100% found this document useful (1 vote)
44 views

Artificial Intelligence Questions N Answers

Artificial intelligence is the technology that aims to create intelligent machines that can think and act like humans. Some common applications of AI include Google search, ridesharing apps like Uber, spam filtering in email, social media recommendations, and product recommendations on e-commerce sites. The key differences between AI, machine learning, and deep learning are that AI deals with structured data, machine learning requires less data than deep learning, and deep learning aims to solve problems like the human brain.

Uploaded by

Blasi puuaboy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
44 views

Artificial Intelligence Questions N Answers

Artificial intelligence is the technology that aims to create intelligent machines that can think and act like humans. Some common applications of AI include Google search, ridesharing apps like Uber, spam filtering in email, social media recommendations, and product recommendations on e-commerce sites. The key differences between AI, machine learning, and deep learning are that AI deals with structured data, machine learning requires less data than deep learning, and deep learning aims to solve problems like the human brain.

Uploaded by

Blasi puuaboy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Home Interview Questions Java SQL Python JavaScript Angular Selenium

Welcome to Javatpoint
JAVATPOINT asks for your consent to:

Personalised ads and content, ad and content measurement,


perm_identity audience insights and product development

devices Store and/or access information on a device

expand_more Learn more

Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.

Consent Manage options


Top 50 Artificial Intelligence Questions & Answers
A list of frequently asked Artificial Intelligence Interview Questions and Answers is given below:

1) What do you understand by Artificial Intelligence?

Artificial intelligence is computer science technology that emphasizes creating intelligent


machine that can mimic human behavior. Here Intelligent machines can be defined as the
machine that can behave like a human, think like a human, and also capable of decision
making. It is made up of two words, "Artificial" and "Intelligence," which means the "man-
made thinking ability."

With artificial intelligence, we do not need to pre-program the machine to perform a task;
instead, we can create a machine with the programmed
Welcome to Javatpoint algorithms, and it can work on its
own.
JAVATPOINT asks for your consent to:

Personalised ads and content, ad and content measurement,


2) Why do we needperm_identityArtificial
audienceIntelligence?
insights and product development

The goal of Artificial devices


intelligence
Store and/orisaccess
to create intelligent
information on a device machines that can mimic human

behavior. We need AI for today's world to solve complex problems, make our lives more
expand_more Learn more
smoothly by automating the routine work, saving the manpower, and to perform many more
other tasks. Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.

Consent Manage options

3) Give some real-world applications of AI.

There are various real-world applications of AI, and some of them are given below:
Google Search Engine: When we start writing something on the google search engine,
we immediately get the relevant recommendations from google, and this is because of
different AI technologies.

Ridesharing Applications: Different ride-sharing applications such as Uber uses AI and


machine learning to determine the type of ride, minimize the time once the car is hailed
by the user, price of the ride, etc.

Spam Filters in Email: The AI is also used for email spam filtering so that you can get
the important and relevant emails only in your inbox. As per the studies, Gmail
successfully filters 99.9% of spam mails.

Social Networking: Different social networking sites such as Facebook, Instagram,


Pinterest, etc., use the AI technology for different purposes such as face recognition and
friend suggestions, when you upload a photograph on Facebook, understanding the
contextual meaning of an emoji in Instagram, and so on.
Welcome to Javatpoint
Product recommendations: When we search for a product on Amazon, we get the
JAVATPOINT asks for your consent to:
recommendation for similar products, and this is because of different ML algorithms.
Similarly, on Netflix, we get personalized
Personalised recommendations
ads and content, for movies and web series.
ad and content measurement,
perm_identity audience insights and product development

devices Store and/orMachine


4) How Artificial intelligence, access information on a device
Learning, and Deep Learning differ from
each other? Learn more
expand_more
YourAI,
The difference between personal data will
ML, and Deepbe processed
Learningand information
is given from yourbelow
in the device table:
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Artificial Intelligence Machine Learning Deep Learning
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
The term for a link at The
Artificial the bottom
termof this
ML pagewas
or in ourThe
privacy policyDL
term where
wasyou first
can coined in the year
withdraw consent.
intelligence was first first coined in the 2000 Igor Aizenberg.
coined in the year 1956 year 1959 by
Consent Manage options
by John McCarthy. Arthur Samuel.

It is a technology that is It is a subset of AI It is the subset of machine learning and AI


used to create intelligent that learns from that is inspired by the human brain cells,
machines that can mimic past data and called neurons, and imitates the working
human behavior. experiences. of the human brain.

AI completely deals with ML deals with Deep learning deals with structured and
structured, semi- structured and unstructured data.
structured data. semi-structured
data.
It requires a huge amount It can work with It requires a huge amount of the data
of data to work. less amount of data compared to the ML.
compared to deep
learning and AI.

The goal of AI is to enable The goal of ML is to The goal of deep learning is to solve the
the machine to think enable the machine complex problems as the human brain
without any human to learn from past does, using various algorithms.
intervention. experiences.

5) What are the types of AI?

