0% found this document useful (0 votes)
23 views

CLass 10 AI Revision Notes

The document provides an overview of communication, including its definition, types, elements, barriers, and effective communication principles. It also covers self-management skills, stress management techniques, emotional intelligence, and the importance of ICT skills in modern communication. Key topics include assertive communication, public speaking, and the significance of self-awareness and adaptability in personal and professional growth.

Uploaded by

sharmadamin200
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

CLass 10 AI Revision Notes

The document provides an overview of communication, including its definition, types, elements, barriers, and effective communication principles. It also covers self-management skills, stress management techniques, emotional intelligence, and the importance of ICT skills in modern communication. Key topics include assertive communication, public speaking, and the significance of self-awareness and adaptability in personal and professional growth.

Uploaded by

sharmadamin200
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

Class X

NOTES

Part A & Part B


1. Introduction to Communication
Definition: Sharing information between individuals or groups for understanding.
Importance:
Helps in expressing thoughts clearly.
Improves relationships and teamwork.
Essential for career and professional growth.

2. Types of Communication
Verbal Communication:
Oral (Spoken): Face-to-face, phone calls, presentations.
Written: Letters, emails, reports. Non-verbal
Communication:

Body language, gestures, facial expressions, eye contact.

Visual Communication:
Charts, diagrams, signs, symbols, infographics.

3. Elements of Communication
Sender: The person who conveys the message.
Message: Information being communicated.
Receiver: The person who receives and interprets the message.
Feedback: Response of the receiver.
Channel: Medium used (speech, text, images, etc.).

4. Barriers to Communication
Language Barriers: Use of difficult or unfamiliar words.
Emotional Barriers: Fear, anger, sadness affecting clarity.
Physical Barriers: Noise, poor internet, distractions.
Cultural Barriers: Different cultural interpretations of words/signs.
5. 7Cs of Effective Communication
1. Clear: Use simple, understandable language.
2. Concise: Be brief and to the point.
3. Concrete: Use specific facts and examples.
4. Correct: Avoid grammar and spelling mistakes.
5. Coherent: Maintain a logical flow of ideas.
6. Complete: Include all necessary details.
7. Courteous: Be polite and respectful.
6. Sentence Types & Grammar Rules
Types of Sentences:
Declarative: States facts (e.g., "I love reading.")
Interrogative: Asks questions (e.g., "Do you like reading?")
Exclamatory: Shows emotion (e.g., "Wow! That’s great!")
Imperative: Gives commands (e.g., "Please sit down.")
Parts of Speech:
Noun: Names (person, place, thing).
Pronoun: Replaces a noun (he, she, they).
Verb: Action words (run, eat, write).
Adjective: Describes a noun (big, happy).
Adverb: Describes a verb (quickly, very).
Preposition: Shows position (on, in, under).
Conjunction: Joins words/sentences (and, but, or).
Interjection: Shows emotions (Wow! Oh no!).

7. Non-verbal Communication
Facial Expressions: Smile (happiness), frown (sadness).
Body Language: Posture, gestures, hand movements.
Eye Contact: Shows confidence and attention.
Tone & Voice: Volume, pitch, and speed of speech.

8. Assertive Communication & Public Speaking


Assertive Communication:
Express yourself confidently and clearly.
Listen and respect others' opinions.
Avoid aggressive or passive behavior.
3Ps of Public Speaking:
1. Prepare: Research the topic.
2. Practice: Rehearse before speaking.
3. Perform: Maintain eye contact, speak confidently.
9. Writing & Presentation Skills
Capitalization Rules (MINTS Method):
M – Months (January, February, etc.)
I – The word "I" always capitalized.
N – Names of people, places (Ravi, India).
T – Titles (Dr., Mr., Mrs.).
S – Start of sentences.
5. What is the best way to improve verbal communication skills?
a) Avoid talking to people
b) Use complicated words
c) Practice speaking clearly and confidently
d) Speak very fast
Answer: c) Practice speaking clearly and confidently

Top 10 Questions
1. What is communication? Explain its importance.
Answer: Communication is the process of sharing information, thoughts, and ideas
between individuals or groups to create understanding.
Importance of Communication:
Helps in expressing thoughts clearly.
Essential for personal and professional success.
Builds strong relationships.
Aids in decision-making and problem-solving.

2. What are the elements of communication?


Answer: The main elements of communication are:
1. Sender – The person who sends the message.
2. Message – The information being conveyed.
3. Medium – The channel through which the message is sent (verbal, non-verbal,
visual).
4. Receiver – The person who receives and interprets the message.
5. Feedback – The response from the receiver.
3. Define verbal and non-verbal communication with examples.

Answer: Verbal Communication: Involves spoken or written words.


Example: Talking on the phone, writing emails, classroom teaching.
Non-Verbal Communication: Involves body language, gestures, facial expressions,
and eye contact.
Example: A smile to express happiness, crossed arms to show disagreement.
4. What are the 7Cs of effective communication?
Answer: The 7Cs of effective communication ensure clarity and understanding:
1. Clear – Use simple and understandable language.
2. Concise – Be brief and to the point.
3. Concrete – Provide specific facts and examples.
4. Correct – Use accurate grammar and information.
5. Coherent – Maintain a logical flow.
6. Complete – Include all necessary details.
7. Courteous – Be polite and respectful.
PRASHANT KIRAD
5. List and explain any four barriers to communication.
Answer: 1. Language Barrier – Use of complex or unfamiliar words.
2. Perception Barrier – Misunderstanding due to personal opinions or biases.
3. Emotional Barrier – Strong emotions like anger or sadness affecting communication.
4. Environmental Barrier – Noise or distractions making communication difficult.
6. What are the three P’s of public speaking?
Answer: The 3Ps of public speaking are:
1. Prepare – Research and organize thoughts before speaking.
2. Practice – Rehearse in front of a mirror or friends.
3. Perform – Speak confidently and maintain eye contact with the audience.

7. Differentiate between active and passive voice with examples.


Answer: Active Voice: The subject performs the action.
Example: She wrote a letter.
Passive Voice: The subject receives the action.
Example: A letter was written by her.

8. What is assertive communication? Why is it important?


Answer: Assertive communication is a communication style where a person
expresses thoughts, feelings, and needs confidently while respecting others.
Importance:

Builds self-confidence and self-respect.


Helps in clear and respectful conversations.
Avoids misunderstandings and conflicts.

9. Explain the AEIOU model for saying "No" politely.


Answer: The AEIOU model helps in refusing requests politely:
Ask Questions – Understand the request.
Engage Politely – Use respectful words.
Include a Reason – Explain why you cannot accept the request.
Offer Alternatives – Suggest other options.
Use Thankfulness – Show appreciation for understanding.
Example:
Situation – A friend asks you to do their homework.
Response: "I would love to help, but I have my own work to complete. How about I
explain the topic to you instead?"

10. What are the different types of sentences? Give examples.


Answer: There are four main types of sentences:
1. Declarative – States a fact. (Example: I like ice cream.)
2. Interrogative – Asks a question. (Example: Do you like ice cream?)
3. Exclamatory – Shows strong emotions. (Example: Wow! This ice cream is
delicious!)
4. Imperative – Gives a command. (Example: Please pass me the ice cream.)
SELF MANAGEMENT SKILLS
Self-management skills are essential abilities that empower individuals to regulate
their thoughts, desires, emotions, and behaviors. These skills play a crucial role in
optimizing productivity and performance across various career domains. In the
context of employability, mastering self-management skills is instrumental in
steering one's career trajectory and navigating challenging situations effectively.
This article delves into the nuances of stress, explores stress management
techniques, and provides insights into the art of working independently.
Following are some of the skills you must master to succeed in life:
Self-awareness: Seek candid feedback to gain insights into your personality
and professional capabilities. Reflect on daily interactions, recognizing areas
where you excelled and identifying opportunities for improvement.
Responsibility: Embrace accountability for your tasks as a crucial step in self-
development. Whether assigned a task by a teacher or employer, taking
complete ownership is paramount. If challenges arise, communicate
proactively, report delays, and take corrective action promptly.
Time Management: Efficiently prioritize tasks and eliminate unnecessary
elements from your workload. Develop and adhere to a well-structured
timetable, ensuring disciplined adherence to maximize productivity.
Adaptability: Stay abreast of industry best practices and continually update
your knowledge base. Be proactive in preparing for changes, fostering the
ability to transition seamlessly when faced with new information or evolving
circumstances.

What is Stress?
Stress encompasses our emotional, mental, physical, and social responses to
perceived demands or threats, known as stressors. These stressors trigger the stress
reaction. For instance: - Being near exams while feeling inadequately prepared. -
Coping with the loss of a close family member. - Feeling concerned about others'
perceptions based on your appearance or communication skills.
Stress Management:
Effectively handling stress involves creating a strategy to cope with daily pressures,
aiming for a harmonious balance between life, work, relationships, relaxation, and
enjoyment. This approach enables the proactive management of daily stressors,
allowing you to confront challenges successfully. Always bear in mind the ABC of
stress management: A: Adversity, representing the stressful event. B: Beliefs,
indicating your response to the event.
C: Consequences, encompassing the actions and outcomes resulting from the event.
Ability to Work Independently: The capability to work independently is achieved by
fostering a calm and composed demeanor, signifying: 1. Developing self-awareness,
self-monitoring, and self-correction. 2. Understanding the tasks at hand. 3. Initiating
actions without relying solely on instructions. 4. Acknowledging and rectifying
mistakes without assigning blame to others. 5. Possessing both the ability and the
determination to engage in continuous learning.
Management Techniques:
Effective stress management techniques include: 1. Time Management: Prioritize
tasks to alleviate stress. 2. Physical Exercise and Fresh Air: Engage in activities like
yoga or meditation for better blood circulation and relaxation. Outdoor activities
provide fresh oxygen, enhancing overall well-being. 3. Healthy Diet: Maintain a
balanced diet, incorporating staples like dal, roti, vegetables, and fruits for sustained
energy and efficiency. 4. Positivity: Focus on positive aspects rather than dwelling
on negatives. Adopting

a constructive attitude can help overcome challenges, such as improving


performance after a low test score.
5. Adequate Sleep: Ensure a minimum of 7 hours of sleep each night to recharge
both body and mind for optimal functioning. 6. Holidays with Family and Friends:
Break from routine by spending quality time with family or friends during vacations,
providing a refreshing perspective upon return.
Emotional Intelligence:
Emotional intelligence involves recognizing and handling both personal and others'
emotions effectively. 1. Emotional Awareness: This skill encompasses the capability
to identify and label one's own emotions. 2. Harnessing Emotions: The adeptness
to channel and utilize emotions for cognitive processes, such as thinking and
problem- solving. 3. Managing Emotions: This facet involves the skill to regulate
one's own emotions as needed and assist others in achieving emotional regulation.
Finding Strengths (Abilities):
1. Reflect on consistent successes.
2. Consider positive traits others appreciate in you.
3. Dedicate time to identify your competencies.
Finding Weaknesses:
1. Identify challenging areas and tasks. and tasks.
2. Pay attention to feedback from others.
3. Embrace feedback openly for self-improvement.
Interests: 1. Pleasurable activities in free time. 2. Curiosity-driven or self-motivated
pursuits. 3. Future learning or desired activities. Abilities (Strengths): 1. Natural or
acquired capacities. 2. Proficiency in performing specific tasks or jobs.
Self-Motivation:
Internal drive propelling action, fostering goal achievement, happiness, and enhanced
quality of life. It's the capacity to act independently without external influence.
Types of Motivation: - Internal Motivation: Driven by personal satisfaction,
happiness, and well-being, such as learning a new skill during an annual function. -
External Motivation: Fueled by external rewards like respect, recognition, and
appreciation, as seen when Suresh's prize in a 100m race motivates him to practice
regularly.

