Information Security, Radio electronics and Telecommunications 

|Інформаційна безпека, радіоелектроніка та телекомунікації

Guestbook – June 2022

 

·        #448

·        Yershova Y. to Todorow D. RT-212 (Thursday, 30 June 2022 12:44)

Your final grade is 60 points. Good luck

·        #447

Todorow D. RT-212 (Yershova Y.) (Thursday, 30 June 2022 10:04)

Exam topic: The major differences in a monochrome television and a color television receiver.

The major difference between a monochrome television and a color television is amount of electron guns in the picture tube.
Whilst a monocrhome TV has only one electron gun in the picture tube, which can only show black, white or shades of grey in between,
the color TV has three electron guns, that represent three colors - Red, Green and Blue. Varying these guns can give the full spectrum of color.
Beyond that there are differences in the reciever, which has to decode the data for 3 guns instead of one, and in the drivers for the guns

Vocaroo: https://voca.ro/13ZFEwmcv14M

·        #446

Yershova Y., Mykhailiuk S. to Todorow D. RT212 (Thursday, 30 June 2022 09:02)

1. Summarizing, Unit 9.
2. Topic: The major differences in a monochrome television and a color television receiver.
3. Final Test paper 9.
Good luck!

·        #445

Nedzvetskyi Vlad RT-212(Yershova Y.) (Friday, 24 June 2022 15:53)

Exam topic #4 (Commercial use of radio)

Over the last century, radio has evolved from a cumbersome experimental environment to a modern mobile format. For many, radio was the fastest and most reliable way to receive news about national and world events. Commercial radio provides brands with a way to speak to millions of people via a medium they trust. Radio provides reach, with nearly 37m listeners every week,resonance, as an emotional influencer with power to enhance brand perceptions at a subconscious level . Radio advertising is increasingly providing advertisers with new and more creative ways to get their message across to potential customers.
https://voca.ro/1eTU0E6JJ97g

·        #444

Yershova Y. (Friday, 24 June 2022 11:02)

Nakempiy Konstantin RT-212(Yershova Y.) (Friday, 24 June 2022 10:47)
Your final grade is 65 points. Good luck

·        #443

Nakempiy Konstantin RT-212(Yershova Y.) (Friday, 24 June 2022 10:47)

Topic: The new advancement of color Television.

Today I will be talking on the topic "The new advancement of color Television". Today you can hear more and more about QLED TV technology. Previously, the TV used simple LEDs. This solution had many disadvantages, such as overexposure in the dark areas of the screen, poor black depth and insufficient contrast. Now TVs will use quantum dots as a light source. Quantum dots are ultra-thin semiconductor nanoscale materials. They do not have the previous disadvantages, but are still very expensive to manufacture.
https://voca.ro/1kR9CHPh05Uz

·        #442

Yershova Y., Mykhailiuk S. to RT-212 (Friday, 24 June 2022 08:04)

Good morning! The exam has started, read the instruction carefully, your tasks are the following:
To Nedzvetskyi Vlad RT-212
1. Summarizing, Unit 5.
2. Topic: Commercial use of radio.
3. Final Test paper 5

To Nakempiy Konstantyn RT-212
1. Summarizing, Unit 7.
2. Topic: The new advancement of color Television.
3. Final Test paper 7.
Good luck!

·        #441

·        Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:39)

Exam topic #2 (Various security techniques.)

Today I will be talking on the topic "Different ways of security". Every user knows that they need to protect their personal and confidential information from pests and hackers. The first step is to install an antivirus on your device. It will save the user from almost everything. Then you can use special extensions in the browser to identify the link. But it is worth remembering that regardless of the degree of protection, a person must always remember and be attentive, because in any situation the person himself will be to blame, and not the protection. You need to accustom yourself to look at the link where you go as early as possible, and later this will happen automatically on a subconscious level.
https://voca.ro/14wNZDDbdhIs

·        #440

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:39)

Exam topic #20 (Principles of information protection.)

The fundamental principles of information protection are confidentiality, integrity, availability. Confidentiality is designed to protect against unauthorized disclosure of information. Integrity involves protection from unauthorized modifications of data. The principle of integrity is designed to ensure that data can be trusted to be accurate and that it has not been inappropriately modified. Availability is protecting the functionality of support systems and ensuring data is fully available at the point in time (or period requirements) when it is needed by its users. Its objective is to ensure that data is available to be used when it is needed to make decisions.
https://voca.ro/19X9sybOZqLB

·        #439

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:38)

Exam topic #18 (Protection schemes.)

In my opinion protection schemes is very important in our digital world.
Our reason for differences among protection schemes is their different functional properties the kinds of access control that can be expressed naturally and enforced. There are two protection systems.
The first is unprotected systems. Some systems have no provision for preventing a determined user from having access to every piece of information stored in the system.
The second is all-or-nothing systems. These are systems that provide isolation of users, sometimes moderated by total sharing of some pieces of information.
It was interesting theme for me.
https://voca.ro/16TxZeQ1WHWI

·        #438

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:38)

Exam topic #16 (The Essentials of Information Protection.)

Nowadays, technologies are developing very rapidly, which leads to a rapid increase in the amount of information in the world, not all of it can be kept open, so at the moment the topic of protection of the same information is relevant.
The first security measure is a strong password, it applies to everyone and everything, so it must be complex and contain many characters, and be used only on a particular site, so the cybercriminal will be harder to access your information. Large companies and corporations have a huge risk of leaking information, so they must have an effective security system - 1C, the most modern and widespread system of information security. There are also the most common approaches to information protection: Autonomous and Integrated.
Modern problems need modern solutions, so in my opinion, the information sphere should use the new generation of technology to provide full protection, because every day criminals are finding more and more ways to penetrate.
https://voca.ro/1hIIoMdqqzZU

·        #437

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:37)

Exam topic #15 (The authentication of a user's claimed identity.)
The authentication method allows you to choose the appropriate configuration for different situations: from passwords for computer games to permanent and temporary passwords for some government services. The main task of authentication is to make sure that the user is really who they say they are. Material objects can act as reliability: hardware devices, body parts. Intangible entities: code words, files. There is also a hardware token - designed specifically for authentication. The token itself is an identity, the user must have it with him and show it to the system - for example, connect it to a computer or bring it to the reader.
https://voca.ro/1k091UhQYFrk

·        #436

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:37)

Exam topic #14 (Authority Check.)
How do sites, programs, etc. check us for the authority to log into an account? There are many ways, I will cover a few of them.
Firstly, when entering an account, we enter a password that already solves most problems with authentication, but not everything is so simple. A double authentication can be attached to the password in the form of a program on the mobile phone to confirm the authentication or an email message.
Secondly, even if you logged into the site on a laptop, and then left somewhere, it does not matter to another city or a cafe under the house, your IP address changes and this causes suspicion in the site or program and it will ask you to log in again.
In the end, I want to say that you need to be careful and always be on the alert, cause the whole world is trying to deceive you!
https://voca.ro/1oS7fajjOqj7

·        #435

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:36)

Exam topic #13 (Authentication mechanisms.)

Authentication is the process by which a user authenticates their identity to a system. The system provides personal data only to its owner.
The authentication mechanism at the basic level is quite simple - you need to enter data in the form of a username and password. Check the data for a match, and if the data were identical with each other, then that you are the real owner of the account.
An account is a collection of user data stored in the system. As a rule, only one user has access to an account - its owner.
An example is this: You have lost your phone and until you have a password, finger scanner or face.
https://voca.ro/1o5HNuxwLLgD

·        #434

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:36)

Exam topic #4 (Information protection systems.)

Any company has critical information. And it needs to be somehow protected from those who want to get access to it, because this is a question of the very life of the organization. There are several information security tools. SIEM systems - they collect and analyze a large amount of data, so they can detect attacks very quickly. That is why many companies perceive SIEM systems as an important part of corporate network security. Firewalls - Protect the corporate network from intrusion attempts. To put it bluntly, this is indeed a wall that is supposed to be able to stop intruders. There are dozens more systems, but these two are the main ones.
https://voca.ro/13o6JR0xNYX4

·        #433

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:35)

Exam topic #3 (Different approaches to secrecy and their defects.)
In Ukraine, the approach to defining secrets is in many ways similar to the Soviet one. The main reason for this was the collapse of the USSR and the transfer of some of its state secrets to independent Ukraine. Information with limited access classified as a secret in Ukraine can be compared with the three highest levels of information classification (according to the national legislation of the NATO member states). The main document on the protection of state secrets in Ukraine is the Law of Ukraine "On State Secrets". Restriction of access to state secrets is carried out by providing an appropriate stamp for restricting access to a material carrier of information.
https://voca.ro/11gsH6GRTHya

·        #432

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:35)

Exam topic #5 (Technical basis of information protection in modern computer systems.)

There are a lot of ways of protection information in modern computer systems. Technical basis of information protection plays a big role in security of company’s data. Technical basis combines hardware and software resources. Backup and remote storage of the most important data should be on a regular basis. Also, it`s very important to install the software that protects databases and other information from unauthorized access. The company should not forget about safety from fire or water damage of equipment. Technical basis of information protection also includes measures to ensure the physical inaccessibility of objects of computer networks, for example, such practical methods as equipping a room with cameras and alarms.
https://voca.ro/1mS3XslQSg0M

·        #431

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:40)

8

Today I've read the article «Using deep learning to predict parameters of batteries on electric vehicles».
The batteries used to power electric vehicles have several key characterizing parameters, including voltage, temperature, and state of change.
The researchers trained and evaluated their LSTM model on a dataset collected by the Service and Management Center for electric vehicles. The researchers observed that after its offline training was complete, the LSTM model could perform fast and accurate online predictions. In other words, the fact that it was trained offline did not appear to decrease the speed and accuracy of its predictions.
To my mind In the future, the battery parameter prediction model developed by this research team could help to enhance the safety.

https://techxplore.com/news/2019-08-deep-parameters-batteries-electric-vehicles.html

https://voca.ro/1lPw0XfGnf4c

1)when compared
This product has extended and faster-acting functions when compared to other testosterone esters.

2)case studies
The case studies illustrate different approaches that countries take to implementing IFRS.

3)multiple levels
And the beauty of the book is that it works on multiple levels.

https://voca.ro/1lofP78bE3g6

·        #430

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:39)

7

Today I've read the article «Americans use more clean energy in 2016».
Americans used more renewable energy in 2016 compared to the previous year, according to the most recent energy flow charts. All energy use results in some losses, shown on the charts as rejected energy. This energy most often takes the form of waste heat, such as the warm exhaust from automobiles and furnaces.
To my mind the energy Information Administration has changed the way it analyzes and reports renewable energy use.

https://techxplore.com/news/2017-04-americans-energy.html

https://voca.ro/1ko7ZiDBvwt0

1)the main objective
The review had found that the main objective of offshoring was cost-saving.

2)by means of
The information can be extracted by means of your suffering.

3)published in
The latest progress report on combating social exclusion was published in February 2007.

https://voca.ro/168yMKOlZJd5

·        #429

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:39)

6

Today I've read the article «Researchers develop a dynamic keyboard character recognition system».
Researchers at India have recently developed a new dynamic hand-gesture-based keyboard character recognition system. Gesture recognition could enhance human-computer interactions in a variety of areas. Traditional keyboards support a broad range of characters. A gesture recognition system that covers all these characters is very challenging to develop due to its significant database requirements, as well as possible complications associated with hand detection, tracking, extraction of features and the use of classifiers.
To my mind development of such a large vocabulary system will be a challenging task.

https://techxplore.com/news/2019-01-dynamic-keyboard-character-recognition.html

https://voca.ro/1bBFGUJrL3yr

1)when compared
This product has extended and faster-acting functions when compared to other testosterone esters.

2)case studies
The case studies illustrate different approaches that countries take to implementing IFRS.

3)multiple levels
And the beauty of the book is that it works on multiple levels.

https://voca.ro/1lySAbOwnRNR

·        #428

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:39)

5

Today I've read the article «New database interface looks like a spreadsheet».
When an organization needs a new database, it typically hires a contractor to build it or buys a heavily supported product customized to its industry sector.
Usually, the organization already owns all the data it wants to put in the database. Previous academic projects have explored techniques for database query construction using editable flow-chart diagrams or virtual buttons that can be snapped together.
To my mind it turns out that when you're dealing with people's data, you really need to get it right

https://techxplore.com/news/2016-07-database-interface-spreadsheet.html

https://voca.ro/11iHe2BrBe0T

1)examined in detail
Moreover, prima facie duplication and overlap has to be examined in detail.

2)expanded upon
The issue would be expanded upon in Namibia's next report.

3)bear in mind
But bear in mind, your primary responsibility is to your respective clients.

https://voca.ro/1fX19jbUvhDb

·        #427

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:38)

4

Today I've read the article «Using computers to better understand art».
When we talk about paintings, artistic style can refer to image features like the brushstrokes, contour and distribution of colors that painters employ, often implicitly, to construct their works.
Quantifying artistic style can help us trace the cultural history of art as schools and artists influence each other through time. Computer analysis of even previously well-studied images can yield new relationships that aren't necessarily apparent to people.
To my mind it will help researchers in cognitive science understand how viewers perceptually categorize, recognize and otherwise engage with art.

https://techxplore.com/news/2016-06-art.html

https://voca.ro/1b9NKtdeYMPl

1) a breakthrough in
The adoption of the Court's Statute is a clear breakthrough in the area.

2) ability to achieve
The Ministry of Justice affected the work of the committees and their ability to achieve their objectives.

3) able to target
Scientists will be able to target tumors with increasing safety and effectiveness.

https://voca.ro/141dOsemeX8f

·        #426

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:37)

3

Today I've read the article «New algorithms advance the computing power of early-stage quantum computers».
A group of scientists at the U.S. Department of Energy's Ames Laboratory has developed computational quantum algorithms that are capable of efficient and highly accurate simulations of static and dynamic properties of quantum systems.
The new algorithms tap into the capabilities of existing quantum computer capabilities by adaptively generating and then tailoring the number and variety of «educated guesses»
To my mind it will be great to reach 'quantum advantage' for materials— to utilize quantum computing to achieve capabilities that cannot be achieved on any supercomputer today.

https://techxplore.com/news/2021-11-algorithms-advance-power-early-stage-quantum.html

https://voca.ro/1foxZABDW8Xr

1)examine more closely
I think I will examine it more closely.

2) estimate the effects of
It was able to estimate the effects of emissions on human health and biodiversity.

3)distinct
The stems have distinct smelling foliage when young.

https://voca.ro/1d3uRuDRaQaG

·        #425

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:36)

2

Today I've read the article «Here are the 10 top tech trends you need to understand right now».
Tech analyst firm Gartner has compiled a list of the top ten strategic technology trends that organisations need to explore in 2019. According to Garner, these technologies have substantial disruptive potential and are either on the edge of making a big impact, or could reach a tipping point in the next five years. Companies need to proactively address issues around digital ethics and privacy. Current blockchain technologies and concepts are immature, poorly understood and unproven in mission-critical, at-scale business operations, said Gartner.
To my mind new tech trends are coming up every moment and its great for whole world.

https://www.zdnet.com/article/here-are-the-10-top-tech-trends-you-need-to-understand-right-now/

https://voca.ro/1kSSSS230Nvs

1) digital version
The digital version is based on an especially developed viewer, providing the following functions

2) in other word
So the benchmark is objective assessment or in other words reasonability.

3) in principle
The assessment leads to recommendations, which can be supported in principle.

https://voca.ro/1kH1MN3EeBT2

·        #424

Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:36)

1

Today I've read the article «Pilot study: Group of Bradford Co, Pa. residents concerned about health effects of hydrofracking».
Residents living in areas near natural gas operations, also known as hydraulic fracturing, or fracking, are concerned their illnesses may be a result of nearby drilling operations. Twenty-two percent of the participants in a small pilot study surmise that hydrofracking may be the cause of such health concerns as sinus problems, sleeping difficulties, and gastrointestinal problems.
The CEET team also mapped the addresses of patients who agreed to provide them in relation to drilling to determine if proximity to drilling operations may relate to health problems.
To my mind this pilot study will guide the development of future epidemiological studies to determine whether health effects in communities in which natural gas operations are occurring is associated with air.

https://phys.org/news/2013-04-group-bradford-pa-residents-health.html

https://voca.ro/1gisZULj9zg5

1) Pilot study
We hope this pilot study will guide the development of future epidemiological studies.

2)flow chart
Flow charts to include state-by-state energy.

3)poorly understood
Poorly understood and unproven in mission-critical.

https://voca.ro/14rcectpmqBb

·        #423

Arina Omelchenko RE-211 (Yershova) debt (Thursday, 16 June 2022 13:21)

Exam topic #12 (Media Video Processor)
A media video processor is a microprocessor-based system-on-a-chip which is designed to deal with digital streaming data in real-time rates. These devices can also be considered a class of digital signal processors. Unlike graphics processing units, which are used for computer displays, media processors are targeted at digital televisions and set-top boxes.
The streaming digital media classes include: uncompressed video and compressed digital video. Previous to media processors, these streaming media datatypes were processed using fixed-function, hardwired ASICs, which could not be updated in the field. This was a big disadvantage when any of the media standards were changed. Since media processors are software programmed devices, the processing done on them could be updated with new software releases, which is indeed very perspective for new generation of technologies.

https://voca.ro/1c73hmAerznV

·        #422

Arina Omelchenko RE-211 (Yershova) debt (Thursday, 16 June 2022 12:48)

Exam topic #18 (Age of the Transistors)
The first transistor was successfully demonstrated on December 23, 1947, at Bell Laboratories in Murray Hill, New Jersey. The invention of the transistor was an unprecedented development in the electronics industry. It marked the beginning of the current age in the electronics sector. After the transistor's invention, advances in technology became more frequent, the most notable of which was computer technology. The three physicists who invented the transistor; William Shockley, John Bardeen, and Walter Brattain were awarded with the Nobel Prize. Considering the inventions that the transistor paved the way for, one could argue that it was the most important invention of the twentieth century.
https://voca.ro/1jU7XzOrsfZw

·        #421

Stepanenko Vladyslav RT-212 (Yershova) (Thursday, 16 June 2022 12:21)

I have read the article "Recommendation algorithms that work on Amazon, Netflix can also improve satellite imagery." This article tells us about algorithms that help consumers decide what to watch online or what to buy. Not only can they predict customer habits, they can help satellites see the Earth better, according to a Rutgers study. Optical satellites lose sight of the Earth's surface when it's covered in clouds, which is why, in my opinion, researchers have long relied on inaccurate instruments to fill in blind spots, especially along coastlines. I believe that this study is helpful.

https://techxplore.com/news/2022-05-algorithms-power-amazon-netflix-satellite.html
https://voca.ro/1zgGxaVCL51W

1) poorly understood
Open-source software used to be poorly understood by commercial forces, and it's often approached in a biased way.
2)flow chart.
The flow chart has all its shapes, text, and colors, now.
3)pilot study
So far the pilot study has shown that especially the teachers who have self-assessed themselves as beginners will advance significantly in almost all areas of digital competence.
https://voca.ro/1oNNEklFEtgw

·        #420

Yershova Y. (Thursday, 16 June 2022 11:49)

Stepanenko Vladyslav RT-212 (Yershova) (Thursday, 16 June 2022 11:43)
Exam topic (First radio speeches.) is rather informative, but you haven't posted any comments on the articles during this second module period.

·        #419

Yershova Y. (Thursday, 16 June 2022 11:45)

Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 16 June 2022 10:53)
Thanks for your last exam topics, now you have no debts.

·        #418

Stepanenko Vladyslav RT-212 (Yershova) (Thursday, 16 June 2022 11:43)

Exam topic (First radio speeches.)
The discovery of the electromagnetic field in 1845, to which the English physicist M. Faraday had been working for a long time, became a sensation in the 19th century. Two decades later, also an Englishman, D.K. Maxwell theoretically substantiated and formulated the existence of electromagnetic waves, one of the types of which are radio waves. A person does not see or feel them, therefore, without substantiating the theory of electrodynamics, it would be impossible to create the radio receiver itself. On May 7, 1895, physicist Alexander Popov carried out the world's first radio communication session using a radio receiver he created.
https://voca.ro/1nfogQMlwGpr

·        #417

Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 16 June 2022 10:53)

I’m posting it again. Perhaps you didn't see message #315. Have i any debts?


Topic #10 (The major differences in a monochrome television and a color television receiver)

After the World War II, the USA took up the development of civilian technology, including television. Therefore, color TVs came to replace the monochrome TV. The biggest difference is the number of electron guns in the picture tube. A monochrome tv has only one gun as it can only show black, white, or shades of grey in between. Color TVs have 3 guns: red, green, and blue. Varying these tubes give you the full spectrum of color. Beyond that there are differences in the reciever, which has to decode the data for 3 guns instead of one, and in the drivers for the guns.

https://voca.ro/1ar5kibV9j3a


Topic #5 (¬First radio speeches)

On 13 May 1897, Guglielmo Marconi sent the world's first radio message across open water. He was initially interested in contacting ships. It paved the way for the radio and television broadcasts that we take for granted today. On 11 and 12 May Marconi's team placed a transmitter on Flat Holm, an island halfway across the Channel, and began sending messages out into the airwaves. But, their work was a failure, with the team member in Lavernock sat waiting for a non-existent signal. Then on 13 May, Marconi sent a message of "CAN YOU HEAR ME," which was received loud and clear. So, this became the communication revolution

https://voca.ro/14lTt1qtMv4E

·        #416

Igor Rudko (RZ-213) (Vorobyova E. V.) (Thursday, 16 June 2022 10:24)

Audio: https://voca.ro/1jhyhi3M4duA
Article: https://techxplore.com/news/2020-07-carbon-emissions-energy-states.html
Today I have read the article" Carbon emissions, energy flow charts for all U.S. states". Renewable energy, specifically solar and wind energy, have made huge strides in the energy supply sector contributing to the decrease in carbon emissions since 2014. By the way, in states rich in renewable resources such as Iowa, wind supplies make up well over a quarter of the state's electricity and contribute to the state's ability to export electricity to its neighbors. In my opinion, it is really great that the scientific society is interested in this problem and trying to fix it.
Phrases
Audio: https://voca.ro/1kdLtAh3MIuY
1) A pilot study undertaken by researchers from the University of South Australia, has developed a new way to undertake basic health checks of exotic wildlife using a digital camera. - Пілотне дослідження, проведене дослідниками з Університету Південної Австралії, розробило новий спосіб проведення базових перевірок здоров’я екзотичних диких тварин за допомогою цифрової камери.
2) Current blockchain technologies and concepts are immature, poorly understood, and unproven in mission-critical, at-scale business operations. - Сучасні технології та концепції блокчейну є незрілими, погано зрозумілими та недоказаними у критично важливих, масштабних бізнес-операціях.
3) Each year, LLNL releases flow charts that illustrate the nation's consumption and use of energy. - Щороку LLNL випускає блок-схеми, які ілюструють споживання та використання енергії нацією.

·        #415

El-kadi RT-211(Popovych E.) (Thursday, 16 June 2022 10:21)

I read an article about computers on the network. It was written about the fact that computer networks are widespread in the modern IT sector. Computer networks are the arteries of databases, web and mobile applications, distributed systems, and many other programs. A good understanding of the underlying networking principles makes it easier to create more reliable and efficient software products.

pilot study
Within this overall framework, the pilot study will comprise three sub-themes.

flow chart
The annex of the present document contains a flow chart of the proposed process.

poorly understood
Those interactions were still poorly understood.

·        #414

Stepanenko Vladyslav RT-212 (Myhayliuk) (Thursday, 16 June 2022 10:05)

Exam topic (Cable television.)
Cable television is one of the options for transmitting a signal over a distance. It is possible to transmit both analog and digital formats. Cable television is opposed to conventional terrestrial and satellite television broadcasting.
For a long time, the basis of cable television networks was coaxial cable. The successful development of optical data transmission technologies has led to the introduction of optical fiber in cable television networks in the form of so-called hybrid, or fiber coaxial networks, which combine coaxial and fiber optic cables.
Traditionally, analog cable television technology is successfully mastering digital methods of data transmission.
https://voca.ro/1laz5xFFbmGv

·        #413

Stepanenko Vladyslav RT-212 (Myhayliuk) (Thursday, 16 June 2022 09:55)

Exam topic (Turning the DTV signal.)
DTV channels are preferred to watch in all countries due to their availability and the quality of the transmitted picture. Also, a significant part of them is broadcast for free, and anyone can use them for their TV. For a TV to work with this technology, its receiver must support DTV, receive a signal of this format, and output a video and sound track at the output. The receiver is usually an external receiver, but modern TV models are equipped with such a receiver by default. The transmitted signal is encoded in MPEG digital format and represented as a binary code. The basis of its popularity is that the signal is not affected by weather conditions.
https://voca.ro/1Udog15aCgaB

·        #412

Yershova Y. (Thursday, 16 June 2022 09:38)

Chervony Eugene RT-212(Yershova) (Thursday, 16 June 2022 09:29)
Exam Topic #10 (Radio equipment helping to save on bills) is quite reasonable.

·        #411

Yershova Y. (Thursday, 16 June 2022 09:36)

Chervony Eugene RT-212(Yershova) (Thursday, 16 June 2022 09:26)
Exam Topic #9 (The new advancement of color Television) is well done, thanks.

·        #410

Yershova Y. (Thursday, 16 June 2022 09:32)

Stanislav Popik РТ-212 (Yershova) (Wednesday, 15 June 2022 14:39)
Rather interesting, thank you.

·        #409

Chervony Eugene RT-212(Yershova) (Thursday, 16 June 2022 09:29)

Exam Topic #10 (Radio equipment helping to save on bills)

It’s easy to get sucked into all of the bells and whistles on the most expensive electronic options, but the extra features often aren’t necessary. You might find the features that sound amazing are things you don’t actually use that often. Sometimes the more features a device has, the more potential it has for things to go wrong, which can make it more expensive with repairs or replacements. Consider what features you actually need or will use on a regular basis. If you find yourself drooling over fancy features, think about how practical or necessary those features are to have a good experience with the device. You might realize you can enjoy the new device just as much without those extra features.

https://voca.ro/1RRjK80YRN9p

·        #408

Chervony Eugene RT-212(Yershova) (Thursday, 16 June 2022 09:26)

Exam Topic #9 (The new advancement of color Television)

Comparing the significance of the invention of color television to the development of space rockets sounds ludicrous to us today, but color television was one of the most complex and transformative technological innovations of its time, symbolizing a unique and thoroughly modern form of seeing and representing. It was, in fact, often discussed by its proponents as an ideal form of American postwar consumer vision: a way of seeing the world in a spectacular form of living color. Color television was sold to viewers as a way to experience everything from sports and nature to musical theater in a more legible, realistic, captivating, and sensational way.

https://voca.ro/1czEE1CxVZzL

·        #407

Yershova Y. (Thursday, 16 June 2022 09:25)

Roman Gavrilenko RZ-211 (Yershova) (Tuesday, 14 June 2022)
Exam topic #4 ( Information protection systems) and Exam topic #12 ( Hardware firewall) are rather informative, thanks.
Your phrases' examples are good as well.

·        #406

Roman Gavrilenko RZ-211 (Yershova) (Thursday, 16 June 2022 08:59)

Exam topic #12 ( Hardware firewall)
A physical firewall device or firewall hardware is an appliance that sits in-between the uplink and the client system and filters
what traffic gets through based on pre-configured security policies, user profiles, and business rules.
The uplink carries incoming traffic from public or private networks, whereas the client system is a server, an employee desktop, a WFH system, an IoT node,etc.
Firewall solutions are an integral component of enterprise security. A 2020 report by Palo Alto Networks found that firewalls, including hardware appliances,
were the no.1 security measure enterprises adopt to protect their infrastructure. The report said that 96.6% of companies have a firewall in place, with 53.8%
also deploying web application firewalls. In fact, more than 1 in 4 organizations rely solely on firewall hardware instead of software or cloud-based solutions.
https://vocaroo.com/1hvPxyasfW9D

1)examine more closely
I think I will examine it more closely.
https://voca.ro/1nWP11xB6A47

2) estimate the effects of
It was able to estimate the effects of emissions on human health and biodiversity.
https://voca.ro/1z4BBCa9h3sM

3)distinct
The stems have distinct smelling foliage when young.
https://voca.ro/1m0QSdndPbpo

·        #405

Vorobyova E. to Simchuk from РЗ-213 (Thursday, 16 June 2022 08:17)

In general, good. But some of the reviews on the articles are too long. They should have 100 words, not more. Mind it and continue working.