Artificial intelligence can be divided into different types on the basis of capabilities and
Welcome to Javatpoint
functionalities.
JAVATPOINT asks for your consent to:
Based on Capabilities:
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Weak AI or Narrow AI: Weak AI is capable of performing some dedicated tasks with
intelligence. Siri is
devicesan Store
example
and/or of Weak
access AI. on a device
information

General AI: The intelligent machines that can perform any intellectual task with
expand_more Learn more
efficiency as a human.
Your personal data will be processed and information from your device
Strong AI: It is (cookies,
the hypothetical concept
unique identifiers, that data)
and other device involves the machine
may be stored by, that will be better
accessed
than humans and by and shared
will surpass with third
human party vendors, or used specifically by
intelligence.
this site or app.
Some vendors may process your personal data on the basis of legitimate
Based on Functionalities:
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdrawPurely
Reactive Machines: consent. reactive machines are the basic types of AI. These focus on

the present actions and cannot store the previous actions. Example: Deep Blue.
Consent Manage options
Limited Memory: As its name suggests, it can store the past data or experience for the
limited duration. The self-driving car is an example of such AI types.

Theory of Mind: It is the advanced AI that is capable of understanding human


emotions, people, etc., in the real world.

Self-Awareness: Self Awareness AI is the future of Artificial Intelligence that will have
their own consciousness, emotions, similar to humans. Read More.

6) What are the different domains/Subsets of AI?

AI covers lots of domains or subsets, and some main domains are given below:
Machine Learning

Deep Learning

Neural Network

Expert System

Fuzzy Logic

Natural Language Processing

Robotics

Speech Recognition. Read More

7) What are the types of Machine Learning?


Welcome to Javatpoint
Machine Learning can be mainly divided into three types:
JAVATPOINT asks for your consent to:
a. Supervised Learning: Supervised learning is a type of Machine learning in which the
Personalised ads and content, ad and content measurement,
perm_identity audience
machine needs external supervision
insights andto learn
product from data. The supervised learning models
development
are trained using the labeled dataset. Regression and Classification are the two main
devicesbe Store
problems that can solvedand/or access information on a device
with Supervised Machine Learning.

b. Unsupervised Learning: It is a type of machine learning in which the machine does


expand_more Learn more
not need any external supervision to learn from the data, hence called unsupervised
Your personal data will be processed and information from your device
learning. The unsupervised modelsand
(cookies, unique identifiers, can bedevice
other trained using
data) may theby,
be stored unlabelled dataset. These
accessed by and shared with third party vendors, or used specifically by
are used to solvethis
thesiteAssociation
or app. and Clustering problems.

c. ReinforcementSome
Learning: In Reinforcement
vendors may process learning,
your personal data on the basis of an agent interacts with its
legitimate
interest, which you can object to by managing your options below. Look
environment by for
producing actions,
a link at the bottom and
of this pagelearn with
or in our the
privacy help
policy ofyou
where feedback.
can The feedback is
withdraw
given to the agent in consent.
the form of rewards, such as for each good action, he gets a
positive reward, and for each bad action, he gets a negative reward. There is no
supervision provided to Consent
the agent. Q-Learning algorithm
Manage options is used in reinforcement
learning.

8) Explain the term "Q-Learning."

Q-learning is a popular algorithm used in reinforcement learning. It is based on the Bellman


equation. In this algorithm, the agent tries to learn the policies that can provide the best
actions to perform for maximining the rewards under particular circumstances. The agent
learns these optimal policies from past experiences.
In Q-learning, the Q is used to represent the quality of the actions at each state, and the goal
of the agent is to maximize the value of Q.

9) What is Deep Learning, and how is it used in real-world?

Deep learning is a subset of Machine learning that


Welcome to mimics the working of the human brain. It is
Javatpoint
inspired by the human brain cells, called
JAVATPOINT asksneurons, and works
for your consent to: on the concept of neural
networks to solve complex real-world problems. It is also known as the deep neural
network or deep neural Personalised ads and content, ad and content measurement,
perm_identity learning.
audience insights and product development

Some real-world applications of deep learning are:


devices
Store and/or access information on a device

Adding different colors to the black&white images


expand_more Learn more
Computer vision
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
Text generation
accessed by and shared with third party vendors, or used specifically by
this site or app.
Deep-LearningSome
Robots, etc.
vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
10) Which programming language is used for AI?