Top 5 MCQ
1. What is the best way to start our day positively?
(a) Think about all that can go wrong.
(b) Think about the difficult test you will face during the day.
(c) Think about all your accomplishments so far and feel good about them.
(d) Think about the traffic on the road and feel stressed.
Answer: (c)
2. Do you think people living in hill stations can skip taking a bath for many
days?
(a) No, irrespective of the climate, one should take a bath regularly.
(b) Yes, not taking bath for many days is acceptable for people staying in cold
climate.
(c) Yes, if they wipe themselves with a wet cloth, then it is fine.
(d) None of the above
Answer: (a)
3. In self–management skills you can improve yourself in various skills like _
a. Discipline
b. Timeliness
c. Goal-setting
d. All of the above
Answer: (d)
4. When you are under __________ for a prolonged period, it can cause health
problems and mental troubles as well.
a. Stress
b. Discipline
c. Timeliness
d. Goal – Setting
Answer: (a)

Top 10 Questions
Q1. What do you mean by Self-management?
Ans. Self-management, also referred to as ‘self-control,’ is the abilityto control
one’s emotions, thoughts and behavior effectively indifferent situations.
Q2.Give any two examples where a small amount of stress is helpful. of

stress is helpful.
Ans. Two examples where a small amount of stress is helpful are:
1. A fire alarm is intended to cause stress and alert you to avoid danger.
2. The stress created by a deadline to finish a paper can motivate you tofinish it
on time.
Q3. Write four signs/symptoms of stress.
Ans. Four Symptoms of stress management are
a. Headache
b. Sleeplessness
c. Sadness
d. Excessive worrying
e. Nervousness
4. Write four qualities of those people who work independently.
Ans: 1. Possessing self-awareness, self-monitoring skills, and the ability toself-
correct.
2. Taking initiative without needing explicit instructions.
3. Demonstrating a capacity for continuous learning.
4. Acknowledging and learning from their own mistakes.
Q5. Differentiate between Interests and Abilities.
Ans:
Interests Abilities

Things that you like to do in your free


An acquired or natural capacity.
time that make you happy.

Things you are curious to do even if Enable you to perform a particular


no one asked you to do it. task with proficiency.

Q6. What do you mean by Goal and Goal Setting? Ans. Goals: They are a set of
dreams with a deadline to get them, for example, saving pocket money to buy a
favorite mobile phone by a particular date. Goal setting: It is all about finding and
listing your goals and then planning on how to achieve them
Q7. Write the Qualities of self–confidence.
Ans: Qualities of self–confident people –
a. Self–belief – Always believe in yourself and respect the failures, that
make you successful in life.

b. Hard Work – Work hard to achieve the goal, don’t be afraid of failures.
c. Positive Attitude – A positive attitude means focusing on the goal and
trying to achieve.

Q8. How to build self–confidence?


Ans: There are three steps to build self – confidence are as follows –
a. Step 1: Appreciate achievements & accept failures.
b. Step 2: Make a goal and try to achieve it.
c. Step 3: Always look on the positive side and be happy.

Q9.What are the factors that decrease self–confidence?


Ans: Factors Decreasing Self-Confidence:
1. Task Overwhelm:
2. Past Mistakes and Demotivation:
3. Failure Aversion:

Q10. What are the reasons for the promotion of a Self-Managementperson?


Ans: Reasons for Promoting Self-Management:
(a) Independence Emphasis:- Encourages autonomy, avoiding dependency on
others.
(b) Boosting Self-Confidence:- Foster's self-assurance, empowering individuals to
navigate their ownlives.
(c) Long-Term Sustainability:- Establishes a lasting and sustainable approach to
managing personal life.
The Importance of Acquiring and Building ICT Skills"
Acquiring and developing ICT skills are essential for effective communication,
business operations, and maintaining connections with family and friends. Therefore,
it is crucial for individuals to continually enhance their ICT skills to keep pace with
the latest software and applications available.
A computer system is comprised of two main components:
Hardware - These are the physical parts of the computer that can be
seen and touched, such as the keyboard, monitor, and CPU.
Software - This refers to the intangible components that enable the
hardware to function. Examples include
An Operating System
SERVES AS AN INTERFACE BETWEEN USERS AND COMPUTERS, DIRECTING
PROGRAM PROCESSING AND CONTROLLING COMPUTER OPERATIONS. IT
PERFORMS SEVERAL KEY FUNCTIONS:
1. Supervising hardware by monitoring each device's status and usage.
2. Ensuring proper functionality of hardware devices.
3. Managing software resources.

4. Regulating memory usage by tracking available and utilized memory for


each software.
5. Organizing files and directories within the computer system.
6. Monitoring disk space utilization for specific files.6.
7. Enabling file management operations like creation, copying, moving, and
deletion.
Types of Operating Systems
The different types of operating systems are as follows:
Different types of operating systems serve specific purposes:

Single-user, single-task OS: Allows only one user to utilize the computer for
a single task at a time.
Single-user, multi-task OS: Found in desktops and laptops, it enables one
user to run multiple programs simultaneously, such as Windows and Apple
MacOS.
Multi-user OS: Permits multiple users to work on the same computer either
at different times or concurrently.
Real-time OS: Responds to input within specific time constraints, ensuring
consistent completion times for operations. Examples include Lynx OS and
Windows CE.
Distributed OS: Operates across interconnected computers in a network,
integrating them into a unified computing and storage environment. Examples
include Windows, UNIX, and LINUX.
Interactive (GUI-based) OS: Features a user-friendly graphical interface allowing
input through mouse actions like clicking, double-clicking, or right- clicking.
Windows exemplifies this type of operating system. Understanding Desktop
Components in Windows: Taskbar: Positioned along the bottom of the screen, the
taskbar is a lengthy horizontal bar that provides essential functionality. To the
left, you'll find the Start button, while the Date/Time is located to the right.
Additionally, the taskbar displays icons representing open programs and several
shortcuts. Start Button: Situated on the left side of the taskbar, the Start button
serves as a gateway to the Start menu, offering access to various programs and
features upon clicking. Recycle Bin: Housing deleted files and folders, the Recycle
Bin allows users to restore accidentally removed items. It serves as a temporary
storage space for items before permanent deletion.

CREATING AND MANAGING FILES AND FOLDERS


Files – Every single thing you keep on your computer is kept as a file. A file
system is a method for naming, storing, and retrieving files.
Creating Files:
1. Right-click on any empty space within the right column.
2. From the shortcut menu, choose "New" and then select the desired file
type you wish to create.

Renaming Folders and Files:


1. Right-click on the file or folder.
2. Select the "Rename" option from the shortcut menu.
3. Input the new name or modify the existing one, then press the Enter key.
4. Alternatively, simply select the file/folder and press the function key F2.
5. Right-click on any empty space within the right column.
6. From the shortcut menu, choose "New" and then select the desired file type you
wish to create.
Folder: Folders and directories serve as containers for single or multiple files.
Within each directory or folder, you may find related files and/or subfolders. Sub-
folders can contain one or more files and additional subfolders, allowing for easy
organization and accessibility of files.
Creating a Folder:
1. Double-click the Computer icon.
2. Select the drive where you wish to create the folder, such as Local Disk D:.
3. A window will open, displaying the files and folders on Local Disk D:.
4. Click on "New Folder" in the toolbar.
5. A new folder named "New Folder" will be created, with the name
highlighted.
6. Enter a desired name for the folder. Renaming Folders and Files: 1.
Right-click on the file or folder. 2. From the shortcut menu, choose the
"Rename" option. 3. Type the new name or edit the existing one, then press
Enter. 4. Alternatively, select the file/folder and press the Function key F2.
Deleting Files or Folders: 1. Click on the file or folder. 2. Press the Delete
key. 3. Alternatively, right-click and select the "Delete" option from the
shortcut menu. BASIC SHORTCUTS CTRL+ z — undo CTRL+ y — redo
CTRL+ a — select all CTRL+ x — cut CTRL+ c — copy CTRL+ v — paste

CTRL+ p — print
CTRL+ s — save.
APPLY BASIC SKILLS FOR CARE AND MAINTENANCE OF COMPUTER
Computer systems require maintenance in order to function properly. System
failure may result from poor maintenance. You may be able to keep it in good
working order by giving it routine care and maintenance. Installing updates,
security, creating backups, and scanning are all part of routine system
maintenance
Maintaining Computer System:
1. Ensure the computer is free from dust by regular cleaning. 2. Avoid consuming
food or beverages while using the computer to prevent spills. 3. Keep hands clean
before using the keyboard to maintain its cleanliness. 4. Handle CDs and DVDs with
care to prevent scratches. 5. Cover the keyboard when not in use to protect it from
dust and debris.
Maintaining Computer Components
Proper care of computer components is essential for longevity. Implementing
preventive maintenance measures can significantly extend the lifespan of these
components. General Precautions for Cleaning Computer Components:
Always ensure the computer system is powered off before beginningthe cleaning
process.
Avoid spraying cleaning fluid directly onto computer components. Instead, apply
the liquid onto a cloth and then use it to wipe the components.
Take care not to allow any cleaning liquid to drip near the circuit board.
It's recommended to use an anti-static wristband to prevent the accumulation
of static electricity near electronic devices.

Cleaning Computer Components:


Computer Monitor: To clean the computer monitor, use a soft lintfree cloth
such as cotton, along with water or a specialized cleaning liquid. Avoid spraying
water or cleaning liquid directly onto the monitor to prevent it from seeping
through the seams.
Keyboard: Dirt and dust can harm the keyboard, potentially causing keys to
malfunction. Periodically, turn the keyboard upside-down and gently shake it to
remove dirt and debris.
Optical Mouse: Use a clean, lint-free cloth to wipe the bottom of the optical
mouse. Air or a cotton swab can be used to clean the lens area.
Digital Camera: Avoid touching the camera's lens directly. Use a soft lens
brush or a dry cloth to remove dust from the lens. For stubborn dust, apply

CDs and DVDs: Store CDs and DVDs in their proper cases to prevent damage.
Clean any dirt or fingerprints from CDs and DVDs by lightly rubbing them with
a clean, lint-free cotton cloth.

Preparing Maintenance Schedule


Regular computer system maintenance is crucial for optimal performance and
longevity.
Some of the maintenance activities are:
Maintain cleanliness of computer components like keyboard, mouse, and
Replace malfunctioning hardware promptly.
Avoid food near the computer to prevent damage.
Organize cables and cords to prevent tangling.
Remove unauthorized software from the system.
Back up data regularly for safety.
Periodically verify backup integrity through restoration checks.
Use an external hard drive for data backups.
Run antivirus scans routinely and keep software updated.
Avoid overcharging device batteries.
Ensure vents are clear to prevent overheating.
Always shut down the computer properly.

Safeguarding Computer Systems from Viruses:


A computer virus, an unauthorized program, attaches itself to other programs, to
Removing Files from the Temporary Folder
Press the Windows button + R on the keyboard.
The Run dialog box will appear.
Type %temp% and press Enter.
The Temp folder will open. Press Ctrl + A to select all the files in the folder.
Press the Delete key.
A message box will appear. Click Yes to confirm the deletion
Firewall:
A computer firewall functions as a network security system, either through
software or a programmable device, overseeing and controlling incoming and
outgoing network traffic based on user-defined security parameters. Firewalls
enhance the security of computers connected to networks such as LANs or the
Internet. Generally, a firewall establishes a barrier between a trusted internal
network and an untrusted external network, such as the Internet. It scrutinizes
each data packet, assessing whether it should be allowed to pass or halted,
regardless of whether it is incoming or outgoing traffic.
Cookies:
When a user visits an internet website, a small file called a cookie is stored on
their computer. These files are utilized to retain personalized information specific
to a particular client and website. A cookie is transmitted by a website upon your
visit and is stored on your computer in a file. Only the website that generated the
cookie can read it, and this information remains inaccessible to other servers.
Basic Tips for Device Care:
(i) Keyboard: Clean the keyboard using a soft brush.
(ii) Screen: Wipe the screen with a soft cloth to remove fingerprints.
(iii) Handle Devices Carefully: Handle and move your laptop carefully to avoid
dropping or banging it against hard surfaces.
(iv) Keep the Computer Cool: Overheating can damage internal parts. Ensure the
CPU fan is functioning to maintain optimal temperature.
(v) Avoid Overcharging the Battery: Unplug the device once it reaches full charge
to prolong battery life.
(vi) Plug in Devices Carefully: Connect USB drives or headphones gently without
forcing them into the port.
(vii) Limit Running Programs: Avoid running too many programs simultaneously to
prevent computer slowdown or crashes.

Maintenance Schedule:

(a) Daily Maintenance:


i. Clean up your email inbox.
ii. Download email attachments and save them in proper folders.
(b) Weekly Maintenance:
i. Clean your keyboard.
ii. Clean your monitor.
iii. Dust CPU and printer. iv. Backup your data to an external drive. (c) Monthly
Maintenance: i. Transfer photographs to computer and delete from drive. ii.
Organize photos into folders or albums. iii. Clean up 'Download' folder. iv. Uninstall
unused programs and apps. v. Run disk cleaner software. vi. Run full system virus
scan. (d) Yearly/Annual Maintenance: i. Clean up contacts list on social media
accounts. ii. Clean up email contact list. iii. Update your operating system. iv. Check
for expiry of antivirus software and renew.
Backing up your Data:
Backing up data involves saving information from your computer onto another device
such as CD/DVD drives. This ensures data recovery in case of computer failure due
to crashes, human errors, or natural disasters like floods.

