Artificial Intelligence Questions N Answers
Artificial Intelligence Questions N Answers
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
With artificial intelligence, we do not need to pre-program the machine to perform a task;
instead, we can create a machine with the programmed
Welcome to Javatpoint algorithms, and it can work on its
own.
JAVATPOINT asks for your consent to:
behavior. We need AI for today's world to solve complex problems, make our lives more
expand_more Learn more
smoothly by automating the routine work, saving the manpower, and to perform many more
other tasks. Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
There are various real-world applications of AI, and some of them are given below:
Google Search Engine: When we start writing something on the google search engine,
we immediately get the relevant recommendations from google, and this is because of
different AI technologies.
Spam Filters in Email: The AI is also used for email spam filtering so that you can get
the important and relevant emails only in your inbox. As per the studies, Gmail
successfully filters 99.9% of spam mails.
AI completely deals with ML deals with Deep learning deals with structured and
structured, semi- structured and unstructured data.
structured data. semi-structured
data.
It requires a huge amount It can work with It requires a huge amount of the data
of data to work. less amount of data compared to the ML.
compared to deep
learning and AI.
The goal of AI is to enable The goal of ML is to The goal of deep learning is to solve the
the machine to think enable the machine complex problems as the human brain
without any human to learn from past does, using various algorithms.
intervention. experiences.
Artificial intelligence can be divided into different types on the basis of capabilities and
Welcome to Javatpoint
functionalities.
JAVATPOINT asks for your consent to:
Based on Capabilities:
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Weak AI or Narrow AI: Weak AI is capable of performing some dedicated tasks with
intelligence. Siri is
devicesan Store
example
and/or of Weak
access AI. on a device
information
General AI: The intelligent machines that can perform any intellectual task with
expand_more Learn more
efficiency as a human.
Your personal data will be processed and information from your device
Strong AI: It is (cookies,
the hypothetical concept
unique identifiers, that data)
and other device involves the machine
may be stored by, that will be better
accessed
than humans and by and shared
will surpass with third
human party vendors, or used specifically by
intelligence.
this site or app.
Some vendors may process your personal data on the basis of legitimate
Based on Functionalities:
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdrawPurely
Reactive Machines: consent. reactive machines are the basic types of AI. These focus on
the present actions and cannot store the previous actions. Example: Deep Blue.
Consent Manage options
Limited Memory: As its name suggests, it can store the past data or experience for the
limited duration. The self-driving car is an example of such AI types.
Self-Awareness: Self Awareness AI is the future of Artificial Intelligence that will have
their own consciousness, emotions, similar to humans. Read More.
AI covers lots of domains or subsets, and some main domains are given below:
Machine Learning
Deep Learning
Neural Network
Expert System
Fuzzy Logic
Robotics
c. ReinforcementSome
Learning: In Reinforcement
vendors may process learning,
your personal data on the basis of an agent interacts with its
legitimate
interest, which you can object to by managing your options below. Look
environment by for
producing actions,
a link at the bottom and
of this pagelearn with
or in our the
privacy help
policy ofyou
where feedback.
can The feedback is
withdraw
given to the agent in consent.
the form of rewards, such as for each good action, he gets a
positive reward, and for each bad action, he gets a negative reward. There is no
supervision provided to Consent
the agent. Q-Learning algorithm
Manage options is used in reinforcement
learning.
Python
Java
Lisp
Prolog
Among the above five languages, Python is the most used language for AI development due to
its simplicity and availability of lots of libraries, such as Numpy, Pandas, etc.
11) What is the intelligent agent in AI, and where are they used?
Welcome to Javatpoint
The intelligent agent can be any autonomous entity that perceives its environment through
JAVATPOINT asks for your consent to:
the sensors and act on it using the actuators for achieving its goal.
