Module Checkpoints (With Answer Keys)
These are short async self-checks. Try to answer before opening the answer key.
Module 1 Checkpoint: AI/ML Framing
- In one sentence each, define AI and ML.
- Give one example where symbolic approaches are useful.
- Give one example where data-driven ML is useful.
Answer key:
- AI is the broader field of building systems that perform tasks associated with intelligence.
- ML is a subset of AI where systems learn patterns from data.
- Symbolic example: rule-based tax form validation.
- ML example: email spam detection from historical labels.
Module 2 Checkpoint: NumPy Workflow
- What is broadcasting?
- Write a boolean mask that selects values greater than 10 in array
a. - Why are vectorized operations preferred over Python loops for arrays?
Answer key:
- Broadcasting expands compatible dimensions for element-wise operations.
a[a > 10]- Vectorized operations are faster and simpler because they use optimized low-level routines.
Module 3 Checkpoint: Supervised Workflow
- What is data leakage?
- Why do we split train/validation/test?
- Name one regression metric and one classification metric.
Answer key:
- Leakage is accidentally letting target/future information enter training features.
- Split enables training, tuning, and unbiased final evaluation.
- Regression: RMSE/MAE. Classification: accuracy/precision/recall/F1.
Module 4 Checkpoint: Optimization
- What does learning rate control?
- What happens when learning rate is too high?
- What does a flattening loss curve usually indicate?
Answer key:
- Step size of each gradient update.
- Overshooting/divergence or unstable training.
- Convergence or near-convergence to a local/global minimum.
Module 5 Checkpoint: Unsupervised Learning
- What is clustering used for?
- Why can interpreting clusters require human judgment?
- What does dimensionality reduction preserve?
Answer key:
- Grouping similar data points without labels.
- Clusters are unlabeled by default and need domain context.
- As much important structure/information as possible in fewer dimensions.
Module 6 Checkpoint: Neural Networks
- What is a perceptron?
- Why are nonlinear activations important?
- Name one overfitting mitigation strategy.
Answer key:
- Weighted sum + bias passed through an activation.
- They allow modeling non-linear boundaries.
- Regularization, dropout, or early stopping.
Module 7 Checkpoint: NLP
- Difference between token and type?
- Why remove stopwords in some tasks?
- What is lemmatization?
Answer key:
- Token is an occurrence; type is a unique token value.
- To reduce noise and focus on informative content words.
- Mapping word forms to root/base form.
Module 8 Checkpoint: RL
- Define state, action, reward.
- What is exploration vs. exploitation?
- Why use a discount factor?
Answer key:
- State: current environment signal; action: agent decision; reward: feedback signal.
- Exploration tries new actions; exploitation picks known high-value actions.
- It balances immediate vs future rewards and stabilizes long-horizon credit assignment.
Module 9 Checkpoint: Consolidation
- List two minis you completed and why you chose them.
- For one mini, describe one iteration you made after evaluating output.
- Name one limitation in your final result and one next improvement.
Answer key guidance:
- Free response; quality should show clear reasoning, evaluation evidence, and realistic next steps.