·        #404

Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:44)

Відпрацювання 5
Now almost every person was interested in his development and how smart he is, tests don’t help with this, but how do we find out how smart computers or other devices are
article titled: "AI software overcomes high hurdles in IQ tests, but still makes stupid mistakes. Can better tests help?" will help us in this matter. Artificial intelligence (AI) language models, trained on billions of words from books, news articles and Wikipedia, can create incredibly human prose. They can create tweets, summarize emails, and translate into dozens of languages. They can even write tolerable poetry. And, like A students, they quickly master the tests, called tests, that computer scientists develop for them.

It was Sam Bowman's sobering experience when he and his colleagues created a hard new benchmark for language models called GLUE (Global Language Understanding Assessment). GLUE gives AI models the ability to train on datasets containing thousands of sentences and gives them nine tasks, such as determining whether a test sentence is grammatical, assessing its sentiment, or assessing whether one sentence logically entails another. After completing the tasks of each model, an average score is set.

At first, Bowman, a computer scientist at New York University, thought he had confused the models. The best of them scored less than 70 points out of 100 (D+). But in less than 1 year, the newer and better models scored about 90 points, surpassing humans. “We were very surprised by the surge,” Bowman says. So in 2019, the researchers made the test more difficult, calling it SuperGLUE. Some of the tasks required the AI models to answer reading comprehension questions after digesting not only sentences but also paragraphs taken from Wikipedia or news sites. Again, the humans had an initial lead of 20 points. “What happened next wasn't all that shocking,” says Bowman. By early 2021, computers were once again beating humans.

Competition for top test scores has led to real progress in the field of AI. Many believe that the ImageNet challenge, a computer vision competition that began in 2010, has revolutionized deep learning, a leading approach to artificial intelligence in which brain-inspired "neural networks" learn on their own from large sets of examples. But the best test takers aren't always superhuman in the real world. Time and time again, models succeed in tests but fail when deployed or scrutinized. “They fall apart pretty easily,” Bowman says.
Article:https://www.science.org/content/article/computers-ace-iq-tests-still-make-dumb-mistakes-can-different-tests-help

·        #403

Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:44)

Відпрацювання 4
In 2022, each person has his own gadget in which he stores his confidential information and each person has the right to privacy, but is this privacy itself really, in the article that I read and I want to tell you about it, it is about this and how we can avoid surveillance. Satcha is titled: "Technology Spying on You? New AI Could Prevent Eavesdropping." The article is about the fact that Companies use "bossware" to listen to their employees when they are near their computers. Several "spy" applications can record phone calls. And home devices like the Amazon Echo can record everyday conversations. A new technology called Neural Voice Camouflage now offers protection. It generates its own audio noise in the background when you speak, confusing the artificial intelligence (AI) that decodes our recorded voices.

The new system uses an "adversarial attack". The strategy uses machine learning, in which algorithms find patterns in data, to tune sounds in such a way that AI, not humans, mistake them for something else. Essentially, you are using one AI to fool another.

However, the process is not as simple as it seems. The machine learning AI has to process the entire sound clip before it knows how to set it up, which doesn't work when you want to mask in real time.

So in the new study, the researchers trained a neural network, a brain-inspired machine learning system, to effectively predict the future. They trained him on hours of speech recording so that he could constantly process 2-second snippets of audio and mask out what was likely to be said next.

For example, if someone just said "enjoy a big feast", they cannot accurately predict what will be said next. But, taking into account what has just been said, as well as the characteristics of the speaker's voice, it produces sounds that will break a number of possible phrases that may follow. This includes what actually happened next; here the same speaker says, "It is being prepared." To listeners, sound camouflage sounds like background noise and they have no problem understanding spoken words. But cars stumble.
This is just the first step in protecting privacy in the face of AI, says Mia Chikier, a computer scientist at Columbia University who led the study. “Artificial intelligence collects data about our voice, faces and actions. We need next-generation technology that respects our privacy."

Chiquier adds that the predictive part of the system has great potential for other applications that require real-time processing, such as autonomous vehicles. “You have to anticipate where the car will be, where the pedestrian might be,” she says. The brain also works by waiting; you get surprised when your brain mispredicts something. In this regard, Chikyo says: "We imitate the way people act."

"There's something nice about how it combines future prediction, a classic machine learning problem, with another adversarial machine learning problem," says Andrew Owens, a computer scientist at the University of Michigan at Ann Arbor who studies audio processing. and visual camouflage and did not participate in the work. Bo Li, a computer scientist at the University of Illinois at Urbana-Champaign who has worked on audio adversarial attacks, was impressed that the new approach worked even against a hardened ASR system.

Sound masking is badly needed, says Jay Stanley, senior policy analyst at the American Civil Liberties Union. “We are all susceptible to our innocent speech being misinterpreted by security algorithms.” Maintaining privacy is hard work, he says. More precisely, it is a Harenar ov resonance.
Article:https://www.science.org/content/article/technology-spying-you-new-ai-could-prevent-eavesdropping

·        #402

Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:36)

Відпрацювання 3
To date, very popular information about new diseases and viruses, this is the article I came across when reading the news and scientific discoveries "Analysis of 6.4 million genomes of SARS-CoV-2 revealed mutations associated with adaptation", very intriguing and in at the same time frightening. Satya is very big but, I want to show you how important to me is what is written in it. Satya says that the SARS-CoV-2 pandemic was characterized by recurrent waves of cases caused by the emergence of new lines with higher fitness, where fitness includes any trait that affects the growth of the line, including its baseline reproductive number (R 0). ability to evade existing immunity and generation time. Rapid identification of such pedigrees as they emerge and accurate prediction of their dynamics is crucial for controlling the response to an outbreak. Effective implementation of this task will benefit from the ability to study the entire global SARS-CoV-2 genomic data set. The large size (currently more than 7.5 million viral genomes), as well as the geographical and temporal variability of the available data, are serious problems that will become more serious as more viruses are sequenced. Current phylogenetic approaches are computationally inefficient for datasets with more than ~ 5,000 samples, and it takes days to operate on this scale. Special methods for assessing the relative suitability of specific SARS-CoV-2 lines are a computationally efficient alternative.), But usually relied on models in which one or two lines of interest are compared to all others and do not reflect the complex dynamics of several circulating lines. When modeling the relative fitness of SARS-CoV-2 lines, we estimated their growth as a linear combination of the effects of individual mutations. To this end, we have developed PyR 0, a hierarchical Bayesian regression model that allows scalable analysis of the complete set of publicly available SARS-CoV-2 genomes, which can be applied to any set of virus genomic data and to other viral phenotypes. The model shown in Fig. S1, described in detail in the supplementary materials, avoids the difficulty of complete phylogenetic inference by initially clustering genomes by genetic similarity (PANGO line refinement) and estimating the additional effect on the growth rate of each of the most common amino acid substitutions in the lines in which they occur. By regressing the growth rate along the genome sequence, the model divides the statistical power among genetically similar lines, without relying explicitly on phylogeny. By modeling only the polynomial proportions of different pedigrees, not the absolute number of samples for each pedigree, and doing so within 14-day intervals in 1560 globally distributed geographical regions, the model achieves resilience to a number of bias sources that affect all lines in different regions. and over time, including differences in data collection and changes in transmission due to factors such as social behavior, public health policies and vaccination.
Article:https://www.science.org/doi/10.1126/science.abm1208

·        #401

Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:35)

Відпрацювання 2
I've always been interested in information about scientific discoveries and breakthroughs, which is exactly the kind of article I came across, entitled "Breakthrough in Fusion: What It Means for the Future of Energy." The article begins with the fact that European scientists have announced a major breakthrough in the desire to develop a practical nuclear fusion - an energy process that feeds the stars. The British laboratory JET broke its own world record for the amount of energy obtained by compressing two forms of hydrogen together.

The experiments yielded 59 megajoules of energy in five seconds (11 megawatts of power).

This is more than twice as much as was obtained during similar tests in 1997. This is not too much energy - only about 60 kettles of water are enough to boil.

But the importance of this achievement lies in the fact that it confirmed the correctness of the project developed for a larger thermonuclear reactor, which is currently being built in France.
This is great information for me, but it doesn't end there.
The ITER facility, located in the south of France, is supported by a consortium of world governments, including the EU, the United States, China and Russia. It is expected that this will be the last step in confirming the fact that nuclear fusion can become a reliable source of energy in the second half of this century.

The operation of fusion-based power plants of the future will not lead to greenhouse gas emissions and will generate only a very small amount of short-lived radioactive waste.

"These experiments, which we have just completed, should have worked," said JET CEO Professor Ian Chapman. "If they did not work, we would have real concerns about whether ITER will be able to achieve its goals."

"The stakes were high, and what we've achieved has been achieved thanks to incredible people and their faith in science," he told BBC News.

Thermonuclear fusion is based on the principle that energy can be released by fusing atomic nuclei, rather than by fission, as in the case of fission reactions, which operate existing nuclear power plants.

In the core of the Sun, this is due to the enormous gravitational pressure at temperatures of about 10 million degrees Celsius. At a much lower pressure than possible on Earth, the temperatures for synthesis must be much higher - more than 100 million degrees Celsius.

There are no materials that can withstand direct contact with such heat. Therefore, to achieve thermonuclear fusion in the laboratory, scientists have developed a system in which superheated gas or plasma is kept inside a magnetic field in the shape of a donut.

The Joint European Torus (JET) reactor, located in Kalham, Oxfordshire, has pioneered this approach to synthesis, which it has been working on for almost 40 years. And over the last 10 years, it has been tuned to recreate the future look of the ITER facility.
Article:https://www.bbc.com/ukrainian/features-60318751

·        #400

Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:34)

Відпрацювання 1
Today I read an interesting scientific article: "A geomagnetic storm blew out of orbit over 40 satellites of Elon Musk." In which it is told about the fact that Elon Musk's company "SpaceX" confirmed that a strong geomagnetic storm struck over 40 satellites. They also added that, at the same time, the company began to sing that the situation would not become a threat to people: there would be no other companions, there would be no cosmic death.

SpaceX satellites are programmed to self-destruct every hour of re-entry into the Earth's atmosphere.
Forecasters explain that the geomagnetic storm vinicked through the overworld sleepy activity, as a result of which the Earth's atmosphere heats up and expands.

There is nothing unusual in this world, but for the singing intensity of the expansion of the atmosphere, it becomes unsafe for space objects that go to low orbit.

Behind the front pranks, 40-49 SpaceX satellites suffered. Let's talk about the party that was put into orbit last Thursday as part of the Starlink project, something like that - to protect the entire planet with the Internet.
Article:https://www.bbc.com/ukrainian/news-60319205

·        #399

Vorobyova E. to Shlapak from РЗ-213 (Wednesday, 15 June 2022 17:00)

Thank you for the update review on the article. It’s correct and informative. Good luck.

·        #398

Vorobyova E. to Koval from РЗ-213 (Wednesday, 15 June 2022 16:58)

Well done, only mind the correct use of the articles “a/the”. Continue working at the exam topics.

·        #397

Stanislav Popik РТ-212 (Yershova) (Wednesday, 15 June 2022 15:07)

In the early 1920s, the development of radio tubes reached a level sufficient for the advent of radio broadcasting. While most experimenters were trying to create something similar to telephone technology, others were trying to reach a wider broadcast coverage. The first experimental radio station was created by Charles Herrold in 1909 in San Jose, California. On November 6, 1919, the first broadcasting station in Europe, PCGG, was founded in The Hague (Holland). Evening programs were broadcast once or twice a week. Despite the remoteness of the transmitter from England, the radio station had a large number of listeners on the English side of the English Channel. The history of the development of radio broadcasting is long and each country has its own, but these broadcasts were among the first.

https://voca.ro/1lFOItAF85Kp

·        #396

Stanislav Popik РТ-212 (Yershova) (Wednesday, 15 June 2022 14:39)

https://voca.ro/152xiri2MWYz - exam topik 9

·        #395

Stanislav Popik РТ-212 (Yershova) (Wednesday, 15 June 2022 14:39)

Exam topic 9 "Development of television in your home country."
In Ukraine, the history of the emergence of television began in 1933, when the All-Union Committee for Radio and Radio Broadcasting and the Committee for Radio and Radio Broadcasting were created. The first official attempt to broadcast live in the Ukrainian SSR was made on February 1, 1939. The shooting took place in a small Kyiv studio. The broadcast lasted 40 minutes, during which a portrait of Grigory Ordzhonikidze was shown. Due to the Great Patriotic War, the second birth of Ukrainian television took place only on November 6, 1951. The Kyiv television center aired the Soviet patriotic film The Great Glow.

·        #394

Stanislav Popik РТ-212 (S. Mykhailiuk) (Wednesday, 15 June 2022 14:23)

Exam topic 8 “The new advancement of color Television.”
In 1938, Werner Flechsig patented the principle of the color kinescope, and the color image transmission method was developed in 1940. In European cinemas, color films appeared in 1941, the first of which were Women Are Still the Best Diplomats and Hans Alber's film Munchausen. In 1953, the NTSC standard for black-and-white television broadcasting was expanded in the United States - it received the ability to transmit color, namely, "color" was added to "brightness". On August 30, 1953, for the first time in history, NBC broadcast a color broadcast of "Kukla, Fran and Ollie" in test mode via the NTSC standard. The first full-fledged color broadcast was the opera Carmen, shown on October 31, 1953.

https://voca.ro/1iv2xQ7BZSN7

·        #393

Artem Verhelis RT-211, Popovych E. (Wednesday, 15 June 2022 10:14)

Today I've read the article "Scientists discover how oxygen loss saps a lithium-ion battery's voltage". When the battery is charging, in addition to lithium ions, air atoms also enter, which ultimately leads to a decrease in the battery's capacity. Scientists have proposed new ways to create electrodes to prevent this. Lithium-ion batteries work like a rocking chair, moving lithium ions back and forth between two electrodes that temporarily store charge. Based on this knowledge, scientists will make a start in solving this problem. I found this article quite informative because in our time people very often interact with a similar technique.

Article: https://techxplore.com/news/2021-06-scientists-oxygen-loss-saps-lithium-ion.html
Audio: https://voca.ro/18ZZU1u9ArO2

1) initial stages of
In its initial stages of adoption, GOSSIS is already gaining wide attention from the medical community. 
На початкових етапах впровадження GOSSIS вже привертає увагу медичної спільноти.
2) more specifically
More specifically, papers written by people in the U.S., the U.K. and China are far more heavily cited than are those from other countries such as Mexico and Brazil.
Точніше, статті, написані людьми зі США, Великобританії та Китаю, цитуються набагато частіше, ніж статті з інших країн, таких як Мексика та Бразилія.
3) numerous examples
The study found numerous examples to corroborate the existence of the phenomenon.
При дослідженні було знайдено численні приклади на підтвердження існування цього явища.
Audio: https://voca.ro/1amtqRaVpepB

·        #392

Artem Verhelis RT-211, Popovych E. (Wednesday, 15 June 2022 10:11)

Exam topic #10
Radio equipment helping to save on bills.
Nowdays, one of the solutions to honest savings on bills can be a motion sensors. They are often installed in corridors, vestibules or showers, are relatively cheap, and for each type of room you can choose the optimal sensitivity radius. It's not only consumes less electricity than lamp bulb, but also lasts more time longer and the price difference is minor. For 3-5 years, you won’t have to climb into the ceiling or chandelier to change a burned-out light bulb. They are also not afraid of voltage drops, unlike lamp bulb, and don't contain dangerous substances.

Audio: https://voca.ro/16PpdnC0HfQX

·        #391

Lebedeva E. (Tuesday, 14 June 2022 10:55)

To Kovalzhi Andrey RZ-211 Well done, thank you.

·        #390

Kovalzhi Andrey RZ-211 (Lebedeva E.) (Tuesday, 14 June 2022 10:49)

Долг за 12.06
Today I have read the article : «Artificial intelligence can help you understand music better»
Algorithms and technology have so far helped listeners to more of the same music. Now, University of Ohio researchers are working on new technology that can get people interested in a greater musical variety. Olivier Lartillot, researcher at RITMO Center for Interdisciplinary Studies in Rhythm, Time and Motion, believes technology can expand people's taste in music through a better understanding of musical elements. He says that people often listen to the music they can understand easily, therefore some more complicated types of music become less accessible, and that's where this technology comes in.
I liked this article because I love listening to music and i would be very happy to understand more about it.
https://voca.ro/12yuzIJZpFYU
https://phys.org/news/2022-06-scaling-heights-altitude.html
Daily phrases:
1) In other words
In other words, we can't say that gravity is a force.
Іншими словами, ми не можемо сказати, що гравітація це сила.
2)digital version
The playstation 5 was released as two different consoles: disk and digital versions.
Playstation 5 вийшла у вигляді двох різних консолей: цифрової і дискової версій.
3)in principle
The same risk exists in principle for electronic communications.
Такий же ризик існує в принципі і для електронних повідомлень
https://voca.ro/18B0ZUdK1FNI

·        #389

Popovych E. (Tuesday, 14 June 2022 10:35)

To Stanislav Kryvosheienko RT-211
Thank you, your comment, audio are quite correct as well as sentences with Phrases

·        #388

Lebedeva E. (Tuesday, 14 June 2022 10:33)

To Dovzhenko Ilya RZ-211 Use prtesent perfect in the first sentence: Today I HAVE read....

·        #387

Popovych E. (Tuesday, 14 June 2022 10:33)

To Nastya Poddubrovskaya(RZ-212)
#380,381,382,383
Your comments are good. Thanks for your work.

·        #386

Lebedeva E. (Tuesday, 14 June 2022 10:31)

To Denis Zavadsky Lebedeva RZ-211 The topic is written correctly, but there is no audio.

·        #385

Lebedeva E. (Tuesday, 14 June 2022 10:29)

To Kuleshov Konstantin(RZ-211) Thanks for the comment, but there are some mistakes in your reading.

·        #384

Stanislav Kryvosheienko RT-211 (Popovych) (Tuesday, 14 June 2022 10:21)

Today I have read the article "New model finds best sites for electric vehicle charging stations". This article is about researchers from North Carolina State University have developed a computational model that can be used to determine the optimal places for locating electric vehicle (EV) charging facilities, as well as how powerful the charging stations can be without placing an undue burden on the local power grid. They have developed a model that allows planners to optimize these decisions, serving the greatest number of people without taxing the power system. The researchers are currently in discussions with state and local government officials, as well as power utilities, to use the model to inform the development of EV charging infrastructure in North Carolina.

Voice - https://voca.ro/1c5BIDx5xicp
Article - https://techxplore.com/news/2022-06-sites-electric-vehicle-stations.html

Phrases
1) in principle - In principle, I pity him. - В принципе, я ему сочувствую.
2)digital version - The Times Reader is a digital version of The New York Times. - «TheTimes Reader» - это цифровая версия «Нью-Йорк таймс».
3)in other words - So, in other words, you haven't actually solved these cases. - Так, другими словами, у вас на самом деле нет решения этих случаев.

Voice - https://voca.ro/1aAB8cWzKdID

·        #383

Nastya Poddubrovskaya(RZ-212, Popovych.E) (Tuesday, 14 June 2022 10:15)

Today I have read the article «Team uses hot water to form photocatalyst».The production of chemical substances normally requires environmentally harmful solvents.After the research group produced organic substances without harmful substances for the first time by heating them in hot water, the researchers can chalk up another success:Through hydrothermal synthesis, they succeeded in jointly forming and combining organic and inorganic substances in the same reaction vessel—specifically, an inorganic solid that encloses organic dye molecules.When exposed to light the hybrid material functions like a catalyst.Since the photocatalyst is a solid, it can be used multiple times.The research team's specific targets for application are small organic molecules that play a role in pharmaceuticals.
https://phys.org/news/2022-06-team-hot-photocatalyst.html
https://voca.ro/1bv0zBni5tEG
in principle
The same risk exists in principle for electronic communications.
Тот же риск в принципе существует и при использовании электронных сообщений.
inotherwords
So, inotherwords, I'mgettingonyournerves.
Другими словами, я действую тебе на нервы
digital version
So, they wanted to have a digital version of a stuntman and that's what we've been working on for the past few months.
И они заказали цифровую версию каскадёра, мы работаем над ней уже несколько месяцев.
https://voca.ro/1d1qMgeQSoEh

·        #382

Nastya Poddubrovskaya(RZ-212, Popovych.E) (Tuesday, 14 June 2022 10:06)

Today I've read an article: "A step closer to understanding the 'cold spot' in the cosmic microwave background".It tells about the research of scientists in space and the Universe, in particular, the super-emptiness of Eridanus. According to them, various voids are located between galaxies and, thanks to dark energy, repel star clusters from each other. The problem is that scientists had a Lambda-CDM method, which inherently either denied the veracity of this phenomenon, or pointed to a cosmic anomaly. In addition, the researchers noticed that the density of dark energy here is somewhat less than in other voids known to man. I believe that this study is very important, as it brings us closer to understanding and structure of the Universe, the processes taking place in it.
https://phys.org/news/2022-01-closer-cold-cosmic-microwave-background.html
https://voca.ro/14X1w9M6CUeo
in principle
Such individual reviews could in principle also address violations relating to progressive realization.
Такое рассмотрение индивидуальных случаев в принципе могло бы также охватывать нарушения, связанные с постепенным осуществлением.
inotherwords
So, inotherwords, youhaven'tactuallysolvedthesecases.
Так, другими словами, у вас на самом деле нет решения этих случаев
digital version
And this is what we used to give to the company Image Metrics to create a rigged, digital version of Emily.
И именно это мы использовали, чтобы дать компании ImageMetrics возможность создать цифровую версию Эмили.
https://voca.ro/11QKy8C1mpZo

·        #381

Nastya Poddubrovskaya(RZ-212, Popovych.E) (Tuesday, 14 June 2022 09:59)

Today, І have read thе аrtісlе «A new way to remove troublesome ions from water»
Converting seawater to freshwater is important in water-scarce countries. This process requires the removal of certain charged particles from the water, known as ions. When an electric current is applied, the ions are adsorbed on the electrodes and are therefore removed from the water. Recent research by scientists from Israel and the Netherlands is helping to improve this ion removal process.
In my opinion, this approach opens up many interesting possibilities. It can also be used to treat wastewater, in particular to remove arsenic or small organic molecules such as drug residues or herbicides.
https://phys.org/news/2021-10-troublesome-ions.html
https://voca.ro/12LDyVbt23KW
in principle
Nevertheless, we agree in principle with its basic message.
Тем не менее, в принципе, мы согласны с его сутью.
in other words
Each dissolution evokes unbridled elements, in other words, it opposes the manifested Cosmos.
Каждое разложение влечет необузданность стихий, иначе говоря, противоречит проявленному Космосу.
digital version
In addition, the digital version of the original English document will include a reference to this corrigendum.
Кроме того, цифровая версия оригинала этого документа на английском языке будет включать в себя ссылку на указанное исправление.
https://voca.ro/1deCuZVDRyCB

·        #380

Nastya Poddubrovskaya(RZ-212, Popovych.E) (Tuesday, 14 June 2022 09:52)

Today I have read the article: "Cyber of the fittest: Researchers develop first cyber agility framework to measure attacks". There is a computer system that lures actual cyber-attacks—to attract and analyze malicious traffic according to time and effectiveness. As both the attackers and the defenders created new techniques, the researchers were able to understand better how a series of engagements transformed into an adaptive, responsive, and agile pattern or what they called an evolution generation. By the way, it is the first of its kind and allows cyber defenders to test out numerous and varied responses to an attack. In my opinion, it is really great that specialists are interested in this problem.
Article: https://phys.org/news/2019-06-cyber-fittest-agility-framework.html
https://voca.ro/1nFFadpArp31
in principle
We believe that in principle the meetings would be organized by 2008.
Мы исходим из того, что в принципе эти мероприятия должны быть организованы к 2008 году.
in other words
So in other words, he just appears on the grid five years ago.
Другими словами, он просто появился пять лет назад.
digital version
The digital version is based on an especially developed viewer, providing the following functions:
В основу цифровой версии положена специально разработанная система просмотра файлов, позволяющая обеспечить такие функции, как:
https://voca.ro/18f0ogDlFem3

·        #379

Popovych E. (Tuesday, 14 June 2022 09:50)

To Sasha Movsum-Zade RT-211
Your comment has clear layout and quite correct as well as the task with the phrases, thank you.

·        #378

Kuleshov Konstantin(RZ-211)(Lebedeva) (Tuesday, 14 June 2022 09:50)

Відпрацювання 09.06
Today I have read the article "PowerPoint Live helps Microsoft Teams users present remotely". It tells us about virtual presentations. This feature became available during the coronavirus pandemic thanks to the Microsoft Teams PowerPoint Live tool. I think it is a very comfortable environment for viewing presentations. For Presenter mode places the presenter at the "front and center" of the meeting, reducing the distraction of seeing multiple guests highlighted all at once. PowerPoint Live also includes a Live Reactions feature where users can use real-time emoji to interact.
In my opinion, it is the best environment for viewing presentations because it has many useful features https://techxplore.com/news/2021-03-powerpoint-microsoft-teams-users-remotely.html
1.The digital version is based on an especially developed viewer, providing the following functions.digital version
2.So, in other words, you haven't actually solved these cases. in other words
3.Such individual reviews could in principle also address violations relating to progressive realization.in principle
https://voca.ro/1lwQfCg8hJal

·        #377

Popovych E. (Tuesday, 14 June 2022 09:49)

To Nazariy Glugan (RT-211)
Thank you, you have successfully completed the task.

·        #376

Popovych E. (Tuesday, 14 June 2022 09:47)

To Yeulizaveta Barsukova (RT-211)
#372, 364
Exam Topic #10 (Radio equipment helping to save on bills) is well done
Thank you for your informative and grammatically correct commentaries.

·        #375

Roman Gavrilenko RZ-211 (Yershova) (Tuesday, 14 June 2022 09:47)

Exam topic #4 ( Information protection systems)
In order to run a successful, secure organization, IT leaders need well-documented policies that address potential security issues and explain how these issues will be managed within the company. These policies are also fundamental to the IT audit process, as they establish controls that can be examined and validated.
Examples of security policies
Security policies come in several forms, including the following:

General information security policy. Provides a holistic view of the organization's need for security and defines activities used within the security environment.

Access security policy. Addresses how users are granted access to applications, data, databases and other IT resources. This policy is particularly important for audits.

Authentication policy. Governs how users are verified to access a system's resources.

Password policy. Defines how passwords are configured and managed.

Perimeter security policy. Defines how an organization protects its network perimeter from unauthorized access and the technologies used to minimize perimeter porosity.

Cybersecurity policy. Defines how an organization prepares and responds to malware, phishing, viruses, ransomware and other attacks.

https://voca.ro/1k5ntY1VklqI

1)prevailing view
The prevailing view, however, was that the matter merited attention in the context of the draft Convention.
https://voca.ro/1j30AvAbv9OP


2)priority research areas
The demand for more democratic input, finally, also seeks to influence research priorities .
https://voca.ro/1jSQGGXljDVx

3)practical problems
Measures are being agreed to overcome these practical problems.
https://voca.ro/12DfiMSDhyku

·        #374

Sasha Movsum-Zade RT-211 (Popovych E.) (Tuesday, 14 June 2022 09:45)

Today I have read the article titled "New imager microchip helps devices bring hidden objects to light". This article describes how researchers at the University of Texas at Dallas and Oklahoma State University have developed an innovative terahertz imaging microchip that allows devices to detect objects and create images through obstacles including fog, smoke, dust, and snow. It also describes that the team is working on a device for industrial applications requiring shooting at a distance of up to 20 meters. The technology could also be adapted for use in cars to help drivers or autonomous vehicles navigate dangerous environments that reduce visibility.
https://voca.ro/16Qz63ljd0mc
https://techxplore.com/news/2022-06-imager-microchip-devices-hidden.html

1)in other words
So the benchmark is objective assessment or in other words reasonability.
Таким чином, як критерій має виступати об'єктивна оцінка або, іншими словами, обґрунтованість.
2)digital version
The digital version is based on an especially developed viewer.
В основу цифрової версії покладено спеціально розроблену систему перегляду файлів.
3) in principle
The assessment leads to recommendations, which can be supported in principle.
На основі цієї оцінки зроблено рекомендації, з якими, у принципі, можна погодитись.
https://voca.ro/1kzmeK93Z9dA

·        #373

Nazariy Glugan (RT-211) Popovych E. (Tuesday, 14 June 2022 09:43)

Today I have read an interesting article "New imaging system captures text from barely open books". investigates a new method for books with fragile binding.The method allows you to scan books without opening them by more than 30 degrees. Historians and librarians think the book is a valuable and important subject of study, especially if the binding is original. It’s hard to open old books without harming them. This project was developed under the leadership of Gregory Rochester and the Lazarus Project team. I think this article is useful and this information will help save old books.

https://techxplore.com/news/2021-10-imaging-captures-text.html


https://voca.ro/1n2cZadTPKKz

1) digital version


The digital version is based on an especially developed viewer, providing the following functions

2) in other words


So the benchmark is objective assessment or in other words reasonability.