Consentlanguages that Manage


Below are the top five programming options
are widely used for the development of
Artificial Intelligence:

Python

Java

Lisp

Prolog

Among the above five languages, Python is the most used language for AI development due to
its simplicity and availability of lots of libraries, such as Numpy, Pandas, etc.
11) What is the intelligent agent in AI, and where are they used?
Welcome to Javatpoint
The intelligent agent can be any autonomous entity that perceives its environment through
JAVATPOINT asks for your consent to:
the sensors and act on it using the actuators for achieving its goal.
Personalised ads and content, ad and content measurement,
perm_identity in audience
These Intelligent agents AI are used
insightsinand
the following
product applications:
development

devices and
Information Access Store and/or access information
Navigations on a device
such as Search Engine

Repetitive Activities
expand_more Learn more
Domain Experts Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
Chatbots, etc. accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
12) How is machineinterest, which you can object to by managing your options below. Look
forlearning related
a link at the bottom of thisto
pageAI?
or in our privacy policy where you can
withdraw consent.
Machine learning is a subset or subfield of Artificial intelligence. It is a way of achieving AI. As
both are the two different concepts
Consentand the relationManage
between both can be understood as "AI
options
uses different Machine learning algorithms and concepts to solve the complex problems."
Welcome to Javatpoint
JAVATPOINT asks for your consent to:

Personalised ads and content, ad and content measurement,


perm_identity audience insights and product development
13) What is Markov's Decision process?
devices Store and/or access information on a device
The solution for a reinforcement learning problem can be achieved using the Markov decision
process or MDP. Hence,
expand_more MDP is used to formalize the RL problem. It can be said as the
Learn more
mathematical approach to solve a reinforcement learning problem. The main aim of this
Your personal data will be processed and information from your device
(cookies, unique
process is to gain maximum identifiers,
positive rewardsand other
by device data) may
choosing thebe optimum
stored by, policy.
accessed by and shared with third party vendors, or used specifically by
this site or app.
MDP has four elements, which are:
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
A set of finite states S at the bottom of this page or in our privacy policy where you can
for a link
withdraw consent.
A set of finite actions A

Rewards Consent Manage options


Policy Pa

In this process, the agent performs an action A to take a transition from state S1 to S2 or from
the start state to the end state, and while doing these actions, the agent gets some rewards.
The series of actions taken by the agent can be defined as the policy.

14) What do you understand by the reward maximization?


Reward maximization term is used in reinforcement learning, and which is a goal of the
reinforcement learning agent. In RL, a reward is a positive feedback by taking action for a
transition from one state to another. If the agent performs a good action by applying optimal
policies, he gets a reward, and if he performs a bad action, one reward is subtracted. The goal
of the agent is to maximize these rewards by applying optimal policies, which is termed as
reward maximization.

15) What are parametric and non-parametric model?

In machine learning, there are mainly two types of models, Parametric and Non-parametric.
Here parameters are the predictor variables that are used to build the machine learning
model. The explanation of these models is given below:

Parametric Model: The parametric Welcome to Javatpoint


models use a fixed number of the parameters to create
the ML model. It considers strong assumptions
JAVATPOINT about
asks for yourthe data. The
consent to: examples of the parametric
models are Linear regression, Logistic Regression, Naïve Bayes, Perceptron, etc.
Personalised ads and content, ad and content measurement,
perm_identity
audience insights and product development
Non-Parametric Model: The non-parametric model uses flexible numbers of parameters. It
considers a few assumptions
devices Storeabout the data.
and/or access These
information on a models
device are good for higher data and no
prior knowledge. The examples of the non-parametric models are Decision Tree, K-Nearest
expand_more Learnkernels,
Neighbour, SVM with Gaussian more etc.
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
16) What do you accessed by and shared
understand by the withhyperparameter?
third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
In machine learning,interest,
hyperparameter is tothe
which you can object parameters
by managing that
your options below.determine
Look and control the
for a link atThe
complete training process. the bottom of this page
examples oforthese
in our privacy policy where you
parameters arecanLearning rate, Hidden
withdraw consent.
Layers, Hidden units, Activation functions, etc. These parameters are external from the model.
The selection of good hyperparameters makes a better algorithm.
Consent Manage options

17) Explain the Hidden Markov model.

Hidden Markov model is a statistical model used for representing the probability distributions
over a chain of observations. In the hidden markov model, hidden defines a property that it
assumes that the state of a process generated at a particular time is hidden from the
observer, and Markov defines that it assumes that the process satisfies the Markov property.
The HMM models are mostly used for temporal data.
The HMM is used in various applications such as reinforcement learning, temporal pattern
recognition, etc.

18) What is Strong AI, and how is it different from the Weak AI?
Welcome to Javatpoint
Strong AI: Strong AI is about creating real intelligence artificially, which means a human-
JAVATPOINTself-awareness,
made intelligence that has sentiments, asks for your consent to:
and emotions similar to humans. It is
still an assumption that has a concept
Personalised ads andof building
content, ad andAI agents
content with thinking, reasoning, and
measurement,
perm_identity
audience insights and product development
decision-making capabilities similar to humans.

Weak AI: Weak AI is devices Store and/or access information on a device


the current development stage of artificial intelligence that deals with
the creation of intelligent Learn agents
moreand machines that can help humans and solve real-world
expand_more
complex problems. Siri and Alexa are examples of Weak AI programs.
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
19) Give a brief introduction
this site or app. to the Turing test in AI?
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
Turing test is one of the popular intelligence tests in Artificial intelligence. The Turing test was
for a link at the bottom of this page or in our privacy policy where you can
withdraw
introduced by Alan Turing in consent.
the year 1950. It is a test to determine that if a machine can think
like a human or not. According to this test, a computer can only be said to be intelligent if it
Consent
can mimic human responses under Manage options
some particular conditions.

