data science

What are data science and types?


Contents


Artificial intelligence
Machine learning [MI]
Cyber security
Coding Python, C++, Java, Javascript, HTML


A LIST OF DATA SCIENTISTS OF DIFFERENT KINDS


Data scientists go under many different names in different organisations. The following section examines various data scientists and the corresponding tasks they perform:


1) Scientists in machine learning


Researchers in machine learning are interested in experimenting with fresh ideas and evaluating novel procedures. They develop algorithms used for demand forecasting, massive data analysis, and suggesting pricing strategies and items.


2) Statistician


To achieve business objectives, statisticians work with both theoretical and applied statistics. The ability to gain knowledge in specific data scientist domains can be extrapolated from the fact that statisticians possess some of the key abilities, such as confidence intervals and data visualisation.


3) Actuarial Scientist


Actuarial scientists occupy a special position because their expertise is dependent on data analysis to gauge and control the outcome. Excellent command of statistical and mathematical techniques is necessary for actuarial science.


4) Mathematicians


Due to their extensive expertise in operational research and applied mathematics, mathematicians are becoming more and more accepted in the corporate sector. Businesses seek their heavenly services to implement optimization and analytics in a variety of areas, including inventory management, supply chain management, pricing algorithms, etc.


5) Data engineers


The task of designing, constructing, and managing the information collected by an organisation falls to data engineers. They are given the task of establishing a data handling infrastructure to analyse and process data by the needs of a company.


6) Programming Analysts for Software


Programming-based calculations are a skill of software programmers. They adopt cutting-edge programming languages like Python and R, which offer data analytics and visualisations.


7) Digital Analytics Advisor


To succeed, a digital analytics expert needs to possess both strong commercial and marketing skills in addition to technological aptitude. Key capabilities include setting up websites to gather data, sending it to analytics tools, and then visualising it through filtering, processing, and developing dashboards.


8) Experts in business analytics


Business analysis is both an art and a science, and one cannot be led by either business savvy or in-depth information gained from data analysis. Business analysts focus on critical decision-making procedures such as dashboard creation, ROI analysis, high-level database design, ROI optimization, etc.


9) Spatial Data Analyst


Spatial engineers are a distinct subset of data scientists that have emerged as a result of the growing use of GPS devices. Spatial data is used by several applications, including Google Maps, Bing Maps, vehicle navigation systems, and others, for navigation, localization, site selection, etc.


10) Quality Engineer


In the manufacturing sector, statistical process control has a connection to quality analysts. Modern analytical technologies have expanded this position, enabling data scientists to create interactive visualisations that are essential decision-making inputs for sectors including business, management, sales, and marketing. (Data Science)

UI/UX type

Type UI UX design?


CONTACT


1. What is a UI/UX design?
2. Type UI/UX design?
3. what are skills in UX design?
4. What is skills UI design?
5. Top best software UI/UX design.
6. What are UX design examples?
7. What are UI design examples?
8. A career in UX/UI products design.
9. How Important is UI/UX Design for Your Business?


What are the types of UI?


The UI (UI) is the mark of human-PC cooperation and correspondence in a gadget. This can incorporate presentation screens, consoles, a mouse and the presence of a work area. It is also how a client communicates with an application or a site. Types of user interfaces

The various types of user interfaces include

• Graphical user interfaces ((GUI)

• Command-line user interfaces   (CLI)

• Voice user interfaces  (VUI)

• Form-based user interfaces

Natural language


What are the types of UX design?


UX planners are generalists who cover a tad bit of everything in the whole plan process. As a UX originator, you’ll figure out your clients’ necessities, produce thoughts to tackle their concerns, model plans lastly test them with clients. All in all, UX architects take part in each of the 5 periods of the plan thinking process.

UX designer

Product designer

Visual designer

UX researcher

Content strategist; and.

UX unicorn (yes, we’re not kidding about this job title).


What’s the distinction between UI and UX?


The distinction between User Interface (UI) and User Experience (UX) is that UI alludes to the tasteful components by which individuals cooperate with an item, while UX is about a client’s experience with an item or administration. Thus, UI centres around the visual point of interaction components, for example, typography, colours, and menu bars, from there, the sky is the limit, while UX centres around the client and their excursion through the item.

LINK = More about information on UI design

LINK = More about information UX design

network security

What is a network security and type?

