SlideShare ist ein Scribd-Unternehmen logo
1 von 86
Semi Final
Instructor: Mark John P. Lado
Introduction to Security and Privacy
Introduction to Operating System
Introduction to Artificial Intelligence
Introduction to Security and Privacy
Introduction to Operating System
Introduction to Artificial Intelligence
 Distinguish the importance of cryptography.
 Analyze decoding and encoding.
 Engage in different Operating System.
 Evaluate the role of Operating System in a device.
 Know about Artificial Intelligence.
 Identify the different types of Artificial Intelligence.
Define security in computer studies.
In computer studies, why we need to be
secure?
Cryptography
Cryptography – the art of writing or
solving codes.
Encryption
Decryption
Encryption – is the process of encoding
a message in such a way that only
authorized parties can access it.
Decryption – is the process of
conversion of encrypted data into its
original form.
Cipher (cypher)
Cipher (cypher) – a secret or
disguised way of writing.
Cipher (cypher) – an algorithm
for performing encryption or
decryption.
Caesar Cipher
Caesar Cipher – is one of the earliest
known and simplest ciphers. It is a
type of substitution cipher in which
each letter in the plaintext is shifted a
certain number of places down the
alphabet.
Caesar Cipher
(Shift of 3)
How to encrypt using Caesar cipher
which is shifted of 3?
Simply take the alphabet and look 3 letters
after.
How to decrypt Caesar cipher code
which is shifted of 3?
Simply take the alphabet and look 3 letters
before.
Decrypt Caesar cipher code which is
shifted of 3
(PDUN)
 Decrypt Caesar cipher code which is shifted of 3
1. EXZDQ
2. QJ
3. ZLND
4. VLJODNDV
5. VSRUWV
 Encrypt Caesar cipher code which is shifted of 3
1. Cryptograph
2. Security
3. Privacy
4. Computing
5. Introduction
 An operating system acts as an intermediary between the
user of a computer and computer hardware. The purpose of
an operating system is to provide an environment in which a
user can execute programs in a convenient and efficient
manner.
 An operating system is software that manages the
computer hardware. The hardware must provide
appropriate mechanisms to ensure the correct operation of
the computer system and to prevent user programs from
interfering with the proper operation of the system.
 An operating system is a program that controls
the execution of application programs and acts
as an interface between the user of a computer
and the computer hardware.
 A more common definition is that the operating
system is the one program running at all times
on the computer (usually called the kernel), with
all else being application programs.
 An operating system is concerned with the
allocation of resources and services, such as
memory, processors, devices, and information.
The operating system correspondingly includes
programs to manage these resources, such as a
traffic controller, a scheduler, memory
management module, I/O programs, and a file
system.
Operating system performs three functions:
 Convenience: An OS makes a computer more
convenient to use.
Operating system performs three functions:
 Efficiency: An OS allows the computer system
resources to be used in an efficient manner.
Operating system performs three functions:
 Ability to Evolve: An OS should be constructed
in such a way as to permit the effective
development, testing and introduction of new
system functions without at the same time
interfering with service.
1. User
2. Application programs
3. Operating system
4. Hardware
Every general-purpose computer consists of the
hardware, operating system, system programs, and
application programs. The hardware consists of
memory, CPU, ALU, and I/O devices, peripheral device,
and storage device. System program consists of
compilers, loaders, editors, OS, etc. The application
program consists of business programs, database
programs.
Every computer must have an operating system to run
other programs. The operating system coordinates the
use of the hardware among the various system
programs and application programs for various users. It
simply provides an environment within which other
programs can do useful work.
The operating system is a set of special programs that
run on a computer system that allows it to work
properly. It performs basic tasks such as recognizing
input from the keyboard, keeping track of files and
directories on the disk, sending output to the display
screen and controlling peripheral devices.
 It controls the allocation and use of the computing
System’s resources among the various user and tasks.
 It provides an interface between the computer
hardware and the programmer that simplifies and
makes feasible for coding, creation, debugging of
application programs.
The task are:
 Provides the facilities to create, modification of
programs and data files using an editor.
 Access to the compiler for translating the user
program from high level language to machine
language.
The task are:
 Provide a loader program to move the compiled
program code to the computer’s memory for
execution.
 Provide routines that handle the details of I/O
programming.
 The module that keeps track of the status of
devices is called the I/O traffic controller. Each
I/O device has a device handler that resides in a
separate process associated with that device.
The I/O subsystem consists of
1. A memory Management component that includes
buffering caching and spooling.
2. A general device driver interface.
3. Drivers for specific hardware devices.
 The input to an assembler is an assembly language program.
The output is an object program plus information that
enables the loader to prepare the object program for
execution. At one time, the computer programmer had at
his disposal a basic machine that interpreted, through
hardware, certain fundamental instructions. He would
program this computer by writing a series of ones and Zeros
(Machine language), place them into the memory of the
machine.
 The High-level languages- examples are JAVA, C/C++, Dev-
C++, C#, Ruby and Python are processed by compilers and