In this test, three players are involved, the first player is a computer, the second player is a
human responder, and the third player is the human interrogator, and the interrogator needs
to find which response is from the machine on the basis of questions and answers.

20) Which assessment is used to test the intelligence of the machine?

Turing Test.

21) What is overfitting? How can it be overcome in Machine Learning?


When the machine learning algorithm tries to capture all the data points, and hence, as a
result, captures noise also, then overfitting occurs in the model. Due to this overfitting issue,
the algorithm shows the low bias, but the high variance in the output. Overfitting is one of the
main issues in machine learning.

Methods to avoid Overfitting in ML:

Cross-Validation

Training With more data

Regularization

Ensembling

Removing Unnecessary Features

Early Stopping the training. Welcome to Javatpoint


JAVATPOINT asks for your consent to:
22) Tell one technique to avoid overfitting
Personalised ads and content,in
adneural networks?
and content measurement,
perm_identity audience insights and product development
Dropout Technique: The dropout technique is one of the popular techniques to avoid
devices Store and/or access information on a device
overfitting in the neural network models. It is the regularization technique, in which the
randomly selected neurons are more
expand_more Learn dropped during training.

Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
23) What is NLP? What
accessed are
by andthe various
shared components
with third party vendors, or usedof NLP?by
specifically
this site or app.
NLP stands for Natural
SomeLanguage Processing,
vendors may process which
your personal is the
data on a basis
branch of artificial intelligence. It
of legitimate
interest, which you can object to by managing your options below. Look
enables machines to understand, interpret,
for a link at the bottom and
of this page or manipulate thewhere
in our privacy policy human language.
you can
withdraw consent.
Components of NLP:

Consent Manage options


There are mainly two components of Natural Language processing, which are given below:

a. Natural Language Understanding (NLU):

It involves the below tasks:


a. To map the input to useful representations.

b. To analyze the different aspects of the language.

b. Natural Language Generation (NLG)

a. Text Planning

b. Sentence Planning

c. Text Realization
24) What are the different components of the Expert System?

An expert system mainly contains three components:

a. User Interface: It enables a user to interact or communicate with the expert system to
find the solution for a problem.

b. Inference Engine: It is called the main processing unit or brain of the expert system. It
applies different inference rules to the knowledge base to draw a conclusion from it. The
system extracts the information from the KB with the help of an inference engine.

c. Knowledge Base: The knowledge base is a type of storage area that stores the
domain-specific and high-quality knowledge.

25) What is the use of computer Welcome


vision intoAI?
Javatpoint
JAVATPOINT asks for your consent to:
Computer vision is a field of Artificial Intelligence that is used to train the computers so that
Personalised ads and content, ad and content measurement,
perm_identity obtain information from the visual world such as images. Hence,
they can interpret and
audience insights and product development
computer vision uses AI technology to solve complex problems such as image
devices Store and/or
processing, object detections, access information on a device
etc.

expand_more Learn more

26) Explain the minimax algorithm


Your personal data will be along
processedwith the different
and information terms.
from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
Minimax algorithm is this
a backtracking
site or app. algorithm used for decision making in game theory. This
algorithm provides the optimal
Some moves
vendors may processfor
yourapersonal
player databy assuming
on the that another player is also
basis of legitimate
playing optimally. interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
This algorithm is based on two players, one is called MAX, and the other is called the MIN.

Consent
Following terminologies that are used in the Minimax Manage options
Algorithm:

Game tree: A tree structure with all possible moves.

Initial State: The initial state of the board.

Terminal State: Position of the board where the game finishes.

Utility Function: The function that assigns a numeric value for the outcome of the
game.

27) What is game theory? How is it important in AI?


Game theory is the logical and scientific study that forms a model of the possible interactions
between two or more rational players. Here rational means that each player thinks that others
are just as rational and have the same level of knowledge and understanding. In the game
theory, players deal with the given set of options in a multi-agent situation, it means the
choice of one player affects the choice of the other or opponent players.

Game theory and AI are much related and useful to each other. In AI, the game theory is
widely used to enable some of the key capabilities required in the multi-agent environment, in
which multiple agents try to interact with each other to achieve a goal.

