: 2 × (Precision × Recall) / (Precision + Recall).
Useful when there is an imbalance between positive and negative cases.
Example: If Precision is 90% and Recall is 83.3%, the F1-Score is 86.5%.
5. Conclusion
Evaluation is essential in AI to ensure models are accurate, reliable, and effective.
By using Accuracy, Precision, Recall, and F1-Score, AI developers can improve
th
models and avoid errors in decision-making. A well-evaluated AI model ensures
fairness, efficiency, and trust in AI applications.
10
&
h
9t
B
U
PH
EX
PRASHANT KIRAD
Top 5 MCQ
1. What is the main purpose of evaluation in Artificial Intelligence?
a) To increase system complexity
b) To measure the performance and accuracy of AI models
c) To replace human intelligence
d) To decrease the efficiency of AI models
Answer: b) To measure the performance and accuracy of AI models
th
d) Recall
Answer: b) Accuracy
10
3. What does Precision measure in an AI evaluation process?
&
a) The percentage of true positive predictions among all positive predictions
b) The percentage of false negative predictions
h
predictions
U
PH
Top 10 Questions
1. What is evaluation in Artificial Intelligence?
Answer: Evaluation in AI refers to the process of measuring and assessing the
performance of an AI model using various metrics. It helps determine the accuracy,
efficiency, and effectiveness of a model before deploying it for real-world
applications.
th
Avoiding biases in AI predictions
10
3. What is a confusion matrix?
Answer: A confusion matrix is a table used in classification problems to summarize
&
the performance of a model. It includes:
True Positives (TP)
h
Recall: Measures how many actual positive cases were correctly predicted.
(Formula: TP / (TP + FN))
F1-score: A harmonic mean of Precision and Recall, balancing both. (Formula: 2 *
(Precision * Recall) / (Precision + Recall))
th
10. What is the ROC curve, and what does it represent?
Answer: The Receiver Operating Characteristic (ROC) curve is a graph that shows
10
the trade-off between True Positive Rate (Sensitivity) and False Positive Rate. A
model with a higher area under the ROC curve (AUC) is considered better at
&
distinguishing between classes.
h
9t
B
U
PH
EX