AI OverHaul

Page 1

V E R H A U L

P R I N N G E Z I E 2 2 0 3
O
S
Conor Blakely Aidan Gannon
04 designed by Danielle Ojede “Letter from the Editors” 06-07 designed by Danielle Ojede “Meet the Editors” 08-13 “Corruption of AI In Social Media” designed by Danielle Ojede 14-21 22-27 designed by Bela Castano “The Addictiveness of Social Media Algorithms” designed by Yang-Fan Chau “Significance of Cyber-Security” designed by Conor Blakely “Societal Changes from Artificial Intelligence” designed by Aidan Gannon “The Fundametals on How AI Learns” designed by Danielle Ojede “Game Pages!” 28-33 34-39 40-41
Sincerly, Danielle Ojede Bela Castano
Chau Conor Blakely
from the editors Aidan Gannon
from
table of contents table of contents table of contents
letter from
Yang-Fan
letter
letter

meet the editors meet the Meet the meet the editors

meet the Meet the editors c o n t i n u e d . . .

8

by Danielle Ojede

The unconscious-like trance seemingly emulates psychosis in the midst of an illuminating screen as the individual indulges in expeditious and rhythmic clicks and swipes. The substantial influence wielded by significant figures in the technological industry, particularly in the realm of social media, have inordinately increased as a direct result of its colossal popularity, authorizing holes for corruption. Therefore, it’s essential to comprehend the intention of a quotation delineated by John Acton, an American politician renowned for his philosophical adages, in relevance to this specific issue as “power tends to corrupt and absolute power corrupts absolutely. Great men are almost always bad men, even when they exercise influence and not authority; still more when you superadd[e] the tendency of the certainty of corruption by authority.” This is primarily because this corruption, the arising publicization of the applications of Artificial Intelligence in social media algorithms alongside youthful cybersecurity policies integrated in law, have ultimately perpetuated the cycle of data breaches amongst different institutions. Hence, these factors contributing to the continuation of this issue adds to the significance of divulging in conservations with distinct people to diversify the potential solutions that hinder the exploitation of users’ data that are utilized for other purposes without their explicit consent.

Garic Barosse, a law student specializing in the applications of social media in cybersecurity at the University of Texas at Austin and an avid member of the university’s cybersecurity program, retains first-hand experience in the operations of cybersecurity in international institutions, manifesting in his significant insight to the subject of cybersecurity and its interconnectivity with social media. Categorically, Barosse originally inhabited China for an extensive period of time which enabled him to receive an abundance of exposure to subjects of data centers, localization, and privacy regarding his research centralizing on national security. Additionally, this particular experience further emphasized his passion for the integration of law in cybersecurity systems in social media as he claims that “there are a lot of interesting issues around privacy and data . . . [and] it’s a . . .growing field, and . . . a place where [there aren’t] . . .clear law[s] . . . [like] labor law [which] has been around for hundreds of years. [However in cyber security law] . . . a lot of the [content covered

in] . . .data and security [is manufactured] as we go.” Consequently, the consistent molding of the framework of a field ultimately results in the concretion and definite distinguishability of different notions; this is specifically assumed for the implementation of law in cybersecurity, specifically with the distinction between data breaches

been hacked. . . [and the] individuals, [particularly those] whose personal information has been lost. [Nonetheless], whether or not that’s a question of the individual being sloppy, or whether it’s . . . a state actor coming in trying to hack the company, ultimately that third party was . . .actively doing the breaching. So . . . legally, [it’s viewed] as largely the same.”

[The distinguishing between a data breach and leak is] . . . just a matter of perspective, because a data breach versus a data leak, from the attacker’s perspective, that’s going to be very intentional. That leak or that breach, they’re trying to get that data, but at the same time, that can be due to negligence from the Chief Technology Officer at a company. . . failing to implement good sound practices . . .