 


contents


What is a Cyber security definition, type and examples?
What is a network security and type?
What is application security and types?
What is a IoT (Internet of Things) security, for example?
What is Ethical Hacking, types, and what example?
Cyber security advantages and disadvantages.
What is a Basic framework network protection?
What is firewall for important cyber security?
What is a role encryption in cyber security?
What is a cyber security executive order?
Top ten future careers in cyber security.
What is a role coding in cyber security?


[A]. WHAT IS NETWORK SECURITY?


Network Security includes access control, infection and antivirus programming, application security, network investigation, kinds of organization related security (endpoint, web, remote), firewalls, VPN encryption and then some.


[B]. ADVANTAGES OF NETWORK SECURITY.


Network Security is imperative in safeguarding client information and data, keeping shared information secure and guaranteeing dependable access and organization execution as well as insurance from digital dangers. An all-around planned network security arrangement lessens upward costs and defends associations from expensive misfortunes that happen from an information break or other security occurrence. Guaranteeing genuine admittance to frameworks, applications and information empower business tasks and conveyance of administrations and items to clients.


[C]. TYPES OF NETWORK SECURITY PROTECTIONS.


(1). Firewall
Firewalls control approaching and active traffic on networks, with foreordained security rules. Firewalls keep out hostile traffic and are a vital piece of day to day processing. Network Security depends intensely on Firewalls, particularly Next-Generation Firewalls, which centre around impeding malware and application-layer assaults.

(2). Network Segmentation
Network division characterizes limits between network fragments where resources inside the gathering have a typical capacity, hazard or job inside an association. For example, the edge door sections an organization network from the Internet. Possible dangers outside the organization are forestalled, guaranteeing that an association’s delicate information stays inside. Associations can go further by characterizing extra inward limits inside their organization, which can give further developed security and access control.

{The different types of network security include}

#1) Antivirus and Anti-malware Software:

The security programming that is utilized to safeguard our framework from infections, Trojan assaults, worms and so on is an antivirus against malware programming.
This product filters the framework and organization for malware and Trojan assault each time when another record is presented in the framework. It additionally identifies and fixes the issue, whenever found with any tainted information or with an infection.

#2) Data Loss Prevention (DLP):

The MNC or huge scope associations, keep up with the secrecy of information and assets by ensuring that their inward data won’t be spelt out by any of the representatives to the rest of the world.
This is finished by conveying DLP innovation in which the organization chairman confines the worker’s admittance to the data to keep it from sharing to the rest of the world by hindering ports and locales for sending, transferring or in any event, printing data.

#3) Email Security:

The aggressors can incite the infection or malware in the organization by sending it through an email in the framework.
Thusly an exceptionally gifted email security application that can check the approaching directives for infections and is fit for sifting dubious information and controlling the surge of messages to forestall any sort of data misfortune to the framework is required.

#4) Firewalls:

These are basic pieces of the systems administration framework. It goes about as a divider between two organizations or between two gadgets. It is essentially a bunch of pre-characterized rules which are utilized to keep the organization from any unapproved access.
Firewalls are of two sorts, for example, equipment, and programming. The product firewall is introduced in the frameworks to arrange safeguard from different kinds of assaults as they channel, square and fix the undesirable animals in the organization.
The equipment firewall goes about as an entryway between two systems administration frameworks so just a specific pre-characterized client or traffic can get to the organization and its assets.
Interruption counteraction framework (IPS): It is the organization’s security framework that contains some arrangement of rules and by keeping them you can undoubtedly sort out the dangers and square them also.

#5) Mobile Security:

The digital hoodlums can undoubtedly hack or assault the versatile handsets with the information office on the handsets, and they can go into the gadget from any unstable asset interface from the site.
Consequently, it is important to introduce an antivirus on our gadgets and individuals ought to download or transfer the information from dependable assets and that too from got sites as it were.

#6) Network Segmentation:

From the security perspective, a product based association will portion their vital information into a few sections and keep them in different areas and on a few assets or gadgets.
This is done, so that in the most pessimistic scenario, assuming the information in any area is defiled or erased by an infection assault, then it tends to be again recreated from any reinforcement sources.

#7) Web Security:

Web security alludes to provisioning restricted admittance to sites and URLs by obstructing the locales which are more powerless against infections and programmers. In this way, it is essentially worried about controlling the online dangers.

#8) Endpoint Security:

In the systems administration framework wherein a client is present at the remote end, getting to the urgent information base of the association from a far off gadget like cell phones or workstations, endpoint security is required.
Different programming which has inbuilt-progressed endpoint security includes and is utilized for this reason. This gives seven layers of safety comprehensive of document notoriety, auto-sandbox, web-sifting, antivirus programming, and a firewall.

