Artificial Intelligence Course 2024-2025 Zagazig University PDF
Document Details
Uploaded by SmoothestNeptune6362
Zagazig University
2024
Zagazig University
Tags
Related
- Lecture 11 - AI Ethics - no videos PDF
- Project Work Report on Artificial Intelligence in Human Resource Management PDF
- Andrew Dimarogonas Resume PDF
- Applied Artificial Intelligence Handbook for Business Leaders PDF
- How AI Can Improve K-12 Education in the US PDF
- Intelligence Artificielle (AI) Technology PDF
Summary
This document is a course syllabus for a Technical English course on Artificial Intelligence, taught at Zagazig University in 2024-2025. The course covers various aspects of AI, including its impact on society, natural language processing, and algorithms.
Full Transcript
Zagazig University ESP Center In Collaboration with Faculty of Computers& Informatics A Technical English Course for Artificial Intelligence 2024-2025 1 ...
Zagazig University ESP Center In Collaboration with Faculty of Computers& Informatics A Technical English Course for Artificial Intelligence 2024-2025 1 CONTENTS 1. Artificial Intelligence and Its Impact on Society……………………………….4 2. Natural Language Processing.............................................................................. 12 3. Algorithms..........................................................................................................22 4. Cybersecurity.................................................................................................... 34 5. Robotics and Artificial Intelligence.................................................................. 46 6. Password retention and password attacks.......................................................... 58 7. Recovery and backup of data and information.................................................71 8. Machine Learning (MI).................................................................................... 84 9. Wireless network and security......................................................................... 91 10. Information security policy and its management...........................................103 11. Risk management......................................................................................... 114 Glossary.......................................................................................................................... 126 2 PREFACE The purpose of the course book is to form profession-oriented competence of students, enlarge their professional vocabulary and improve their academic English. It aims to help these students to extend and develop a wide variety of language skills and to acquire a knowledge of cyber security in English. Reach selection of motivating and informative, authentic and semi-authentic texts to improve both reading and listening skills with variety topics are presented in themed topics. The book consists of 11 topical lessons and each lesson starts with colorful lead- in activity shifting students’ focus on the topic. Lead-in activity followed by reading and writing activities respectively. As well as these aspects, there is a range of material which can be used according to student’s needs and time available. Students are given useful language to keep changing the phrases they use to express their opinion, agreement and disagreement. All texts are adapted from scientific articles and refer to students’ specialization 3 Unit 1. Artificial Intelligence and Its Impact on Society Artificial Intelligence (AI) is a rapidly growing field that is transforming the way we live, work, and communicate. AI is the development of computer systems that can perform tasks that typically require human intelligence, such as visual perception, speech recognition, decision-making, and language translation. AI has the potential to revolutionize many industries, from healthcare to transportation to finance, and its impact on society is already being felt. As AI technology continues to develop, it is expected to play an increasingly important role in many industries. Here are a few examples of how AI may be used in the future: Healthcare: AI has the potential to revolutionize healthcare by assisting doctors in diagnosing and treating diseases, analyzing patient data to predict health outcomes, and even creating personalized treatment plans. Transportation: Self-driving cars are just one example of how AI can transform transportation. In the future, AI may also be used to optimize traffic patterns and improve public transportation. Education: AI can help personalize learning by analyzing student data and creating customized lesson plans that are tailored to individual students' needs. Business: AI can help businesses make better decisions by analyzing data and providing insights that humans may not have noticed. AI can also be used to automate tasks such as customer service and inventory management. AI can also help businesses save money by reducing labor costs, as fewer human workers are needed to perform certain tasks. Another advantage of AI is its ability to work around the clock without tiring. This 4 can be especially beneficial in industries such as manufacturing, where AI can perform repetitive tasks without getting fatigued. While the potential benefits of AI are immense, there are also some potential risks and challenges that must be addressed. One of the biggest concerns is the possibility of bias in AI algorithms, which could lead to discriminatory outcomes. Additionally, there are concerns about the potential for job loss and economic instability as AI takes over more tasks that were previously performed by humans. Additionally, there are concerns about the ethical implications of AI, such as privacy and security issues. While there are many advantages to AI, it is important to carefully consider the potential drawbacks as well. As AI continues to develop and become more prevalent in our lives, it is important to address these concerns and ensure that AI is being used in a responsible and ethical manner. 1.Match the words with their definitions. Word/Term Definition 1. AI Ethics a. It is a type of Artificial Intelligence that allows computers to learn from experience and understand the world in terms of a hierarchy of concepts. 2. AI Safety b. This is a computer program that can have a conversation with humans through text or voice. 3. Algorithm c. This is about making sure AI is used in a good and fair way. 4. Artificial d. This is a set of instructions given to an AI to help it learn General on its own. Intelligence (AGI) 5. Artificial e. This is the study of how AI can be developed and used Neural Network safely. (ANN) 6. Chatbot f. This is an AI that has the same flexibility of thought as a human, and possibly even consciousness. 7. Cognitive g. This is a model created to act like a human brain that Computing solves tasks that are too difficult for traditional computer systems to solve. 8. Deep h. This is a computer model that tries to think like a human. Learning 5 Comprehension Questions: 1. What is Artificial Intelligence? 2. What are some tasks that AI can perform? 3. Which industries can AI revolutionize? 4. Is AI impacting society yet? 5. What is one advantage of AI in the healthcare industry? 6. What is one potential disadvantage of AI? 7. What are some ethical concerns about AI? Vocabulary Exercises: A. Choose the best word to complete the sentence: 1.Artificial Intelligence is the development of computer systems that can perform tasks that typically require human _________. a. Kindness b. intelligence c. creativity d. strength 2.AI has the potential to __________ many industries. a. revolutionize b. destroy c. ignore d. create 3.The impact of AI on society is already being ___________. a. ignored b. felt c. loved d. forgotten B. Match the words with their definitions: Perception a.The process of converting one language to another Recognition b. The process of identifying or verifying someone or something Decision-making c. The process of making choices or reaching conclusions Translation. d. The ability to understand something 6 Present Simple Tense Positive and negative Question I You live We don’t The live near here. y He lives Sh doesn’t e live It Do you like English? 1.a habit Does he speak I get up at 7:30. French?Short answer He works too much. Yes, I do. 2. a fact which is always true. No, he doesn‟t. Vegetarians don’t eat meat.We come from Samarkand. 