0% found this document useful (0 votes)
31 views22 pages

ETI Quick Revision

The document provides a comprehensive overview of Artificial Intelligence (AI) and the Internet of Things (IoT), detailing key concepts, historical milestones, and technological components. It covers foundational topics such as the definition of AI, types of AI (Weak, Narrow, Strong, General, Super AI), and various AI programming languages, as well as the characteristics and applications of embedded systems within IoT. Additionally, it discusses communication protocols, cloud computing models, and the significance of data in IoT, highlighting the interconnectedness of devices and the role of AI in enhancing machine intelligence.

Uploaded by

sakshi1482005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views22 pages

ETI Quick Revision

The document provides a comprehensive overview of Artificial Intelligence (AI) and the Internet of Things (IoT), detailing key concepts, historical milestones, and technological components. It covers foundational topics such as the definition of AI, types of AI (Weak, Narrow, Strong, General, Super AI), and various AI programming languages, as well as the characteristics and applications of embedded systems within IoT. Additionally, it discusses communication protocols, cloud computing models, and the significance of data in IoT, highlighting the interconnectedness of devices and the role of AI in enhancing machine intelligence.

Uploaded by

sakshi1482005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ETI Quick Revision

Unit 1) Artificial Intelligence

1) ✅ Schools among the early leaders in AI:


Dartmouth, MIT (Massachusetts Institute of Technology), and Stanford.
❌ Harvard was not there.

2) DARPA, the agency that has funded a great deal of American AI


research, is part of the Department of: Defense

3) The AI revolution was held at the 1956 Dartmouth Conference.

4) - Heuristic means the commonsense or judgmental part of problem-


solving.
- A Heuristic is a rule of thumb, strategy, trick, simplification, or any
other kind of device which drastically limits search for solutions in large
problem spaces.
- Heuristics do not guarantee optimal or any solutions.

5) The 1956 Dartmouth Conference organized by John McCarthy was a


pivotal event in AI history.

6) John McCarthy coined the term 'Artificial Intelligence' in 1956 at the


Dartmouth Conference.

7) - The field that investigates the mechanics of human intelligence is:


cognitive science
- Cognitive science related with Think like human.

8) A.M. Turing developed the Turing Test to check if a computer


shows Artificial Intelligence.
- The Turing Test was originally called the "imitation game" by its
creator, Alan Turing.
9) The first AI programming language was LISP.
10) - Artificial Intelligence is making a machine intelligent.
- The characteristics of a computer system capable of thinking,
reasoning, and learning is known as Artificial Intelligence.
- Artificial Intelligence is a branch of computer science that helps
machines find solutions to complex problems in a human-like way.

11) John McCarthy is the father of AI.

12) Artificial Intelligence has applications in Planning & Scheduling,


Game Playing, and Robotics.

13) The first widely used commercial form of AI, used in products like
microwave ovens, automobiles, and desktop PCs, is called Fuzzy
Logic.

14) In Deep Learning, the goal is for the software to use what it has
learned in one area to solve problems in other areas.

15) Computer programs that mimic the way the human brain processes
information are called Neural Networks.

16) - The Computational model should reflect how results were


obtained.
- Computational models were developed and incorporated in
machines which mimicked the functionalities of human origin.

17) Communication between man and machine is related to ELIZA.

18) - ELIZA is an early AI program that mimics conversation, especially


a psychotherapist, by rephrasing user inputs with questions. It doesn't
understand, just simulates talking.
- created in the 1960s by Joseph Weizenbaum.
19) The concept derived from the Logic level includes propositional
logic, tautology, predicate calculus, model, and temporal logic.

20) PROLOG is an AI programming language that solves problems


with a form of symbolic logic known as Predicate Calculus.

21) The Gross level contains constituents like knowledge-based systems,


heuristic search, automatic theorem proving, and multi-agent systems.

22) PROLOG, LISP, and NLP are languages of Artificial Intelligence.

23) - LISP is used for AI because it supports the implementation of


software that computes with symbols very well.
- Symbols, symbolic expressions, and computing with those are at the
core of LISP.

24) NLP (Natural Language Processing) deals with the interaction


between computers and humans using natural language.

25) The core components and constituents of AI are derived from the
Concept of Logic, Cognition, and Computation.

26) Aristotle’s theory of syllogism and Descartes and Kant’s critique of


pure reasoning made knowledge on Logic.

27) Charles Babbage and Boole demonstrated the power of


Computation Logic.

28) In the 1960s, Marvin Minsky pushed the logical formalism to


integrate reasoning with knowledge.

