Page 156 - Robotics and AI class 10
P. 156

3.  The field of Artificial Intelligence is a way to find out whether a computer is capable of thinking like
              a human being or not.                                                                     ………………

            4.  Intellectual Property are files or programs designed to harm a computer, such as Virus.   ………………
            5.  Use Authentic Internet Security and AntiVirus softwares can be used to protect from cyber crimes.   ………………

        D.  Match the following:

            1.  Strong encrypted passwords                       a.  Artificial Intelligence
            2.  Virtual environment                              b.  Hacking

            3.  Turing Test                                      c.  Cyberspace

            4.  Phishing                                         d.  Cyber Crimes
            5.  Data Theft                                       e.  Fraudulent mails


                                         SECTION B (Subjective Type Questions)
        A.  Short answer type questions:

            1.  What is machine intelligence?
          Ans.  Machine intelligence is advanced computing that enables a technology (a machine, device, or algorithm) to interact
              with its environment intelligently, meaning it can take actions to maximize its chance of successfully achieving its goals.
            2.  Differentiate between human intelligence and machine intelligence in terms of creativity.

          Ans.  Humans can come up with new ideas and be imaginative, while machines rely on predefined rules and patterns and
              don't have their own creative abilities.
            3.  What is the use of computers to Commit Fraud?
          Ans.  Computer fraud, as the words suggests, is the use of Internet services and Internet Devices on a computer to defraud
              individuals or organizations of their resources, which could be financial, data, Intellectual Property or even causing
              physical harm.
            4.  Elaborate the term Theft of Software.
          Ans.  Stealing of software media, illegally registering/activating/copying a program, or purposefully erasing a program, and/
              or any such activity of using or working with software for which one does not have ownership or authority to use
            5.  What is a computer virus?

          Ans.  Computer Virus (Vital Information Resources Under Siege). As the full form already suggests, it is a type of malicious
              software or malware as it is referred to, which spreads between computers or networks, and causes damage to software
              code and data. The aim is to disrupt systems and contaminate hardware or software, so as to disrupt the normal
              functioning of processes and/or destruction/damage of equipment or information.

        B.  Long answer type questions:

            1.  What are the applications of Turing Test?
          Ans.  Uses of Turing Test Turing test finds its uses and applications in a number of places. Some of its are discussed below:
              •  Humans can be biased in judgments but with the Turing test in controlled procedures and environment with hidden
                participants details proves to be unbiased and accurate. This will be in the form of a quiz where some abstract or
                emotional questions will be asked and the answers to these questions will often be judged based on the type of the
                answer given.




              154     Touchpad Robotics & Artificial Intelligence-X
   151   152   153   154   155   156   157   158   159   160   161