1.7.3
Artificial Intelligence
Test your knowledge with free interactive questions on Seneca — used by over 10 million students.
Artificial Intelligence
AI deals with creating machines that think and act like humans. It is used plenty in daily life, from industry to personal use.

What is artificial intelligence (AI)?
- AI is a branch of computer science that involves computers simulating intelligent behaviour.
- They are designed to perform tasks that normally require human intelligence, such as reasoning, problem-solving, decision-making, and learning from experience.
- Examples: voice assistants, self-driving cars, medical diagnosis systems

Characteristics of AI
- Data collection:
- AI systems gather large amounts of data and have set rules for using the data (such as logic or algorithms).
- Reasoning ability:
- AI systems can process information logically to solve problems or make decisions.
- Ability to learn and adapt:
- AI systems can automatically improve their performance over time without being explicitly reprogrammed.

Expert systems
- An expert system is a type of AI that is designed to act like a human expert in a specific field (e.g. a medical diagnosis system suggesting treatments)
- Components:
- Knowledge Base: Stores facts and information about a specific subject
- Rule Base: Contains a set of "if-then" rules
- Inference Engine: Applies rules from the rule base to the facts in the knowledge base to make conclusion
- Interface: A part that allows human users to interact with the system

Machine learning
- Machine learning is a subfield of AI, where a program can automatically adapt its processes or data.
- Instead of being programmed for every scenario, the machine learns from large amounts of new data and experience.
- The more data it is given, the better it becomes at making decisions.
- Example: spam email filters, recommendation systems (Netflix, YouTube)