29) Sensing organs as input, mechanical movement organs as output,


and CNS in the brain as control and computing devices is known as the
Information Processing Paradigm of human beings.
30) Chomsky’s linguistic computational theory generated a model for
syntactic analysis through Regular Grammar.

31) Human to Machine is Program and Machine to Machine is


Hardware.

32) - Weak AI is known as Narrow AI.


- Weak AI is - The study of mental faculties through the use of mental
models implemented on a computer

33) - Narrow AI is able to perform dedicated task.


- It can’t perform multiple tasks at a time.
- Playing chess, purchasing suggestions on e-commerce sites, self-driving
cars, speech recognition, and image recognition are examples of -Narrow
AI.

34) Strong AI is - The embodiment of human intellectual capabilities


within a computer.

35) Artificial intelligence is =


-Making a Machine Intelligent.(definition)
- The embodiment of human intellectual capabilities within a
computer.(Strong AI)
- A set of computer programs that produce output that would be
considered to reflect intelligence if it were generated by
humans.(Narrow AI)
- The study of mental faculties through the use of mental models
implemented on a computer. (Weak AI)
- AI is a type of intelligence which could perform any intellectual task
with efficiency like human. (General AI)

36) - Apple siri is a good example of Narrow AI.


- IBM Watson supercomputer comes under Narrow AI.
37) - General AI is a type of intelligence which could perform any
intellectual task with efficiency like human.
- The idea behind General AI is to make a system that could be smarter
and think like a human on its own.
- The worldwide researchers are now focusing on developing machines
with General AI.

38) - Machine performing any task better than humans with cognitive
properties is known as Super AI.
- Ability to think, puzzle, make judgments, plan, learn, communication by
its own is known as Super AI.
- Super AI is hypothetical concept of AI.

39) - A Reactive machine AI system does not store memories or past


experiences for future actions.
- Reactive machines only focus on current scenarios and react to them
with the best possible action.
- IBM’s deep blue system is example of Reactive Machine.
- Google AlphaGo is an example of a Reactive machine.

40) - Limited memory AI can store past experiences or some data for
a short period of time.
- Self-driving car is the best example of Limited Memory AI.

41) - Theory of mind AI should understand human emotions, people,


and beliefs, and interact socially like humans.

42) - Self-Awareness machines will be smarter than the human mind.


- Self-Awareness machines will have their own consciousness and
sentiments.
43) - Machine learning is the autonomous acquisition of knowledge
through the use of computer programs.
- Machine learning is a branch of science that deals with programing the
systems in such a way that they automatically learn and improve with
experience.

44) Classifying email as spam, labeling webpages based on their content,


and voice recognition are examples of Supervised learning.

45) K-means, self-organizing maps, and hierarchical clustering are


examples of Unsupervised learning.

46) Deep learning is a subfield of machine learning where algorithms are


inspired by the structure and function of the brain called Artificial neural
networks.

47) Machine learning was invented by Arthur Samuel.

48) Hierarchical planning consists of successive representations of


different levels of a plan.

49) Pattern matching is an AI technique that helps computers understand


associations and relationships between objects and events.

50) Expert System is a computer program that contains the distilled


knowledge of an expert.

51) API stands for Application Programming Interface.


Unit 2) Internet of Things

1) Embedded systems are special purpose.

2)- Embedded system is an electronic system or an electro-mechanical


system.
- Built around specialized hardware,
- Always contain an operating system,
- Execution behavior may be deterministic

3) Examples of small-scale embedded systems include:


Electronic Barbie doll, Simple calculator, Electronic toy car, Washing
machine, Microwave oven, Digital camera, Toaster

4) The first recognized modern embedded system is the Apollo Guidance


Computer (AGC).

5) The first mass-produced embedded system is the Autonetics D-17.

6) The intended purpose(s) of embedded systems is/are Data collection,


Data processing, and Data communication.

7) The example of an embedded system for data communication is :


Digital camera.

8) The essential tight constraints related to the design metrics of an


embedded system are: Ability to fit on a single chip , Low power
consumption, Fast data processing for real-time operations.

9) A digital multi-meter is an example of an embedded system for


monitoring.
10) Examples of embedded systems for signal processing typically
include:
 Digital Signal Processors (DSPs) used in audio, video, or

communications equipment.
 Radar systems for signal processing of radio waves.

 Mobile phones that process voice signals.

 Hearing aids, which process audio signals to amplify sound.

11) The instruction set of a RISC (Reduced Instruction Set Computing)


processor is simple and lesser in number.