#9) Access Control:

The organization ought to be planned in a manner by which not every person can get to every one of the assets.
This is finished by sending a secret word, remarkable client ID and validation process for getting to the organization. This interaction is referred to as access control as by executing it we have some control over the admittance to the organization.

#10) Virtual Private Network (VPN):

A framework can be made profoundly secure by utilizing VPN networks in relationship with involving encryption techniques for validation and drifting information traffic over the Internet to a somewhat associated gadget or organization. IPSec is the most regularly utilized confirmation process.


[D]. WHAT IS ACCESS CONTROL?


Access control characterizes individuals or gatherings and the gadgets that approach network applications and frameworks subsequently denying unsanctioned access, and perhaps dangers. Combinations with Identity and Access Management (IAM) items can emphatically distinguish the client and Role-based Access Control (RBAC) approaches to guarantee the individual and gadget are approved admittance to the resource.

(1). Remote Access VPN
Remote access VPN gives remote and secure admittance to an organization to individual hosts or clients, like remote workers, versatile clients, and extranet purchasers. Each host commonly has VPN client programming stacked or utilizes an electronic client. Security and uprightness of touchy data are guaranteed through multifaceted validation, endpoint consistence examining, and encryption of every sent datum.

(2). Zero Trust Network Access (ZTNA)
The zero-trust security model expresses that a client ought to just have the entrance and consent that they expect to satisfy their job. This is a different methodology from that given by conventional security arrangements, like VPNs, that award a client full admittance to the objective organization. Zero trust network access (ZTNA) otherwise called programming characterized edge (SDP) arrangements licenses granular admittance to an association’s applications from clients who expect that admittance to play out their obligations.

(3). Email Security
Email security alludes to any cycles, items, and administrations intended to safeguard your email records and email content protected from outer dangers. Most email specialist co-ops have inherent email security highlights intended to keep you secure, yet these may not be to the point of preventing cybercriminals from getting to your data.

(4). Information Loss Prevention (DLP)
Information misfortune counteraction (DLP) is a network safety procedure that consolidates innovation and best practices to forestall the openness of touchy data outside of an association, particularly controlled information like actually recognizable data (PII) and consistence related information: HIPAA, SOX, PCI DSS, and so on.

(5). Interruption Prevention Systems (IPS)
IPS advances can recognize or forestall network security goes after, for example, beast force assaults, Denial of Service (DoS) assaults and exploits of known weaknesses. A weakness is a soft spot for example in a product framework and an adventure is an assault that uses that weakness to deal with that framework. At the point when an endeavour is declared, there is regularly an open door for aggressors to take advantage of that weakness before the security fix is applied. An Intrusion Prevention System can be utilized in these cases to impede these assaults rapidly.

(6). Sandboxing
Sandboxing is a network protection practice where you run code or open records in a protected, disconnected climate on a host machine that imitates end-client working conditions. Sandboxing notices the documents or code as they are opened and searches for a vindictive way of behaving to keep dangers from getting into the organization. For instance malware in documents, for example, PDF, Microsoft Word, Excel and PowerPoint can be securely distinguished and hindered before the records arrive at a clueless end client.

(7). Hyperscale Network Security
Hyperscale is the capacity of engineering to scale properly, as the expanded request is added to the framework. This arrangement incorporates quick sending and increasing or down to meet changes in network security requests. By firmly incorporating organizing and process assets in a product characterized framework, it is feasible to use all equipment assets accessible in a grouping arrangement completely.

(8). Cloud Network Security
Applications and responsibilities are not generally only facilitated on-premises in a nearby server farm. Safeguarding the cutting edge server farm requires more prominent adaptability and development to stay up with the movement of use responsibilities to the cloud. Programming characterized Networking (SDN) and Software-characterized Wide Area Network (SD-WAN) arrangements empower network security arrangements in private, public, crossover and cloud-facilitated Firewall-as-a-Service (FWaaS) organizations.


[E]. STRONG NETWORK SECURITY WILL PROTECT AGAINST.


1). Virus: An infection is a malevolent, downloadable document that can lay lethargic that recreates itself by changing other PC programs with its code. When it spreads those records are contaminated and can spread starting with one PC then onto the next, or potentially bad or obliterate organization information.

2). Worms: Can dial back PC networks by gobbling up transfer speed as well as the sluggish effectiveness of your PC to deal with information. A worm is an independent malware that can proliferate and work freely on different records, where an infection needs a host program to spread.