Different popular games such as Poker, Chess, etc., are the logical games with the specified
rules. To play these games online or digitally, such as on Mobile, laptop, etc., one has to create
algorithms for such games. And these algorithms are applied with the help of artificial
intelligence.
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
28) What are some misconceptions about AI?
Personalised ads and content, ad and content measurement,
perm_identity
audience about
insights and product intelligence
development since starting its evolution. Some
There are lots of misconceptions artificial
of these misconceptions areStore
given below:
devices
and/or access information on a device

AI does not require humans:


expand_more Learn more The first misconception about AI is that it does not
require human. But in reality, each AI-based system is somewhere dependent on humans
Your personal data will be processed and information from your device
and will remain. (cookies,
Such as it requires
unique identifiers, human gathered
and other device data
data) may to learn
be stored by, about the data.
accessed by and shared with third party vendors, or used specifically by
AI is dangerous
thisfor
site orhumans:
app. AI is not inherently dangerous for humans, and still, it
has not reachedSome
thevendors
supermay
AIprocess
or strong AI, which
your personal data on is
themore
basis of intelligent
legitimate than humans. Any
interest,
powerful technology which you
cannot becanharmful
object to byifmanaging
it is notyour options below. Look
misused.
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
AI has reached its peak stage: Still, we are so far away from the peak stage of the AI.
It will take a very long journey to reach its peak.
Consent Manage options
AI will take your job: It is one of the biggest confusions that AI will take most of the
jobs, but in reality, it is giving us more opportunities for new jobs.

AI is new technology: Although some people think that it is a new technology, this
technology actually first thought in the year 1840 through an English newspaper.

29) What are the eigenvalues and eigenvectors?

Eigenvectors and eigenvalues are the two main concepts of Linear algebra.

Eigenvectors are unit vectors that have a magnitude equal to 1.0.


Eigenvalues are the coefficients that are applied to the eigenvectors, or these are the
magnitude by which the eigenvector is scaled.

30) What is an Artificial neural network? Name some commonly used Artificial
Neural networks.

Artificial neural networks are the statistical model inspired by the functioning of human brain
cells called neurons. These neural networks include various AI technologies such as deep
learning and machine learning.

An Artificial neural network or ANN consists of multiple layers, including the Input layer,
Output Layer, and hidden layers.

Welcome to Javatpoint
JAVATPOINT asks for your consent to:

Personalised ads and content, ad and content measurement,


perm_identity audience insights and product development

devices Store and/or access information on a device

expand_more Learn more

Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
ANN, with the help Some
of various
vendors maydeep learning
process techniques,
your personal is ofthe
data on the basis AI tools to solve various
legitimate
complex problems likeinterest,
pattern whichrecognition,
you can object tofacial
by managing your optionsand
recognition, below.soLook
on.
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
Some commonly used Artificial neural networks:

Consent
Feedforward Neural Network Manage options

Convolutional Neural Network

Recurrent Neural Network

Autoencoders

31) Give a brief introduction of partial, alternate, artificial, and compound keys?

Partial Keys: A set of attributes that uniquely identifies weak entities, which are related to
the same owner entity.
Alternate Keys: All candidate keys except the primary key are known as alternate keys.

Compound Key: It has multiple fields that enable the user to uniquely recognize a specific
record.

Artificial Key: It is the extra attribute added to the table when there are no stands alone or
compounds key is available. It is created by assigning a number to each record in the table.

32) What is a Chatbot?

A chatbot is Artificial intelligence software or agent that can simulate a conversation with
humans or users using Natural language processing. The conversation can be achieved
through an application, website, or messaging apps. These chatbots are also called as the
digital assistants and can interact with humans in the form of text or through voice.
Welcome to Javatpoint
JAVATPOINT
The AI chatbots are broadly used in mostasks for yourtoconsent
businesses provideto:
24*7 virtual customer support
to their customers, such as HDFC Eva chatbot, Vainubot, etc.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development

33) What is knowledge representation


devices Store in AI?on a device
and/or access information

Knowledge representation
expand_more is themore
Learn part of AI, which is concerned with the thinking of AI agents. It
is used to represent Your
the personal
knowledgedata will about theand
be processed real world from
information to the AI agents so that they can
your device
understand and utilize(cookies, unique identifiers,
this information forand other device
solving thedata) may be stored
complex by,
problems in AI.
accessed by and shared with third party vendors, or used specifically by
this site or app.
Following elements of Knowledge that are represented to the agent in the AI system:
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
Objects for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
Events

Performance Consent Manage options

Meta-Knowledge

Facts

Knowledge-base

34) What are the various techniques of knowledge representation in AI?

Knowledge representation techniques are given below:

Logical Representation
Semantic Network Representation

Frame Representation

Production Rules

35) Which programming language is not generally used in AI, and why?

Perl Programming language is not commonly used language for AI, as it is the scripting
language.

36) What is reinforcement learning?

Reinforcement learning is a type of machine learning. In this, an agent interacts with its
Welcome to Javatpoint
environment by producing actions, and learn with the help of feedback. The feedback is given
JAVATPOINT
to the agent in the form of rewards, suchasks for each
as for your consent to: he gets a positive reward,
good action,
and for each bad action, he gets a negative reward. There is no any labeled data or
Personalised ads and content, ad and content measurement,
supervision is perm_identity audience
provided to the agent.
insights In development
and product RL, the agent continuously does three
things(performing actions, changing state, and getting the feedback) to explore the
devices Store and/or access information on a device
environment.

expand_more Learn more


The popular reinforcement learning algorithms are:
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
Q-Learning accessed by and shared with third party vendors, or used specifically by
this site or app.
SARSA(State Action Reward State Action)
Some vendors may process your personal data on the basis of legitimate
Deep Q Neuralinterest,
Network which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.

