Digital Fluency Complete Notes All 3 Modules
Digital Fluency Complete Notes All 3 Modules
What is AI?
AI is techniques that help machines and computers mimic human behaviour. Or in simple
words, AI is intelligence demonstrated by machines, as opposed to the natural intelligence
displayed by humans or animals. At the highest level, AI is a device being smart, machine
acting like a human. It is the simulation of human intelligence processes by machines,
especially computer systems.
Artificial Intelligence is when software or a particular model developed can perform complex
tasks on its own without requiring any assistance from humans.
ML is the general techniques or variety of techniques that make the device smart. It is a
branch of artificial intelligence based on the idea that systems can learn from data, identify
patterns and make decisions with minimal human intervention.
Machine learning is a way of “training” an algorithm so that it can learn how. “Training”
involves feeding huge amounts of data to the algorithm and allowing the algorithm to adjust
itself and improve.
Deep learning is a subset of machine learning, which is essentially a neural network with
three or more layers. These neural networks attempt to simulate the behaviour of the
human brain, allowing it to “learn” from large amounts of data.
Deep learning was inspired by the structure and function of the brain, namely the
interconnecting of many neurons. Artificial Neural Networks (ANNs) are algorithms that
mimic the biological structure of the brain.
Explain applications of AI
1. Typing using software: While typing reports using any word-processor, wrong spellings
or incorrect grammar is highlighted. Auto-complete options of previously used words, or
auto-suggest of commonly used words while typing are given.
2. Shopping online/ Watching online: Depending on the user profile, the system shows ads,
products or suggests programs to watch.
3. Chatbots : Chatbots are used universally today on many websites to interact with the
human users that arrive on the specific sites.
RAMAIAH INSTITUTE OF BUSINESS STUDIES
4. Robotics: Today, most of the industrial world is using robots to automate repetitive tasks.
We see robots used to assemble cars, pack food items, paint vehicles and to even serve as
your personal assistants/servants in homes.
5. Real Time Translation: Most of us use Google translate to get text translated from one
language to another. It is a boon in a country like India, where we have a number of local
languages.
6. Digital Assistants (Virtual Companions) like Alexa and Siri are being used in homes to
converse and perform simple tasks. In certain countries, virtual pets and companions are
becoming popular
8. Gaming and Simulation is fast changing the ways in which we have been traditionally
doing things. Especially in the fields of training, marketing and entertainment, Augmented
Reality (AR) and Virtual Reality (VR) are two technologies that are forging a revolution.
Virtual reality (VR) is a simulated experience that can be similar to or completely different
from the real world. Both AR and VR use multiple senses including visual (sight, eyes),
auditory (hearing, ears), haptic (touch), somatosensory (touch, position and movement) and
olfactory(smell, nose).
2. Narrow AI exhibits some facet(s) of human intelligence, and can do that facet extremely
well, but is lacking in other areas. A machine that’s great at recognizing images, but nothing
else, would be an example of narrow AI.
Neural Networks is the old name for Deep Learning. Neural networks are a means of doing
machine learning, in which a computer learns to perform some task by analyzing training
examples. Usually, the examples have been hand-labeled in advance. An object recognition
system, for instance, might be fed thousands of labeled images of cars, houses, coffee cups,
and so on, and it would find visual patterns in the images that consistently correlate with
particular labels.
RAMAIAH INSTITUTE OF BUSINESS STUDIES
Modelled loosely on the human brain, a neural net consists of thousands of simple processing
nodes that are densely interconnected. Most of today’s neural nets are organized into layers
of nodes, and they’re “feed-forward,” meaning that data moves through them in only one
direction. An individual node might be connected to several nodes in the layer beneath it,
from which it receives data, and several nodes in the layer above it, to which it sends data.
Supervised Learning:
Supervised learning is commonly used in applications where historical data predicts likely
future events. For example, it can anticipate when credit card transactions are likely to be
fraudulent or which insurance customer is likely to file a claim.
The most common fields of use for supervised learning are price prediction and trend
forecasting in sales, retail commerce, and stock trading. In both cases, an algorithm uses
incoming data to assess the possibility and calculate possible outcomes.
Unsupervised Learning:
Unsupervised learning works well on transactional data. For example, it can identify
segments of customers with similar attributes who can then be treated similarly in marketing
campaigns. Or it can find the main attributes that separate customer segments from each
other.