Personalised ads and content, ad and content measurement,
perm_identity in audience
These Intelligent agents AI are used
insightsinand
the following
product applications:
development
devices and
Information Access Store and/or access information
Navigations on a device
such as Search Engine
Repetitive Activities
expand_more Learn more
Domain Experts Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
Chatbots, etc. accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
12) How is machineinterest, which you can object to by managing your options below. Look
forlearning related
a link at the bottom of thisto
pageAI?
or in our privacy policy where you can
withdraw consent.
Machine learning is a subset or subfield of Artificial intelligence. It is a way of achieving AI. As
both are the two different concepts
Consentand the relationManage
between both can be understood as "AI
options
uses different Machine learning algorithms and concepts to solve the complex problems."
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
In this process, the agent performs an action A to take a transition from state S1 to S2 or from
the start state to the end state, and while doing these actions, the agent gets some rewards.
The series of actions taken by the agent can be defined as the policy.
In machine learning, there are mainly two types of models, Parametric and Non-parametric.
Here parameters are the predictor variables that are used to build the machine learning
model. The explanation of these models is given below:
Hidden Markov model is a statistical model used for representing the probability distributions
over a chain of observations. In the hidden markov model, hidden defines a property that it
assumes that the state of a process generated at a particular time is hidden from the
observer, and Markov defines that it assumes that the process satisfies the Markov property.
The HMM models are mostly used for temporal data.
The HMM is used in various applications such as reinforcement learning, temporal pattern
recognition, etc.
18) What is Strong AI, and how is it different from the Weak AI?
Welcome to Javatpoint
Strong AI: Strong AI is about creating real intelligence artificially, which means a human-
JAVATPOINTself-awareness,
made intelligence that has sentiments, asks for your consent to:
and emotions similar to humans. It is
still an assumption that has a concept
Personalised ads andof building
content, ad andAI agents
content with thinking, reasoning, and
measurement,
perm_identity
audience insights and product development
decision-making capabilities similar to humans.
In this test, three players are involved, the first player is a computer, the second player is a
human responder, and the third player is the human interrogator, and the interrogator needs
to find which response is from the machine on the basis of questions and answers.
Turing Test.
Cross-Validation
Regularization
Ensembling
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
23) What is NLP? What
accessed are
by andthe various
shared components
with third party vendors, or usedof NLP?by
specifically
this site or app.
NLP stands for Natural
SomeLanguage Processing,
vendors may process which
your personal is the
data on a basis
branch of artificial intelligence. It
of legitimate
interest, which you can object to by managing your options below. Look
enables machines to understand, interpret,
for a link at the bottom and
of this page or manipulate thewhere
in our privacy policy human language.
you can
withdraw consent.
Components of NLP:
a. Text Planning
b. Sentence Planning
c. Text Realization
24) What are the different components of the Expert System?
a. User Interface: It enables a user to interact or communicate with the expert system to
find the solution for a problem.
b. Inference Engine: It is called the main processing unit or brain of the expert system. It
applies different inference rules to the knowledge base to draw a conclusion from it. The
system extracts the information from the KB with the help of an inference engine.
c. Knowledge Base: The knowledge base is a type of storage area that stores the
domain-specific and high-quality knowledge.
Consent
Following terminologies that are used in the Minimax Manage options
Algorithm:
Utility Function: The function that assigns a numeric value for the outcome of the
game.
Game theory and AI are much related and useful to each other. In AI, the game theory is
widely used to enable some of the key capabilities required in the multi-agent environment, in
which multiple agents try to interact with each other to achieve a goal.
Different popular games such as Poker, Chess, etc., are the logical games with the specified
rules. To play these games online or digitally, such as on Mobile, laptop, etc., one has to create
algorithms for such games. And these algorithms are applied with the help of artificial
intelligence.
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
28) What are some misconceptions about AI?