AI in everyday life
- Transport:
- Self-driving cars, traffic prediction
- Medicine:
- Diagnosing diseases, drug discovery
- Business:
- Chatbots, fraud detection
- Entertainment:
- Personalised recommendations, gaming AI
1Computer Systems
1.1Data Representation
1.1.1Binary Numbers1.1.2Negative Binary Numbers1.1.3Hexadecimal1.1.4Using Hexadecimal1.1.5Converting Binary & Hexadecimal1.1.6Converting Denary & Hexadecimal1.1.7Capacity1.1.8Calculating Capacity Requirements1.1.9Binary in Computer Systems1.1.10Data Compression1.1.11Run Length Encoding1.1.12File Formats
1.2Data Transmission
1.3Hardware
1.3.1Elements of Computer Systems1.3.2Types of Computer System1.3.3Von Neumann Architecture1.3.4The Fetch, Decode, Execute Cycle1.3.5Factors Affecting CPU Performance1.3.6Computational Logic1.3.7Input Devices1.3.82D & 3D Scanners1.3.9Code Readers1.3.10Solid State Storage1.3.11Magnetic Storage1.3.12Examples of Magnetic Storage1.3.13Optical Storage1.3.14Examples of Optical Storage1.3.15Types of Optical disk1.3.16Storage Requirements1.3.17Translation - Compilers1.3.18Translation - Interpreters1.3.19Translation - Assemblers1.3.20Acoustic Sensors1.3.21Flow Sensors1.3.22Gas Sensors1.3.23Humidity Sensors1.3.24Infrared Sensors1.3.25Level Sensors1.3.26Light Sensors1.3.27Magnetic Field Sensors1.3.28Moisture Sensors1.3.29pH Sensors1.3.30Pressure Sensors1.3.31Proximity Sensors1.3.32Temperature Sensors1.3.33Network Hardware
1.5The Internet & its Uses
1.6Cyber Security
1.6.1Forms of Attack1.6.2Penetration Testing1.6.3Types of Malware1.6.4How Malware Spreads1.6.5Protecting Against Malware1.6.6Information Security1.6.7Structured Query Language (SQL) Injection1.6.8Firewalls1.6.9Authentication: User Access Levels1.6.10Authentication: Passwords1.6.11Social Engineering1.6.12Phishing1.6.13Denial of Service Attacks
1.7Automated & Emerging Technologies
2Algorithms, Programming & Logic
2.1Algorithm Design & Problem Solving
2.1.1Computational Thinking - Abstraction2.1.2Computational Thinking - Decomposition2.1.3Computational Thinking - Algorithmic Thinking2.1.4Pseudocode2.1.5Flow Diagrams2.1.6Interpreting, Correcting & Completing Algorithm2.1.7Correcting Algorithms2.1.8Completing Algorithms2.1.9Testing2.1.10Types of Testing2.1.11Test Plans2.1.12Validation & Sanitation2.1.13Authentication & Contingencies
2.2Programming
2.2.1Programming Fundamentals - Variables & Constants2.2.2Programming Fundamentals - Comments2.2.3Programming Fundamentals - Input & Output2.2.4Data Types2.2.5Casting2.2.6Controlling Program Flow - Sequence2.2.7Controlling Program Flow - Selection2.2.8Controlling Program Flow - Iteration2.2.9Modularity - Subroutines2.2.10Modularity - Scope2.2.11Arrays
Jump to other topics
1Computer Systems
1.1Data Representation
1.1.1Binary Numbers1.1.2Negative Binary Numbers1.1.3Hexadecimal1.1.4Using Hexadecimal1.1.5Converting Binary & Hexadecimal1.1.6Converting Denary & Hexadecimal1.1.7Capacity1.1.8Calculating Capacity Requirements1.1.9Binary in Computer Systems1.1.10Data Compression1.1.11Run Length Encoding1.1.12File Formats
1.2Data Transmission
1.3Hardware
1.3.1Elements of Computer Systems1.3.2Types of Computer System1.3.3Von Neumann Architecture1.3.4The Fetch, Decode, Execute Cycle1.3.5Factors Affecting CPU Performance1.3.6Computational Logic1.3.7Input Devices1.3.82D & 3D Scanners1.3.9Code Readers1.3.10Solid State Storage1.3.11Magnetic Storage1.3.12Examples of Magnetic Storage1.3.13Optical Storage1.3.14Examples of Optical Storage1.3.15Types of Optical disk1.3.16Storage Requirements1.3.17Translation - Compilers1.3.18Translation - Interpreters1.3.19Translation - Assemblers1.3.20Acoustic Sensors1.3.21Flow Sensors1.3.22Gas Sensors1.3.23Humidity Sensors1.3.24Infrared Sensors1.3.25Level Sensors1.3.26Light Sensors1.3.27Magnetic Field Sensors1.3.28Moisture Sensors1.3.29pH Sensors1.3.30Pressure Sensors1.3.31Proximity Sensors1.3.32Temperature Sensors1.3.33Network Hardware
1.5The Internet & its Uses
1.6Cyber Security
1.6.1Forms of Attack1.6.2Penetration Testing1.6.3Types of Malware1.6.4How Malware Spreads1.6.5Protecting Against Malware1.6.6Information Security1.6.7Structured Query Language (SQL) Injection1.6.8Firewalls1.6.9Authentication: User Access Levels1.6.10Authentication: Passwords1.6.11Social Engineering1.6.12Phishing1.6.13Denial of Service Attacks
1.7Automated & Emerging Technologies
2Algorithms, Programming & Logic
2.1Algorithm Design & Problem Solving
2.1.1Computational Thinking - Abstraction2.1.2Computational Thinking - Decomposition2.1.3Computational Thinking - Algorithmic Thinking2.1.4Pseudocode2.1.5Flow Diagrams2.1.6Interpreting, Correcting & Completing Algorithm2.1.7Correcting Algorithms2.1.8Completing Algorithms2.1.9Testing2.1.10Types of Testing2.1.11Test Plans2.1.12Validation & Sanitation2.1.13Authentication & Contingencies
2.2Programming
2.2.1Programming Fundamentals - Variables & Constants2.2.2Programming Fundamentals - Comments2.2.3Programming Fundamentals - Input & Output2.2.4Data Types2.2.5Casting2.2.6Controlling Program Flow - Sequence2.2.7Controlling Program Flow - Selection2.2.8Controlling Program Flow - Iteration2.2.9Modularity - Subroutines2.2.10Modularity - Scope2.2.11Arrays
Practice questions on Artificial Intelligence
Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.
- 1What is artificial intelligence (AI)?Multiple choice
- 2Components of an expert system:Fill in the list
- 3Which is an example of machine learning use?Multiple choice
Unlock your full potential with Seneca Premium
Unlimited access to 10,000+ open-ended exam questions
Mini-mock exams based on your study history
Unlock 800+ premium courses & e-books