COMPUTER ( PAPER 1) Flashcards
DEFINE INTERNET
-The internet refers to the global network of computers and other electronic devices connected together through a system of routers and servers
-It is the infrastructure that allows us to send and receive information, including email, instant messaging, and file transfers
-The internet also provides access to other services such as online gaming, video streaming, and cloud computing
DEFINE WWW
-The World Wide Web, or simply the Web, is a collection of websites and web pages that are accessed using the Internet.
-The web consists of interconnected documents and multimedia files that are stored on web servers around the world.
-Web pages are accessed using a web browser, which communicates with the web server to retrieve and display the content
Difference between WWW and the INTERNET?
- INTERNET is a infrastructure and WWW is a service on top of that infrastructure.
- Internet uses
WHAT IS A WEB BROWSER?
A web browser is a piece of software used to access and display information on the internet.
Purpose of a Web Browser
The main purpose of a web browser is to render hypertext markup language (HTML) and display web pages.
Web browsers interpret the code in HTML documents and translate it into a visual display for the user such as videos,images/text and audio.
Features of a Web Browser
- Render HTML
- Storing bookmarks and favorites
- Recording user history
- Allowing use of multiple tabs
- Storing cookies
- Providing navigation tools - forward and backward
- They make use of hyperlinks which allow navigation
- Providing an address bar
- It have a home page
Define URL?
-The URL stand for uniform resource locator, and it is a text-based address that identifies the location of a resource on the internet.
-It is the address of a web page, image, video, or any other resource available on the internet.
Components of a URL
A URL can contain three main components:
~Protocol
~Domain name
~Web page/file name
–protocol://domainhost,domain name,domaintype /path/file name
– https://www.ashifaansari.com/path/ict
DEFINE HTTP
-HTTP stands for hypertext transfer protocol and is used for transferring data between a client and a server on the internet.
-It is a stateless protocol, meaning it does not store any information about previous requests or responses.
-HTTP operates on port 80 by default and sends data in plain text format, making it vulnerable to interception and manipulation.
DEFINE HTTPs
-HTTPS is a secure version of HTTP that uses encryption to protect data transferred between a client and a server.
-It operates on port 443 by default and uses Transport Layer Security (TLS) or Secure Socket Layer (SSL) to encrypt data.
-HTTPS ensures that data transferred between the client and server is secure, making it harder for unauthorized users to intercept or manipulate data.
How are web pages retrieved from webserver?
- When you type in a URL the browser sends the URL to the DNS using HTTP
- The DNS finds the matching IP addresses for the domain name in the URL and sends the IP address to the web browser.
- The web browser sends a request to the web server for web pages.
- The web pages are sent from the web server to the browser.
- The browser renders HTML to display web pages.
- Any security certificates are exchanged.
- SSL/HTTPS is used to secure the data which will encrypt any data that is sent.
Websites can be separated into which 2 parts?
- STRUCTURE
- PRESENTATION
STRUCTURE OF WEBSITE?
HTML is:
A language used to create the structure/layout of a website.
Written in plain text.
Used in the content layer.
Made up of a set of markup codes.
Used to tell the browser how to display the page.
E.g.
Where text is placed
Margins of page
Line break
Padding
PRESENTATION OF WEBSITE?
CSS is:
A language used to create the presentation / formatting of the page.
Written in plain text.
Used in the presentation layer.
Used by web pages to produce a consistent format between different web pages.
E.g.
Font size
Font color
Background color
WHY ARE THE PRESENTATION AND STRUCTURE OF THE WEBSITE KEPT SEPARATELY?
- The presentation of the page can be changed without needing to alter the structure; so regular updates can be made without needing to check the structure.
- The formatting document (written in CSS) can be used again for a different website.
- If further content and web pages are added to the website, the necessary formatting can be easily applied so this can save time when developing a website.
- CSS to standardize formatting so CSS only needs to be created once and be applied to each webpage.
- One person can develop the structure and one can develop the presentation so this can save time when developing and updating a website.
WHAT IS SSL AND HOW DOES IT WORK?
