CLass 10 AI Revision Notes
CLass 10 AI Revision Notes
NOTES
2. Types of Communication
Verbal Communication:
Oral (Spoken): Face-to-face, phone calls, presentations.
Written: Letters, emails, reports. Non-verbal
Communication:
Visual Communication:
Charts, diagrams, signs, symbols, infographics.
3. Elements of Communication
Sender: The person who conveys the message.
Message: Information being communicated.
Receiver: The person who receives and interprets the message.
Feedback: Response of the receiver.
Channel: Medium used (speech, text, images, etc.).
4. Barriers to Communication
Language Barriers: Use of difficult or unfamiliar words.
Emotional Barriers: Fear, anger, sadness affecting clarity.
Physical Barriers: Noise, poor internet, distractions.
Cultural Barriers: Different cultural interpretations of words/signs.
5. 7Cs of Effective Communication
1. Clear: Use simple, understandable language.
2. Concise: Be brief and to the point.
3. Concrete: Use specific facts and examples.
4. Correct: Avoid grammar and spelling mistakes.
5. Coherent: Maintain a logical flow of ideas.
6. Complete: Include all necessary details.
7. Courteous: Be polite and respectful.
6. Sentence Types & Grammar Rules
Types of Sentences:
Declarative: States facts (e.g., "I love reading.")
Interrogative: Asks questions (e.g., "Do you like reading?")
Exclamatory: Shows emotion (e.g., "Wow! That’s great!")
Imperative: Gives commands (e.g., "Please sit down.")
Parts of Speech:
Noun: Names (person, place, thing).
Pronoun: Replaces a noun (he, she, they).
Verb: Action words (run, eat, write).
Adjective: Describes a noun (big, happy).
Adverb: Describes a verb (quickly, very).
Preposition: Shows position (on, in, under).
Conjunction: Joins words/sentences (and, but, or).
Interjection: Shows emotions (Wow! Oh no!).
7. Non-verbal Communication
Facial Expressions: Smile (happiness), frown (sadness).
Body Language: Posture, gestures, hand movements.
Eye Contact: Shows confidence and attention.
Tone & Voice: Volume, pitch, and speed of speech.
Top 10 Questions
1. What is communication? Explain its importance.
Answer: Communication is the process of sharing information, thoughts, and ideas
between individuals or groups to create understanding.
Importance of Communication:
Helps in expressing thoughts clearly.
Essential for personal and professional success.
Builds strong relationships.
Aids in decision-making and problem-solving.
What is Stress?
Stress encompasses our emotional, mental, physical, and social responses to
perceived demands or threats, known as stressors. These stressors trigger the stress
reaction. For instance: - Being near exams while feeling inadequately prepared. -
Coping with the loss of a close family member. - Feeling concerned about others'
perceptions based on your appearance or communication skills.
Stress Management:
Effectively handling stress involves creating a strategy to cope with daily pressures,
aiming for a harmonious balance between life, work, relationships, relaxation, and
enjoyment. This approach enables the proactive management of daily stressors,
allowing you to confront challenges successfully. Always bear in mind the ABC of
stress management: A: Adversity, representing the stressful event. B: Beliefs,
indicating your response to the event.
C: Consequences, encompassing the actions and outcomes resulting from the event.
Ability to Work Independently: The capability to work independently is achieved by
fostering a calm and composed demeanor, signifying: 1. Developing self-awareness,
self-monitoring, and self-correction. 2. Understanding the tasks at hand. 3. Initiating
actions without relying solely on instructions. 4. Acknowledging and rectifying
mistakes without assigning blame to others. 5. Possessing both the ability and the
determination to engage in continuous learning.
Management Techniques:
Effective stress management techniques include: 1. Time Management: Prioritize
tasks to alleviate stress. 2. Physical Exercise and Fresh Air: Engage in activities like
yoga or meditation for better blood circulation and relaxation. Outdoor activities
provide fresh oxygen, enhancing overall well-being. 3. Healthy Diet: Maintain a
balanced diet, incorporating staples like dal, roti, vegetables, and fruits for sustained
energy and efficiency. 4. Positivity: Focus on positive aspects rather than dwelling
on negatives. Adopting
Top 5 MCQ
1. What is the best way to start our day positively?
(a) Think about all that can go wrong.
(b) Think about the difficult test you will face during the day.
(c) Think about all your accomplishments so far and feel good about them.
(d) Think about the traffic on the road and feel stressed.