Scanning and Cleaning Viruses: Install antivirus software to prevent and clean
viruses from entering your system, safeguarding your data against potential

threats. Increasing Computer Performance: Regularly clean unnecessary files and


data such as temporary files and images to free up hard disk space, improving
computer performance. Removing SPAM from your Computer: Sometimes we
get emails from companies who are advertising a product or trying to attract
you to their website. Such mails are called SPAM. We should never respond to
SPAM and delete it on a regular basis.

Threats to Computer

Threats are the ways in which personal information can be leaked from a computer
without our knowledge. (a) Theft: Theft means stealing of information or hardware.
These may be of three types: • Physical: Where a person may steal your desktop
computer or laptop. • Identity: Where a hacker steals your personal information and
assumes your identity. Using this false identity, the hacker can gain access to your
account information or perform illegal activity. • Software Piracy: This is stealing
of software and includes using or distributing unlicensed and unauthorised copies of
a computer program or software. (b) Virus: Viruses are computer programs that can
damage the data and

software programs or steal the information stored on a computer. Major


types of viruses are Worms and Trojan Horse.
Worms: These are viruses that replicate themselves and spread to all
files once they Information and Communication Technology Skills 81
files once they Information and Communication Technology Skills 81 attack a
computer. This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful
software program but once it reaches a computer it starts behaving like a virus
and destroying data.
• Online Predator: Online predators are people who trap you into inappropriate
relationships. They may be older people posing to be your age, bullying you into
doing illegal activities online and sometimes face to face. • Internet Scams:
Sometimes you may receive very attractive offers saying you have won huge
money in a lottery and that you can claim the prize by depositing a certain
amount of money. When you deposit the money using credit card or online
banking, you not only lose the deposit money but your card/account information
may be misused later. rewrite everything with same points and format
Protecting your Data:
(a) Use Strong Passwords: Utilize complex passwords that are difficult to guess,
incorporating a mix of lowercase and uppercase letters, numbers, and special
characters. This enhances security and prevents unauthorized access to your
computer. (b) Install Anti-virus and Firewall: Implement anti-virus software and
a firewall to

monitor incoming and outgoing data, preventing viruses from infiltrating your
computer. Anti-virus programs also detect and eliminate viruses that may have
already infected your computer.
(c) Encrypt Data: Encrypt sensitive data stored on your computer, especially
important for banks and companies storing customer information. Utilize encryption
features like Bitlocker in Windows to encrypt the entire hard disk, requiring a
decryption password or key to access the data, thereby preventing unauthorized
usage. (d) Use Secure Sites: Only provide credit card or bank account details on
secure sites. Look for "https://" and a lock symbol in the browser's address bar to
ensure the site is secure before entering sensitive information.

Top 5 MCQ
1. Which software manages all the devices of a computer and keeps track of
the status of the device, whether it is busy or not?
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
files once they Information and Communication Technology Skills 81 attack a
computer. This makes it very difficult to remove them.
Trojan Horse: A Trojan Horse disguises itself i.e., it appears to be a useful
software program but once it reaches a computer it starts behaving like a virus
and destroying data.
• Online Predator: Online predators are people who trap you into inappropriate
relationships. They may be older people posing to be your age, bullying you into
doing illegal activities online and sometimes face to face. • Internet Scams:
Sometimes you may receive very attractive offers saying you have won huge
money in a lottery and that you can claim the prize by depositing a certain
amount of money. When you deposit the money using credit card or online
banking, you not only lose the deposit money but your card/account information
may be misused later. rewrite everything with same points and format
Protecting your Data:
(a) Use Strong Passwords: Utilize complex passwords that are difficult to guess,
incorporating a mix of lowercase and uppercase letters, numbers, and special
characters. This enhances security and prevents unauthorized access to your
computer. (b) Install Anti-virus and Firewall: Implement anti-virus software and
a firewall to

monitor incoming and outgoing data, preventing viruses from infiltrating your
computer. Anti-virus programs also detect and eliminate viruses that may have
already infected your computer.
(c) Encrypt Data: Encrypt sensitive data stored on your computer, especially
important for banks and companies storing customer information. Utilize encryption
features like Bitlocker in Windows to encrypt the entire hard disk, requiring a
decryption password or key to access the data, thereby preventing unauthorized
usage. (d) Use Secure Sites: Only provide credit card or bank account details on
secure sites. Look for "https://" and a lock symbol in the browser's address bar to
ensure the site is secure before entering sensitive information.

Top 5 MCQ
1. Which software manages all the devices of a computer and keeps track of
the status of the device, whether it is busy or not?
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
2. An ________ manages the computer memory and keeps track of which
memory space is in use by which program and which space is free.
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
3. 18. GUI stands for __________
(a) Graphical User Interface
(b) Graphical User Interaction
(c) Graphical User Interactive
(d) None of the above Answer:
answer: a. Graphical User Interface
4. Which of the following is not an operating system?
a. DOS
b. Windows
c. Linux
d. Disk Defragmentor
Answer: d. Disk Defragmentor

5. Which of the following is not a mobile operating system?


a. Android
b. iOS
c. Windows Phone
d. Linux
Answer: d. Linux

Top 10 Questions
1. What is ICT? Answer : Information and Communication Technology (ICT) is an
acronym for information and communication technology. ICT helps in the proper
sharing, receiving, and processing of information, and an ICT device is a device that
is used for processing, storing, and delivering information to others. Examples of ICT
devices are – Laptop, Desktop, Tablets and Smartphones. 2. Objectives of
Information and communication technology?Advantages and disadvantages of
ICT. Answer : Full form of ICT is InformatiInformation and communication
technology.
The goal of ICT is to bridge the gap between parents, educators, and students by
encouraging sustainable, cooperative, and transparent communication methods.
Advantages of ICT a. Enhanced the modes of communication b. Independent
learning platforms Cost – efficient c. Enhanced data and information security d.
Paperless – Eliminate the usage of paper e. Better teaching and learning methods f.
Web – based LMS tools Disadvantages of ICT a. Traditional books and handwritten
methods are at risk. b. Managing courses online is difficult c. Teachers require
experience to handle ICT d. Risk of cyber attacks and hacks e. Misuse of technology
3. What is BIOS?
Answer : BIOS stands for Basic Input/ Output System, It helps the computer
system to identify (Self-test) the paraperaphal devices which are connected to the
computer system and helps computers to load Operating System properly

4. What is the purpose of Mouse?


Answer : The purpose of the mouse is –
a. Roll Over or Hover – Whenever we bring the mouse over the files, it shows the
details of the file.
b. Click or Double Click – Mouse allows you to select, open or delete files and
folders from the computer system.
c. Drag and Drop – Click on the file and drag and drop your file where you want.

5. What are files and folders in a computer system?


Answer : a. File – File is a collection of information different types of files store
different types of information. Every file has a file name and extension that
identifies the type of file.
b. Folder – Folder is a collection of files or a group of files.

6. How to maintain a computer system?


Answer : Some simple ways to take care of computer system are –
a. Keeping a Device Clean – Always keep a device clean, such as the
keyboard, the screen, and the mouse. Handle your gadget with care,
keep it cool, and don’t overload your battery.
b. Prepare a Maintenance Schedule – Make a schedule for computer
maintenance.
Daily Maintenance
a. Clean up your email inbox
b. Save Important attachments and save in folder Weekly Maintenance a. Clean
your Keyboard, monitor, CPU and printer b. Backup your data Monthly
Maintenance a. Clean unused photographs b. Clean up Download folder c.
Uninstall unused programs d. Run full system virus scan e. Run disk – cleaner
software Yearly / Annual Maintenance a. Clean up social media accounts b. Clean
up e-mail contact list c. Update your operating System 7. How to increase
Computer performance? Answer : We frequently install a large number of
applications, which slows down the computer. Always attempt to uninstall
unnecessary applications, temporary files, and antivirus software updates. 8. What is
a Security Break?

Answer : Security break is leakage of information stored in a computer. Your


personal information can be lost or leaked in two ways – We are not cautious

when it comes to disclosing personal information via the internet. We share our
account information and passwords on unsafe websites. A person gets unauthorized
access to our computer. This can happen at work if we don’t log out before leaving
the computer. 9. How can we protect our data? Answer : To protect our data from
theft and viruses we can take the following measures – a. Use Strong password in
your account – Make your passwords difficult to guess. When creating a new
password, attempt to use a combination of Small Character Capital Character
Special Character Numbers b. Install Antivirus and Firewall –Anti-virus software and
a firewall protect your data from virus and from hackers. c. Encrypt your data –
Keep your information in an encrypted format to keep it safe from unauthorized
users. d. Open only secure site – Before visiting a website, make sure the address
begins with https://. A website that begins with https:// is a secure website. 10.
Difference between Hardware and Software? Answer : A computer system
consists of two main parts – Hardware and Software a. Hardware – Hardware is a
physical part of a computer system. We can feel and touch the hardware devices.
example – CPU, Mother Board, Hard Disk, Keyboard,
Keyboard, Mouse, Printer etc. b. Software – Software related to the programs which
perform different types of tasks on the computer system. Program is a collection of
Instructions. It also helps the computer to perform the specific task. Example – Open
Office Base, Spreadsheet, Presentation etc.
Session 1: Sustainable Development

1. Introduction to Sustainable Development


Definition: Development that meets present needs without compromising the
ability of future generations to meet their own needs.
Key Aspects:
Economic Growth: Advancement in wealth and resources.
Environmental Protection: Preserving natural ecosystems.
Social Well-being: Ensuring quality of life and equitable opportunities.

2. Importance of Sustainable Development


Resource Conservation: Prevents depletion of natural resources.
Environmental Protection: Reduces pollution and environmental degradation.
Intergenerational Equity: Ensures resources are available for future generations.

3. Challenges to Sustainable Development


Food Security: Declining fertile land and soil degradation due to overuse of
chemical fertilizers.
Water Scarcity: Pollution of freshwater sources leading to reduced availability
of clean water.
Energy Crisis: Over-reliance on non-renewable energy sources causing
environmental harm.

4. Strategies for Promoting Sustainable Development


Resource Efficiency: Reducing excessive use of resources and enhancing
conservation.
Waste Management: Promoting recycling and reuse of materials.
Renewable Energy Adoption: Utilizing solar, wind, and other renewable energy
sources.
Afforestation: Planting more trees to restore ecological balance.
Sustainable Agriculture: Practicing organic farming to maintain soil health.

5. Sustainable Development Goals (SDGs)


Overview: A set of 17 global goals established by the United Nations in 2015,
aiming to address pressing environmental, political, and economic challenges.
Key Goals Include:
No Poverty: Eradicating poverty in all its forms.
Zero Hunger: Achieving food security and improved nutrition.
Good Health and Well-being: Ensuring healthy lives for all.
Quality Education: Providing inclusive and equitable education.
Clean Water and Sanitation: Ensuring availability of sustainable water and
sanitation.
Affordable and Clean Energy: Access to reliable and modern energy.
Climate Action: Taking urgent action to combat climate change.
Life Below Water: Conserving oceans and marine resources.
Life on Land: Protecting terrestrial ecosystems and biodiversity.

Session 2: Our Role in Sustainable Development


1. Why Should We Care?
Increasing Population = Increasing Demand for food, water, and energy.
Overconsumption is depleting natural resources.
Pollution and deforestation are causing global warming and extreme climate changes.
Future generations will suffer if we don’t take action now.

2. Environmental Issues Caused by Humans


Air Pollution – Smoke from industries, vehicles, and burning fossil fuels.
Water Pollution – Dumping garbage and untreated sewage into rivers and oceans.
Deforestation – Cutting down trees for urbanization, leading to soil erosion and
climate change.
Plastic Waste – Tons of plastic waste end up in the ocean, harming marine life.

How Can we Contribute


1. Individual Contributions
Quality Education: Pursue continuous learning and support educational
initiatives.
Clean Water and Sanitation: Practice water conservation and promote hygiene.
Affordable and Clean Energy: Adopt energy-efficient appliances and support
renewable energy projects.
Decent Work and Economic Growth: Develop skills for employment and support
sustainable economic policies.
Reduced Inequalities: Advocate for social justice and inclusivity.
Sustainable Cities and Communities: Participate in community planning and
support eco-friendly infrastructure.
Responsible Consumption and Production: Opt for sustainable products and
reduce waste.
Climate Action: Reduce carbon footprint through lifestyle choices.
Life Below Water and on Land: Engage in activities that protect natural
habitats and biodiversity.