- SSL or secure socket layer is a security protocol developed to provide secure communication over the Internet.
- It uses symmetric and asymmetric encryption to secure data and ensure data integrity.
- It uses digital certificate for authentication.
- This digital certificate which contains _ public key is sent to the browser.
- The browser will validate the certificate and check whether it trust the certificate.
- If it does, it sends a message to the server. The server sends back a digitally signed acknowledgement to start an SSL encrypted session and the transaction will begin.
What is TLS ?
- TLS or transport layer socket is a security protocol used to provide secure communication over the internet.
- It uses a combination of symmetric and asymmetric encryption to secure data and ensure data integrity.
- TLS is an updated version of SSL.
2 layers of TLS?
Handshake Layer
* This is used to establish a secure connection between two endpoints.
Record Layer
* This is responsible for transmitting data securely between the client and the server.
How does TLS works?
- The client/browser requests secure connection to the server.
- The client/browser requests the server to identify itself.
- The server provides a digital certificate.
- The client/browser validates the certificate.
- The client/browser sends a signal back to the server to begin data transmission.
- The encryption method will be agreed & a session key is generated.
What are cookies?
Cookies are small text files that are stored on a user’s device by a website. They are sent between a Web browser to a web server.
Functions of cookies?
- Saving Personal Details
- Tracking User Preferences
- Holding Items in an Online Shopping Basket
- Storing Login Details
- Storing Relevant Purchases
- Displaying Relevant Adverts
- Tracking Visitor Statistics
WHAT ARE 2 TYPES OF COOKIES AND THIER FEATURES?
Session Cookies
* These are temporary and are stored only during a user’s browsing session
* They are used to maintain a user’s state or activity during a single session, such as when filling out a form or navigating through a website.
Persistent Cookies
* These are stored on a user’s device for a longer period, usually for a few weeks to several years
* They are used to remember user preferences and settings, such as language preferences, login details, and shopping cart items
DIFFERENCE BETWEEN SESSION AND PERSISTENT COOKIES?
- Session cookies are stored in memory/RAM ,whereas persistent cookies are stored on the hard drive/secondary storage.
- When the browser is closed a session cookie is lost , whereas a persistent cookie is not lost until deleted by the user/they expire.
Name Cyber Security Threats
- Hacking
- Malware - Virus, Worms, Trojan horse, Spyware, Ransomware
- Brute - force - attack
- Pharming
- Phishing
- Distributed Denial of services attack
- Data interception
- Social engineering
What is hacking?
- Hacking involves gaining unauthorized access to a system or network to steal or manipulate data, disrupt services, or cause damage.
- The aim of hacking can vary from personal gain to activism or cyber espionage.
What is Brute - force - attack?
- A brute-force attack is a trial-and-error method used to crack passwords or encryption keys by trying every possible combination until the correct one is found.
- The aim of a brute-force attack is to gain unauthorised access to a system or network OR to delete,change and steal data Or to disrupt business{place}.
- It can be carried out manually or automatically by software.
Define Data Interception?
- Data interception involves eavesdropping on communication channels to intercept and steal sensitive information, such as passwords, credit card numbers, or personal data.
- The aim of data interception is to steal sensitive information for personal gain or to use it for further cyber-attacks.
What is distributes denial of services attack?
- A DDoS attack is where multiple computers are used as bots.
- They flood a server with lots of requests at same time which the server can’t respond to; causing it to crash/fail or become unavailable to users.
- The aim of a DDoS attack is to disrupt the normal functioning of a system or network by denying users access to a website.
- The aim can be for revenge, to affect someone’s,Entertainment value OR To demand a ransom to stop it
Define Malware?
- Malware is malicious software designed to harm or gain unauthorized access to a system or network.
- It replicates itself and fills the hard disk.
Define virus?
A virus is a piece of code that attaches itself to a legitimate program or file and then replicates itself with an active host in order to spread to other programs or files on the computer.
It can cause damage to the system, including deleting/corrupting data or damaging hardware. It also takes up memory space.
Define worms?