3). Trojan: A trojan is a secondary passage program that makes a doorway for malignant clients to get to the PC framework by utilizing what resembles a genuine program, however rapidly ends up being destructive. A trojan infection can erase documents, initiate other malware concealed on your PC organization, like an infection and take significant information.

4). Spyware: Much like its name, spyware is a PC infection that assembles data about an individual or association without their express information and may send the data accumulated to an outsider without the buyer’s assent.

5). Adware: Can divert your hunt solicitations to publicizing sites and gather showcasing information about you in the process so that altered promotions will be shown in the view of your inquiry and purchasing history.

6). Ransomware: This is a kind of trojan cyberwar that is intended to acquire cash from the individual or association’s PC on which it is introduced by scrambling information so it is unusable, obstructing admittance to the client’s framework.


[H]. EXAMPLES OF NETWORK DEVICES


1). Desktop computers, laptops, mainframes, and servers.
2). Consoles and thin clients.
3). Firewalls
4). Bridges
5). Repeaters
6). Network Interface cards
7). Switches, hubs, modems, and routers.
8). Smartphones and tablets.
9). Webcams (cyber security)

application security

What is application security and typs?

 


contents


What is a Cyber security definition, type and examples?
What is a network security and type?
What is application security and types?
What is a IoT (Internet of Things) security, for example?
What is Ethical Hacking, types, and what example?
Cyber security advantages and disadvantages.
What is a Basic framework network protection?
What is firewall for important cyber security?
What is a role encryption in cyber security?
What is a cyber security executive order?
Top ten future careers in cyber security.
What is a role coding in cyber security?


[A]. WHAT IS A APPLICATION SECURITY?


Application security portrays safety efforts at the application level that plan to forestall information or code inside the application from being taken or commandeered. It includes the security contemplations that occur during application improvement and plan, however, it likewise includes frameworks and ways to deal with safeguard applications after they get conveyed.


[B]. WHY APPLICATION SECURITY IS SIGNIFICANT.


Application security is significant because the present applications are regularly accessible over different organizations and associated with the cloud, expanding weaknesses to security dangers and breaks. There is expanding tension and motivator to guarantee security at the organization level as well as inside applications themselves. One justification for this is that programmers are following applications with their assaults more today than previously. Application security testing can uncover shortcomings at the application level, assisting with forestalling these assaults.


[C]. TYPES OF APPLICATION SECURITY.


”Various sorts of utilization security highlights incorporate verification, approval, encryption, logging, and application security testing. Designers can likewise code applications to diminish security weaknesses”

1). VERIFICATION: When programming designers incorporate methodology into an application to guarantee that main approved clients get close enough to it. Validation methodology guarantee that a client is who they say they are. This can be achieved by requiring the client to give a client name and secret key while signing in to an application. Multifaceted validation requires more than one type of confirmation the elements could incorporate something you know (a secret word), something you have (a cell phone), and something you are (a thumbprint or facial acknowledgement).

2). APPROVAL: After a client has been confirmed, the client might be approved to access and utilize the application. The framework can approve that a client has the authorization to get to the application by contrasting the client’s character and a rundown of approved clients. Confirmation should occur before approval so the application matches just approved client qualifications to the approved client list.

3). ENCRYPTION: After a client has been verified and is utilizing the application, other safety efforts can safeguard touchy information from being seen or even utilized by a cybercriminal. In cloud-based applications, where traffic containing delicate information goes between the end client and the cloud, that traffic can be encoded to protect the information.

4). LOGGING: If there is a security break in an application, logging can assist with distinguishing who gained admittance to the information and how. Application log documents give a period stepped record of which parts of the application were gotten to and by whom.

5). APPLICATION SECURITY TESTING: An essential interaction to guarantee that these security controls work appropriately.


[D]. APPLICATION SECURITY IN THE CLOUD.


Application security in the cloud represents a few additional difficulties. Since cloud conditions give shared assets, unique consideration should be taken to guarantee that clients just approach the information they are approved to see in their cloud-based applications. Delicate information is likewise more defenceless in cloud-based applications since that information is sent across the Internet from the client to the application and back.


[E]. VERSATILE APPLICATION SECURITY.


Cell phones likewise communicate and get data across the Internet, instead of a private organization, making them powerless against assault. Endeavours can utilize virtual private organizations (VPNs) to add a layer of portable application security for representatives who sign in to applications from a distance. IT offices may likewise choose to vet portable applications and ensure they adjust to organization security approaches before permitting workers to utilize them on cell phones that interface with the corporate organization.