interpreters. A compiler is a program that accepts a source
program in a “high-level language “and produces a
corresponding object program. An interpreter is a program
that appears to execute a source program as if it was
machine language.
 A Loader is a routine that loads an object
program and prepares it for execution. There are
various loading schemes: absolute, relocating
and direct-linking. In general, the loader must
load, relocate and link the object program.
 The loader is a program that places programs
into memory and prepares them for execution.
In a simple loading scheme, the assembler
outputs the machine language translation of a
program on a secondary device and a loader
places it in the core.
 The loader places into memory the machine
language version of the user’s program and
transfers control to it. Since the loader
program is much smaller than the
assembler, those make more core available
to the user’s program.
1. Batch Operating System
2. Time sharing operating System
3. Distributed operating System
4. Network operating system
5. Real time operating system
Batch Operating System
Sequence of jobs in a program on a
computer without manual interventions.
Time sharing operating System
Allows many users to share the computer
resources.(Max utilization of the
resources).
Distributed operating System
Manages a group of different computers
and make appear to be a single
computer.
Network operating system
Computers running in different operating
system can participate in common
network (It is used for security purpose).
 Real time operating system
Meant applications to fix the deadlines. An
operating system (OS) intended to serve
real-time applications that process data as it
comes in, typically without buffer delays.
 Windows (GUI based, PC)
 GNU/Linux (Personal,Workstations, ISP, File and print
server,Three-tier client/Server)
 macOS (Macintosh), used for Apple’s personal computers
and work stations (MacBook, iMac).
 Android (Google’s Operating System for smartphones /
tablets / smart watches)
 iOS (Apple’s OS for iPhone, iPad and iPodTouch)
1. Give at least five tasks of Operating System
2. Draw the conceptual view of a computer
system
3. Give the three functions of Operating system
4. Give the five types of Operating System
5. Give the five examples of Operating System
Distinguish assembler in
computing.
Elaborate compiler in
computing.
Give a concise dialog about
loader in computing.
 In today's world, technology is growing very
fast, and we are getting in touch with different
new technologies day by day.
 Here, one of the booming technologies of
computer science is Artificial Intelligence which
is ready to create a new revolution in the world
by making intelligent machines.
 The Artificial Intelligence is now all around us. It
is currently working with a variety of subfields,
ranging from general to specific, such as self-
driving cars, playing chess, proving theorems,
playing music, Painting, etc.
 A.I. is one of the fascinating and universal fields
of Computer science which has a great scope in
future. A.I. holds a tendency to cause a machine
to work as a human.
 Artificial Intelligence is composed of two
words Artificial and Intelligence, where
Artificial defines "man-made," and intelligence
defines "thinking power", hence AI means "a
man-made thinking power."
 "It is a branch of computer science by which we
can create intelligent machines which can
behave like a human, think like humans, and
able to make decisions."
 Artificial Intelligence exists when a machine can
have human based skills such as learning,
reasoning, and solving problems
 With Artificial Intelligence you do not need to
preprogram a machine to do some work,
despite that you can create a machine with
programmed algorithms which can work with
own intelligence, and that is the awesomeness
of A.I.
Why Artificial Intelligence?
 Before Learning about Artificial Intelligence, we
should know that what is the importance of A.I.
and why should we learn it. Following are some
main reasons to learn about A.I.:
 With the help of A.I., you can create such
software or devices which can solve real-world
problems very easily and with accuracy such as
health issues, marketing, traffic issues, etc.
 With the help of A.I., you can create your
personal virtual Assistant, such as Cortana,
Google Assistant, Siri, etc.
 With the help of A.I., you can build such Robots
which can work in an environment where
survival of humans can be at risk.
 A.I. opens a path for other new technologies,
new devices, and new Opportunities.
Following are the main goals of Artificial
Intelligence:
 Replicate human intelligence
 Solve Knowledge-intensive tasks
 An intelligent connection of perception and
action
Following are the main goals of Artificial
Intelligence:
 Building a machine which can perform tasks that requires
human intelligence such as:
 Proving a theorem
 Playing chess
 Plan some surgical operation
 Driving a car in traffic
Following are the main goals of Artificial
Intelligence:
 Creating some system which can exhibit
intelligent behavior, learn new things by itself,
demonstrate, explain, and can advise to its user.
What Comprises to
Artificial Intelligence?
 Artificial Intelligence is not just a part of computer
science even it's so vast and requires lots of other
factors which can contribute to it. To create the A.I.
first we should know that how intelligence is
composed, so the Intelligence is an intangible part
of our brain which is a combination of Reasoning,
learning, problem-solving perception, language
understanding, etc.
 To achieve the above factors for a machine or
software Artificial Intelligence requires the
following discipline:
 Mathematics
 Biology
 Psychology
 To achieve the above factors for a machine or
software Artificial Intelligence requires the
following discipline:
 Sociology
 Computer Science
 Neurons Study
 Statistics
What is the impact of
Artificial Intelligence in
todays era?
Assignment
 Advantages of Artificial Intelligence
 Disadvantages of Artificial Intelligence

