0% found this document useful (0 votes)
12 views

Artificial Intelligence Question

artifical intelga

Uploaded by

abdiwaktayu21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Artificial Intelligence Question

artifical intelga

Uploaded by

abdiwaktayu21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Artificial Intelligence Question

1, To make a machine learn and make decisions like humans do ,AI requires the
knowledge of some discipline.write down some discipline which AI requires ?
 Mathematics ---theory of graphs
Network, statistics etc.
 Economics---Theory of market,
Macro and Microeconomics,types of capital etc.
 Psychology---experimental method, cognitive property, social attitude etc.
 sociology---social interaction,
Ethical things,theory of groups,social responsibility etc.
 web engineering --- architectural, protocol, security, resilience, accessibility.

2, As use all knows , engineering is a trade off improving or enhancing in one aspect
will lead you to worsen or deteriorating in another aspect, write down some
disadvantage of Ai?
 Data problem
 Financial problem
 Emotional intelligence problem
 Human interaction problem
 require hign cost
 Increase dependency
 minimize the thinking ability of our mind etc.
3, Having said that,AI is moving our daily life more comfortable and faster indifferent
sectors. Write down some applications of AI in health, agriculture, education and
business in detail?

In Agriculture sector
1, Forecasting: In order to get high profit.
2, For monitoring: In order to detect nutrient deficiency in a soil .
3, Intelligent sensors: To minimize use of pesticides by detecting affected area.
4, Prediction: Predict the basic time to sow the seeds.
In Education sector
1 ,Data driving teaching
Personalized feedback, improving teaching effectiveness.
2, Enhancing creative thinking
Promoting collaboration in classroom and AI stimulates creativity by generating
original ideas.
3,Improve student grade
different platform provide for student by help of AI in order to maximize
effectiveness of student and get good grade.

In health sector
1, Radiology
Diagnos medical condition by analyzing scans.
2, Medical Data Analysis
Structure medical data for better understanding
3,Drug Discovery
Discover new drugs and vaccines
4, Robot Assistant Surgery
Assist doctors in surgery
5, personalized health care plan
6,dosage Errors Reduction
7,Gene editing etc.

Ethical questions
1, What's digital privacy ? What is it's importance ?
Digital privacy = refer to the protection of personal information on the internet.This
include things like your browsing history,personal data,email content,and online
transactions. It's essentially for everyone to understand the importance of maintaining
their digital privacy and to take step to protect it
There are different ways in which someone can gain unauthorized access to your
browsing history.itninclude be through phishing attacks, hacking, or using spyware or
malware.
Therefore, it's important
✓ to maintain strong,unique
Password.
✓to protect our device from
hacking attack.
✓building trust and reputation.

5, Briefly explain digital privacy principles.


✓ full functionality
✓visibility, transparency , fairness, lawfulness
✓proactive and preventative
✓full life cycle protection
✓respect for user privacy
✓accuracy =personal data must be kept accurate and up to date

6, Why we need accountability in using emerging technologies ?


• Accountability ensure that technology is developed and used in a way that aligns
with ethical standards and doesn't harm people or society
• Accountability helps stakeholders understand how technology is used and it's
potential impact.
• Accountability helps identify and reduce the risk of things like data breaches and
unintended consequences.