12) CISC (Complex Instruction Set Computing) processors have the


following characteristics:
 The instruction set is non-orthogonal.

 The number of general-purpose registers is limited.

 Instructions are like macros in C language.

 They use variable-length instructions.

13) The CPU (Central Processing Unit) is the main processor chip in
computers responsible for executing instructions and performing
calculations.

14) Processors used in many microcontroller products need to be low


power.

15) In microcontrollers, UART is the acronym of Universal


Asynchronous Receiver/Transmitter.

16) The architecture followed by general purpose microprocessors is


Von Neumann architecture.
17) - The architecture that involves both the volatile and the non-volatile
memory is Harvard architecture.
- provides separate buses for program and data memory
- Separate program and data memory
- supports easier instruction pipelining
- Complex architecture

18) Wi-Fi and Bluetooth are examples of wireless communication


interfaces.

19) ARM = Advanced RISC Machine.

20) the processor used by ARM7 = 32-bit RISC

21) ARM microprocessors are important for providing low cost and low
power consumption.

22) ARM processors were basically designed for mobile systems.

23) - ASIC chip is faster.


- Application-Specific Integrated Circuits

24) In microcontrollers, I2C stands for = Inter-Integrated Circuit

25) PIC microcontrollers are the smallest microcontrollers which can


be programmed to perform a large range of tasks.

26) AVR was developed in the year 1996 by ATMEL Corporation.

27) AVR = Alf-Egil Bogen and Vegard Wollan RISC microcontroller or


Advanced Virtual RISC

28) AVR microcontroller executes most of the instruction in Single


execution cycle.
29) Term "the Internet of things" was coined by Kevin Ashton.

30) Machine to Machine (M2M) communication means devices


connected in IoT communicate automatically without human involvement.

31) - "Things" in IoT refers to IoT devices.


- IoT devices may support a number of interoperable communication
protocols and communicate with other device and also with infrastructure.

32) - Interconnection of Internet and computing devices embedded in


everyday objects, enabling them to send and receive data is called
Internet of Things.
- Internet of Things is a computing concept that describes the idea of
everyday physical objects being connected to the internet.
- Elements of Internet of things are = people, process, things

33) IIOT stands for = Industrial Internet of Things

34) ATM is the first recognized IoT device.

35) Radio information technology is used by IoT.

36) NFC (Near Field Communication) consists of communication


protocols for electronic devices, typically a mobile device and a standard
device.

37) Connectivity refers to establishing a proper connection between all


the things of IoT.

38) - IOT devices have unique identities and can perform all of the
above: remote sensing, actuating, and monitoring capabilities.
- IoT devices sense and send/receive data.
-IoT devices are non-standard.
39) The sensed data is communicated to cloud-based servers/storage.

40) IOT devices are various types, for instance wearable sensors, smart
watches, LED lights, etc.

41) IEEE 802.3 is a collection of wired Ethernet standards for the link
layer.

42) IEEE 802.11 is a collection of WLAN communication standards.

43) IEEE 802.16 is a collection of wireless broadband standards


(WiMax).

44) IEEE 802.15.4 is a collection of standards for LR-WPANs (Low-Rate


Wireless Personal Area Networks)

45) - Zigbee is a high-level communication protocol based on LR-


WPANs standards.
- is a one of the most popular wireless technologies used by WSNs.
- Zigbee specification are based on = 802.15.4

46) - 2G includes GSM and CDMA.


- 3G includes UMTS and CDMA2000.
- 4G includes LTE.

47) Link layer protocols determine how the data is physically sent over
the network’s physical layer or medium.
48)- Network layer is responsible for sending IP datagrams from the
source network to the destination network.
- Network layer performs the host addressing and packet routing.
- Data in the network layer is transferred in the form of Packets.
- The security-based connection is provided by the Network layer.
- The network layer is considered as the Backbone.
- The network layer consists of hardware devices: Router, Bridges, and
Switches.
- The network layer protocol exists in Host.

49) - Transport layer protocols provide end-to-end message transfer


capability independent of the underlying network.
- Data integrity in the transport layer can be assured using Checksum.
- The transport layer receives data in the form of Byte streams.

50) - Application layer protocols define how the applications interface


with the lower layer protocol to send the data over the network.
- The service provided by the application layer is Web chat.

51) 6LOWPAN stands for IPv6 over Low Power Wireless Personal
Area Network.

52) 802.3 is the standard for 10BASE5 Ethernet that uses Coaxial cable
as the shared medium.

53) IEEE 802.11 standards provide data rates 1 Mb/s to up to 6.75 Gb/s.