[F]. WEB APPLICATION SECURITY.


Web application security applies to web applications or administrations that clients access through a program interface over the Internet. Since web applications live on distant servers, not locally on client machines, data should be sent to and from the client over the Internet. Web application security is of extraordinary worry to organizations that host web applications or give web administrations. These organizations frequently decide to shield their organization from interruption with a web application firewall. A web application firewall works by examining and, if important, it is viewed as destructive to hinder information parcels that.


[H]. WHAT ARE APPLICATION SECURITY CONTROLS?


Application security controls are strategies to improve the security of an application at the coding level, conveying it less helpless against intimidation. Large numbers of these controls manage how the application answers startling information sources that a cybercriminal could use to take advantage of a shortcoming. A software engineer can compose code for an application so that the developer has more command over the result of these startling information sources. Fluffing is a kind of utilization security testing where designers test the consequences of surprising qualities or contributions to find which ones make the application act unexpectedly that could open a security opening.


[I]. WHAT IS APPLICATION SECURITY TESTING?


Application engineers perform application security testing as a component of the product improvement cycle to guarantee there are no security weaknesses in a new or refreshed form of a product application. A security review can ensure the application is consistence with a particular arrangement of safety rules. After the application passes the review, designers should guarantee that the main approved clients can get to it. In entrance testing, an engineer has a similar outlook as a cybercriminal and searches for ways of breaking into the application. Infiltration testing might incorporate social design or attempt to trick clients into permitting unapproved access. Analyzers generally oversee both unauthenticated security examines and confirmed security filters (assigned to clients) to recognize security weaknesses that may not appear in the two states.


[J]. INSTRUMENTS FOR APPLICATION SECURITY.


A total application security approach supports the location, remediation, and goal of an assortment of utilization weaknesses and security challenges. Answers for connecting the effect of utilization security-related occasions to business results are remembered for the best and progressed application security plans.

Application security can be divided into numerous categories:

1). Static Application Security Testing (SAST)
SAST supports the identification of code blemishes by looking at the application source records for the underlying driver. The capacity to contrast static examination check results and continuous arrangements speed up the identification of safety issues, diminishing MTTR and empowering cooperative investigating.

2). Dynamic Application Security Testing (DAST)
DAST is a more proactive methodology, recreating security breaks on a live web application to convey exact data about exploitable defects. DAST is particularly valuable for distinguishing runtime or climate-related mistakes since it assesses applications underway.

3). Intelligent Application Security Testing (IAST)
IAST consolidates portions of SAST and DAST by performing examination progressively or at any second during the turn of events or creation process from inside the application. IAST approaches the entirety of the application’s code and parts, permitting it to create more precise outcomes and give more top to bottom access than past adaptations.

4). Run-time Application Security Protection (RASP)
Grate additionally works inside the application, however, it is more worried about security than with testing. Scratch gives constant security checks and programmed reactions to potential breaks, which incorporates ending the meeting and illuminating IT groups.


[K]. EXAMPLES OF APPLICATION SECURITY


1. Mobile and network application security

2. Web application security

3. Trends (cyber security)

What is a cyber security

What is a Cyber security definition, type and examples?

 


contents


What is a Cyber security definition, type and examples?
What is a network security and type?
What is application security and types?
What is a IoT (Internet of Things) security, for example?
What is Ethical Hacking, types, and what example?
Cyber security advantages and disadvantages.
What is a Basic framework network protection?
What is firewall for important cyber security?
What is a role encryption in cyber security?
What is a cyber security executive order?
Top ten future careers in cyber security.
What is a role coding in cyber security?


[A]. NETWORK PROTECTION DEFINITION.


Network protection is the utilization of advances, cycles and controls to safeguard frameworks, organizations, projects, gadgets and information from digital assaults.
(It means to decrease the gamble of digital assaults and safeguard against the unapproved double-dealing of frameworks, organizations and advances.)

MALWARE = includes ransomware, botnet software, RATs (remote access Trojans), rootkits and bootkits, spyware, Trojans, viruses and worms.

BACKDOORS = which allow remote access.

FORMJACKING = which inserts malicious code into online forms.

CRYPTOJACKING = which installs illicit cryptocurrency mining software.

DDoS (distributed denial-of-service) attacks flood servers, systems, and networks with traffic to knock them offline.
DNS (domain name system) poisoning attacks compromise the DNS to redirect traffic to malicious sites.


