Professional Documents
Culture Documents
IX STD PRINTED NOTES
IX STD PRINTED NOTES
13. What are the two types of greetings. Explain it with example.(important)
Formal greetings are used if you do not know the person. It is used to greet senior,
elderly people or people with whom we have formal relations like teachers or
customers. This is used more often in schools, colleges and offices.
Ex. Good morning everybody! Good morning, Ma‟am! Good morning, Sir! Good
morning, everyone! Hello Sir. How are you? Very well. Thank you!.
Informal greetings are used when you talk to friends, family or a known person.
Ex. Hey! Hello or Hi! Hey! How are you doing? Hi! I am doing great! Hi! Good to
meet you.
PRO F06
Session 3: Self-confidence
1. What is Self –Confidence?
Self-confidence is a quality we build when we believe in our strength to succeed
anything we do in life. People who are confident believe that they can do anything
given to them in any situation.
2. What are the factors that affect self- confidence?
Ans. The factors that affect self-confidence are:
When we think we cannot do a particular work.
When we keep thinking of our past mistakes and feel bad about it, instead of
learning from them.
PRO F06
When we expect to be successful at the first attempt itself and do not try again.
When we are surrounded by people who have a negative attitude, which is
reflected in their speech.
2. List things you will do for personal grooming in each of CARE, WASH and
AVOID to keep clean.
Ans. The things necessary for personal grooming are:
CARE WASH AVOID
Keep your hair free Wash your hands Blow your nose/cough into a
frequently handkerchief to avoid spreading
germs
Rub oil/cream to take Take bath every day Keep your feet dry and change your
care of your skin socks every day
Brush your teeth daily Wash your clothes
regularly
Brush your teeth daily Wash your hair at least
every second day
Cut your nails every Wash your feet often
week
PRO F06
Session 6: Grooming.
1. What is grooming?
Grooming is the process of making yourself look neat, tidy and smart. The way you
dress, and groom can either send the message that you are confident, smart and sincere
or possess opposite qualities.
3. What are the key skills one should possess to use ICT?
Ans. The key ICT skills that you need are:
knowing how to operate computers
knowing how to browse the Internet for collecting, storing and disseminating
information.
4. Identify the following symbols and write the name in the blank space.
a. Phone
b. Calendar
PRO F06
c. Music
d. Clock
e. Photos
f. Messages
10. List the steps to search for information using a web browser.
Ans. The steps to search for information using a web browser are:
1. Open an Internet browser.
2. Type the topic on which you want information in the search box and hit the Enter
key.
3. The search results having the required information will be displayed.
11.What characters should the password have in e-mail address, to make it more
secure?
Ans. A password should be at least 8 characters long and contain letters,
numbers and specialcharacters (e.g.,$%#). This will make it more secure.
SESSION 1: ENTREPRENEURSHIP
1. What is Entrepreneurship?
An entrepreneur is a person who creates a new business, takes risks, brings new ideas
to start a business and is self employed.
Session 4
5. What are the Characteristics of Entrepreneurs?
Believe in hard work
Ability to take up risks
Money Management
Knowledge of the product and services and their need or demand in the
market
Effective planning and execution
Financial literacy
Adaptable and flexible to achieve the goals of enhancing quality and customer
satisfaction
General Al
General Al covers Al applications that could perform any
intellectual task with the same efficiency as that of a human.
This stage of Al is still in evolution, and researchers are working
towards developing machines having general Al.
Super Al
Super Al is the hypothetical stage of Al that aims to develop
systems which could beat human intelligence and which can
perform a task better than a human, For example, Al applications
that can learn, think, solve a puzzle, make judgements or even
communicate on their own come under super Al.
Reactive machines:
Reactive machines AI covers all simple and basic AI-enabled devices. These devices
do not have the capacity to store experience and knowledge for future actions. They
process only recent scenarios and react accordingly. Google‟s Alpha Go and IBM‟s
Deep Blue System are examples of reactive machines AI devices.