37) How does RL work?


Consent Manage options
The working of reinforcement learning can be understood by the below diagram:
Welcome to Javatpoint
The RL-based system mainly consists of the following components:
JAVATPOINT asks for your consent to:
Environment: The environment is the surrounding of the agent, where he needs to
explore and act upon. Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Agent: The agent is the AI program that has sensors and actuators and the ability to
devices
perceive the environment.
Store and/or access information on a device

expand_more Learn
State: It is the situation more
that is returned by the environment to the agent.
Your personal
Reward: The feedback data willto
received be the
processed
agentandafter
information
doing fromeach
your device
action.
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
In RL, the agent interacts
this sitewith
or app.the environment in order to explore it by doing some actions.
On each action, the state of agent
Some vendors gets changed
may process your personalor sometimes
data on the basis ofremains
legitimate the same, and based
interest, which you can object to by managing your options below. Look
on the type of action, for
and heat gets
a link a reward.
the bottom The
of this page or inreward is policy
our privacy feedback,
where youwhich
can may be negative or
positive based on the withdraw
action.consent.

The goal of the agent is to maximize


Consent the positive Manage
rewardoptions
and to achieve the goal of the
problem.

38) What are the different areas where AI has a great impact?

Following are some areas where AI has a great impact:

Autonomous Transportation

Education-system powered by AI.

Healthcare

Predictive Policing
Space Exploration

Entertainment, etc.

39) What are the different software platforms for AI development?

a. Google Cloud AI platform

b. Microsoft Azure AI platform

c. IBM Watson

d. TensorFlow

e. Infosys Nia

f. Rainbird
Welcome to Javatpoint
g. Dialogflow
JAVATPOINT asks for your consent to:

Personalised ads and content, ad and content measurement,


perm_identity audience
40) Kindly explain different ways toand
insights evaluate the performance of the ML model.
product development

Some popular ways to devices Store and/or


evaluate access informationofonthe
the performance a device
ML model are:

expand_more ItLearn
Confusion Matrix: more
is N*N table with different sets of value that is used to determine
the performanceYour
of the classification
personal model
data will be processed andininformation
machine learning.
from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed
F1 score: It is the by and shared
harmonic mean with third party vendors,
of precision andor used specifically
recall, which by is used as one of the
this site or app.
best metrics to evaluate the ML model.
Some vendors may process your personal data on the basis of legitimate
interest, which
Gain and lift charts: Gain you&can object
Lift to by managing
charts are used yourto
options below. Look
determine the rank ordering of the
for a link at the bottom of this page or in our privacy policy where you can
probabilities. withdraw consent.

AUC-ROC curve: The AUC-ROC is another performance metric. The ROC is the plot
between the sensitivity. Consent Manage options

Gini Coefficient: It is used in the classification problems, also known as the Gini Index.
It determines the inequality between the values of variables. The high value of the Gini
represents a good model.

Root mean squared error: It is one of the most popular metrics used for the
evaluation of the regression model. It works by assuming that errors are unbiased and
have a normal distribution.

Cross-Validation: It is another popular technique for evaluating the performance of the


machine learning model. In this, the models are trained on subsets of the input data and
evaluated on the complementary subset of the data.
41) Explain rational agents and rationality?

A rational agent is an agent that has clear preferences, model uncertainty, and that
performs the right actions always. A rational agent is able to take the best possible action in
any situation.

Rationality is a status of being reasonable and sensible with a good sense of judgment.

42) What is tensor flow, and how it is used in AI?

Tensor flow is the open-source library platform developed by the Google Brain team. It is a
math library used for several machine learning applications. With the help of tensor flow, we
can easily train and deploy the machine learning models in the cloud.

Welcome to Javatpoint
43) Which algorithm is JAVATPOINT
used by asks
Facebook for face
for your consent to: recognition? Explain its
working.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Facebook uses the DeepFace tool that uses the deep learning algorithms for the face
devices the
verification that allows Store and/or access
photo information on a device
tag suggestions to you when you upload a photo on
Facebook. The deep face identifies the faces in the digital images using neural network
expand_more Learn more
models. The working of DeepFace is given in below steps:
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
It first scans the accessed
uploaded by andimages.
shared withItthird
makes the 3-D
party vendors, model
or used of the
specifically by image, and then rotate
this site or app.
that image into different angles.
Some vendors may process your personal data on the basis of legitimate
After that, it starts matching.
interest, Toobject
which you can match that image,
to by managing it uses
your options below.aLook
neural network model to
for a link at the
determine the high-level bottom of this between
similarities page or in ourother
privacyphotos
policy where
of you can
a person. It checks for the
withdraw consent.
different features such as the distance between the eyes, the shape of the nose, eyes
color, etc.
Consent Manage options
Then it does the recursive checking for 68 landmark testing, as each human face
consists of 68 specific facial points.

After mapping, it encodes the image and searches for the information of that person.

44) What is a market-basket analysis?

