ETI Quick Revision
Unit 1) Artificial Intelligence
1) ✅ Schools among the early leaders in AI:
Dartmouth, MIT (Massachusetts Institute of Technology), and Stanford.
❌ Harvard was not there.
2) DARPA, the agency that has funded a great deal of American AI
research, is part of the Department of: Defense
3) The AI revolution was held at the 1956 Dartmouth Conference.
4) - Heuristic means the commonsense or judgmental part of problem-
solving.
- A Heuristic is a rule of thumb, strategy, trick, simplification, or any
other kind of device which drastically limits search for solutions in large
problem spaces.
- Heuristics do not guarantee optimal or any solutions.
5) The 1956 Dartmouth Conference organized by John McCarthy was a
pivotal event in AI history.
6) John McCarthy coined the term 'Artificial Intelligence' in 1956 at the
Dartmouth Conference.
7) - The field that investigates the mechanics of human intelligence is:
cognitive science
- Cognitive science related with Think like human.
8) A.M. Turing developed the Turing Test to check if a computer
shows Artificial Intelligence.
- The Turing Test was originally called the "imitation game" by its
creator, Alan Turing.
9) The first AI programming language was LISP.
10) - Artificial Intelligence is making a machine intelligent.
- The characteristics of a computer system capable of thinking,
reasoning, and learning is known as Artificial Intelligence.
- Artificial Intelligence is a branch of computer science that helps
machines find solutions to complex problems in a human-like way.
11) John McCarthy is the father of AI.
12) Artificial Intelligence has applications in Planning & Scheduling,
Game Playing, and Robotics.
13) The first widely used commercial form of AI, used in products like
microwave ovens, automobiles, and desktop PCs, is called Fuzzy
Logic.
14) In Deep Learning, the goal is for the software to use what it has
learned in one area to solve problems in other areas.
15) Computer programs that mimic the way the human brain processes
information are called Neural Networks.
16) - The Computational model should reflect how results were
obtained.
- Computational models were developed and incorporated in
machines which mimicked the functionalities of human origin.
17) Communication between man and machine is related to ELIZA.
18) - ELIZA is an early AI program that mimics conversation, especially
a psychotherapist, by rephrasing user inputs with questions. It doesn't
understand, just simulates talking.
- created in the 1960s by Joseph Weizenbaum.
19) The concept derived from the Logic level includes propositional
logic, tautology, predicate calculus, model, and temporal logic.
20) PROLOG is an AI programming language that solves problems
with a form of symbolic logic known as Predicate Calculus.
21) The Gross level contains constituents like knowledge-based systems,
heuristic search, automatic theorem proving, and multi-agent systems.
22) PROLOG, LISP, and NLP are languages of Artificial Intelligence.
23) - LISP is used for AI because it supports the implementation of
software that computes with symbols very well.
- Symbols, symbolic expressions, and computing with those are at the
core of LISP.
24) NLP (Natural Language Processing) deals with the interaction
between computers and humans using natural language.
25) The core components and constituents of AI are derived from the
Concept of Logic, Cognition, and Computation.
26) Aristotle’s theory of syllogism and Descartes and Kant’s critique of
pure reasoning made knowledge on Logic.
27) Charles Babbage and Boole demonstrated the power of
Computation Logic.
28) In the 1960s, Marvin Minsky pushed the logical formalism to
integrate reasoning with knowledge.
29) Sensing organs as input, mechanical movement organs as output,
and CNS in the brain as control and computing devices is known as the
Information Processing Paradigm of human beings.
30) Chomsky’s linguistic computational theory generated a model for
syntactic analysis through Regular Grammar.
31) Human to Machine is Program and Machine to Machine is
Hardware.
32) - Weak AI is known as Narrow AI.
- Weak AI is - The study of mental faculties through the use of mental
models implemented on a computer
33) - Narrow AI is able to perform dedicated task.
- It can’t perform multiple tasks at a time.
- Playing chess, purchasing suggestions on e-commerce sites, self-driving
cars, speech recognition, and image recognition are examples of -Narrow
AI.
34) Strong AI is - The embodiment of human intellectual capabilities
within a computer.