3. a fact which is true for a long time. I live in Tashkent. He works in a bank. Grammar exercise 1. Fill in the gaps with the correct form of the verb. Artificial intelligence Artificial Intelligence is the intelligence possessed by the machines under which they can perform various functions with human help. With the help of A.I, machines will be able to learn, solve problems, plan things, think, etc. Artificial Intelligence, for example, is the simulation of human intelligence by machines. In the field of technology, Artificial Intelligence is evolving rapidly day by day and it is believed that in the near future, artificial intelligence is going to change human life very drastically and will most probably end all the crises of the world by sorting out the major problems. Our life in this modern age ……(1)…. largely on computers. It is almost impossible to think about life without computers. We ……(2)….. computers in everything that we use in our daily lives. So it ……(3)………. very important to make computers intelligent so that our 7 lives become easy. Artificial Intelligence is the theory and development of computers, which ……(4)……… the human intelligence and senses, such as visual perception, speech recognition, decision-making, and translation between languages. Artificial Intelligence has brought a revolution in the world of technology. Artificial Intelligence ApplicationsAI is widely used in the field of healthcare. Companies are attempting to develop technologies that will allow for rapid diagnosis. Artificial Intelligence would be able to operate on patients without the need for human oversight. Surgical procedures based on technology are already being performed.Artificial Intelligence would save a lot of our time. The use of robots ……(5)……………. human labour. For example, in industries robots are used which have saved a lot of human effort and time. In the field of education, AI has the potential to be very effective. It can bring innovative ways of teaching students with the help of which students will be able to learn the concepts better. Artificial intelligence is the future of innovative technology as we can use it in many fields. For example, it can be used in the Military sector, Industrial sector, Automobiles, etc. In the coming years, we will be able to see more applications of AI as this technology is evolving day by day. 1. a) has depended b) has been depended c)depend d)depends 2. a) has needed b) had needed c)need d)needs 3. a)become b) becoming c)becomes d)was becoming 4. a) immitate b) had imitated c)immitates d)imitated 5. a)would b) decreases c)decrease d)has decreased decrease Grammar exercise 2. Complete the sentences in Present Simple Tense using the words in brackets. 1. Spyware is a program running in the background that ……(monitor) the user’s computer activities. 2. Anti-Virus Software that …….(attempt) to identify and eliminate computer viruses and other malicious software by: 3.Every one …….(use) electronic communications in some manner; whether it be to check a bank account on a mobile phone, to make reservations at a restaurant, or just browsing social media sites. 8 4.Personal Use of Cyber Security On personal computers cyber security ………(include) the encryption of information. 5. Commercial use of Cyber Security Companies and corporations ……(rely) on different aspects of cyber security in order to protect the shipments of theirproducts ,and more importantly, the financial information of their customers. 6. Network penetration …….(to be) a very important aspect of infrastructure integrity. 7. Cyber security ……… (make ) use of security standards which ……(help) organizations in following best security practices and techniques to be used inorder to minimize the number of successful cyber attacks. WRITING “About myself” Answer the questions below. 1.What is a good introduction? 2.What is personal introduction? 3.How do you introduce yourself? How to Write Shortly About Yourself. Tips. Writing about yourself can be tough, because there is so much you can say. You have a lifetime of experiences, talents, and skills to summarize in a paragraph, or two. Whatever kind of writing you are planning on doing, whatever your purpose, just think about it like you are introducing yourself to a stranger. What do they needto know? Here are some examples of things you can say about yourself: My name’s... I’m from... / I live in... I was born in... 9 I’m... years old. I study at………. I like... because... I don’t like... because... In my free time I... My best friends are... because... My favourite (subject, actor, pop group, sport) is... because... I have............. brothers and sisters. In the future, I’d like to... because... TASK. Write about yourself using tips and examples given above. Answer questionslike: Who are you? What is your background? What are your interests? What are your talents? 10 Choose the correct answer from a, b, c or d:- 11 Unit 2. Natural Language Processing Definition Natural Language Processing (NLP) is a subfield of artificial intelligence that focuses on the interaction between humans and computers using natural language. The ultimate objective of NLP is to read, decipher, understand, and make sense of human language in a valuable way. It involves machine learning, artificial intelligence, and linguistics, allowing computers to understand human speech and text, interpret context, extract meaning, and respond in a way that mimics human conversation 1. Understanding Human Language: Natural Language Processing (NLP) is a branch of artificial intelligence that allows computers to understand, interpret, and respond to human language in a valuable and meaningful way. This understanding can be achieved through various ways, including text analysis, sentiment analysis, and even speech recognition. This can involve analyzing the syntax and grammar of a sentence, as well as identifying keywords and other semantic cues that provide context for the words being used. One key challenge in natural language recognition is dealing with the many different ways that humans can express the same concept. For example, consider the following three sentences: I need to book a flight to New York for next Friday. Can you help me make a reservation for a trip to NYC next week? I want to travel to the Big Apple on the Friday after next. All three of these sentences express essentially the same idea, but they use different words, phrasing, and grammatical structures to do so. Natural language recognition algorithms must be able to recognize the common thread that runs through all of these sentences, and use that understanding to correctly interpret the speaker's intent. To achieve this level of sophistication, natural language recognition systems typically incorporate a wide range of machine learning 12 techniques, including deep learning, neural networks, and natural language processing (NLP) algorithms. These techniques enable the system to learn from vast amounts of data and continually refine its understanding of human language. 2. Application in Various Fields: NLP is widely applied in numerous tasks such as machine translation, which allows computers to translate one language into another; information extraction, which enables the conversion of unstructured text into structured data; and voice recognition systems, which allows the computer to understand and respond to spoken language. 3. Challenges and Limitations: Despite its growing capabilities, NLP faces several challenges such as understanding the context, handling ambiguities, diversities in linguistic, cultural and social aspects, and so on. These challenges limit the accuracy of NLP algorithms and their practical usage but also open up opportunities for further research and development in this field. Importance Natural Language Processing (NLP) is a significant advancement in the field of artificial intelligence (AI) that plays a crucial role in enabling human-machine interaction in a more intuitive and responsive manner. It not only equips machines to understand, interpret, and generate human languages, but also to extract meaningful insights and provide contextually accurate communication. Such capabilities help redefine various industries, ranging from customer service to assistive technologies, where devices can converse and assist users in a natural, conversational manner. Additionally, with its ability to analyze large amounts of language-based data, it aids in decision making, trend predictions and offers personalization. Therefore, NLP is key to creating more sophisticated and accessible technological applications that augment human activities in numerous aspects. Explanation Natural Language Processing (NLP) serves a pivotal role in bridging the gap between human communication and digital data processing, facilitating human-computer interaction. This field of artificial intelligence focuses on the interaction between computers and humans using the natural language. The main purpose of NLP is to read, decipher, understand, and make sense of the human language in a valuable and practical way. It is designed to comprehend how humans speak, including slangs, colloquialisms, and other regional language nuances, which aids in interpreting and responding to queries in a more personalized and contextual manner. 13 2.Match the words with their definitions. Word/Term Definition 1. Annotation a. breaking text data into individual units, such as words or subwords (n-grams), to facilitate further analysis in NLP tasks. 2. Corpus b. an NLP task focused on identifying and classifying named entities, such as names of people, places, organizations, etc., in text. 3. c. adding specific labels or metadata to text data, such as part-of- Lemmatization speech tags, named entity recognition, sentiment scores, etc., to enable machine understanding and analysis. 