You are on page 1of 4

Artificial Intelligence Project

Ques1: Define the different stress management


techniques?
Ans: Different stress management techniques are as follows:
1) Physical Exercise: Exercise includes all activities that maintain
physical fitness and mental well-being of a person. It makes the
person active and helps to build a strong immunity.
2) Yoga: Yoga is considered to be the finest legacy of the Indian
culture. It is practiced for self-development, enlightenment of the
soul, and spiritual growth.
3) Meditation: Meditation has been a part of our tradition for
thousands of years. It is a way of bringing positivity into one's life
and helps to restore calm and peace in our life. Regular practice of
meditation reduces stress, anxiety, and depression. It is a natural
and inexpensive way that provides immunity to stress.
4) Vacations with Friends and Family: Breaks from our hectic daily
schedules and spending holidays with friends and family can be a
refreshing experience which can help in relieving stress. Pursuing
leisure activities or hobbies can also help you de-stress. One is
able to d social relations, admire nature's beauty, and break the
monotonousness of life.
5) Taking Nature Walks: We must regularly take some time out of
our busy schedule to appreciate nature's beauty. The fluttering of
leave sound of water flowing, soft breeze, brightly-coloured
blossoms-all have a calming effect on our minds.
Ques2: What is self-motivation ? Define it’s
different types.
Ans: Self-motivation drives a person to attempt and accomplish tasks.
It occurs when a person independently more strategies to keep himself
on track towards achieving a goal.
There are two types of self-motivation:
1) Intrinsic Motivation: It refers to the behaviour of a person that is
driven by his innate desire to do something for his own sake and
personal rewards. Example, your desire to learn a skill because you are
eager to learn.
2) Extrinsic Motivation: It refers to the behaviour of a person that is
driven by the desire to attain some sort of an external reward,
including money, power, and good grades

Ques3: Define the different functions of an


operating system?
Ans: Different functions of an operating system are as follows:
• Processor Management: An operating system manages the
working of a processor by allocating various jobs to it. It also
ensures that each process and application receives enough time
by the processor to function properly.
• Memory Management: An operating system manages the sharing
of the internal memory (RAM, Cache, etc.) among the multiple
applications to ensure the proper execution of every process.
• Device Management: An operating system controls the working of
all the input and output (I/O) devices. It receives the requests
from these devices, performs the specific tasks, and
communicates back to the requesting processes.
• File Management: An operating system keeps a track of the
information regarding the creation, deletion, transfer, copy, and
storage of files in an organised way. It also maintains the integrity
of the data stored in these files; including the directory structure.
• Security: An operating system provides various techniques that
ensure the integrity and confidentiality of the user’s data. It is
done using the username, password, and firewalls.
• Error Detection: An operating system checks the system from
time-to-time for any kind of external threat or malicious software
activity. It also checks the hardware for any type of damage, and
displays appropriate alerts to the users.
• Job Scheduling In a multi-tasking operating system where multiple
programs run at the same time, the operating system determines
which applications should run and in what order. It also checks
how much time should be allocated for each application.

Ques4: What is virus and what are the signs of virus


attack?
Ans: A computer virus is a program or a set of programs that disrupts
the normal operation of a computer. Virus infects or destroys the data.
It enters the computer without the permission or knowledge of the
user. Normally, it enters through infected storage devices, like CO, pen
drives, etc. Virus can also enter into a computer while surfing the
internet. To avoid detection, they are secretly hidden. Virus programs
can remain undetected and inactive for a long period of time, waiting
for a particular signal or an event to trigger them. For example, some
virus programs monitor the clock in the host computer and trigger on a
certain day, like Friday the 13th.
Signs of a virus attacks are as follows :-
• It reduces the speed of a computer by decreasing the memory.
• It causes strange movements or patterns on the screen.
• It displays unusual messages like "Your PC is stoned", etc.
• It increases the use of the disk space and growth in file size as the
virus attaches itself to many files.
• It leads to frequent hanging of the system.
• It shows abnormal 'write protect error'.
• It displays a change in data against the filename in the directory,
when a virus modifies the file.
• It reformats the hard disk.
• It deletes or damages the files.

Ques5: What is A.I Project Cycle?


Ans: Al systems can improve themselves over time. It means that
they require correcting or updating with new information coming in,
and the Al system keeps on learning with each new piece of
information. This unique feature implies that the Al Project Cycle
planning is different from the beginning in different are such as
budgeting and planning.
An Al Project Cycle has various phases and sub-phases. Different
specialists view these subdivisions differently, but the overall
categorisation remains almost the same.

You might also like