54) CoAP (Constrained Application Protocol) is a protocol related to


IoT.

55) UDP is used for time-sensitive applications with small data units and
no connection setup overhead.
56) HTTP protocol uses Universal Resource Identifiers (URIs) to identify
HTTP resources.

57) The 10/100Mbit Ethernet support enables the board to connect to


LAN.

58) Data link layer technologies include: Bluetooth, UART, Wi-Fi,


Ethernet.

59) size of the IPv6 Address = 128 bits

60) - MQTT = MQ Telemetry Transport


- MQTT is better than HTTP for sending and receiving data.
- MQTT is Machine to Machine and Internet of Things protocol.
- MQTT protocol is lightweight.
- Based on publish-subscribe architecture

61) - XMPP is used for streaming XML elements.


- The protocol that has a quality of service is XMPP.
- XMPP creates Device identity.
- XMPP uses Decentralized client-server architecture.

62) HTTP enables network resources, reduces perception of latency,


and allows multiple concurrent exchanges.

63) CoAP is specialized in Internet applications.

64) The protocol used to link all the devices in the IoT is TCP/IP.

65) TCP and UDP are called Transport protocols.

66) Data Distribution Serviced (DDS) is a data-centric middleware


standard for device-to-device and machine-to-machine communication.
67) - Exclusive Pair is a bi-directional, fully duplex communication
model that uses a persistent connection between client and server.
- It is a stateful communication model where the server is aware of all
open connections.

68) IoT communication models include Request-Response, Publish-


Subscribe, Push-Pull, and Exclusive Pair.

69) In Node MCU, MCU stands for Micro Controller Unit.

70) REST is an acronym for Representational State Transfer.


71) WSN stands for Wireless Sensor Network.

72) Benefit of cloud computing services = Fast , Anywhere access,


Higher utilization

73) - PaaS (Platform as a Service) = provides a platform for developers


to build, deploy, and manage applications without managing underlying
infrastructure.
- PaaS is the most refined and restrictive service model.

74) Platform as a Service (PaaS) is a cloud computing infrastructure that


creates a development environment upon which applications may be built.

75) IaaS is a cloud computing service model in which hardware is


virtualized in the cloud.

76) Workload is the fundamental unit of virtualized client in an IaaS


deployment.

77) WebSocket is suitable for IOT applications to have low latency or


high throughput requirements.
78) Cloud computing is a transformative computing paradigm that
involves delivering applications and services over the internet.

79) The process of collecting, organizing and collecting large sets of data
called as Big data.

80) Does Raspberry Pi need external hardware? = FALSE


- It has internal memory.
- Male HDMI and Adapter: You use a male HDMI cable and an adapter
if needed to connect a Raspberry Pi to a TV.
- Power supply is done to Rpi by USB connection
- The Ethernet/LAN cable used in Raspberry Pi is an RJ45 connector,
which is commonly used for networking.
- Raspberry Pi uses the ARM instruction set architecture.

81) micro SD card IS NOT present in all modules.

82) Intelligence: This characteristic involves the ability of a thing to


respond intelligently to a particular situation

83) Connectivity empowers IoT by bringing together everyday objects.

84) The collection of data is achieved with Dynamic Nature changes.

85) Enormous Scale: Refers to the large number of devices that need to
be managed and communicate with each other.

86) Heterogeneity: In IoT, it refers to devices with different hardware


platforms and networks.

87) Actuators: Devices that transform electrical signals into physical


movements.

88) Stepper motors are a type of DC motor.


89) DC motors convert electrical energy into mechanical energy.

90) Linear actuators are used in both machine tools and industrial
machinery.

91) A solenoid is a specially designed electromagnet.

92) Accelerometer sensors are used in both smartphones and aircrafts.

93) Image sensors are found in cameras, night-vision equipment, and


sonars.

94) Gas sensors are used to detect toxic gases.

95) Properties of Arduino are inexpensive and simple.

96) Arduino UNO uses the ATmega328p microcontroller.

97) Arduino is an open-source electronic platform based on easy-to-use


hardware and software.

98) Solenoid is used for latching, locking, and triggering actions.

99) Proximity sensors detect the presence or absence of nearby objects


without any physical contact.

100) Temperature sensors include thermocouples, thermistors, resistor


temperature detectors (RTDs), and integrated circuits (ICs).

101) The measurement of humidity is referred to as Relative Humidity


(RH).
102) Motion sensors are used for automatic door controls, automatic
parking systems, automated sinks, automated toilet flushers, and
hand dryers.

103) IR (Infrared) sensors measure the heat emitted by objects.