Personalised ads and content, ad and content measurement,
perm_identity
audience about
insights and product intelligence
development since starting its evolution. Some
There are lots of misconceptions artificial
of these misconceptions areStore
given below:
devices
and/or access information on a device
AI is new technology: Although some people think that it is a new technology, this
technology actually first thought in the year 1840 through an English newspaper.
Eigenvectors and eigenvalues are the two main concepts of Linear algebra.
30) What is an Artificial neural network? Name some commonly used Artificial
Neural networks.
Artificial neural networks are the statistical model inspired by the functioning of human brain
cells called neurons. These neural networks include various AI technologies such as deep
learning and machine learning.
An Artificial neural network or ANN consists of multiple layers, including the Input layer,
Output Layer, and hidden layers.
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
ANN, with the help Some
of various
vendors maydeep learning
process techniques,
your personal is ofthe
data on the basis AI tools to solve various
legitimate
complex problems likeinterest,
pattern whichrecognition,
you can object tofacial
by managing your optionsand
recognition, below.soLook
on.
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
Some commonly used Artificial neural networks:
Consent
Feedforward Neural Network Manage options
Autoencoders
31) Give a brief introduction of partial, alternate, artificial, and compound keys?
Partial Keys: A set of attributes that uniquely identifies weak entities, which are related to
the same owner entity.
Alternate Keys: All candidate keys except the primary key are known as alternate keys.
Compound Key: It has multiple fields that enable the user to uniquely recognize a specific
record.
Artificial Key: It is the extra attribute added to the table when there are no stands alone or
compounds key is available. It is created by assigning a number to each record in the table.
A chatbot is Artificial intelligence software or agent that can simulate a conversation with
humans or users using Natural language processing. The conversation can be achieved
through an application, website, or messaging apps. These chatbots are also called as the
digital assistants and can interact with humans in the form of text or through voice.
Welcome to Javatpoint
JAVATPOINT
The AI chatbots are broadly used in mostasks for yourtoconsent
businesses provideto:
24*7 virtual customer support
to their customers, such as HDFC Eva chatbot, Vainubot, etc.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Knowledge representation
expand_more is themore
Learn part of AI, which is concerned with the thinking of AI agents. It
is used to represent Your
the personal
knowledgedata will about theand
be processed real world from
information to the AI agents so that they can
your device
understand and utilize(cookies, unique identifiers,
this information forand other device
solving thedata) may be stored
complex by,
problems in AI.
accessed by and shared with third party vendors, or used specifically by
this site or app.
Following elements of Knowledge that are represented to the agent in the AI system:
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
Objects for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
Events
Meta-Knowledge
Facts
Knowledge-base
Logical Representation
Semantic Network Representation
Frame Representation
Production Rules
35) Which programming language is not generally used in AI, and why?
Perl Programming language is not commonly used language for AI, as it is the scripting
language.
Reinforcement learning is a type of machine learning. In this, an agent interacts with its
Welcome to Javatpoint
environment by producing actions, and learn with the help of feedback. The feedback is given
JAVATPOINT
to the agent in the form of rewards, suchasks for each
as for your consent to: he gets a positive reward,
good action,
and for each bad action, he gets a negative reward. There is no any labeled data or
Personalised ads and content, ad and content measurement,
supervision is perm_identity audience
provided to the agent.
insights In development
and product RL, the agent continuously does three
things(performing actions, changing state, and getting the feedback) to explore the
devices Store and/or access information on a device
environment.
expand_more Learn
State: It is the situation more
that is returned by the environment to the agent.
Your personal
Reward: The feedback data willto
received be the
processed
agentandafter
information
doing fromeach
your device
action.
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
In RL, the agent interacts
this sitewith
or app.the environment in order to explore it by doing some actions.
On each action, the state of agent
Some vendors gets changed
may process your personalor sometimes
data on the basis ofremains
legitimate the same, and based
interest, which you can object to by managing your options below. Look
on the type of action, for
and heat gets
a link a reward.
the bottom The
of this page or inreward is policy
our privacy feedback,
where youwhich
can may be negative or
positive based on the withdraw
action.consent.