A worm is a standalone program means without an active host that can spread and replicate itself over computer networks. It can take up storage space or bandwidth. It can also cause damage to the system, including deleting/corrupting data or damaging hardware.
- It also opens back doors to computers over the network and is used to deposit other malware on networked computers
Define Trojan horse?
A Trojan horse is a program that disguises itself as a legitimate program or file, but when installed, the malware it contains such as virus is installed that it can delete data or damage hardware.
Define spyware?
Spyware is software that records all key presses and transmits these to a third party.
what is ransomware?
Ransomware is a type of malware that stops the user to access thier data by encrypting the user’s files and demanding a ransom payment/fee to decrypt them. It can cause data loss, financial damage and disrupt business operations.
Define Adware?
Adware is a type of software that displays unwanted advertisements on the computer without the user’s consent.
Some of these may contain spyware and some may link to
viruses when clicked.
It reduces internet speed which reduce device performance and redirects the user to fake websites.
Define phishing?
- Phishing involves when a user is sent an email which contains a link to a fake/bogus website where the user is encouraged to enter their details.
- The aim of phishing is to steal sensitive information for exmaple bank account info .
Define pharming?
- Pharming involves malware being downloaded without the user’s knowledge.
- This redirects the user to a fake website where they’re encouraged to enter their personal details.
- The aim of pharming is to steal sensitive information for personal gain or to use it for further cyber attacks.
DAMAGE TO YOUR DATA
LOSS OF POWER — USE A UPS
LIQUIDS BEING SPILLED — KEEP DRINKS AWAY FROM THE DEVICE
NATURAL HAZARDS ~~ FLOOD
FIRE
HARDWARE/SOFTWARE FAULT
HUMAN ERROR
INCORRECT USE OF STORAGE DEVICE
Social engineering techniques?
Impersonation: This involves posing as someone else to gain trust or access to sensitive information. [co-worker, IT support personnel, or a law enforcement officer]
Baiting: Enticing a victim with a desirable item or promise to extract sensitive information or gain access to a system
Pretexting: involves creating a fake scenario to extract sensitive information.
[The attacker might pose as a bank representative and ask for personal information to “verify your account.”]
Social Engineering
- Social engineering involves manipulating individuals to gain access to confidential information or to perform an action that benefits the attacker.
- The aim of social engineering is to exploit human behavior and vulnerabilities to gain unauthorized access to a system or network.
Cyber security + Prevention from damaging your data
- Access Levels
- Authentication
- Anti-malware
- Firewall
- Proxy server
- SSL/TLS
- Privacy Settings
- URL
- Communications
- Automating Software Updates
- Backup
DEFINE ANTI - MALWARE
- Anti-malware solutions are used to prevent and remove malware, which is a common type of security threat to data.
- Anti-malware software includes anti-virus and anti-spyware programs, which help to detect and remove malicious software from a computer system.
- This software works by scanning the computer’s files and any files being downloaded and comparing them to a list of known malwares.
- If any malware is found, it is quarantined to prevent its spread.
- The malware is then deleted.
- Checks data before it is downloaded and stops the download if any virus is detected.
DEFINE ACCESS LEVELS.
- Access levels are used to restrict access to sensitive information and provide users with different permission to access the data.
- This helps to prevent unauthorised access, which is one of the main security threats to data.
- Access levels are normally linked to a username and can be set based on a user’s role, responsibility, or clearance level.
- This limits the access to read,view,edit or delete the data to only those people who have the access.
- This only allows the user to open files without editing or deleting them.
This hides the file from the user.
Full access
Read-only access
No access
WHAT IS PASSWORD?
- Passwords are used to protect sensitive data by preventing unauthorized access.
- A strong password should be complex, unique, and not easily guessed. For example, @N$@r!128
- Passwords should be changed regularly, and users should avoid reusing passwords across multiple accounts which makes it more difficult to guess.
- Users should be locked out after a set number of wrong attempts.
- Password stop brute force attack.
DEFINE Authentication?
Authentication is used to ensure that only authorized users can access data.
