0% found this document useful (0 votes)
21 views5 pages

Experiment No 1

Uploaded by

riliha4379
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views5 pages

Experiment No 1

Uploaded by

riliha4379
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

National University Of Modern Languages

SUBMITTED BY:
AYESHA SHAKEEL

CLASS:
BS-IT-1ST

ROLL NO:
NUML-F24-74584

SUBMITTED TO:

SIR UMAR GHANI


LAB TASK
Experiment no 1:
1. Artificial intellengence
Artificial intelligence (AI) involves creating systems that can perform tasks typically requiring
human intelligence. This includes understanding natural language, recognizing patterns, and
making decisions based on data. AI is used in various fields, such as healthcare, finance, and
entertainment, improving efficiency and enabling new capabilities. Technologies like machine
learning allow systems to learn from data, while natural language processing helps them
understand and generate human language.

• Learning: AI systems can analyze data and improve their performance over time through
techniques like machine learning.
• Reasoning: They can draw conclusions and make decisions based on available
information, often using algorithms to evaluate options.
• Understanding Language: Natural language processing (NLP) allows AI to understand
and generate human language, making interactions with users more intuitive.
• Perception: AI can interpret sensory data, such as images and sounds, through computer
vision and audio processing.
• Problem-Solving: AI can tackle complex problems, often finding solutions more quickly
than humans can.
Components of AI
• Machine Learning (ML): This subset of AI involves algorithms that allow systems to
learn from data without being explicitly programmed. ML can be divided into:
o Supervised Learning: The model is trained on labeled data, where the desired
output is known (e.g., spam detection).
o Unsupervised Learning: The model analyzes data without labeled responses,
finding patterns or groupings (e.g., customer segmentation).
o Reinforcement Learning: The model learns by interacting with an environment
and receiving feedback based on its actions (e.g., training game-playing agents).
• Natural Language Processing (NLP): NLP enables machines to understand, interpret,
and generate human language. This includes tasks like sentiment analysis, language
translation, and chatbots that can engage in conversation.
• Computer Vision: This area focuses on enabling machines to interpret and understand
visual information from the world. Applications include facial recognition, object
detection, and autonomous vehicle navigation.
• Robotics: AI in robotics involves creating machines that can perform tasks in the
physical world, often integrating sensory data to navigate and manipulate objects.
• Expert Systems: These are AI programs that mimic the decision-making abilities of a
human expert in a specific field, using rules and knowledge bases to solve complex
problems (e.g., medical diagnosis systems).

Applications of AI

• Healthcare: AI is transforming diagnostics, personalized medicine, and drug discovery.


Systems can analyze medical images, predict patient outcomes, and assist in treatment
planning.
• Finance: In finance, AI is used for fraud detection, algorithmic trading, and personalized
financial advising, analyzing vast amounts of data to identify trends and risks.
• Customer Service: AI chatbots and virtual assistants help businesses manage customer
inquiries efficiently, providing quick responses and freeing human agents for more
complex issues.
• Autonomous Vehicles: Self-driving cars use AI to interpret sensory data, make real-time
decisions, and navigate safely.
• Entertainment: AI algorithms recommend content on streaming platforms, personalize
user experiences in video games, and even create music or art.\

Future of AI

The future of AI holds great promise, with advancements expected in general intelligence
(machines that can perform any intellectual task a human can) and ethical AI development.
Ongoing research focuses on making AI more interpretable, fair, and aligned with human values.

2. Cyber security
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks,
unauthorized access, and damage. It encompasses a wide range of technologies, processes, and
practices designed to safeguard sensitive information and ensure the integrity, confidentiality,
and availability of data.

Components of Cybersecurity

1. Network Security: Protects networks from unauthorized access and attacks. This
includes firewalls, intrusion detection systems (IDS), and virtual private networks
(VPNs).
2. Application Security: Focuses on keeping software and devices free from threats. This
involves secure coding practices, regular updates, and testing for vulnerabilities.
3. Information Security: Protects data integrity and privacy, both in storage and transit.
Encryption and data masking are common techniques used.
4. Endpoint Security: Secures endpoints such as computers, mobile devices, and servers.
This often involves antivirus software and endpoint detection and response (EDR) tools.
5. Cloud Security: Addresses security concerns related to cloud computing, ensuring that
data stored in the cloud is protected from breaches and leaks.

Common Threats

1. Malware: Malicious software designed to harm, exploit, or otherwise compromise


systems, including viruses, worms, and ransomware.
2. Phishing: A tactic where attackers trick individuals into providing sensitive information
by pretending to be a trustworthy entity, often through email or fake websites.
3. DDoS Attacks: Distributed denial-of-service attacks overwhelm a system with traffic,
causing it to become unavailable.
4. Insider Threats: Security risks posed by individuals within an organization, whether
intentionally malicious or accidental.
Best Practices for Cybersecurity

1. Regular Updates: Keeping software and systems updated to patch vulnerabilities.


2. Strong Password Policies: Encouraging the use of complex passwords and multi-factor
authentication (MFA) to enhance security.
3. Security Awareness Training: Educating employees about potential threats and safe
online practices.
4. Data Backup: Regularly backing up data to recover from ransomware attacks or data
loss.

The Future of Cybersecurity

As technology evolves, so do the threats. Emerging trends include:

• Artificial Intelligence in Cybersecurity: AI can help identify threats faster and


automate responses.
• IoT Security: As more devices connect to the internet, securing the Internet of Things
becomes critical.
• Regulatory Changes: Ongoing developments in data protection laws will shape
cybersecurity strategies.

You might also like