Page 158 - Robotics and AI class 10
P. 158
4. The ………………………. serves as an important concept in the field of artificial intelligence (AI), stimulating profound
discussions on the nature of machine intelligence and its relationship to human cognition.
a. Machine intelligence b. Human intelligence
c. Computing d. Turing tests
5. Which of the following can not be used to protect from cyber crimes?
a. Using Online transactions b. Use of Antiviruses
c Regular update of softwares d. Strong encrypted passwords
B. Fill in the blanks.
1. ………………………. intelligence is created by programming computers and using algorithms.
2. ………………………. can come up with new ideas and be imaginative, while machines rely on predefined rules and patterns
and don't have their own creative abilities.
3. The Turing Test got its name from ………………………. name who was a computer scientist, mathematician, cryptanalyst
and theoretical biologist.
4. ………………………. is a combination of technologies, practices and processes designed to protect data from getting
damaged or someone getting unauthorized access.
5. Respecting others' property and privacy is essential, and using hardware without permission is ………………………..
C. State whether these statements are true or false.
1. Fraud is an act to break the security code and enter a computer system or network. ……….……
2. Unauthorized access is illegal and can result in legal consequences. ……….……
3. Data theft is one of the outcomes of artificial intelligence. ……….……
4. The Turing test was originally called the “imitation game” by Alan Turing. ……….……
5. Cyberspace combination of technologies, practices and processes designed to protect data from
getting damaged or someone getting unauthorized access. ……….……
D. Match the following.
1. Turing Test a. Financial frauds
2. Virus b. Machine Intelligence
3. Phishing c. Imitation game
4. Ransomware d. Cyber Threat
5. CAPTCHA e. Malware
SECTION B (Subjective Type Questions)
A. Short answer type questions:
1. What is Cyberspace?
2. What is theft of Software?
3. What are the measures that can be used to provide unauthorised use?
156 Touchpad Robotics & Artificial Intelligence-X

