Page 151 - Robotics and AI class 10
P. 151

Importance of Turing Test                                                                #Digital Literacy
 Turing test finds its great importance when it can be used to find out how advanced computer AI is nowadays.   Video Session
 If we can believe the results of the Turing Test then its accuracy is the best method to judge the advancement of
 a computer’s artificial intelligence which can prove to be an important achievement in the field of advancement    Scan the QR code or visit the following link to watch the video:
 in Computer Artificial Intelligence.  AI in Cybersecurity
 #Experiential Learning  https://www.youtube.com/watch?v=4QzBdeUQ0Dc
 GAME  Tic-Tac-Toe



                    Cybersecurity

            In cyberspace a lot of data is flowing and a lot of it is sensitive from the point of view of privacy, economic
            reasons and national security. The sensitive nature of the data has been of interest to a lot of unethical minds,
            also to competitions in the economic world and also to enemy nations.

            Now to protect all the sensitive and private data, hardware and software and critical infrastructures like Electricity
            Grids, Water Supply, Transportation, Hospitals and other Essential Services in the rapidly growing digital world
            from Cyber-attacks and Hackers or Cyber Spy’s from committing such cyber crimes, Cybersecurity comes into
            picture. It is a combination of technologies, practices and processes designed to protect data from getting
            damaged or someone getting unauthorized access to and also saving the networks, devices, programs from
            getting cyber-attacked.

            It includes things that are designed for Individuals and Organisations to apply or follow in order to achieve
            security objectives.
 Visit:  https://playtictactoe.org/  or  scan  the  QR code  to  play  the  game.
 Tic-Tac-Toe is a simple game for a player and a computer. The player who
 manages to place three of their symbols in horizontal/vertical/diagonal row   Task     #Creativity & Innovativeness
 wins the game.
                   How can you ensure your digital safety in an interconnected world? Plan a poster campaign to raise
                 cybersecurity awareness among your classmates.
 Connectivity between Human Intelligence and Machine Intelligence
 The connectivity between human intelligence and machine intelligence is a dynamic and ever-evolving relationship
 that encompasses the interplay, collaboration, and convergence between these two forms of intelligence. As, humans
 continue to develop and advance artificial intelligence technologies, machines are becoming increasingly capable of
 simulating human-like cognition, learning, and problem-solving. This connectivity holds immense potential, enabling   Brainy Fact
 humans to grasp the computational power and data processing abilities of machines while machines benefit from   According to a report by Cybersecurity Ventures, ransomware attacks cost businesses over $20 billion
 human guidance, knowledge, and contextual  understanding. Through this symbiotic relationship, we strive to   in the year 2021. This number is expected to rise to $10 trillion by 2025.
 bridge the gap between human and machine capabilities, exploring new frontiers and redefining the boundaries of
 intelligence in a world where humans and machines coexist and collaborate towards shared goals.

 For examples: Autonomous Vehicles and Personal Assistants.
            Process of Cyber-security

 What is Cyberspace?  Be it government, military, corporates, financial and medical organizations who collect, process, and store a lot
            of data on servers and cloud, computers and other devices, have to be very careful and ensure security of data.
 Before we jump to cyber security, let us understand Cyberspace. It is an unreal, non physical, virtual complex
 environment on the Internet, where software, hardware and people interact by means of technology through   As the data could be sensitive in nature or could be of intellectual property, financial data, personal information
 devices and network connections on it.  which needs privacy, or other data for which authorized access could be required to save negative consequences.
            For Cyber Security the efforts need to be made throughout the system by the organisation.


                                                       Machine Intelligence and Cybersecurity in Computing  149
   146   147   148   149   150   151   152   153   154   155   156