2. Community and National Initiatives


Eco-Friendly Alternatives: Promoting the use of biodegradable materials to
reduce plastic pollution.
Sustainable Energy Projects: Developing large-scale solar power plants to
decrease reliance on fossil fuels.
Waste Management Programs: Implementing recycling and composting systems
to manage waste effectively.
Awareness Campaigns: Educating the public on sustainable practices and
environmental conservation.
Examples of Sustainable Initiatives in India
Gujarat Solar Park (Charanka) – One of the world’s largest solar power plants,
reducing dependence on fossil fuels.
Clay Kulhads in Indian Railways – Replacing plastic cups with biodegradable clay
cups.
Biodegradable Plastic Bags – Invented by an Indian entrepreneur, dissolve in hot
water and decompose naturally.
Edible Cutlery – Replaces plastic spoons and forks, reducing plastic waste.

Top 5 MCQ
1. What is the primary goal of Green Skills?
a) Increasing the use of fossil fuels
b) Promoting environmental sustainability and economic growth
c) Expanding industrial waste production
d) Reducing employment in eco-friendly sectors
Answer: b) Promoting environmental sustainability and economic growth
2. Which of the following is NOT an example of a renewable energy source?
a) Wind energy
b) Solar energy
c) Coal energy
d) Hydropower
Answer: c) Coal energy
3. How can industries adopt eco-friendly practices?
a) Using energy-efficient machinery
b) Increasing single-use plastic production
c) Dumping industrial waste in water bodies
d) Encouraging deforestation
Answer: a) Using energy-efficient machinery
4. What is the role of the 3Rs in sustainability?
a) Reuse, Repair, and Restore
b) Reduce, Reuse, and Recycle
c) Reform, Rebuild, and Reuse
d) Redesign, Replace, and Renew
5. Which of the following best describes a ‘carbon footprint’?
a) The amount of carbon dioxide absorbed by plants
b) The total greenhouse gases emitted by human activities
c) The process of converting carbon into fuel
d) The amount of oxygen produced by trees
Answer: b) The total greenhouse gases emitted by human activities

Top 10 Questions
1. What do you understand by Green Skills?
Answer: Green Skills refer to the knowledge, abilities, values, and attitudes
required to support a sustainable and resource-efficient society. These skills help
individuals contribute to environmental conservation and climate-friendly industries.
2. How do Green Skills contribute to sustainable development?
Answer: Green Skills help industries and individuals adopt environmentally friendly
practices, reduce pollution, conserve natural resources, and create eco-friendly jobs
that support long-term economic growth.

3. What is the difference between renewable and non-renewable resources?


Answer: Renewable resources are naturally replenished (e.g., solar energy, wind
power, hydropower).
Non-renewable resources are finite and take millions of years to form (e.g., coal,
petroleum, natural gas).

4. List three ways to conserve energy at home. Answer: 1. Switching off electrical
appliances when not in use. 2. Using energy-efficient LED bulbs instead of
incandescent lights. 3. Reducing excessive use of heating and cooling systems.
5. How does pollution affect biodiversity?
Answer: Pollution leads to habitat destruction, water contamination, and air
pollution, which threaten wildlife, reduce species populations, and cause ecological
imbalances.
6. What is ‘climate change’ and how does it affect the planet?
Answer: Climate change refers to long-term shifts in global temperatures and
weather patterns due to human activities such as burning fossil fuels. It leads to
extreme weather conditions, rising sea levels, and loss of biodiversity.
8. What are some eco-friendly alternatives to plastic bags?
Answer: Cloth bags
Jute bags
Paper bags
Biodegradable bags

9. Define ‘sustainable transportation’ and give examples.


Answer: Sustainable transportation includes eco-friendly modes of travel that
reduce pollution and fuel consumption. Examples:
Cycling and walking
Electric vehicles
Public transport like buses and trains
Carpooling

10. How can businesses contribute to environmental sustainability?


Answer: Businesses can adopt green practices such as:
Using renewable energy sources
Reducing industrial waste
Implementing recycling programs
Encouraging employees to follow sustainable practices
What is Intelligence?
Intelligence is the ability to think, learn, and apply knowledge to solve problems.
It involves:
Reasoning – Solving new problems and making logical decisions.
Learning – Adapting based on past experiences.
Understanding – Grasping complex concepts.
Perception – Processing sensory data (vision, sound).
Decision Making – Choosing the best possible outcome.

Types of Intelligence (According to Howard Gardner’s Multiple Intelligences)


1. Linguistic Intelligence – Language skills (e.g., poets, writers).
2. Logical-Mathematical Intelligence – Problem-solving ability (e.g., scientists,
engineers).
3. Spatial Intelligence – Understanding space and visuals (e.g., artists, architects).
4. Musical Intelligence – Sensitivity to sound patterns (e.g., musicians).
5. Bodily-Kinesthetic Intelligence – Physical coordination (e.g., athletes, dancers).
6. Interpersonal Intelligence – Understanding others (e.g., psychologists, teachers).
7. Intrapersonal Intelligence – Self-awareness (e.g., philosophers).
8. Naturalist Intelligence – Identifying patterns in nature (e.g., biologists).
9. Existential Intelligence – Deep thinking about life and existence.
Decision Making
We make decisions based on experience, intuition, and knowledge.
Example Scenarios:

Choosing a career based on interests and skills.


Deciding between saving money or spending it on luxury.
Choosing the right path in an emergency situation.
AI tries to replicate human decision-making by analyzing data and making
predictions.

What is Artificial Intelligence (AI)?


AI is the ability of machines to perform human-like tasks such as thinking,
learning, problem-solving, and decision-making.
Example:
AI-powered chatbots like Siri and Alexa respond to voice commands.
AI-powered Netflix recommendations predict what you might like to watch.

How Do Machines Become Artificially Intelligent?


1. Training with Data – Machines are given a dataset (past knowledge).
2. Recognizing Patterns – AI finds relationships in data.
3. Making Predictions – AI applies learned rules to make decisions.
4. Improving with Feedback – AI updates itself based on new data.
Applications of AI Around Us

1. Speech Recognition: Google Assistant, Siri, Alexa.


2. Image Recognition: Face unlock, Google Lens.
3. Self-Driving Cars: AI makes driving decisions.
4. Recommendation Systems: YouTube, Amazon, Netflix.
5. Healthcare: AI diagnoses diseases from X-rays and scans.
6. Security Systems: AI-powered CCTV surveillance.
7. Customer Support: AI chatbots on websites.
What is NOT AI?

Automation (e.g., Washing machines, traffic lights) – Follows fixed rules, does
not learn.
Internet of Things (IoT) – Smart devices connected to the internet (e.g., Smart
AC).
Rule-based Programs – Fixed instructions, no learning (e.g., Calculators).

2. Basics of AI
Difference Between AI, ML, and DL

Concept Definition Example

Artificial Intelligence Broad team for machines that Virtual Assistants like Siri,
(AI) mimic human intelligence. Alexa.
Subset of AI where machines
learn from data.
Machine Learning (ML) Advanced from of ML using Spam detection in email.
neural network.
Self-driving cars
Deep Learning (DL)
recognising road signs.

AI Domains
1. Data Science – Extracting meaningful insights from large datasets.
Example: Price comparison websites, fraud detection in banking.
2. Computer Vision – Machines understanding and analyzing visual information.
Example: Face recognition, medical image analysis.
3. Natural Language Processing (NLP) – Machines understanding human language.
Example: Google Translate, chatbots, spam filters.
3. AI Ethics
Moral Issues in AI (Self-Driving Car Example)
AI may have to choose between saving a pedestrian or the car’s passengers.
Who should be held responsible?
1. The Car Owner?
2. The AI Developer?
3. The Pedestrian?
These moral dilemmas show why ethical AI programming is important.
Data Privacy

AI collects personal data from:


Websites (Google, Facebook).
Smartphones (location tracking).
Social media (user preferences).

Issues:
Misuse of private data.
Targeted ads based on personal conversations.
Cybersecurity risks.

Solution:
Strong data protection laws (GDPR, IT Act).
User control over data sharing.

AI Bias
AI learns from data, and biased data can cause unfair decisions.
Examples of Bias in AI:
Facial recognition errors – AI is less accurate for darker skin tones.
Job hiring bias – AI may favor men if trained on historical male-dominated job
data.

Solution:
Use diverse training data to make AI fair and unbiased.

AI Access (Digital Divide)


Not everyone can access AI technology.
Poorer regions lack AI tools and education.
AI should be inclusive and accessible to all.
Top 5 MCQ
1. Which of the following is an example of AI in daily life?
a) Washing clothes manually
b) Playing a musical instrument
c) Google Assistant
d) Writing a book
Answer: c) Google Assistant
2. What is the full form of NLP in AI?
a) Natural Logic Processing
b) Neural Learning Process
c) Natural Language Processing
d) Non-Linear Processing
Answer: c) Natural Language Processing
3. Which domain of AI deals with understanding images and videos?
a) Data Science

b) Computer Vision
c) NLP
d) Robotics
Answer: b) Computer Vision
4. Which of the following is NOT a type of AI?
a) Narrow AI
b) General AI
c) Super AI
d) Basic AI
Answer: d) Basic AI
5. What is an ethical concern in AI?
a) AI can work 24/7
b) AI can store data
c) AI can be biased
d) AI reduces workload
Answer: c) AI can be biased
PRASHANT KIRAD

Top 10 Questions
1. Define Artificial Intelligence.
Answer : Artificial Intelligence (AI) is the simulation of human intelligence in
machines, allowing them to perform tasks such as learning, reasoning, problem-
solving, and decision-making.
Example: AI chatbots like ChatGPT can understand and respond to human
conversations.
2. List three real-life applications of AI.
Answer : AI is widely used in various sectors to enhance efficiency and automation.
Examples: 1. Voice Assistants – AI-powered tools like Google Assistant, Siri, and
Alexa help users with queries and tasks.

th
2. Recommendation Systems – Platforms like Netflix, YouTube, and Amazon suggest
movies, videos, or products based on user preferences.

10
3. Self-Driving Cars – AI enables autonomous vehicles like Tesla Autopilot and
Waymo to navigate roads safely.
&
h

3. Differentiate between AI, Machine Learning, and Deep Learning.


9t

Answer :
B

Concept Definition Example


U
PH

Artificial Intelligence Broad team for machines that Virtual Assistants like Siri,
(AI) mimic human intelligence. Alexa.
Subset of AI where machines
EX

learn from data.


Machine Learning (ML) Advanced from of ML using Spam detection in email.
neural network.
Self-driving cars
Deep Learning (DL)
recognising road signs.

Key Points:
AI is the broad concept, while ML and DL are specialized fields within AI.
ML involves learning from data, and DL focuses on deep neural networks for
more complex tasks.

4. What are the three domains of AI?


Answer:
AI is categorized into three main domains:
1. Data Science – AI analyzes and interprets large datasets for insights.
Example: AI-driven market analysis in e-commerce.
2. Computer Vision – AI recognizes and processes images/videos. Example: Face
recognition in smartphones and security cameras. 3. Natural Language Processing
(NLP) – AI understands and responds to human language. Example: Chatbots,
language translation apps like Google Translate. 5. Mention two advantages and
two disadvantages of AI. Answer : Advantages: 1. Automation of Tasks – AI
reduces human effort in repetitive jobs (e.g., chatbots, data entry). 2. Higher
Efficiency and Accuracy – AI performs calculations and analyzes data with high
precision. Disadvantages: 1. Job Losses – AI automation may replace human workers
in various industries. 2. Bias and Ethical Concerns – AI algorithms can be biased if
trained on partial or unfair data. 6. What is the difference between Narrow AI
and General AI? Answer : Narrow AI: AI designed for a specific task (e.g., voice
assistants, spam filters).