4. Grammatical d. the process of analyzing the grammatical structure of a Error sentence and identifying the relationships between words, Correction (GEC) represented as a dependency tree 5. Machine e. a large collection of text documents or spoken language data Translation used for training and testing NLP models 6. Tokenization f. an NLP task that automatically translates text from one language to another using computational methods. 7. Named Entity g. reducing words to their base or root form to handle variations Recognition of the same word, such as singular/plural forms or verb tenses. (NER) 8. Dependency h. an NLP task that automatically identifies and corrects Parsing grammar and spelling errors in text. 14 Vocabulary Exercises: 1. What is the definition of natural language recognition? a) The ability for a machine to understand and interpret human language. b) The ability for a human to understand and interpret machine language. c) The ability for a machine to generate human-like language based on data inputs. 2. What are some of the machine learning techniques used in natural language recognition? a) Deep learning, neural networks, and natural language processing. b) Decision trees, regression analysis, and clustering. c) K-nearest neighbors, random forests, and support vector machines. 3. What is the challenge in dealing with different ways that humans express the same concept? a) The challenge is to identify which sentence is correct. b) The challenge is to recognize the common thread that runs through different sentences and use that understanding to interpret the speaker's intent. c) The challenge is to identify the keywords used in each sentence. Comprehension Exercises: 1. What is the main goal of natural language recognition? a) To automate tasks and improve decision-making processes. b) To help machines understand and interpret human language. c) To generate human-like language based on data inputs. 2. What are some of the related fields to natural language recognition? a) Natural language generation and natural language understanding. b) Natural language processing and computer vision. c) Deep learning and neural networks. 3. What are some of the challenges in natural language recognition? a) Dealing with different ways that humans express the same concept. b) Identifying the syntax and grammar of a sentence. c) Learning from vast amounts of data to continually refine the system's understanding of human language. 15 Present Continuous Form. am/is/are + ing (present participle) Positive and negative Question I `m (am) am I `m not is he He `s sh Sh (is) working. What wearing? e e isn’t it It are you Yo `re we u (are) the We aren’t y They Short answer. Are you going? Yes, I am. / No, I`m not. NOT Yes, I`m. Is Saida working? Yes, she is. / No, she isn‟t. NOT Yes, she`s. Use. The Present Continuous is used to express: 1. an activity happening now. They’replaying football in the garden. She can’t talk now because she’s washing her hair. 2. an activity happening around now; but perhaps not at the moment of speaking. He’s studying maths at university. I`m reading a good book at the moment. 3. a planned future arrangement. I`m seeing the doctor at 10.00 tomorrow.What are you doing this evening? Grammar exercise 1. Fill in the blanks with the appropriate form of the verb. 1. Jamila.............................. in the garden. a.works b.is working c.are working 16 2. I............................... Oliver Twist at the moment. a.is reading b.am reading c.are reading 3. He....................................... TV. a.is watching b.am watching c.are watching 4. Who........................... the violin? a. is playing b.are playing c.am playing 5. Don’t make noise. The baby ………………… a. is sleeping b.are sleeping c.am sleeping 6. I............................. in the park now. a. is waiting b.am waiting c.are waiting 7. Karim and Saida............................. in the kitchen. a. is cooking b.are cooking c.am cooking 8. He............................. pizza at the moment. a. is making b.are making c.am making 9. Mother............................... a sweater. a. is knitting b.are knitting c.am knitting 10. Sevara and her friend............................... over for lunch. a. is coming b.are coming c.am coming 2.4 Read and check. Grammar exercise 2. Make the present continuous - positive, negative orquestion. 1) (they / not / read) 2) (I / cook tonight) 3) (he / see the doctor tomorrow)? 4) (you / eat chocolate)? 5) (what / you / do)? 6) (we / make a mistake)? 17 7) (you / come tomorrow) 8) (it / snow) 9) (John / sleep at the moment) 10) (he / not / dance) 11) (how / they / get here)? 12) (when / it / start)? 13) (I / not / speak Chinese at the moment) 14) (I / stay with a friend for the weekend) 15) (they / come to the party)? 16) (we / not / study) Writing a CV. Discuss with a partner. Are these sentences True or False?. 1. A CV is a document with information about you.T/F 2. You use a CV to get a job.T/F A CV is a document thatlists 3. You should put your photo on your CV.T/F your qualifications previous 4. Your CV should be 3 or 4 pages long.T/F and current employment. It is included as part of a job 5. It’s OK to have mistakes application and is intended help to you sellyourself and (spelling, grammar) on your CV.T/F your abilities to a potential 6. All information on your CV must be in full sentences.T/F 18 Here is a sample CV. Use this template and design your own. Bobokulov Akmaljon CV I am a multimedia programmer with qualifications and experience. I am looking for a job in computer programming sphere in Tashkent. Personal details Address: 56/8/3 Chilanzar, Tashkent, UzbekistanEmail: [email protected] Phone: +998998591804 Date of birth: 18 April 1995 Education and qualifications 2010-2013: Shakhrisabz Lyceum of Information Technology, Kashkadarya(Uzbekistan). Diploma in Telecommunication engineer 2017-present: student of Tashkent University of Information Technology 4th course, Telecommunication Technology faculty Work experience 2011-2012: engineer of Exchange in Shakhrisabz. 2017-present: network administration for the Internet Provider (EVO company)in Tashkent. Skills Languages: Uzbek(fluent); English (advanced); Russian(elementary); Computers: Microsoft Office (Word, Excel and PowerPoint), Network administration(Cisco CCNA,CCNP): UZ driving license Interests I enjoy football and played for the men’s team at university. References Mr Khurshid Urakov, English Lecturer, Everest company: [email protected] Mr Umrullo Alayev, main network administration of Uztelecom, in Tashkent [email protected] 19 ………………… CV I am……………………………………………………………………………………. Personal details Address: ………………………………. Email: …………………………………. Phone: ………………………………… Date of birth: …………………………. Education and qualifications year: ………………………………………………………………………….……… year:……………………………………………………………………….…………. Work experience year: ……………………………………………………………………..…………… year:………………………………………………………………..…………………. Skills Languages: …………………………………………………………………………… Computers: …………………………………………………………………………... ………………………………………………………………………………………… ………………………………………………………………………………………… Interests I enjoy …………………………………………………………………………...……. ……………………………………………………………………………………….... ………………………………………………………………………………………… ………………………………………………………………………………………… References …………………………………………………………………………………………. …………………………………………………………………………………………. ………………………………………………………………………………………… ………………………………………………………………………………………… 20 Choose the correct answer from a,b,c or d:- 21 Unit 3. Algorithms Algorithms are sets of instructions that a computer or any other machine can follow to perform a specific task. They are the building blocks of computer programs and play a crucial role in modern technology. An algorithm can be thought of as a recipe, where each step is a specific instruction that must be followed in order to achieve a desired outcome. Algorithms are used in a wide range of applications, from basic calculations to complex data processing and artificial intelligence. They are used to solve problems, optimize processes, and automate tasks. For example, algorithms are used by search engines to determine the relevance of web pages to a particular search query, and by online retailers to recommend products to customers based on their purchase history. When designing an algorithm, it is important to consider factors such as efficiency, scalability, and accuracy. An algorithm that is efficient will complete a task in a reasonable amount of time, while a scalable algorithm will continue to perform well even as the amount of data or complexity of the task increases. Accuracy is also important, as an algorithm that produces inaccurate results can have serious consequences in many applications. 