IV. Match (21-30) with their definitions (A-L). There are two definitions that you do not need to use.
21. | intelligent | A. | to make or fabricate; to invent; to originate; |
22. | to coin | B. | join or connect |
23. | a research | C. | find the solution to (a problem or question) |
24. | to communicate | D. | give new life or energy to |
25. | to include | E. | having the capacity for thought and reason especially to a high degree |
26. | an ability | F. | to gain with effort |
27. | to solve | G. | an ability that has been acquired by training |
28. | to revive | H. | a quality that permits or facilitates achievement or accomplishment |
29. | a skill | I. | systematic investigation to establish facts |
30. | to achieve | J. | have as a part, be made up out of |
K. | influence or control shrewdly or deviously | ||
L. | unique or specific to a person or thing or category |
Supplementary Tasks :
I. For statements (1-10) choose the best alternative (A, B or C) to replace the expressions in italics:
1. … an intelligent agent is a system that perceives its environment … (line 2)
A.receives B. realizes C. releases
2. Subfields have grown up around particular institutions … (line 7)
A. universal B. particleC. special
3. … the solution of specific problems. (line 8)
A. task B. salutationC. decision
4. …the ability to move and manipulate objects. (line 10)
A. navigate B. serveC. maintain
5. They and their students wrote astonishing programs … (line 12)
A. interesting B. conventionalC. amazing
6. …in response to the criticism of England's Sir James Lighthill … (line 16)
A.questionB. replyC. conclusion
7. … pressure from Congress to fund more productive projects … (line 18)
A. invest B. pressC. provide
8. … cut off all undirected, exploratory research … (line 19)
A. investigative B. explainingC. performing
9. … fifth generation computer project inspired … (line 24)
A. condensed B. expiredC. motivated
10. …solid mathematical methods and rigorous scientific standards … (line 30)
A. literate B. roughC. accurate
II. Determine the key message of the text. Choose the best alternative (A, B, C, D or E):
A.AI has gone through some financial problems but finally thrived.
B.Artificial intelligence is divided into several sub-spheres that solve different tasks.
C.In its evolution AI had some problems but succeeded in various fields.
D.The study of intelligent machines led to progress in technology industry.
E.The AI research having overcome difficulties has conflict subdivisions solving hard tasks.
TEXT 7
COMPUTER SECURITY
(1)Computer security is a branch of computer technology known as information security applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. (2) The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. (3)The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources. (4)The major technical areas of computer security are usually represented by the initials CIA: confidentiality, integrity, and authentication or availability. Confidentiality means that information cannot be accessed by unauthorized parties. Integrity means that information is protected against unauthorized changes that are not detectable to authorized users; many incidents of hacking compromise the integrity of databases and other resources. Authentication means that users are who they claim to be. Availability means that resources are accessible by authorized parties; "denial of service" attacks, which are sometimes the topic of national news, are attacks against availability. (5)While confidentiality, integrity, and authentication are the most important concerns of a computer security manager, privacy is perhaps the most important aspect of computer security for everyday Internet users. Because of the ease with which information in electronic format can be shared among companies, and because small pieces of related information from different sources can be easily linked together to form a composite of, for example, a person's information seeking habits, it is now very important that individuals are able to maintain control over what information is collected about them, how it is used, who may use it, and what purpose it is used for. |