This neutralized perspective with reference to the differentiation of data leaks and breaches transcends into the ideology of utilization of morals and ethics in law with cases pertaining to this corruption. More unequivocally, Barosse elucidated that “[in law, data breaches are viewed] as theft [primarily because morals are rarely discussed as it] tends to be . . .about balancing liability and minimizing risk . . .so there’s a big conversation now about . . .who should be responsible for these risks.” Barosse proposed an instance highlighting this statement as if a bank experiences a breach of data and an individual loses personal information, both the individual and bank are victims as the individual lost their data and the bank is a victim of external hackers. Therefore, this catalyzes the conversation of who should “[compensate the victim] and whether [the proclaimed victim deserves] anything . . .[as the law can’t determine if] anything bad . . .did happen to you. . because [of solely losing] your personal information [which isn’t deemed as ‘illegal’ unless your credit card information is utilized]. So [this stems into the] question of . . .who . . .has the level of responsibility to take care of these [circumstances]”, as articulated by Barosse.

and leaks. However, according to Barosse, the following is complicated as in law, “a lot of times [the two aren’t distinguished] . . . because ultimately the important thing is that the company . . . is the victim but there’s multiple victims, right? There’s the company who’s

Notwithstanding, the seemingly unjust handling of accountability in law doesn’t discount the potential jeopardization of political and social systems, detrimental effects of psychological applications in social media, and loopholes in privacy protection clauses connected to the issue. Kevin Kulda, a fellow law student to Barosse at the University of Texas at Austin (UT), claims that the em-

-McCullough Gilpin, a law student at the University of Texas at Austin (UT)
Professional portrait of Garic Barosse, a law student at the Univesity of Texas at Austin specializing in legal applications to cybersecurity and social media ”
- Photo Courtesy of Garic Barosse The Inattentive Consequence of a Click
9
The Emergence of Corruption in Applications of Artificial Intelligence on Social Media

bedding of psychological tactics in social media is detrimental “because social media com panies, or . . .technology com panies in general, can use psychology to craft algorithms and their technology to attract users and to engage users in ways that might not be to their benefit or even for their health in the long term. So it can be very detrimental because these technology companies have the incentive to research psychology, to craft this [curation of data], to be so interesting to users that they’ll spend hours and hours on content and use it in ways that might be unhealthy, arguably.” The perversion of psychology in these algorithms causes the alterations in the functionality of political and social systems as noted with the Cambridge-Analytica matter, resulted in the usage of users’ data from Meta, formerly known as Facebook, by third-party organizations and is speculated to have swayed the trends in elections in the mid-2010s. In consonance with this instance, Kulda stated that “if companies, especially foreign states, can . . .collect data, use it to build profiles and use it to manipulate voters, I think that is a huge problem, especially in democracies like ours, where our political process is . . .fostered through an election system. [Therefore,] . . . if we can’t have confidence in our voting systems [then] . . . [it’s] a huge issue.”

However, for social systems, Kulda claims that the “breakdown of trust” between individuals of society due to the reception of differing information is another significant problem which feeds into specific issues like the recurrent polarization of the democratic and republican parties in the United States of America. On that account, the absence of a singular, broad law in cybersecurity is replaced with a collection of laws that protect users’ data which allows for loopholes whilst addressing cases of cyberse-

curity in social media. Case in point, a law in cybersecurity stated by Kulda that is currently claimed to be a ‘loophole’ by some details that “if you have your data stolen because a company didn’t protect it [and] . . .if you don’t suffer a harm, then you don’t have standing in court to sue them. So in a lot of times, a company won’t be held accountable in that regard . . . I think the fact that having your data stolen or taken away because the company didn’t protect it is not a harm. I think that’s kind of a loophole to where a lot of times companies . . .can, if you want to describe it, get away with having their customers’ data stolen and not suffer repercussions for that or not make them whole because our law doesn’t recognize that as harm.”

McCullough Gilpin, contracted as Mac Gilpin, a law student at the University of Texas at Austin, dispensed potential and distinct solutions on individual, institutional, federal, and global levels to hinder the magnitude of the issue concerning encroachment of users’ data on social media platforms, especially by third-party organizations. Case in point, Gilpin vocalized that “[there is an emerging] idea that cyber insurance [detailing insurance that protects a business following the breach