104) Embedded system applications typically involve processing


information as signals.
Unit 3) Basics of Digital Forensics

1) Digital forensics involves extraction, preservation, and


interpretation of data, but not manipulation.

2) IDIP stands for Integrated Digital Investigation Process.

3) Road Map for Digital Forensic Research (RMDFR) was proposed by


G. Palmer.

4) Investigator should satisfy all points: contribute to society, avoid


harm, and be honest and trustworthy.

5) The method for expressing an opinion has been to frame a hypothetical


question based on available factual evidence.

6) The more subtle danger, where you are not aware that you are running
macros automatically, spread via email, is the danger of macro viruses.

7) One of the three C's in computer forensics is control.

8) The Federal Bureau of Investigation (FBI) program was created in


1984.

9) The field of PC forensics began in the 1980's.

10) Digital Forensic is defined as: The application of computer science


and investigative procedures for a legal purpose involving the analysis of
digital evidence after proper search authority, chain of custody, validation
with mathematics, use of validated tools, repeatability, reporting, and
possible expert presentation.

11) Digital Forensics entails: The identification, preservation, recovery,


restoration and presentation of digital evidence from systems and devices.
12) Most significant legal issue in forensics: Admissibility of evidence.

13) Phase that develops investigative hypotheses: Reconstruction phase.

14) - The digital forensic investigator must maintain absolute objectivity


- It is the investigator’s responsibility to accurately report the relevant
facts of a case.
- The investigator must maintain strict confidentiality, discussing the
results of an investigation on only a “need to know”

15) In Survey phase investigator transfers the relevant data from a venue
out of physical or administrative control of the investigator to a controlled
location.

16) Computer forensics involve= Preservation of computer data,


Exraction of computer data, Manipulation of computer data,
Interpretation of computer data.

17) Set of instructions performing a task: Software.

18) Rule of Digital Forensics =


- A copy is made onto forensically sterile media. New media should
always be used if available.
- The copy of the evidence must be an exact, bit-by-bit copy.
- The examination must be conducted in such a way as to prevent any
modification of the evidence.

19) To collect and analyze the digital evidence that was obtained from the
physical investigation phase, is the goal of which phase?= Digital crime
investigation.

20) To provide mechanism to an incident to be detected and confirmed is


purpose of which phase? = Deployment phase.
21) Review phase = entails a review of the whole investigation and
identifies area of improvement.

22) Michael Anderson is known as father of computer forensic.

23) Forensic is well established science where various contribution have


been made.

24) End to End Digital Investigation Process (EEDIP) was proposed by


Stephenson.

25) The Integrated Digital Investigation Process (IDIP) was proposed


by Carrier and Safford.

26) The properties of computer evidence are:


1. Authentic and Accurate - The evidence must be genuine and
reliable.
2. Complete and Convincing - The evidence should present the full
picture and be persuasive.
3. Duplicated and Preserved - Evidence must be duplicated and
preserved to maintain integrity.
4. Admissible and Relevant - The evidence must be legally acceptable
and pertinent to the case.

27) Evidence can makes or breaks investigation.

28) Firewall is software that blocks unauthorized users from connecting to


your computer.

29) General Ethical norms for Investigator: To contribute to society and


human being, to avoid harm to others, and to be honest and
trustworthy.
30) Unethical norms for Investigator: Distort or falsify education,
training, credentials, and declare any confidential matters or
knowledge.

31) The general ethical norms for an investigator are:


1. To contribute to society and human beings.
2. To avoid harm to others.
3. To be honest and trustworthy.
4. To honor confidentiality.

32) Unethical norm for Digital Forensics Investigation are =


Uphold any relevant evidence, Declare any confidential matters or
knowledge, Distort or falsify education, training, credentials.

33) Acquisition is called as the process of creation a duplicate of digital


media for purpose of examining it.

34) Hacking refers for modifying a computer in a way which was not
originally intended to view Information.

35) The ability to recover and read deleted or damaged files from a
criminal’s computer is an example of a law enforcement specialty called
Computer Forensics.

36) EMMC chip is an important part of a mobile device used in digital


forensics.

37) Steganography is used for data hiding in encrypted images in digital


forensics.

38) The file used to store the user-entered password is .sam

39) Computer crimes include activities like hacking, e-mail harassment,


data falsification, and identity theft.
40) Data mining is the process of recording as much data as possible to
create reports and analysis on user input.

41) Data carving searches through raw data on a hard drive without using
a file system.

42) The first step to handle retrieving data from an encrypted hard drive is
finding configuration files.

You might also like