Definition/Explanation
Machine Learning Techniques
Real World Applications
Positive Impacts
Negative Impacts
100

What does the subset of machine learning focus on?

Learning patterns and making decisions without instruction

100

What is one Machine learning technique?

Supervised/Unsupervised learning

100
What notable companies utilize machine learning for recommendations?

Netflix, Spotify, Amazon, etc

100

What are 2 positive impacts of machine learning?

Determining future trends and competitive edge

100

TayTweets AI's acting differently than anticipated is an example of which issue? 

Ethical Issue (Specifically "Black Box" issue)

200

How does artificial intelligence make its inferences?

Model training and interpreted data

200

What is one technique that AI uses when learning is unsupervised?

Clustering, Dimention reduction, Associate rule learning

200

How does machine learning personalize recommendations for people?

Tailoring marketing materials based on user patterns

200

How does Predictive AI give foresight on trends?

It anticipates customer behavior, and notices previous actions to create a prediction over a period of time

200

What is the "Black Box" issue?

The struggle to understand the decision making of AI models and how data given during the machine learning process impacted their decision

300

How do machine learning systems improve their peformance?

Using their own intrinsic learning and insight on previous models to become more powerful

300

How are Machine Learning techniques used in the real world?

Locating fraud detection, discovering relationships for predictions and analysis, and reducing information but keeping impact

300

How does machine learning improve frame rate?

Guessing and generating frames based on previous actions

300

How does competitive edge drive the development of machine learning?

Innovators need to find advanced offerings in order to outlast competition and create a more popular product

300

What are some consequences of insecurely gathered data?

Accessibility to personal data by third party sources and vulnerability to online attacks

M
e
n
u