TYPES OF AUTHENTICATIONS: -
* PASSWORD
* BIOMETRICS
* TWO-FACTOR AUTHENTICATION
WHAT ARE BIOMETRICS?
- Biometrics are statistical analyses of people’s physical and Behavioral characteristics.
- Authentication by identifying unique physical characteristics of a human such as fingerprints, facial recognition, or iris scans.
- It locks out the user after set number of failed attempts.
ADVANTAGES AND DISADVANTAGES OF BIOMETRICS
ADVANTAGES
* Physical and behavioral characteristics are harder to forge as they are unique to each individual.
* It is very difficult to fake a biometric password.
* A biometric password cannot be recorded by spyware.
* Physical characteristics cannot be lost.
* User Experience – Convenient and fast.
DISADVANTAGE
* Physical Disabilities- Injury or change in physical characteristics can be a barrier during authentication.
* Once lost cannot be recovered.
* They are expensive.
* Environmental factors can prevent scanning-poor light, makeup, etc.
What is Two-factor authentication (2FA)?
- It requires the users to provide two forms of authentication before accessing data, such as a password and a verification code sent to a mobile device.
- This is pre-set by the user.
- This provides an extra layer of security and reduces the risk of unauthorized access.
- Data has to be entered into the same system, so if attempted from a remote location, it will not be accepted.
Define firewall?
- A firewall can be software or hardware based.
- It monitors incoming and outgoing traffic between the computer and the network and keeps a log of the traffic.
- The firewall will compare the traffic with the criteria set by the user.
- It will set the blacklist and whitelist and block any traffic that does not meet the criteria set.
Define proxy servers.
- A proxy server can be software or hardware based.
- Proxy servers are used to hide a user’s IP address and location, making it more difficult for hackers to track them.
- They act as a firewall and can also be used to filter web traffic by setting criteria for traffic.
- Malicious content is blocked, and a warning message can be sent to the user.
- Proxy servers are a useful security measure for protecting against external security threats as they can direct traffic away from the server.
SIMILARITIES AND DIFFERENCE BETWEEN PROXY SERVER AND FIREWALL.
Similarities
* Check incoming and outgoing signals // filter traffic
* Store whitelist/blacklist
* Block incoming/outgoing signals and unauthorised access
* Keep a log of traffic
* Both can be hardware or software (or both)
Differences
* Proxy can hide user’s IP address, firewall does not hide the user’s IP address
* Proxy intention is to divert attack from server, firewall is to stop unauthorised access
* Proxy protects a server, firewall protects individual computer
* Proxy processes client-side requests whereas firewall filters packets
* Proxy transmits website data to the user, but a firewall does not (it allows valid signals)
* Proxy allows faster access to a web page using cache, but a firewall does not (allow faster access or have cache)
* Proxy can hide internal network from internet, but a firewall cannot
What is Automating Software Updates?
- Automating software updates ensures that software systems are up to date with the latest security patches, which helps to prevent security threats.
- This is especially important for operating systems and software that are frequently targeted by hackers.
- It does this by scanning the Internet for known updates to software that are installed on the computer.
- If any updates are found, these can either be installed automatically or notify the user to install them.
Tell how communication gives you security.
Checking the spelling and tone of communications is important to prevent phishing attacks.
Tell how checking URL gives you security.
- Checking the URL attached to a link is another way to prevent phishing attacks.
- Hackers often use fake URLs to trick users into visiting fraudulent websites.
e.g., http://amaz.on.co.uk/ rather than http://amazon.co.uk/
Explain how Privacy settings give you security.
- Privacy settings are used to control the amount of personal information that is shared online.
- They are an important measure to prevent identity theft and other forms of online fraud.
- Users should regularly review their privacy settings and adjust them as needed.
Threats + Prevention
- Hacking - Passwords or Biometrics
- Malware -
- Viruses - Anti-virus software or Firewall
- Worms - Anti-malware
- Trojan horses - Anti-malware
- Spyware - Anti-spyware or 2-step verification or Firewall
- Ransomware - Anti-malware
- Brute - force - attack - Password
- Pharming - Checking URLs, Firewall,Proxy server
- Phishing - Checking URLs or Checking the tone of communication.