3) in principle


The assessment leads to recommendations, which can be supported in principle.

https://voca.ro/1kMP4dcsf6PS

·        #372

Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 14 June 2022 09:38)

Hello. Could you check this work, please? I sent it last Thursday to our other teacher and I don’t know if he checked it or not because he didn’t write anything. I'm just afraid she'll get lost. If you want to check if I really did this, then this is comment #280. Thank you in advance.

Exam Topic #10 (Radio equipment helping to save on bills)

There are many ways to save on bills. However, they can all be combined into one. To do this, we need to use a smart home system. It can control the switching on or off of lighting or electrical equipment. It can also control the irrigation system, turn on or off the water at a specified time. In addition, it can control the microclimate in the house. As a result, electricity and water bills will be reduced because we will not forget to turn off the lights in the room and turn off the irrigation system.
Audio:https://voca.ro/1m8j7b54GbkF

·        #371

Gvozd to Roman Gavrilenko RZ-211 (Tuesday, 14 June 2022 09:35)

Your tasks are quite correct and interesting.

·        #370

Denis Zavadsky Lebedeva RZ-211 (Tuesday, 14 June 2022 09:35)

Technical basis of information protection in modern computer systems.

The basis of information protection in modern systems lies in the complication of access to the information itself, which repeats the oldest ways of storing data. Previously, various kinds of ciphers or tricks were used to read the text on paper just like that was impossible, but today these methods have been adapted to modern computer systems. For example, the PGP encryption system. This is a method of encrypting data with the creation of a decryptor key. User 1 creates a document and encrypts it, generating a decryption key. User 1 gives this text to user 2, and then his decryption key. This method is one of the most popular ways to protect information today, and it lays the foundation for information security in today's Internet environment.

·        #369

Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 14 June 2022 09:27)

Долг:31.05

1)Today I've read an article called"Canada hospitals use drones to carry lungs for transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western Hospital on the city's west side to the roof of the downtown Toronto General Hospital.The trip at the end of September took less than 10 minutes. It was automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the company, but a similar flight in April 2019 delivered a kidney to a hospital in the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team that whisked the package inside and successfully transplanted the lungs into a waiting patient, saving the life of the 63-year-old man who'd been diagnosed with pulmonary fibrosis.

In my opinion, this is an excellent and fast method for the delivery of human organs

https://voca.ro/1oNUOF2CvqeB

https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html

1)examine more closely
I think I will examine it more closely.
https://voca.ro/1nWP11xB6A47

2) estimate the effects of
It was able to estimate the effects of emissions on human health and biodiversity.
https://voca.ro/1z4BBCa9h3sM

3)distinct
The stems have distinct smelling foliage when young.
https://voca.ro/1m0QSdndPbpo

·        #368

Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 14 June 2022 09:24)

Долг:24.05
1)Today, І have read thе аrtісlе «Pianists learn to play with robotic third thumb in just one hour»
Pianists equipped with a third robotic thumb were able to adapt to using the extra digit after just one hour of practice, Imperial research has found.
Researchers from Imperial College London have been working to understand how well the human brain can cope with using extra limbs made possible through robotic technology.
To assess the effects of such devices on the brain, the research team, led by Professor Aldo Faisal of Imperial's Department of Bioengineering, attached robotic extra thumbs to a group of piano players next to their little finger that could be controlled by the pianists using their feet.
My opinion, very interesting and informative, I think such technology will open up new music for us.

https://voca.ro/1052xop3havH
https://techxplore.com/news/2021-11-pianists-robotic-thumb-hour.html

1:as a matter of
That is requested both as a matter of fairness and for the sake of regional stability.
https://voca.ro/1ilv3d3ONghs

2)as distinct from
Pests cannot produce resistance to predators as distinct from pesticides.
https://voca.ro/19wEuxddrqKM

3)acquainted with
Taylor, you don't know me, but I think we should get acquainted.
https://voca.ro/1eNbXKTfK3sg

·        #367

Dovzhenko Ilya RZ-211 (Lebedeva) (Tuesday, 14 June 2022 09:23)

Today I read an article about a liquid magnetic solution for sorting plastic waste. Due to the insane growth in the production of plastic, we need to figure out how to recycle it. Plastic pollution is very harmful to the environment. How does this separator work? And everything is quite simple. There are different types of plastic (heavy, light, etc.), so they need to be distributed. And they are distributed just by these magnetic fluids. Thus, they are sorted by type and it is easier to process. This method can easily and without errors separate different types of plastic.
https://techxplore.com/news/2021-02-fluid-magnetic-solution-plastic.html
https://voca.ro/1HyMQNcgUylc

1)in principle
In principle, ideas can be embodied and can make a profit.
Але, принципово, ідеї можуть бути втілені і можуть приносити прибуток.
2)digital version
Enter this code here in order to activate the digital version of your book.
Введіть тут цей код, щоб активувати цифрову версію вашого підручника.
3)in other words
States in other words have to be able to govern .
Інакше кажучи, держава має бути здатною управляти .
https://voca.ro/1jPOGjT2dFGR

·        #366

Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 14 June 2022 09:22)

Долг:17.05
1)Today I've read an article called"Innovative design of titanium alloy with supreme properties by 3D printing".
The article tells about design of advanced titanium alloy.

A study led by scientists from City University of Hong Kong (CityU) has successfully developed a super-strong, highly ductile and super-light titanium-based alloy using additive manufacturing, commonly known as 3D printing. Their findings open up a new pathway to design alloys with unprecedented structures and properties for various structural applications.
The research team was led by Professor Liu Chain-Tsuan, University Distinguished Professor in the College of Engineering and Senior Fellow of CityU's Hong Kong Institute for Advanced Study (HKIAS). Dr. Zhang Tianlong, a postdoc in the Department of Materials Science and Engineering (MSE), conducted the experiments. Their paper, to which President Way Kuo of CityU also contributed, was published recently in the prestigious scientific journal Science, titled "In situ design of advanced titanium alloy with concentration modulations by additive manufacturing."
in my opinion 3D printing as a revolutionary technology that can produce machine parts with complex shapes within just one step.

2)https://voca.ro/1n49MgfA09Nc

3)https://techxplore.com/news/2021-10-titanium-alloy-supreme-properties-3d.html

4:
1)a series of experiments
So, now we need to design a series of experiments around emotional flexibility.

https://voca.ro/164g0zUymPxB


2)a new light on
You know, this puts a new light on the game.

https://voca.ro/1i8zd8O1K1Fi

·        #365

Lebedeva E. (Tuesday, 14 June 2022 09:21)

To Denis Zavadsky RZ-211 Thanks for the comment.

·        #364

Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 14 June 2022 09:20)

Class-work
As we know, water is unusable, as most of us think. Most of the water goes to oil production and resulting in formation waters. To be able to reuse this water, engineers have developed a new method of purification - membrane distillation. This technology allows to treat heavily contaminated wastewater. Although this is an expensive technology but it can be made cheaper by using waste heat to meet the technology's thermal energy requirements. In my opinion, this is a very important development because it can be used not only for formation waters but also for water contaminated with chemical compounds.
Article:https://techxplore.com/news/2022-06-method-recycle-fracking-drilling.html
Audio1:https://voca.ro/12BJtMWPXi3M
Phrases
1)in other words
So the benchmark is objective assessment or in other words reasonability.
Таким чином, як критерій має виступати об'єктивна оцінка або, іншими словами, обґрунтованість.
2)digital version
The digital version is based on an especially developed viewer.
В основу цифрової версії покладено спеціально розроблену систему перегляду файлів.
3) in principle
The assessment leads to recommendations, which can be supported in principle.
На основі цієї оцінки зроблено рекомендації, з якими, у принципі, можна погодитись.
Audio2:https://voca.ro/17x6rPbgQhf1

·        #363

Popovych E. (Tuesday, 14 June 2022 09:20)

To Sergey Kyznyak RT-211
#360,361
Exam #10 (Cable television) is well done.
Good work, thorough and clear, thank you.

·        #362

Denis Zavadsky Lebedeva RZ-211 (Tuesday, 14 June 2022 09:16)

Долг: 31.05

Scientists from the Institute of Industrial Science at The University of Tokyo fabricated three-dimensional vertically formed field-effect transistors to produce high-density data storage devices by ferroelectric gate insulator and atomic-layer-deposited oxide semiconductor channel. Furthermore, by using antiferroelectric instead of ferroelectric, they found that only a tiny net charge was required to erase data, which leads to more efficient write operations. This work may allow for new, even smaller and more eco-friendly data-storage memory.
I consider this an important study because it is a potential opportunity to increase the memory size of electronic storage devices by reducing them in volume.

https://techxplore.com/news/2022-06-data-storage-memory.html

The digital version is based on an especially developed viewer, providing the following functions:
But in principle, I pity her.
So in other words, he just appears on the grid five years ago.

Цифрова версія заснована на спеціально розробленому програмі перегляду, що забезпечує такі функції:
Але в принципі мені її шкода.
Іншими словами, він з’явився в мережі лише п’ять років тому.

https://voca.ro/1jAjcLA7kICV

·        #361

Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 14 June 2022 09:07)

(Article)
Today I have read the article 'Combining AI and computational science for better, faster, energy efficient predictions'.
The article tells about the new technology "intelligent alloys", the main purpose of which is combining the power of computational science with artificial intelligence to develop models that complement simulations to predict the evolution of science's most complex systems. By using this technology, the researchers demonstrated that they can generate predictions thousands to a million times faster than it would take to run the simulations with full resolution or rely on partial or even faulty information through models. I think this technology has a huge future that is coming right now.

1)expected value
Either the present value or a future expected value should be used.
Следует использовать либо нынешнее значение, либо будущие ожидаемые значения.

2)technology capability
At least the exponential growth of information technology capability will continue unabated.
По крайней мере, возможности информационных технологий будут расти, не ослабевая, с экспоненциальной скоростью.

3)work schedule
Consequently, the Court may wish not to overstretch its work schedule in the field at any given time.
Соответственно, Суд, возможно, пожелает сделать более напряженным свой график работы на местах в любой заданный период времени.

Vocaroo(article): https://voca.ro/1iVdA1qr4K25
Vocaroo(sentences): https://voca.ro/130pnPRxsJji
https://techxplore.com/news/2022-04-combining-ai-science-faster-energy.html

·        #360

Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 14 June 2022 09:01)

Exam #10 (Cable television)
Cable TV in the modern world is already less popular than 5 years ago. Now satellite and Internet television are popular. These are faster ways to receive a signal than cable. It's also cheaper and better quality. Cable TV has significant signal loss and the cost of running wires is higher. A couple of years ago, cable television left Ukraine, analog signals no longer come to our TVs, and we stepped forward in this area. I believe that progress can`t be stopped and this is the right decision, we must improve and develop the types of signal transmission and our television vision.

Vocaroo: https://voca.ro/1bkWxT1Pjxgb

·        #359

Gvozd O.V. to RZ-211 (Tuesday, 14 June 2022 08:57)

Dear students!
This lesson is a good chance for you to post your debts. I am waiting for your active work.

·        #358

Khotynskiy Oleg (RZ-212, S.Mykhailiuk) (Tuesday, 14 June 2022 08:34)

Can I find out how many comments I need to turn in to close my debts?

·        #357

Popovych E. (Tuesday, 14 June 2022 08:31)

To Mashovets Andrey (RZ 212)
Thank you for your comment and voice message.

·        #356

Popovych E. (Tuesday, 14 June 2022 08:30)

To Kravchenko Kostiantyn (RZ-212)
Your comments are good, as usual. Thanks for your work. Good luck.

·        #355

Popovych E. (Tuesday, 14 June 2022 08:28)

To Povoznikov Artem RZ-212
Thank you, you have successfully completed the task.

·        #354

Mashovets Andrey (RZ 212, Popovich) (Tuesday, 14 June 2022 08:26)

Today I've read the article “Collapsing a leading theory for the quantum origin of consciousness”.
This article is about destruction of the theory of quantum origin of consciousness.
The purpose of this article is to show that the theory of quantum origin of consciousness has been disproved and to demonstrate evidence of this and to show new guesses in this growth.
А series of experiments in a lab deep under the Gran Sasso mountains, in Italy, has failed to find evidence in support of a gravity-related quantum collapse model, undermining the feasibility of this explanation for consciousness. The result is reported in the journal Physics of Life Reviews.
I think this article will be useful for people interested in science.
https://voca.ro/1irMQ6Es5Q3R
https://phys.org/news/2022-06-collapsing-theory-quantum-consciousness.html

in other words
The current best practice in secure technology architecture used by major businesses and organizations is a "zero trust" approach. In other words, no person or system is trusted and every interaction is verified through a central entity.
digital version
People with an Arizona driver's license or state identification card can now add a digital version on their iPhone.
in principle
What I loved about this theory was that it is in principle testable and I decided to search for evidence that might help confirm or falsify it
https://voca.ro/1k6Ebn2CMhFH

·        #353

Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 14 June 2022 08:00)

Today I've read the article "SSD-Insider++: A firmware-based approach to thwarting ransomware attacks"
The article covers the recent research of malware prevention technologies, specifically a computer SSD's firmware.
This new technology consists of firmware, embedded right into the computer SSD, making it harder for malware to bypass it. The firmware is able to recognize the patterns displayed by ransomware, and in the event that a malware attack occurs it will immediately stop all SSD activity in order to prevent the malware from accessing any files.
I think this technology is fascinating, however, much like any tool, I believe it could end up being used for terrible things. If the creators can embed firmware into my SSD that I would not be able to edit myself, how would I know that it's actually being used for malware detection and doesn't do something significantly worse, whilst pretending to be useful?
Article: https://techxplore.com/news/2021-09-ssd-insider-firmware-based-approach-thwarting-ransomware.html
Audio: https://voca.ro/13aQ06lOq3nt

Phrases:
1) In other words, no person or system is trusted and every interaction is verified through a central server.
Іншими словами, жодна людина або система є довіреною, та кожна взаємодія перевіряється через центральний сервер.
2) A digital version of the Electronics Show kicked off on Monday.
Цифрова версія шоу електронної апаратури розпочалась у понеділок.
3) In principle, however, the method is relevant for various chemical reactions.
Але, в принципі, метод є доречний для різних хімічний реакцій.
Audio: https://voca.ro/11Y5HP0vUNMh

·        #352

Povoznikov Artem RZ-212 (Popovych) (Tuesday, 14 June 2022 07:56)

Today i have read the article: Fishers at risk in 'perfect storm'.

This article tells about Scientists who conducted research with fishermen and sagged a survey about how they combine risk and reward during a storm. Since climatic conditions cause extreme weather conditions, storms will increase in the future across the UK, and this in turn will greatly affect the economic instability of many fishermen. It is very difficult to solve such a problem, but the researchers are trying to create policies that include improving the safety of boats, less vulnerable fishing methods and the creation of insurance products that are issued to fishermen during hazardous work. Researchers also created a group from different universities and created various scenarios with factors including wave height, wind speed and likely catch.
I think these are great and great methods to help fishing reduce their economic problems.
Text: https://phys.org/news/2021-03-fishers-storm.html#!
Audio: https://voca.ro/11enipXIwjJN

1)In principle

In principle, however, the method is relevant for various chemical reactions and thus the production of countless synthetic products.

2)digital version

The digital version is based on an especially developed viewer, providing the following functions.

3)In other words

In other words, beauty really is in the eye of the beholder.

Audio: https://voca.ro/1iRrBOCrGr9R

·        #351

Popovych E. (Tuesday, 14 June 2022 07:37)

To Artem Kotliarov RZ-212
Your tasks are performed completely correct, they are informative and detailed.

·        #350

Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 14 June 2022 07:14)

1) 1. in other words
So in other words, he just appears on the grid five years ago - Іншими словами, він з’явився в мережі лише п’ять років тому
2. in principle
In principle, however, the method is relevant for various chemical reactions and thus the production of countless synthetic products. - В принципі, однак, цей метод є актуальним для різних хімічних реакцій і, таким чином, виробництва незліченної кількості синтетичних продуктів.
3. digital version
The digital version is based on an especially developed viewer, providing the following functions - Цифрова версія заснована на спеціально розробленій програмі перегляду, що забезпечує наступні функції
https://voca.ro/1oOYtHu1ponv
2) Today, І have read thе аrtісlе «A new way to remove troublesome ions from water»
Converting seawater to freshwater is important in water-scarce countries. This process requires the removal of certain charged particles from the water, known as ions. When an electric current is applied, the ions are adsorbed on the electrodes and are therefore removed from the water. Recent research by scientists from Israel and the Netherlands is helping to improve this ion removal process.
In my opinion, this approach opens up many interesting possibilities. It can also be used to treat wastewater, in particular to remove arsenic or small organic molecules such as drug residues or herbicides.
https://phys.org/news/2021-10-troublesome-ions.html
https://voca.ro/1ax3utozCR6h

·        #349

Popovych E. (Tuesday, 14 June 2022 07:06)

Good morning!
The lesson will start soon, I am waiting for your active work. If you have debts, it is high time to post them.

·        #348

Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:56)

Exam topic#8 Passwords and their drawbacks

To protect your data and create an effective security system, it is important to come up with a quality password for it. 90% of all users do not know about the rules and hope for "maybe", as a result they lose access to their accounts and become more vulnerable to attackers. Every year, data security companies collect information about the most used passwords and publish them. Many users do not take security very seriously when choosing common passwords. They can be broken by rough selection, and if the code is used for several accounts - the user risks being left without all profiles. A strong password reduces the risk of account hacking. The main rule is that the more characters, the better for security, because even in the case of rough selection, it will take a long time to break. And if you follow all the above rules - without knowing the person personally, it will be impossible to break.
voice: https://voca.ro/1k9Duh5T541o

·        #347

Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:55)

Exam topic#6 An isolated virtual machine

A virtual machine is a software and hardware copy of a physical computer or server, with any desired operating system and set of installed programs. Visually, the system resembles real hardware, as if you are using PC resources (processor, disk, adapter). Only this computer is not real, but virtual. Resources are stored in the cloud and allow you to work autonomously. Simply put, a virtual machine is an infrastructural, virtual environment that allows you to create another computer on your computer. The virtual machine is stored and duplicated as an isolated environment. You can run it later or copy it to another computer. Preset configurations are saved automatically.
voice: https://voca.ro/1l1pcbecGuR4

·        #346

Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:54)

Exam topic#4 Information protection systems.

Integrated information protection system - a set of organizational and engineering measures aimed at ensuring the protection of information from disclosure, leakage and unauthorized access. Organizational measures are a mandatory component of building any system of protection. Engineering measures are carried out as needed. Organizational measures include the creation of the concept of information security, as well as the development of action plans in case of detection of unauthorized access to information resources of the system, failure of protection, emergency. If necessary, within the framework of organizational measures, an information security service may be established, and the system of record keeping and document storage may be reorganized.
voice: https://voca.ro/1dImOxhHWj1r

·        #345

#344 Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:53)

Exam topic#2 Various security techniques

To develop the concept of information security, information means information that is available for collection, storage, processing (editing, conversion), use and transmission in various ways, including in computer networks and other information systems. Such information is of high value and may be subject to encroachment by third parties. The desire to protect information from threats is the basis for creating information security systems. Formal means of protection: electronic mechanisms that operate independently of information systems and create barriers to access. Additional security features such as cameras, DVRs, motion sensors also add a small "layer of protection" to the data.
voice:https://voca.ro/1oGODwqLXkt5

·        #344

Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:53)

Exam topic#1 Concept of "Privacy"

Confidentiality is a property that is not subject to publicity; gullibility, secrecy, pure privacy. Confidential information refers to information to which access is restricted by federal laws. Constraints have different purposes. For example, protecting the foundations of the constitutional order, morality, health, rights and legitimate interests of certain individuals, ensuring the defense of the country and the security of the state. Confidentiality means that a person who has access to certain information does not have the right to transfer such information to other persons without the consent of its owner. Any journalist should know what kind of information is confidential, how to properly use and disseminate it. Mishandling of confidential information can lead to claims from regulatory authorities, litigation or even criminal prosecution.
voice:https://voca.ro/1ZfClx2fpsFC

·        #343

Mitriev Vitaliy RZ-213 (S.Mykhailiuk) (Friday, 10 June 2022 12:13)

Exam topic #10
Software by using firewall is a firewall that is installed on a computer or server, and tasked with network security. It works with a wide variety of other technology security solutions to provide more robust and cohesive security for enterprises of all sizes. When a software firewall is installed on a server, it opens up like an umbrella of protection over all other computers connected to the network. It is able to monitor both incoming and outgoing traffic for potential risk or suspicious user behaviour, and also makes setting security policies much easier, faster and more flexible. This type of firewall is also critical as it requires very little space and can be installed remotely on any number of devices. It’s far different from its counterpart, the hardware firewall, which has many unique elements in its own right.
https://voca.ro/1g0WAFvG53mN

·        #342

Kate Syrbu RZ-213 (S.Mykhailiuk) (Friday, 10 June 2022 12:01)

1) for a number of reasons - з ряду причин;
These problems have developed for a number of reasons.
Ці проблеми виникли з ряду причин.
2) first use of - перше використання;
The first use of corn may have been for an early form of liquor.
Перше використання кукурудзи, можливо, було для ранньої форми лікеру.
3) focused primarily on - зосереджено насамперед на;
This study focused primarily on salinity problems.
Це дослідження зосереджено на проблемах солоності.
https://voca.ro/17zuHO6Q56uI

Exam topic #19
A security violation occurs when a network or system is accessed by an unauthorized individual or application. Once your system is infiltrated, the intruders can steal data, install viruses, and compromise software. There are seven of the most common types of security threats: man-in-the-middle attack, denial-of-service (DoS) attack and distributed-denial-of-service (DDoS) attack, phishing, password attack, eavesdrop attack, cross-site (XXS) attack, malware attack. In my opinion, a system should include things like endpoint security software, firewall management software, managed antivirus, and bring your own device (BYOD)/mobile device management (MDM) software.

https://voca.ro/1hhT63u74m83

·        #341

Igor Rudko (RZ-213) (S.Mykhailiuk) (Friday, 10 June 2022 11:57)

Audio: https://voca.ro/1hiiIPofCp2C
Article: https://phys.org/news/2019-06-cyber-fittest-agility-framework.html
Today I have read the article: "Cyber of the fittest: Researchers develop first cyber agility framework to measure attacks". There is a computer system that lures actual cyber-attacks—to attract and analyze malicious traffic according to time and effectiveness. As both the attackers and the defenders created new techniques, the researchers were able to understand better how a series of engagements transformed into an adaptive, responsive, and agile pattern or what they called an evolution generation. By the way, it is the first of its kind and allows cyber defenders to test out numerous and varied responses to an attack. In my opinion, it is really great that specialists are interested in this problem.
Phrases
Audio: https://voca.ro/1hh312C0Iaiw
1) first use of - перше використання
Some group of scientists made an experiment that was the first use of microscopic sound waves to study cell abnormalities - Деяка група вчених провела експеримент, який став першим використанням мікроскопічних звукових хвиль для вивчення аномалій клітин
2) focused primarily on - зосереджений насамперед на
The research is also unique because previous studies focused primarily on firm-level consequences of behavior such as supplier sustainability risk and corrupt opportunism. - Дослідження також унікальне, оскільки попередні дослідження були зосереджені насамперед на наслідках поведінки на рівні фірми, таких як ризик стійкості постачальників і корупційний опортунізм.
3) for a number of reasons - з ряду причин
The technology is novel for a number of reasons, one being that it has the potential to provide new insight into the environmental factors that have significant impacts on air pollution levels. - Ця технологія є новою з ряду причин, одна з яких полягає в тому, що вона може дати нове уявлення про фактори навколишнього середовища, які мають значний вплив на рівень забруднення повітря.

·        #340

Chabanenko Ksenia RZ-213(S.Mykhailiuk) (Friday, 10 June 2022 11:19)


Exam topic #13 (Authentication mechanisms)
Authentication is the process in which users verify their identity. Registration, authorization, restoring access and deletion are main sub-processes of authentication. Login is the personal name and it can include your email, phone number, original name or other account, for example, in Facebook or Google. Its confirmation could be realized by entering password, SMS or PIN code, access key, or by face or fingerprint scanning. Two-factor authentication is the extra protecting measure when user should verify using several methods. For example, it could be the combination of email and PIN code verification. Authentication is important because there are a lot of cheaters whose aim is to gain access to your account in order to steal the money or do other bad stuff.

https://voca.ro/15zaTzeXWOHU

·        #339

Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 10 June 2022 11:14)


Exam Topic:
Different Protection Mechanisms
Audio:https://voca.ro/13WrJmqKXXB6
Nowadays, more new viruses and new threats are emerging, that is why we need to act quickly and effectively. And that`s why more new mechanisms are created.
The main protection mechanisms nowadays are, first of all, the creation of software that does not allow you to pick up a virus so easily.
It is also possible to include different hardware devices that also perform the function of different protection. But the most productive mechanism is a combination of these tools, with the organization of certain security measures.
All this will help to reduce the risk of unauthorized access or picking up the virus.

·        #338

Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 10 June 2022)

Exam Topic:
Principles of information protection
Audio:https://voca.ro/16rWDcCjosVf
Creating the principle of information protection is very important because they have to protect the rights of people, society, and the state.
The main principles of information protection in Ukraine are, first of all, legality and balance of interests of the whole society and the state.
Equally important is integration into the international security system and the prevention of all threats.
Because it is very important to act quickly, and efficiently and try to improve security systems, in order to avoid all kinds of dangers that can affect the lives and health of people

·        #337

Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 10 June 2022 11:13)

Exam Topic:
Information protection systems
Audio:https://voca.ro/1m4vDSem4EDp
Our world is developing, and more things go online. That`s why it becomes even more important to create other systems for the protection of information.
First, you need to understand that an information security system - is a set of engineering and technical measures aimed at protecting information.
The development of an information security system is very difficult, as it covers many different areas, from hardware protection to software, etc.
One of the areas of information protection in computer systems is the technical protection of information, which is created to protect against unauthorized access.