35) Artificial intelligence is =
-Making a Machine Intelligent.(definition)
- The embodiment of human intellectual capabilities within a
computer.(Strong AI)
- A set of computer programs that produce output that would be
considered to reflect intelligence if it were generated by
humans.(Narrow AI)
- The study of mental faculties through the use of mental models
implemented on a computer. (Weak AI)
- AI is a type of intelligence which could perform any intellectual task
with efficiency like human. (General AI)
36) - Apple siri is a good example of Narrow AI.
- IBM Watson supercomputer comes under Narrow AI.
37) - General AI is a type of intelligence which could perform any
intellectual task with efficiency like human.
- The idea behind General AI is to make a system that could be smarter
and think like a human on its own.
- The worldwide researchers are now focusing on developing machines
with General AI.
38) - Machine performing any task better than humans with cognitive
properties is known as Super AI.
- Ability to think, puzzle, make judgments, plan, learn, communication by
its own is known as Super AI.
- Super AI is hypothetical concept of AI.
39) - A Reactive machine AI system does not store memories or past
experiences for future actions.
- Reactive machines only focus on current scenarios and react to them
with the best possible action.
- IBM’s deep blue system is example of Reactive Machine.
- Google AlphaGo is an example of a Reactive machine.
40) - Limited memory AI can store past experiences or some data for
a short period of time.
- Self-driving car is the best example of Limited Memory AI.
41) - Theory of mind AI should understand human emotions, people,
and beliefs, and interact socially like humans.
42) - Self-Awareness machines will be smarter than the human mind.
- Self-Awareness machines will have their own consciousness and
sentiments.
43) - Machine learning is the autonomous acquisition of knowledge
through the use of computer programs.
- Machine learning is a branch of science that deals with programing the
systems in such a way that they automatically learn and improve with
experience.
44) Classifying email as spam, labeling webpages based on their content,
and voice recognition are examples of Supervised learning.
45) K-means, self-organizing maps, and hierarchical clustering are
examples of Unsupervised learning.
46) Deep learning is a subfield of machine learning where algorithms are
inspired by the structure and function of the brain called Artificial neural
networks.
47) Machine learning was invented by Arthur Samuel.
48) Hierarchical planning consists of successive representations of
different levels of a plan.
49) Pattern matching is an AI technique that helps computers understand
associations and relationships between objects and events.
50) Expert System is a computer program that contains the distilled
knowledge of an expert.
51) API stands for Application Programming Interface.
Unit 2) Internet of Things
1) Embedded systems are special purpose.
2)- Embedded system is an electronic system or an electro-mechanical
system.
- Built around specialized hardware,
- Always contain an operating system,
- Execution behavior may be deterministic
3) Examples of small-scale embedded systems include:
Electronic Barbie doll, Simple calculator, Electronic toy car, Washing
machine, Microwave oven, Digital camera, Toaster
4) The first recognized modern embedded system is the Apollo Guidance
Computer (AGC).
5) The first mass-produced embedded system is the Autonetics D-17.
6) The intended purpose(s) of embedded systems is/are Data collection,
Data processing, and Data communication.
7) The example of an embedded system for data communication is :
Digital camera.
8) The essential tight constraints related to the design metrics of an
embedded system are: Ability to fit on a single chip , Low power
consumption, Fast data processing for real-time operations.
9) A digital multi-meter is an example of an embedded system for
monitoring.
10) Examples of embedded systems for signal processing typically
include:
Digital Signal Processors (DSPs) used in audio, video, or
communications equipment.
Radar systems for signal processing of radio waves.
Mobile phones that process voice signals.
Hearing aids, which process audio signals to amplify sound.
11) The instruction set of a RISC (Reduced Instruction Set Computing)
processor is simple and lesser in number.
12) CISC (Complex Instruction Set Computing) processors have the
following characteristics:
The instruction set is non-orthogonal.
The number of general-purpose registers is limited.
Instructions are like macros in C language.
They use variable-length instructions.
13) The CPU (Central Processing Unit) is the main processor chip in
computers responsible for executing instructions and performing
calculations.
14) Processors used in many microcontroller products need to be low
power.
15) In microcontrollers, UART is the acronym of Universal
Asynchronous Receiver/Transmitter.
16) The architecture followed by general purpose microprocessors is
Von Neumann architecture.
17) - The architecture that involves both the volatile and the non-volatile
memory is Harvard architecture.
- provides separate buses for program and data memory
- Separate program and data memory
- supports easier instruction pipelining
- Complex architecture
18) Wi-Fi and Bluetooth are examples of wireless communication
interfaces.
