Page 45 - Touhpad Ai
P. 45
u Firewalls and antivirus software are used to block harmful programs from entering your system.
u Regular software updates help fix any weaknesses that hackers could use.
u Access control ensures that only the right people can use or change the system.
In real life, we can see examples of cyber security in many AI-based tools. For instance, face unlock systems on smartphones
use AI to make sure it’s really you and not just a photo. Banking systems with AI can detect and stop fraudulent or repeated
transactions. Voice assistants like Alexa protect your voice data using encryption. AI-based attendance systems also use
secure face or fingerprint recognition to prevent cheating or misuse.
Interestingly, AI is not just something that needs protection—it also helps protect others. AI can detect strange or suspicious
activity much faster than a human could. It can stop cyber-attacks as they happen, learn from past attacks to defend
better in the future, and help identify phishing messages or fake news. In this way, AI and cyber security work together,
supporting and strengthening each other.
In the world of AI, it’s not enough to build smart machines. We also need to make sure they are safe, secure, and
trustworthy. Whether it’s a school app, a home assistant, or an AI chatbot — decision making and security go hand
in hand.
AI REBOOT
Tick ( ) the correct answer.
1. Which logic gate gives an output of 1 only when both inputs are 1?
a. OR b. NOT
c. AND d. XOR
2. The NOT gate:
a. Adds both inputs b. Gives output 1 if any input is 1
c. Reverses the input d. Works only with 3 inputs
3. In which gate is the output 1 only when both inputs are 0?
a. NOR b. AND
c. OR d. NAND
4. The XNOR gate gives output 1 when:
a. Inputs are different b. Both inputs are 0 or both are 1
c. One input is 1 and one is 0 d. One input is missing
5. In rule-based decision making, machines:
a. Use their feelings b. Guess based on weather
c. Follow fixed instructions d. Refuse to make decisions
6. What is the main goal of cyber security?
a. To slow down the internet b. To protect computers and data
c. To erase all information d. To build games
7. What is a common cyber threat that tricks users with fake emails?
a. Deepfake b. Firewall
c. Phishing d. Data backup
8. How does two-factor authentication protect users?
a. It sends funny messages b. It changes your password daily
c. It asks for two types of verification d. It deletes old data
Basic Concepts of Artificial Intelligence 43