The market-basket analysis is a popular technique to find the associations between the items.
It is frequently used by big retailers in order to get maximum profit. In this approach, we need
to find combinations of items that are frequently bought together.
For example, if a person buys bread, there are most of the chances that he will buy butter
also. Hence, understanding such correlations can help retailers to grow their business by
providing relevant offers to their customers.

45) How can AI be used in fraud detection?

The artificial intelligence can be broadly helpful in fraud detection using different machine
learning algorithms, such as supervised and unsupervised learning algorithms. The rule-based
algorithms of Machine learning helps to analyze the patterns for any transaction and block the
fraudulent transactions.

Below are the steps used in fraud detection using machine learning:

Data extraction: The first step is data extraction. Data is gathered through a survey or
Welcome to Javatpoint
with the help of web scraping tools. The data collection depends on the type of model,
and we want to create.JAVATPOINT asks
It generally for your
includes theconsent to: details, personal details,
transaction
shopping, etc.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Data Cleaning: The irrelevant or redundant data is removed in this step. The
inconsistency present in the
devices Store data
and/or may
access lead toonwrong
information a devicepredictions.

Data exploration & analysis: This is one of the most crucial steps in which we need to
expand_more Learn more
find out the relation between different predictor variables.
Your personal data will be processed and information from your device
Building Models: Now,
(cookies, the
unique final and
identifiers, step isdevice
other to build the
data) may model
be stored by, using different machine
accessed by and shared with third party vendors, or used specifically by
learning algorithms depending on the business requirement. Such as Regression or
this site or app.
classification.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
46) Give the steps for A* algorithm?

Consent
A* algorithm is the popular form Manage
of the Best first search. options
It tries to find the shortest path using
the heuristic function with the cost function to reach the end node. The steps for A* algorithms
are given below:

Step 1: Put the first node in the OPEN list.

Step 2: Check if the OPEN list is empty or not; if the list is empty, then return failure and
stops.

Step 3: Select the node from the OPEN list which has the smallest value of evaluation function
(g+h), if node n is goal node then return success and stop, otherwise
Step 4: Expand node n and generate all of its successors, and put n into the closed list. For
each successor n', check whether n' is already in the OPEN or CLOSED list; if not, then
compute evaluation function for n' and place into Open list.

Step 5: Else if node n' is already in OPEN and CLOSED list, then it should be attached to the
back pointer, which reflects the lowest g(n') value.

Step 6: Return to Step 2.

47) What is the inference engine,Welcome


and why it is used in AI?
to Javatpoint
JAVATPOINT
In artificial intelligence, the inference asks is
engine forthe
your consent
part of an to:
intelligent system that derives
new information from the knowledge base by applying some logical rules.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
It mainly works in two modes:
devices Store and/or access information on a device
Backward Chaining: It begins with the goal and proceeds backward to deduce the
facts that supportexpand_morethe Learn
goal.more
Your personal data will be processed and information from your device
Forward Chaining: It starts with known facts, and asserts new facts.
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
48) What do you understand byprocess
Some vendors may the your
fuzzy logic?
personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
Fuzzy logic is a method of consent.
withdraw reasoning applied to the AI, which resembles human reasoning.
Here the word "fuzzy" defines things that are not clear, it means the situations where it is
difficult to decide if the state isConsent
True or False. It involves all the
Manage possibilities that occur between
options
Yes and NO.

The below diagram shows the difference between fuzzy logic and Boolean logic
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
Since it resembles human reasoning, hence it can be used in neural networks.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development

49) What is a Bayesian network,


devices Store andinformation
and/or access why is onit aimportant
device in AI?

Learngraphical
expand_more the
Bayesian networks are more models that are used to show the probabilistic
relationship between Your
a set of data
personal variables. It is and
will be processed a directed
information cycle
from yourgraph
device that contains multiple
(cookies, unique identifiers, and other device data) may be stored by,
edges, and each edgeaccessed
represents a conditional dependency.
by and shared with third party vendors, or used specifically by
this site or app.
Bayesian networks are probabilistic, because these networks are built from a probability
Some vendors may process your personal data on the basis of legitimate
distribution, and alsointerest,
use which you can objecttheory
probability to by managing your options below.
for prediction andLookanomaly detection. It is
for a link at the bottom of this page or in our privacy policy where you can
important in AI as it is based
withdraw on Bayes theorem and can be used to answer the probabilistic
consent.
questions.
Consent Manage options

50) What is a heuristic function, and where is it used?

The heuristic function is used in Informed Search, and it finds the most promising path. It takes
the current state of the agent as its input and produces the estimation of how close the agent
is from the goal. The heuristic method, however, might not always give the best solution, but it
guaranteed to find a good solution in a reasonable time. Heuristic function estimates how
close a state is to the goal. It is represented by h(n), and it calculates the cost of an optimal
path between the pair of states. The value of the heuristic function is always positive.

Admissibility of the heuristic function is given as:


h(n) <= h*(n)

Here h(n) is heuristic cost, and h*(n) is the estimated cost. Hence heuristic cost should be less
than or equal to the estimated cost.