General AI: AI that can perform multiple tasks and reason like a human (still under
research).
Examples:
Narrow AI: Google Assistant, Chess-playing AI, Email spam filters.
General AI: Theoretical AI that can think and make decisions like humans.
7. What are the ethical concerns related to AI?
Answer : AI raises several ethical concerns, including:
1. Bias in AI – AI systems may make unfair decisions if trained on biased data.
2. Privacy Issues – AI collects and processes large amounts of personal data, leading
to privacy risks.
3. Job Displacement – AI automation may.
8. How does AI help in automating tasks?
Answer : AI automates tasks by performing repetitive and time-consuming work
efficiently.
Examples:
1. Customer Support – AI chatbots provide 24/7 support on websites.
2. Manufacturing – AI-powered robots assemble products in factories.
3. Healthcare – AI analyzes medical scans for early disease detection.
replace human jobs in industries like customer service and manufacturing.
9. How is AI transforming the transportation sector?
Answer : AI is improving transportation by increasing safety, efficiency, and
automation.
Examples:
1. Self-Driving Cars – AI-powered cars like Tesla use sensors and cameras to drive
autonomously.
2. Traffic Management – AI predicts traffic congestion and suggests better routes
(Google Maps).
3. Smart Navigation – AI-powered apps like Waze provide real-time route
optimization.
10. What is the role of Machine Learning in AI?
Answer : Machine Learning (ML) is a subset of AI that enables computers to learn
from data without being explicitly programmed.
Examples of ML Applications:
1. Spam Filtering – Gmail detects and filters spam emails.
2. Recommendation Systems – Netflix recommends shows based on user preferences.
3. Fraud Detection – Banks use AI to detect fraudulent transactions.
AI Project Cycle
The AI Project Cycle is a structured approach to developing AI-based solutions. It
has five stages:
1. Problem Scoping
Problem scoping is the process of identifying a problem and understanding its
impact. To define the problem clearly, we use the 4W Problem Canvas:
Who is facing the problem? This includes individuals, businesses, or
organizations affected by the issue.
What is the nature of the problem? Evidence such as surveys, news reports, or
real-life experiences can help define the problem.
Where does the problem occur? Identifying the context or location where the
problem happens frequently is important.
Why is it important to solve? Understanding the benefits of solving the problem
helps justify the AI solution.
For example, if food wastage in restaurants is a problem, stakeholders like
restaurant owners and customers are affected. The problem happens in
restaurants due to poor demand prediction. Solving it would help reduce costs and
minimize waste.

2. Data Acquisition
Data acquisition involves gathering relevant and reliable data to train an AI model.
There are two types of data:
Primary Data is collected firsthand through surveys, interviews, and direct
observations.
Secondary Data is obtained from existing sources like government reports,
research papers, and online databases.

Some common methods of data collection include:


Surveys and Questionnaires: Asking people for feedback or experiences related
to the problem.
Web Scraping: Extracting data from websites using AI tools.
Sensors and IoT Devices: Collecting real-time environmental data, such as
temperature and motion tracking.
APIs (Application Programming Interfaces): Accessing structured data from
online platforms.
For example, a restaurant owner could collect past sales records to analyze which
food items are wasted the most.

3. Data Exploration
Data exploration is the process of analyzing and understanding the data to find
useful patterns.
values. It also helps in identifying trends that can improve AI model performance.

Different types of data visualization techniques are used to make sense of the
data:
Bar Graphs help compare quantities, such as the number of customers visiting
a restaurant each day.
Line Charts show trends over time, like food wastage increasing on weekends.
Pie Charts represent proportions, such as the percentage of different food
items wasted.
Scatter Plots identify relationships between two variables, like the effect of
discounts on food sales.
For example, analyzing restaurant sales data may reveal that food wastage is
highest on weekends due to incorrect demand forecasting.
4. Modelling
Modelling is the process of developing an AI system that can analyze data and
make predictions.
There are two main approaches to building AI models:

Rule-Based Approach: The AI follows predefined conditions set by humans. For


example, a chatbot that gives fixed responses based on user inputs.
Learning-Based Approach (Machine Learning): The AI learns patterns from
data and improves over time. For example, AI predicting future food demand
based on past sales data.
Machine Learning models are categorized into:
Supervised Learning: The AI is trained using labeled data, such as emails
marked as spam or non-spam.
Unsupervised Learning: The AI finds patterns in unlabeled data, such as
grouping customers based on their shopping habits.
Reinforcement Learning: The AI learns through trial and error, like self-driving
cars adjusting their driving based on real-world conditions.
For example, an AI model can be trained using restaurant sales data to predict
which food items are likely to be wasted.
5. Evaluation

Evaluation is the process of testing the AI model to check its accuracy and
efficiency.
To assess model performance, various metrics are used:
Accuracy measures the percentage of correct predictions.
Precision checks how many of the predicted positive cases were actually
correct.
Recall measures how many of the actual positive cases were correctly
identified.
F1 Score balances precision and recall to give an overall performance score.
F1 Score balances precision and recall to give an overall performance score.
For example, an AI model predicting food demand can be evaluated by comparing
its predictions with actual food wastage data.
Neural Networks
Neural networks are advanced AI models inspired by the human brain. They
consist of layers of interconnected nodes (neurons) that process data.
Structure of a Neural Network
A neural network has three main layers:
1. Input Layer: Takes raw data, such as image pixels in face recognition.
2. Hidden Layers: Process the data and extract meaningful patterns.
3. Output Layer: Provides the final prediction or classification.
Neural networks work by adjusting their internal connections (weights and biases)
to improve accuracy. The more hidden layers a neural network has, the more
complex tasks it can perform.
How Neural Networks Work?
Each neuron processes information and passes it to the next layer. The network
learns by adjusting its weights and biases based on training data. This process
helps the AI recognize patterns, classify objects, and make predictions.

For example, in face recognition technology, a neural network analyzes facial


features and matches them with stored data.

Applications of Neural Networks in AI

Neural networks are widely used in real-world AI applications:


Face Recognition: AI scans and matches facial features for security systems
and phone unlocking.
Self-Driving Cars: AI detects roads, traffic signs, and pedestrians to make
driving decisions.
Healthcare AI: AI analyzes medical images to detect diseases like cancer.
Speech Recognition: AI converts spoken words into text, used in virtual
assistants like Siri and Google Assistant.
Recommendation Systems: AI suggests products, movies, or songs based on
user preferences, like on Netflix and Amazon.
For example, AI in self-driving cars processes live camera feeds to detect obstacles
and adjust the vehicle’s movement accordingly.
Top 5 MCQ
1. Which of the following is the first step in an AI project?
a) Model Selection b) Data Collection c) Problem Identification
d) Model Deployment Answer: c) Problem Identification 2.
What is the main purpose of training an AI model? a) To
collect more data b) To make the model learn from data c) To
remove unwanted features d) To deploy AI solutions Answer:
b) To make the model learn from data 3. Which of the
following is NOT a challenge in AI projects? a) Data bias

b) Model interpretability
c) Abundant data availability
d) High computational costs
Answer: c) Abundant data availability
4. Which metric is commonly used to evaluate AI models?
a) Speed of training
b) Accuracy
c) File size of the dataset
d) Number of features
Answer: b) Accuracy
5. What is the final step in an AI project lifecycle?
a) Model Training
b) Data Cleaning
c) Model Deployment
d) Feature Engineering
Answer: c) Model Deployment
Top 10 Questions
1. What are the key stages of an AI project?
Answer : AI projects follow a structured lifecycle to ensure success. The key stages
are:
1. Problem Identification: Define the problem AI will solve.
2. Data Collection: Gather relevant data from various sources.
3. Data Preparation: Clean, preprocess, and transform data for model training.
4. Model Selection: Choose the right AI/ML model based on problem type.
5. Model Training & Testing: Train the model on data and test its performance.
6. Evaluation: Measure accuracy using metrics like precision, recall, and F1-score.
7. Deployment: Integrate the model into an application for real-world use.

2. Why is data important in AI projects?


Answer : AI models learn patterns from data to make predictions. If the data is
incomplete or biased, the model will be inaccurate.
Example: A self-driving car needs high-quality road and traffic data to function
safely.

3. What is the role of machine learning in AI projects? Answer : Machine Learning


(ML) is a core component of AI that allows models to improve over time. It identifies
patterns from historical data and applies them to new inputs. Example: A spam
filter in emails uses ML to classify messages as spam or not. 4. What are the
common challenges in AI projects? Answer : Data-related challenges: Poor-quality
or biased data affects accuracy. Computational costs: AI models require significant
processing power. Interpretability: Many AI models work like "black boxes," making
it hard to understand their decisions. Ethical concerns: AI may lead to job loss, bias,
or misuse in surveillance. 5. What is a dataset, and why is it needed in AI
projects? Answer : A dataset is a collection of structured or unstructured data used
to train AI models. Example: A facial recognition AI requires a dataset of human
faces to learn different features. 6. What is model evaluation in an AI project?
Answer : Evaluation helps determine whether an AI model is performing well.
Common metrics include:
Accuracy: Measures correct predictions.
Precision & Recall: Used for classification tasks.
F1-Score: Balances precision and recall.
Example: In medical diagnosis AI, a high recall ensures fewer false negatives
(missed cases).
7. What is the significance of feature selection in AI projects?
Answer : Feature selection involves picking only the most important data attributes
for the model.
It reduces computational cost and improves performance.
Example: In a housing price prediction model, "Location" and "Number of
Bedrooms" may be important features, but "House Color" might not be.
8. What are ethical concerns in AI projects?
Answer : Bias in AI: If an AI recruiting system is trained on biased data, it may
unfairly reject certain candidates.
Data privacy: AI systems processing personal data (like facial recognition) raise
concerns.
Job displacement: Automation in industries may lead to unemployment.

9. What is AI model deployment?


Answer : Deployment means integrating a trained AI model into an application.
Example: AI chatbots (like Siri or Alexa) use deployed models to interact with
users.
10. How does AI impact different industries?
Answer : Healthcare: AI assists in diagnosing diseases and robotic surgeries.
Finance: AI detects fraud and automates stock trading.
Retail: AI recommends products based on user preferences.
Manufacturing: AI-powered robots assemble products in factories.
1. Introduction to Data Science
Data Science is the process of collecting, analyzing, and interpreting data to
extract meaningful insights.
It combines mathematics, statistics, artificial intelligence (AI), and computer
science to solve real-world problems.
AI models are trained using structured (numeric, organized) or unstructured (text,
images, audio) data.
Importance of Data Science in AI:
AI learns from data; better data = more accurate AI predictions.
Data-driven decisions improve efficiency and automation in industries.
2. Applications of Data Science
1. Healthcare: AI analyzes medical images (X-rays, MRIs) to detect diseases.
Predicts patient conditions based on medical history.
Example: AI detecting cancer in CT scans.
2. E-commerce: AI recommends products based on browsing and purchase history.

Example: Amazon suggests products based on previous purchases.


3. Finance: AI detects fraudulent transactions and predicts stock market trends.
Example: Banks use AI to identify unusual transactions as fraud.
4. Social Media: AI personalizes content, such as recommended posts and targeted
ads.
Example: YouTube suggesting videos based on watch history.
5. Search Engines:
AI ranks search results based on relevance and user behavior.
Example: Google shows personalized search results.

3. Data Science Process


Data Science follows a structured process to work with data effectively. The key
steps are:
Step 1: Problem Definition
Clearly define the problem statement and the objective of the AI model.
Identify the stakeholders affected by the problem.
Example: A food delivery company wants to predict peak ordering hours to
optimize delivery times.
Step 2: Data Collection
Gather relevant and reliable data from different sources.
Data can be:
Primary Data (Surveys, interviews, experiments).
Secondary Data (Web scraping, government reports, online databases).
Step 3: Data Cleaning
Remove duplicate, incorrect, or missing values.
Standardize data formats to ensure uniformity.
Example: Converting all dates into the YYYY-MM-DD format in a dataset.
Step 4: Data Exploration
Analyze trends and patterns in the data using statistics and graphs.
Helps in selecting the right AI model for predictions.
Example: A company studies past customer purchases to find peak shopping hours.
Step 5: Model Training
Machine Learning (ML) algorithms are applied to train AI models.
The AI model learns from historical data and improves accuracy over time.
Example: AI predicts traffic congestion using past road traffic data.
Step 6: Model Evaluation
The AI model is tested using performance metrics like accuracy, precision, recall,
and F1 score.
If the model performs well, it is deployed for real-world use.
4. Data Storage Formats

After collection, data must be stored in proper formats for easy access and
analysis. Common formats include:
1. CSV (Comma-Separated Values): Stores tabular data in plain text.
Used in data analysis and machine learning.
2. Spreadsheets (Excel, Google Sheets): Used for organizing numerical and
categorical data.
3. SQL Databases: Used for storing and querying large datasets.
4. JSON & XML: Formats used for data exchange between applications.