Answer: (c)
2. Do you think people living in hill stations can skip taking a bath for many
days?
(a) No, irrespective of the climate, one should take a bath regularly.
(b) Yes, not taking bath for many days is acceptable for people staying in cold
climate.
(c) Yes, if they wipe themselves with a wet cloth, then it is fine.
(d) None of the above
Answer: (a)
3. In self–management skills you can improve yourself in various skills like _
a. Discipline
b. Timeliness
c. Goal-setting
d. All of the above
Answer: (d)
4. When you are under __________ for a prolonged period, it can cause health
problems and mental troubles as well.
a. Stress
b. Discipline
c. Timeliness
d. Goal – Setting
Answer: (a)
Top 10 Questions
Q1. What do you mean by Self-management?
Ans. Self-management, also referred to as ‘self-control,’ is the abilityto control
one’s emotions, thoughts and behavior effectively indifferent situations.
Q2.Give any two examples where a small amount of stress is helpful. of
stress is helpful.
Ans. Two examples where a small amount of stress is helpful are:
1. A fire alarm is intended to cause stress and alert you to avoid danger.
2. The stress created by a deadline to finish a paper can motivate you tofinish it
on time.
Q3. Write four signs/symptoms of stress.
Ans. Four Symptoms of stress management are
a. Headache
b. Sleeplessness
c. Sadness
d. Excessive worrying
e. Nervousness
4. Write four qualities of those people who work independently.
Ans: 1. Possessing self-awareness, self-monitoring skills, and the ability toself-
correct.
2. Taking initiative without needing explicit instructions.
3. Demonstrating a capacity for continuous learning.
4. Acknowledging and learning from their own mistakes.
Q5. Differentiate between Interests and Abilities.
Ans:
Interests Abilities
Q6. What do you mean by Goal and Goal Setting? Ans. Goals: They are a set of
dreams with a deadline to get them, for example, saving pocket money to buy a
favorite mobile phone by a particular date. Goal setting: It is all about finding and
listing your goals and then planning on how to achieve them
Q7. Write the Qualities of self–confidence.
Ans: Qualities of self–confident people –
a. Self–belief – Always believe in yourself and respect the failures, that
make you successful in life.
b. Hard Work – Work hard to achieve the goal, don’t be afraid of failures.
c. Positive Attitude – A positive attitude means focusing on the goal and
trying to achieve.
Single-user, single-task OS: Allows only one user to utilize the computer for
a single task at a time.
Single-user, multi-task OS: Found in desktops and laptops, it enables one
user to run multiple programs simultaneously, such as Windows and Apple
MacOS.
Multi-user OS: Permits multiple users to work on the same computer either
at different times or concurrently.
Real-time OS: Responds to input within specific time constraints, ensuring
consistent completion times for operations. Examples include Lynx OS and
Windows CE.
Distributed OS: Operates across interconnected computers in a network,
integrating them into a unified computing and storage environment. Examples
include Windows, UNIX, and LINUX.
Interactive (GUI-based) OS: Features a user-friendly graphical interface allowing
input through mouse actions like clicking, double-clicking, or right- clicking.
Windows exemplifies this type of operating system. Understanding Desktop
Components in Windows: Taskbar: Positioned along the bottom of the screen, the
taskbar is a lengthy horizontal bar that provides essential functionality. To the
left, you'll find the Start button, while the Date/Time is located to the right.
Additionally, the taskbar displays icons representing open programs and several
shortcuts. Start Button: Situated on the left side of the taskbar, the Start button
serves as a gateway to the Start menu, offering access to various programs and
features upon clicking. Recycle Bin: Housing deleted files and folders, the Recycle
Bin allows users to restore accidentally removed items. It serves as a temporary
storage space for items before permanent deletion.
CTRL+ p — print
CTRL+ s — save.
APPLY BASIC SKILLS FOR CARE AND MAINTENANCE OF COMPUTER
Computer systems require maintenance in order to function properly. System
failure may result from poor maintenance. You may be able to keep it in good
working order by giving it routine care and maintenance. Installing updates,
security, creating backups, and scanning are all part of routine system
maintenance
Maintaining Computer System:
1. Ensure the computer is free from dust by regular cleaning. 2. Avoid consuming
food or beverages while using the computer to prevent spills. 3. Keep hands clean
before using the keyboard to maintain its cleanliness. 4. Handle CDs and DVDs with
care to prevent scratches. 5. Cover the keyboard when not in use to protect it from
dust and debris.