22 To create an algorithm, a programmer will typically use a programming language and write code that describes the specific steps that the machine should follow. Once the code is written, it must be tested and optimized to ensure that it is efficient, accurate, and scalable. Algorithms classifications: Algorithms can be classified into different categories based on their characteristics and applications. One common classification is based on the type of problem they solve. For example, sorting algorithms are used to arrange data in a specific order, while searching algorithms are used to find a specific item within a dataset. Another way to classify algorithms is based on their complexity. Some algorithms are simple and can be executed quickly, while others are complex and may take a long time to complete. One way to measure the complexity of an algorithm is to calculate its time complexity, which is the amount of time it takes to complete as the size of the input data increases. Algorithms can also be classified based on their approach to problem- solving. For example, bruteforce algorithms solve problems by trying every possible solution, while divide-and-conquer algorithms break a problem down into smaller sub-problems that are easier to solve. Machine learning algorithms are a specific type of algorithm that use statistical models to identify patterns in data and make predictions based on those patterns. They are commonly used in applications such as image and speech recognition, natural language processing, and recommendation systems. In recent years, there has been growing interest in developing algorithms that are more ethical and fair. This has led to the emergence of a new field called "algorithmic fairness," which aims to develop algorithms that do not discriminate against individuals based on factors such as race, gender, or socio-economic status. 23 2.Match the words with their definitions. Words Definitions 1 Computational a Breaking down a problem into parts that are easier to thinking conceive, understand,and maintain 2 Abstraction b A way of getting a solution by identifying the steps neeed. 3 Decomposition c A simple sorting algorithm that builds the final sorted array (or list) one item at a time. 4 Algorithmic d A simple algorithm which compares pairs of items thinking together until the data set is in order. 5 Binary Search e A language independent description of the steps of an algorithm. Intended for humans to express and design algorithms before coding. 6 Bubble sort f to divide the array into two halves, sort each half, and then merge the sorted halves back together 7 Merge sort g Accesses the middle record in the file and determines whether the target has been found.Only works if records in the file are in order. 8 Insertion Sort h The process of separating ideas from specific instances of those ideas at work. 9 Pseudocode i a basic algorithm for arranging a string of numbers or other elements in the correct order. 1 Flow diagram j The thought processes involved in formulating a 0 problem and expressing its solution in such a way that computer, human and machine, can effectively carry out. 1 2 3 4 5 6 7 8 9 10 24 Comprehension questions: 1. What are algorithms? 2. What role do algorithms play in modern technology? 3. Give an example of an application of algorithms. 4. What factors should be considered when designing an algorithm? 5. How do programmers create algorithms? 6. How can algorithms be classified based on the type of problem they solve? 7. What is time complexity? 8. What is the difference between brute-force and divide-and-conquer algorithms? 9. What are machine learning algorithms? 10. What is algorithmic fairness? Vocabulary questions: 11. Define algorithm. 12. Give a synonym for the word 'crucial'. 13. What does the term 'optimize' mean? 14. What is meant by the term 'scalable'? 15. Define 'programmer'. 16. Define time complexity. 17. Give a synonym for the word 'execute'. 18. What does the term 'brute-force' mean? 19. Define 'machine learning'. 20. What is the meaning of the term 'algorithmic fairness'? 25 26 Read and choose the best answer. 1. Algorithms are sets of ………….. that a computer or any other machine can follow to perform a specific task. a.technology b.techniques c. instructions 2. When designing an algorithm, it is important to consider factors such as……….. a.effeciency b.applications c.complexity 3. Algorithms can be classified into different ……... based on their characteristics and applications. a.rules b.categories c.instructions 4. In recent years, there has been growing interest in developing algorithms that led to the emergence of a new field called …………. a.algorithmic thinking b. algorithmic fairness c.algorithmic rule 5. ….……. algorithms are a specific type of algorithm that use statistical models to identify patterns in data and make predictions based on those patterns. a.Deep learning b.Machine learning c.Digital learning 27 Read and complete the sentences. 1. Algorithms are used by search engines to determine……………… 2. To create an algorithm, a programmer will typically use………………….. 3. Algorithms can be classified into different categories based on their……… 4. Machine learning algorithms are a specific type of algorithm that use statistical models to….......…………………………………………………… 5. Algorithmic fairness aims to………………………………………………………… 5.Read the text and find the words or phrases in the text with the following meanings. 1 ---------------------------- sets of instructions that a computer or any other machine can follow to perform a specific task. 2…………………………. a specific type of algorithm that use statistical models to identify patterns in data and make predictions based on those patterns. 28 Article 1. The indefinite article a or an in used with singular, count nouns to refer to a thing or an idea for the first time. We are a cat and a dog./ There’s a supermarket in Adam Street. 2. The definite article the is used with singular and plural, count and uncount nouns when both the speaker and the listener know the thing or idea already. We have a cat and a dog. The cat is old, but the dog is just a puppy. I’m going to the supermarket. Do you want anything? (We both know which supermarket) Definite article. The definite article used: 1. before seas, rivers, hotels, pubs, theatres, museums, and newspapers. the Atlantic the British Museum The Times the Ritz 2. if there is only one of something the sun the Queen the Government 3. with superlative adjectives. He’s the richest man in the world./ Jane’s the oldest in the class 29 Indefinite article. The indefinite article is used: 1. with professions. I’m a teacher./ She is an architect. 2. with some expressions of quantity. a pair of / a little / a couple of / a few 3. with some expressions of frequency. once a week/ three times a day 4. in exclamations with what +a count noun What a lovely day!/ What a pity! No article. There is no article: 1.before plural and uncount nouns when talking about thing in general. I like potatoes. / Milk is good for you. 2.before countries, towns, streets, languages, magazines, meals, airports, stations and mountains I had launch with Jamshid./ I bougth Cosmopolitan at Victoria Station. Before some places and with some forms of transport at home In/to bed at/to work At/to school/university By bus By plane By car By train On foot She goes to work by bus. so + adjective/adverb so many + plural nouns I was so scared. Some children have so many toys. He always drives so fast. such a + adjective + singular noun so much + uncountable nouns She’s such a nice person. Footballers earn so much money these days. such + adjective + plural/uncountable noun The Smiths are such friendly neighbours. Note: So and such are used for emphasizing an adjective or noun. They are used more in spoken than written English. They are often exclamations, with an exclamation mark(!). He works so hard! is stronger than He works very hard. 30 Grammar exercise 1. Choose the correct definite or indefinite article: "the","a", "an" or "-" (zero article). 1.I saw …… movie last night. 2.They are staying at ….. hotel. 3.Look at ……. woman over there! She is a famous actress. 4.I do not like …… basketball. 5.That is …… girl I told you about. 6.…… night is quiet. Let's take a walk! 7.John traveled to ….. Mexico. 8.I read …… amazing story yesterday. 9.I live in ……. apartment............................ apartment is new. 10.I would like...........................piece of cake. Grammar exercise 2. Put Correct Articles. 1. Authentication is common technique for masking contents of messages or other information traffic so that opponents cannot extract the information from the message. a) a b) the c) an 2. Replay an attacker performs capture of data unit and its subsequent retransmission to produce an unauthorized effect. a) the, the b) a, a c) an, an 3. Feistel is block cipher structure in DES a) – b) the c) an 4. greatest common divisor of two integers is the largest positive integer that exactly divides both integers. 31 a) the b) an c) – 5. distribution of bits in a random number sequence should be uniform therefore the frequency of occurrence of ones and zeros should be approximately equal. a) a b) – c) the 6. Miller–Rabin algorithm is typically used to test large number for primality. a) a b) the c) an Read and check. Grammar Exercise 3. Choose the correct article: a, an, the or - (no article). 1.Are you coming to …… party next Saturday? 2.I bought …… new TV set yesterday. 