5. Basic Statistics in Data Science


Mean (Average): The sum of all values divided by the number of values. Example:
The average score of students in a class test. Median: The middle value in a sorted
dataset. Example: The middle salary in a list of employee salaries. Mode: The most
frequently occurring value in a dataset. Example: The most common customer rating
in a survey. Standard Deviation: Measures how spread out the data is from the
mean. Example: A high standard deviation in stock prices indicates high volatility.
6. Data Visualization
Data visualization makes complex data easy to understand. Common visualization
techniques include: 1. Bar Graphs: Used to compare different categories. Example:
Comparing sales in different cities. 2. Line Charts: Shows trends over time.
Example: Tracking temperature changes over a month.
3. Pie Charts: Represents proportions or percentages.
Example: Percentage of products sold by category.
4. Histograms: Shows the distribution of numerical data.
Example: Examining the age distribution of customers.
7. Classification Model in Data Science
What is Classification?
Classification is a supervised learning technique where AI categorizes data into
predefined groups.
The model learns from labeled data and then classifies new data based on
patterns.
Examples of Classification Models:

Email filtering (Spam or Non-Spam).


Loan approval (Eligible or Not Eligible).
Customer sentiment analysis (Positive or Negative reviews).
8. K-Nearest Neighbors (KNN) Algorithm
Introduction to KNN

KNN (K-Nearest Neighbors) is a machine learning algorithm used for


classification and regression.
It classifies a new data point by comparing it with K nearest existing data
points in the dataset.

How KNN Works?


1. Choose a value for K (number of nearest neighbors).
2. Calculate the distance between the new data point and all existing data points.
3. Identify the K closest neighbors to the new data point.
4. Assign the most common category among those neighbors to the new data point.
Example: AI predicts whether a customer will buy a product
based on past purchases of similar customers.

Top 5 MCQ
1. Which of the following is a supervised learning algorithm?
a) K-Means Clustering
b) Decision Tree
c) Apriori Algorithm
d) DBSCAN
Answer: b) Decision Tree
2. What is the primary purpose of data preprocessing in Data Science?
a) To create new datasets
b) To increase dataset size
c) To clean and transform raw data
d) To visualize data
Answer: c) To clean and transform raw data
3. Which of the following is NOT a type of Machine Learning?
a) Reinforcement Learning
b) Supervised Learning
c) Neural Learning
d) Unsupervised Learning
Answer: c) Neural Learning
4. What is the role of a loss function in a Machine Learning model?
a) To adjust hyperparameters
b) To measure the difference between predicted and actual values
c) To visualize model output
d) To preprocess data
Answer: b) To measure the difference between predicted and actual values
5. Which tool is commonly used for big data processing?

a) NumPy
b) Pandas
c) Apache Spark
d) Matplotlib
Answer: c) Apache Spark

Top 10 Questions
1. Explain the difference between Classification and Regression in Machine
Learning. Answer: In Machine Learning, both Classification and Regression are types
of supervised learning, but they solve different problems: Classification is used when
the output variable is categorical (e.g., "Yes" or "No," "Spam" or "Not Spam").
Example: A model that predicts whether an email is spam or not. Regression is used
when the output variable is continuous (e.g., predicting temperature, house prices).
Example: A model that estimates the price of a house based on features like area,
location, and number of rooms. Both techniques use training data to learn patterns,
but classification predicts discrete values, while regression predicts numerical values.
2. What are the steps involved in Data Science workflow? Answer: The Data
Science Workflow follows several steps to extract insights from data: 1. Data
Collection: Gathering data from sources like databases, web scraping, APIs, or
sensors. 2. Data Cleaning and Preprocessing: Handling missing values, removing
duplicates, and transforming raw data. 3. Exploratory Data Analysis (EDA):
Identifying patterns, relationships, and trends in the data. 4. Feature Engineering:
Creating and selecting the most relevant features for the model. 5. Model Selection
and Training: Choosing and training machine learning models such as Decision
Trees or Neural Networks. 6. Model Evaluation and Optimization: Assessing model
performance using metrics like accuracy, precision, recall, RMSE, etc. 7.
Deployment: Deploying the model into production and continuously monitoring its
performance. This workflow helps in making informed decisions and improving
predictions. 3. What is Feature Engineering and why is it important? Answer:
Feature Engineering is the process of creating new variables (features) or modifying
existing ones to improve the performance of a machine learning model.
It involves:

Feature Selection: Identifying the most relevant features.


Feature Extraction: Transforming raw data into useful features (e.g.,
converting timestamps into day, month, year).
Feature Scaling: Normalizing values to improve model convergence.

Importance of Feature Engineering:


Helps reduce overfitting by removing unnecessary data.
Improves model accuracy and efficiency by selecting relevant features.
Makes data more interpretable for machine learning algorithms.

A good example is in Natural Language Processing (NLP), where raw text is


converted into word embeddings like TF-IDF or Word2Vec to help the model
understand text better. 4. Describe Overfitting and Underfitting in Machine
Learning. Answer: Overfitting and Underfitting are two major problems in Machine
Learning models: Overfitting: The model learns too much from training data,
including noise and minor patterns, making it perform poorly on new (unseen) data.
Example: A decision tree that memorizes training data but fails to generalize.
Solution: Use regularization (L1, L2), cross-validation, pruning, or dropout (in neural
networks).
5. How do you handle missing data in a dataset? Answer: Handling missing data is
crucial for building robust machine learning models. Some common techniques
include: 1. Removing Missing Values: If the missing data is minimal, we can remove
those rows or columns. 2. Imputation Techniques: Mean/Median/Mode Imputation:
Replacing missing values with the mean (for continuous data) or mode (for
categorical data). Forward or Backward Fill: Filling missing values with previous or
next available values. KNN or Regression Imputation: Predicting missing values using
other features in the dataset. 3. Using Machine Learning Models: More advanced
techniques involve training a separate model to predict missing values. The choice of
method depends on the nature of the dataset and how much missing data exists.
6. What is Exploratory Data Analysis (EDA) and why is it important?
Answer: Exploratory Data Analysis (EDA) is the process of analyzing and
visualizing data to understand its structure, patterns, and relationships before
applying machine learning models. It helps in identifying trends, outliers, and
missing values in a dataset.

Steps in EDA:
1. Understanding the Data: Checking data types, structure, and summary statistics
(e.g., using df.describe() in Python).
2. Handling Missing Values: Identifying and imputing missing data using techniques
like mean, median, or mode replacement.
3. Checking for Outliers: Using box plots or scatter plots to detect outliers that
may affect model performance.
4. Visualizing Data: Using histograms, bar plots, scatter plots, and pair plots to
find correlations.
5. Feature Selection & Engineering: Identifying important features and
transforming variables if needed.
Importance of EDA:
Helps in understanding data distributions and anomalies.
Reduces noise by identifying irrelevant or redundant features.
Provides insights into relationships between variables, which improves model
accuracy.
For example, if we analyze customer data for a loan approval model, EDA helps in
identifying factors like income, credit score, and debt that influence approval rates.

7. What is Dimensionality Reduction, and why is it used?


Answer: Dimensionality Reduction is a technique used in Data Science to reduce
the number of input features (variables) in a dataset while preserving as much
features while maintaining essential information can improve model efficiency.
Common Dimensionality Reduction Techniques: 1. Principal Component Analysis
(PCA): Converts correlated features into uncorrelated principal components.
Example: Reducing 100 features into 10 principal components without losing much
information. 2. Linear Discriminant Analysis (LDA): Used for classification tasks by
maximizing class separability. 3. t-SNE (t-Distributed Stochastic Neighbor
Embedding): A technique for visualizing high-dimensional data in 2D or 3D. 4.
Feature Selection Methods: Removing irrelevant or redundant features using
statistical techniques like Variance Threshold, Recursive Feature Elimination (RFE),
and Chi-Square Test. Why is Dimensionality Reduction important? Reduces
computational cost and improves training speed. Eliminates redundant or noisy
features that do not contribute to the model’s accuracy. Prevents overfitting by
simplifying the model with fewer but relevant features. Improves visualization of
high-dimensional data in a lower-dimensional space. For example, in an image
classification problem, reducing the number of pixels as features while maintaining
essential information can improve model efficiency.
8. What are different types of data in Data Science, and how are they used?
Answer: In Data Science, data is categorized into four main types, each serving

different purposes in analysis and machine learning models:


1. Nominal Data (Categorical): Data that represents categories without any order.
Example: Colors (Red, Blue, Green), Gender (Male, Female, Other), Customer IDs.
Used for classification tasks where labels have no ranking.
2. Ordinal Data: Data with a meaningful order but no fixed difference between
values.
Example: Movie Ratings (Poor, Average, Good, Excellent), Education Levels (High
School, Bachelor's, Master's, Ph.D.).
Used in ordinal regression where ranking matters.
3. Interval Data: Data with equal intervals between values but no absolute zero.
Example: Temperature in Celsius/Fahrenheit, Dates, IQ Scores.
Used in statistical analysis, but ratios do not make sense (e.g., 20°C is not "twice
as hot" as 10°C).
4. Ratio Data: Data with equal intervals and an absolute zero point.
Example: Height, Weight, Income, Distance, Age.
Used in all types of machine learning models, including regression.
Why is this classification important?
Helps in selecting the correct statistical tests and machine learning models.
Determines whether data scaling or encoding is needed.
Ensures the correct interpretation of results in predictive analytics.
For instance, in an e-commerce recommendation system, ordinal data like
customer ratings can be used to improve personalized product suggestions.
9. What are Bias and Variance in Machine Learning, and how do they affect
model performance?
Answer: Bias and Variance are two sources of error in machine learning models
that affect their accuracy and generalization:
1. Bias (Underfitting): Occurs when a model is too simple and cannot capture
patterns in the data.
Leads to high training and testing error.
Example: A linear regression model trying to fit complex data.
Solution: Use more complex models like Decision Trees, Neural Networks, or
Polynomial Regression.
2. Variance (Overfitting): Occurs when a model is too complex and captures noise
in training data instead of generalizing well.
Leads to low training error but high testing error.
Example: A deep neural network memorizing training data but failing on unseen
data.
Solution: Use regularization (L1, L2), cross-validation, dropout, or pruning to
simplify the model.
Bias-Variance Tradeoff:
A good model finds a balance between bias and variance, ensuring optimal
generalization on unseen data.
Techniques like cross-validation and ensemble learning (e.g., Random Forest,
Gradient Boosting) help in achieving this balance.
For instance, in fraud detection models, high variance can lead to too many false
positives, while high bias may fail to detect fraudulent transactions.

10. What is Cross-Validation, and why is it important in model evaluation?


Answer: Cross-validation is a resampling technique used to evaluate machine
learning models by splitting data into multiple subsets. This ensures that the model is
tested on different parts of the dataset, reducing the risk of overfitting. Common
Cross-Validation Techniques: 1. K-Fold Cross-Validation: Splits data into K subsets
(folds). The model is trained on K-1 folds and tested on the remaining fold. The
process repeats K times, and the average score is calculated. Example: 10-Fold
Cross-Validation means 90% training, 10% testing, repeated 10 times. 2. Stratified
K-Fold Cross-Validation: Ensures that each fold maintains the same proportion of
classes as in the original dataset. Useful for imbalanced datasets like medical
diagnosis (e.g., 95% healthy, 5% disease). 3. Leave-One-Out Cross-Validation
(LOOCV): Uses one sample for testing and the rest for training. More
computationally expensive but useful for small datasets. 4. Time Series Cross-
Validation. Used for time-dependent data where training should only use past data.
Why is Cross-Validation important?
Provides a more reliable estimate of a model's performance.
Prevents overfitting by ensuring the model generalizes well.
Reduces bias by testing on different data splits.
For example, in predicting stock prices, time series cross-validation is used to
ensure that future prices are not predicted using future data.
1. Introduction to Computer Vision
What is Computer Vision?
Computer Vision (CV) is a branch of Artificial Intelligence (AI) that enables
machines to interpret, analyze, and understand visual data (images & videos).
It helps computers to see, process, and make decisions based on images, just like
human vision.
Uses Machine Learning (ML) and Deep Learning (DL) to analyze visual inputs.
Why is Computer Vision Important?
Automates tasks that require human vision.
Helps in image classification, object detection, and facial recognition.
Used in healthcare, security, self-driving cars, and robotics.
2. Applications of Computer Vision
1. Facial Recognition
Used in security systems, unlocking phones, and surveillance cameras.
Example: Face ID on iPhones verifies identity using facial features.
2. Self-Driving Cars
AI detects pedestrians, road signs, and vehicles to navigate safely.

Example: Tesla’s Autopilot system processes live camera feeds for automatic
driving.
3. Medical Imaging
AI analyzes X-rays, MRIs, and CT scans for disease detection.
Example: AI detects tumors in brain scans faster than doctors.
4. Retail Industry
Tracks customer movement, stock availability, and theft prevention.
Example: Amazon Go stores use cameras for automatic checkout (cashier-less
stores).
5. Google Translate Camera
Uses Optical Character Recognition (OCR) to read and translate text from images.
Example: Translating a restaurant menu from Chinese to English.