Maintaining Computer Components
Proper care of computer components is essential for longevity. Implementing
preventive maintenance measures can significantly extend the lifespan of these
components. General Precautions for Cleaning Computer Components:
Always ensure the computer system is powered off before beginningthe cleaning
process.
Avoid spraying cleaning fluid directly onto computer components. Instead, apply
the liquid onto a cloth and then use it to wipe the components.
Take care not to allow any cleaning liquid to drip near the circuit board.
It's recommended to use an anti-static wristband to prevent the accumulation
of static electricity near electronic devices.
CDs and DVDs: Store CDs and DVDs in their proper cases to prevent damage.
Clean any dirt or fingerprints from CDs and DVDs by lightly rubbing them with
a clean, lint-free cotton cloth.
Maintenance Schedule:
Scanning and Cleaning Viruses: Install antivirus software to prevent and clean
viruses from entering your system, safeguarding your data against potential
Threats to Computer
Threats are the ways in which personal information can be leaked from a computer
without our knowledge. (a) Theft: Theft means stealing of information or hardware.
These may be of three types: • Physical: Where a person may steal your desktop
computer or laptop. • Identity: Where a hacker steals your personal information and
assumes your identity. Using this false identity, the hacker can gain access to your
account information or perform illegal activity. • Software Piracy: This is stealing
of software and includes using or distributing unlicensed and unauthorised copies of
a computer program or software. (b) Virus: Viruses are computer programs that can
damage the data and
monitor incoming and outgoing data, preventing viruses from infiltrating your
computer. Anti-virus programs also detect and eliminate viruses that may have
already infected your computer.
(c) Encrypt Data: Encrypt sensitive data stored on your computer, especially
important for banks and companies storing customer information. Utilize encryption
features like Bitlocker in Windows to encrypt the entire hard disk, requiring a
decryption password or key to access the data, thereby preventing unauthorized
usage. (d) Use Secure Sites: Only provide credit card or bank account details on
secure sites. Look for "https://" and a lock symbol in the browser's address bar to
ensure the site is secure before entering sensitive information.
Top 5 MCQ
1. Which software manages all the devices of a computer and keeps track of
the status of the device, whether it is busy or not?
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
files once they Information and Communication Technology Skills 81 attack a
computer. This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful
software program but once it reaches a computer it starts behaving like a virus
and destroying data.
• Online Predator: Online predators are people who trap you into inappropriate
relationships. They may be older people posing to be your age, bullying you into
doing illegal activities online and sometimes face to face. • Internet Scams:
Sometimes you may receive very attractive offers saying you have won huge
money in a lottery and that you can claim the prize by depositing a certain
amount of money. When you deposit the money using credit card or online
banking, you not only lose the deposit money but your card/account information
may be misused later. rewrite everything with same points and format
Protecting your Data:
(a) Use Strong Passwords: Utilize complex passwords that are difficult to guess,
incorporating a mix of lowercase and uppercase letters, numbers, and special
characters. This enhances security and prevents unauthorized access to your
computer. (b) Install Anti-virus and Firewall: Implement anti-virus software and
a firewall to
monitor incoming and outgoing data, preventing viruses from infiltrating your
computer. Anti-virus programs also detect and eliminate viruses that may have
already infected your computer.
(c) Encrypt Data: Encrypt sensitive data stored on your computer, especially
important for banks and companies storing customer information. Utilize encryption
features like Bitlocker in Windows to encrypt the entire hard disk, requiring a
decryption password or key to access the data, thereby preventing unauthorized
usage. (d) Use Secure Sites: Only provide credit card or bank account details on
secure sites. Look for "https://" and a lock symbol in the browser's address bar to
ensure the site is secure before entering sensitive information.
Top 5 MCQ
1. Which software manages all the devices of a computer and keeps track of
the status of the device, whether it is busy or not?
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
2. An ________ manages the computer memory and keeps track of which
memory space is in use by which program and which space is free.
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
3. 18. GUI stands for __________
(a) Graphical User Interface
(b) Graphical User Interaction
(c) Graphical User Interactive
(d) None of the above Answer:
answer: a. Graphical User Interface
4. Which of the following is not an operating system?
a. DOS
b. Windows
c. Linux
d. Disk Defragmentor
Answer: d. Disk Defragmentor
Top 10 Questions
1. What is ICT? Answer : Information and Communication Technology (ICT) is an
acronym for information and communication technology. ICT helps in the proper
sharing, receiving, and processing of information, and an ICT device is a device that
is used for processing, storing, and delivering information to others. Examples of ICT
devices are – Laptop, Desktop, Tablets and Smartphones. 2. Objectives of
Information and communication technology?Advantages and disadvantages of
ICT. Answer : Full form of ICT is InformatiInformation and communication
technology.