3.I think ….. man over there is very ill. He can't stand on his feet. 4.I watched …… video you had sent me. 5.She was wearing …… ugly dress when she met him. 6.I am crazy about reading …… history books.7.She is …… nice girl. 8.Do you want to go to ……. restaurant where we first met? 9.He is …… engineer. 10.He thinks that..................... love is what will save us all. WRITING a letter to a friend. 1.How do you write a letter to a friend?2.How do you begin a letter? 3.How do you end a letter to a friend? 4.What are the steps to write a letter? 32 The 5 steps to Writing a Letter Step 1. The Heading: This includes your address and the date. Write it in theupper-right corner of the page and spell out the name of the month to avoid confusion. Step 2. The Salutation: This is the ―hello‖ part of your letter and is also known as the greeting. It is located on the next line after the heading, but it is placed on the left side of the page about an inch from the edge. The name of the person should be capitalized and followed by a comma. Step 3. The Body: Here is where you express thoughts and ideas. In other words, it is the reason for writing the letter. Start under the salutation, an inch from the left edge or the page (5 spaces). Step 4: The Closing: This is the ―good-bye‖ part of the letter. Usually, words such as ―Your truly‖ or ―Love‖ are used here. Closings should make the reader feel like you really care or that you really mean what you have written. Step 5: The Signature: Sing the letter in your own handwriting just below the closing. Task.You want to sell your Laptop. You think that your friend might buy it from you. Write a letter to your friend. In your letter: -Explain why you are selling the Laptop; -Describe the Laptop; Suggest a date when your friend can come and see it. Dear (name) 33 7. Each object--------Jupiter's magnetic Choose the correct answer from a,b,c or d:- field is deluged with electrical charges. 1. The three basic chords in _____ the tonic, (A) enters the dominant, and the subdominant. (B) it enters (A) functional harmony (C) entering (B) functional harmony is (D) enter (C) functional harmony are 8. As its name suggests, the Prairie (D) functional harmony they are Wetlands Resource Center_____ the 2. --------Hale Telescope, at the Palomar protection of wetlands on the prairies Observatory in southern California, of the Dakotas, Montana, Minnesota, scientists can photograph objects several and Nebraska. billion light years away. (A) it focuses (A) The (B) focuses on (B) With the (C) focusing (C) They use the (D) to focus on (D) It is the 9. One of the largest and most 3. Without the proper card installed inside powerful birds of prey in the the computer,____impossible to run a world,_____ a six-foot wingspan and graphical program. legs and talons roughly the size of a (A) is definitely man‟s arms and legs. (B) because of (A) so the harpy has (C) it is (B) the harpy having (D) is (C) with the harpy having 4. The charter for the Louisiana lottery was (D) the harpy has coming up for renewal,_____ spared no 10. ……creation of such a community expense in the fight to win renewal. was a desirable step, the requisite (A) the lottery committee political upheaval had to be accepted. (B) so the lottery committee and (A) Since the (C) so the lottery committee (B) The (D) the lottery committee made (C) Later, the 5. While in reality Alpha Centauri is a triple (D) It was the star,--------to the naked eye to be a single star. (A) it appears (B) but it appears (C) appears (D) despite it 6. The Sun‟s gravity severely distorted the path of the comet_____ entered its wildly erratic orbit around Jupiter. (A) it (B) when (C) after the comet came into it (D) once the comet 34 Unit 4. Cybersecurity Cybersecurity is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage. As our lives become increasingly reliant on digital technology, the need for robust cybersecurity measures has never been more critical. One of the most common cybersecurity threats is phishing. This is a type of cyber-attack that involves an attacker sending fraudulent messages, often via email, in an attempt to trick the recipient into revealing sensitive information, such as passwords or credit card details. These messages often appear to come from a legitimate source, such as a bank or a government agency, and may include a sense of urgency or fear to pressure the victim into acting quickly. Phishing attacks can also take the form of spear phishing, where the attacker targets specific individuals or organizations, or whaling, where the attacker targets high-profile individuals such as CEOs or politicians. In addition to phishing scams, there are many other types of cyber threats that can compromise our online security. Malware, for example, is a type of software that is designed to cause harm to a computer system or network. This can include viruses, worms, Trojans, and ransomware. Malware can be spread through malicious email attachments, infected websites, or even social media messages. Another common cyber threat is a DDoS attack, or distributed denial-of service attack. In this type of attack, the attacker floods a website or network with traffic from multiple sources, causing it to crash or become unavailable to legitimate users. DDoS attacks are often carried out using botnets, which are networks of compromised computers that are controlled by the attacker. To protect ourselves from these and other cyber threats, there are several basic security measures that we can take. First and foremost, we should use strong passwords that are unique for each account and enable two-factor authentication whenever possible. We should also keep our software and operating systems up-to-date with the latest security patches and avoid clicking on suspicious links or downloading files from unknown sources. 35 Finally, it is important to use antivirus software and to back up important data regularly to minimize the impact of any successful cyber-attacks. Cybersecurity is an increasingly important field, and many organizations are investing heavily in this area to protect their sensitive data and intellectual property. Cybersecurity professionals may work in a variety of roles, from network security analysts and penetration testers to cybercrime investigators and cybersecurity policy advisors. As the threats and technologies of the digital age continue to evolve, the demand for skilled cybersecurity professionals is only likely to increase. Vocabulary exercises: 1. What is phishing? a. A type of cyber-attack that involves an attacker flooding a website or network with traffic from multiple sources b. A type of cyber-attack that involves an attacker sending fraudulent messages in an attempt to trick the recipient into revealing sensitive information c. A type of encryption used to protect sensitive information 2. What is malware? a. A type of software that is designed to cause harm to a computer system or network b. A type of encryption used to protect sensitive information c. A type of firewall that blocks malicious traffic 3. What is a DDoS attack? a. A type of cyber-attack in which the attacker sends a fraudulent message to trick the victim into revealing sensitive information b. A type of cyber-attack in which the attacker floods a website or network with traffic from multiple sources, causing it to crash or become unavailable to legitimate users c. A type of cyber-attack in which the attacker gains access to a computer system or network without authorization Comprehension exercise: Read the following passage and answer the questions below: "Cybersecurity professionals play a critical role in protecting organizations and individuals from cyber threats. These professionals may work in a variety of roles, including network security analysts, penetration testers, and cybersecurity policy advisors. They use their expertise to identify vulnerabilities in computer systems and networks and develop strategies to mitigate these risks. As technology continues to advance, the field of cybersecurity will become even more important, and the demand for skilled professionals is likely to increase." 36 1. What is the role of cybersecurity professionals? 2. What are some of the roles that cybersecurity professionals may work in? 3. Why is the field of cybersecurity becoming increasinggly important? 2.Match the words with their definitions. Word/Term Definition 1. patch a. a string of characters that allows access to a computer system or service 2. cyberattack b. the state of being free from public attention 3.password c. An update or change or an operating system or application. 4. malicious d. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. 5.domain e. an attempt by hackers to damage or destroy a computer network or system. 6.bug f. characterized by malice; intending or intended to do harm 7.cybersecurity g. an error, flaw or fault in a computer program or system that causes it to produce an incorrect or unexpected result 8.Spyware h. Anything used as part of a security response strategy which addresses a threat in order to reduce risk. 9.security i. an area of territory owned or controlled by a particular ruler or Control government. 10.privacy j. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive 1 2 3 4 5 6 7 8 9 10 37 3.Read the passage about cybersecurity and then answer the following questions: Common Cyber security measures Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cyber security measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. Essential cyber security measures: 1.Use strong passwords. Strong passwords are vital to good online security. 2.Create a password policy for your business to help staff follow security bestpractice. Look into different technology solutions to enforce your password policy. 3.Control access. Make sure that individuals can only access data and services forwhich they are authorized. For example, you can: -control physical access to premises and computers network; -restrict access to unauthorized users; -limit access to data or services through application controls; -restrict what can be copied from the system and saved to storage devices; -limit sending and receiving of certain types of email attachments. Modern operating systems and network software will help you to achieve most of this, but you will need to manage the registration of users and user authentication systems - passwords. 4. Put up a firewall. Firewalls are effectively gatekeepers between your computer and the internet, and one of the major barriers to cyber threats such as viruses and malware. Make sure that you set up your firewall devices properly or they may not be fully effective. Read more about firewalls in server security. 38 Use security software. You should use security software, such as anti-spywareand anti- virus programs, to help detect and remove malicious code if it slips intoyour network. Discover how to detect spam, malware and virus attacks. 1. The way I operate my computer can affect other people. A. True B. False 2. You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately? A. Yes B. No C. Maybe 3. Why might someone break into (hack) your computer? A. They don't like you. B. To commit a crime C. Random vandalism D. To use it to distribute porn, malicious programs, etc. E. All of the above 4. If you receive an email claiming to need your username and/or password, what should you do? A. Report it as phishing/spam through your email provider B. Delete the message C. Reply to the message with your email and password 5. Both email attachments and downloaded files can spread malware. A. True B. False 6. What is the best way to protect your information when you are away from your computer? A. Lock the computer with a password B. Activate the screen saver C. Turn the monitor off 39 7. What is a firewall? A. wall that is reinforced and cannot catch on fire. B. program that protects against viruses. C. A filter for an internet connection that monitors outgoing and incoming activity. 8. A strong password should contain: A. Both uppercase and lowercase letters. B. A word that is easy to remember, such as the name of a pet. C. At least 8 characters, and a combination of letters, numbers, and characters. 9.Write Dos and Don‟ts Cyber security is the shared responsibility of every agency employee and business unit. Which of these are good actions for cyber security and which of these are not so good? Write Do or Don‟ts before each one. 1. use hard-to-guess passwords or passphrases. 2. share your passwords with others or write them down. You are responsible for all activities associated with your credentials. 3. leave sensitive information lying around the office. 4. leave printouts or portable media containing private information on your desk. 5. post any private or sensitive information, such as credit card numbers, passwords or other private information. 6. click on links from an unknown or untrusted source. Cyber attackers often use them to trick you. 7. be tricked into giving away confidential information. It’s easy for an unauthorized person to call and pretend to be an employee or business partner.8. respond to phone calls or emails requesting confidential data. 9. destroy information properly when it is no longer needed. 10. be aware of your surroundings when printing, copying, faxing or discussing sensitive information. 40 11. install unauthorized programs on your work computer. Malicious applications often pose as legitimate software. 12. lock your computer and mobile phone when not in use. 13. leave devices unattended. Keep all mobile devices, such as laptops and cell phones physically secured. DON’T leave wireless or Bluetooth turned on when not in use. 14. report all suspicious activity and cyber incidents to your security representative. 10.Work with your partner and make a list of Dos and Don‟ts of Information Security Awareness. Dos Don’ts 41 The verb have/have got Have \ has – (formal) Have got\ has got – informal Formation Positive form Positive form I, You, We/ They + have + a I, You, We, They + have got+ two lessontoday. siblings. She, he, it + has + a big house. She, he, it + has got + an expensive car. Negative form Negative form I, You, We, They + don’t + have I, You, We. They + haven’t got two +a lesson on Sunday. siblings. She, he, it+ doesn’t + a big house. She, he, it+ hasn’t got + an expensive car. Question form Question form Do + I, you, we, they+ have a Have+ I, you, we, they+ got+ two lesson on Sunday? – No, I, you, siblings? we. they + don’t. / Yes, I, we, they – No, I, you, we, they + haven’t / Yes, I, +do. we + have. Has + she, he, it+ got + Does + she, he, it+ a big house? – an expensive car? – Yes, she, he, it+ has Yes, she, he, it+ does. / No, she, got. / No, she, he, it+ hasn’t. he,it+ doesn’t. P.S. We don’t use got in short answers. Have you got a mobile phone? - Yes, I have. got/ No, I haven’t. Both of these verbs are used to talk about: 1. possession. I have a meeting today. / I have got a meeting today. Karim has the latest model of PC. / Karim has got the latest model of PC. 2. relationship. Do you have any siblings? / Have you got any siblings? Nodir has five aunts and two uncles. / Nodir has got five aunts and two uncles. 3. illnesses. My brother has got the flu now. / My brother has the flu now. I’ve got a terrible headache. / I’ve a terrible headache. 4. characteristics or appearance. Our room in the hotel has got a nice view./Our room in the hotel has a nice view. Why do you have a tattoo? / Why have you got a tattoo? My elder daughter has blue eyes. 5. things we do (meals, holidays…) and with a bath, a shower, or a wash. I with my family usually have a breakfast at 7. Alisher can’t answer the phone now. He is having a shower. 42 Grammar exercise 1. Fill in the gaps with the correct form of have/has got. 1…….. an item for sale in a reputable store implicitly attests to it being genuine, the first type of authentication. A) Have B)Having C) Has D)Being 2.The ways in which someone may be authenticated fall into three categories, based on what are known as the factors of authentication: something the user knows,something the user…… , and something the user is. A)have B) had C)has D) can 3.The ownership factors - Something the user …..wrist band, ID card, security token, implanted device, cell phone with built-in hardware token, software token, or cell phone holding a software token. A)have B) has C)had D) can 4.The term digital authentication …… another meaning as electronic authentication or e- authentication, refers to a group of processes where the confidence for user identities is established and presented via electronic methods to an information system. A)has B) have C)had D) can 5.Authorization …… the process which is distinct from that of authentication. A)have got B) has got C) had got D) don’t have got 6.A full authentication protocol …….a number of attributes about this user,such as a unique identifier, an email address. A) has B) have C) had D) can 7.We …… two ways to send the authentication token to an API. You can includeit as a query parameter, access token=$token, or as an HTTP header Authorization: Bearer $toke. The header method is recommended. A) has B) have C)had D) can 8.Users ….. a user ID which are usually identified with, and authentication is accomplished when the user provides a credential, for example a password, that matches with that user ID. A)have got B) has got C)had D) to be 43 9.Most users ….. the familiarity with using a password, which, as a piece of information that should be known only to the user, is called a knowledge authentication factor. A) has B) have C)had D) can 10.Authentication is important because it..... enabling organizations to keep their networks secure by permitting only authenticated users to access its protected resources, which may include computer systems, networks, databases, websites andother network- based applications or services. A)has B) have C)had D) can Grammar exercise 2. Fill the gaps with: have / has / have got / has got. 1. Organizations also use authentication to control which users ……… access to corporate networks and resources. 2. An old security adage ……… it that authentication factors can be "something you know, something you have or something you are." 3. This approach to authentication ……… several drawbacks, particularly for resources deployed across different systems. 4. Now that you ……… routes and views setup for the included authentication controllers. 