Semi-supervised Learning:
Semi-supervised learning is useful when the cost is too high to allow for a fully supervised
process. Examples of this include identifying a person's face on a web cam. Legal and
Healthcare industries, among others, manage web content classification, image, and speech
analysis with the help of semi-supervised learning.
Reinforcement Learning: This is often used for robotics, gaming and navigation. With
reinforcement learning, the system discovers through trial and error which actions yield the
greatest rewards. Modern NPCs (non-playing characters) and other video games use this type
of machine learning model a lot. For example, the collision detection feature uses this type of
ML algorithm for the moving vehicles and people in the Grand Theft Auto series
What are the applications of Machine Learning? Or Explain the areas where ML is
used or Who Uses Machine Learning ?
1. Financial Services: Banks and other businesses in the financial industry use machine
learning technology for two key purposes: to identify important insights in data, and prevent
fraud.
RAMAIAH INSTITUTE OF BUSINESS STUDIES
2. Government Agencies: Government agencies such as public safety and utilities have a
particular need for machine learning since they have multiple sources of data that can be
mined for insights. Analyzing sensor data, for example, identifies ways to increase efficiency
and save money. Machine learning can also help detect fraud and minimize identity theft.
3. Healthcare: Machine learning is a fast-growing trend in the health care industry, thanks to
the advent of wearable devices and sensors that can use data to assess a patient's health in real
time. The technology can also help medical experts analyze data to identify trends or red
flags that may lead to improved diagnoses and treatment.
4. Oil and Gas: Finding new energy sources. Analyzing minerals in the ground. Predicting
refinery sensor failure. Streamlining oil distribution to make it more efficient and cost-
effective.
5. Transportation and Logistics: Analyzing data to identify patterns and trends is key to the
transportation industry, which relies on making routes more efficient and predicting potential
problems to increase profitability.
Robotics is a combined branch of engineering and science which deals with the study of
development, operation, and control of intelligent robots. Robotics is a part of Artificial
intelligence. Robotics technology is used for the development of machines which can
perform a complex human task in a very efficient way.
Various types of sensors used in robots include light sensors, sound sensors, temperature
sensors, proximity sensors, and acceleration and navigation sensors.
RAMAIAH INSTITUTE OF BUSINESS STUDIES
A digital assistant pulls data from multiple sources and puts it into context. Advanced natural
language processing gives it the ability to process what you are saying or typing. Advanced
natural language understanding (NLU) gives it the ability to parse what you say or type and
then generate accurate answers
Data-driven and predictive (Conversational AI) chatbots are also called a Virtual Assistant or
Digital Assistant. Apple's Siri and Amazon's Alexa are examples of consumer-oriented,
datadriven, predictive AI chatbots
An autonomous system is one that can achieve a given set of goals in a changing environment
– gathering information about the environment and working for an extended period of time
without human control or intervention.
There are several critical technologies behind safe and efficient autonomous-vehicle
operation—AI, safety and security, cameras, network infrastructure, and the sensor
technologies radar and lidar, or laser-light radar.
Autonomous things are fundamentally important because they represent the first real
disconnection of machines from explicit human guidance. Humans are used to programming
things, but are not used to them acting in autonomous ways. Self-driving vehicles are still
making their way onto the roads.
RAMAIAH INSTITUTE OF BUSINESS STUDIES
What is Database ?
Database A database is defined as a structured set of data held in a computer’s memory or on
the cloud that is accessible in various ways.
What is DBMS ?
Database Management Systems (DBMS) refer to the technology solution used to optimize
and manage the storage and retrieval of data from databases.
Object-oriented database:
Here, the data is represented in the form of objects, as in object-oriented programming.
Distributed database:
It has two or more files located in different places. The database may be in the same physical
location on multiple computers or scattered over different networks.
NoSQL database:
NoSQL is a nonrelational database that contains unstructured and semistructured data. It rose
in popularity as web applications came to be commonly used and became more complex.
RAMAIAH INSTITUTE OF BUSINESS STUDIES
Advantages of Databases
Minimum data redundancy
Improved data security
Increased consistency
Lower updating errors
Reduced costs of data entry, data storage, and data retrieval
Improved data access using host and query languages.