The goal of ICT is to bridge the gap between parents, educators, and students by
encouraging sustainable, cooperative, and transparent communication methods.
Advantages of ICT a. Enhanced the modes of communication b. Independent
learning platforms Cost – efficient c. Enhanced data and information security d.
Paperless – Eliminate the usage of paper e. Better teaching and learning methods f.
Web – based LMS tools Disadvantages of ICT a. Traditional books and handwritten
methods are at risk. b. Managing courses online is difficult c. Teachers require
experience to handle ICT d. Risk of cyber attacks and hacks e. Misuse of technology
3. What is BIOS?
Answer : BIOS stands for Basic Input/ Output System, It helps the computer
system to identify (Self-test) the paraperaphal devices which are connected to the
computer system and helps computers to load Operating System properly
when it comes to disclosing personal information via the internet. We share our
account information and passwords on unsafe websites. A person gets unauthorized
access to our computer. This can happen at work if we don’t log out before leaving
the computer. 9. How can we protect our data? Answer : To protect our data from
theft and viruses we can take the following measures – a. Use Strong password in
your account – Make your passwords difficult to guess. When creating a new
password, attempt to use a combination of Small Character Capital Character
Special Character Numbers b. Install Antivirus and Firewall –Anti-virus software and
a firewall protect your data from virus and from hackers. c. Encrypt your data –
Keep your information in an encrypted format to keep it safe from unauthorized
users. d. Open only secure site – Before visiting a website, make sure the address
begins with https://. A website that begins with https:// is a secure website. 10.
Difference between Hardware and Software? Answer : A computer system
consists of two main parts – Hardware and Software a. Hardware – Hardware is a
physical part of a computer system. We can feel and touch the hardware devices.
example – CPU, Mother Board, Hard Disk, Keyboard,
Keyboard, Mouse, Printer etc. b. Software – Software related to the programs which
perform different types of tasks on the computer system. Program is a collection of
Instructions. It also helps the computer to perform the specific task. Example – Open
Office Base, Spreadsheet, Presentation etc.
Session 1: Sustainable Development
Top 5 MCQ
1. What is the primary goal of Green Skills?
a) Increasing the use of fossil fuels
b) Promoting environmental sustainability and economic growth
c) Expanding industrial waste production
d) Reducing employment in eco-friendly sectors
Answer: b) Promoting environmental sustainability and economic growth
2. Which of the following is NOT an example of a renewable energy source?
a) Wind energy
b) Solar energy
c) Coal energy
d) Hydropower
Answer: c) Coal energy
3. How can industries adopt eco-friendly practices?
a) Using energy-efficient machinery
b) Increasing single-use plastic production
c) Dumping industrial waste in water bodies
d) Encouraging deforestation
Answer: a) Using energy-efficient machinery
4. What is the role of the 3Rs in sustainability?
a) Reuse, Repair, and Restore
b) Reduce, Reuse, and Recycle
c) Reform, Rebuild, and Reuse
d) Redesign, Replace, and Renew
5. Which of the following best describes a ‘carbon footprint’?
a) The amount of carbon dioxide absorbed by plants
b) The total greenhouse gases emitted by human activities
c) The process of converting carbon into fuel
d) The amount of oxygen produced by trees
Answer: b) The total greenhouse gases emitted by human activities
Top 10 Questions
1. What do you understand by Green Skills?
Answer: Green Skills refer to the knowledge, abilities, values, and attitudes
required to support a sustainable and resource-efficient society. These skills help
individuals contribute to environmental conservation and climate-friendly industries.
2. How do Green Skills contribute to sustainable development?
Answer: Green Skills help industries and individuals adopt environmentally friendly
practices, reduce pollution, conserve natural resources, and create eco-friendly jobs
that support long-term economic growth.
4. List three ways to conserve energy at home. Answer: 1. Switching off electrical
appliances when not in use. 2. Using energy-efficient LED bulbs instead of
incandescent lights. 3. Reducing excessive use of heating and cooling systems.
5. How does pollution affect biodiversity?
Answer: Pollution leads to habitat destruction, water contamination, and air
pollution, which threaten wildlife, reduce species populations, and cause ecological
imbalances.
