CH #5 Solved Exercise

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

FAZAIA INTER COLLEGE KALLAR KAHAR

Unit #5 Solved Exercise

Multipul choice Questions (MCQs)

1 2 3 4 5 6 7 8 9 1
a c B d a a c a d c

Give short answer of the following Short Response Questions (SRQs).


1. How IOT can enhance our daily life?
IoT enhances our daily life by connecting everyday devices to the internet, allowing for smart homes
where you can control appliances remotely, health monitoring through wearable’s, improved
transportation with connected vehicles, and energy management systems to optimize usage. This
connectivity increases convenience, efficiency, and security in various aspects of life.

2. Provide 3 examples of WSNs used in IOT system.

 Smart Agriculture: WSNs are used to monitor soil moisture, temperature, and humidity levels,
helping farmers optimize water usage and improve crop yields.
 Smart Cities: In smart city systems, WSNs are employed for monitoring air quality, traffic flow,
and waste management to improve urban living conditions.
 Health Monitoring: WSNs are used in wearable devices to continuously monitor vital signs like
heart rate, blood pressure, and body temperature, allowing for real-time health tracking.

3. Differentiate between public cloud model and private cloud model.


1. Public Cloud:
 A cloud service offered by third-party providers over the internet.
 Resources like storage and computing power are shared among multiple users (tenants).
 It is cost-effective and scalable but may have limited control and security.
 Examples include AWS, Microsoft Azure, and Google Cloud.
2. Private Cloud:
 A cloud service used exclusively by a single organization.
 It offers dedicated resources and enhanced security, as the infrastructure is either hosted on-
premises or by a private third-party provider.
 More control and customization but generally more expensive than public clouds.
 Used by businesses with sensitive data or strict security requirements.

4. What is Bolckchain? Why data stored in Blockchain is secure?


Blockchain is a decentralized and distributed digital ledger that records transactions across multiple
computers. It stores data in "blocks," which are linked together using cryptography. Once a block is
filled with data, it is locked and added to the chain, making the information permanent.
Why is data stored in Blockchain secure?
1. Decentralization: Data is not stored in a single location but across a network of computers,
making it difficult for hackers to target one source.
2. Immutability: Once data is added to a block, it cannot be altered without changing all
subsequent blocks, making tampering extremely difficult.
3. Cryptography: Blockchain uses cryptographic techniques like hashing and digital signatures to
ensure data integrity and security.
4. Consensus Mechanisms: Transactions are validated by multiple participants (nodes) in the
network through consensus algorithms, ensuring trust and accuracy.

5. Why integration of Blockchain and IOT? Is beneficial?


The integration of Blockchain and IoT is beneficial because it enhances security, transparency, and
efficiency in IoT systems. Here are the key benefits:

 Enhanced Security: Blockchain secures IoT devices through decentralized storage and
cryptography, reducing vulnerability to attacks.
 Transparency: Blockchain provides a transparent, tamper-proof ledger, ensuring trust and
traceability in IoT data exchanges.
 Smart Contracts: Automates IoT processes through smart contracts, enabling devices to
trigger actions based on predefined conditions.
 Decentralized Control: Eliminates the need for a central authority, allowing IoT devices to
function independently with better fault tolerance.
 Data Integrity: Ensures IoT data is authentic and immutable, which is critical for decision-
making in industries.

6. Define Permissioned Blockchain Network.


A Permissioned Blockchain Network is a type of Blockchain where access and participation are
restricted to authorized entities. Unlike public Blockchains, where anyone can join and participate,
permissioned Blockchains require approval from a central authority or consortium for users to access
the network.
Key characteristics include:
1. Controlled Access: Only approved participants can join and interact with the network.
2. Privacy: Data visibility can be restricted to authorized parties, enhancing confidentiality.
3. Efficiency: Typically faster and more scalable than public blockchains due to fewer nodes and
controlled consensus mechanisms.
4. Governance: Managed by a central authority or consortium that oversees network rules and
operations.

Give long answer of the following Extended Response Questions (ERQs).

