AI/ML-Day1

🧠 Day 1 Summary – Python Basics for AI/ML

✅ Output Statements

  • print() – displays output.

  • end=" " – prevents new line after print.

  • sep="," – separates items with a character.

✅ Input & Type Casting

  • input() always returns a string.

  • Add strings = concatenation ("5" + "10" = "510").

  • Use int() for number input:
    num = int(input("Enter a number: "))

✅ Variables & Data Types

  • int, float, str, bool are common types.

  • Use type(variable) to check the type.

...

See on Wikiteka »

Xyz a

What is a Security Mechanism?

A security mechanism is a method, tool, or procedure used to protect systems, networks, software, and data from unauthorized access, damage, or theft. It enforces security policies and ensures confidentiality, integrity, and availability (often called the CIA triad) of information.
Common Types of Security Mechanisms:
1. Authentication
Verifies the identity of a user or system.
Examples: Passwords, biometric scans, two-factor authentication (2FA).
2. Authorization
Determines

...

See on Student Notes »

Game

In game programming, transformation refers to the process of changing an object's position, rotation, or scale within a game world. These changes are typically represented using mathematics, especially vectors and matrices.
There are three main 

types of transformations:
1. Translation
Moves an object from one place to another.
Example: Moving a player forward by 5 units.
In 2D/3D games, this is often done by adding a vector to the object’s current position.
2. Rotation
Rotates an object around a point

...

See on Student Notes »

AI 10

Artificial Intelligence (AI) is the simulation of human intelligence in machines that are programmed to think, learn, and make decisions. AI systems can perform tasks that typically require human intelligence, such as recognizing speech, understanding language, solving problems, and making predictions.
✅ Main Categories of AI
AI can be categorized in two main ways:
I. Based on Capabilities
1. Narrow AI (Weak AI)
Designed for a specific task
Examples: Siri, Google Assistant, facial recognition systems
2.

...

See on Student Notes »

PSYC100 Exam 3

Heuristics & Biases

Availability Heuristic - Judging based on how easy it is to think of examples or occurrences

Representativeness Heuristic - Judging based on how it resembles another event

Numerosity Heuristic - Judging quantity/probability based on the number of pieces it has been divided into

Anchor and Adjust Bias - Making a guess by anchoring and pivoting around a previous guess. Bias towards under-correction

Above Average Effect - The finding that most people often think that they...

See on Student Notes »

Abdul 2

Project Stakeholder – Short Note:

A project stakeholder is any individual, group, or organization that has an interest in or is affected by the outcome of a project. Stakeholders can be internal (like team members, managers, or departments) or external (such as clients, suppliers, investors, or regulatory bodies). They may influence project decisions, provide resources, or be impacted by project deliverables. Effective communication and management of stakeholders are crucial to a project's success,

...

See on Student Notes »

Abdul

1.Verification checks whether the product is built right.
Validation checks whether the right product is built.
2.Verification ensures the software meets specifications.
Validation ensures the software meets user needs.
3.Verification is a static process (no code execution).
Validation is a dynamic process (involves running code).
4.Verification is done during development phases.
Validation is done after development (testing phase).
5.Verification involves reviews, walkthroughs, inspections.
Validation involves

...

See on Student Notes »

LLM Cheatsheet

🧠 LLM Cheatsheet

Everything you need to recall about Large Language Models — in one page.


🚀 What is an LLM?

A Large Language Model (LLM) is a deep learning model trained on vast amounts of text data to understand, generate, and manipulate human language.

  • Examples: GPT-4, Claude, LLaMA, Gemini, Mistral, Falcon

  • Core Technology: Transformer Architecture


🏗️ Core Components

Component Description
Tokenizer Converts text → tokens (subwords, words) → numerical input
...

See on Student Notes »

gigftjhgyvh

1.Explain EC Security requirements 

==E-commerce security refers to the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. Because financial transactions and sensitive information (like credit card numbers, passwords, and personal details) are involved, strong security is essential in e-commerce systems. */key EC security requirements, : Authentication : Ensures that the parties involved (both buyer and seller) are who they claim to be. Authorization Grants

...

See on Wikiteka »