5. Many smartphones ……… a fingerprint sensor that allows you to unlock your phone. 6. Some facilities ……… retinal scanners, which require an eye scan to allow authorized individuals to access secure areas. WRITING a description. 1.What is an example of a description? 2.How do you write a description? 1)Print a copy of the 3.What makes a good description? structure of a description 4.What is effective description? 2. Plan your writing task by writing notes near each 5. What is the use of description? section. 6. What are some descriptive words? 3) Write your description. 44 Task.Describe a piece of modern technology you own. You should say: -what it is -what you use it for -how long you have owned it and explain why it is important to you. 45 Choose the correct answer from a,b,c or d:- 1. Dolphins form extremely complicated 7. In a 1988 advanced officers' training allegiances and ……continually change. program, Sampson developed a plan to (A) enimities that incorporate police in enforcing (B) that are enimities environmental protection laws (C) enimities that are whenever feasible. (D) that enimities (A) it is 2.Scientists are now beginning to conduct (B) is experiments on ….trigger different sorts (C) has of health risks. (D) it has (A) noise pollution can 8. _____will be carried in the next space (B) that noise pollution shuttle payload has not yet been (C) how noise pollution announced to the public. (D) how noise pollution can (A) It 3. The Apollo 11 astronauts….. of the (B) What Earth‟s inhabitants witnessed on the (C) When famous first moonwalk on July 20, 1969, (D) That were Neil Armstrong and Buzz Aldrin. 9. During free fall,_____ up to a full (A) whom minute, a skydiver will fall at a (B) whom millions constant speed of 120 m.p.h. (C) were some (A) it is (D) whom some were (B) which is 4. At the end of the nineteenth century, (C) being Alfred Binet developed a test for (D) is measuring intelligence…. Served as the 10. The fact____the most important basis of modern IQ tests. ratings period is about to begin has (A) has caused all three networks to shore up (B) it has their schedules. (C) and (A) is that (D) which has (B) of (C) that 5. _____ have at least four hours of (D) what hazardous materials response training is 11. _____ loom high above the north mandated by federal law. and northeastern boundaries of the (A) All police officers expanding city of Tucson. (B) All police officers must (A) The Santa Catalina mountains (C) That all police officers (B) Because the Santa Catalina (D) For all police officers mountains 6. A clouds reservoir of negative charge (C) The Santa Catalina mountains are extends upward from the altitude at ------- (D) That the Santa Catalina mountains -the freezing point. 12. Radioactive_____ provides a (A) temperatures hit powerful way to measure geologic time. (B) hit temperatures (A) it (D) can (C) which temperatures hit (B) dates (D) which hit temperatures (C) dating 46 13. _____ contained in the chromosomes, (B) that Wolf and they are thought of as the units of (C) what Wolf heredity. (D) so Wolf (A) Genes which are 17. in the first draft of the budget will (B) Genes are not necessarily be in the final draft. (C) When genes (A) Although it appears (D) Because of genes (B) It appears 14. The benefit_____ the study is that it (C) What appears provides necessary information to anyone (D) Despite its appearance who needs it. 18. A need for space law to include (A) of commercial concerns has been (B) which recognized inasmuch_____ been (C) that expanding drastically in recent years. (D) because (A) the commercial launch industry 15. The same symptoms that occur-------- (B) the commercial launch industry has occur with cocaine. (C) as has the commercial launch (A) amphetamines can industry (B) with amphetamines can (D) as the commercial launch industry (C) so amphetamines has (D) with amphetamines they 18. If a food label indicates that a food 16. Many companies across the country is mostly carbohydrate, it does not have molded the concepts_____ describes mean------ is a good food to eat. into an integrated strategy for preventing (A) and it (C) that it stress. (B) and (D) when (A) and Wolf 47 Unit 5: Robotics and Artificial Intelligence What Is Robotics? Robotics is a branch of engineering and computer sciences that includes the design, construction and operation of machines that are capable of performing programmed tasks without additional human involvement. At its core, robotics is about using technology to automate tasks while making them more efficient and safe. Historically, robots have been used for tasks that are too difficult or dangerous for humans to perform — such as lifting heavy equipment — or for activities that are very repetitive, such as assembling automobiles. By automating these tasks, robotics solutions can enhance productivity and improve safety, freeing up human workers to focus on other more complex and creative endeavors. It’s also worth noting that robots are not subject to the same limitations as humans. For example, a human doing the same task over and over may become tired, bored or disengaged, but the robot will continue to perform the same task with an unwavering level of efficiency and precision. Robotics solutions are already making a major impact across numerous industries, from meticulously harvesting crops to making deliveries and assembling cars. Are AI and Robotics the Same Thing? Although AI and robotics are sometimes used interchangeably, in reality, they are distinct — yet related — fields. While both AI and robotics can potentially impact various industries and aspects of life in significant ways, each serves a different purpose and operates in a unique way. 48 Simply, AI neural network models are similar to biological neural networks, while robotics is comparable to the human body. AI refers to the development of systems that can perform tasks that typically require human intelligence, such as learning, problem- solving and decision-making. These systems can work autonomously, without the need for constant instructions, since they’re programmed to learn and adapt on their own. Robotics, on the other hand, refers to the development of robots that can perform specific physical tasks. These robots can be programmed to carry out simple, repetitive actions, such as sorting items or assembling miniscule parts. While AI can be integrated into robotics to enhance the robot’s capabilities and improve decision-making, it’s not always necessary. Some robotics applications simply require robots to carry out predictable actions without the need for additional cognitive capabilities. While AI and robotics are not the same things, they do complement each other and can work together to bring about a wide range of benefits and advancements in various applications. How AI Is Used in Robotics AI has made substantial progress in recent years, and its integration with robotics has proven to be a natural progression. While AI in robotics is not yet widespread, it’s rapidly gaining momentum as AI systems become more advanced. The combination of AI and robotics holds tremendous potential, leading to increased productivity and efficiency, improved safety and greater flexibility for workers in a variety of professions. One of the key ways in which AI is used in robotics is through machine learning. This technique enables robots to learn and perform specific tasks through observing and mimicking human actions. AI gives robots a computer vision that enables them to navigate, detect and determine their reactions accordingly. This helps them go beyond simply performing repetitive tasks to become true ―cognitive collaborators.‖ Another way that AI is used in robotics is through edge computing. AI applications in robotics require the interpretation of massive amounts of data gathered by robot-based sensors in real time, which is why this data is analyzed close to the machine, rather than being sent off to the cloud for processing. This approach provides machines with real-time awareness, enabling robots to act on decisions at a rate much quicker than human capabilities allow. 49 1.Match the words with their definitions. Words Definitions 1 Velocity a A robot’s ability to return to a given position multiple times. 2 Cybernetics b A modern industrial robot designed specifically to interactsafely with humans. 3 Encoder c The speed at which an object is travelling and the direction inwhich it is travelling. 4 Sensor d A small mobile robot. 5 Insect robot e In robotics this is a device used to generate pulses as a wheelturns, which can be used to measure velocity 6 Robot f A device which is used to measure a quantity – such as repeatability the distanceto an object or the speed of a robot. 7 Baxter robot g The science of control and communication (in the animal andthe machine) – the science of feedback systems – incorporating control,learning and interaction 8 Robot h To accelerate or decelerate the speed with which a robot accuracy moves. 9 Payload i How close a robot's actual movement is to a given position. 