Page 159 - Robotics and AI class 10
P. 159

B.  Long answer type questions:

               1.  What are the applications of Turing Test?
               2.  Differentiate between human intelligence and machine Intelligence.

               3.  What are the uses of Turing Test?

            C.  Competency-based/Application-based questions:                            #Digital Literacy

                  Nowadays there are lots of programs or links, available on the internet which pretend to be very useful but in reality,
                  perform very harmful acts. Yashika, who studies in class X, has an email-id which she frequently uses with her few
                  friends for sharing her study materials. One day she was surprised to see an email from an unknown sender saying
                  “Congratulations! You have won Jackpot. Click the link below to provide your account information”.

                  What do you think that whether she should click on such links or not? Justify your answer with a suitable reason.





                     Deep Thinking                                                       #Ethical & Moral Reasoning

              'Data is a new gold'. Justify this statement keeping in mind the cyber threats, what are some basic rules to be followed
              as students when we deal with data of our peer group.





                                                                                        #Creativity & Innovativeness
                         Lab Activity



                     1.  List down the names of Antivirus programs that can help to protect your computer from Virus.
                     2.   Imagine yourself ten years from now. You are incharge of cyber security cell of your organisation. Prepare
                        a presentation of approx 10 slides to make your office colleagues aware of some of the prevalent cyber
                        frauds and ways to avoid them.

















            Answers

            Exercise (Section A)

            A.  1.  a.   2. c.   3.  b.   4.  c.     5.  d.
            B.  1.  Human,      2.  Machines,        3.   inputs,         4.  simulate,        5.  CAPTCHA

            C.  1.  False  2. True   3.  True    4. False     5.  True
            D.  1.  d.   2. c.   3.  a.   4.  b.     5.  b.


                                                       Machine Intelligence and Cybersecurity in Computing  157
   154   155   156   157   158   159   160   161   162   163   164