6. What is ‘climate change’ and how does it affect the planet?
Answer: Climate change refers to long-term shifts in global temperatures and
weather patterns due to human activities such as burning fossil fuels. It leads to
extreme weather conditions, rising sea levels, and loss of biodiversity.
8. What are some eco-friendly alternatives to plastic bags?
Answer: Cloth bags
Jute bags
Paper bags
Biodegradable bags
Automation (e.g., Washing machines, traffic lights) – Follows fixed rules, does
not learn.
Internet of Things (IoT) – Smart devices connected to the internet (e.g., Smart
AC).
Rule-based Programs – Fixed instructions, no learning (e.g., Calculators).
2. Basics of AI
Difference Between AI, ML, and DL
Artificial Intelligence Broad team for machines that Virtual Assistants like Siri,
(AI) mimic human intelligence. Alexa.
Subset of AI where machines
learn from data.
Machine Learning (ML) Advanced from of ML using Spam detection in email.
neural network.
Self-driving cars
Deep Learning (DL)
recognising road signs.
AI Domains
1. Data Science – Extracting meaningful insights from large datasets.
Example: Price comparison websites, fraud detection in banking.
2. Computer Vision – Machines understanding and analyzing visual information.
Example: Face recognition, medical image analysis.
3. Natural Language Processing (NLP) – Machines understanding human language.
Example: Google Translate, chatbots, spam filters.
3. AI Ethics
Moral Issues in AI (Self-Driving Car Example)
AI may have to choose between saving a pedestrian or the car’s passengers.
Who should be held responsible?
1. The Car Owner?
2. The AI Developer?
3. The Pedestrian?
These moral dilemmas show why ethical AI programming is important.
Data Privacy
Issues:
Misuse of private data.
Targeted ads based on personal conversations.
Cybersecurity risks.
Solution:
Strong data protection laws (GDPR, IT Act).
User control over data sharing.
AI Bias
AI learns from data, and biased data can cause unfair decisions.
Examples of Bias in AI:
Facial recognition errors – AI is less accurate for darker skin tones.
Job hiring bias – AI may favor men if trained on historical male-dominated job
data.
Solution:
Use diverse training data to make AI fair and unbiased.
b) Computer Vision
c) NLP
d) Robotics
Answer: b) Computer Vision
4. Which of the following is NOT a type of AI?
a) Narrow AI
b) General AI
c) Super AI
d) Basic AI
Answer: d) Basic AI
5. What is an ethical concern in AI?
a) AI can work 24/7
b) AI can store data
c) AI can be biased
d) AI reduces workload
Answer: c) AI can be biased
PRASHANT KIRAD
Top 10 Questions
1. Define Artificial Intelligence.
Answer : Artificial Intelligence (AI) is the simulation of human intelligence in
machines, allowing them to perform tasks such as learning, reasoning, problem-
solving, and decision-making.
Example: AI chatbots like ChatGPT can understand and respond to human
conversations.
2. List three real-life applications of AI.
Answer : AI is widely used in various sectors to enhance efficiency and automation.
Examples: 1. Voice Assistants – AI-powered tools like Google Assistant, Siri, and
Alexa help users with queries and tasks.
th
2. Recommendation Systems – Platforms like Netflix, YouTube, and Amazon suggest
movies, videos, or products based on user preferences.
10
3. Self-Driving Cars – AI enables autonomous vehicles like Tesla Autopilot and
Waymo to navigate roads safely.
&
h
Answer :
B
Artificial Intelligence Broad team for machines that Virtual Assistants like Siri,
(AI) mimic human intelligence. Alexa.
Subset of AI where machines
EX
Key Points:
AI is the broad concept, while ML and DL are specialized fields within AI.
ML involves learning from data, and DL focuses on deep neural networks for
more complex tasks.
General AI: AI that can perform multiple tasks and reason like a human (still under
research).
Examples:
Narrow AI: Google Assistant, Chess-playing AI, Email spam filters.
General AI: Theoretical AI that can think and make decisions like humans.
7. What are the ethical concerns related to AI?
Answer : AI raises several ethical concerns, including:
1. Bias in AI – AI systems may make unfair decisions if trained on biased data.
2. Privacy Issues – AI collects and processes large amounts of personal data, leading
to privacy risks.
3. Job Displacement – AI automation may.
8. How does AI help in automating tasks?
Answer : AI automates tasks by performing repetitive and time-consuming work
efficiently.