of sensitive information about the clients] will . . . help . . . improve cybersecurity protections in . . .an organization is . . .debated.” This is because Giplin claims that to retrieve “ a . . .cyber insurance policy, the insurance company is going to require that your company institute[s] multifactor authentication and all these different cybersecurity controls. [However], at the same time, even if you do get a ransomware attack on you, then your insurance company is going to pay that off . . . [so] . . . the company that’s insured knows that, but the attackers [simultaneously] know that too, and they’ve actually been targeting companies that they know have cyber insurance . . There’s a lot of people who argue that cyber insurance actually increases rent attacks and increases cybercrime and as you know, a big part of ransomware attacks is data breaches and data leaks . . .and a lot of times, ransomware attackers . . .will extract that data, exfiltrate that data. [However,] the counterargument is that that has actually prevented more malicious, more sophisticated attacks [ultimately] because [with the assumption] . . . that insurance has . . . caused more ransomware attacks to happen and more cyberattacks and ultimately more data leaks . . [then] there’s a potential that over time, it actually will decrease . . .even then because as these insurance companies experience more or their clients experience more attacks, they’re able to accumulate a lot more data about how attackers infiltrate systems.”

Besides this, Giplin stated that there is “a move to [individual-based solutions] . . .like, [in] zero trust infrastructure[s]. [For instance], every single time you log into somewhere or you share data, it’s very intentional [and] there’s just verification processes [utilized] everywhere, [however] . . . it does come down to . . .education [and] being aware of the digital environment.” Thus, it is principal to comprehend the philosophy of John Acton for our society progressively becoming aware of and actively galvanizing change because of the ethical discrepancies broadcasted in this issue. Therefore, as this societal problem’s magnitude spikes as a direct result of vulnerabilities in cyber security and laws, it’s significant to perpetually mold and cement ideologies and diversify the conversation by the acquisition of personal experiences and probable solutions to ultimately hinder the risks posed from the matter.

[The application of psychology in Artificial Intelligence is] . . . detrimental because social media companies, or . . .technology companies in general, can use psychology to craft algorithms and their technology to attract users and to engage users in ways that might not be to their benefit or even for their health in the long term.
10
-Kevin Kulda, a law student at the University of Texas at Austin (UT) - Photo Courtesy of Bela Castano
An intricate architectural strcuture of a building at the University of Texas at Austin; a prestigious university with an esteemed cybersecurity program ” 11

In the present time, technology is so deeply involved in our daily lives, that many find it exceedingly difficult to step away from the pressures tied to their devices. As a result, a plethora of detrimental byproducts can arise, harming our health and distorting the pitch perfect facade of technology.

Physical demands, often found in the most minor of practices

Neck, shoulder, or back pains

Emotional Interference + Social Intrusion

Promotion of a concept referred to as, “technostress”, in which individuals report negative symptoms when in direct correlationw ith tech. interaction

Disproportionate work-life balance (encourages dependency & guilt ridden ties to tech.)

Conflict on account of blue light strain + irritation

1) “I believe that social media can be a useful, positive tool at times, but the distractions and dangers that it creates make it something to be used cautiosly and in moderation.”

Distortion of self image --> fostering a culture composed of incessant comparisons among peers

Promotes a disconnect from reality, triggering a sense of isolation + loneliness

Eye irritation

Underlying hand strain + potential risk of cramps

7) “With access to so much, it’s easier to get sucked into the hole of constantly watching, binging, or ‘doom scrolling’”.

6) “...the anxiety due to social media that I have observed, and the disregard of privacy by tech. giants certainly leaves a stain on my views of technology.”

Prompting...a lack of attention, abnormal stress reactions, fatigue, and so on

5) “It’s difficult for me to pry myself away from technology even when I want to take a break from it, since I see it everywhere.”

Triggers “day time” response in your brain

Linked to anxiety

Linked to depression

Establish boundaries, and try your very best to stick with them; after all, consistency is key! The more you dedicate yourself to your goals, the more improvement you undergo in your journey.

2) “I often worry about how tech. keeps me up and prevents me from sleeping.”

As cliche as it may sound, monitor your screen time, making honest observations as to your usage. Do you notice anything different if you decrease the frequency in which you use your devices, whether that be a computer, iphone, tablet, etc.?

“Crack down” upon anything you deem unnecessary or illigitimate in truth, content, and / or well being / intention

Concentrate on one task at a time - quit multi-tasking, no matter how good you claim to be at it!