Weitere ähnliche Inhalte

Was ist angesagt?

Office support system and application software
Office support system and application software Office support system and application software
Office support system and application software sagheerue
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course IntroKaushik Panta
 
information of system technology
information of system technologyinformation of system technology
information of system technologybilal anjum
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspaceCBAKhan
 
Office automation system
Office automation systemOffice automation system
Office automation systemARUNAYESUDAS
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)Amber Bhaumik
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud ComputingRaymond Gao
 
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...Sreedevi Santhosh
 
XML and Societal Impacts Of IT
XML and Societal Impacts Of ITXML and Societal Impacts Of IT
XML and Societal Impacts Of ITSagar Kalra
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information SystemsThomas Mon
 
01 introduction to information technology
01 introduction to information technology01 introduction to information technology
01 introduction to information technologyDinesh Gunathilaka
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMSaraswathiRamalingam
 

Was ist angesagt? (20)

Office support system and application software
Office support system and application software Office support system and application software
Office support system and application software
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspace
 
Office automation system
Office automation systemOffice automation system
Office automation system
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
 
Ch02
Ch02Ch02
Ch02
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
 
XML and Societal Impacts Of IT
XML and Societal Impacts Of ITXML and Societal Impacts Of IT
XML and Societal Impacts Of IT
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information Systems
 
01 introduction to information technology
01 introduction to information technology01 introduction to information technology
01 introduction to information technology
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
 
TAMUC LO 1
TAMUC LO 1TAMUC LO 1
TAMUC LO 1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 05 pertemuan 7- donpas - manajemen data
Chapter 05 pertemuan 7- donpas - manajemen dataChapter 05 pertemuan 7- donpas - manajemen data
Chapter 05 pertemuan 7- donpas - manajemen data
 

Ähnlich wie Security Privacy Operating System and Artificial Intelligence

Operating system
Operating systemOperating system
Operating systemIbrahim MH
 
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfAERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfssuserb3a23b
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC4044uday
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)SURBHI SAROHA
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.DevarajuBn
 
NE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptNE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptMemMem25
 
Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
operating systems By ZAK
operating systems By ZAKoperating systems By ZAK
operating systems By ZAKTabsheer Hasan
 
Computer Programs & System Softwares
Computer Programs & System SoftwaresComputer Programs & System Softwares
Computer Programs & System SoftwaresAbijah Naresh Jumani
 
Computer system soft ware
Computer system soft wareComputer system soft ware
Computer system soft wareSamuel Igbanogu
 
Computer Notes
Computer NotesComputer Notes
Computer NotesEHSAN KHAN
 
please answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdfplease answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdfarishaenterprises12
 
Computer system organization unit i chapter 1
Computer system organization unit   i chapter 1Computer system organization unit   i chapter 1
Computer system organization unit i chapter 1vinodchand10
 

Ähnlich wie Security Privacy Operating System and Artificial Intelligence (20)

Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
e.pdf
e.pdfe.pdf
e.pdf
 
Operating system
Operating systemOperating system
Operating system
 
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfAERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
 
System Software
System SoftwareSystem Software
System Software
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
 
Information sheet 1
Information sheet 1Information sheet 1
Information sheet 1
 
C program full materials.pdf
C program  full materials.pdfC program  full materials.pdf
C program full materials.pdf
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.
 
