Page 45 - Touhpad Ai
P. 45

u Firewalls and antivirus software are used to block harmful programs from entering your system.
                 u Regular software updates help fix any weaknesses that hackers could use.
                 u Access control ensures that only the right people can use or change the system.
                 In real life, we can see examples of cyber security in many AI-based tools. For instance, face unlock systems on smartphones
                 use AI to make sure it’s really you and not just a photo. Banking systems with AI can detect and stop fraudulent or repeated
                 transactions. Voice assistants like Alexa protect your voice data using encryption. AI-based attendance systems also use
                 secure face or fingerprint recognition to prevent cheating or misuse.
                 Interestingly, AI is not just something that needs protection—it also helps protect others. AI can detect strange or suspicious
                 activity much faster than a human could. It can stop cyber-attacks as they happen, learn from past attacks to defend
                 better in the future, and help identify phishing messages or fake news. In this way, AI and cyber security work together,
                 supporting and strengthening each other.

                 In the world of AI, it’s not enough to build smart machines. We also need to make sure they are safe, secure, and
                 trustworthy. Whether it’s a school app, a home assistant, or an AI chatbot — decision making and security go hand
                 in hand.

                     AI REBOOT


                     Tick ( ) the correct answer.
                     1.  Which logic gate gives an output of 1 only when both inputs are 1?
                        a.  OR                                           b.  NOT
                        c.  AND                                          d.  XOR
                     2.  The NOT gate:
                        a.  Adds both inputs                             b.  Gives output 1 if any input is 1

                        c.  Reverses the input                           d.  Works only with 3 inputs
                     3.  In which gate is the output 1 only when both inputs are 0?
                        a.  NOR                                          b.  AND
                        c.  OR                                           d.  NAND
                     4.  The XNOR gate gives output 1 when:
                        a.  Inputs are different                         b.  Both inputs are 0 or both are 1

                        c.  One input is 1 and one is 0                  d.  One input is missing
                     5.  In rule-based decision making, machines:
                        a.  Use their feelings                           b.  Guess based on weather
                        c.  Follow fixed instructions                    d.  Refuse to make decisions
                     6.  What is the main goal of cyber security?
                        a.  To slow down the internet                    b.  To protect computers and data

                        c.  To erase all information                     d.  To build games
                     7.  What is a common cyber threat that tricks users with fake emails?
                        a.  Deepfake                                     b.  Firewall
                        c.  Phishing                                     d.  Data backup
                     8.  How does two-factor authentication protect users?
                        a.  It sends funny messages                      b.  It changes your password daily

                        c.  It asks for two types of verification        d.  It deletes old data




                                                                                 Basic Concepts of Artificial Intelligence  43
   40   41   42   43   44   45   46   47   48   49   50