- Distributed Denial of services attack - Firewall or Email filters
- Data interception - Using WEP for wardriving
- Social engineering- Self awareness
WHAT IS DIGITAL CURRENCY?
A digital currency is a type of currency that exists only in electronic form and is not backed by any physical commodity or government.
- Only Exists Electronically
- Decentralised
- Used for Transactions
- Volatile
Examples include Bitcoin, Ethereum, Litecoin, and Ripple
DEFINE THE ROLE OF BLOCKCHAIN IN DIGITAL CURRENCY?
Blockchain is a digital ledger that records every transaction made with a particular digital currency
Each transaction is time-stamped and added to the blockchain in a permanent and unalterable way
Blockchain is a decentralised technology, meaning that it is not controlled by a single entity or authority
Instead, every participant in the network has a copy of the ledger and can verify the transactions independently
The blockchain is made up of “blocks” of transactions that are linked together in a “chain” using cryptographic algorithms
This creates a secure and tamper-proof record of every transaction made with the digital currency
Each transaction in the blockchain must be verified by multiple participants in the network
This verification process ensures that the transaction is legitimate and prevents any fraudulent activity
WHAT IS AN AUTOMATED SYSTEM?
An automated system is a combination of sensors,microprocessor and actuators that are designed and programmed to work automatically without any human help.
DEFINE SENSORS?
Sensors detect changes in the environment and convert them into electrical signals that can be processed by a microprocessor.
TYPES OF SENSOR
Acoustic
Accelerometer
Flow
Gas
Humidity
Infra-red
Level
Light
Magnetic field
Moisture
pH
Pressure
Proximity
Temperature
what does each measure
Acoustic
Sound levels
To detect changes in sound levels of industrial machinery
To monitor noise pollution
In security system to detect suspicious sounds
Accelerometer
Acceleration rate, tilt, vibration
Detecting sudden changes in vehicle movement and deploy safety features if needed
In mobile phones to detect orientation of the device
Flow
Rate of gas, liquid or powder flow
Detect changes in the flow through pipes in water system
Gas
Presence of a gas e.g. carbon monoxide
Detect levels of gas in confined spaces
Detect gas levels when fixing gas leaks
Humidity
Levels of water vapour
Monitor humidity in greenhouses
Infra-red
Detecting motion or a heat source
Security systems detecting intruders who break the beam
Measures heat radiation of objects - used by emergency services to detect people
Level
Liquid levels
Detects levels of petrol in a car tank
Detect levels of water in a water tank
Detect a drop in water levels due to a leak
Light
Light levels
Automatically switching on lights when it gets dark (street lights, headlights)
Magnetic field
Presence and strength
Anti-lock braking system
Monitoring rotating machinery such as turbines
Moisture
Presence and levels of moisture
Monitoring moisture in soil
Monitoring damp in buildings
pH
Acidity or alkaline
Monitoring soil to ensure optimum growing conditions
Monitor pHlevels in chemical processes
Pressure
Gas, liquid or physical pressure
Monitoring tyre pressure
Monitoring pressure in pipes during manufacturing process
Proximity
Distance
Monitoring position of objects in robotics
Used in safety systems to prevent objects colliding
Temperature
Temperature in Celsius, Fahrenheit or Kelvin
Used to maintain temperature in swimming pools
Used to control temperature in chemical processes
WHAT IS A MICROPROCESSOR?
Microprocessors analyse the signals from the sensors and make decisions based on pre-programmed logic.
What are actuators?
Actuators receive signals from the microprocessor and perform actions such as opening a valve or turning on a motor.
USES OF AUTOMATED SYSTEMS
- INDUSTRY
- TRANSPORT
- AGRICULTURE
- WEATHER
- GAMING
- SCIENCES
- LIGHTNING
Uses of automated system in INDUSTRY
Manufacturing: Automated systems are used in factories to assemble products, monitor quality control, and improve efficiency.
Inventory Management: Automated systems help track and manage inventory levels, ensuring that materials are ordered and restocked as needed.