NE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptNE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.ppt
 
Computer system software
Computer system softwareComputer system software
Computer system software
 
operating systems By ZAK
operating systems By ZAKoperating systems By ZAK
operating systems By ZAK
 
Computer Programs & System Softwares
Computer Programs & System SoftwaresComputer Programs & System Softwares
Computer Programs & System Softwares
 
Computer system soft ware
Computer system soft wareComputer system soft ware
Computer system soft ware
 
Computer Notes
Computer NotesComputer Notes
Computer Notes
 
please answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdfplease answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdf
 
operating system lecture notes
operating system lecture notesoperating system lecture notes
operating system lecture notes
 
Computer system organization unit i chapter 1
Computer system organization unit   i chapter 1Computer system organization unit   i chapter 1
Computer system organization unit i chapter 1
 
Computer systems
Computer systemsComputer systems
Computer systems
 

Mehr von Mark John Lado, MIT

Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Mark John Lado, MIT
 
Optimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignOptimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignMark John Lado, MIT
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfEmbedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfMark John Lado, MIT
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Mark John Lado, MIT
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...Mark John Lado, MIT
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
Dart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoDart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoMark John Lado, MIT
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...Mark John Lado, MIT
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security PoliciesMark John Lado, MIT
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoMark John Lado, MIT
 
Introduction to Networks and Programming Language
Introduction to Networks and Programming LanguageIntroduction to Networks and Programming Language
Introduction to Networks and Programming LanguageMark John Lado, MIT
 

Mehr von Mark John Lado, MIT (20)

Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
 
Optimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignOptimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology Design
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfEmbedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdf
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
Dart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoDart Programming Language by Mark John Lado
Dart Programming Language by Mark John Lado
 
What is CRUD in TPS?
What is CRUD in TPS?What is CRUD in TPS?
What is CRUD in TPS?
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 
Introduction to Networks and Programming Language
Introduction to Networks and Programming LanguageIntroduction to Networks and Programming Language
Introduction to Networks and Programming Language
 

Kürzlich hochgeladen

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Kürzlich hochgeladen (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Security Privacy Operating System and Artificial Intelligence