Examples:
1. Customer Support – AI chatbots provide 24/7 support on websites.
2. Manufacturing – AI-powered robots assemble products in factories.
3. Healthcare – AI analyzes medical scans for early disease detection.
replace human jobs in industries like customer service and manufacturing.
9. How is AI transforming the transportation sector?
Answer : AI is improving transportation by increasing safety, efficiency, and
automation.
Examples:
1. Self-Driving Cars – AI-powered cars like Tesla use sensors and cameras to drive
autonomously.
2. Traffic Management – AI predicts traffic congestion and suggests better routes
(Google Maps).
3. Smart Navigation – AI-powered apps like Waze provide real-time route
optimization.
10. What is the role of Machine Learning in AI?
Answer : Machine Learning (ML) is a subset of AI that enables computers to learn
from data without being explicitly programmed.
Examples of ML Applications:
1. Spam Filtering – Gmail detects and filters spam emails.
2. Recommendation Systems – Netflix recommends shows based on user preferences.
3. Fraud Detection – Banks use AI to detect fraudulent transactions.
AI Project Cycle
The AI Project Cycle is a structured approach to developing AI-based solutions. It
has five stages:
1. Problem Scoping
Problem scoping is the process of identifying a problem and understanding its
impact. To define the problem clearly, we use the 4W Problem Canvas:
Who is facing the problem? This includes individuals, businesses, or
organizations affected by the issue.
What is the nature of the problem? Evidence such as surveys, news reports, or
real-life experiences can help define the problem.
Where does the problem occur? Identifying the context or location where the
problem happens frequently is important.
Why is it important to solve? Understanding the benefits of solving the problem
helps justify the AI solution.
For example, if food wastage in restaurants is a problem, stakeholders like
restaurant owners and customers are affected. The problem happens in
restaurants due to poor demand prediction. Solving it would help reduce costs and
minimize waste.
2. Data Acquisition
Data acquisition involves gathering relevant and reliable data to train an AI model.
There are two types of data:
Primary Data is collected firsthand through surveys, interviews, and direct
observations.
Secondary Data is obtained from existing sources like government reports,
research papers, and online databases.
3. Data Exploration
Data exploration is the process of analyzing and understanding the data to find
useful patterns.
values. It also helps in identifying trends that can improve AI model performance.
Different types of data visualization techniques are used to make sense of the
data:
Bar Graphs help compare quantities, such as the number of customers visiting
a restaurant each day.
Line Charts show trends over time, like food wastage increasing on weekends.
Pie Charts represent proportions, such as the percentage of different food
items wasted.
Scatter Plots identify relationships between two variables, like the effect of
discounts on food sales.
For example, analyzing restaurant sales data may reveal that food wastage is
highest on weekends due to incorrect demand forecasting.
4. Modelling
Modelling is the process of developing an AI system that can analyze data and
make predictions.
There are two main approaches to building AI models:
Evaluation is the process of testing the AI model to check its accuracy and
efficiency.
To assess model performance, various metrics are used:
Accuracy measures the percentage of correct predictions.
Precision checks how many of the predicted positive cases were actually
correct.
Recall measures how many of the actual positive cases were correctly
identified.
F1 Score balances precision and recall to give an overall performance score.
F1 Score balances precision and recall to give an overall performance score.
For example, an AI model predicting food demand can be evaluated by comparing
its predictions with actual food wastage data.
Neural Networks
Neural networks are advanced AI models inspired by the human brain. They
consist of layers of interconnected nodes (neurons) that process data.
Structure of a Neural Network
A neural network has three main layers:
1. Input Layer: Takes raw data, such as image pixels in face recognition.
2. Hidden Layers: Process the data and extract meaningful patterns.
3. Output Layer: Provides the final prediction or classification.
Neural networks work by adjusting their internal connections (weights and biases)
to improve accuracy. The more hidden layers a neural network has, the more
complex tasks it can perform.
How Neural Networks Work?