1 2 3 4 5

Always ensure that you are contributing to a safe, healthy environment online. As common as the phrase may be, change truly does start with the individual!

What do your peers have to say about the subject?

3) “I experience tech. related concern through being worried about how addicted we are to social media & tech. in general, myself included.”

2) Once more, students relate to a sense of discomfort when prompted on the ‘cons’ of technology.

5) It’s the cycle of addiction! When utilizing tech., our brain more commonly experiences “accomplishments” or “rewards”, resulting in a vicious cycle of guilt & pleasure.

4) “I think technology can be really beneficial in education, [it] connects people all over the world, and it is a good source of entertainment, but it is also addictive, manipulative, & takes time away from other things you could include [in life].”

What is YOUR perspective on technology? How do YOU think it affects your life? Do YOU relate to any of the quotes listed above? If so, to what extent?

Note: All quotes shown above were said by your very own peers, here in L.A.S.A. highschool! I have chosen to preserve their privacy, but please know that you are not alone, should you find yourself relating to the feelings expressed above.

20
The Facade of Modern Day Technology - What lies beneath? 21

CyberTelligence a Look at AI and Cybersecurity

<Introduction>

Today, countries around the world pour billions of dollars into their cyber defense programs every year. To understand why this is the case it’s imperative that one has a basic understanding of white hats and black hats to better comprehend the constant battle the two groups fight to steal and secure data respectively. It’s also important to understand how AI is changing this field so one can better defend themselves against more advanced methods of data burglary. Finally, learning about the unique way somebody becomes knowledgeable in this field and the competition present, will help illustrate the in-demand nature of this job.

<Overview>

To understand how AI is affecting cybersecurity, we first need to understand cybersecurity itself. Most people will know that cybersecurity is a subdivision of computer science that serves to protect data. And while that is true, it’s not very in depth. If we go deeper into cybersecurity, you’ll find that it’s much more

22
Courtesy of DeepAI.com
26 27

The Rabbit Hole of Artificial Intelligence

Artificial intelligence’s new introduction into mainstream media has shown everybody how fast it can learn, but lots of people don’t know the full extent of what it’s capable of.

A lot of people have heard of or even used AI in this day and age, but a lot of people have yet to consider what Artificial Intelligence really means, and how it works. ChatGPT, an artificial intelligence chatbot, can keep a conversation with you and spit back highly intellectualized information for you to absorb. Robin Sutara says that It can even describe itself with it saying that

AI works by utilizing algorithms and statistical models to analyze and process data in order to learn from it and make predictions or decisions based on that learning.

Artificial Intelligence’s capabilities do not stop at just holding conversations with us though. It is also becoming increasingly common to have AI incorporated somewhere in companies. “Artificial intelligence is used to help employees make better decisions more quickly in our internal systems and tools.” This drastic new wave of technology can be compared to some other groundbreaking inventions that have happened in the past. “We’re making this analogy that AI is the new electricity,” Andrew Ng says. “Electricity transformed industries: agriculture, transportation, communication, and manufacturing.”

Artificial intelligence is a new, innovative technology that is sweeping the world with its intelligence and usefulness. The amount of fields that AI covers can be infinitely expansive, as it is always learning at a much faster rate than humans could ever imagine. ChatGPT shows just how intelligent an AI can be when communicating with us.

The rise of artificial intelligence (AI) has brought about significant changes in the way tasks are performed across industries. With the ability to auto-

concerns.

In this feature story, ChatGPT, a large language model trained by OpenAI, shares insights into the impact of AI on

the ability of machines to perform tasks that typically require human intelligence. AI works by utilizing algorithms and statistical models to analyze and process data in order to learn from it and make predictions or decisions based on that learning

mate routine tasks

and analyze large amounts of data, AI has become an increasingly popular tool for businesses looking to improve efficiency, accuracy, and productivity. However, with the benefits of AI also come potential drawbacks, such as job displacement, bias, and privacy

human tasks, the benefits and drawbacks of using AI to replace human workers, and the effects of AI on the job market.

ChatGPT defines AI as

such as data entry, customer service interactions, and administrative tasks. It can also perform more complex tasks such as financial analysis, medical diagnosis, and transportation.