7, Briefly explain the challenge in using


 AI
 Robots
 Iot
AI
AI face significant challenge with algorithm bias being primary concern bias stems
from prejudiced data sets and training methods raising fairness and ethical issues in
decision making process.these concern impact area like hiring,law enforcement and
health care. expandability and accountability
Some Artificial Intelligence algorithms like deep learning neural networks,can be
coupled and difficult to interpret.
Security of AI system
AI itself can be targeted by cyber attacks,aiming to disrupt Artificial Intelligence
operations or manipulate Artificial Intelligence making decisions.
Scaling security solutions
As Artificial Intelligence is integrated into more systems, scaling cyber security
solutions to protect Artificial Intelligence component become crucial, especially when
dealing with IOT device and edge computing.
Adversial attacks
Artificial Intelligence system can be vulnerable to adversial attacks where malicious
actors manipulate input to misled Artificial Intelligence algorithms.
Example, adding imperceptible noise to an image can cause an Artificial Intelligence
powered system to misclassify it.
Data poisoning
Artificial Intelligence models heavily rely on training data if attackers inject malicious
data into the training data sets,it can lead to based Inaccurate or compromised model.
Privacy concerns
Artificial Intelligence often processes amount of data, including personal information,
maintaining data privacy and preventing unauthorized access to sensitive and data
become significant challenge.
Misuse of AI for offensive purpose
Attackers can leverage AI for offensive purpose such as, social engineering or
discovering low system vulnerability.
Challenge in IOT
Vulnerability to network attacks: Vulnerability to network attacks refer to the
susepectibility of a network, system or device to being compromised or exploited by
cyber criminal.
Lack of standardization: Lack of standardization refer to the absence of agreed-
upon specification or protocols in a particular field or industry.
Inadequate device security: Refer to the lack of proper measures to protect
electronic devices such as computers, smartphone, and IOT devices from cyber
attacks, hacking, data theft,and unauthorized access.this Can happen due to outdated
software,weak password,lack of encryption, and other security risk.
Software vulnerabilities: Software vulnerabilities are weakness or flaws in software
code that can be exploited by attackers to gain unauthorized access,steal sensetive
information,or carry out malicious activities.attackers can exploit these vulnerabilities
to gain control over a system,install malware,or steal sensetive information.
Challenge in robots.
 Robots are complex machine made of many parts and it's not just the hardware.
 Robot needs a lot of component to properly function.
 Not all robots need the same set of rules to operate.
example,a robot vacuum cleaner is subject to a different set of regulation than a
robot working in the healthcare.
 Very hard for someone to accurately predict the possible scenarios a robot is
going to be in.

8,Do you think dealing with big data demands high ethical regulations , accountability
and responsibility of the person as well as the company?
Yes, ethical regulations ensure that individual and companies are transparent about
how they collect,use and share data.
and ethical regulations are crucial for enduring that the immense power of bih data in
wielded responsibly and for the benefit of society.
Why?
Because it's essential for several reasons:
Privacy concern
Without ethical regulations there is risk of privacy breaches and misuse of the data.
Potential for discrimination
Unchecked use of big data can lead to discriminatory practice such as algorithm bias
in hiring or leading decision.
Block chain question
1, What do you think block chain is all about just begin by defining the two words
block and chain.
Block: A record of transaction and contain data like the who,what,where,when,and
how much of the transaction.
Chain: A linked list of blocks
Block-chain: It refers to a decentralized ledger of all transaction across a peer to peer
network
OR
Transparent way of sharing and transacting.
10, Do you know about Bitcoin? If your answer is yes ,is related to blockchain.
Yes, Bitcoin is related to blockchain
Bitcoin uses Blockchain technology to record transaction between users on a
decentralized network.
11, What is application of Blockchain in supply chain management, finance?
In supply chain management
 Preventing Freud
 Smart construct
 Transaction settlement
 Audit transparency
 Food safety
 Better shipping data
 Bracking social responsibility
In finance
 Better auditing
 Reduced cost
 Security and transparency
 Instant settlement.
Cyber security questions
12, Can you mention some Cyber security threats your organization face or
individually you face.
Organization
 Ransomware attacks
 Supply chain attacks
 Insider threats
 Cloud security risk
 Data breaches and privacy violation
Individually
 Mobile malware and vulnerabilities
 Identity theft
 Social engineering and phishing attacks .

13, Write down some benefits of cyber security measures.


 data protection
 Customer Trust
 Business continuity
 Competition advantage
 Reputational safeguard
 National security
 Informed decision making etc.
14, Llist down some anti virus vendors.
- Total defense - Nano
- Norton - Total Av
- Max secure - F- secure
- Bit defender - Lenovo
15, What are the security measures to be applied while using social networks? Write
your group experience.
 Use strong password
 Enable two -factor authentication
 Be careful with links
 Log off or lock our device
 Limit access privileges

You might also like