1. What is blockchain teccnology? Describe in detail how transactions are processed using
Blockchain technology.

Blockchain Technology is a decentralized digital ledger that records transactions across multiple
computers in a secure, transparent, and immutable way. Data is stored in "blocks" that are linked
together in a "chain," and each block contains a list of transactions, a timestamp, and a cryptographic
hash of the previous block.
How Transactions are Processed Using Blockchain Technology:

1. Transaction Initiation: A user initiates a transaction, which is broadcast to the network of nodes
(computers).
2. Transaction Verification: Nodes validate the transaction by checking its details and ensuring that
it meets network rules. This often involves consensus mechanisms to confirm the transaction's
legitimacy.
3. Block Formation: Verified transactions are grouped into a new block. The block includes the
transaction data, a timestamp, and a hash of the previous block.
4. Block Validation: The new block is sent to the network for validation. Nodes use consensus
algorithms to agree on the block's validity.
5. Block Addition: Once validated, the new block is added to the existing blockchain. This involves
linking it to the previous block via a cryptographic hash.
6. Transaction Confirmation: The transaction is confirmed once the block is added to the blockchain
and becomes part of the permanent ledger.

2. Briefly explain the role of following technologies that enable IOT.


a. Cloud computing b. Communication protocols c. Embedded system

a. Cloud Computing: Cloud Computing is the delivery of different services through the Internet.
These resources include tools and applications like data storage, servers, databases, networking, and
software. It enables the collection, analysis, and management of large amounts of data generated by
IoT devices, allowing for real-time data access and applications.

b. Communication Protocols: IoT communication protocol is a set of rules that enable devices or
systems to communicate and exchange data effectively. These protocols ensure that data is
transmitted accurately, securely, and in the correct format between IoT devices and end users.

c. Embedded Systems: These are specialized computing systems integrated into IoT devices to
perform specific functions. They include sensors, processors, and communication modules, enabling
devices to collect data, process it locally, and communicate with other devices or networks.

3. Criticize the negative impacts of AI system in the domain of education and learning of students.
Negative Impacts of AI Systems in Education:
1. Reduced Personal Interaction: AI systems can reduce human interaction, which is crucial for
developing social skills and emotional intelligence. Overreliance on AI may lead to diminished
teacher-student relationships and less personalized guidance.
2. Bias and Inequality: AI may reinforce existing biases, leading to unfair treatment and reinforcing
educational inequalities.
3. Data Privacy Issues: The use of AI in education involves collecting large amounts of student data.
This raises concerns about data privacy and security, as sensitive information could be misused or
inadequately protected.
4. Technology Dependence: Overuse of AI tools can lead to a dependency on technology, potentially
reducing students' problem-solving skills and critical thinking abilities. Students might rely on AI
for answers rather than engaging deeply with the learning material.
5. Cost and Accessibility: Expensive AI tools may not be accessible to all students, particularly those
in low-income or rural areas. This creates the educational gap between students. Expensive AI
tools may not be accessible to all students, particularly those in low-income or rural areas.
6. Job Displacement: AI systems that automate administrative tasks or deliver content may reduce the
need for certain teaching positions, potentially leading to job losses for educators.
4. Examine the reasons behind the conflicting requirements among stakeholders during the
development of AI system

 Different Objectives: Stakeholders often have varying goals. For example, developers may
focus on technical performance, while educators prioritize usability and learning outcomes,
leading to conflicting priorities.
 Diverse Perspectives: Users, policymakers, and technical experts might have different views
on what the AI system should achieve. For instance, policymakers may emphasize ethical
considerations, while users focus on practical functionality.
 Budget Constraints: Financial limitations can lead to disagreements between stakeholders
about which features are feasible or essential. For example, a school might want advanced
features that are beyond its budget.
 Privacy and Security Concerns: Balancing data privacy with system functionality can create
conflicts. Stakeholders concerned with security may prioritize data protection, while others
might seek more open data access for analysis and improvement.
 Ethical and Bias Issues: Dealing with biases in AI can be tricky because different people have
different ideas about how to fix them. This can lead to disagreements on how to build and use
the AI system fairly.
 Regulatory Compliance: Ensuring an AI system meets laws can be difficult because people
may interpret rules differently. For example, one person might think data should be private,
while another might have a different view. These conflicting opinions can make it hard to
agree on how to design the AI system to follow all regulations.

5. Incorporating varying priorities from teachers, learners, and programmers can significantly
enhance a cutting-edge language learning system:

To create a better language learning system:

1. Teachers: Include features for tracking progress and giving feedback to match teaching goals.
2. Learners: Make the system interactive and personalized with fun activities and lessons suited
to each learner's needs.
3. Programmers: Ensure the system is technically sound and can work well with other tools.

Adding AI:

 Personalized Learning: AI can customize lessons based on each learner's level.


 Speech Practice: AI can give real-time feedback on pronunciation.
 Adaptive Content: AI can adjust difficulty based on learner performance.
 Engagement: AI can create interactive activities and virtual tutors for extra help.

You might also like