Interview Tips Job/HR Interview Questions

Company Interview Questions & Procedure JavaScript Interview Questions

Java Basics Interview Questions Java OOPs Interview Questions

Servlet Interview Questions Welcome to Javatpoint JSP Interview Questions

Spring Interview Questions


JAVATPOINT asks for your consent to:
Hibernate Interview Questions

Personalised ads and content, ad and content measurement,


PL/SQL Interviewperm_identityQuestions
audience insights and product development SQL Interview Questions

Oracle Interviewdevices
Questions
Store and/or access information on a device Android Interview Questions

jQuery Interviewexpand_more
Questions
Learn more MySQL Interview Questions

Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.

Consent Manage options

You may also like:

Java Interview Questions


SQL Interview Questions
Python Interview Questions
JavaScript Interview Questions
Angular Interview Questions
Selenium Interview Questions
Spring Boot Interview Questions
HR Interview Questions
C Programming Interview Questions
C++ Interview Questions
Data Structure Interview Questions
DBMS Interview Questions
HTML Interview Questions
Welcome to Javatpoint
IAS Interview Questions
JAVATPOINT asks for your consent to:
Manual Testing Interview Questions
OOPs Interview Questions Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
.Net Interview Questions
devices
C# Interview Questions
Store and/or access information on a device

ReactJS Interview Questions


Learn more
expand_more
Networking Interview Questions
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
PHP Interview Questions
accessed by and shared with third party vendors, or used specifically by
this site or app.
CSS Interview Questions
Some vendors may process your personal data on the basis of legitimate
Node.js Interview Questions
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
Spring Interview Questions
withdraw consent.
Hibernate Interview Questions
AWS Interview Questions Consent Manage options
Accounting Interview Questions

Learn Latest Tutorials

Splunk tutorial SPSS tutorial Swagger T-SQL tutorial


tutorial
Splunk SPSS Transact-SQL
Swagger
Tumblr tutorial React tutorial Regex tutorial Reinforcement
learning tutorial
Tumblr ReactJS Regex
Reinforcement
Learning

R Programming RxJS tutorial React Native Python Design


tutorial tutorial Patterns
RxJS
R Programming React Native Python Design
Patterns

Python Pillow Python Turtle Keras tutorial


tutorial tutorial
Keras
Python Pillow Python Turtle

Welcome to Javatpoint
JAVATPOINT asks for your consent to:

Personalised ads and content, ad and content measurement,


perm_identity audience insights and product development
Preparation
devices Store and/or access information on a device

Aptitude Logical Verbal Ability Interview


Learn more
expand_more Reasoning Questions
Aptitude Verbal Ability
Your personal data will be processed and information from
Reasoning your device
Interview Questions
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
Company interest, which you can object to by managing your options below. Look
Interview for a link at the bottom of this page or in our privacy policy where you can
Questions withdraw consent.
Company Questions

Consent Manage options

Trending Technologies

Artificial AWS Tutorial Selenium Cloud


Intelligence tutorial Computing
Tutorial AWS tutorial
Selenium
Artificial Cloud Computing
Intelligence

Hadoop tutorial
Hadoop
ReactJS Data Science Angular 7
Tutorial Tutorial Tutorial
ReactJS Data Science Angular 7

Blockchain Git Tutorial Machine DevOps


Tutorial Learning Tutorial Tutorial
Git
Blockchain Machine Learning DevOps

B.Tech / MCA
Welcome to Javatpoint
DBMS tutorial Data JAVATPOINT
Structures asks for tutorial
DAA your consent to:Operating
tutorial System tutorial
DBMS DAA
Personalised ads and content, ad and content measurement,
perm_identityDataaudience
Structures
insights and product development
Operating System

devices Store and/or access information on a device

Computer Compiler Computer Discrete


Network tutorial Learn
expand_moreDesign more
tutorial Organization and Mathematics
Architecture Tutorial
Computer Network Your personalDesign
Compiler data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored
Computer by,
Discrete
accessed by and shared with third party vendors, or used specifically by
Organization Mathematics
this site or app.
Some vendors may process your personal data on the basis of legitimate
Ethical Hacking interest,Computer
which you can object to by Software html Look
managing your options below. tutorial
Tutorial forGraphics Tutorial
a link at the Engineering
bottom of this page or in our privacy policy where you can
Tutorial Web Technology
withdraw consent.
Ethical Hacking Computer Graphics
Software
Engineering
Consent Manage options

Cyber Security Automata C Language C++ tutorial


tutorial Tutorial tutorial
C++
Cyber Security Automata C Programming

Java tutorial .Net Python tutorial List of


Framework Programs
Java tutorial Python
Programs
.Net
Control Data Mining Data
Systems tutorial Tutorial Warehouse
Tutorial
Control System Data Mining
Data Warehouse

Welcome to Javatpoint
JAVATPOINT asks for your consent to:

Personalised ads and content, ad and content measurement,


perm_identity audience insights and product development

devices Store and/or access information on a device

expand_more Learn more

Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.

Consent Manage options

You might also like