Limited-memory machines:
Limited memory machines are more powerful than reactive machines as these can
store past experiences knowledge for a short period of time Self-driving cars are the
most common example of limited-memory Al device. These cars can store the recent
speed of nearby cars, the distance of other cars, the speed limit and other information
to navigate the road. Theory of mind
PRO F06
Theory of mind:
Al is still in the development stage it aims to understand the human feelings and
people reactions and can even be able to interact socially the humans, Al researchers
are working towards the development such Al devices
Self-awareness:
Self-awareness Al will be the most powerful in the coming future. These Al machines
will have the power to beat human intelligence and will even have human qualities
such as consciousness, sentiments and self-awareness As of now, it just a vision of Al
researchers and does not exist in reality
25. List out the importance of Computer Vision and give examples of CV.
A huge amount of visual data in the forms of pictures and videos are being used.
▸ Face recognition: Websites such as Snapchat and Facebook use face-detection
algorithms to apply filters and recognise people in pictures.
▸ Image retrieval: Google Images uses content-based queries to search for relevant
images.
▸Biometric systems: These systems use methods such as fingerprint and face
matching for identification.
▸ Smart cars: CV is the main source of information to detect traffic signs and lights
and other visual features in case of self-driving cars.
Military and defence ;Drones and automated vehicles are a few examples of Al being
used by defence agencies of various countries. Thus, there is a great demand of
professionals, equipped with the knowledge of Al applications in military and defence
Marketing : We have already studied about the application areas of Al in the field of
marketing. Al professionals are required to develop more targeted, relevant, and
timely marketing programs to increase the sales and for customer satisfaction
PRO F06
Banking and finance - Al applications are majorly used for tasks such as fraud
detection, data exploration and predicting the financial trends Professionals are
required in the field of banking and finance to perform such tasks.
Game developer - As gaming is one major application area of Al, software
developers or game developers are in great demand to design games that keep the user
engaged and use the concept of Al
As you start collecting the photographs, you acquire data in a visual form. This data
now becomes the base of you security system. The data needs to be accurate and
reliable to ensure the efficiency of your system. This process is known as data
acquisition.
At this stage you try to interpret some useful information out of the data you have
acquired. For this, you explore the data and try to put it uniformly for better
understanding. This is known as data exploration.
To implement your idea, you now look at different Al-enabled algorithms which work
on computer vision (as you are working on visual data). You go through several
models and select the one which matches your requirements. After choosing the
model, you implement it. This is known as the modelling stage.
PRO F06
12. List out the free govenment opensourced data provided portals.
World Bank Open Data
WHO
Google Public Data Explorer
Registry of Open data om AWS
European Union Open Data Portal
data.gov.in (link)
India.gov.in (link)
US Census Bureau
Census India
Open library
All of the constituents of the Water Cycle are circled in this System Map. With the
help of arrows, the map depicts the cause and effect relationships between elements.
The arrowhead represents the effect‟s direction, while the (+ or -) indicates their
relationship. If the arrow with the + sign goes from X to Y, it suggests the two are
directly related.
That is, as X rises, Y rises as well, and vice versa. If the arrow, on the other hand, goes
with a – sign between X and Y, it signifies that both elements are inversely connected.
This means that while X increases, Y decreases, and vice versa.
Now, it‟s your turn to build your own System Map!
PRO F06
a. Column Chart – A column chart is a basic Visualization chart that uses vertical
columns to represent data series. Because column lengths are easy to compare, column
charts are an effective approach to demonstrate the changes in the data.
b.Bar Chart – A bar chart is a visual representation of category data. The data is
displayed in a bar chart with multiple bars, each representing a different category.
PRO F06
Artificial Intelligence
Deep Learning
Deep learning is a part of Artificial Intelligence that uses neural networks with
multilayer. Deep learning analyzes the data, learns the data and solves the problem the
PRO F06
same as a human. Deep learning requires the machine to be educated with a large
quantity of data in order to train itself.
Rule Based
Decision Tree in AI: The concept of Decision Trees is similar to that of Story
Speaker. It‟s a rule-based AI model that uses numerous judgments (or rules) to assist
the machine in determining what an element is.