3. Key Tasks in Computer Vision


1. Image Classification – Identifies objects in images and assigns labels (e.g., cat or
dog).
2. Image Classification with Localization – Identifies the object’s position in an
image.
3. Object Detection – Detects multiple objects in a single image.
4. Instance Segmentation – Assigns a label to each pixel (precise object
boundaries).
Example: In a self-driving car, AI detects people, vehicles, and traffic signs.
4. Understanding Images & Pixels
What is a Pixel?
Pixel (Picture Element) is the smallest unit of an image.
Each pixel has a color and brightness value.
Higher pixel count = better image quality (higher resolution).
Types of Images
1. Grayscale Images – Contains only shades of black and white (values between 0
to 255).
2. RGB Images – Represented using three color channels: Red, Green, and Blue.
RGB Color Representation:
Black = (0, 0, 0)
White = (255, 255, 255)
Red = (255, 0, 0), Green = (0, 255, 0), Blue = (0, 0, 255)
5. Image Features in Computer Vision
When analyzing an image, AI focuses on important visual elements:
Edges – Sharp transitions between colors or brightness. Helps in object recognition.
Corners – Intersection points of two edges. Used in 3D object detection.
Blobs – Regions with similar color intensity. Used in medical image processing.
Example: AI detects edges of license plates for automatic number plate recognition.

6. Introduction to OpenCV
What is OpenCV?
Open Source Computer Vision (OpenCV) is a widely used library for image
processing.
It allows computers to read, process, and modify images in AI applications.
Used for facial recognition, object detection, and noise removal.
Installing OpenCV in Python
To install OpenCV, run:
pip install opencv-python
Common OpenCV Functions
cv2.imread() – Reads an image.
cv2.imshow() – Displays an image.
cv2.cvtColor() – Converts an image to grayscale or other color spaces.

7. Convolution (Image Filtering Process)


What is Convolution?
Convolution is a technique where an image is modified using a small filter (kernel).
Helps in edge detection, blurring, and noise removal.
Kernel in Image Processing
A small matrix that moves across an image and modifies pixel values.
Used for sharpening, blurring, and detecting features.
Example: In CCTV surveillance, AI sharpens blurry footage to detect criminals.
8. Convolutional Neural Networks (CNNs)
What is CNN?
Convolutional Neural Networks (CNNs) are deep learning models used for image
recognition.
CNNs automatically extract important image features.
Layers of CNN:
1. Convolution Layer – Extracts image features (edges, colors, textures).
2. ReLU (Rectified Linear Unit) Layer – Introduces non-linearity to improve
learning.
3. Pooling Layer – Reduces image size while preserving important features.
4. Fully Connected Layer – Converts extracted features into a final prediction (e.g.,
classification).
Example: AI in Instagram filters detects facial landmarks using CNNs.

9. Pooling Layer (Image Size Reduction)


Reduces the dimensions of an image while preserving key features.
Helps in faster computation and less memory usage.
Types of Pooling:
Max Pooling – Takes the highest pixel value in a region (best for feature
extraction).
Average Pooling – Takes the average pixel value in a region.
Example: AI compresses high-resolution satellite images while keeping key details.

10. Fully Connected Layer (Final Decision Making)


Converts the extracted image features into final class probabilities.
Determines the final classification (e.g., whether an image contains a cat or dog).
Example: AI classifies X-ray images into normal vs. diseased lungs.

Top 5 MCQ
1. Which of the following is NOT an application of Computer Vision? a) Facial
Recognition b) Speech Recognition c) Object Detection d) Medical Imaging Answer:
b) Speech Recognition 2. What is the primary function of a Convolutional Neural
Network (CNN) in Computer Vision? a) Text Analysis
b) Image Processing and Pattern Recognition
c) Speech Recognition
d) Language Translation
Answer: b) Image Processing and Pattern Recognition
3. Which algorithm is commonly used for object detection in Computer Vision?
a) YOLO (You Only Look Once)
b) Naïve Bayes
c) K-Means Clustering
d) Decision Trees
Answer: a) YOLO (You Only Look Once)
4. What is the purpose of the pooling layer in a CNN?
a) To reduce the dimensions of feature maps
b) To increase the image resolution
c) To convert images into grayscale
d) To store raw pixel values
Answer: a) To reduce the dimensions of feature maps
5. Which of the following libraries is widely used for Computer Vision tasks?
a) TensorFlow
b) Pandas
c) Matplotlib
d) NumPy
Answer: a) TensorFlow

Top 10 Questions
1. What is Computer Vision? Answer : Computer Vision is a field of Artificial
Intelligence (AI) that enables computers to interpret, analyze, and understand visual
data such as images and videos. It mimics human vision by identifying patterns and
extracting meaningful information from visual inputs. It is widely used in various
industries, including healthcare, security, automotive, and retail. 2. What are the
key applications of Computer Vision? Answer : Computer Vision has numerous
real-world applications, including:

Facial Recognition – Used in security systems and social media platforms.


Autonomous Vehicles – Helps self-driving cars detect pedestrians, lanes, and
other vehicles.
Medical Image Analysis – Used for detecting diseases in X-rays, MRIs, and CT
scans.
Medical Image Analysis – Used for detecting diseases in X-rays, MRIs, and CT
scans.
Object Detection – Identifies objects in images or videos, used in surveillance
and retail.
Augmented Reality (AR) – Enhances the real-world experience in gaming,
shopping, and education.

3. What is the role of Machine Learning in Computer Vision?


Answer : Machine Learning (ML) plays a crucial role in improving the accuracy
and efficiency of Computer Vision tasks. ML models, especially Deep Learning
models like Convolutional Neural Networks (CNNs), learn from large datasets of
images and videos to recognize objects, patterns, and text automatically. Examples
include:
Image Classification – Identifying objects in an image.
Facial Recognition – Learning features to distinguish between faces.
Object Detection – Locating objects within an image.

4. What are Convolutional Neural Networks (CNNs) in Computer Vision?


Answer : CNNs are deep learning models specifically designed to process image
data. They consist of multiple layers, including:
Convolutional Layers – Extract features from the input image.
Pooling Layers – Reduce the dimensions of the image while preserving
important features.
Fully Connected Layers – Perform classification based on extracted features.
CNNs are widely used for tasks like face recognition, image segmentation, and
autonomous driving.

5. What is Image Segmentation in Computer Vision?


Answer : Image Segmentation is the process of dividing an image into multiple
segments to make it easier to analyze. It is used in:
Medical Imaging – Detecting tumors and abnormalities in scans.
Autonomous Vehicles – Identifying lanes, road signs, and obstacles.
Object Detection – Locating and differentiating between multiple objects in an
image.
Segmentation can be semantic segmentation (classifying pixels into categories) or
instance segmentation (detecting individual objects separately).

6. What is the difference between Object Detection and Object Recognition?


Answer : Object Detection – Identifies and locates multiple objects in an image.
Example: Detecting cars and pedestrians in a traffic scene.
Object Recognition – Classifies objects based on their type. Example: Recognizing a
specific brand of car in an image.
While Object Detection finds objects, Object Recognition goes further by identifying
what they are.
7. How does Optical Character Recognition (OCR) work in Computer Vision?
Answer : OCR is a technology that converts images of text (handwritten, printed,
or scanned) into machine-readable text. It works in the following steps:
1. Preprocessing – Enhancing image quality (removing noise, adjusting brightness).
2. Text Detection – Identifying the text regions in an image.
3. Character Recognition – Using AI models to recognize letters and words.
4. Post-processing – Refining the extracted text for accuracy.
OCR is used in document digitization, number plate recognition, and handwritten
text conversion.
8. What are some challenges in Computer Vision?
Answer : Despite advancements, Computer Vision faces several challenges,
including:

Lighting Variations – Poor lighting conditions affect image clarity.


Occlusion – Objects being partially hidden or blocked.
Different Viewing Angles – Objects appear different from various perspectives.
Real-time Processing – Analyzing large amounts of image/video data quickly.
Bias in AI Models – Models trained on biased datasets may perform poorly in
diverse scenarios.

9. What is Edge Detection in Computer Vision?


Answer : Edge Detection is a technique used to identify object boundaries within an
image. It highlights areas where there are sharp changes in brightness or color.
Common methods include:
Sobel Operator – Detects edges in an image using derivatives.
Canny Edge Detection – A multi-step algorithm for accurate edge detection.
Edge Detection is used in medical imaging, robotics, and industrial quality control.

10. What is the role of OpenCV in Computer Vision?


Answer : OpenCV (Open Source Computer Vision Library) is a popular open-source
library that provides tools for image and video processing. It includes functionalities
for:
Image Filtering – Enhancing image quality.
Face Detection – Recognizing faces in real time.
Object Tracking – Monitoring objects in video streams.
Motion Detection – Detecting movements in security cameras.
It is widely used in AI research, robotics, and software development.
1. Introduction to NLP
Definition: NLP is a field of Artificial Intelligence (AI) that enables computers to
understand, interpret, and generate human language.
Goal: To bridge the gap between human communication and machine
understanding.
Example: When you ask Siri or Google Assistant a question, NLP helps them
process your request and respond.
2. Key Components of NLP
NLP has two main subfields:
(A) Natural Language Understanding (NLU)
NLU focuses on enabling machines to understand text.
Tasks in NLU:

Extracting meaning from text


Identifying emotions and intent
Understanding grammar and sentence structure

(B) Natural Language Generation (NLG)


NLG focuses on helping computers generate human-like text.
Tasks in NLG:
Summarizing long texts
Generating chatbot responses
Translating text into different languages

3. Important NLP Techniques & Concepts


(A) Text Preprocessing Techniques (Used to clean and prepare text data)
1. Tokenization – Splitting text into words or sentences.
Example: "I love AI" → ["I", "love", "AI"]
2. Stemming & Lemmatization – Converting words to their base form.
Example: "Running" → "Run" (Lemmatization)
3. Stop-word Removal – Removing common words like is, the, and.
4. Named Entity Recognition (NER) – Identifying names, places, and dates.
Example: "Elon Musk founded Tesla" → ["Elon Musk" (Person), "Tesla"
(Organization)]
5. Parts of Speech Tagging (POS) – Assigning word categories (noun, verb,
adjective).
Example: "AI is amazing" → AI (Noun), is (Verb), amazing (Adjective)
(B) Advanced NLP Techniques
1. Sentiment Analysis – Detecting emotions (positive, negative, or neutral).
Example: "The movie was fantastic!" → Positive sentiment
2. Text Summarization – Creating a shorter version of a text while keeping
important information.
3. Machine Translation – Converting text from one language to another (e.g., Google
Translate).
4. Speech Recognition – Converting spoken words into text (used in voice assistants).
4. Applications of NLP
NLP is widely used in many real-world applications:
Chatbots & Virtual Assistants: (e.g., Siri, Alexa, Google Assistant)
Search Engines: Google improves search results using NLP.
Machine Translation: Google Translate translates languages automatically.
Email Spam Detection: Gmail filters spam using NLP-based keyword detection.
Text Prediction: AI suggests words while typing (e.g., SwiftKey, Grammarly).
Customer Support Automation: Companies use chatbots to answer customer
queries.
5. Challenges in NLP
Despite its advancements, NLP still faces challenges:
1. Ambiguity:
Words may have multiple meanings.
Example: "I saw a bat" (Bat: an animal or a cricket bat?).
2. Context Understanding:
Hard for AI to understand slang, sarcasm, and cultural nuances.
3. Grammar & Syntax Issues:
NLP struggles with grammatical errors and poorly structured sentences.
4. Bias in AI Models:
AI can learn biased or unfair patterns from training data.
6. Ethical Concerns in NLP
As AI becomes more advanced, ethical concerns arise:
1. Data Privacy:
AI collects and processes user data (e.g., chatbots, voice assistants).
User data must be protected from misuse.
2. Bias in AI Models:
AI may favor certain languages, dialects, or opinions unfairly.
3. Fake News & Misinformation:
NLP-generated content can be misused to spread misinformation.
7. NLP in AI Project Cycle
In AI-based projects, NLP follows these steps:
1. Problem Scoping: Identifying the NLP problem (e.g., chatbot development).
2. Data Collection: Gathering text or speech data for training.
3. Data Preprocessing: Cleaning text (removing punctuation, stop-words, etc.).
4. Model Building: Training AI models to process text.
5. Evaluation & Deployment: Testing and improving NLP accuracy.
8. Future of NLP
Conversational AI: More advanced AI chatbots and virtual assistants.
Improved Machine Translation: More accurate real-time translation.
Emotion AI: AI detecting human emotions more accurately.
Top 5 MCQ
1. Which of the following is an application of NLP?
a) Image Recognition
b) Speech Recognition
c) Circuit Design
d) Video Editing
Answer: (b) Speech Recognition
2. What is the main purpose of Tokenization in NLP?
a) Convert speech into text
b) Convert text into structured data
c) Break text into words or sentences
d) Remove punctuation from text
Answer: (c) Break text into words or sentences
3. Which component of NLP helps in identifying names of people, places, and
organizations?