19) ARM = Advanced RISC Machine.
20) the processor used by ARM7 = 32-bit RISC
21) ARM microprocessors are important for providing low cost and low
power consumption.
22) ARM processors were basically designed for mobile systems.
23) - ASIC chip is faster.
- Application-Specific Integrated Circuits
24) In microcontrollers, I2C stands for = Inter-Integrated Circuit
25) PIC microcontrollers are the smallest microcontrollers which can
be programmed to perform a large range of tasks.
26) AVR was developed in the year 1996 by ATMEL Corporation.
27) AVR = Alf-Egil Bogen and Vegard Wollan RISC microcontroller or
Advanced Virtual RISC
28) AVR microcontroller executes most of the instruction in Single
execution cycle.
29) Term "the Internet of things" was coined by Kevin Ashton.
30) Machine to Machine (M2M) communication means devices
connected in IoT communicate automatically without human involvement.
31) - "Things" in IoT refers to IoT devices.
- IoT devices may support a number of interoperable communication
protocols and communicate with other device and also with infrastructure.
32) - Interconnection of Internet and computing devices embedded in
everyday objects, enabling them to send and receive data is called
Internet of Things.
- Internet of Things is a computing concept that describes the idea of
everyday physical objects being connected to the internet.
- Elements of Internet of things are = people, process, things
33) IIOT stands for = Industrial Internet of Things
34) ATM is the first recognized IoT device.
35) Radio information technology is used by IoT.
36) NFC (Near Field Communication) consists of communication
protocols for electronic devices, typically a mobile device and a standard
device.
37) Connectivity refers to establishing a proper connection between all
the things of IoT.
38) - IOT devices have unique identities and can perform all of the
above: remote sensing, actuating, and monitoring capabilities.
- IoT devices sense and send/receive data.
-IoT devices are non-standard.
39) The sensed data is communicated to cloud-based servers/storage.
40) IOT devices are various types, for instance wearable sensors, smart
watches, LED lights, etc.
41) IEEE 802.3 is a collection of wired Ethernet standards for the link
layer.
42) IEEE 802.11 is a collection of WLAN communication standards.
43) IEEE 802.16 is a collection of wireless broadband standards
(WiMax).
44) IEEE 802.15.4 is a collection of standards for LR-WPANs (Low-Rate
Wireless Personal Area Networks)
45) - Zigbee is a high-level communication protocol based on LR-
WPANs standards.
- is a one of the most popular wireless technologies used by WSNs.
- Zigbee specification are based on = 802.15.4
46) - 2G includes GSM and CDMA.
- 3G includes UMTS and CDMA2000.
- 4G includes LTE.
47) Link layer protocols determine how the data is physically sent over
the network’s physical layer or medium.
48)- Network layer is responsible for sending IP datagrams from the
source network to the destination network.
- Network layer performs the host addressing and packet routing.
- Data in the network layer is transferred in the form of Packets.
- The security-based connection is provided by the Network layer.
- The network layer is considered as the Backbone.
- The network layer consists of hardware devices: Router, Bridges, and
Switches.
- The network layer protocol exists in Host.
49) - Transport layer protocols provide end-to-end message transfer
capability independent of the underlying network.
- Data integrity in the transport layer can be assured using Checksum.
- The transport layer receives data in the form of Byte streams.
50) - Application layer protocols define how the applications interface
with the lower layer protocol to send the data over the network.
- The service provided by the application layer is Web chat.
51) 6LOWPAN stands for IPv6 over Low Power Wireless Personal
Area Network.
52) 802.3 is the standard for 10BASE5 Ethernet that uses Coaxial cable
as the shared medium.
53) IEEE 802.11 standards provide data rates 1 Mb/s to up to 6.75 Gb/s.
54) CoAP (Constrained Application Protocol) is a protocol related to
IoT.
55) UDP is used for time-sensitive applications with small data units and
no connection setup overhead.
56) HTTP protocol uses Universal Resource Identifiers (URIs) to identify
HTTP resources.
57) The 10/100Mbit Ethernet support enables the board to connect to
LAN.
58) Data link layer technologies include: Bluetooth, UART, Wi-Fi,
Ethernet.