USES of automated system IN TRANSPORT
Traffic Control: Traffic lights and control systems automate traffic flow to reduce congestion and improve safety.
Automated Guided Vehicles (AGVs): These self-driving vehicles are used in warehouses and factories for material handling.
USES of automated system in agriculture
Precision Farming: Automated systems are used in agriculture to optimise planting, irrigation, and harvesting based on data collected from sensors and drones.
Livestock Monitoring: Sensors track the health and location of livestock.
USES of automated system IN WEATHER
Weather Forecasting: Automated systems collect and analyse data from weather stations, satellites, and sensors to predict weather patterns and issue warnings.
USES of automated system in gaming
Game AI:Automated systems create non-player characters (NPCs) with artificial intelligence, enhancing the realism and challenge in video games.
Procedural Content Generation: Automated algorithms create game worlds, levels, and landscapes.
USES of automated system IN LIGHTNING
Home Automation: Automated lighting systems can adjust brightness and colour temperature based on user preferences or time of day.
Energy Efficiency: Lighting systems can automatically turn off or dim lights when not in use to save energy.
USES of automated system IN SCIENCES
Laboratory Automation: Automated systems are used in laboratories for tasks such as sample handling, data analysis, and high-throughput screening.
Observatory Control: Telescopes and scientific instruments can be automated for remote observations.
ADVANTAGES OF AUTOMATED SYSTEM IN INDUSTRY
Reduced labour costs
Improved efficiency and accuracy
Increased production rate - much faster than human operator
Keeps humans away from hazardous conditions.
DISADVANTAGES OF AUTOMATED SYSTEM IN INDUSTRY
High initial investment
Limited flexibility to changes in production processes
Maintenance costs can be high
Any computerised system can be subject to cyber attack.
ADVANTAGES OF AUTOMATED SYSTEM IN TRANSPORT
Improved safety and reliability
Reduced labour costs
Improved fuel efficiency
Improves the punctuality of public transports like trains.
DISADVANTAGE OF AUTOMATED SYSTEM IN TRANSPORT
High initial investment
May not be suitable for all types of transportation
Maintenance costs can be high
Cyber attacks
ADVANTAGES OF AUTOMATED SYSTEM IN AGRICULTURE
Increased efficiency in planting and harvesting crops
Improved crop yield and quality
Reduced labour costs
Disadvantages of automated system in agriculture
High initial investment
May not be suitable for all types of crops or terrain
Maintenance costs can be high
ADVANTAGES OF AUTOMATED SYSTEM IN WEATHER
Improved accuracy in weather prediction
Ability to issue warnings in a timely manner
Ability to collect large amounts of data quickly
DISADVANATGES OF AUTOMATED SYSTEM IN WEATHER
May be affected by external factors like interference or equipment failure
May not be 100% accurate all the time
May require continuous monitoring and calibration
ADVANTAGES OF AUTOMATED SYSTEM IN GAMING
- Improved speed and efficiency in game development
- Ability to create complex and interactive games
- Reduced labour costs
DISADVANTAGES OF AUTOMATED SYSTEM IN GAMING
- May not be suitable for all types of games or game development
- May require significant programming expertise
- May be affected by technical glitches or bugs
ADVANTAGES OF AUTOMATED SYSTEM IN SCIENCES
- Improved speed and accuracy in data collection and analysis
- Ability to carry out complex experiments
- Reduced labour costs
DISADVANTAGE OF AUTOMATED SYSTEM IN SCIENCES
- High initial investment
- May not be suitable for all types of experiments
- May require significant technical expertise
ADVANTAGES OF AUTOMATED SYSTEM IN LIGHTNING
- Improved energy efficiency
- Ability to program lighting to suit different needs
- Reduced labour costs
DISADVANTAGES OF AUTOMATED SYSTEM IN LIGHTNING
High initial investment
May not be suitable for all types of lighting needs
Maintenance costs can be high
WHAT IS ROBOTICS?
Robotics is an area of computer science that deals with the creation, design, and operation of robots.