  • 1. Semi Final Instructor: Mark John P. Lado Introduction to Security and Privacy Introduction to Operating System Introduction to Artificial Intelligence
  • 2. Introduction to Security and Privacy Introduction to Operating System Introduction to Artificial Intelligence
  • 3.  Distinguish the importance of cryptography.  Analyze decoding and encoding.  Engage in different Operating System.  Evaluate the role of Operating System in a device.  Know about Artificial Intelligence.  Identify the different types of Artificial Intelligence.
  • 4. Define security in computer studies.
  • 5. In computer studies, why we need to be secure?
  • 7. Cryptography – the art of writing or solving codes.
  • 9. Encryption – is the process of encoding a message in such a way that only authorized parties can access it.
  • 10. Decryption – is the process of conversion of encrypted data into its original form.
  • 12. Cipher (cypher) – a secret or disguised way of writing.
  • 13. Cipher (cypher) – an algorithm for performing encryption or decryption.
  • 15. Caesar Cipher – is one of the earliest known and simplest ciphers. It is a type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet.
  • 17. How to encrypt using Caesar cipher which is shifted of 3? Simply take the alphabet and look 3 letters after.
  • 18. How to decrypt Caesar cipher code which is shifted of 3? Simply take the alphabet and look 3 letters before.
  • 19. Decrypt Caesar cipher code which is shifted of 3 (PDUN)
  • 20.  Decrypt Caesar cipher code which is shifted of 3 1. EXZDQ 2. QJ 3. ZLND 4. VLJODNDV 5. VSRUWV
  • 21.  Encrypt Caesar cipher code which is shifted of 3 1. Cryptograph 2. Security 3. Privacy 4. Computing 5. Introduction
  • 22.
  • 23.
  • 24.  An operating system acts as an intermediary between the user of a computer and computer hardware. The purpose of an operating system is to provide an environment in which a user can execute programs in a convenient and efficient manner.
  • 25.  An operating system is software that manages the computer hardware. The hardware must provide appropriate mechanisms to ensure the correct operation of the computer system and to prevent user programs from interfering with the proper operation of the system.
  • 26.  An operating system is a program that controls the execution of application programs and acts as an interface between the user of a computer and the computer hardware.
  • 27.  A more common definition is that the operating system is the one program running at all times on the computer (usually called the kernel), with all else being application programs.
  • 28.  An operating system is concerned with the allocation of resources and services, such as memory, processors, devices, and information. The operating system correspondingly includes programs to manage these resources, such as a traffic controller, a scheduler, memory management module, I/O programs, and a file system.
  • 29. Operating system performs three functions:  Convenience: An OS makes a computer more convenient to use.
  • 30. Operating system performs three functions:  Efficiency: An OS allows the computer system resources to be used in an efficient manner.
  • 31. Operating system performs three functions:  Ability to Evolve: An OS should be constructed in such a way as to permit the effective development, testing and introduction of new system functions without at the same time interfering with service.
  • 32. 1. User 2. Application programs 3. Operating system 4. Hardware
  • 33. Every general-purpose computer consists of the hardware, operating system, system programs, and application programs. The hardware consists of memory, CPU, ALU, and I/O devices, peripheral device, and storage device. System program consists of compilers, loaders, editors, OS, etc. The application program consists of business programs, database programs.
  • 34.
  • 35. Every computer must have an operating system to run other programs. The operating system coordinates the use of the hardware among the various system programs and application programs for various users. It simply provides an environment within which other programs can do useful work.
  • 36. The operating system is a set of special programs that run on a computer system that allows it to work properly. It performs basic tasks such as recognizing input from the keyboard, keeping track of files and directories on the disk, sending output to the display screen and controlling peripheral devices.
  • 37.  It controls the allocation and use of the computing System’s resources among the various user and tasks.  It provides an interface between the computer hardware and the programmer that simplifies and makes feasible for coding, creation, debugging of application programs.
  • 38. The task are:  Provides the facilities to create, modification of programs and data files using an editor.  Access to the compiler for translating the user program from high level language to machine language.
  • 39. The task are:  Provide a loader program to move the compiled program code to the computer’s memory for execution.  Provide routines that handle the details of I/O programming.
  • 40.  The module that keeps track of the status of devices is called the I/O traffic controller. Each I/O device has a device handler that resides in a separate process associated with that device.
  • 41. The I/O subsystem consists of 1. A memory Management component that includes buffering caching and spooling. 2. A general device driver interface. 3. Drivers for specific hardware devices.
  • 42.  The input to an assembler is an assembly language program. The output is an object program plus information that enables the loader to prepare the object program for execution. At one time, the computer programmer had at his disposal a basic machine that interpreted, through hardware, certain fundamental instructions. He would program this computer by writing a series of ones and Zeros (Machine language), place them into the memory of the machine.