There are several benefits of using AI to replace human tasks. One of the most significant

picture

is increased efficiency. AI can work faster and more consistently than humans, leading to increased productivity and efficiency. Replacing human workers with AI can also lead to significant cost savings for businesses, as they no longer have to pay salaries, benefits, and other expenses associated with human employees. Other benefits include improved accuracy, 24/7 availability, scalability, and safety.

However, relying too heavily on AI to replace human tasks can also have potential drawbacks. One of the most significant is job displacement, where human workers may lose their jobs or face reduced job opportunities. Additionally, AI may not always be able to replicate the quality of work that a skilled human worker can provide, especially in fields such as creative work. AI systems can also be subject to bias, leading to discriminatory outcomes and perpetuating existing inequalities. Privacy concerns and dependence on technology are other potential drawbacks to consider.

matical equations, as robots have surpassed human intelligence capacity. Courtesy of Fotor AI Image Generator A of a modern and futuristic future of AI Courtesy of Fotor AI Image Generator
28 29

EFFICIENCYINNOVATION&

The innovation of technology has made the efficiency of many different workforces tremendously better.

The use of AI

in replacing human tasks has had a significant impact on the job market. While the full extent of this impact is still being studied and debated, there are clear trends and observations that have emerged. For example, automation and AI have already led to job displacement in some industries such as manufacturing and customer service. However, AI has also created new job opportunities, such as AI researchers and developers.

In short, the rise of AI has brought about significant changes in the way tasks are performed across industries. While there are clear benefits to using AI to replace human tasks, such as increased efficiency, cost savings, and improved accuracy, there are also potential drawbacks to consider, such as job displacement, bias, and privacy concerns. As AI technology continues to develop and improve, it is important for businesses and policymakers to consider the potential impacts and make informed decisions about its implementation. At the same time, it is important for individuals to stay informed about the changes taking place in the job market and develop the skills necessary to thrive in an increasingly automated and technologically advanced world. As ChatGPT shows, AI is capable of incredible feats of intelligence and learning, but its true potential lies in the ways it can complement and enhance human abilities, rather than replace them entirely. By working together with AI, humans can harness its power to achieve even greater heights of innovation and progress.

30 31
An AI generated futuristic cityscape Courtesy of Fotor AI Image Generator

Between 400 and 800 million individuals could be replaced by automation and need to f ind new jobs by

Sources: Fotor AI Image Generator Flickr Top 9 jobs to be replaced by AI 1. Customer Service 3. Receptionists 2. Proofreading 5. Manufacturing 7. Couriers 8. Doctors 6. Retail 4. Bookkeeping 9. Soldiers 19 1 BILLION JOBS Is the predicted amount of jobs to be taken by AI in the next decade. of all companies utilize AI to some extent Q: How many companies use AI? A:50% Jobs Getting replaced by Artificial Intelligence
2030. By 2045 Artificial Intelligence is expected to surpas s
20
33 by Conor Blakely 32
HUMAN INTELLIGENCE
, HAS CAUSED 50% to 70% Artificial Intelligenc e

Experts Weigh In on How AI Learn

Experts show how AI work

AI stands for Artificial Intelligence. AI programs can be used for automating processes like driving, analyzing finances and even chatting with someone. To train AI, computer scientists run thousands of generations with thousands of AI populations. However, problems like underfitting can lead to funny mistakes.

In one of Russ Bodnyk’s AI projects, he tried to create a fictional character that mimicked the vocabulary and speech style of both Oprah and Michelle Obama. The AI, not knowing what each voice was, decided to randomly switch between the two. This caused weird results.

“And kind of what happened is that there’s just a lot of really kind of funny ways in which the chatbot would switch between kind of like a serious Oprah voice and then like a very lyrical Michelle Obama

voice,” said Russ. “And it was funny to watch the AI that created both the voice like what it sounded like, as well as the things that it said. It would kind of flip between a serious mode and sort of a joking mode. “

Mishaps like this begin when the AI is unable to process what is occurring. Kenneth O. Stanley explained that these usually happen when the AI has never been exposed to the new scenario. For example, with ChatGPT, if it hasn’t developed to find a certain part of information, it will “overfit” and put other information that seems plausible. “Underfitting” is the opposite, where instead of not having developed for one part of information, it hasn’t developed for ANY information.