·        #336

Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 10 June 2022 11:07)

information protection systems (exam topic 4)
Information security and protection of privacy are some of the most important factors in the development of high-quality tools in the healthcare sector. If no attention is paid to these aspects, there is substantial risk that individuals may come to harm in healthcare situations. Leonardo Iwaya, PhD student in computer science at Karlstad University, explores ways of securing information and protecting privacy when using mobile applications in healthcare (mHealth).
Mobile apps are for example used in developing countries to increase the coverage and the access to public healthcare. But many projects fail because issues related to data security and privacy cannot be successfully integrated in the systems.
For instance, in Brazil, mHealth tools have been used by community health workers to improve patients' treatment in poor and rural areas, strengthening the link between the society and the public health system. These patients often have limited possibilities to visit healthcare clinics and the project instead involved healthcare workers visiting patients at home. Smartphones are, for example, used to streamline the handling of journals. Information gathered during a visit is also used to analyse the impact of the conditions in the specific areas on people's health, so that more prevention work can be done.
In my opinion these issues have to be considered from the start if people want to develop digital healthcare systems in which information is properly secured and privacy is protected. I think that this article is so interest
especially today. I would recommend reading this article to many people who do not understand the importance of modern technology

·        #335

Anna Yakymova/ РЗ-213(S.Mykhailiuk) (Friday, 10 June 2022 10:47)

passwords and their drawbacks(Exam topic 8)
The most basic form of user authentication, particularly on the Web, is the password authentication protocol. This method of authentication forces you to remember username/password combinations to access accounts or special sections of a website. While effective and in some ways fundamentally a part of online security, password authentication protocols fail when you don't address them seriously. So the main disadvantage is that it can be simply guessed.
You typically can't guess a password unless you know something about the user of that password, and then only if the password represents something knowable about that user. Computer programs, however, can launch brute force attacks on password systems. This means that a program literally reads through a provided dictionary of terms, trying each word until the correct combination of characters breaks the password. Typically, protecting yourself from these attacks requires you to create complex passwords that include numbers, letters, and special symbols, which can be hard to remember.
Also, don't forget about the danger for the password in public places.
First, someone physically near you may look over your shoulder and read your password, or look at your keyboard and note your key strokes. Second, someone connected to the network might try to intercept your password information as you log in using network programs that monitor the local Wi-Fi hot spot.
Your password is the last point of defense between you and criminals who'd like to access your personal data. Therefore, you should always follow the rules for creating and using a password so that it has minimal drawbacks.
https://voca.ro/1W3umaZqXGnT

information protection systems(Exam topic 4)
More and more sectors of human activity are becoming so much imbued with these new information technologies. But providing huge opportunities, information technology, however, carry a greater risk and creating an entirely new, little-studied area for possible threats, which implementation can lead to unpredictable and even catastrophic consequences. An increasing number of computer crimes that may lead ultimately to the decreasing of the economy. Failure of information technology used in the management of nuclear power plants or chemical plants can cause ecological disasters. And so it should be clear that the information is a resource that must be protected.
Systems of information security are the same thing as the information protection systems and they protect sensitive information from unauthorized activities, including inspection, modification, recording, and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer account details, financial data or intellectual property.
There are such types of systems like :
Personal data protection systems, data access control systems, intrusion detection and prevention system.
https://voca.ro/1jfFC847ewK4

·        #334

Simchuk Alexey (Mykhailiuk RZ-213) (Friday, 10 June 2022 10:43)

Exam topic #9 Functions of firewalls
A firewall is a system specifically designed to prevent suspicious access from entering a private network. Firewall itself can be hardware or software, it can also consist of a combination of both.

Firewall (fire retaining wall) itself is actually inspired by a physical object called a firewall that is installed in buildings to prevent the spread of fire from its source. Firewalls for many buildings are installed, for example in apartment complexes. To separate the two apartment units, a firewall was installed so that in the event of a fire the fire does not quickly spread from one unit to another.

Because the firewall serves as a barrier to the outside world, then for one apartment unit that has four sides, for example, it must install a firewall at all four border points. If one side is not limited by a firewall while the other three are fitted with a firewall, it will be futile to try to hold back the fire that will spread quickly. So is the case with firewalls for computers.

In order to function effectively, a firewall must meet certain standards, be able to establish a ‘security fence’ around a private network, prevent unauthorized access and various disruptions to documents or files on the user’s computer. On the market, there are quite a number of firewall products offered with varied functions. The difference between firewalls with one another is usually in how tight the security and selectivity of access, and the scope of protection at various layers of the OSI (Open System Interconnection).

·        #333

Simchuk Alexey (Mykhailiuk RZ-213) (Friday, 10 June 2022 10:40)

Exam topic #12 (Hardware firewall)
A hardware firewall is a physical device, similar to a server, that filters traffic to a computer. Instead of connecting a network cable to the server, it connects to the firewall, placing the firewall between the uplink and the computer. Like a standard computer with processor, memory and sophisticated software, this device also uses powerful network components (hardware and software) and forcibly inspects all traffic passing through this connection with configurable rule sets that allow or deny access accordingly.
Anyone who has ever used a computer can probably tell you a story about firewall blocking. As good Internet citizens, we encounter firewalls all the time, usually in the form of a software firewall running on a personal laptop or workstation. Their function is surprisingly modest. They inspect traffic as it enters and exits the computer and, based on some simple rules, either allow or deny that traffic.
Some common examples of software firewalls that you may be familiar with are
Windows Firewall.
UVB.
IP tables.
FirewallD.
A hardware firewall works similarly, except that it is outside the server.

·        #332

Simchuk Alexey (Mykhailiuk RZ-213) (Friday, 10 June 2022 10:38)

Exam topic #17 (Password as a general technique of secrecy.)
Passwords are an important part of information and network security. Passwords serve to protect against unauthorized access, but a poorly chosen password can jeopardize the entire institution. As a result, all members of the TCNJ community should take appropriate steps to ensure that their passwords are strong and secure. The best password is one that is long and has never been used before. Passwords are used to access any number of college systems. Bad, weak passwords are easily cracked and put the entire system at risk. Therefore, strong passwords are required. Try creating a password that is also easy to remember.Your password should not be the same as your username. Your password should be unique. Do not use the same password for multiple accounts

·        #331

Shlapak Dmytro RZ-213 (Vorobyova) (Friday, 10 June 2022 09:22)

Exam topic #6 (An isolated virtual machine).

A virtual machine is a virtual computer artificially created with the help of special software. A virtual computer has its own RAM, hard disk and processor. Simply put, it is a computer in a computer that uses part of the resources of the main computer (RAM, processor and hard disk).

Suppose there is a document, link or application created by an attacker to gain access to your device and your data. You, as a reasonable person, run it in a virtual environment in the hope that it will protect you from a potential threat. For a successful attack, he needs to go beyond the virtual environment.

https://voca.ro/1ghOx6Qawplf

·        #330

Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:54)

Today I've read an article: "Employer surveillance during COVID has damaged trust".The author of the article explains a new report by the University of St Andrews about how using staff surveillance by employers during the COVID-19 pandemic can endanger trust in the workplace. Research considers such methods of control as: Webcam photographs, recording keystrokes, and movement trackers. But researchers also warn employers not to sacrifice ethics for the sake of efficiency as it can backfire leading to mental health
issues, productivity decline, and staff resignations. And I absolutely agree with that.
https://phys.org/news/2021-11-employer-surveillance-covid.html
https://voca.ro/1nKRNcs2qzPT

·        #329

Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:52)

Today I've read an article: "A step closer to understanding the 'cold spot' in the cosmic microwave background".It tells about the research of scientists in space and the Universe, in particular, the super-emptiness of Eridanus. According to them, various voids are located between galaxies and, thanks to dark energy, repel star clusters from each other. The problem is that scientists had a Lambda-CDM method, which inherently either denied the veracity of this phenomenon, or pointed to a cosmic anomaly. In addition, the researchers noticed that the density of dark energy here is somewhat less than in other voids known to man. I believe that this study is very important, as it brings us closer to understanding and structure of the Universe, the processes taking place in it.
https://phys.org/news/2022-01-closer-cold-cosmic-microwave-background.html
https://voca.ro/16wHDOgR6bG6

·        #328

Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:50)

Today I've read an article: "Massive cable project set to give Africa internet boost". It says about how new high-speed Internet lines are being laid in Africa right now. I really think this is important, because before, a lot of the African people didn't even have the opportunity to go online. The Internet allows you not only to keep in touch with the rest of the world, but also to get knowledge, make purchases, etc. So the main idea of the article is to inform people about what happens with African high-speed Internet right now. I liked the article and considering it like a very useful one to all people.
https://techxplore.com/news/2020-05-massive-cable-africa-internet-boost.html
https://voca.ro/1m9LBf6cNYWe

·        #327

Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:48)

Today I've read an article: "Key to resilient energy-efficient AI may reside in human brain". A clearer understanding of how a type of brain cell known as astrocytes function may result in better artificial intelligence (AI) and machine learning, according to a team of Penn State researchers. This project was created by trying computer models of simplistic neuron-synapse connections and a lot of effort to understand how human brain works. I think this can improve computer programs which use artificial intelligence (AI) and machine learning in a way of more performance.
https://techxplore.com/news/2021-11-key-resilient-energy-efficient-ai-reside.html
https://voca.ro/1o1leSmykL8X

·        #326

Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:39)

Today I've read an article: "Hacking and loss of driving skills are major consumer concerns for self-driving cars". Self-driving cars have many advantages, such as freeing of time, removing the issue of human error and outperforming human capacity. But also we can't ignore such dangers as safety risks of the vehicles, loss of competencies by the driving public and privacy security breaches. I think this article will be helpful for everyone who wants to buy and use self-driving car, so they could weigh the pros and cons.
https://techxplore.com/news/2021-05-hacking-loss-skills-major-consumer.html
https://voca.ro/1la6Q6X63Bfk

·        #325

Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 19:33)

Today I've read an article: “Positive impact for police officers equipped with mobile devices”.From this article I learned that the introduction of mobile devices for police officers in Scotland has had a huge impact on safety and well-being.Scientific research has shown that mobile working has improved work efficiency . Officers reported that technology had a positive impact on their well-being because they didn't have to spend time at the end of their shift filling out paperwork. I think the introduction of mobile devices will have a positive impact on their work, because we live in a time when it's much more convenient to use devices than to write down all the information on paper.
https://phys.org/news/2021-11-positive-impact-police-officers-equipped.html
https://voca.ro/18qeaTV1soif



Can you please tell me if I still have any debts?

·        #324

Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 19:22)

Today I've read an article: "New braking systems and satellite navigation to help more trains run on Europe's tracks".Computers are very useful in our time. They help to expand a person's horizons and teach new skills much faster than books.One such useful thing is navigation, which can lead you to your destination. For example, navigation helps ensure that trains run correctly.And the new brake systems will help trains not to be late on their flights and know about the stop in good time.After reading this article, I learned a lot of new things, it turned out to be very interesting.
https://techxplore.com/news/2021-08-satellite-europe-tracks.html
https://voca.ro/1aAKlLfNtmee

·        #323

Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 19:21)

Today I've read an article: "3-D computer models of gigantic archaeological objects" by Monika Landgraf. It tells about the latest technologies in the archaeological field. Nowadays 3D modeling is developing very quickly, so researchers have found a way to use it in archeology. With the help of a special camera, the object is being transformed into a computer-generated image. This method will help the researchers study archaeological finds in a much closer and more detailed way.
In my opinion, this technology would be very helpful, so I like that this article is helpful in a certain way as well.
https://phys.org/news/2017-02-d-gigantic-archaeological.html
https://voca.ro/1ftAm4sBDrbn

·        #322

Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 19:18)

Today I've read an article: "The dark side of social media networks". Research from the University of Technology Sydney found 46 harmful effects from social media use, ranging from physical and mental health problems to negative effects on work and academic performance, as well as safety and privacy concerns. The researchers grouped the negative effects into six themes: cost of social exchange, annoying content, privacy concerns, security threats, cyberbullying, low performance. Ms Borun is currently researching the factors that influence social media addiction and the strategies people use to regulate their behavior. This topic is very relevant, as I myself am faced with the dark sides of social networks.
https://techxplore.com/news/2021-10-dark-side-social-media-networks.html
https://voca.ro/15sWxiQbF9Xe

·        #321

Popovych E. (Thursday, 09 June 2022 18:29)

To Povoznikov Artem RZ-212
The exam topic is not complete. There is no audio recording.
Thanks for your comments, voice messages and work with the phrases. Keep on working.

·        #320

Popovych E. (Thursday, 09 June 2022 18:22)

To Timophey Sipin RZ-212
#304,306
Exam Topic: Potential security violations is well done. Thank you, you have successfully completed the task.

·        #319

Popovych E. (Thursday, 09 June 2022 18:16)

To Kate Kholodova (RZ-212)
Exam topic #9 Functions of firewalls is well done.Thank you for your informative and grammatically correct commentaries.

·        #318

Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 18:04)

Today i've read an article: A computer system allows a machine to recognize a person's emotional state". The system created by researchers can be used to automatically adapt the dialogue to the user's situation, so that the machine's response is adequate to the person's emotional state. To detect the user's emotional state, the scientists focused on negative emotions that can make talking with an automatic system frustrating. Specifically, their work considered anger, boredom and doubt. To automatically detect these feelings, information regarding the tone of voice, the speed of speech, the duration of pauses, the energy of the voice signal and so on, up to a total of sixty different acoustic parameters, was used. To sum up, i think that this article is really interesting and informative.

https://phys.org/news/2011-11-machine-person-emotional-state.html
https://voca.ro/11Fvu5doNGni

1. Considerable disagreement
While progress has been made, considerable disagreement remained with regard to a number of crucial issues.
Хоча було досягнуто прогресу, залишаються значні розбіжності щодо низки важливих питань.
2. Under international law, all countries have the right to conduct research and develop their scientific capabilities for the peaceful uses of nuclear energy. Відповідно до міжнародного права всі країни мають право проводити дослідження та розвивати свої наукові можливості для мирного використання ядерної енергії.
3. Their work has provided new insights into the controversial question of whether the languages we speak shape the way we think. Їхня робота дала нове розуміння суперечливого питання про те, чи мови, якими ми розмовляємо, формують наш спосіб мислення.
https://voca.ro/1aNBggGPbkcq

·        #317

Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Thursday, 09 June 2022 15:04)

Sorry, how much tasks i need pass?

·        #316

Parshykov Vladyslav(RZ-212) (Popovich/Mikhailuk) (Thursday, 09 June 2022 14:15)

I want to ask, how many works I need to write more? How many debts I have?

·        #315

Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 09 June 2022 13:55)

Topic #10 (The major differences in a monochrome television and a color television receiver)

After the World War II, the USA took up the development of civilian technology, including television. Therefore, color TVs came to replace the monochrome TV. The biggest difference is the number of electron guns in the picture tube. A monochrome tv has only one gun as it can only show black, white, or shades of grey in between. Color TVs have 3 guns: red, green, and blue. Varying these tubes give you the full spectrum of color. Beyond that there are differences in the reciever, which has to decode the data for 3 guns instead of one, and in the drivers for the guns.

https://voca.ro/1ar5kibV9j3a


Topic #5 (¬First radio speeches)

On 13 May 1897, Guglielmo Marconi sent the world's first radio message across open water. He was initially interested in contacting ships. It paved the way for the radio and television broadcasts that we take for granted today. On 11 and 12 May Marconi's team placed a transmitter on Flat Holm, an island halfway across the Channel, and began sending messages out into the airwaves. But, their work was a failure, with the team member in Lavernock sat waiting for a non-existent signal. Then on 13 May, Marconi sent a message of "CAN YOU HEAR ME," which was received loud and clear. So, this became the communication revolution

https://voca.ro/14lTt1qtMv4E

·        #314

Yershova Y. (Thursday, 09 June 2022 12:27)

Stanislav Popik РТ-212 (Yershova) (Thursday, 09 June 2022 11:46)
You have already done this topic. Be attentive.

·        #313

Povoznikov Artem RZ-212 (Popovych) (Thursday, 09 June 2022 12:08)

Today i have read the article: Testing theories of cooperation between groups in rural Georgia.
This article tells about a person from Bocconi University who decided to conduct research to test the theory of cooperation between individuals in groups, he talked about how people in groups come together for common protection when threatened by an external force. But very little research has been done to find out whether tact's seemingly logical assumptions are true. To do this, he conducted his research in which people from 2 groups were invited to show a sense of trust in such a way that it could be changed. Through such research, Shayu found that people unite when they are threatened by an outsider. But, he notes, he also discovered an unexpected degree of cooperation between individuals of opposing groups - a possible step, in his opinion, by those who live in villages to keep the peace.
Text: https://phys.org/news/2017-10-theories-cooperation-groups-rural-georgia.html
Audio: https://voca.ro/1mnNlgWQiLIo

1)bear in mind

That might sound far-fetched but bear in mind that Korean PropTech company Zigbang has already opened a 30-floor VR office called Metapolis.

2)expander upon

Zhou and Huang thus expanded upon this type of model, adding new elements that allowed them to explore the interaction between a toxicant and a population in a polluted river.

3)examined in detail

We believe that all issues within the Working Group's mandate should be examined in detail.

Audio: https://voca.ro/1mBL3COYJTt3

Exam topic #12 (Hardware firewall)

This is the first line of defense as they are mostly configured on network boxes (modems/routers) containing customized hardware and software. Every time it detects a packet that is sent to your network, it checks its source, destination address and header if it can be trusted. Only when a packet is received is it allowed to pass through the hardware firewall and be configured on the destination computer. Depending on the specific settings of the firewall, it filters the traffic accordingly.
The hardware firewall has built-in IPS/IPDS (Intrusion Prevention Systems) that are pre-discovered as a separate device. But now they're on, great protection.

·        #312

Lebedeva E. (Thursday, 09 June 2022 11:58)

To Vova Kolomiets RZ-212 Well done, thank you.

·        #311

Stanislav Popik РТ-212 (Yershova) (Thursday, 09 June 2022 11:46)

Exam topic #1“Cable television”
Cable TV in the modern world is already less popular than 5 years ago. Now satellite and Internet television are popular. These are faster ways to receive a signal than cable. It's also cheaper and better quality. Cable TV has significant signal loss and the cost of running wires is higher. A couple of years ago, cable television left Ukraine, analog signals no longer come to our TVs, and we stepped forward in this area. I believe that progress can`t be stopped and this is the right decision, we must improve and develop the types of signal transmission and our television vision.

https://voca.ro/115prOs5YziK

·        #310

Yershova Y. (Thursday, 09 June 2022 11:37)

Pishtoi Misha (PT-212) Yershova Y. (Thursday, 09 June 2022 11:24)
The exam topics are rather good, but you have to work on your pronunciation.

·        #309

Lebedeva E. (Thursday, 09 June 2022 11:26)

To Kravchenko Kostiantyn (RZ-212), Volodymir Kolomiets rz-212 Thank you for effective work .

·        #308

Vova Kolomiets RZ-212 (Lebedeva) (Thursday, 09 June 2022 11:26)

(thats work for 26.05)

Exam topic #10 ("Software firewall")

Software firewall is a firewall that is installed on a computer or server, and tasked with network security. It works with a wide variety of other technology security solutions to provide more robust and cohesive security for enterprises of all sizes. When a software firewall is installed on a server, it opens up like an umbrella of protection over all other computers connected to the network. It is able to monitor both incoming and outgoing traffic for potential risk or suspicious user behaviour, and also makes setting security policies much easier, faster and more flexible. This type of firewall is also critical as it requires very little space and can be installed remotely on any number of devices. It’s far different from its counterpart, the hardware firewall, which has many unique elements in its own right.
https://voca.ro/1g0WAFvG53mN

·        #307

Pishtoi Misha (PT-212) Yershova Y. (Thursday, 09 June 2022 11:24)

Exam_topic @
Commercial use of radio

November 2, 1920 was the day of the widely acclaimed first commercial radio broadcast, when Westinghouse Electric and Manufacturing Company broadcast the results of the Harding-Cox presidential election live. Over the last century, radio has evolved from a cumbersome experimental environment to a modern mobile format. Radio has discovered new technologies such as television and cell phones. For many, radio was the fastest and most reliable way to receive news about national and world events. Even now, radio continues to be a hot form of mass communication and remains one of the few free services.
https://voca.ro/127BZz0HbU10

Benefits of Satellite TV

Satellite TV has many advantages. The Satellite TV eliminates various interferences and noises, allowing make the broadcast of the highest quality. An important advantage is that satellite coverage extends to the whole of country, so the location of the subscriber does not matter. By connecting to satellite broadcasting, the subscriber chooses the desired channels for viewing, without being tied to the packages of various operators. Therefore, satellite broadcasting is quite profitable for the TV channels themselves, as the picture is always high quality, and this only increases the prestige of the company itself. Satellite TV also has a wealth of information that can be used for both education and entertainment.

https://voca.ro/1ffD54j6lZ2Q

·        #306

Timophey Sipin RZ-212(Popovych) (Thursday, 09 June 2022 11:22)

Today I have read the article ''Lithium-ion batteries that last longer in extreme cold''.This article is about such a common problem for everyone that at sub-zero temperatures, our lithium-ion batteries consume energy very quickly, or even stop working altogether. To solve this problem, scientists from ACS Central Science replaced the traditional graphite anode on a lithium-ion battery with a rough carbon-based material that can withstand temperatures of -35 C without problems. Testing was carried out at -35 C, which showed that when it is discharged almost 100% of the charge stored in the battery.
In my opinion, such technologies will make our lives much easier, because each of us has faced such a problem and knows how unpleasant it is.
2)https://techxplore.com/news/2022-06-lithium-ion-batteries-longer-extreme-cold.html
https://voca.ro/1iqCL5ED5
4)
1)examined in detail
Moreover, prima facie duplication and overlap has to be examined in detail.
Крім того, слід детально вивчити дублювання та накладення на перший погляд.
2)expanded upon
The issue would be expanded upon in Namibia's next report.
Це питання буде розширено в наступній доповіді Намібії.
3)bear in mind
But bear in mind, your primary responsibility is to your respective clients.
Але майте на увазі, що ваша основна відповідальність лежить перед відповідними клієнтами.
https://voca.ro/1gwkUIE1

·        #305

Kravchenko Kostiantyn (RZ-212, Lebedeva E.) (Thursday, 09 June 2022 11:22)

Exam topic #17 (Password as a general technique of secrecy.)
Passwords have been the staple of secrecy and access restriction since ancient times. The roman military would utilize passwords for their sentries to safely identify each other and only grant access to an area if they knew the password.
In modern times passwords have become the most common form of securing secrecy, as they are generally used by governments, militaries, hospitals, banks or even just the common citizen to prevent unauthorized access to their accounts and information.
With developments in biometrics, single sign-ons and multi-factor authentication, passwords as the general security tool may soon be facing competitions after millennia, however, due to their cost, immediacy and convenience, passwords can still be expected to remain the best option for decades.
Audio: https://voca.ro/1phQYDzwVeOf

Phrases:
1) Researchers have expanded upon a clever trick and increased the speed of electron microscope imaging by a factor of 20.
Дослідники розвинули хитрий трюк та підвищили швидкість зображення мікроскопу електронів у 20 разів.
2) Aside from these risks, we also need to bear in mind that batteries are highly resource consuming.
Окрім цих ризиків, ми також повинні мати на увазі, що акумулятори споживають велику кількість ресурсів.
3) Surveillance laws were scrutinised and examined in detail.
Закони про спостереження були ретельно перевірени та розглянуті.
Audio: https://voca.ro/1e4dI4A5pGv6

·        #304

Timophey Sipin RZ-212(Popovych) (Thursday, 09 June 2022 11:21)

Exam Topic:
Potential security violations
Audio:https://voca.ro/35GTddthr
Unfortunately, there is no perfect security system in the world.There is always the possibility of violation and loss of data due to human factors.
But we always have the opportunity to reduce the risk of such security breaches.
Potential threats can be classified primarily on various grounds, it may be a violation of the integrity, confidentiality and accessibility of information and many others.
All this is evidence that we need to raise the level of security and improve the knowledge of ordinary people in the field of cybersecurity
Because it will reduce the chance of losing very important information for a person or company

·        #303

Volodymir Kolomiets rz-212 (Lebedeva) (Thursday, 09 June 2022 10:59)

Exam topic #9 ("Functions of firewalls”)

Functions of firewalls are simple. Traffic flows to and from devices through ports. The firewall is what controls what is allowed through these ports.
On most computers, especially regular laptops or desktops, or home networks, the firewall should allow very little incoming traffic. There is rarely a legitimate reason for other devices to connect to your device or home network unnecessarily. The router that provides the Internet connection from your ISP to your home or office is usually a hardware firewall. And on your computer, wherever it is Windows macOS, it is most likely running a software firewall.

https://voca.ro/1gO42r1F5t9O

1) bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.

2) expanded upon
The workshop topics are expanded upon in the discussion guide, which is to supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні анотації.

3) examined in detail
We believe that all issues within the Working Group's mandate should be examined in detail.
Ми вважаємо, що всі питання, які входять до повноважень Робочої групи, мають бути детально розглянуті.

https://voca.ro/1lTuv7XA2yJS

·        #302

Kate Kholodova (RZ-212, Popovych) (Thursday, 09 June 2022 10:53)

(9/10) Exam topic #9 Functions of firewalls

Personal firewall is software that monitors the network activity of the computer on which it is installed, as well as filtering traffic in accordance with the specified rules. The functionality of a personal firewall is similar to that of a firewall, however, due to its specificity, a personal firewall can also provide additional capabilities to protect a computer:
Control over applications using ports. A personal firewall, unlike conventional firewalls, is able to determine not only the protocol and network addresses used, but the software that establishes or accepts the network connection.
Assigning separate rules to different users without additional network authorization.
A special "Learning Mode" required to fine-tune the personal firewall for a specific software configuration of the computer. In this mode, during the initial network activity of any software, the user receives a request to allow or prohibit the network activity of this application.

audio - https://voca.ro/1oCgSiAEjhGs

Today I have read the article "Smart urban solutions for more resilient cities".
It tells about a new project SMURBS, begun as part of the EU's ERA-PLANET umbrella project, is working to increase urban resilience and raise the quality of life in urban regions. To achieve this goal, it's focusing on challenges related to air quality, urban growth, natural and man-made disasters, health and migration. The project's first step is to stimulate strategic planning by connecting with local authorities, urban planners and city-level stakeholders to map out 'what is already out there' and 'what the users want'.
In my opinion, SMURBS will help cities with many problems related to sustainable urban development.

article - https://phys.org/news/2018-08-smart-urban-solutions-resilient-cities.html

audio - https://voca.ro/1bKJ15HnRaAx

1) bear in mind
These are important considerations which we should always bear in mind.

2) examined in detail
We believe that all issues within the Working Group's mandate should be examined in detail.

3) expanded upon
The workshop topics are expanded upon in the discussion guide, which is to supplement the present annotations.

audio ph - https://voca.ro/1fL5c0ExrCcL

·        #301

Yershova Y. to PT-212, PE-211 (Thursday, 09 June 2022 10:43)

Good morning! It is high time to write the tests. Read the instruction carefully!

·        #300

Lebedeva E. (Thursday, 09 June 2022 10:28)

To РЗ-212 Good morning! The lesson will start soon, so I am waiting for your works.