a) Tokenization
b) Named Entity Recognition
c) Sentiment Analysis
d) Stemming
Answer: (b) Named Entity Recognition
4. Which of the following is an example of a Stop Word?
a) Artificial
b) Intelligence
c) The
d) Learning
Answer: (c) The
5. Which technique is used to analyze if a customer review is positive or
negative?
a) Named Entity Recognition
b) Sentiment Analysis
c) Stemming
d) Parsing
Answer: (b) Sentiment Analysis
Top 10 Questions
1. What is Natural Language Processing (NLP)? Answer: Natural Language
Processing (NLP) is a subfield of Artificial Intelligence (AI) that focuses on the
interaction between humans and computers using natural language. It enables
machines to read, interpret, and generate human language. Examples of NLP
Applications:
Chatbots (e.g., ChatGPT, Google Assistant, Alexa, Siri)
Language Translation (e.g., Google Translate, Microsoft Translator)
Spam Detection (e.g., Filtering spam emails)
Sentiment Analysis (e.g., Analyzing customer reviews)
Speech Recognition (e.g., Voice-to-text software like Dragon NaturallySpeaking)

2. What are the key components of NLP?


Answer: NLP consists of several sub-components that help machines process and
analyze text efficiently.
1. Tokenization: Splits text into individual words or sentences.
Example: "Natural Language Processing is amazing!" → ['Natural', 'Language',
'Processing', 'is', 'amazing', '!']
2. Stemming and Lemmatization: Reduces words to their base/root form.
Stemming Example: "Running", "Runner" → "Run"
Lemmatization Example: "Better" → "Good", "Went" → "Go"
3. Part-of-Speech (POS) Tagging:
Identifies words as nouns, verbs, adjectives, etc.
Example: "The dog (Noun) runs (Verb) fast."
4. Named Entity Recognition (NER): Identifies proper nouns, locations,
organizations, etc.
Example: "Apple Inc. was founded by Steve Jobs in California in 1976."
Apple Inc. → Company
Steve Jobs → Person
California → Location
1976 → Year
5. Parsing (Syntax Analysis): Analyzes sentence structure to understand grammar.
Example: "John eats an apple."
Subject: John
Verb: Eats
Object: Apple
6. Sentiment Analysis: Detects emotions (positive, negative, neutral).
Example: "I love this phone!" → Positive
"This product is terrible!" → Negative
3. What is Tokenization in NLP?
Answer: Tokenization is the process of breaking text into smaller meaningful units
called tokens. Tokens can be words, phrases, or sentences.
Example of Tokenization:
Sentence Tokenization:
Input: "I love AI. It is the future!"
Output: ["I love AI.", "It is the future!"]
Word Tokenization:
Input: "AI is revolutionizing technology."
Output: ['AI', 'is', 'revolutionizing', 'technology', '.']
4. What is the difference between Stemming and Lemmatization?
Answer:

Features Stemming Lemmatization

Reduces words to root Converts words to


Definition form by removing dicionary based root
suffixes. form.

"Running"-"Run", "Running"-"Run",
Example
"Caring"-"Car" "Caring"-"Car"

Accuracy Less Accurate More Accurate

Method Used Uses linguistic knowledge

Example: Word: "Better"


Stemming: "Better" → "Bett" (Incorrect)
Lemmatization: "Better" → "Good" (Correct)
5. What are Stop Words in NLP?
Answer: Stop words are common words that do not carry significant meaning and
are usually removed from text processing.
Examples of Stop Words: "is," "the," "and," "to," "in," "of," "at," "on," "for"
Example Before and After Stop Word Removal:
Before: "The quick brown fox jumps over the lazy dog."
After Stop Word Removal: "quick brown fox jumps lazy dog."
6. Explain the role of Named Entity Recognition (NER).
Answer: Named Entity Recognition (NER) is an NLP technique that identifies
proper nouns such as people, places, dates, and organizations in text.
Example of NER: Input: "Elon Musk founded SpaceX in 2002 in California."
Output: Elon Musk → Person

SpaceX → Organization
2002 → Year
California → Location
7. What is Sentiment Analysis in NLP?
Answer: Sentiment analysis determines whether a text expresses positive, negative,
or neutral emotions.
Example of Sentiment Analysis:
"This movie was amazing!" → Positive
"The food was terrible." → Negative
"The book was okay." → Neutral
Applications of Sentiment Analysis:
Analyzing customer reviews
Monitoring social media trends
Measuring public opinion
8. What is a Bag of Words (BoW) model in NLP?
Answer: BoW represents text as a collection of word frequencies, ignoring
grammar and word order.

Words Sentence 1 Sentence 2

I 1 0

Love 1 1

AI 1 1

is 0 1

Example of BoW: Sentences:


1. "I love AI."
2. "AI is love."
BoW Representation:
Both sentences will be considered similar because they contain the same words,
even though the order is different.
9. What is the difference between Rule-Based and Machine Learning-Based
NLP?
Answer:

Feature Rule-Based NLP Machine Learning-Based

Definition Uses predefined language rules Uses ML models trained on data.

Example Grammar-based chatbots Smart assistants like Siri, Akexa

Flexibility Rigid and limited Learns and improves over time

Usage Used in simple automation Used in advanced NLP tasks.


10. What are the challenges in NLP?
Answer: NLP faces several challenges, including:
Ambiguity: Words having multiple meanings (e.g., "bat" → an animal or a cricket
bat).
Sarcasm Detection: Difficult to detect sarcasm (e.g., "Oh great, another traffic
jam!").
Low-Resource Languages: Less NLP research for regional languages.
Context Understanding: Words change meaning based on context (e.g., "bank" →
financial institution or riverbank).
1. What is Evaluation?
Evaluation is the process of testing an AI model to measure its accuracy, reliability,
and effectiveness. It helps determine whether the model makes correct predictions
and meets performance expectations. Why is Evaluation Important? Ensures the AI
model functions correctly and makes accurate predictions. Identifies errors and
weaknesses in the model’s predictions. Helps compare multiple models to choose the
most efficient one. Prevents biases and unfair decision-making in AI systems. Ensures
AI systems work well before deployment in real-world applications.
2. Key Terminologies in Model Evaluation
Understanding these terms helps analyze an AI model’s performance:

True Positive (TP): The model correctly predicts a positive case.


Example: A spam filter correctly identifies a spam email.
True Negative (TN): The model correctly predicts anegative case.
Example: A medical AI correctly predicts that a person does not have a disease.
False Positive (FP): The model incorrectly predicts a positive case (Type I
Error).
Example: A spam filter marks a normal email as spam.
False Negative (FN): The model incorrectly predicts a negative case (Type II
Error).
Example: A medical AI fails to detect a disease in a patient who actually has it.
Confusion Matrix: A table comparing actual and predicted values, helping to
understand model performance.

3. Evaluation Metrics (Performance Measures)


Different metrics help measure how well an AI model performs:
1. Accuracy:
Measures the proportion of correct predictions out of total predictions.
Formula: (TP + TN) / (TP + TN + FP + FN).
Higher accuracy means the model is performing well, but it can be misleading if
data is imbalanced.
Example: If a model correctly predicts 95 out of 100 cases, its accuracy is 95%.
2. Precision:
Measures how many of the predicted positive cases were actually correct.
Formula: TP / (TP + FP).
Useful when false positives are costly (e.g., fraud detection).
Example: If a model identifies 50 transactions as fraudulent but only 45 are
actually fraud, the precision is 90%.
4. F1-Score: A balance between Precision and Recall. Formula: 2 × (Precision ×
Recall) / (Precision + Recall). Useful when there is an imbalance between positive
and negative cases. Example: If Precision is 90% and Recall is 83.3%, the F1-Score is
86.5%.
4. Choosing the Right Evaluation Metric
Accuracy is best when both false positives and false negatives have equal impact.
Precision is crucial when false positives need to be minimized (e.g., fraud detection).
Recall is critical when missing positive cases is dangerous (e.g., medical diagnoses).
F1-Score is useful when data is imbalanced, as it balances Precision and Recall.
5. Conclusion
Evaluation is essential in AI to ensure models are accurate, reliable, and effective.
By using Accuracy, Precision, Recall, and F1-Score, AI developers can improve
models and avoid errors in decision-making. A well-evaluated AI model ensures
fairness, efficiency, and trust in AI applications.
Top 5 MCQ
1. What is the main purpose of evaluation in Artificial Intelligence?
a) To increase system complexity
b) To measure the performance and accuracy of AI models
c) To replace human intelligence
d) To decrease the efficiency of AI models
Answer: b) To measure the performance and accuracy of AI models
2. Which metric is commonly used to evaluate classification models?
a) Mean Squared Error (MSE)
b) Accuracy
c) BLEU Score
d) Recall
Answer: b) Accuracy
3. What does Precision measure in an AI evaluation process?
a) The percentage of true positive predictions among all positive predictions
b) The percentage of false negative predictions
c) The total number of false positives
d) The overall dataset size

Answer: a) The percentage of true positive predictions among all positive


predictions
4. What is the role of confusion matrix in AI evaluation?
a) It is used to train the AI model
b) It visualizes the performance of a classification model
c) It generates synthetic data
d) It reduces model complexity
Answer: b) It visualizes the performance of a classification model
5. Which of the following is NOT an evaluation metric for machine learning
models?
a) F1-score
b) ROC Curve
c) Precision
d) Compilation Time
Answer: d) Compilation Time
Top 10 Questions
1. What is evaluation in Artificial Intelligence?
Answer: Evaluation in AI refers to the process of measuring and assessing the
performance of an AI model using various metrics. It helps determine the accuracy,
efficiency, and effectiveness of a model before deploying it for real-world
applications.
2. Why is evaluation important in AI?
Answer: Evaluation is important because it helps in:
Identifying errors and areas for improvement
Comparing different models for optimal performance
Ensuring fairness and reliability
Avoiding biases in AI predictions

3. What is a confusion matrix?


Answer: A confusion matrix is a table used in classification problems to summarize
the performance of a model. It includes:
True Positives (TP)
True Negatives (TN)
False Positives (FP)
False Negatives (FN)

4. Explain Precision, Recall, and F1-score. Answer: Precision: Measures the


proportion of correctly predicted positive observations to the total predicted
positives. (Formula: TP / (TP + FP)) Recall: Measures how many actual positive cases
were correctly predicted. (Formula: TP / (TP + FN)) F1-score: A harmonic mean of
Precision and Recall, balancing both. (Formula: 2 * (Precision * Recall) / (Precision +
Recall))
5. What is Accuracy, and when should it be used as an evaluation metric?
Answer: Accuracy is the ratio of correctly predicted observations to the total
observations. It is best used when the dataset is balanced (i.e., equal number of
classes in classification problems).
6. What is the difference between training accuracy and test accuracy?
Answer: Training accuracy: The accuracy of a model on the training dataset. Test
accuracy: The accuracy of a model on unseen data. A large gap between these two
indicates overfitting, where the model performs well on training data but poorly on
new data.
7. What is overfitting, and how does it affect evaluation?
Answer: Overfitting occurs when an AI model learns patterns specific to training
data but fails to generalize to new data. It results in high training accuracy but low
test accuracy. Evaluation helps detect overfitting by comparing performance on
training and test datasets.
8. What is cross-validation, and why is it used?
Answer: Cross-validation is a technique to assess a model’s performance by dividing
the dataset into multiple subsets. The model is trained
on some subsets and tested on others, reducing bias and improving generalization.
9. How does Mean Squared Error (MSE) help in evaluation?
Answer: MSE is used for regression models and calculates the average squared
difference between predicted and actual values. A lower MSE indicates a better-
performing model. (Formula: Σ(Predicted - Actual)² / n)
10. What is the ROC curve, and what does it represent?
Answer: The Receiver Operating Characteristic (ROC) curve is a graph that shows
the trade-off between True Positive Rate (Sensitivity) and False Positive Rate. A
model with a higher area under the ROC curve (AUC) is considered better at
distinguishing between classes.

You might also like