[B]. WHAT ARE THE 8 TYPES OF CYBER SECURITY?


1. Basic framework network protection
Basic framework associations are regularly more helpless against assault than others because SCADA (administrative control and information obtaining) frameworks frequently depend on more seasoned programming.
Administrators of fundamental administrations in the UK’s energy, transport, wellbeing, water and advanced framework areas, and computerized specialist organizations are limited by the NIS Regulations (Network and Information Systems Regulations 2018).
Among different arrangements, the Regulations expect associations to carry out fitting specialized and authoritative measures to deal with their security gambles.

2. Network security
Network security includes tending to weaknesses influencing your working frameworks and organization engineering, including servers and hosts, firewalls and remote passageways, and organization conventions.

3. Cloud security
Cloud security is worried about getting information, applications and framework in the Cloud.

4. IoT (Internet of Things) security
IoT security includes getting brilliant gadgets and organizations that are associated with the IoT. IoT gadgets incorporate things that associate with the Internet without human mediation, for example, savvy alarms, lights, indoor regulators and different machines.

5. Application security
Application security includes tending to weaknesses coming about because of uncertain advancement processes in the plan, coding and distributing of programming or a site.

6. Fiasco recuperation/business progression arranging – Tools and systems for answering impromptu occasions, like cataclysmic events, blackouts, or network safety occurrences, with insignificant disturbance to key tasks.

7. Capacity security – IBM FlashSystem® conveys unshakable information strength with various shields. This incorporates encryption and unchanging and separated information duplicates. These stay in a similar pool so they can rapidly be reestablished to help recuperation, limiting the effect of a digital assault.

8. Versatile security – IBM Security MaaS360 with Watson empowers you to oversee and protect your portable labour force with application security, holder application security and secure versatile mail.


[C]. EXAMPLE


Instances of Network Security incorporate Antivirus and Antispyware programs, a Firewall that blocks unapproved admittance to an organization and VPNs (Virtual Private Networks) utilized for secure remote access.

#{some Sectors of Critical Infrastructure Cybersecurity}

{1}. The Energy Services Sector
{2}. Dame  sector
{3}. The Financial Services Sector
{4}. The Nuclear Reactors, Materials, and Waste Sector
{5}. The Food and Agriculture Sector
{6}. The Water and Wastewater Systems Sector
{7}. The Healthcare and Public Health Sector
{8}. The Emergency Services Sector
{9}. The Transportation Systems Sector
{10}. The Chemical Sector
{11}. The Communications Sector
{12}. The Information Technology Sector
{13}. The Defense Industrial Base Sector
{14}. The Critical Manufacturing Sector
{15}. The Government Facilities Sector
{16}. The Commercial Facilities Sector (cyber security)

 

 

artificial intelligence

What is a artificial intelligence and type?


CONTACTS


• What is a technology?
• Top 20 technology developed future.
• What is a artificial intelligence and type?
• Artificial intelligence use tools and applications. 
• How does work artificial intelligence?
• 12 examples for a artificial intelligence.
• How to use artificial intelligence in our daily life?
• Top 9 highest paid artificial intelligence company


Introduction


Artificial intelligence (AI) is the simulation of human intelligence processes by computer systems. These processes include learning (the acquisition of information and rules for using the information), reasoning (using the rules to reach approximate or definite conclusions), and self-correction.


There are several different types of AI, including


Reactive machines:
These are the simplest type of AI systems, which can only react to the environment and have no memory. They don’t use past experiences to inform current decisions.

Limited memory:
These systems have a limited memory that allows them to use past experiences to inform current decisions. Examples of this type of AI include self-driving cars, which need to remember the previous few moments in Ordertocisions about braking and turning.

Theory of mind:
This type of AI is characterized by the ability to understand mental states, such as beliefs, intentions, and desires in both themselves and others.

Self-aware:
This type of AI is characterized by a sense of consciousness and the ability to have subjective experiences. This is currently a topic of much research, but self-aware AI does not currently exist.

Narrow AI:
Those AI systems that are designed and trained for a specific task or a specific set of tasks. The most common AI applications like Siri, Alexa, Google Assistant, and etc.

General AI:
A General AI is an AI that can perform any intellectual task that a human being can, it can perform any cognitive task, not just specific ones. This technology is not yet available, but it is the goal of many researchers in the field of AI.

All current AI applications fall under Narrow AI, while the other type mentioned on the list is more on the theoretical and future research area. AI