·        #299

Avdieiev Danil (RT-211) S.Mykhailiuk (Thursday, 09 June 2022 10:28)

Article: https://www.zdnet.com/article/toshiba-to-pay-2b-settlement-on-laptops/

Today I have the article titled "Toshiba to pay $2B settlement on laptops". It describes about Toshiba Corp. agreed to a $2.1 billion settlement for selling allegedly defective laptop computers in the U.S., the first fallout from a wave of lawsuits and government inquiries over a flaw that may be common to the products of many major computer makers. I find this article intesting and usfull, because this article describes us about Toshiba`s mistaces and how this corp corrects it`s mistakes.

https://voca.ro/1ep7Jvr4kBvG

1)expanded upon
The workshop topics are expanded upon in the discussion guide, which is to supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні анотації.
https://voca.ro/1TB5LajXgMYD

2)examined in detail
We believe that all issues within the Working Group's mandate should be examined in detail.
Ми вважаємо, що всі питання, які входять до повноважень Робочої групи, мають бути детально розглянуті.
https://voca.ro/17RJig5TRfLy

3)bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
https://voca.ro/1il7WobeHu2f

·        #298

Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:23)

Exam topic #9 (Turning the DTV signal)

The digital television transition, also called the digital switchover (DSO), the analogue switch/sign-off (ASO), the digital migration, or the analogue shutdown, is the process in which older analogue television broadcasting technology is converted to and replaced by digital television. Conducted by individual nations on different schedules, this primarily involves the conversion of analogue terrestrial television broadcasting infrastructure to digital terrestrial (DTT), a major benefit being extra frequencies on the radio spectrum and lower broadcasting costs, as well as improved viewing qualities for consumers.
https://voca.ro/1g6bD4wFVtRC

·        #297

Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:23)

Exam topic #8 (The major differences in a monochrome television and a color television receiver)

The biggest difference is the number of electron guns in the picture tube. A monochrome tv has only one gun as it can only show black, white, or shades of grey in between. Color TVs have 3 guns: red, green, and blue. Varying these tubes give you the full spectrum of color. Beyond that there are differences in the reciever, which has to decode the data for 3 guns instead of one, and in the drivers for the guns.
https://voca.ro/11wCNTotU9Vp

·        #296

Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:22)

Exam topic #7 (Development of television in your home country)

In Ukraine, the first official acquaintance of the two "great" took place in 1939. According to the historical chronicle, the opening of television broadcasting in Kyiv took place on February 1, 1939. True, some researchers tend to believe that the first test TV broadcasts in Kyiv took place much earlier. However, there is no official confirmation of this: perhaps there was something, but it was done (like everything else in those days) in the strictest secrecy. In addition, in the mid-30s, TV experiments were carried out in Odessa.
Television in the Ukrainian SSR was introduced in 1951. Now Ukrainian TV has 101 channels, including 65 regional TV companies.
https://voca.ro/1e2eLg0emU2Z

·        #295

Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:20)

Exam topic #6 (The new advancement of color Television)

Color television is a television transmission technology that includes color information for the picture, so the video image can be displayed in color on the television set. It improves on the monochrome or black-and-white television technology, which displays the image in shades of gray (grayscale). Television broadcasting stations and networks in most parts of the world upgraded from black-and-white to color transmission between the 1960s and the 1980s. The invention of color television standards was an important part of the history and technology of television.
https://voca.ro/1aVt8xkf7hKc

·        #294

Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:20)

Exam topic #5 ( First radio speeches )

Experimental radio transmissions at the beginning of the century were carried out by American inventors Reginald Fessenden and Lee de Forest. For the first time, an experimental broadcast of a public speaking radio broadcast by P.A. Fessenden carried out in 1900. Then, after his invention of the high-frequency oscillator, he decided to try out the new technique in his workshop in Brand Rock, Massachusetts, on Christmas Eve 1906, sending a human voice and music instead of Morse code. Three days before the experiment, he sent radiotelegraphic messages to the nearest ships with a request to receive his message at a certain time. At the appointed hour, the operators in headphones heard the voice of a man, a violin solo performed by the inventor, reading passages from the Bible and congratulations on Christmas.
https://voca.ro/1hTM9lt8yjH5

·        #293

Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:19)

Exam topic #4 (Commercial use of radio)

Commercial radio provides brands with a way to speak to millions of people via a medium they trust.
Radio provides reach, with nearly 37m listeners every week; resonance, as an emotional influencer with power to enhance brand perceptions at a subconscious level .
Radio advertising also stretches beyond the traditional 30 second ad, with longer ads, sponsorship, branded content and innovate digital solutions increasingly providing advertisers with new and more creative ways to get their message to potential customers.
https://voca.ro/16pcyY3Yf854

·        #292

Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:17)

Exam topic #3 (Early radio development)

Radio is the technology of signaling and communicating using radio waves.
Radio waves were first identified and studied by German physicist Heinrich Hertz in 1886. The first practical radio transmitters and receivers were developed around 1895–1896 by Italian Guglielmo Marconi, and radio began to be used commercially around 1900. To prevent interference between users, the emission of radio waves is regulated by law, coordinated by an international body called the International Telecommunication Union (ITU), which allocates frequency bands in the radio spectrum for different uses.
https://voca.ro/1bJwJxtv1KAt

·        #291

Nazariy Glugan RT-211 (Myhayliuk S.L.) (Thursday, 09 June 2022 10:16)

Exam topic #2 (Benefits of Satellite TV)
Let's start with what is satellite TV
Satellite television is a system for transmitting a television signal from a transmitting center to a consumer, using as a repeater artificial Earth satellites located in space in a geostationary orbit (formerly in other types of orbits) and equipped with transceiver equipment.One of the main advantages of satellite TV is the image and sound quality. Many channels are already broadcasting in high definition (HD) format and using stereo sound, which will allow you to fully enjoy your favorite movie or sports broadcast.
https://voca.ro/1aESUUgwtoaZ

·        #290

Nazariy Glugan RT-211 (Myhayliuk S.L.) (Thursday, 09 June 2022 10:15)

Exam topic #1 (Cable television)

Cable television is a method of hanging in which signals are transmitted over a wired route using a coaxial or optical cable. It allows you to transmit multiple multimedia data (signals) of various types, such as TV channels (audio and video), radio channels (audio), broadband Internet access or stationary telephony services, over one cable at once. In the simplest solution, such a system comes down to installing an antenna post, from which, after gaining power, several dozen TV channels are delivered to subscribers via cable.

https://voca.ro/1h4jkbgjQnQs

·        #289

Lebedeva E. (Thursday, 09 June 2022 10:04)

To Ilinchuck Vladislav RZ-211 Not bad, put practise reading more.

·        #288

Sasha Movsum-Zade RT-211 (Myhayliuk S.L.) (Thursday, 09 June 2022 10:00)

Today I have read the article titled "Researchers teleport quantum information across rudimentary quantum network". This article describes how the Researchers from Delft managed to teleport quantum information over an elementary network. This is the first major step of its kind towards the future quantum internet. It is also described that this breakthrough was made possible by greatly improved quantum memory and improved quality of quantum links between the three nodes of the network. In my opinion, this technology is still underdeveloped and requires a lot of improvements before it can be used on a permanent basis.
https://voca.ro/1jbqTlLof43S
https://techxplore.com/news/2022-05-teleport-quantum-rudimentary-network.html

1)expanded upon
The workshop topics are expanded upon in the discussion guide, which is to supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні анотації.

2)examined in detail
We believe that all issues within the Working Group's mandate should be examined in detail.
Ми вважаємо, що всі питання, які входять до повноважень Робочої групи, мають бути детально розглянуті.

3)bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.

https://voca.ro/1lzhR6YZlLGT

·        #287

Yershova Y. (Thursday, 09 June 2022 09:58)

Botsaniuk Ivan RZ-211 (Yershova Y. A) (Thursday, 09 June 2022 09:52)
The article review is very informative and thorough, but too long.

·        #286

Yershova Y. (Thursday, 09 June 2022 09:56)

Vlasov Vadim RZ-211 (Yershova) (Thursday, 09 June 2022 09:37)
The review is not bad, but the topic isn't relevant to your specialty.

·        #285

Yershova Y. (Thursday, 09 June 2022 09:53)

Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 09 June 2022 09:32)
The comment on the article is interesting and thoughtful, but long.

·        #284

Artem Verhelis RT-211, Mykhailiuk S. (Thursday, 09 June 2022 09:53)

Exam topic #10
Radio equipment helping to save on bills.
Nowdays, one of the solutions to honest savings on bills can be a motion sensors. They are often installed in corridors, vestibules or showers, are relatively cheap, and for each type of room you can choose the optimal sensitivity radius. It's not only consumes less electricity than lamp bulb, but also lasts more time longer and the price difference is minor. For 3-5 years, you won’t have to climb into the ceiling or chandelier to change a burned-out light bulb. They are also not afraid of voltage drops, unlike lamp bulb, and don't contain dangerous substances.

Audio: https://voca.ro/16PpdnC0HfQX

·        #283

Botsaniuk Ivan RZ-211 (Yershova Y. A) (Thursday, 09 June 2022 09:52)

Today I have read the article “A chip that can classify nearly 2 billion images per second”. In traditional neural networks used for image recognition, the image of the target object is first formed on an image sensor, then the image sensor converts light into electrical signals, and ultimately into the binary data, which can then be processed, analyzed, stored and classified using computer chips. While current, consumer-grade image classification technology on a digital chip can perform billions of computations per second, making it fast enough. The current speed limit of these technologies is set by the clock-based schedule of computation steps in a computer processor. To address this limitation, engineers have created the first scalable chip that classifies and recognizes images almost instantaneously. They have achieved this through direct processing of light received from the object of interest using an optical deep neural network implemented on a 9.3 square millimeter chip. I think this technology would be very useful because it will allow us to perform more complex operations with less energy cost.
https://techxplore.com/news/2022-06-chip-billion-images.html
https://voca.ro/12sXIeqBJkAg

Phrases:
Examined in detail
The question of individual responsibility and non-State actors should also be examined in detail.
bear in mind.
Tourists must bear in mind that they are visitors in another country.
expanded upon
The features in this version will be expanded upon in future releases of the application.
https://voca.ro/17jvSatCfNvL

·        #282

Artem Verhelis RT-211, Mykhailiuk S. (Thursday, 09 June 2022 09:49)

Today I've read the article "Scientists discover how oxygen loss saps a lithium-ion battery's voltage". When the battery is charging, in addition to lithium ions, air atoms also enter, which ultimately leads to a decrease in the battery's capacity. Scientists have proposed new ways to create electrodes to prevent this. Lithium-ion batteries work like a rocking chair, moving lithium ions back and forth between two electrodes that temporarily store charge. Based on this knowledge, scientists will make a start in solving this problem. I found this article quite informative because in our time people very often interact with a similar technique.

Article: https://techxplore.com/news/2021-06-scientists-oxygen-loss-saps-lithium-ion.html
Audio: https://voca.ro/18ZZU1u9ArO2

1) expanded upon
Zhou and Huang thus expanded upon this type of model, adding new elements that allowed them to explore the interaction between a toxicant and a population in a polluted river. 
Таким чином, Чжоу і Хуан розширили модель цього типу, додавши нові елементи, які дозволили їм дослідити взаємодію між токсикантом і популяцією у забрудненій річці.
2) bear in mind
It is important to also bear in mind that the cost of the best systems can be significantly reduced if substantial investment is made to the technology.
Важливо також мати на увазі, що вартість найкращих систем може бути значно знижена, якщо значні інвестиції будуть вкладені в технологію.
3) examined in detail
The target audience of workers was also examined and analyzed in detail. 
Також було детально розглянуто та проаналізовано цільову аудиторію працівників.

Audio: https://voca.ro/1oRIHY8QI8RT

·        #281

Ilinchuck Vladislav RZ-211 (Lebedeva) (Thursday, 09 June 2022 09:49)

Today I have read the article "Jupiter turns out to be inhomogeneous; metallicity gives clues about origin".This article is about an international team of astronomers, led by Yamila Miguel (SRON/Leiden Observatory), that has found that Jupiter's gaseous envelope doesn't have a homogeneous distribution. The inner part has more metals than the outer parts, adding up to a total of between 11 and 30 earth masses, meaning 3–9% of Jupiter's total mass. The team studied the distribution of metals because it gives them information about how Jupiter was formed. The metals turn out to be not distributed homogeneously across the envelope, with more in the inner part than in the outer parts. The total adds up to between 11 and 30 Earth masses worth of metals.The finding that the inner part of the envelope has more heavy elements than the outer part, means that the abundance decreases outward with a gradient, instead of there being a homogeneous mixing across the envelope.
In my opinion , this article is very interesting for everyone , especially for people who love deep space and new technologies . I think this technology will become very useful soon .
1)https://phys.org/news/2022-05-jupiter-inhomogeneous-metallicity-clues.html
2)https://voca.ro/14XBk1qDq9Yj

bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
examined in detail
The question of individual responsibility and non-State actors should also be examined in detail.
Слід також детально розглянути питання індивідуальної відповідальності та недержавних суб'єктів.
expanded upon
That point will be expanded upon in the following section.
Цей момент буде розширено в наступному розділі.
3)https://voca.ro/153Uo2fPoOzb

·        #280

Yeulizaveta Barsukova (RT-211) S.Mykhailiuk (Thursday, 09 June 2022)

Exam Topic #10 (Radio equipment helping to save on bills)

There are many ways to save on bills. However, they can all be combined into one. To do this, we need to use a smart home system. It can control the switching on or off of lighting or electrical equipment. It can also control the irrigation system, turn on or off the water at a specified time. In addition, it can control the microclimate in the house. As a result, electricity and water bills will be reduced because we will not forget to turn off the lights in the room and turn off the irrigation system.
Audio:https://voca.ro/1m8j7b54GbkF

·        #279

Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 09 June 2022 09:46)

(CLASS WORK)
Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This article is about a US government that offers 10 million dollars for finding a leader of the high-profile ransomware gang DarkSide. Washington blamed the Russia-based group for the online assault that forced the shutdown of the largest oil pipeline in the eastern United States in May. Cybercrimes have been booming, with new data out in October showing $590 (five hundred nineteen) million in ransomware-related payments were reported to US authorities in the first half of 2021 alone. As for me, the fight against hackers is a very difficult confrontation.

Sentences:
WHEN COMPARED
1)This figure is even less significant WHEN COMPARED to the assets such enterprises control.
Ця цифра ще менш значна, якщо порівнювати з активами, які контролюються такими підприємствами.

MULTIPLE LEVELS.
2)And the beauty of the book is that it works on MULTIPLE LEVELS.
І принадність книги в тому, що вона працює на кількох рівнях.

CASE STUDIES
3)The training will be based on CASE STUDIES, simulations and group problem-solving exercises.
Навчання базуватиметься на тематичних дослідженнях, моделюванні та групових вправах на вирішення проблем.

Vocaroo(sentence): https://voca.ro/1bPATAlHnboW
Vocaroo(aritcle): https://voca.ro/1k3bM50kGonB
https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
https://techcrunch.com/2021/11/05/state-department-darkside-bounty/

·        #278

Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 09 June 2022 09:46)

Exam topic #9 “The new advancement of color Television.”
In 1938, Werner Flechsig patented the principle of the color kinescope, and the color image transmission method was developed in 1940. In European cinemas, color films appeared in 1941, the first of which were Women Are Still the Best Diplomats and Hans Alber's film Munchausen. In 1953, the NTSC standard for black-and-white television broadcasting was expanded in the United States - it received the ability to transmit color, namely, "color" was added to "brightness". On August 30, 1953, for the first time in history, NBC broadcast a color broadcast of "Kukla, Fran and Ollie" in test mode via the NTSC standard. The first full-fledged color broadcast was the opera Carmen, shown on October 31, 1953.

Vocaroo: https://voca.ro/1kNQhjXPbo1n

·        #277

Lebedeva E. (Thursday, 09 June 2022 09:42)

To Ivan Zarytskyi RZ-211, Kapeliushnyi Vladyslav Thank you for the effective work.

·        #276

Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Thursday, 09 June 2022 09:41)

The article I have read "Hackers leaked data about the COVID-19 vaccine they stole during a cyber attack." This article is about a cyber attack by unknown hackers against the European Medicines Agency (EMA) for information on coronavirus drugs. But as a result, no leak violates the office's privacy policy. This is not the first attack on some of the pharmaceutical companies that the EMA includes, and over time they have become more and more. In my opinion, this article is interesting because today we need to know how to create vaccines against diseases for which treatment has not yet been invented.

https://techxplore.com/news/2020-12-autonomous.html
https://voca.ro/1jEdXrRF7Nn5

1) The target audience of workers was also examined and analyzed in detail.
Також було детально розглянуто та проаналізовано цільову аудиторію працівників.

2) Aside from these risks, we also need to bear in mind that batteries are highly resource consuming.
Окрім цих ризиків, ми також повинні мати на увазі, що батареї дуже споживають ресурси.

3) This discovery means our understanding of the chemical formation of stars can be hugely expanded upon.
Це відкриття означає, що наше розуміння хімічного утворення зірок може бути значно розширено.

https://voca.ro/1e4YW66MRdEY

·        #275

Lebedeva E. (Thursday, 09 June 2022 09:40)

To Artem Kotliarov RZ-212 well done, thank you.

·        #274

Vlasov Vadim RZ-211 (Yershova) (Thursday, 09 June 2022 09:37)

Today I have read the article "The Turning Points of Climate Change."
The article is based on many years of collaboration between various research institutions in the Netherlands and abroad, especially between Utrecht University and Leiden University. Researchers have approached the idea of a tipping point in a spatial context. The formation of spatial structures in ecosystems, such as the spontaneous formation of complex vegetation structures, is often explained as an early warning signal of a critical transition.
In my opinion, we need to avoid climate change as long as possible, which can pose a long-term threat to humanity.
https://phys.org/news/2021-10-climate-simple-concept.html
https://voca.ro/15UwE8NB9xrh
examined in detail.
The problem -- first examined in detail by a former International Business Machines Corp
bear in mind
It is important to also bear in mind that the cost of BEST systems can be significantly
expanded upon
The researchers expanded upon the theory by applying it to both men and women
https://voca.ro/18UjGV8BcuXf

·        #273

Artem Kotliarov RZ-212 (Lebedeva E.) (Thursday, 09 June 2022 09:36)

1) 1. The Vienna Declaration and Programme of Action examined in detail the linkages between democracy, development and human rights. - У Віденській декларації та Програмі дій детально розглянуто зв’язок між демократією, розвитком та правами людини.
2. Using a quantum field theory framework, the physicists have expanded upon previous research that showed that changes in acceleration affect entanglement. - Використовуючи систему квантової теорії поля, фізики розширили попередні дослідження, які показали, що зміни прискорення впливають на заплутування.
3. Regulators need to bear in mind that room for experimentation, as well as the failures of some ventures, are all right. - Регулятори повинні мати на увазі, що простір для експериментів, а також невдачі деяких підприємств — це все в порядку.
https://voca.ro/1otfyExHfrww
2) Today, І have read thе аrtісlе «Charge-density-wave induces electronic nematicity in Kagome superconductor»
Research team led by Prof. Chen Xianhui, Wu Tao and Wang Zhenyu from the University of Science and Technology of China of the Chinese Academy of Sciences found the key evidence for phase transition in a Kagome superconductor. At a low temperature, the team observed a transition from charge-density-wave (CDW) order to electronic nematicity.
In my opinion, the discovery of this phase transition demonstrated a new electronic weakness and provided fundamental experimental evidence for further understanding of the competition between superconductivity and the order of VZP in Кagome systems.
https://phys.org/news/2022-02-charge-density-wave-electronic-nematicity-kagome-superconductor.html
https://voca.ro/1cSvcptPbdb0
3) Exam topic #20 ("Principles of information protection”)
Three basic principles of information protection that must be followed in an information system:
1. confidentiality - a mandatory requirement for a person who has obtained access to certain information not to transfer such information to third parties without the consent of its owner, as well as ensuring that it is impossible to access information to persons who do not have the appropriate permission (in computer language - the corresponding access rights). 2. integrity-the absence of any unauthorized changes (both accidental and intentional) in the protected area. 3.reliability - a guarantee that information is obtained from a well-known trusted or reliable source.
https://voca.ro/1gFLfLewgekK

·        #272

Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 09 June 2022 09:32)

1. Today I have read the article 'A strategy to attain amorphous silicon solar cells with over 25% efficiency'.
Researchers at the Chinese Academy of Sciences (CAS), Zhongwei New Energy, and King Abdullah University of Science and Technology (KAUST) have recently introduced a new strategy that could significantly improve the efficiency of Si:H thin films doped using boron. Liu and his colleagues assessed the performance of their solar cells at a standard temperature of 25°C, using a solar light simulator. Overall, the solar cells they doped using their method exhibited a remarkable certified total-area power conversion efficiency of 25.18% with an FF of 85.42% on a 244.63 cm2 wafer.
A very interesting decision, in my opinion, as this strategy will enhance the light harvesting properties of both existing and newly developed solar technologies.
2. https://techxplore.com/news/2022-06-strategy-amorphous-silicon-solar-cells.html
3. https://voca.ro/16Hh5O10uHBb
4. 1) examined in detail
The Chronicle examined in detail 27 cases in Houston and Harris County involving violent or repeat offenders on dual supervision
2) bear in mind
Bear in mind that petrol stations are scarce in the more remote areas
3) expanded upon
The best scenarios are where memories are recalled and expanded upon, using the senses to paint a picture.
5. https://voca.ro/1ooA1N02EXux

·        #271

Yershova Y. (Thursday, 09 June 2022 09:32)

Vasilev A.O RZ-211 Yershova Y. (Thursday, 09 June 2022 09:22)
Your review ia informative and quite alright, but mind in the first sentence: Today I've read THE article titled "Traveling fires pose an underestimated risk to open building spaces"/ this article IS about traveling fires...

·        #270

Ivan Zarytskyi RZ-211 (Lebedeva) (Thursday, 09 June 2022 09:27)

Today I have read the article “Radio waves for the detection of hardware tampering”. This article is about a new method of detecting cyberattacks. Researchers in Bochum have developed a new method to detect such manipulations. They monitor the systems with radio waves that react to the slightest changes in the ambient conditions. Unlike conventional methods, they can thus protect entire systems, not just individual components—and they can do it at a lower cost. In my opinion, this method can decrease cyberattacks in all structures.

https://techxplore.com/news/2022-06-radio-hardware-tampering.html

https://voca.ro/1iZz9Pu0S7sR

examined in detail
The problem -- first examined in detail by a former International Business Machines Corp.(Проблема -- вперше детально розглянута колишньою International Business Machines Corp.)
expanded upon
Zhou and Huang thus expanded upon this type of model, adding new elements that allowed them to explore the interaction between a toxicant and a population in a polluted river.(Таким чином, Чжоу і Хуан розширили цей тип моделі, додавши нові елементи, які дозволили їм дослідити взаємодію між токсикантом і населенням у забрудненій річці.)
bear in mind
It is important to also bear in mind that the cost of BEST systems can be significantly reduced if substantial investment is made to the technology.(Важливо також мати на увазі, що вартість систем BEST може бути значно знижена, якщо значні інвестиції будуть вкладені в технологію.)

https://voca.ro/1nVcN9gsSC26

·        #269

Vasilev A.O RZ-211 Yershova Y. (Thursday, 09 June 2022 09:22)

Today I've read an article titled, this article about"Traveling fires pose an underestimated risk to open building spaces"
The article tells about traveling fires which are distributed which big speed.
But researchers are currently trying to correct these mistakes.
Dr. Egle Rackauskaite, who led the work while at Imperial's Department of Mechanical Engineering, said: "Despite the lack of advanced studies, traveling fires have been observed in real incidents—for example, in the World Trade Centre towers after the 11 September 2001 attacks. However, these fires have rarely been studied on an experimental basis. At the same time, some modern structures have open-plan spaces between 4 and 50 times larger than the largest compartment fire experiments conducted to date."
I think it's right that researchers are trying to protect society from the threat of traveling fires.

https://techxplore.com/news/2021-10-pose-underestimated-spaces.html

https://voca.ro/1991MdQmDC9h

1)bear in mind
It was important to bear in mind the new political realities and to leave behind outdated stereotypes.
https://voca.ro/1jhM824cxpBj

2)examined in detail
The question of individual responsibility and non-State actors should also be examined in detail.
https://voca.ro/1F3YikOLM6us

3)expanded upon
In that context, he asked Professor to expanded upon his comment about the misuse of regulations.
https://voca.ro/14JOUDOAp6H5

·        #268

Lebedeva E. (Thursday, 09 June 2022 09:22)

To Mykola Zhmurak RZ-211 and Misha Donenko RZ-211 Your comments are clear and informative. In general, well done, but there are some mispronounced words.

·        #267

Misha Donenko RZ-211 Lebedeva (Thursday, 09 June 2022 09:19)

Today I’ve read the article “Microsoft launches community college campaign to address cybersecurity workforce shortage”. Microsoft launched a training program for community college students on Thursday in an effort to fill 250,000 cybersecurity jobs by 2025. The company will make its cybersecurity curriculum available for free to all public community colleges across the country and offer 25,000 scholarships. With 464,000 cybersecurity jobs open nationally, Microsoft's goal is to help fill half those positions with this campaign. It adds to a growing list of investments the company has made to combat cybersecurity threats. The initiative comes just days after Microsoft flagged that Russian-backed hackers have been targeting government and corporate computer networks since the summer.
Microsoft launches community college campaign to address cybersecurity workforce shortage (techxplore.com)
https://voca.ro/12RSSCm6X7Nr

1.bear in mind
Now, let's all bear in mind these are poetic abstracts from long-lost ancient texts.
Тепер давайте всі пам’ятаємо, що це поетичні витяги із давно втрачених стародавніх текстів.
2.examined in detail
The question of individual responsibility and non-State actors should also be examined in detail.
Слід також детально розглянути питання індивідуальної відповідальності та недержавних суб'єктів.
3.expanded upon
European human rights institutions have recognized and expanded upon these principles.
Європейські інституції з прав людини визнали і розширили ці принципи.
https://voca.ro/17htsTc4ykDD

·        #266

Mykola Zhmurak RZ-211(Lebedeva) (Thursday, 09 June 2022 09:17)

Today I’ve read the article "Turning organic waste into renewable biofuel additives using radiation". This article is about engineers from Lancaster University which have led research that discovers a way to generate renewable biofuel additives, using radiation that could be derived from nuclear waste. This research presents a new advance that utilizes radiation that could, in the future, be derived from nuclear waste to produce renewable biofuel additives from biodiesel waste. An increase of 5 per cent to 20 per cent v/v in the renewable proportion of commercial petroleum blends is forecast by 2030. This research is really important for world. Because this discovery of a new production pathway for these additives could help in the fight to cut carbon dioxide emissions and tackle climate change.
Article:https://techxplore.com/news/2021-09-renewable-biofuel-additives.html
Vocaroo: https://voca.ro/1eqpOMFxMGmA
Phrases:
1) bear in mind
It is important to also bear in mind that the cost of BEST systems can be significantly reduced if substantial investment is made to the technology.(Важливо також мати на увазі, що вартість систем BEST може бути значно знижена, якщо значні інвестиції в технологію.)
2) examined in detail
Surveillance laws were scrutinised and examined in detail.(Закони про нагляд було вивчено та детально досліджено.)
3) expanded upon
Zhou and Huang thus expanded upon this type of model, adding new elements.(Таким чином, Чжоу і Хуан розширили цей тип моделі, додавши нові елементи.)
Vocaroo - https://voca.ro/1onMjUHCqVxP

·        #265

Yeulizaveta Barsukova (RT-211) S.Mykhailiuk (Thursday, 09 June 2022 09:16)

Class-work
Today I've read the article 'Demonstrating significant energy savings using neuromorphic hardware'. A chip based on neuromorphic equipment has recently been developed. Such equipment was developed on the basis of the human brain. The developers want it to be able to process information as well as our brains, then they are developing algorithms that work with temporal processes. The study found that a chip based on this requires 4 to 16 times less energy to process information than chips based on other bases. I think that the development of such equipment is important because it will save expensive energy.
Article:https://techxplore.com/news/2022-05-significant-energy-neuromorphic-hardware.html
Audio1:https://voca.ro/139A76j8ica3
Phrases
1)examined in detail
We believe that all issues within the Working Group's mandate should be examined in detail.
Ми вважаємо, що всі питання, які входять до повноважень Робочої групи, мають бути детально розглянуті.
2) expanded upon
The workshop topics are expanded upon in the discussion guide, which is to supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні анотації.
3) bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
Audio2:https://voca.ro/11P2E3KBti5O

·        #264

Lebedeva E. (Thursday, 09 June 2022 09:14)

To Denis Zavadsky RZ-211 There is something wrong with your audio. I can'y here anything. Send it again.

·        #263

Yershova Y. to PЗ-211 (Thursday, 09 June 2022 09:14)

Good morning! The lesson has started, it’s high time to join today’s on-line activities with articles and sentences with the phrases of the Day. Good luck!

·        #262

Denis Zavadsky RZ-211 Lebedeva (Thursday, 09 June 2022 09:12)

Some people living in the U.S. Midwest have trouble with their electric cars in the dead of winter, and why it's risky to use these batteries in space explorations. Recently, scientists determined that the flat orientation of graphite in the anode is responsible for the drop in a lithium-ion battery's energy storage capacity in the cold. So, Xi Wang, Jiannian Yao and colleagues wanted to modify the surface structure of a carbon-based material to improve the anode's charge transfer process.

I consider this worthwhile research as it will help in many areas of battery powered mechanical devices.
https://techxplore.com/news/2022-06-lithium-ion-batteries-longer-extreme-cold.html

That point will be expanded upon in the following section.
The question of individual responsibility and non-State actors should also be examined in detail.
These are important considerations which we should always bear in mind.
Цей момент буде розширено в наступному розділі.
Слід також детально розглянути питання індивідуальної відповідальності та недержавних суб'єктів.
Це важливі міркування, які ми завжди повинні мати на увазі

https://voca.ro/1iyZioPyG2r2

·        #261

Lebedeva E. (Thursday, 09 June 2022 09:01)

To Daniil Dragin (RZ-211 ) Well done, thank you.