59) size of the IPv6 Address = 128 bits
60) - MQTT = MQ Telemetry Transport
- MQTT is better than HTTP for sending and receiving data.
- MQTT is Machine to Machine and Internet of Things protocol.
- MQTT protocol is lightweight.
- Based on publish-subscribe architecture
61) - XMPP is used for streaming XML elements.
- The protocol that has a quality of service is XMPP.
- XMPP creates Device identity.
- XMPP uses Decentralized client-server architecture.
62) HTTP enables network resources, reduces perception of latency,
and allows multiple concurrent exchanges.
63) CoAP is specialized in Internet applications.
64) The protocol used to link all the devices in the IoT is TCP/IP.
65) TCP and UDP are called Transport protocols.
66) Data Distribution Serviced (DDS) is a data-centric middleware
standard for device-to-device and machine-to-machine communication.
67) - Exclusive Pair is a bi-directional, fully duplex communication
model that uses a persistent connection between client and server.
- It is a stateful communication model where the server is aware of all
open connections.
68) IoT communication models include Request-Response, Publish-
Subscribe, Push-Pull, and Exclusive Pair.
69) In Node MCU, MCU stands for Micro Controller Unit.
70) REST is an acronym for Representational State Transfer.
71) WSN stands for Wireless Sensor Network.
72) Benefit of cloud computing services = Fast , Anywhere access,
Higher utilization
73) - PaaS (Platform as a Service) = provides a platform for developers
to build, deploy, and manage applications without managing underlying
infrastructure.
- PaaS is the most refined and restrictive service model.
74) Platform as a Service (PaaS) is a cloud computing infrastructure that
creates a development environment upon which applications may be built.
75) IaaS is a cloud computing service model in which hardware is
virtualized in the cloud.
76) Workload is the fundamental unit of virtualized client in an IaaS
deployment.
77) WebSocket is suitable for IOT applications to have low latency or
high throughput requirements.
78) Cloud computing is a transformative computing paradigm that
involves delivering applications and services over the internet.
79) The process of collecting, organizing and collecting large sets of data
called as Big data.
80) Does Raspberry Pi need external hardware? = FALSE
- It has internal memory.
- Male HDMI and Adapter: You use a male HDMI cable and an adapter
if needed to connect a Raspberry Pi to a TV.
- Power supply is done to Rpi by USB connection
- The Ethernet/LAN cable used in Raspberry Pi is an RJ45 connector,
which is commonly used for networking.
- Raspberry Pi uses the ARM instruction set architecture.
81) micro SD card IS NOT present in all modules.
82) Intelligence: This characteristic involves the ability of a thing to
respond intelligently to a particular situation
83) Connectivity empowers IoT by bringing together everyday objects.
84) The collection of data is achieved with Dynamic Nature changes.
85) Enormous Scale: Refers to the large number of devices that need to
be managed and communicate with each other.
86) Heterogeneity: In IoT, it refers to devices with different hardware
platforms and networks.
87) Actuators: Devices that transform electrical signals into physical
movements.
88) Stepper motors are a type of DC motor.
89) DC motors convert electrical energy into mechanical energy.
90) Linear actuators are used in both machine tools and industrial
machinery.
91) A solenoid is a specially designed electromagnet.
92) Accelerometer sensors are used in both smartphones and aircrafts.
93) Image sensors are found in cameras, night-vision equipment, and
sonars.
94) Gas sensors are used to detect toxic gases.
95) Properties of Arduino are inexpensive and simple.
96) Arduino UNO uses the ATmega328p microcontroller.
97) Arduino is an open-source electronic platform based on easy-to-use
hardware and software.
98) Solenoid is used for latching, locking, and triggering actions.
99) Proximity sensors detect the presence or absence of nearby objects
without any physical contact.
100) Temperature sensors include thermocouples, thermistors, resistor
temperature detectors (RTDs), and integrated circuits (ICs).
101) The measurement of humidity is referred to as Relative Humidity
(RH).
102) Motion sensors are used for automatic door controls, automatic
parking systems, automated sinks, automated toilet flushers, and
hand dryers.
103) IR (Infrared) sensors measure the heat emitted by objects.
104) Embedded system applications typically involve processing
information as signals.
Unit 3) Basics of Digital Forensics
1) Digital forensics involves extraction, preservation, and
interpretation of data, but not manipulation.
2) IDIP stands for Integrated Digital Investigation Process.