Each neuron processes information and passes it to the next layer. The network
learns by adjusting its weights and biases based on training data. This process
helps the AI recognize patterns, classify objects, and make predictions.
b) Model interpretability
c) Abundant data availability
d) High computational costs
Answer: c) Abundant data availability
4. Which metric is commonly used to evaluate AI models?
a) Speed of training
b) Accuracy
c) File size of the dataset
d) Number of features
Answer: b) Accuracy
5. What is the final step in an AI project lifecycle?
a) Model Training
b) Data Cleaning
c) Model Deployment
d) Feature Engineering
Answer: c) Model Deployment
Top 10 Questions
1. What are the key stages of an AI project?
Answer : AI projects follow a structured lifecycle to ensure success. The key stages
are:
1. Problem Identification: Define the problem AI will solve.
2. Data Collection: Gather relevant data from various sources.
3. Data Preparation: Clean, preprocess, and transform data for model training.
4. Model Selection: Choose the right AI/ML model based on problem type.
5. Model Training & Testing: Train the model on data and test its performance.
6. Evaluation: Measure accuracy using metrics like precision, recall, and F1-score.
7. Deployment: Integrate the model into an application for real-world use.
After collection, data must be stored in proper formats for easy access and
analysis. Common formats include:
1. CSV (Comma-Separated Values): Stores tabular data in plain text.
Used in data analysis and machine learning.
2. Spreadsheets (Excel, Google Sheets): Used for organizing numerical and
categorical data.
3. SQL Databases: Used for storing and querying large datasets.
4. JSON & XML: Formats used for data exchange between applications.
Top 5 MCQ
1. Which of the following is a supervised learning algorithm?
a) K-Means Clustering
b) Decision Tree
c) Apriori Algorithm
d) DBSCAN
Answer: b) Decision Tree
2. What is the primary purpose of data preprocessing in Data Science?
a) To create new datasets
b) To increase dataset size
c) To clean and transform raw data
d) To visualize data
Answer: c) To clean and transform raw data
3. Which of the following is NOT a type of Machine Learning?
a) Reinforcement Learning
b) Supervised Learning
c) Neural Learning
d) Unsupervised Learning
Answer: c) Neural Learning
4. What is the role of a loss function in a Machine Learning model?
a) To adjust hyperparameters
b) To measure the difference between predicted and actual values
c) To visualize model output
d) To preprocess data
Answer: b) To measure the difference between predicted and actual values
5. Which tool is commonly used for big data processing?
a) NumPy
b) Pandas
c) Apache Spark
d) Matplotlib
Answer: c) Apache Spark
Top 10 Questions
1. Explain the difference between Classification and Regression in Machine
Learning. Answer: In Machine Learning, both Classification and Regression are types
of supervised learning, but they solve different problems: Classification is used when
the output variable is categorical (e.g., "Yes" or "No," "Spam" or "Not Spam").
Example: A model that predicts whether an email is spam or not. Regression is used
when the output variable is continuous (e.g., predicting temperature, house prices).
Example: A model that estimates the price of a house based on features like area,
location, and number of rooms. Both techniques use training data to learn patterns,
but classification predicts discrete values, while regression predicts numerical values.
2. What are the steps involved in Data Science workflow? Answer: The Data
Science Workflow follows several steps to extract insights from data: 1. Data
Collection: Gathering data from sources like databases, web scraping, APIs, or
sensors. 2. Data Cleaning and Preprocessing: Handling missing values, removing
duplicates, and transforming raw data. 3. Exploratory Data Analysis (EDA):
Identifying patterns, relationships, and trends in the data. 4. Feature Engineering:
Creating and selecting the most relevant features for the model. 5. Model Selection
and Training: Choosing and training machine learning models such as Decision
Trees or Neural Networks. 6. Model Evaluation and Optimization: Assessing model
performance using metrics like accuracy, precision, recall, RMSE, etc. 7.
Deployment: Deploying the model into production and continuously monitoring its
performance. This workflow helps in making informed decisions and improving
predictions. 3. What is Feature Engineering and why is it important? Answer:
Feature Engineering is the process of creating new variables (features) or modifying
existing ones to improve the performance of a machine learning model.
It involves:
Steps in EDA:
1. Understanding the Data: Checking data types, structure, and summary statistics
(e.g., using df.describe() in Python).
2. Handling Missing Values: Identifying and imputing missing data using techniques
like mean, median, or mode replacement.
3. Checking for Outliers: Using box plots or scatter plots to detect outliers that
may affect model performance.
4. Visualizing Data: Using histograms, bar plots, scatter plots, and pair plots to
find correlations.
5. Feature Selection & Engineering: Identifying important features and
transforming variables if needed.
Importance of EDA:
Helps in understanding data distributions and anomalies.
Reduces noise by identifying irrelevant or redundant features.
Provides insights into relationships between variables, which improves model
accuracy.
For example, if we analyze customer data for a loan approval model, EDA helps in
identifying factors like income, credit score, and debt that influence approval rates.