1 Ramping j The size and weight of the material that a robotic arm 0 can safely lift. 1 2 3 4 5 6 7 8 9 10 50 Comprehension Questions Choose the correct answer: 1. What does AI stand for in robotics? A) Advanced Intelligence B) Artificial Inference C) Artificial Intelligence D) Automated Integration 2. Which type of robot is designed to mimic human or animal movements? A) Industrial robot B) Humanoid robot C) Wheeled robot D) Drone 3.What is the role of sensors in robotics? A) Provide power to the robot B) Control the robot's movements C) Sense and respond to the environment D) Maintain robot aesthetics 4. What is the term used to describe a robot's ability to learn from its environment? A) Sensory adaptation B) Environmental conditioning C) Machine learning D) Robotic behaviorism 5. Which component of a robot is responsible for processing data and making decisions? A) Actuator B) Sensor C) Controller D) Gripper 51 Future Simple (Will+infinitive without to) Positive and negative Questions I/He/she/ „ll(will come Will you help me? it/you/we )won‟t help Yes, I will. /they you No, I won‟t. invite Umid Wha I be back? t will he/she/it time you we the y Will is used: 1. to express a future intention made at the moment of speaking. a. It’s Malika’s birthday. Is it? I’ll buy her some flowers. b. I’ll give you my phone number. c. Do you want the blue or the red pen? I’ll take the red one. 2. to express an offer. I’ll carry your suitcase. We’ll do the washing-up. 3. to express a future fact. The speaker thinks it is sure to happen in the future. I’ll come next week. It will be a nice day tomorrow. This use is called the pure future. The speaker is talking about the future without expressing an intention, plan or personal opinion. Grammar exercise 1. Choose the correct form of the tense. 1. Truly secure encryption will be / had been complex enough that a third party is highly unlikely to decrypt the cipher text. 2. This means that you needed to / will need to archive de-activated keys and use them only for decryption. 52 3. An algorithm will use / used the key in order to alter the data in a predictable way. 4. Even though the encrypted data will appear / appears random, it can be turned back into plaintext by using the key again. 5. A website served over HTTPS instead of HTTP had / will have a URL that begins with https:// instead of http://. 6. A website that implements HTTPS will have / has an SSL certificate installed on its origin server. 7. At the beginning of the encryption process, the sender must decide what cipher will best disguise / best disguised the meaning of the message andwhat variable to use as a key to make the encoded message unique. 8. If the hardware test fails, the system reboots, and encryption will not be / had not been enforced. 9. As a result, quantum-encoded data cannot be copied because any attempt to access the encoded data changed / will change the data. 10. Likewise, any attempt to copy or access the data will cause / caused a change in the data, thus notifying the authorized parties to the encryption that an attack has occurred. Grammar exercise 2. Complete the sentences in Future simple tense with theverbs in brackets. 1. Even the slightest change to the message can be detected because it (make) a big change to the resulting hash. 2. the industry ever (reach) a point where all encryption algorithms can be broken by brute force and rendered useless or uneconomic? 3. The bad guys (figure out) how to create a Trojan that steals CPU cycles from all over the world to break encryption. 4. Meanwhile the good guys (find) a way to add another 64 bits, making the decrypt cycles take exponentially longer for brute force -- and onand on it (go). 53 5. I believe this (happen) if a workable large-scale quantum computer can be developed. 6. The more effective the encryption becomes, the harder the criminals' endeavor on breaking/stealing passwords (be). 7. People like to be helping and preying on that ("Social Engineering") (continue) to be a bigger threat than these sorts of technical discussions. 8. Those trying to decrypt a message (study) the frequency of letters or groups of letters in a cipher text. 9. When you encrypt something, the computer (ask) you to set up a password. 10. After that, no one (be) able to make sense of the information unless they have the same password. Grammar exercise 3. Fill in the gaps with the correct tenses. 1. If someone knows the secret key and can figure out the algorithm, communications. a. insecure b. will be insecure c. unsecured d. will secure 2. A successful approach on the sensitivity and risk level of your organization’s information and its data storage methods. a. depends b. depended c. will depend d. depending 3. If the encryption algorithm should fall into the interceptor’s hands, future messages can still be kept secret because the interceptor the key value. 54 a. do not know b. did not know c. have not known d. will not know 4. The interceptor should not be able to predict what changing one character in the plaintext the cipher text. a. did to b. done to c. will do to d. does to 5. An algorithm providing good confusion functional relationship between the plaintext key pair and the cipher text. a. will have a complex b. had a complex c. has a complex d. have a complex 6. If we observe the table carefully, we will realize that it contains only 48 bit positions. a. will realize that b. are realizing that c. have realizing that d. realized that 7. When you change one bit of the plaintext, you spanning all of the 128 bits of the cipher text block. a. see its effect b. saw its effect c. will see its effect d. had seen its effect 8. Plain text encrypted and then encrypted again to the same plain text. 55 a. leads back b. leading back c. lead back to d. will lead back 9. Once the data has been decrypted by the old key, it by the new key. a. is encrypted b. was encrypted c. been encrypted d. will be encrypted WRITING a complaint letter. Complaint letter is a letter you write to complain about something. It could besomething you have purchased or a bad service that you have received, or an accident that happened to you. You must describe it and demand appropriate actions from relevant people. There are three paragraphs in this type of letter: Paragraph 1 The reason for your complaining about and what happened. Paragraph 2 What did you do to resolve the situation and how do you feel aboutthe problem. Paragraph 3 Write what you would like to do and what will you do if they don’tdo what you want. 7. Sort out expressions in the box into three columns. The ideal solution would be, I am writing to complain about, I regret to inform you that your service wasn’t good, I am writing in regard to, You can imagine how unhappy I was to discover, I hope you can settle this matter by, I would like to draw your attention to, I insist on getting a refund of… Paragraph 1 Paragraph 2 Paragraph 3 TASK. 56 Write a letter of complaint to the manager of an online shopping site about a product that you bought and aren‟t happy with. In your letter: - give Information about your order. - explain about the problem with the product. - say what you want the manager to do about it. Dear Sir/Madam, I am writing to express my dissatisfaction with You can’t imagine how unhappy I was to discover I hope you can settle this matter by …(doing something) Yours sincerely/ faithfully 57 Choose the correct answer from a,b,c or d :- (A)does it combine 1. Rarely…… located near city lights or at (B)it combines lower elevations. (C)in combining (A) observatories are (D)combination (B) are (C) in the observatories 7.The economic background of labor legistation (D) are observatories will not be mentioned in this course, ….be treated. 2. There are geographic, economic, and (A) trade unionism will not cultural reasons why--------around the world. (B) nor trade unionism will (A) diets differ (C) not will trade unionism (B) do diets differ (D) neither trade unionism will (C) are diets different (D) to differ a diet auto industry. 8…..test positive for antibiotics when tankers arrive at a milk processing plant, according to 3.Were…. millions of dollars each year federal law, the entire truckload must be replenishing eroding beaches, the coastline discarded. would be changing even more rapidly. (A) Should milk (A) the U.S. Army Corps of Engineers not (B) If milk spleding (C) If milk is (B) the U.S. Army Corps of Engineers not (D) Milk should spend (C) the U.S. Army Corps of Engineers 9. Located behind….the two lactrimal glands. doesnot spend (A) each eyelid (D) not spending the U.S. Army Corps of (B) is each eyelid Engineers (C) each eyelid are (D) each eyelid which is 4- Nowhere---------more skewed than in the auto industry. 10.Only for a short period of time….run at top (A) that retail trade figures speed. (B) retail trade figures (A) cheatahs (C) are retail trade figures (B) do cheatahs (D) retail trade figures (C) that a cheetah can (D) can 5. New York City’s Central Park is nearly twice as large ….second smallest country, Monaco. (A)as (B)is the (C)as is (D)as is the 6.Potassium has a valence of positive one because it usually loses one electron when ….with other elements. 58 59