“You’re looking for the happy middle between the sweet spot between underfitting

of
Image credit
freesvg.org
34 35

and overfitting generally, which is where you get generalization and so yeah, that exists somewhere and you can see even in ChatGPT or something that, there’s some degree of compromise happening when you ask it about things it’s not familiar with and it struggles,” said Stanley. Another issue that can cause problems in AI is a lack of good data. While OpenAI has 100 million people giving data, Dimakis only has data from his university, of around 55,000 people. This means OpenAI has a factor of 1.72 times more data than Dimakis has available.

‘And kind of what happened is that there’s just a lot of really kind of funny ways in which the chatbot would switch between kind of like a serious Oprah voice and then like a very lyrical Michelle Obama voice,” said Russ. “And it was funny to watch the AI that created both the voice like what it sounded like, as well as the things that it said. It would kind of flip between a serious mode and sort of a joking mode.”

“Our problem is really finding lots of good data sets, high quality data sets, or training the models in a way that they are useful for different real problems,” said Dimakis. “Most of the time this is kind of where our research is spent. It’s not like the overfitting versus underfitting issue. It’s usually more of a data issue. One of the significant problems we have in universities is that we don’t have that much data compared to what companies have.”

“You ask about me and what I’ve done in my life,” said Stanely. “It’ll tell half the stuff will be correct and half of it will be just made up stuff that sounds like I could have done it, but I actually didn’t.”

Image
and Github
courtesy of Google Tokyo Workshop
37 36

Experts

Experts Weigh In on How AI is Trained

Weigh In on How AI is Trained

Evolutionary Neural Network AI

Most people assume that modern AI are smarter because their “brains” got bigger, but this is usually the opposite. It’s actully because modern AI are tested with tens of thousands of population, not a hundred at most. Infact, AI’s neural networks used to be bigger.

Generally, a “Neural Network” type AI is used. These adapt and take in information, modify the “values” via hidden nodes, and then export them via output nodes. These AI are modeled after our brains, but unlike our brain with billions of neurons, these usually have at most 125. These learn slowly, but are able to perform tasks much more effectively.

These AI are used for reccomendation systems, along with the other main type of AI. Some of these have many slight varitons runned overtime, producing better AI slowly. Usually they have set amount of nodes between the input and output. The first one without this was NEAT, to model the brain more. Usually though it uses a “Genetic algorithim”, similar to natural selection.

In ChatGPT

The Neural Networks here have giant inputs and outputs. When asked about how big the ChatGPT neural network is, Kenneth couldn’t give specifics but it has massive amounts of input and output nodes, and a lot of hidden nodes. Unlike normal evolutionary networks, one “species” (a population of a generation) gets thousands of data points from users. Everytime the AI gets liked, it is more likely to repeat that process.

“And it was funny to watch the AI that created both the voice like what it sounded like, as well as the things that it said. It would kind of flip between a serious mode and sort of a joking mode. But of course, it's AI that doesn't really understand what it's doing.”

How AI... can lie unknowingly

Yes, ChatGPT can lie. It doesn’t know the difference between truth and plausability. It usually lies through a process called “Hallucinating.” This is similar to people in court cases when they don’t have all the information, and make something that seems to fit. Usually it’s because of lack of data. Sometimes this would be from overfitting (Not knowing that topic well, but knowing one topic extremely) or underfitting (not knowing anything). And if an AI doesn’t know a topic it just makes something up.

How does AI learn

“You know, I was pretty convinced that the brain, the human brain or any other natural brains don't look like these fixed, multilayer structures that people were using and that there must be some reason for that.”

The image does not show many of the smaller conections. The unused node is from the AI having a very low bias for most connections to the node of around ~0.01. This effectively makes it unused. The green is when if it is above threshold (input node) is it positive or negative, or if it is negative if it was positive. The line thickness is based on the “bias”, or multiplier, that connection recieves.

(image exported from NEAT.py after 1024 generations of a cartpole AI)

They learn slowly, and optimize over time. The image below shows a AI learning, using high population runs. High population means more is known and more combinations can be tried. As the neural networks get bigger, it takes longer to run, as 620 generations took 10.6 hours and 900 generations took 19.1 hours. Interestingly, the best Ai don’t survive; sometimes the worst do. This is demostrated that the AI peaked at ~880 fitness, but decreased down to ~810 after a few generations.