Points to Remember
For a single dataset, there may be several decision trees that lead to correct prediction.
The most straightforward option should be selected.
Rules
Rule-based Approach
Data Answers
Machine-learning Approach :
In contrast, under the machine-learning approach, the developer feeds in data along
with the answers. The machine then designs its own algorithms and methodologies to
match the data with the answers and gives out the rules. This approach is commonly
used when the data is unknown/random or unlabeled.
Data
Machine-learning
Answers Approach Rules
9. Explain the structure and relationship between the Neural Network and Human
Nervous system.
The axon from a neuron sends an impulse to the synapse of another neuron. The
impulse received is then sent to the cell body (nucleus) through dendrites. The cell
body performs an activation function on the impulse received and then gives it to the
output axon, which passes it to the next neuron in the system. Now as we relate this
process with an artificial
neural network, we can see
that the input layer gets data
which it passes on to the nodes
in the hidden layer. The nodes
perform specific actions on the
data and pass the processed
information to the next layer.
In the end, the final processed
data reaches the output of the
system.
Dendrit : It takes input from the other
neuron in the form of electrical impulse.
Cell bod : It generates inferences received
form those inputs and decides what action
to take.
Axon terminal : It transmits the output in
the form of electrical impulse.
PRO F06
A typical neural networks contains a large number of artificial neurons called units,
arranged in a series of layers. The layers are as follows:
Input layer: It contains those units (artificial neurons) which receive input from the
outside world which the network will learn, recognize or otherwise process.
Output layer: It contains units that respond to the information about how the network
has learnt any task.
Hidden layer. These units are between the input and the output layers. The job of the
hidden layer is to transform the input into something that the output unit can use in
some way.
Most neural networks are fully connected, which means that each hidden neuron is
fully linked to every neuron in its previous layer (input) and also to every neuron in
the next layer (output).
1. What is program?
A computer program is a collection of instructions that perform a specific task when
executed by a computer. The purpose of programs is to make computer programs run
faster, safer, and more efficiently. Programs do everything in a computer: they read
and write data, manage memory, and perform calculations.
7. What is Numeric literals? What are the different types of numeric literals?
Numeric literals are the fixed numeric values used in the Python programs. These are
not changeable and are used as they are in the calculations.
Different types of numeric literals are:
Integer literals: These are the whole numbers without fraction or decimal point such
as 23,46,-78, etc.
Long literals: These are the integers with unlimited size. These are either in decimal
form, in octal form or in hexadecimal form.
Floating point literals: These are the numeric values with decimal points such as
45.65, 3423, 678.90, etc.
Complex literals: These are the complex numbers such as 2+ 31, 32+2), etc
12.What is Keywords?
Keywords are reserved words in Python that the Python interpreter uses to recognise
the program‟s structure. In Python, keywords are predefined words with specific
meanings. The keyword can‟t be used as a variable name, function name, or identifier.
Except for True and False, all keywords in Python are written in lower case.
Example of Keywords – False, class, finally, is, return, None, continue, for lambda,
try, True, def, from, nonlocal, while, and, del, global, not, with, as, elif, if, or, yield,
assert, else, import, pass, break, except, in, raise etc.
13.What is identifiers?
The identifiers are the words or names given to different objects such as variables,
functions, classes etc, in python. Identifiers are user-defined names given to different
objects. We only need to follow the naming rules to name different objects.
14.What is punctuators?
The punctuators referred to as separators in some programming languages are like
punctuation marks. These are used to separate tokens and organize statements in
python programs. Quotes „, “” ( ) @ , =
15.What is variables?
A variable is a name given to a memory location where some values are stored. The
values stored in variables can be of different types i.e., integer, float, string etc. A
variable is like a container that holds the values which can be used throught out a
program and it keeps on changing ,too.
There are a certain rules and regulations we have to follow while writing a variable
A number cannot be used as the first character in the variable name. Only a
character or an underscore can be used as the first character.
Python variables are case sensitive.
Only alpha-numeric characters and underscores are allowed.
There are no special characters permitted.
**************************************************************************
PRO F06
.