Higher data integrity from application programs
How Facebook Uses Data Analytics To Understand Your Posts And Recognize Your
Face?
Facial recognition - Facebook uses a DL application called DeepFace to teach it to recognize
people in photos. It says that its most advanced image recognition tool is more successful
than humans in recognizing whether two different images are of the same person or not –
with DeepFace scoring a 97% success rate compared to humans with 96%.
\
RAMAIAH INSTITUTE OF BUSINESS STUDIES
What is IoT?
IoT is an evolution of mobile, home and embedded applications interconnected to each other.
Using the internet and data analytics, billions of devices connected to each other create an
intelligent system of systems. When these connected devices use cloud computing, analyse
huge amounts of data and provide services, they can change the way in which we live our
lives and conduct our businesses.
The Internet of Things (IoT) describes physical objects (or groups of such objects), that are
embedded with sensors, processing ability, software, and other technologies, and that connect
and exchange data with other devices and systems over the Internet or other communications
networks.
Wearables: Many banks now provide applications for popular wearables like Apple Watch
and FitPay, which is already working with the Bank of America. Some banks have even
launched their own devices, with Barclays unveiling bPay wearable contactless payment
solutions and other wearable bands.
Connected Cars: Connected cars not only have the potential to improve customer
relationships, but also boost revenues. But smarter vehicles represent an opportunity for
banks, too: for example, Idea Bank runs a fleet of cars, each customized with an integrated
security deposit box and an ATM, which can visit the customer, rather than vice versa.
Banking at home: With IoT, it is now possible to pay their bills through Amazon’s Alexa,
Google Home, integrating its API with the smart speaker to enable users to carry out balance
queries and payments through voice commands.
4. A very complex set-up like a fully automated automobile assembly line relaying data in
realtime to human supervisors.
The term cloud refers to a network or the internet. It is a technology that uses remote servers
on the internet to store, manage, and access data online rather than local drives. The data can
be anything such as files, images, documents, audio, video, and more.
There are the following operations that we can do using cloud computing:
• Developing new applications and services
• Storage, back up, and recovery of data
• Hosting blogs and websites
• Delivery of software on demand
• Analysis of data
• Streaming videos and audios
1. Back-up and restore data -Once the data is stored in cloud, it is easier to get back-up and
restore that data using the cloud.
2. Improved collaboration- Cloud applications improve collaboration by allowing groups of
people to quickly and easily share information in the cloud via shared storage.
3. Excellent accessibility- Cloud allows us to quickly and easily store and access information
anytime, anywhere in the whole world, using an internet connection.
4. Low maintenance cost- Cloud computing reduces both hardware and software
maintenance costs for organizations.
5. Mobility- Cloud computing allows us to easily access all cloud data via any device.
6. Services in the pay-per-use model -Cloud computing offers Application Programming
Interfaces (APIs) to the users for access services on the cloud and pay the charges as per the
usage of service.
7. Unlimited storage capacity- Cloud offers a huge amount of storing capacity for storing
important data such as documents, images, audio, video, etc. in one place.
8. Data security- Cloud offers many advanced features related to security and ensures that
data is securely stored and handled.
Cloud Computing can be divided into two systems. One is front-end and the other is back-
end. The two ends connect to each other with the help of an internet connection. The backend
RAMAIAH INSTITUTE OF BUSINESS STUDIES
of the cloud is the system and the front end is a computer user or client. The front end of the
system has the application, which is used to access the cloud system. Moreover, the backend
has various computers, hardware, servers, and data storage systems that make the cloud. All
these features and functions managed by the central server. The central server ensures that
everything runs smoothly and in a perfect manner. It is done with the help of software named
Middleware, which also permits the network computer to communicate with each other.
Explain the different Cloud Service Models/ OR What are the various cloud models?
There are three types of cloud service models. They are as follows: -
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Software as a Service (SaaS)
1. Public Cloud: Public cloud is open to all to store and access information via the Internet using the
pay-per-usage method. In public cloud, computing resources are managed and operated by the Cloud
Service Provider (CSP). Example: Amazon elastic compute cloud (EC2), IBM Smart Cloud
Enterprise, Microsoft, Google App Engine, Windows Azure Services Platform.