“Yeah. Which is really interesting. I mean, that whole phenomenon is not very human. It doesn't seem human at first, although maybe if we think about it, it might be kind of human, but just the capacity or the tendency to just think that something completely made up is actually a legitimate answer.”

38
-Kenneth O. Stanely, Developer of NEAT, and a OpenAI employee This image is by Google’s Tokyo AI workshop. It was a 24 hour AI evolution on your average computer in 2019 and can be referenced on GitHub.
39
-Russ Bodnyk, a friend of Kenneth Stanley, and a owner of an AI company -Kenneth O. Stanely Developer of NEAT

Game Page! game page! game page!

Crossword Mania

Instructions: Fill out the crossword puzzle according to the information below in relevance to the theme of the names of pioneers in computer sciences and technology in general (answers are recorded on the next page)

Crossword Mania: Answer Key

ACROSS

4 - A prominent philanthropist and is renowned for being a co-founder of the Microsoft Corporation alongside Paul Allen (last name) -> gates

6 - Often referred to as the ‘mother of computer science’ and the first computer programmer; discovered that computers could follow and execute a sequence of detailed instructions (last name) -> lovelace

7 - A South African entrepreneur who is known as the chief executive officer at Tesla Inc. and of the private space company SpaceX (last name) -> musk

8 - An English mathematician and logician who pioneered elements of artificial intelligence and the fundamentals of the computer; well-known for cracking the Enigma Code utilized by Germany during World War II (last name) -> turing

DOWN

1 - Developed Meta Platforms, Inc., formerly named Facebook, Inc., which owns the companies of Facebook, Instagram, and WhatsApp (last name) -> zuckerberg

2 - A co-founder of YouTube and is known for being the first YouTuber by publishing the first video titled “Me at the zoo”, which was uploaded on April 23, 2005 (first name) -> jawed

3 - An American entrepreneur, commercial astronaut, and investor well-known for his establishment of Amazon, the aerospace company Blue Origin, and ownership of The Washington Post (last name) -> bezos

...........................................................................................................................................................

ACROSS

4 - A prominent philanthropist and is renowned for being a co-founder of the Microsoft Corporation alongside Paul Allen (last name)

6 - Often referred to as the ‘mother of computer science’ and the first computer programmer; discovered that computers could follow and execute a sequence of detailed instructions (last name)

7 - A South African entrepreneur who is known as the chief executive officer at Tesla Inc. and of the private space company SpaceX (last name)

8 - An English mathematician and logician who pioneered elements of artificial intelligence and the fundamentals of the computer; well-known for cracking the Enigma Code utilized by Germany during World War II (last name)

DOWN

1 - Developed Meta Platforms, Inc., formerly named Facebook, Inc., which owns the companies of Facebook, Instagram, and WhatsApp (last name)

2 - A co-founder of YouTube and is known for being the first YouTuber by publishing the first video titled “Me at the zoo”, which was uploaded on April 23, 2005 (first name)

3 - An American entrepreneur, commercial astronaut, and investor well-known for his establishment of Amazon, the aerospace company Blue Origin, and ownership of The Washington Post (last name)

5 - An English cosmologists and theoretical physicists primarily recognized for his proposition of the Black Hole Theory in the field of sciences (last name)

5 - An English cosmologists and theoretical physicists primarily recognized for his proposition of the Black Hole Theory in the field of sciences (last name) -> hawking

t u r i n g z u c k e r b e r l l o v a c e h w k i n g g a t e s j w d 8 6 4 7 1 5 2 3 7 b z o s s m k
...........................................................................................................................................................
.................................................................................... ...........................................................................................................................................................
41
........................................................................................................................................................... 8 6 4 7 1 5 2 3 7
.................................................................................... ....................................................................................
........................................................................................................................................................... 40

The development of full artificial intelligence could spell the end of the human race….It would take off on its own, and re-design itself at an ever increasing rate. Humans, who are limited by slow biological evolution, couldn’t compete, and would be superseded.

“ ”

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.