38) What are the different areas where AI has a great impact?
Autonomous Transportation
Healthcare
Predictive Policing
Space Exploration
Entertainment, etc.
c. IBM Watson
d. TensorFlow
e. Infosys Nia
f. Rainbird
Welcome to Javatpoint
g. Dialogflow
JAVATPOINT asks for your consent to:
expand_more ItLearn
Confusion Matrix: more
is N*N table with different sets of value that is used to determine
the performanceYour
of the classification
personal model
data will be processed andininformation
machine learning.
from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed
F1 score: It is the by and shared
harmonic mean with third party vendors,
of precision andor used specifically
recall, which by is used as one of the
this site or app.
best metrics to evaluate the ML model.
Some vendors may process your personal data on the basis of legitimate
interest, which
Gain and lift charts: Gain you&can object
Lift to by managing
charts are used yourto
options below. Look
determine the rank ordering of the
for a link at the bottom of this page or in our privacy policy where you can
probabilities. withdraw consent.
AUC-ROC curve: The AUC-ROC is another performance metric. The ROC is the plot
between the sensitivity. Consent Manage options
Gini Coefficient: It is used in the classification problems, also known as the Gini Index.
It determines the inequality between the values of variables. The high value of the Gini
represents a good model.
Root mean squared error: It is one of the most popular metrics used for the
evaluation of the regression model. It works by assuming that errors are unbiased and
have a normal distribution.
A rational agent is an agent that has clear preferences, model uncertainty, and that
performs the right actions always. A rational agent is able to take the best possible action in
any situation.
Rationality is a status of being reasonable and sensible with a good sense of judgment.
Tensor flow is the open-source library platform developed by the Google Brain team. It is a
math library used for several machine learning applications. With the help of tensor flow, we
can easily train and deploy the machine learning models in the cloud.
Welcome to Javatpoint
43) Which algorithm is JAVATPOINT
used by asks
Facebook for face
for your consent to: recognition? Explain its
working.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Facebook uses the DeepFace tool that uses the deep learning algorithms for the face
devices the
verification that allows Store and/or access
photo information on a device
tag suggestions to you when you upload a photo on
Facebook. The deep face identifies the faces in the digital images using neural network
expand_more Learn more
models. The working of DeepFace is given in below steps:
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
It first scans the accessed
uploaded by andimages.
shared withItthird
makes the 3-D
party vendors, model
or used of the
specifically by image, and then rotate
this site or app.
that image into different angles.
Some vendors may process your personal data on the basis of legitimate
After that, it starts matching.
interest, Toobject
which you can match that image,
to by managing it uses
your options below.aLook
neural network model to
for a link at the
determine the high-level bottom of this between
similarities page or in ourother
privacyphotos
policy where
of you can
a person. It checks for the
withdraw consent.
different features such as the distance between the eyes, the shape of the nose, eyes
color, etc.
Consent Manage options
Then it does the recursive checking for 68 landmark testing, as each human face
consists of 68 specific facial points.
After mapping, it encodes the image and searches for the information of that person.
The market-basket analysis is a popular technique to find the associations between the items.
It is frequently used by big retailers in order to get maximum profit. In this approach, we need
to find combinations of items that are frequently bought together.
For example, if a person buys bread, there are most of the chances that he will buy butter
also. Hence, understanding such correlations can help retailers to grow their business by
providing relevant offers to their customers.
The artificial intelligence can be broadly helpful in fraud detection using different machine
learning algorithms, such as supervised and unsupervised learning algorithms. The rule-based
algorithms of Machine learning helps to analyze the patterns for any transaction and block the
fraudulent transactions.