2. Private Cloud: Private Cloud is also known as an internal cloud or corporate cloud. It is used by
organizations to build and manage their own data centers internally or by the third party. It can be
deployed using Open source tools such as Open stack and Eucalyptus.
3. Hybrid Cloud: Hybrid Cloud is a combination of the public cloud and the private cloud. We can
say: Hybrid Cloud = Public Cloud + Private Cloud. Hybrid cloud is partially secure because the
services which are running on the public cloud can be accessed by anyone, while the services which
are running on a private cloud can be accessed only by the organization's users. Example: Google
Application Suite (Gmail, Google Apps, and Google Drive), Office 365 (MS Office on the Web and
One Drive), Amazon Web Services.
4. Community Cloud: Community cloud allows systems and services to be accessible by a group of
several organizations to share the information between the organization and a specific community. It
is owned, managed, and operated by one or more organizations in the community, a third party, or a
combination of them. Example: Health Care community cloud.
RAMAIAH INSTITUTE OF BUSINESS STUDIES
Cyber security is the application of technologies, processes and controls to protect systems,
networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber
attacks and protect against the unauthorised exploitation of systems, networks and
technologies.
Cyber security refers to the specialization of computer network security that consists of
technologies, policies, and procedures that protect networked computer systems from
unauthorized use or harm.
What are the differences among the terms cyber attack, cyber threat & cyber risk?
The terms cyber attack, cyber threat, and cyber risk are interrelated as follows. A cyber attack
is an offensive action, whereas a cyber threat is the possibility that a particular attack may
occur, and the cyber risk associated with the subject threat estimates the probability of
potential losses that may result.
What is malware?
Malware is an umbrella term derived from "malicious software", and refers to any software
that is intrusive (unauthorized access), disruptive, or destructive to computer systems and
networks. Malware may take many forms (executable code, data files) and includes, but is
not limited to, computer viruses, worms, trojan horses (trojans), bots (botnets), spyware
(system monitors, adware, tracking cookies), rogueware (scareware, ransomware), and other
malicious programs. The majority of active malware threats are usually worms or trojans
rather than viruses
Cyber is a colloquial term that refers to best practices and other activities that computer
system administrators and users can undertake to improve their cyber security while engaging
in common online activities, such as web browsing, emailing, texting, etc
What is cyberspace?
Cyberspace is the virtual environment that consists of computer systems and networks,
where all computers communicate via networks and all networks are connected. The term
originated in science fiction during the 1980s and became popular during the 1990s. More
recently computer vendors are attempting to brand cyberspace as the "Internet of Things"
(IoT).
What is a firewall?
A firewall is a network security system that monitors incoming and outgoing network
message traffic and prevents the transmission of malicious messages based on an updatable
rule set. In effect, a firewall establishes a barrier between a trusted,secure internal network
and external networks(e.g., the Internet) that are assumed to be untrustworthy and non-secure.
Firewalls can be implemented assoftware that runs on general-purpose hardware (e.g., an
open source firewall on a Windows PC or Mac OS X computer) or a dedicated hardware
device (appliance). How does a firewall work? Firewalls function as a filter between a
trusted, secure internal network and external networks (e.g., the Internet) that are assumed to
be untrustworthy and non-secure. The firewall filter may be flexibly programmed to control
what information packets are allowed and blocked.
Anti-virus software, also known as, anti-malware software, is computer software used to scan
files to identify and eliminate malicious software (malware). Although anti-virus software
was originally developed to detect and remove computer viruses (hence its name), it has been
broadened in scope to detect other malware, such as worms, Trojan horses, adware, spyware,
ransom-ware, etc.
1. Malware - The term “malware” encompasses various types of attacks including spyware,
viruses, and worms. Malware uses a vulnerability to breach a network when a user clicks a
“planted” dangerous link or email attachment, which is used to install malicious software
inside the system. Malware and malicious files inside a computer system can:
• Trojans—a program hiding inside a useful program with malicious purposes. Unlike
viruses, a trojan doesn’t replicate itself and it is commonly used to establish a backdoor to be
exploited by attackers.
• Worms—unlike viruses, they don’t attack the host, being self-contained programs that
propagate across networks and computers. Worms are often installed through email
attachments, sending a copy of them to every contact in the infected computer email list.