·        #260

Daniil Dragin (RZ-211 Lebedeva E) (Thursday, 09 June 2022 08:51)

1)Today I have read the article ''Lithium-ion batteries that last longer in extreme cold''.This article is about such a common problem for everyone that at sub-zero temperatures, our lithium-ion batteries consume energy very quickly, or even stop working altogether. To solve this problem, scientists from ACS Central Science replaced the traditional graphite anode on a lithium-ion battery with a rough carbon-based material that can withstand temperatures of -35 C without problems. Testing was carried out at -35 C, which showed that when it is discharged almost 100% of the charge stored in the battery.
In my opinion, such technologies will make our lives much easier, because each of us has faced such a problem and knows how unpleasant it is.
2)https://techxplore.com/news/2022-06-lithium-ion-batteries-longer-extreme-cold.html
3)https://voca.ro/1iqCL5ED8CNM
4)
1)examined in detail
Moreover, prima facie duplication and overlap has to be examined in detail.
Крім того, слід детально вивчити дублювання та накладення на перший погляд.
2)expanded upon
The issue would be expanded upon in Namibia's next report.
Це питання буде розширено в наступній доповіді Намібії.
3)bear in mind
But bear in mind, your primary responsibility is to your respective clients.
Але майте на увазі, що ваша основна відповідальність лежить перед відповідними клієнтами.
5)https://voca.ro/1gwkUIE1utyA

·        #259

Lebedeva E. (Thursday, 09 June 2022 08:49)

To Good morning! The lesson has started and I am waiting for your comments on the article and phrases of the day.

·        #258

Anton Ardelyan RZ-211(Gvozd O.V.) (Thursday, 09 June 2022 08:39)


Today i have read the article "Construction begins on energy storage system relying on gravity" British startup Gravitricity began construction of a renewable energy storage system that will rely on gravity—it will manipulate massive weights in a shaft as a means of storing energy, which will be drop via gravity when energy is needed, turning a shaft that drives an electric generator. The shafts are to be nearly a mile high and the weights will range from 500 to 5,000 tons.
Link: https://techxplore.com/news/2020-09-energy-storage-gravity.html
Audio: https://voca.ro/1nHcEvyeFD8S
Phrases:
1)This tournament replaced and expanded upon the quadrennial World Team Olympiad, which began in 1960.
Цей турнір замінив і розширив чотирирічну Всесвітню командну олімпіаду, яка розпочалася в 1960 році.
2)Just something to bear in mind
Просто щось треба мати на увазі
3)He failed to mention that the charges have been examined in detail and shown to be false
Він не зазначив, що звинувачення були детально розглянуті та доведено, що вони неправдиві
Audio: https://voca.ro/1bdE2rZlcNQr

·        #257

Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 09 June 2022 08:10)


Exam Topic:
Function of Firewall
Audio:https://voca.ro/1bKZBndbRTmh
Nowadays, there are many opportunities to hack data and pick up different types of viruses. But the most numerous and effective, through network and Internet traffic.
To reduce the risk of catching the virus, there are special programs such as firewall which help prevent viruses from entering your computer. It can be as a separate device or software.
Simply put, it helps to filter all Internet traffic using certain rules and pass to different areas of the network
But depending on the type of task, they can be divided into stateless, which uses only static filtering rules, and stateful, which can better analyze and better combat a variety of DDoS attacks.

·        #256

Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 09 June 2022 08:10)

Exam Topic:
Potential security violations
Audio:https://voca.ro/1381voXSz9cI
Unfortunately, there is no perfect security system in the world.There is always the possibility of violation and loss of data due to human factors.
But we always have the opportunity to reduce the risk of such security breaches.
Potential threats can be classified primarily on various grounds, it may be a violation of the integrity, confidentiality and accessibility of information and many others.
All this is evidence that we need to raise the level of security and improve the knowledge of ordinary people in the field of cybersecurity
Because it will reduce the chance of losing very important information for a person or company

·        #255

Yakymova Anna / РЗ-213 (Vorobyova E. V.) (Wednesday, 08 June 2022 10:24)

Today I've read the article "Employer surveillance during COVID has damaged trust".The author of the article explains a new report by the University of St Andrews about how using staff surveillance by employers during the COVID-19 pandemic can endanger trust in the workplace. Research considers such methods of control as: photographs, recording keystrokes, and movement trackers. But researchers also warn employers not to sacrifice ethics for the sake of efficiency as it can backfire leading to mental health
issues, productivity decline, and staff resignations. And I absolutely agree with that.
https://voca.ro/1mej0OoRvSNp
https://phys.org/news/2021-11-employer-surveillance-covid.html

·        #254

Anna Yakymova/ РЗ-213(S.Mykhailiuk) (Wednesday, 08 June 2022 10:10)

https://phys.org/news/2019-04-conservationists-clash-ways-core-aims.html

Today I've read the article "Conservationists clash over ways forward despite sharing 'core aims', study finds".That article about research in which considers the views held by those working to protect the natural world. Every one of those agrees with reasons and purposes (maintaining ecosystems, securing public support, and reducing environmental impact), but they can't get a consensus about ways to achieve that purposes. For example, researchers can't come to a common decision on that topics :
protected areas are required or not?
invasive species offer value to conservation or not?
is it a pragmatic way an assigning monetary value to nature or it is reprehensible to put price tag on priceless things?
https://phys.org/news/2019-04-conservationists-clash-ways-core-aims.html

https://voca.ro/13LmEW7k3yDb

·        #253

Anna Yakymova/ RZ-213(S.Mykhailiuk) (Wednesday, 08 June 2022 10:05)

Exam topic # 10
Password as a general technique of secrecy.
A password is your personal key to a computer system. Passwords help to ensure that only authorized individuals access computer systems. Passwords also help to determine accountability for all transactions and other changes made to system resources, including data. If you share your password with a colleague or friend, you may be giving an unauthorized individual access to the system and may be held responsible for their actions. What if the individual gives your password to someone else? What if some of your files are deleted or otherwise rendered unusable? Are you willing to take the blame if an unauthorized individual uses your access to damage or to make unauthorized changes to data or systems?
https://voca.ro/1cIjTpYT1Vp7

·        #252

Anna Yakymova/ RZ-213(S.Mykhailiuk) (Wednesday, 08 June 2022 09:51)


I have read the article about scientists create a plastic alternative made from milk and clay. This topic are very interesting. Why do social sciences research this issue?
I consider throughout the 21st century, people have been struggling with what they themselves have created. Plastic is a global problem in today's world. The scientists in this article have created a new kind of rapidly degradable substance that we can use in the same way as plastic. Already, many scientists have developed their own rapidly degradable substances.
To sum up, we should be more interested in new alternatives to plastic and replace it with more progressive things.

https://www.zdnet.com/article/scientists-create-a-plastic-alternative-made-from-milk-and-clay/
https://voca.ro/16zZ0nvIbloe

·        #251

Vorobyova E. to РЗ-213 (Wednesday, 08 June 2022 09:05)

To Mitriev, Shpychka, Chernetskiy, Rudko, Yakimova, Chabanenko, Syrbu and Tsvetkov
Students, I accept your comments and exam topics. They are well done. Thank you.

·        #250

Popovych E. (Tuesday, 07 June 2022 13:03)

To Stanislav Kryvosheienko RT-211
Exam topic "Digital devices" is well done

·        #249

Biehin Yevhen (RF-211) (Lebedeva E. V.) (Tuesday, 07 June 2022 12:45)

Biehin Yevhen RF-211
31.05.2022

Ex. 2 Reading:
1) An Isolated Virtual Machine

2) A typical computer consists of a processor, a linearly addressed memory system, and some collection of input/output devices associated with the processor.

3) Thus a single processor may be able to take the place of several. Such a scheme is the essence of a multiprogramming system.

4) In this figure, all memory references by the processor are checked by an extra piece of hardware that is interposed in the path to the memory. The descriptor register controls exactly which part of memory is accessible. The descriptor register contains two components: a base value and a bound value.

5) If any running program could load it with any arbitrary value, there would be no protection. The instruction that loads the descriptor register with a new descriptor must have some special controls--either on the values it will load or on who may use it. It is easier to control who may use the descriptor, and a common scheme is to introduce an additional bit in the processor state. This bit is called the privileged state bit.

Ex. 1 Speaking:
1) Information science is a discipline that deals with the processes of storing and transferring information.
2) Computer Science is a study of computers, computation, system control and development of hardware of software programming
3) Data processing is a conversion of raw data to machine-readable form
4) Multiplexing is a process of transmitting of multiple signals simultaneously to a single channel

Ex. 2 Speaking:
1)
2) What does the program name supervisor do?
3) What will you do with your model in the future?

Ex. 2 Writing:
The multiplexing of a single computer system among several users

Multiplexing is a way of sending multiple signals or streams of information over a communication link at the same time in the form of a single, complex signal. When the signal reaches its destination, a process called demultiplexing, recovers the separate signals and outputs them to individual lines.
Multiplexing is used in a wide variety of industries to facilitate both analog a digital communication. Organizations implement multiplexing for two main reasons:
1) To enable network devices to communicate with each other without needing a dedicated connection between each device
2) To better utilize scarce or expensive network resources.

·        #248

Popovych E. (Tuesday, 07 June 2022 11:20)

To Timophey Sipin RZ-212
Your comment is thoughtful and well done, thank you.

·        #247

Stanislav Kryvosheienko RT-211 (Popovych) (Tuesday, 07 June 2022 10:50)

Exam topic "Digital devices"
Information system is made up of five components: hardware, software, data, people, and process. The physical parts of computing devices – those that you can actually touch – are referred to as hardware. Computer hardware encompasses digital devices that you can physically touch. This includes devices such as the following: desktop computers, laptop computer, mobile phones, tablet computers, e-readers, storage devices, such as flash drives input devices, such as keyboards, mice, and scanners, output devices such as printers and speakers. A digital device processes electronic signals that represent either a one “on” or a zero “off”. The on state is represented by the presence of an electronic signal, off state respectively disabled.

Voice - https://voca.ro/1g8ASLM9nMdA

·        #246

Timophey Sipin RZ-212(Popovych) (Tuesday, 07 June 2022 10:42)

Today l have read the article titled «I selfie, therefore I am': Instagram 10 years on».In this text, we are told about the changes in Instagram over 10 years, as well as the pros and cons of this app. For example, we are told about a significant improvement in the service , from the usual photo processing 10 years ago, to an element without which now is difficult to imagine our life. Instagram (based on information from the text) helped many companies, brands and ordinary people to make life easier.
In my opinion, we need Instagram today, but as the psychologist correctly noted in the text, teenagers do not need to strive for the ideal life that they see in the Internet application.

https://techxplore.com/news/2020-10-selfie-instagram-years.html

https://voca.ro/1fg9FoYZ6wS
1) 1. another way of
We need to find another way of thinking, one based on principles and values that can sustain a new test of civilization. - Нам потрібно знайти інший спосіб мислення, заснований на принципах і цінностях, які можуть витримати нове випробування цивілізації.
2. alternative way
They found an alternative way to control the mass density of the fluid by simply engineering the thickness of the fluid channel. - Вони знайшли альтернативний спосіб контролю масової щільності рідини шляхом простого визначення товщини каналу рідини.
3. able to eliminate
I think we may be able to eliminate that threat for them once and for all. - Я думаю, що ми зможемо усунути цю загрозу для них раз і назавжди.
https://voca.ro/1n2Kvlmfr

·        #245

Popovych E. (Tuesday, 07 June 2022 09:53)

To Sergey Kyznyak RT-211
Your task is complete, informative and interesting. The task Phrases of the day and your exam topic #9 “The new advancement of color Television'' were performed correctly.

·        #244

Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 07 June 2022 09:18)

1)"The vaccine is not spreading as quickly as any of us expected, and new international travel restrictions requiring customers to test negative for Covid-19 have reduced demand."
Said in a letter from CEO Doug Parker and President Robert Isom
American no longer expects to reach full capacity this summer, they said.
The Americans laid off 19,000 workers in October after the expiration of the previous round of federal support, but brought back the workers.
In a letter to employees, the airline said the airline expects to fly at least 45% less in the first quarter, extending the industry's downturn as travel recovery expectations are delayed due to the slow rollout of coronavirus vaccines.
Due to the coronavirus, flights have been reduced so as not to spread the virus to other countries and the planet itself. In order to avoid this, the management of the airport issued a decree that at least 45% of flights would operate. They will also maintain the stability of the reception of passengers, when the vaccine is released, they will resume all flights.


2) https://techxplore.com/news/2021-02-american-airlines-layoffs.html
3) https://voca.ro/11RLFm8Qjprc
4) first quarter
In the first quarter of 2020, the Ministry of Education and Science issued a decree to close all enterprises for quarantine.

worker
During this period, any worker must stay at home.

early retirement

In some countries, older people were forced into early retirement.

5) https://voca.ro/19VCZ36Fm1RW

·        #243

Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 07 June 2022 09:13)

1) Reflection-removing camera: Device uses depth sensor and signal processing to capture clear images through windows

In recent years, computer scientists have studied a number of methods for removing reflections from digital photographs taken through glass.
This week at the Institute of Electrical and Electronic Engineers' International Conference on Acoustics, Speech and Signal Processing, members of the MIT Media Lab's Camera Culture Group will present a fundamentally different approach to image separation.
In earlier projects, the Camera Culture Group measured the time of arrival of reflected light using an ultra-fast sensor called a strip camera. At first glance, such commercial devices may seem too slow to produce the precise discrimination needed to remove reflections.
Fourier transform, which is widely used in signal processing, is a method of decomposing a signal into its component frequencies. Each frequency in the Fourier expansion has two properties. First, its amplitude or the height of the wave crests. This describes how much it contributes to the composite signal.
Based on the information, the creators wanted to get rid of glass reflections.

2) https://techxplore.com/news/2016-03-reflection-removing-camera-device-depth-sensor.html

3) https://voca.ro/13yOWfoJHyDN

4) 1. those at MIT
Some have tried to use variability in focal distance or the polarization of light; others, like those at MIT, have exploited the fact that a pane of glass produces not one but two reflections, slightly offset from each other.

2. earlier projects
In earlier projects, the Camera Culture Group has measured the arrival times of reflected light by using an ultrafast sensor called a streak camera.
3. terahertz imaging
And in other settings, such as terahertz imaging, measuring phase as well as intensity can dramatically increase costs.
5) https://voca.ro/1eke6EaDATRg

·        #242

Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 07 June 2022 09:12)

(CLASS WORK)
Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This article is about a US government that offers 10 million dollars for finding a leader of the high-profile ransomware gang DarkSide. Washington blamed the Russia-based group for the online assault that forced the shutdown of the largest oil pipeline in the eastern United States in May. Cybercrimes have been booming, with new data out in October showing $590 (five hundred nineteen) million in ransomware-related payments were reported to US authorities in the first half of 2021 alone. As for me, the fight against hackers is a very difficult confrontation.

Sentences:
WHEN COMPARED
1)This figure is even less significant WHEN COMPARED to the assets such enterprises control.
Ця цифра ще менш значна, якщо порівнювати з активами, які контролюються такими підприємствами.

MULTIPLE LEVELS.
2)And the beauty of the book is that it works on MULTIPLE LEVELS.
І принадність книги в тому, що вона працює на кількох рівнях.

CASE STUDIES
3)The training will be based on CASE STUDIES, simulations and group problem-solving exercises.
Навчання базуватиметься на тематичних дослідженнях, моделюванні та групових вправах на вирішення проблем.

Vocaroo(sentence): https://voca.ro/1bPATAlHnboW
Vocaroo(aritcle): https://voca.ro/1k3bM50kGonB
https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
https://techcrunch.com/2021/11/05/state-department-darkside-bounty/

·        #241

Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 07 June 2022 09:12)

Exam topic #9 “The new advancement of color Television.”
In 1938, Werner Flechsig patented the principle of the color kinescope, and the color image transmission method was developed in 1940. In European cinemas, color films appeared in 1941, the first of which were Women Are Still the Best Diplomats and Hans Alber's film Munchausen. In 1953, the NTSC standard for black-and-white television broadcasting was expanded in the United States - it received the ability to transmit color, namely, "color" was added to "brightness". On August 30, 1953, for the first time in history, NBC broadcast a color broadcast of "Kukla, Fran and Ollie" in test mode via the NTSC standard. The first full-fledged color broadcast was the opera Carmen, shown on October 31, 1953.

Vocaroo: https://voca.ro/1kNQhjXPbo1n

·        #240

Popovych E. (Tuesday, 07 June 2022 08:49)

To Kolomiets Volodymir RZ 212
Your comment has clear layout and quite correct as well as the task with the phrases, thank you.

·        #239

Gvozd O.V. to RZ-211 (Tuesday, 07 June 2022 08:47)

Good morning!
The lesson will start soon. Read the instructions again and do your module Test.

·        #238

Timophey Sipin RZ-212 (Tuesday, 07 June 2022 08:38)


Today l have read the article titled «I selfie, therefore I am': Instagram 10 years on».In this text, we are told about the changes in Instagram over 10 years, as well as the pros and cons of this app. For example, we are told about a significant improvement in the service , from the usual photo processing 10 years ago, to an element without which now is difficult to imagine our life. Instagram (based on information from the text) helped many companies, brands and ordinary people to make life easier.
In my opinion, we need Instagram today, but as the psychologist correctly noted in the text, teenagers do not need to strive for the ideal life that they see in the Internet application.

https://techxplore.com/news/2020-10-selfie-instagram-years.html

https://voca.ro/1fg9FoYZ6wS
1) 1. another way of
We need to find another way of thinking, one based on principles and values that can sustain a new test of civilization. - Нам потрібно знайти інший спосіб мислення, заснований на принципах і цінностях, які можуть витримати нове випробування цивілізації.
2. alternative way
They found an alternative way to control the mass density of the fluid by simply engineering the thickness of the fluid channel. - Вони знайшли альтернативний спосіб контролю масової щільності рідини шляхом простого визначення товщини каналу рідини.
3. able to eliminate
I think we may be able to eliminate that threat for them once and for all. - Я думаю, що ми зможемо усунути цю загрозу для них раз і назавжди.
https://voca.ro/1n2Kvlmfr

·        #237

Kolomiets Volodymir RZ 212 (Popovych) (Tuesday, 07 June 2022 08:33)

Today i have read the article "It's crystal clear: Crushed glass could save our sand". This article is about a new way to safe our enviroment. Some engineers started using recucled glass instead of sand in making shotconcrete. They say that it is cheaper and will save our nature because the sand began to run out rather quickly. According to them this is extremely necessary because our grandchildren may not see the sandy beaches. There have been many tests done with this mixture and it has shown itself to be quite good. Soon they plan to do large-scale projects with this concrete.
i found this article very interesting, because this information can change even my town, so i like it.
https://techxplore.com/news/2021-05-crystal-glass-sand.html
https://voca.ro/12bIttE8GH1V

1) able to eliminate
As highlighted by one of the heads of the study, Professor Álvaro Caballero, the researchers were able to eliminate the impurities of used graphite
Як підкреслив один з керівників дослідження, професор Альваро Кабальєро, дослідникам вдалося усунути домішки використаного графіту.

2) another way of
There is another way of analysing this situation
Є й інший спосіб аналізу цієї ситуації

3) alternative way
LPAs offer an alternative way to accelerate and boost the energies of the particles
LPA пропонують альтернативний спосіб прискорення та збільшення енергії частинок

https://voca.ro/1lBhGoIMM1FR

·        #236

Popovych E. (Tuesday, 07 June 2022 08:31)

To Povoznikov Artem RZ-212
I have read your tasks, they are quite correct and informative but mind, pls, that your comment should include up to 100 words. Use Word Count Tool to check it. Go on working.

·        #235

Povoznikov Artem RZ-212 (Popovych) (Tuesday, 07 June 2022 08:25)

Today i have read the article: Computer simulation brings us closer to schools of fishlike underwater research drones.

This article tells about The researchers used 3D modeling to show that small fish swimming in a school can sense the position and tail strokes of their neighbors as a change in water pressure on the side of their body.

This mechanism allows the fish to maximize the swimming efficiency of the group even in complete darkness when there are no visual cues. Understanding the group movement of fish is useful for predicting their migration and designing aquatic research robots. Previous research suggests that swimming in groups of fish can benefit from adopting optimal relative positions and synchronizing their movements. In order to keep track of neighbors, even in a dark or cloudy environment, fish must clearly rely on more than just sight.

In this study, scientists simulate two tetra-nosed fish swimming side by side in various configurations in calm waters.
They examine the pressure signals propagating through the water from the body of one fish to the body of another. In fact, there is a new trend in robotics that will increasingly see modular designs of small robots working in teams.

Similarly, swarms of robotic fish equipped with pressure sensors could use the hydrodynamic advantages of moving in a group to replace larger underwater drones that explore historic shipwrecks, such as Ernest Shackleton's newly discovered endurance, or observe fish behavior.

I think this is a great invention for underwater research. With it, we will be able to explore the underwater world even better.

Text: https://techxplore.com/news/2022-03-simulation-closer-schools-fishlike-underwater.html

Audio: https://voca.ro/130rJomezQzu

1) able to eliminate

I think we may be able to eliminate that threat for them once and for all.

2)alternative way

Many of them are, however, large and costly. LPAs offer an alternative way to accelerate and boost the energies of the particles.

3)another way of

There is another way of analysing this situation.

Audio:https://voca.ro/13j6aWvFRJ39

·        #234

Popovych E. (Tuesday, 07 June 2022 08:13)

To Kravchenko Kostiantyn (RZ-212)
Thank you for your comment on the article and for your work. It is nice that you do it regularly.

·        #233

Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 07 June 2022 08:03)

Today I've read the article "Dear passwords: Forget you. Here's what is going to protect us instead"
The article covers the idea that passwords are becoming obsolete in modern times.
The article suggests that passwords are bound to be replaced within the next 5 years with more modern authorization methods, such as biometrical scans, face and speech recognition. However due to concerns and little consensus on what works best, companies restrain themselves from implementing immediate solutions.
In my opinion, the article is rather controversial. Although I would consider password relevancy quite the discussion in modern times, the article fails to bring any valid arguments, apart from making bold claims.
Article: https://techxplore.com/news/2020-03-dear-passwords.html
Audio: https://voca.ro/1cWFA2wC5MPF

Phrases:
1) Electrocaloric refrigerator offers an alternative way to cool everything from food to computers.
Електрокалорійні холодильники пропонують алтернативний спосіб охолодження всього, від їжі до комп'ютерів.
2) As we come up with a solution, the hackers are thinking of another way to attack.
Доки ми знаходимо рішення, хакери мислять про нові шляхи для атаки.
3) The researchers were able to eliminate the impurities of used graphite.
Дослідники змогли ліквідувати домішки у використаному графіті.
Audio: https://voca.ro/18LP6y7fSO8j

·        #232

Popovych E. (Tuesday, 07 June 2022 07:13)

To Artem Kotliarov RZ-212
Your task is complete, informative and interesting. Well done.

·        #231

Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 07 June 2022 07:06)

1) 1. another way of
We need to find another way of thinking, one based on principles and values that can sustain a new test of civilization. - Нам потрібно знайти інший спосіб мислення, заснований на принципах і цінностях, які можуть витримати нове випробування цивілізації.
2. alternative way
They found an alternative way to control the mass density of the fluid by simply engineering the thickness of the fluid channel. - Вони знайшли альтернативний спосіб контролю масової щільності рідини шляхом простого визначення товщини каналу рідини.
3. able to eliminate
I think we may be able to eliminate that threat for them once and for all. - Я думаю, що ми зможемо усунути цю загрозу для них раз і назавжди.
https://voca.ro/1n2KvlmQUjiQ
2) Today, І have read thе аrtісlе «Pushing the boundaries of space exploration with X-ray polarimetry»
IXPE is a space observatory developed in collaboration with the Italian Space Agency, launched by NASA on December 9, 2021. It contains three identical telescopes, each of which has an X-ray detector that is sensitive to the polarization of light in focus. Equipped with them, IXPE can explore some of the brightest sources of cosmic X-rays in our universe, such as pulsars, black holes and neutron stars.
In my opinion, IXPE thanks to state-of-the-art telescopes and detectors, IXPE has the potential to expand the horizons of our knowledge of the universe.
https://phys.org/news/2022-04-boundaries-space-exploration-x-ray-polarimetry.html
https://voca.ro/1lk5QX12WzdR

·        #230

Popovych E. (Tuesday, 07 June 2022 06:56)

Good morning!
The lesson will start soon, so I am waiting for your comments and audio recordings. Don't forget to write the sentences with Phrases and record them. Please, do it in one post!

·        #229

Popovych E. (Monday, 06 June 2022 14:04)

To Nastya Poddubrovskaya(RZ - 212)
##218,219, 220,222,225,226
Thank you, your tasks are quite correct, but it is better to work regularly.

 

·        #228

Lebedeva E. (Monday, 06 June 2022 12:55)

To Kozhushko Dima RZ-211 I got your exam topics and comments. Now it's time to work with phrases.

·        #227

Lebedeva E. (Monday, 06 June 2022 12:54)

To Neblienko V. / RZ-212 / Badyuk Eduard RZ-212 Thanks for the work. Go on working.

·        #226

Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 12:03)

Exam topic # 10
Password as a general technique of secrecy.
A password is your personal key to a computer system. Passwords help to ensure that only authorized individuals access computer systems. Passwords also help to determine accountability for all transactions and other changes made to system resources, including data. If you share your password with a colleague or friend, you may be giving an unauthorized individual access to the system and may be held responsible for their actions. What if the individual gives your password to someone else? What if some of your files are deleted or otherwise rendered unusable? Are you willing to take the blame if an unauthorized individual uses your access to damage or to make unauthorized changes to data or systems?
https://voca.ro/1oNwCEXjre5u

·        #225

Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 11:52)

Exam topic # 9
Potential security violations.
A security breach is any incident that results in unauthorized access to computer data, applications, networks or devices. It results in information being accessed without authorization. Typically, it occurs when an intruder is able to bypass security mechanisms.When a major organization has a security breach, it always hits the headlines. Example of security breach: Yahoo - 3 billion user accounts were compromised in 2013 after a phishing attempt gave hackers access to the network.You'd never dream of leaving your house door open all day for anyone to walk in. Think of your computer the same way. Keep your network access and your personal data tightly secured, and don't leave any windows or doors open for a hacker to get through.
https://voca.ro/1jh4abL0OqcY

·        #224

Badyuk Eduard RZ-212 (Lebedeva E.V.) (Work for 26.05.) (Monday, 06 June 2022 11:49)

Exam topic #19 (Potential security violations.)

Any security violation and breach certainly includes illicit access to some resources, being systems, data, or operations. In this context, the evolution of security policies has brought access control at the core of security, but also privacy protection. Therefore, beyond legacy access control models, such as the Discretionary Access Control (DAC), the Mandatory Access Control (MAC), and the well-adopted Role-Based Access Control (RBAC), a variety of systems have been proposed, introducing a manifold of additional features. Most of the prominent approaches typically propose enhancements to RBAC models in order to incorporate different criteria in access control decisions, rather than just which user holding which role is performing which action on which object.

https://voca.ro/1nbfdhig4JvA

·        #223

Badyuk Eduard RZ-212 (Lebedeva E.V.) (Work for 12.05) (Monday, 06 June 2022 11:44)

Exam topic #14 (Authority check.)

AUTHORITY-CHECK statements are used in ABAP codes while development of ABAP Programs/Reports. Authorization objects along with the necessary field values are inserted into the ABAP code for authorization check against user actions through that particular program.
Hence these statements must be used to protect programs where users are able to perform all actions without any authorization check. These check for authorization object values against the values present in user master records. The authorization check is carried out if the check indicator for the specified authorization object for the current context is set to check with any proposal status. So, if the check indicator is set to no check, no authorization check is carried out and sy-subrc is set to 0, as with a successful check.

https://voca.ro/1ipeBmHpEVk1


 

·        #222

Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 11:37)

Exam topic # 8
The authentication of a user's claimed identity.
Authentication is the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server. In doing this, authentication assures secure systems, secure processes and enterprise information security.It is important to realize that each access point is a potential intrusion point. Each networked device needs strong machine authentication, and despite their normally limited activity, these devices must be configured for limited permissions access to restrict what can be done even if they are breached.
https://voca.ro/18gC2xhNVlyh

·        #221

Badyuk Eduard RZ-212 (Lebedeva E.V.) (Work for 05.05) (Monday, 06 June 2022 11:32)

Exam topic #17 (Password as a general technique of secrecy.)