Example: Tesla’s Autopilot system processes live camera feeds for automatic
driving.
3. Medical Imaging
AI analyzes X-rays, MRIs, and CT scans for disease detection.
Example: AI detects tumors in brain scans faster than doctors.
4. Retail Industry
Tracks customer movement, stock availability, and theft prevention.
Example: Amazon Go stores use cameras for automatic checkout (cashier-less
stores).
5. Google Translate Camera
Uses Optical Character Recognition (OCR) to read and translate text from images.
Example: Translating a restaurant menu from Chinese to English.
6. Introduction to OpenCV
What is OpenCV?
Open Source Computer Vision (OpenCV) is a widely used library for image
processing.
It allows computers to read, process, and modify images in AI applications.
Used for facial recognition, object detection, and noise removal.
Installing OpenCV in Python
To install OpenCV, run:
pip install opencv-python
Common OpenCV Functions
cv2.imread() – Reads an image.
cv2.imshow() – Displays an image.
cv2.cvtColor() – Converts an image to grayscale or other color spaces.
Top 5 MCQ
1. Which of the following is NOT an application of Computer Vision? a) Facial
Recognition b) Speech Recognition c) Object Detection d) Medical Imaging Answer:
b) Speech Recognition 2. What is the primary function of a Convolutional Neural
Network (CNN) in Computer Vision? a) Text Analysis
b) Image Processing and Pattern Recognition
c) Speech Recognition
d) Language Translation
Answer: b) Image Processing and Pattern Recognition
3. Which algorithm is commonly used for object detection in Computer Vision?
a) YOLO (You Only Look Once)
b) Naïve Bayes
c) K-Means Clustering
d) Decision Trees
Answer: a) YOLO (You Only Look Once)
4. What is the purpose of the pooling layer in a CNN?
a) To reduce the dimensions of feature maps
b) To increase the image resolution
c) To convert images into grayscale
d) To store raw pixel values
Answer: a) To reduce the dimensions of feature maps
5. Which of the following libraries is widely used for Computer Vision tasks?
a) TensorFlow
b) Pandas
c) Matplotlib
d) NumPy
Answer: a) TensorFlow
Top 10 Questions
1. What is Computer Vision? Answer : Computer Vision is a field of Artificial
Intelligence (AI) that enables computers to interpret, analyze, and understand visual
data such as images and videos. It mimics human vision by identifying patterns and
extracting meaningful information from visual inputs. It is widely used in various
industries, including healthcare, security, automotive, and retail. 2. What are the
key applications of Computer Vision? Answer : Computer Vision has numerous
real-world applications, including:
a) Tokenization
b) Named Entity Recognition
c) Sentiment Analysis
d) Stemming
Answer: (b) Named Entity Recognition
4. Which of the following is an example of a Stop Word?
a) Artificial
b) Intelligence
c) The
d) Learning
Answer: (c) The
5. Which technique is used to analyze if a customer review is positive or
negative?
a) Named Entity Recognition
b) Sentiment Analysis
c) Stemming
d) Parsing
Answer: (b) Sentiment Analysis
Top 10 Questions
1. What is Natural Language Processing (NLP)? Answer: Natural Language
Processing (NLP) is a subfield of Artificial Intelligence (AI) that focuses on the
interaction between humans and computers using natural language. It enables
machines to read, interpret, and generate human language. Examples of NLP
Applications:
Chatbots (e.g., ChatGPT, Google Assistant, Alexa, Siri)
Language Translation (e.g., Google Translate, Microsoft Translator)
Spam Detection (e.g., Filtering spam emails)
Sentiment Analysis (e.g., Analyzing customer reviews)
Speech Recognition (e.g., Voice-to-text software like Dragon NaturallySpeaking)
"Running"-"Run", "Running"-"Run",
Example
"Caring"-"Car" "Caring"-"Car"
SpaceX → Organization
2002 → Year
California → Location
7. What is Sentiment Analysis in NLP?
Answer: Sentiment analysis determines whether a text expresses positive, negative,
or neutral emotions.
Example of Sentiment Analysis:
"This movie was amazing!" → Positive
"The food was terrible." → Negative
"The book was okay." → Neutral
Applications of Sentiment Analysis:
Analyzing customer reviews
Monitoring social media trends
Measuring public opinion
8. What is a Bag of Words (BoW) model in NLP?
Answer: BoW represents text as a collection of word frequencies, ignoring
grammar and word order.
I 1 0
Love 1 1
AI 1 1
is 0 1