They are commonly used to overload an email server and achieve a denial-of-service attack.
• Ransomware—a type of malware that denies access to the victim data, threatening to
publish or delete it unless a ransom is paid.
• Spyware—a type of program installed to collect information about users, their systems or
browsing habits, sending the data to a remote user. The attacker can then use the information
for blackmailing purposes or download and install other malicious programs from the web.
2. Phishing - Phishing attacks are extremely common and involve sending mass amounts of
fraudulent emails to unsuspecting users, disguised as coming from a reliable source. The
fraudulent emails often have the appearance of being legit, but link the recipient to a
malicious file or script designed to grant attackers access to your device to control it or gather
recon, install malicious scripts/files, or to extract data such as user information, financial info,
and more.
4. Denial-of-Service (DOS) Attack DOS attacks work by flooding systems, servers, and/or
networks with traffic to overload resources and bandwidth. This result is rendering the system
unable to process and fulfill legitimate requests.
7. Internet of Things (IoT) Attacks- While internet connectivity across almost every
imaginable device creates convenience and ease for individuals, it also presents a growing—
almost unlimited—number of access points for attackers to exploit and wreak havoc. The
interconnectedness of things makes it possible for attackers to breach an entry point and use it
as a gate to exploit other devices in the network.
It must be very tedious for a teacher to evaluate homework and tests for large lecture
courses. A significant amount of time is consumed to interact with students, to prepare for
class, or work on professional development. But, with AI in education, this will not be the
case anymore. Though it can never replace human work, it is pretty close to it. So, with the
automated grading system checking multiple-choice questions, fill-in-the-blank testing,
grading of students can be done in no time.
Long-range radar, cameras, and LIDAR, a lot of advancement has been made in the
autonomous vehicle segment.
Some of its usage in autonomous vehicles is:
• Directing the car to the fuel station or recharge station when it is running low on fuel.
• Adjust the trip’s directions based on known traffic conditions to find the quickest route.
• Incorporate speech recognition for advanced communication with passengers.
• Natural language interfaces and virtual assistance technologies.
when to buy the tickets. So, the cheapest rate can be known before you book the flights to
your destination. The price trend is analyzed on the basis of the recorded data on each route.
So, you get notifications of when to book your flight. Book it at the right time and at the right
price and say thanks to artificial intelligence.
1. Data Collection - The Internet provides almost unlimited sources of data for a variety of
topics. The importance of this area depends on the type of business, but traditional industries
can acquire a diverse source of external data and combine those with their transactional data.
For example, let’s assume we would like to build a system that recommends restaurants. The
first step would be to gather data, in this case, reviews of restaurants from different websites
and store them in a database.
2. Data Cleansing - Data cleaning is the process of fixing or removing incorrect, corrupted,
incorrectly formatted, duplicate, or incomplete data within a dataset. When combining
multiple data sources, there are many opportunities for data to be duplicated or mislabeled.
3. Data Exploration - Data exploration is the first step of data analysis used to explore and
visualize data to uncover insights from the start or identify areas or patterns to dig into more.
4. Data Visualization - Big data visualization is the process of displaying data in charts,
graphs, maps, and other visual forms. It is used to help people easily understand and interpret
their data at a glance, and to clearly show trends and patterns that arise from this data.
How Big Data is changing the Way People Live Their Lives?
The changes in how big data is collected have occurred so rapidly that big data is more
prevalent in daily life than you might think. Companies and organizations are collecting
information about their targeted audiences. They know what you’re watching, what you’re
reading, and what you’re buying. This access to key, personalized data then affects your daily
experience in some of the most important and common areas of life. Consider these ways big
data is used in your everyday life: a. Music, Shows, and Movies b. Healthcare and medical
services c. Shopping and Marketing d. Travel and Transportation e. News and Information f.
Education and Employment.
5. IoT Applications in Retail IoT technology has a lot to offer the world of retail. Online and in-store
shopping sales figures can control warehouse automation and robotics through information
gathered from IoT sensors. IoT helps retailers target customers based on past purchases. Equipped
with the information provided through IoT, a retailer could craft a personalized promotion for their
loyal customers. Much of these promotions can be conducted through the customers’ smartphones,
especially if they have an app for the appropriate store.