Passwords provide the first line of defense against unauthorized access to your computer and personal information. The stronger your password, the more protected your computer will be from hackers and malicious software. You should maintain strong passwords for all accounts on your computer.
Here are some useful tips to for creating strong passwords and keeping your information secure.

1. Use a unique password for each of your important accounts.
2. Your password should be at least 8 characters long.
3. Do not use personal information such as your name, age, date of birth, child’s name, pet’s name, or favorite color/song when constructing your password.
4. Avoid consecutive keyboard combinations (i.e. qwerty or asdfg).
5. Always log off/sign out if you leave your device for the day.
6. Avoid entering passwords on computers you don't control.

https://voca.ro/1gey6lK5B6D6

1) a breakthrough in
The adoption of the Court's Statute is a clear breakthrough in the area of humanitarian law and human rights protection.
Прийняття Статуту Суду є явним проривом у сфері гуманітарного права та захисту прав людини.

2) ability to achieve
This omission on the part of the Ministry of Justice affected the work of the committees and their ability to achieve their objectives.
Це упущення з боку Мін’юсту вплинуло на роботу комітетів та їхню здатність досягати поставлених цілей.

3) able to target
Second, as their knowledge base expands, scientists will be able to target tumors with increasing safety and effectiveness.
По-друге, у міру розширення їхньої бази знань вчені зможуть націлюватися на пухлини з більшою безпекою та ефективністю.

https://voca.ro/16eg3auf6PWG

·        #220

Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 11:14)

Exam #7
Authority check
"Website authority" is an SEO concept that refers to the "strength" of a given domain.Generally speaking, the higher the "authority" of your domain, the better.
But it's important not to judge Domain Rating in absolute terms. That's because Domain Rating is a relative metric by definition. It's not possible to say that a Domain Rating of 30 is good, or 50, or 60, or 70. It's all relative.If your website "authority" is higher than that of your competitors, then your site is stronger than theirs in terms of "link popularity."Still, never judge the quality of a website on site-wide "authority" alone.
https://voca.ro/1kuV18FS4xJL

·        #219

Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 11:02)

Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This article is about a US government that offers 10 million dollars for finding a leader of the high-profile ransomware gang DarkSide. Washington blamed the Russia-based group for the online assault that forced the shutdown of the largest oil pipeline in the eastern United States in May. Cybercrimes have been booming, with new data out in October showing $590 (five hundred nineteen) million in ransomware-related payments were reported to US authorities in the first half of 2021 alone. As for me, the fight against hackers is a very difficult confrontation.
https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
a breakthrough in
I need a breakthrough in Eloise's case to save me from full-blown Hindenberg.
Мне нужен прорыв в деле Элоизы, чтобы спасти меня от полного провала.
able to target
Second, as their knowledge base expands, scientists will be able to target tumors with increasing safety and effectiveness.
Во-вторых, по мере накопления знаний ученые научатся бороться с опухолями более безопасными и эффективными способами.
ability to achieve
Her ability to achieve maximum results while staying within the budget is one of the greatest company resources.
Ее способность достигать максимальных результатов при заданном бюджете является одним из лучших ресурсов компании.
https://voca.ro/1cESdGiaqqJ2

·        #218

Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 10:53)

Today I've read the article about storing energy in red bricks. We've been using red bricks for thousands of years since it's the world's cheapest and most familiar building material. Surprisingly, chemists in Art&Science have developed a method to make modified "smart bricks" that are capable of storing energy until required for powering device. This method is suitable for regular or recycled bricks and new bricks as well. Buildings and walls made of red bricks are already everywhere so we can improve them and use them as electrical storages. D'Arcy and colleagues demonstrated the way we can convert red bricks into supercapacitors. This type of bricks can provide energy to emergency lightning and can be recharged hundreds of thousands of times. There was a video of their experiment in this article. In my opinion, this research paves the way for totally new method to save energy. article: https://techxplore.com/news/2020-08-energy-red-bricks.html
https://voca.ro/1bpuzes3yHQR
a breakthrough in
Your holistic detective agency is a breakthrough in applied quantum mechanics.
Твоё холистическое детективное агентство - это прорыв в прикладной квантовой механике.
able to target
My alien sister is not leaving here until we figure out how Cadmus was able to target only aliens.
Моя сестра-пришелец не уйдёт отсюда, пока мы не выясним, как Кадмус смог поразить только пришельцев.
ability to achieve
This phenomenon has a serious adverse effect on our ability to achieve unity at the continental level in Africa for the peaceful resolution of conflicts.
Это явление оказывает серьезное отрицательное воздействие на нашу способность достигать единства на континентальном уровне в Африке в целях мирного урегулирования конфликтов.
https://voca.ro/13Q8WJN59sRV

·        #217

Petrova E.I. (Monday, 06 June 2022 10:22)

Pour les étudiants qui apprennent le français.
Chers étudiants ! J’attends vos devoirs. Dépéchez-vous! Il ne vous reste que quelques jours pour les faire et envoyer.Laissez vos commentaires et vos enregistrements ici. Allez-y! Bon travail.

·        #216

Neblienko V. / RZ-212 / Lebedeva (Sunday, 05 June 2022 18:45)

Exam topic #11 The differences between a software and hardware firewall.

Here the difference:
Hardware firewalls can protect a whole network of computers in an organization, while a software firewall is required to be installed on individual computers.
Hardware firewalls are more complex to set up while software firewalls are much simpler and easier to install on computers.
Hardware firewalls entail a big investment, which is proportional to the sophistication required, while software firewalls generally mean less investment. However, the cost of software firewalls increases if an organization hosts computers of different brands and operating systems.
Hardware firewalls free up the critical server resources as the related software is installed outside the server in the hardware firewall itself.

Vocaroo: https://voca.ro/1boZodflhIXe

·        #215

Neblienko V. / RZ-212 / Lebedeva (Sunday, 05 June 2022 18:38)

Today i have read the article titled: 'New NASA mission to help us better estimate asteroid impact hazard'. This article tells about the sensors that every year detect nuclear explosions in the upper atmosphere, which are harmless, as a result of the disintegration of an asteroid.
According to NASA's NEO program, there are more than 1,300 "Potentially Hazardous Asteroids" (PHAs) – objects at least 150 yards (about 140 meters) across with a very small chance of impacting us someday because their orbital paths take them close to Earth's orbit.
In my opinion, you should not forget about the cosmic threat and also pay attention to the danger and the possibility of dangerous objects entering our planet.

Article: https://phys.org/news/2013-02-nasa-mission-asteroid-impact-hazard.html
Vocaroo: https://voca.ro/1i3UnxabVq7t

Phrases:

estimate the effects of

It was able to estimate the effects of emissions on human health and biodiversity.

Она способна оценивать воздействие выбросов на здоровье человека и биоразнообразие.

distinct from

Such people often live in politically marginalized groups distinct from the dominant culture.

Зачастую такие люди принадлежат к политически маргинализованным группам, и их образ жизни отличается от преобладающих культурных традиций.

examine more closely

However, it might be worthwhile to examine more closely the differences between the Secretariat and its counterparts in New York, namely, UNICEF and UNDP.

Тем не менее, возможно, стоит более внимательно изучить различия между Секретариатом и его аналогами в Нью-Йорке, а именно ЮНИСЕФ и ПРООН.

Vocaroo: https://voca.ro/11a90pgBjnYi

·        #214

Anton Ardelyan RZ-211(Gvozd O.V.) (Sunday, 05 June 2022 16:55)

Today i have read the article "Japan's 'flying car' gets off ground, with a person aboard (Video)" It was a good year for technology research of all kinds; a team at Japan's SkyDrive Inc., demonstrated their "flying car"—it took off with a person aboard, hovered approximately 1 to 2 meters above the ground for approximately four minutes and then returned safely to the ground. Tomohiro Fukuzawa, who heads the company, said at the demonstration that he hopes to have a product for sale within a couple of years.
Link: https://techxplore.com/news/2020-08-japan-car-ground-person-aboard.html
Audio: https://voca.ro/143Nb5eyvYyu
Phrases:
1)To estimate the effects of interacting variables, we employed a two-step estimation approach
Щоб оцінити вплив взаємодіючих змінних, ми застосували двоетапний підхід до оцінки
2)That's distinct from advertising.
Це відрізняється від реклами.
3)This pair of posts will examine more closely four types of weapons.
У цій парі постів детальніше буде розглянуто чотири види зброї.
Audio:https://voca.ro/1o5wSTm8tDLE

·        #213

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:45)

Today I've read the article Crossing the Line: How Robots Can Control Roads.
International experts, including those from Flinders University, say there is a need to create a strong collective ethical framework developed by government, citizens and other stakeholders to guide the introduction of new traffic rules for connected and automated vehicles (CAV).
They warn that a strict ban on all kinds of CAVs from violating existing traffic rules could reduce road safety, contrary to what most people might argue. However, this requires careful scrutiny so that these high-tech vehicles can fulfill their potential to reduce road accidents.
I think this article is useful for understanding what awaits us in the near future and what we will have to face.

1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to "take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.

https://voca.ro/1o18vKz9EZev
https://voca.ro/195t5OqF0yme

·        #212

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:44)

Sofia Gilenko РЗ-211 (Vorobyova)
Today I've read the article Crossing the Line: How Robots Can Control Roads.
International experts, including those from Flinders University, say there is a need to create a strong collective ethical framework developed by government, citizens and other stakeholders to guide the introduction of new traffic rules for connected and automated vehicles (CAV).
They warn that a strict ban on all kinds of CAVs from violating existing traffic rules could reduce road safety, contrary to what most people might argue. However, this requires careful scrutiny so that these high-tech vehicles can fulfill their potential to reduce road accidents.
I think this article is useful for understanding what awaits us in the near future and what we will have to face.

1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to "take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.

https://voca.ro/1o18vKz9EZev
https://voca.ro/195t5OqF0yme

·        #211

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:43)

Today I’ve read the article “Sex, drugs and TikTok: Keeping young people safe needs a mature response, not a moral panic”. TikTok "serves up" sex and drug videos to minors. Media reports have described the video-sharing platform, which is designed predominantly for young people, as an "addiction machine" that promotes harmful content. TikTok's algorithm actively "serves up" drug content to minors, who "may lack the capability to stop watching and don't have supportive adults around them" to help moderate their opinions. Parents have been encouraged to stop their children using it, and the app has been urged to censor drug content entirely. If we are serious about protecting young people online, we need to be driven by evidence, not fear.
https://techxplore.com/news/2021-10-sex-drugs-tiktok-young-people.html
1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to "take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.
https://voca.ro/1amMuABY9bGL
https://voca.ro/195t5OqF0yme

·        #210

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:43)

Today I've read the article "Using AI and old reports to understand new medical images".
This article is about the use of artificial intelligence in medicine. Getting a quick and accurate reading of an X-ray or some other medical images can be vital to a patient's health and might even save a life.Obtaining such an assessment depends on the availability of a skilled radiologist and, consequently, a rapid response is not always possible.For this reason, CSAIL scientists want to train machines that can replicate what radiologists do every day.
This is done on the basis of the myriad of radiological reports that accompany medical images written by radiologists in daily clinical practice. In my opinion, this article is very important, because this technology can not only save lives of people around the world, but it can also be used for any images and related text - inside or outside the field of medicine.

1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to "take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.


https://voca.ro/1leBq6VRdo9d
https://voca.ro/195t5OqF0yme

·        #209

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:42)

Today I've read the article "Engineers are developing a way to use everyday Wi-Fi to help robots see and navigate indoors better."
UC San Diego engineers have developed low-cost, low-power technology that helps robots accurately navigate indoors, even in poor lighting and without recognizable landmarks or features.
I think this article is useful because using WiFi technology can offer a cost-effective alternative to expensive and power-hungry LiDARs.
https://techxplore.com/news/2022-05-everyday-wifi-robots-indoors.html
1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to "take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.
https://voca.ro/1k8CMtOZbjFp
https://voca.ro/195t5OqF0yme

·        #208

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:41)

Today I've read the article "New technology gives smart cars 'X-ray' vision by detecting hidden pedestrians and cyclists."
Australian researchers have developed a breakthrough technology that allows autonomous vehicles to track running pedestrians hidden behind buildings and cyclists hidden behind larger cars, trucks and buses.
I think this article is useful for both human-driven and autonomous vehicles, it will significantly improve the efficiency and safety of road transport.

https://techxplore-com.translate.goog/news/2021-11-technology-smart-cars-x-ray-vision.html?_x_tr_sl=auto&_x_tr_tl=ru&_x_tr_hl=ru&_x_tr_pto=nui,op

1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to "take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.

https://voca.ro/11Cz3jfWs4g3
https://voca.ro/195t5OqF0yme

 

·        #207

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:41)

Exam Topic #10 (information protection systems)

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad. Confidentiality
Confidentiality measures are designed to prevent unauthorized disclosure of information. Integrity
Consistency includes protection against unauthorized changes (additions, deletions, alterations, etc.) to data. Availability
Availability is the protection of a system’s ability to make software systems and data fully available when a user needs it (or at a specified time).
https://voca.ro/15dPhJ5uDcdK

·        #206

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:39)

Exam topic #18 ("Protection schemes”)
Nowadays, protection schemes are everywhere. Each bank, company, organization etc. have their own protection schemes. These schemes are usually some code written by a high-quality specialist to secure data from the villain. It's always very important to have individual way to protect a big amount of information, that's why schemes are always checking to have a stable control on situation, because at least one mistake can destroy all the system. In general, only robbers and hackers want to get the access to the system to stole information or money.
https://voca.ro/1dzdSb03RGXw

·        #205

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:39)

Exam topic #1 (Concept of “Privacy”. )
The possibilities of information exchange on the Internet today are truly limitless and continue to grow rapidly.
But privacy is an important element of the Internet's open information space. Neglect of a person's right to confidentiality, or rather, his right to control the composition and extent of distribution of personal information, leads to a loss of user confidence, increased control and, as a result, to a decrease in innovation, intensity and volume of information exchange.
https://voca.ro/1nHV96ZET9ax

·        #204

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:38)

Exam topic #19 (Principles of information protection.)
In computing, the concept of security is very broad. It implies both the reliability of the computer, and the safety of valuable data, and the protection of information from being changed by unauthorized persons, and the preservation of the secrecy of correspondence in electronic communications. Of course, in all civilized countries, the safety of citizens is protected by laws, but in computer technology, law enforcement practice is not yet developed, and the law-making process does not keep pace with the development of technology, and the reliability of computer systems largely relies on self-defense measures.
https://voca.ro/1kvMLYZtRuHN

·        #203

Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:37)

Exam topic #15 (The Essentials of Information Protection.)
It must be clearly understood that no hardware, software or any other solutions can guarantee the absolute reliability and security of data in information systems. At the same time, it is possible to significantly reduce the risk of losses with an integrated approach to security issues.
A large concentration of protective means in an information system can lead not only to the fact that the system will be very expensive and therefore unprofitable and uncompetitive, but also to the fact that it will have a significant decrease in the availability factor. Therefore, the main thing in determining the measures and principles of information protection is to skillfully determine the boundaries of reasonable security and the cost of protection tools on the one hand and maintaining the system in working condition and acceptable risk on the other.
https://voca.ro/17IYoJOO5nrX

·        #202

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:53)

Exam topic #16 (The Essentials of Information Protection)

The most important rules in the internet is Essentials of Information Protection. The main ones are passwords, key-phrases and id-verifications. But it should be noted that a lot of information could be stolen in free acces. Don’t post any important information, your phone number, personal photos, documents, etc. on messangers, sites and personal messages with people you don’t trust. Use only safe resources to your needs and never try to find something in suspicious sites, there are can be some hacker’s trups like fishing and other stuff to stole your data or even to take control on your device

Audio: https://voca.ro/1dnegvxH6LXd

·        #201

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:52)

Exam topic #1 (Concept of “Privacy”)
Confidentiality is the right to remain calm or free from interference or intrusion. Confidentiality of information is the right to some control over how your personal information is collected and used. Thanks to technological innovations, it is becoming increasingly difficult to maintain the confidentiality of information as more and more data is collected and exchanged. And this forces organizations to face an incredibly complex matrix of risks to ensure the protection of personal information.
Confidentiality has quickly become perhaps the most important issue of consumer protection - if not the protection of citizens - in the global information economy.

Audio: https://voca.ro/1auXMJK6qnLi

·        #200

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:52)

Exam topic #19 (Potential Security Violations)
Over the recent decades we've observed many types of cyber attacks; for convenience security specialists have widely agreed upon categorization of these potential security violations into three main classes.
Unauthorized information release, in which a hacker can read and take advantage of the information stored on the system, or track patterns of illegible code with the intention of deciphering it into proper information.
Unauthorized information modification, in which the attacker can sabotage the system by modifying the stored information.
And lastly, unauthorized denial of use, in which the intruder can prevent an authorized user from accessing the system, or its stored information in any capacity.

Audio: https://voca.ro/1onh3aOk1bhV

·        #199

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:51)

Exam topic #13 (Authentication mechanisms)
Authentication is the process by which a user confirms the authenticity of his identity in any system. The system provides personal data only to its owner. The authentication mechanism is one of the administration tools. It allows you to determine which of the users listed in the list of system users is connecting to the application solution at the moment. The authentication mechanism at the basic level is quite simple - you need to enter data in the form of a username and password. Check the data for a match, and if the data matched, then you are the true owner of the account.

Audio: https://voca.ro/19lSzpOmkY1Q

·        #198

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:50)

Exam topic #17 Password as a general technique of secrecy

Today we can install password everywhere. On your smartphone, on social network page, on bank account. Password reliably protects your information, but only if you made it hard and unusual. If your password is too easy, hackers will easily guess it using special password recovery software.
Password must be long, with different numbers, with small and capital letters and other characters, the harder the better. Also you must have different passwords for different needs. if you follow these rules, your information will be under protection and your information will not be stolen by hackers and online thieves.

Audio: https://voca.ro/1oOJXzwwPWU2

·        #197

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:49)

Today I've read the article about the study that explores how a robot's inner speech affects a human user's trust. Trust is a very important part of human-robot interactions as well as it affects the widespread implementation of robots in our life. However, trust is a very complicated process that requires specific and individual circumstances. Researches at University of Palermo provide a perspective study about the impact of robots' inner speech. They've made some experiments and discovered that people trust robots more when they hear the strategy and the structure of robots' "thoughts". They claim that it makes robots more anthropomorphic or human-like. Unfortunately, the team has analyzed the level of trust of only 27 people, but they intend to make their research more precise and broader. In my opinion, the robots' inner speech is capable of making them more trustworthy and thus helps people rely on them in different areas.

Article: https://techxplore.com/news/2021-10-explores-robot-speech-affects-human.html
Audio: https://voca.ro/15jv7GBySLnA

·        #196

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:48)

Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This article is about a US government that offers 10 million dollars for finding a leader of the high-profile ransomware gang DarkSide. Washington blamed the Russia-based group for the online assault that forced the shutdown of the largest oil pipeline in the eastern United States in May. Cybercrimes have been booming, with new data out in October showing $590 million in ransomware-related payments were reported to US authorities in the first half of 2021 alone. As for me, the fight against hackers is a very difficult confrontation.

Article: https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
Audio: https://voca.ro/1bE5AYWgXLDa

·        #195

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:48)

Today i’ve read an article “Making voice assistants accessible for older patients”
This article tells us about voice assistants made by different technology companies, like Apple, Google, Amazon and others, and their enormous potential to make our life easier. Also this assistants can help old people to manage their health. Using these eye- and hands-free tools, patients could make appointments, confer with clinicians, receive medication reminders and perform other tasks. But current devices have not been designed with older patients, or even healthcare, in mind. If engineers and designers will work in this direction, they can really help different groups of people. Also important thing in teaching people use this technology often and correct.
This article is important to read if you want to know about newest technologies, which really can help people.

Article: https://techxplore.com/news/2021-11-voice-accessible-older-patients.html
Audio: https://voca.ro/1e6sNwMVQzxt

·        #194

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:47)

Today I have read the article The Dark Side of Social Media
A systematic review of research on the dark side of social media use identified 46 harmful effects, ranging from physical and mental health problems to negative impacts on work and academic performance, as well as safety and privacy concerns.
Social networks like Facebook and Instagram are used by over 3.6 billion people worldwide. Raising awareness of potential dangers can stimulate user moderation and help software developers, educators, and policymakers develop ways to minimize negative impacts.
In my opinion, the harm caused by social media is mainly psycho-logical.

Article: https://techxplore.com/news/2021-10-dark-side-social-media-networks.html
Audio: https://voca.ro/1h4LGE4WD0kd

·        #193

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:46)

Today I have read the article "Robots popular with older adults" .This article explores the myth that older people are skeptical of robots. The myth was debunked in an experiment in which older participants were openly positive about cars and even more open than participants in the younger comparison group. Similarly, scientists have suggested that robots can help people with autism, because it is important for them that their environment is predictable, and this is exactly the effect that can be achieved with the help of robots.
I believe that robots are an irreplaceable part of the future, in which they will be not just workers, but a part of society.

Article: https://techxplore.com/news/2020-03-robots-popular-older-adults.html
Audio: https://voca.ro/1aXKshP9pjR2

·        #192

Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:45)

Today I've read the article Crossing the Line: How Robots Can Control Roads.
International experts, including those from Flinders University, say there is a need to create a strong collective ethical framework developed by government, citizens and other stakeholders to guide the introduction of new traffic rules for connected and automated vehicles (CAV).
They warn that a strict ban on all kinds of CAVs from violating existing traffic rules could reduce road safety, contrary to what most people might argue. However, this requires careful scrutiny so that these high-tech vehicles can fulfill their potential to reduce road accidents.
I think this article is useful for understanding what awaits us in the near future and what we will have to face.
Article: https://techxplore-com.translate.goog/news/2021-10-line-robots-roads.html?_x_tr_sl=auto&_x_tr_tl=ru&_x_tr_hl=ru&_x_tr_pto=nui
Audio: https://voca.ro/129PKBYxS6Dn


Phrases:

·        #191

Neblienko V. / RZ-212 / Lebedeva (Saturday, 04 June 2022 19:08)

(Отработка за 05.05.2022)
Exam topic #10 Software firewall.
Software firewall is a firewall that is installed on a computer or server, and tasked with network security. It works with a wide variety of other technology security solutions to provide more robust and cohesive security for enterprises of all sizes.
When a software firewall is installed on a server, it opens up like an umbrella of protection over all other computers connected to the network. It is able to monitor both incoming and outgoing traffic for potential risk or suspicious user behaviour, and also makes setting security policies much easier, faster and more flexible.

Vocaroo: https://voca.ro/1ajCG1k5CyNn

·        #190

Neblienko V. / RZ-212 / Lebedeva (Saturday, 04 June 2022 19:01)

(Отработка за 05.05.2022)
Today i've read the article titled: 'Substance derived from tire debris is toxic to two trout species, not just coho salmon'. This article tells about 6PPD-quinone, which, thanks to the rain, rendered unusable the coho salmon fish, thanks to which it was determined that the effect could be on the famous trout fish. Rubber tires are fortified with protectants, such as N-(1,3-dimethylbutyl)-N'-phenyl-p-phenylenediamine or simply 6PPD, so they can be safely driven for a long time. However, as the treads wear down and pieces flake off over time, small rubber particles scatter across roads. In my opinion, it is worth reducing emissions, which greatly affect both the environment and the fauna, which suffer enormously from all sorts of factories and industrial zones.
Article: https://phys.org/news/2022-03-substance-derived-debris-toxic-trout.html
Vocaroo: https://voca.ro/1b08rwMNJYnM

Phrases:

derived from

Obsessed with anything derived from Norse mythology...

Одержимые всем, что каким-либо образом связано с норвежской мифологией...

de facto

Three formerly de facto abolitionist countries resumed executions.

Три страны, ранее де-факто отменившие смертную казнь, возобновили приведение в исполнение смертных приговоров.

deserves special attention

The situation of the Twa minority deserves special attention, but unfortunately does not always receive it.

Положение меньшинства заслуживают особого внимания, которое, к сожалению, проявляется далеко не всегда.

Vocaroo: https://voca.ro/1dLpqYXFh3qC

·        #189

S.Mykhailiuk (Saturday, 04 June 2022 15:01)

To Chabanenko Ksenia RZ-213 Thanks. Just very good.

·        #188

S.Mykhailiuk (Saturday, 04 June 2022 14:58)

To Ivan Siglyanyk(RZ-213) Just 80 points for your activities.Thanks.

·        #187

S.Mykhailiuk (Saturday, 04 June 2022 14:55)

To Anna Yakymova/ RZ-213 just 79 points for all tasks.

·        #186

S.Mykhailiuk (Saturday, 04 June 2022 14:50)

To Shpychka Olecksandr/ RZ-213 Thanks .just 82 points for 2 tasks.

·        #185

S.Mykhailiuk (Saturday, 04 June 2022)

To Kate Syrbu RZ-213 Task1 is very good. Task2 is good.

·        #184

S.Mykhailiuk (Saturday, 04 June 2022 14:45)

To Igor Rudko (RZ-213) just good for both tasks.

·        #183

S.Mykhailiuk (Saturday, 04 June 2022 14:41)

To Gorbatiuk Stanislav RZ-213 Just good for both tasks.

·        #182

S.Mykhailiuk (Saturday, 04 June 2022 14:37)

To Denis Tsvietkov. РЗ-213 Task1 and Task2 are 70 points . Pls do not use the direct speech (quotes) from the article in your comments. You see what it stands for without working regularly on line.

·        #181

S.Mykhailiuk (Saturday, 04 June 2022 14:28)

To Denis Tsvietkov. РЗ-213 just 67 points as the task contains some grammar mistakes. Pls train your pronunciation to avoid mispronouncing words.

·        #180

S.Mykhailiuk (Saturday, 04 June 2022 14:11)

To Denis Tsvietkov. РЗ-213 Task1 is very good. Task2 is 60 points only. Pls avoid using general phrases that might be used for all articles. (In general, I liked this article, because it describes methods of solving one of the important problems, I also liked the structure of writing. I will recommend my friends to read this article, because nowadays it is quite useful). The conclusion should be derived from the contents of the article.

·        #179

Lebedeva E. (Friday, 03 June 2022 19:51)

To Neblienko V. / RZ-212 / Thanks for the work. Go on working.