  • 43.  The High-level languages- examples are JAVA, C/C++, Dev- C++, C#, Ruby and Python are processed by compilers and interpreters. A compiler is a program that accepts a source program in a “high-level language “and produces a corresponding object program. An interpreter is a program that appears to execute a source program as if it was machine language.
  • 44.  A Loader is a routine that loads an object program and prepares it for execution. There are various loading schemes: absolute, relocating and direct-linking. In general, the loader must load, relocate and link the object program.
  • 45.  The loader is a program that places programs into memory and prepares them for execution. In a simple loading scheme, the assembler outputs the machine language translation of a program on a secondary device and a loader places it in the core.
  • 46.  The loader places into memory the machine language version of the user’s program and transfers control to it. Since the loader program is much smaller than the assembler, those make more core available to the user’s program.
  • 47. 1. Batch Operating System 2. Time sharing operating System 3. Distributed operating System 4. Network operating system 5. Real time operating system
  • 48. Batch Operating System Sequence of jobs in a program on a computer without manual interventions.
  • 49. Time sharing operating System Allows many users to share the computer resources.(Max utilization of the resources).
  • 50. Distributed operating System Manages a group of different computers and make appear to be a single computer.
  • 51. Network operating system Computers running in different operating system can participate in common network (It is used for security purpose).
  • 52.  Real time operating system Meant applications to fix the deadlines. An operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays.
  • 53.  Windows (GUI based, PC)
  • 54.  GNU/Linux (Personal,Workstations, ISP, File and print server,Three-tier client/Server)
  • 55.  macOS (Macintosh), used for Apple’s personal computers and work stations (MacBook, iMac).
  • 56.  Android (Google’s Operating System for smartphones / tablets / smart watches)
  • 57.  iOS (Apple’s OS for iPhone, iPad and iPodTouch)
  • 58. 1. Give at least five tasks of Operating System 2. Draw the conceptual view of a computer system 3. Give the three functions of Operating system 4. Give the five types of Operating System 5. Give the five examples of Operating System
  • 61. Give a concise dialog about loader in computing.
  • 62.
  • 63.  In today's world, technology is growing very fast, and we are getting in touch with different new technologies day by day.
  • 64.  Here, one of the booming technologies of computer science is Artificial Intelligence which is ready to create a new revolution in the world by making intelligent machines.
  • 65.  The Artificial Intelligence is now all around us. It is currently working with a variety of subfields, ranging from general to specific, such as self- driving cars, playing chess, proving theorems, playing music, Painting, etc.
  • 66.  A.I. is one of the fascinating and universal fields of Computer science which has a great scope in future. A.I. holds a tendency to cause a machine to work as a human.
  • 67.  Artificial Intelligence is composed of two words Artificial and Intelligence, where Artificial defines "man-made," and intelligence defines "thinking power", hence AI means "a man-made thinking power."
  • 68.  "It is a branch of computer science by which we can create intelligent machines which can behave like a human, think like humans, and able to make decisions."
  • 69.  Artificial Intelligence exists when a machine can have human based skills such as learning, reasoning, and solving problems
  • 70.  With Artificial Intelligence you do not need to preprogram a machine to do some work, despite that you can create a machine with programmed algorithms which can work with own intelligence, and that is the awesomeness of A.I.
  • 72.  Before Learning about Artificial Intelligence, we should know that what is the importance of A.I. and why should we learn it. Following are some main reasons to learn about A.I.:
  • 73.  With the help of A.I., you can create such software or devices which can solve real-world problems very easily and with accuracy such as health issues, marketing, traffic issues, etc.
  • 74.  With the help of A.I., you can create your personal virtual Assistant, such as Cortana, Google Assistant, Siri, etc.
  • 75.  With the help of A.I., you can build such Robots which can work in an environment where survival of humans can be at risk.
  • 76.  A.I. opens a path for other new technologies, new devices, and new Opportunities.
  • 77. Following are the main goals of Artificial Intelligence:  Replicate human intelligence  Solve Knowledge-intensive tasks  An intelligent connection of perception and action
  • 78. Following are the main goals of Artificial Intelligence:  Building a machine which can perform tasks that requires human intelligence such as:  Proving a theorem  Playing chess  Plan some surgical operation  Driving a car in traffic
  • 79. Following are the main goals of Artificial Intelligence:  Creating some system which can exhibit intelligent behavior, learn new things by itself, demonstrate, explain, and can advise to its user.
  • 81.  Artificial Intelligence is not just a part of computer science even it's so vast and requires lots of other factors which can contribute to it. To create the A.I. first we should know that how intelligence is composed, so the Intelligence is an intangible part of our brain which is a combination of Reasoning, learning, problem-solving perception, language understanding, etc.
  • 82.  To achieve the above factors for a machine or software Artificial Intelligence requires the following discipline:  Mathematics  Biology  Psychology
  • 83.  To achieve the above factors for a machine or software Artificial Intelligence requires the following discipline:  Sociology  Computer Science  Neurons Study  Statistics
  • 84.
  • 85. What is the impact of Artificial Intelligence in todays era?
  • 86. Assignment  Advantages of Artificial Intelligence  Disadvantages of Artificial Intelligence