3) Road Map for Digital Forensic Research (RMDFR) was proposed by
G. Palmer.
4) Investigator should satisfy all points: contribute to society, avoid
harm, and be honest and trustworthy.
5) The method for expressing an opinion has been to frame a hypothetical
question based on available factual evidence.
6) The more subtle danger, where you are not aware that you are running
macros automatically, spread via email, is the danger of macro viruses.
7) One of the three C's in computer forensics is control.
8) The Federal Bureau of Investigation (FBI) program was created in
1984.
9) The field of PC forensics began in the 1980's.
10) Digital Forensic is defined as: The application of computer science
and investigative procedures for a legal purpose involving the analysis of
digital evidence after proper search authority, chain of custody, validation
with mathematics, use of validated tools, repeatability, reporting, and
possible expert presentation.
11) Digital Forensics entails: The identification, preservation, recovery,
restoration and presentation of digital evidence from systems and devices.
12) Most significant legal issue in forensics: Admissibility of evidence.
13) Phase that develops investigative hypotheses: Reconstruction phase.
14) - The digital forensic investigator must maintain absolute objectivity
- It is the investigator’s responsibility to accurately report the relevant
facts of a case.
- The investigator must maintain strict confidentiality, discussing the
results of an investigation on only a “need to know”
15) In Survey phase investigator transfers the relevant data from a venue
out of physical or administrative control of the investigator to a controlled
location.
16) Computer forensics involve= Preservation of computer data,
Exraction of computer data, Manipulation of computer data,
Interpretation of computer data.
17) Set of instructions performing a task: Software.
18) Rule of Digital Forensics =
- A copy is made onto forensically sterile media. New media should
always be used if available.
- The copy of the evidence must be an exact, bit-by-bit copy.
- The examination must be conducted in such a way as to prevent any
modification of the evidence.
19) To collect and analyze the digital evidence that was obtained from the
physical investigation phase, is the goal of which phase?= Digital crime
investigation.
20) To provide mechanism to an incident to be detected and confirmed is
purpose of which phase? = Deployment phase.
21) Review phase = entails a review of the whole investigation and
identifies area of improvement.
22) Michael Anderson is known as father of computer forensic.
23) Forensic is well established science where various contribution have
been made.
24) End to End Digital Investigation Process (EEDIP) was proposed by
Stephenson.
25) The Integrated Digital Investigation Process (IDIP) was proposed
by Carrier and Safford.
26) The properties of computer evidence are:
1. Authentic and Accurate - The evidence must be genuine and
reliable.
2. Complete and Convincing - The evidence should present the full
picture and be persuasive.
3. Duplicated and Preserved - Evidence must be duplicated and
preserved to maintain integrity.
4. Admissible and Relevant - The evidence must be legally acceptable
and pertinent to the case.
27) Evidence can makes or breaks investigation.
28) Firewall is software that blocks unauthorized users from connecting to
your computer.
29) General Ethical norms for Investigator: To contribute to society and
human being, to avoid harm to others, and to be honest and
trustworthy.
30) Unethical norms for Investigator: Distort or falsify education,
training, credentials, and declare any confidential matters or
knowledge.
31) The general ethical norms for an investigator are:
1. To contribute to society and human beings.
2. To avoid harm to others.
3. To be honest and trustworthy.
4. To honor confidentiality.
32) Unethical norm for Digital Forensics Investigation are =
Uphold any relevant evidence, Declare any confidential matters or
knowledge, Distort or falsify education, training, credentials.
33) Acquisition is called as the process of creation a duplicate of digital
media for purpose of examining it.
34) Hacking refers for modifying a computer in a way which was not
originally intended to view Information.
35) The ability to recover and read deleted or damaged files from a
criminal’s computer is an example of a law enforcement specialty called
Computer Forensics.
36) EMMC chip is an important part of a mobile device used in digital
forensics.
37) Steganography is used for data hiding in encrypted images in digital
forensics.
38) The file used to store the user-entered password is .sam
39) Computer crimes include activities like hacking, e-mail harassment,
data falsification, and identity theft.
40) Data mining is the process of recording as much data as possible to
create reports and analysis on user input.
41) Data carving searches through raw data on a hard drive without using
a file system.
42) The first step to handle retrieving data from an encrypted hard drive is
finding configuration files.