Below are the steps used in fraud detection using machine learning:
Data extraction: The first step is data extraction. Data is gathered through a survey or
Welcome to Javatpoint
with the help of web scraping tools. The data collection depends on the type of model,
and we want to create.JAVATPOINT asks
It generally for your
includes theconsent to: details, personal details,
transaction
shopping, etc.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Data Cleaning: The irrelevant or redundant data is removed in this step. The
inconsistency present in the
devices Store data
and/or may
access lead toonwrong
information a devicepredictions.
Data exploration & analysis: This is one of the most crucial steps in which we need to
expand_more Learn more
find out the relation between different predictor variables.
Your personal data will be processed and information from your device
Building Models: Now,
(cookies, the
unique final and
identifiers, step isdevice
other to build the
data) may model
be stored by, using different machine
accessed by and shared with third party vendors, or used specifically by
learning algorithms depending on the business requirement. Such as Regression or
this site or app.
classification.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
46) Give the steps for A* algorithm?
Consent
A* algorithm is the popular form Manage
of the Best first search. options
It tries to find the shortest path using
the heuristic function with the cost function to reach the end node. The steps for A* algorithms
are given below:
Step 2: Check if the OPEN list is empty or not; if the list is empty, then return failure and
stops.
Step 3: Select the node from the OPEN list which has the smallest value of evaluation function
(g+h), if node n is goal node then return success and stop, otherwise
Step 4: Expand node n and generate all of its successors, and put n into the closed list. For
each successor n', check whether n' is already in the OPEN or CLOSED list; if not, then
compute evaluation function for n' and place into Open list.
Step 5: Else if node n' is already in OPEN and CLOSED list, then it should be attached to the
back pointer, which reflects the lowest g(n') value.
The below diagram shows the difference between fuzzy logic and Boolean logic
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
Since it resembles human reasoning, hence it can be used in neural networks.
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Learngraphical
expand_more the
Bayesian networks are more models that are used to show the probabilistic
relationship between Your
a set of data
personal variables. It is and
will be processed a directed
information cycle
from yourgraph
device that contains multiple
(cookies, unique identifiers, and other device data) may be stored by,
edges, and each edgeaccessed
represents a conditional dependency.
by and shared with third party vendors, or used specifically by
this site or app.
Bayesian networks are probabilistic, because these networks are built from a probability
Some vendors may process your personal data on the basis of legitimate
distribution, and alsointerest,
use which you can objecttheory
probability to by managing your options below.
for prediction andLookanomaly detection. It is
for a link at the bottom of this page or in our privacy policy where you can
important in AI as it is based
withdraw on Bayes theorem and can be used to answer the probabilistic
consent.
questions.
Consent Manage options
The heuristic function is used in Informed Search, and it finds the most promising path. It takes
the current state of the agent as its input and produces the estimation of how close the agent
is from the goal. The heuristic method, however, might not always give the best solution, but it
guaranteed to find a good solution in a reasonable time. Heuristic function estimates how
close a state is to the goal. It is represented by h(n), and it calculates the cost of an optimal
path between the pair of states. The value of the heuristic function is always positive.
Here h(n) is heuristic cost, and h*(n) is the estimated cost. Hence heuristic cost should be less
than or equal to the estimated cost.
Oracle Interviewdevices
Questions
Store and/or access information on a device Android Interview Questions
jQuery Interviewexpand_more
Questions
Learn more MySQL Interview Questions
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
Trending Technologies
Hadoop tutorial
Hadoop
ReactJS Data Science Angular 7
Tutorial Tutorial Tutorial
ReactJS Data Science Angular 7
B.Tech / MCA
Welcome to Javatpoint
DBMS tutorial Data JAVATPOINT
Structures asks for tutorial
DAA your consent to:Operating
tutorial System tutorial
DBMS DAA
Personalised ads and content, ad and content measurement,
perm_identityDataaudience
Structures
insights and product development
Operating System
Welcome to Javatpoint
JAVATPOINT asks for your consent to:
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look
for a link at the bottom of this page or in our privacy policy where you can
withdraw consent.