1. Art Applications- Cloud computing offers various art applications for quickly and easily design
attractive cards, booklets, and images.
Applications: Vistaprint, Moo, Adobe Creative Cloud
2. Business Applications- Business applications are based on cloud service providers. Today, every
organization requires the cloud business application to grow their business. It also ensures that
business applications are 24*7 available to users.
Applications: MailChimp, SalesForce, Chatter, QuickBooks
3. Data Storage and Backup Applications- Cloud computing allows us to store information (data,
files, images, audios, and videos) on the cloud and access this information using an internet
connection. As the cloud provider is responsible for providing security, so they offer various backup
recovery application for retrieving the lost data.
Applications: Google G Suite, Box.com, Adobe Scanner
4. Education Applications-Cloud computing in the education sector becomes very popular. It offers
various online distance learning platforms and student information portals to the students. The
advantage of using cloud in the field of education is that it offers strong virtual classroom
environments, Ease of accessibility, secure data storage, scalability, greater reach for the students,
and minimal hardware requirements for the applications.
Applications: Google Apps for Education, Chromebooks for Education
6.Social Applications- Social cloud applications allow a large number of usersto connect with each
other using social networking applications.
Applications: Facebook, Twitter, WhatsApp
What is a backup?
A backup is a copy of the data stored on a device. It's useful for restoring data if your device
crashes or continuing work if your device is lost or stolen. When you back up your data, you
create a copy of some or all of the files on your device and store them in a separate location
(which is usually either on a flash drive, removable hard drive, or in the cloud). Some kinds
of backups even store your device configurations. Backup and recovery software can
automate the backup process by performing backups based on a set schedule.
What is encryption?
Encryption is a means of protecting files and devices. When you encrypt a file, you "lock" it
with an encryption key or password. The file itself is scrambled and becomes unreadable
without the appropriate key or password.
RAMAIAH INSTITUTE OF BUSINESS STUDIES
Communication occurs in many forms, including verbal and non-verbal, written, visual, and
listening. It can occur in person, on the internet (on forums, social media, and websites), over
the phone (through apps, calls, and video), or by mail.
3. Confidence
In the workplace, people are more likely to respond to ideas that are presented with
confidence. There are many ways to appear confident such as making eye contact when
you’re addressing someone, sitting up straight with your shoulders open and preparing ahead
of time so your thoughts are polished.
6. Respect
A key aspect of respect is knowing when to initiate communication and respond. In a team or
group setting, allowing others to speak without interruption is seen as a necessary
communication skill. Respectfully communicating also means using your time with someone
else wisely—staying on topic, asking clear questions and responding fully to any questions
you’ve been asked.
Clarify: The clarification stage allows you to empathize with the user and identify
problems. Observations and insights are informed by thorough research. Findings are then
reframed as problem statements or questions.
Ideate: Ideation is the process of coming up with innovative ideas. The divergence of
ideas involved with creative problem-solving is a major focus.
Develop: In the development stage, ideas evolve into experiments and tests. Ideas
converge and are explored through prototyping and open critique.
Implement: Implementation involves continuing to test and experiment to refine the
solution and encourage its adoption.
What is brainstorming?
Brainstorming is a tool that can be highly effective when guided by the iterative qualities of
the design thinking process. It involves openly discussing and debating ideas and topics in a
group setting. This facilitates idea generation and exploration as different team members
consider the same concept from multiple perspectives.
In essence, critical thinking requires you to use your ability to reason. It is about being an
active learner rather than a passive recipient of information.
Critical thinkers rigorously question ideas and assumptions rather than accepting them at face
value. They will always seek to determine whether the ideas, arguments and findings
represent the entire picture and are open to finding that they do not.
Critical thinkers will identify, analyse and solve problems systematically rather than by
intuition or instinct.
Teamwork skills are the skills that enable you to work well with others. Candidates with
strong teamwork skills are sought out by employers for many reasons—they demonstrate
leadership, collaboration, and good communication.
Employers expect employees to be team players. Teamwork is required for almost every
industry, ranging from business solutions to information technology to food services.
What is Collaboration?
Collaboration is the process of two or more people, entities or organizations working together
to complete a task or achieve a goal. Collaboration is similar to cooperation. Most
collaboration requires leadership, although the form of leadership can be social within a
decentralized and egalitarian group.