Characterstics of robots
- Have a mechanical structure or framework
- Have electrical components
- Programmable
3 LAWS OF ROBOTICS
- A robot may not injure humans through action or inaction.
- A robot must obey commands given by humans.
- A robot must protect itself.
Roles of robots
INDUSTRY
Robots can be used in manufacturing and assembly lines to increase productivity and accuracy
Transport
Robots can be used in warehouses and logistics to move and transport goods
Agriculture
Robots can be used for tasks such as planting, harvesting, and spraying crops.
Medicine
Robots can be used in surgical procedures to increase precision and reduce risk of errors.
Domestic
Robots can be used for tasks such as vacuuming, lawn mowing, and cleaning.
Entertainment
Robots can be used as toys or in amusement parks to provide entertainment.
ADVANTAGES OF ROBOTICS
Increased productivity: robots can work continuously without breaks or fatigue SO other people dont need to do repetitive/mundane tasks.
Consistency and accuracy: robots can perform tasks with a high level of precision and accuracy such as performing surgical procedures.
Safety: robots can perform tasks that are dangerous or hazardous for humans
Cost-effective: robots can help reduce labour costs in the long run
Robots are prone tocyber attack and malfunction
What is ARTIFICIAL INTELLIGENCE?
AI is a branch of computer science dealing with the simulation of intelligent human behaviour by a machine , including: problem-solving, decision-making, natural language processing.
The aim of AI is to create systems that will perform tasks that would normally require human intelligence.
CHARACTERSTICS OF AI
AI is a collection of data and the rules that are stored to use that data. It also has the ability to reason and learn (uses machine learning) by adapting to its previous decision or mistakes so that it will not be made again. AI can also change its own rules or data to learn and adapt.
What is Expert Systems?
Are a form of AI that has been developed to mimic human knowledge and experience.
Application of Expert system
OIL AND MINERAL PROSPECTING
DIAGNOSIS OF PATIENT’S ILLNESS
TAX AND FINANCIAL CALCULATION
STRATEGY GAMES LIKE CHESS
Parts of Expert system
knowledge base - A database of facts to generate rules that are used to solve problems and make decisions.
rule base- Stores a set of rules or logic that is used by the inference engine to apply the knowledge/link the facts in the knowledge base to solve specific problems and draw conclusions.
inference engine- A program that applies the rules from the rule base to the facts in the knowledge base to solve problems.
Explanation system- Informs the user of the reasoning behind its conclusion and recommendation.
User interface- A way for users to interact with the system and provide input
ADVANTAGES OF EXPERT SYSTEM
They offer a high level of expertise.
They offer high accuracy and the results are consistent.
They have the ability to store vast amounts of ideas and facts.
Disadvantages of expert system
- The set up and maintenance cost are very high.
- They tend to give ‘cold’ responses which may not be appropriate in certain medical conditions.
- Users of expert systems need considerable training to ensure that the system is being used correctly.
Define machine learning?
Machine learning is a subset of AI that focuses on giving computers the ability to learn and improve from data, without being explicitly programmed.
The program has the ability to automatically adapt its own processes and/or data.
Uses algorithms to analyse data and identify patterns or relationships.
The system can learn from the data and improve its performance over time.
Can be supervised or unsupervised:
Supervised machine learning uses labelled data to train the system.
Unsupervised machine learning uses unlabelled data.
DIFFERENCE BETWEEN AI AND MACHINE LEARNING
AI
Represents simulated intelligence in a machine.
Machine learning
This is the practice of getting machines to make decisions without being programmed to do so.
AI
The aim is to build machines that are capable of thinking like humans.
Machine learning
The aim is to make machines that learn through data acquisition.
USES OF MACHINE LEARNING
CATEGORIZING SPAM EMAILS
DETECTION OF FRAUDULENT ACTIVITY
What are packets?
Information on the internet is broken down into packets and are created by TCP and transmitted over the internet.
Packets are small chunks of information/data.
Why information and data are broken down into packets?
Small chunks of data are easier and quicker to route over the internet than big chunks of data.
What do packets contain?
- packet header
- payload
- trailer