·        #178

Botsaniuk Ivan RZ-211 (Gvozd O.V) (Friday, 03 June 2022 13:51)

Debt for 24.05
Exam topic #11 “The differences between a software and hardware firewall”.
Hardware firewalls allow you to protect your entire network from the outside world with a single physical device. This device is installed between your computer network and the internet. A hardware firewall monitors packets of data as they are transmitted. The firewall then blocks or transfers the data, according to predefined rules. Dedicated hardware firewalls require advanced IT knowledge to install and usually require a dedicated IT employee or department to monitor and manage once installed.
A software firewall is installed on an individual computer and it protects that single device. If multiple computers need protection, the software must be installed on each device. A software firewall controls the behavior of specific applications. Software firewalls are also useful If a threat does manage to infect a computer, as it can protect the other computers connected to the same network. Since they are easier to install, many home and SMB users will utilize a software firewall.
https://voca.ro/1oHQDrlCxAsb

Review
Today I have read the article “Unglitching the system: Advancement in predicting software vulnerabilities”. Software vulnerabilities are prevalent across all systems that are built using source codes, causing a variety of problems including deadlock, hacking or even system failures. To help combat this, researchers developed the LineVul approach and found it increased accuracy in predicting software vulnerabilities by more than 300% while spending only half the usual amount of time and effort, when compared to current best-in-class prediction tools. LineVul is also able to guard against the top 25 most dangerous and common weaknesses in source codes, and can be applied broadly to strengthen cybersecurity across any application built with source code. I think that this approach would be very useful because it helps to predict the most critical areas of vulnerability and to specifically identify the location of vulnerabilities down to the exact line of code.
https://voca.ro/16bT51BllGfy

Phrases
by means of
The demographic data were gathered by means of a survey (Демографічні дані були зібрані за допомогою опитування).
the main objective
The main objective of private industry is to generate income (Основна мета приватної промисловості - отримання доходу).
published in
Articles published in Nature have an exceptionally wide impact, both among scientists and, frequently, among the general public (Статті, опубліковані в Nature, мають надзвичайно широкий вплив як серед науковців, так і, часто, серед широкої громадськості).
https://voca.ro/1jk3Ts8pcDGX

·        #177

Botsaniuk Ivan RZ-211 (Gvozd O.V) (Friday, 03 June 2022 13:50)

Debt for 31.05.
Exam topic # 8 Passwords and their drawbacks.
There are three main drawbacks of passwords: 1) passwords are prone to brute force attacks. This means that a program literally reads through a provided dictionary of terms, trying each word until the correct combination of characters breaks the password. Typically, protecting yourself from these attacks requires you to create complex passwords which can be hard to remember. 2) Storage and Encryption. When you use password authentication, you must store passwords and usernames in a database to authenticate users. If you don't have strong server security, someone can break into the database and read the passwords.
3)Secrecy and Public Use. First, someone physically near you may look over your shoulder and read your password, or look at your keyboard and note your key strokes. Second, someone connected to the network might try to intercept your password information
https://voca.ro/19mm2EkptvsQ

article
Today I have read the article “How randomly moving electrons can improve cyber security”. Almost everything we do on the internet is encrypted for security. The strength of this encryption depends on the quality of random number generation. Encrypted information can be decoded only by authorized users who have access to a cryptographic "key." But the key needs to be unpredictable and, therefore, randomly generated to resist hacking. In device developed by researchers, random numbers are generated using the random motion of electrons. It consists of an artificial electron trap constructed by stacking atomically-thin layers of materials like black phosphorus and graphene.
https://techxplore.com/news/2022-05-randomly-electrons-cyber.html
https://voca.ro/1gkqSIp03Ujg

1)considerable disagreement
Finding considerable disagreement, he asks how we should teach the NOS if there is no consensus on the matter.(Знайшовши значні розбіжності, він запитує, як ми повинні навчати NOS, якщо немає консенсусу з цього питання.)
2)controversial question
On the controversial question of countermeasures, he felt the draft articles represented a considerable improvement.(Щодо спірного питання про контрзаходи, він вважає, що проекти статей представляють значне покращення.)
3)conduct research
The aim was to conduct research and establish a dialogue on reforming the international financial system with a view to reducing financial volatility.(Метою було провести дослідження та налагодити діалог щодо реформування міжнародної фінансової системи з метою зменшення фінансової нестабільності.)
https://voca.ro/1lQLgQHGmRia

·        #176

Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 13:37)

Today i've read the article "Sony's AI system GT Sophy beats 95% of human competitors at Gran Turismo Sport"

the article tells about A collaboration between engineers at Sony AI, Polyphony Digital Inc.
and Sony Interactive Entertainment has led to the development of an AI application called GT Sophy
that is capable of playing the Formula I car racing video game Gran Turismo Sport.
Scientists say driving a Formula 1 race car is a really difficult task. Drivers not only have to understand the intricacies of driving,
but also have to contend with the unpredictable behavior of their competitors and often with dizzying calls from officials.
Announcing its press release , Sony noted that in addition to the technical breakthroughs made in developing the application,
the company also demonstrated how artificial intelligence systems can improve the overall experience for players.
This article is worth reading to keep up with the latest developments in the world of motorsports.

https://techxplore.com/news/2022-02-sony-ai-gt-sophy-human.html
https://voca.ro/1etb5xMsqhLk

1)when compared

This product has extended and faster-acting functions when compared to other testosterone esters.

2)case studies

The case studies illustrate different approaches that countries take to implementing IFRS.

3)multiple levels

And the beauty of the book is that it works on multiple levels.

https://voca.ro/18oyOpcyTWxz

·        #175

Denis Tsvetkov (Vorobyova RZ-213) (Friday, 03 June 2022 12:55)

Відпрацювання
Стаття : https://www.zdnet.com/article/if-we-put-computers-in-our-brains-strange-things-might-happen-to-our-minds/
Today I have read the article "If we put computers in our brains, strange things might happen to our minds"
This article is about how the human brain is incredibly adaptable. Thanks to this, it can interact with an additional chip attached to the brain. And also that with the help of this ability of the brain it will be possible to restore some of its capabilities. For example, to help people with injuries of the brain and spinal cord overcome paralysis of the limbs or loss of touch in parts of the body.
I believe that this technology can help both in medicine and in everyday life, and in the future it can help make new scientific discoveries.
Голосове : https://voca.ro/1dTvQmv48F2d

·        #174

Denis Tsvetkov (Vorobyova RZ-213) (Friday, 03 June 2022 12:52)

Відпрацювання
Стаття : https://phys.org/news/2021-11-smart-octopus.html
Today i have read article "How smart is an octopus?"This article about how researchers from the University of Queensland have discovered octopuses' unique brainpower. They have studied several species that lived in different environments and interacted with other animals with varying frequencies. The study has shown that active interaction means more complex behavior comparable to that of small mammals. It was also determined that larger brain's surface area indicates more intricate cognitive abilities.
This article does a great job of shedding light on complexity of the octopus' nervous system. To my mind, we know too little about marine life and the ocean itself to set our minds on space.
Голосове : https://voca.ro/16yLgjBPZl2l

·        #173

Denis Tsvetkov (Vorobyova RZ-213) (Friday, 03 June 2022 12:51)

Відпрацювання
Стаття : https://theconversation.com/six-areas-where-action-must-focus-to-rescue-this-planet-170885.
Today I read the article "Six areas where actions should be concentrated to save this planet." This article deals with a document that consists of six levels at which environmental action should be taken. These six areas are energy production, natural climate solutions, pollutants, food system reform, population stability and economic reform. You can read exactly what actions need to be taken to prevent global devastation. The main point of this document is to draw attention to global problems and encourage people to do something useful for our planet. In conclusion, I want to say that it is important for all of us to unite and act as a truly effective cooperation.
Голосове : https://voca.ro/1okct2CKJPQk

·        #172

Denis Tsvetkov (Vorobyova RZ-213) (Friday, 03 June 2022 12:50)

Відпрацювання
Стаття : https://phys.org/news/2022-01-method-enzymes-ability-catalyze-new-to-nature.html
Today I have read an article ”Researchers develop a method that gives enzymes the ability to catalyze new-to-nature reactions”.Enzymes are the preferred natural catalysts and can catalyze reactions with surprising selectivity.Yang and his research team have developed a method by which certain enzymes can be coaxed into facilitating useful reactions that were never previously observed in the biological world, thereby widening their repertoire and opening possibilities for processes never before conducted by enzymes.The overall goal of the researchers is to apply the developed biocatalysts in the pharmaceutical and agrochemical industries.I fully agree with Associate Professor Yang that with the help of new tools we will be able to develop valuable medicines and herbicides that will be useful for our society.
Голосове : https://voca.ro/1motAjwszL8U

·        #171

Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:48)

Відпрацювання
Стаття : https://phys.org/news/2021-07-teacher-burnout-exodus.html
Today I have read a short article called "Scientists Find Out That Burnout Teachers Lead to Mass Quit." The teaching profession is very difficult psychologically and many young teachers leave their jobs within 5 years. This problem especially gained scale after the spread of COVID-19. Psychologists argue that teacher burnout occurs in three stages: emotional exhaustion, depersonalization, and declining academic performance. Undoubtedly, the profession of a teacher is very important and valuable for us, although many do not understand this. protecting teachers from burnout should be a central element of international policy to reduce teacher turnover.
Голосове : https://voca.ro/15mL9U7jWyIM

·        #170

Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:46)

Відпрацювання
Стаття : https://techxplore.com/news/2021-09-smart-city.html
Today I have read the article "Moving through a smart city." This is a very interesting article, thanks to which I learned a lot of new interesting and useful information.
This article discusses how to minimize the harmful effects of exhaust gases in modern cities. Nowadays, this problem is quite relevant, as cars account for a significant share of all environmental pollutants.
In general, I liked this article, because it describes methods of solving one of the important problems, I also liked the structure of writing. I will recommend my friends to read this article, because nowadays it is quite useful.
Голосове : https://voca.ro/1btAUIvvleBA

·        #169

Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:46)

Відпрацювання
Стаття : https://techxplore.com/news/2020-09-5g-networks-health.html
Today I read an article ”5G networks: are there health risks?”.This article raised such questions as: "What is 5G?"; "Special concerns about 5G?".5G is a network that promises an exponential jump in the amount and speed of wireless data transfer, and therefore more antennas will be required to communicate with phones, as the 5G signal is blocked by buildings.Phones, TVs and other electrical devices emit radiation, and with the 5G network, the WHO says no radiation was detected during studies.5G networks currently use frequencies close to those of Wi-Fi, but they will eventually use much higher frequencies.I believe that 5G is a very important step for more advanced technologies in the future.
Голосове : https://voca.ro/1c6uZ204Nj0Q

·        #168

Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:45)

Відпрацювання
Стаття : https://phys.org/news/2022-04-composition-glasses.html
Today I have read the article "Improving the composition of radiation protection glasses".It's about borate glasses, which are used in scintillation detectors of ionizing radiation and for radiation protection.Boron oxide glass is an environmentally friendly alternative to lead glass.But they have a low density, which is one of the most important factors affecting the quality of radiation protection.Also, they have the ability of the shielding material to attenuate the passing gamma or X-ray radiation increases with increasing concentration of cadmium in the glass composition.The fact that a high level of consumption is important for the consumption of glass has been revealed, since such glasses are used in a variety of cases.
Голосове : https://voca.ro/1ee7MSLYNg0h

·        #167

Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:44)

Відпрацювання
Стаття:https://www.sciencedaily.com/releases/2022/04/220422094315.htm
Today I’ve read the article “Water processing: Light helps degrade hormones”.Micropollutants in water often are hormones that accumulate in the environment and may have negative impacts on humans and animals. Researchers of Karlsruhe Institute of Technology (KIT) and Leibniz Institute of Surface Engineering (IOM) in Leipzig have now developed a process for the photocatalytic degradation of these pollutants when they flow through polymer membranes. It is presented in Nature Nanotechnology. Irradiation with light triggers a chemical reaction, as a result of which steroid hormones are degraded on the membranes coated with titanium dioxide. "Supplying people with clean drinking water presently is one of the most important challenges worldwide," says Professor Andrea Iris Schäfer, Head of Institute for Advanced Membrane Technology.
Голосове : https://voca.ro/1lQfDvwd2ZNC

·        #166

Neblienko V. / RZ-212 / Lebedeva (Friday, 03 June 2022 12:41)

(Отработка за 12.05.2022)
Exam topic #10 Software firewall.
A software firewall is a firewall that is installed on a computer or server and is responsible for network security. It works with a wide range of other security technology solutions to provide stronger, more consistent security for businesses of all sizes.
When a software firewall is installed on a server, it expands like an umbrella to protect all other computers connected to the network. It can monitor both incoming and outgoing traffic for potential risk or suspicious user behavior, and greatly simplifies, speeds up, and makes setting up security policies more flexible.

Vocaroo: https://voca.ro/1cFEpgPskJFS

·        #165

Neblienko V. / RZ-212 / Lebedeva (Friday, 03 June 2022 12:25)

(Отработка за 12.05.2022)
Today i have read the article titled: 'Societies living in harsh environments more likely to believe in moralizing gods, study finds'. This text talks about a new study that is not tied to the paradigm that the less food a person has, the more likely he is to believe in some kind of deity, which, according to belief, will descend on him and give him everything he needs. "When life is tough or when it's uncertain, people believe in big gods," says Russell Gray, a professor at the University of Auckland and a founding director of the Max Planck Institute for History and the Sciences in Jena, Germany. "Prosocial behavior maybe helps people do well in harsh or unpredictable environments." In my opinion, this is true, because in hopelessness a person turns specifically to the 'higher powers'.

Article: https://phys.org/news/2014-11-societies-harsh-environments-moralizing-gods.html
Vocaroo: https://voca.ro/1lN85LNqjAO1

Phrases:

considerable disagreement

However, there was considerable disagreement among participants on the value of some of the unconventional actions being taken by young people instead.

Тем не менее среди участников отмечались существенные разногласия по вопросу о достоинствах некоторых из нетрадиционных мер, принимаемых взамен молодыми людьми.

conduct research

Also, ISAR welcomed voluntary contributions by Governments and/or organizations to conduct research and studies on environmental accounting.

Кроме того, МСУО приветствовала добровольные взносы правительств и/или организаций для проведения исследований в области экологического учета.

controversial question

Another controversial question within the Liability Convention relates to the provisions on the applicable law.

Применительно к Конвенции об ответственности возникает и другой спорный вопрос, связанный с положениями, касающимися применимого права.

Vocaroo: https://voca.ro/1fy8vMP3tyIT

·        #164

Gorbatiuk Stanislav RZ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:07)

1. Considerable disagreement
While progress has been made, considerable disagreement remained with regard to a number of crucial issues. Хоча було досягнуто прогресу, залишаються значні розбіжності щодо низки важливих питань.
2. Under international law, all countries have the right to conduct research and develop their scientific capabilities for the peaceful uses of nuclear energy. Відповідно до міжнародного права всі країни мають право проводити дослідження та розвивати свої наукові можливості для мирного використання ядерної енергії.
3. Their work has provided new insights into the controversial question of whether the languages we speak shape the way we think. Їхня робота дала нове розуміння суперечливого питання про те, чи мови, якими ми розмовляємо, формують наш спосіб мислення.
https://voca.ro/15XiXZqyImAN

Today I've read the article, which is titled "Robots may run future farms, researchers say". This article tells us about how two University of Florida professors say robots and information technology will rule the roost on farms in the coming years. In the face of global challenges to produce more food, more sustainably, the researchers urge scientists and growers to radically rethink their approaches to farming. Robots and drones that could operate autonomously 24/7, may also collect large amounts of farm data and carry out tasks on the field. The collected information can be used to optimize food production and resource use, the researchers say, resulting in higher yields with less fertilizer and pesticides. It definitely opens up new opportunities for other jobs like developing and maintaining robots, drones, software and more.
https://techxplore.com/news/2019-02-robots-future-farms.html
https://voca.ro/1lFqp8JLNMgM

·        #163

Igor Rudko (RZ-213) (S.Mykhailiuk) (Friday, 03 June 2022 12:05)

Audio: https://voca.ro/1l0INkGngAwW
Article: https://techxplore.com/news/2022-05-cyber-intrusion-industrial.html
Today I have read the article: "A cyber security intrusion detection system for industrial control systems". Some group of scientists has developed technology to help industry and government detect cyber threats to networks used in critical infrastructure and manufacturing systems. By the way, the new algorithms applied to the test network recognized normal Modbus or TCP traffic and identified cyberattack vectors such as out-of-band timing, address probing, and data fuzzing or manipulation. The algorithms classify data packets as "regular" if they come from an uncompromised industrial control device or "attack" if the source is an unexpected or compromised device. In my opinion, it is really great that scientific society is interested in privacy problems and trying to secure company's data
Phrases
Audio: https://voca.ro/17Md2U0JOPWz
1) conduct research - провести дослідження
Scientists trained an AI agent—an autonomous computational program that observes and acts—how to conduct research experiments at superhuman levels by using the same approach - Вчені навчили агента штучного інтелекту — автономну обчислювальну програму, яка спостерігає та діє — як проводити дослідницькі експерименти на надлюдських рівнях, використовуючи той самий підхід
2) considerable disagreement - значні розбіжності
When researchers discuss the forces that shaped human history, there is considerable disagreement as to whether our behavior is primarily determined by culture or by the environment - Коли дослідники обговорюють сили, які сформували історію людства, виникають значні розбіжності щодо того, чи наша поведінка визначається насамперед культурою чи навколишнім середовищем.
3) controversial question - спірне питання
Scientists have been searching for answers for years—mainly to the very controversial question of whether the planets play a role in solar activity. - Вчені роками шукали відповіді — в основному на дуже суперечливе питання про те, чи відіграють планети роль у сонячній активності.

·        #162

Kate Syrbu RZ-213 (S.Mykhailiuk) (Friday, 03 June 2022 11:53)

1) conduct research - провести дослідження;
It also has the authority to conduct research and studies and to carry out construction projects.
Він також має повноваження проводити дослідження та виконувати будівельні проекти.
2) considerable disagreement - значні розбіжності;
There was considerable disagreement regarding the definition of terrorism.
Існували значні розбіжності щодо визначення тероризму.
3) controversial question - спірне питання;
A good example is the potentially controversial question of prevention.
Хорошим прикладом є потенційно спірне питання профілактики.
https://voca.ro/1nCMWM3WaVbp

Exam topic #18
Special protection schemes (SPS) are designed to detect abnormal system conditions and take predetermined, corrective action (other than the isolation of faulted elements) to preserve system integrity and provide
acceptable system performance. SPS generally refers to controllers having some or all of the following characteristics:
- SPS can be armed or disarmed depending on the system conditions.
- SPS usually employ discrete, feed-forward control laws.
- The control action taken is predetermined in most cases.
In my opinion, protection schemes are necessary devices that are used to protect the power systems from faults.

https://voca.ro/1mWAqMwfmU3a

·        #161

Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:30)

The main protective mechanisms are activities aimed at ensuring engineering measures of confidentiality, integrity and availability of information. Protective mechanisms are divided into:
Physical - various engineering tools and structures that complicate or eliminate the physical intrusion of offenders into objects of protection and into material carriers of confidential information;
Hardware - mechanical, electrical, electronic and other devices designed to protect information from leakage, disclosure, modification, destruction, as well as counteraction to technical intelligence;
Software - special programs for computers that implement the functions of protecting information from unauthorized access, copying, modification, destruction and blocking;
Cryptographic - technical and software means of data encryption based on the use of various mathematical and algorithmic methods;
When combined, these three mechanisms provide very strong protection of data and computers.
https://voca.ro/1ivwiKOxaqX1
There was considerable disagreement regarding the definition of terrorism.

They shipped it here to conduct research.

A good example is the potentially controversial question of prevention.
https://voca.ro/11sJ2zPSfZK8

·        #160

Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:25)

Today i've read the article "Researchers propose novel blind source separation framework for sound mixing"

the article tells about A Blind source separation (BSS) aims to estimate source signals from observed
mixtures without prior information about the source or mixing system.
Recently, researchers from the Institute of Acoustics of the Chinese Academy of Sciences (IACAS)
proposed a BSS framework based on the frequency-domain convolution transfer function, which provides
a new idea for solving the BSS problem in highly reverberant environments.
Without employing the narrowband assumption, they approximated the time-domain convolutive mixture using
a frequency-wise convolutive mixture, and proposed a convolution transfer function (CTF)-based multichannel
nonnegative matrix factorization (MNMF) framework for BSS in highly reverberant environments.
This article is worth reading for people who are into music to keep up to date with new sound mixing systems.

https://techxplore.com/news/2022-03-source-framework.html
https://voca.ro/17tjHvY8PdJ7


1)the main objective

The review had found that the main objective of offshoring was cost-saving.

2)by means of

The information can be extracted by means of your suffering.

3)published in

The latest progress report on combating social exclusion was published in February 2007.

https://voca.ro/19J04WPzfzK4

·        #159

Shpychka Olecksandr/ RZ-213 (S.Mykhailiuk) (Friday, 03 June 2022 11:22)

Article: https://techxplore.com/news/2022-03-cyberattacks-requires-smarter-approach.html
Audio: https://voca.ro/16Bmt1ss3Zgi
Today i have read the article: "Protection against cyberattacks requires smarter approach"
From the article, we learn that companies often neglect the security of their data. This is due to the fact that not so much money is allocated for cybersecurity. Many companies are investing in security practices that were previously used by other companies. By doing so, they expose themselves to data leakage, which can often be very secret. And because of this, they lose even more money.
In my opinion, in order to limit themselves from the risks of cyber attacks, companies should properly invest in their security.


Phrases of the day:
1)conduct research
Scientists are going to conduct research of cybersecurity in the company.
(Вчені планують провести дослідження кібербезпеки у компанії.)
2)controversial questions
There are controversial questions in the topic of algorithms.
(У темі алгоритмів є спірні питання.)
3)considerable disagreement
There are considerable disagreement on each of these aspects of the strategy.
(Існують значні розбіжності щодо кожного з цих аспектів стратегії.)
Audio: https://voca.ro/11iOW6Nl1Gws

·        #158

Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:22)

Different protection mechanisms.

The article is devoted to the little-studied problem of mass psychological defense mechanisms. Despite the achievements of world psychology,
this problem remains an "unknown land" for the humanities. A description is given of the functioning of all the basic defense mechanisms of civilization,
as enshrined in its system-forming parts, such as politics, ideology, religion, philosophy, and everyday practice. Examples of projection, introjection,
idealization, sublimation, identification, rationalization, retroflexion, confluence, etc. are given. Psychological protection is a necessary characteristic of culture,
which provides answers to various civilizational challenges and reduces the likelihood of crisis risks. The further existence and development of civilization,
will lead to the emergence of new forms of protective mechanisms, so a broad strengthening of existing ones is required.

https://voca.ro/1mG35emKQU6L


1)little is known about

Very little is known about fighting elsewhere in this vast territory.

2)main limitation

As you can see the process is very simple to implement, let's see now what is the main limitation.

3)based partly on

Our drive systems are based partly on magnetic and gravitational principles.

https://voca.ro/1koFi4HQSXVt

·        #157

Bogdan Gorbatiy RZ-211 (Vorobyova E. V.) (Friday, 03 June 2022 11:20)

Today i've read the article "Sony's AI system GT Sophy beats 95% of human competitors at Gran Turismo Sport"

the article tells about A collaboration between engineers at Sony AI, Polyphony Digital Inc.
and Sony Interactive Entertainment has led to the development of an AI application called GT Sophy
that is capable of playing the Formula I car racing video game Gran Turismo Sport.
Scientists say driving a Formula 1 race car is a really difficult task. Drivers not only have to understand the intricacies of driving,
but also have to contend with the unpredictable behavior of their competitors and often with dizzying calls from officials.
Announcing its press release , Sony noted that in addition to the technical breakthroughs made in developing the application,
the company also demonstrated how artificial intelligence systems can improve the overall experience for players.
This article is worth reading to keep up with the latest developments in the world of motorsports.

https://techxplore.com/news/2022-02-sony-ai-gt-sophy-human.html
https://voca.ro/1etb5xMsqhLk

1)when compared

This product has extended and faster-acting functions when compared to other testosterone esters.

2)case studies

The case studies illustrate different approaches that countries take to implementing IFRS.

3)multiple levels

And the beauty of the book is that it works on multiple levels.

https://voca.ro/18oyOpcyTWxz

·        #156

Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:13)

today i have read the article "Google Cloud unveils Healthcare Data Engine for a holistic view of health data"
this article is about the new development of google in the field of medicine. According to them, this invention helps to work faster with patient data. thanks to this, you can find out everything about the client, from his simple illnesses to clinical.
doctors say that for them a quick search for information about patients is a priority, as this will speed up their work. in addition, many companies have supported this idea and cooperate with hospitals.
This article really impressed me. I think this development is very important and useful today and i like that medicine is upgrading.
https://www.zdnet.com/article/google-cloud-unveils-healthcare-data-engine-for-a-holistic-view-of-health-data/
https://voca.ro/1MT4PLWJPkxf
The report concludes by outlining briefly major issues in the financing of the sectoral clusters under review

Anti-personnel mines are classified as excessively injurious weapons.

He knows technical details beyond the scope of his job
https://voca.ro/1i4CrCGPCoCN

·        #155

Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:09)

The primary principles of information protection form a triad-like model consisting of three main components: confidentiality, integrity and availability.
The principle of confidentiality asserts that the information in question is secure from any unauthorized access to it, and is kept secret.
Information integrity refers to the certainty that the information is not tampered or degraded, during and after submission or while working with it.
Availability of information suggests not only that the information is available to the authorized user when it is needed, but also that it doesn't compromise any information security in the process of delivering information to the user.
https://voca.ro/1jc4jv81Wkjt
1) It is impossible to conduct research with the conditions imposed by superiors.

2) Comprehensive investigation can be carried out only after the internal one.

3) Comparative investigation of goods and services should be held regularly.

https://voca.ro/18oJwAYSnDUY

·        #154

Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 03 June 2022 11:09)

Prhases of Day
considerable disagreement(значні розбіжності): https://voca.ro/101jTZiTnHG8
There's been considerable disagreement among lawmakers and the space community on how best to accomplish this.
Між законодавцями та космічним співтовариством виникли значні розбіжності щодо того, як найкраще цього досягти.


conduct research(провести дослідження) : https://voca.ro/18yH6JO7eu1z
Data centers form the "cloud" that helps people stream movies, conduct research at the touch of a button, buy things and store photos and videos
Центри обробки даних утворюють «хмару», яка допомагає людям транслювати фільми, проводити дослідження одним натисканням кнопки, купувати речі та зберігати фотографії та відео


controversial question(спірне питання) : https://voca.ro/1mhnD3LunZLZ
In particular, how the disease is transmitted to great apes was a controversial question until now.
Зокрема, питання про те, як ця хвороба передається людиноподібним мавпам, досі було спірним.

Article: https://phys.org/news/2015-10-cyberattack.html
Audio: https://voca.ro/1fmW5CXT4MhH
Today, I have had an opportunity to read the article about the things you need to know to prevent cyberattacks.
First, we all need to understand that there is no perfect security system, and therefore there is always a risk of hacking, or cyber attacks
The next thing that is mentioned is the security update of systems, software, telephony and more. Because this ensures that certain vulnerabilities in the system have been fixed.
As a result, you should not use software or operating systems that are not supported such as Windows XP.
But in my opinion, the most important thing is to use different passwords, different computers for work and other things, not to open unknown sites or software and not to give them access to the system
I am sure that these tips will help reduce the risk of hacking and cyber attacks to a minimum.

·        #153

Anna Yakymova/ RZ-213(S.Mykhailiuk) (Friday, 03 June 2022 11:01)

Phrases of the day:
1) controversial question - спірне питання
Whether fishes are sentient beings remains an unresolved and controversial question.
(Чи є риби розумними істотами, залишається невирішеним і суперечливим питанням.)
Links: https://phys.org/news/2015-11-fish-emotional-fever.html
https://voca.ro/15R5ZUqCCBqW
2) conduct research - провести дослідження
But lack of connectivity severely hinders an organization's ability to perform simple functions, conduct research, and compete for grants.
(Але відсутність зв’язку серйозно заважає організації виконувати прості функції, проводити дослідження та змагатися за гранти.)
Links: https://techxplore.com/news/2020-10-internet-oxygen.html
https://voca.ro/1mT3bx2NSQAL
3) considerable disagreement - значні розбіжності
Even in a small organization, there is likely to be considerable disagreement on each of these aspects of strategy.
(Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо кожного з цих аспектів стратегії.)
Links: https://phys.org/news/2019-12-social-efforts-effective.html
https://voca.ro/16q63F9fYOo0
Review:
Today I’ve read the article “Robots may run future farms, researchers say”. It tells about the automation of agriculture with the help of drones and robots. This solution can reduce labor costs. Robots will also be a good replacement for the tractor, as heavy machinery used in place of higher labor costs has compacted the soil, resulting in slower root growth, reduced soil fertility, and ultimately lower yields. Drones will be able to collect large amounts of farm data.
I think this is a great idea, as it will make food cheaper and give rise to new professions.
links : https://techxplore.com/news/2019-02-robots-future-farms.html
https://voca.ro/15FeqAm68ZXe

·        #152

Chabanenko Ksenia RZ-213(S.Mykhailiuk) (Friday, 03 June 2022 11:01)

1.considerable disagreement - значні розбіжності/суперечки ;
There was considerable disagreement over several key sections of the project among the researchers.-Серед дослідників виникли значні розбіжності щодо кількох ключових розділів проекту.
2.conduct research-провести дослідження;
The university enjoys facilities and expertise to conduct research in the field of protection of the data.-Університет має засоби та досвід для проведення досліджень у сфері захисту даних.
3.controversial question -спірне питання;
Which of the information protection measures are most successfully used is the controversial question that is prevalent among experts.-Які із засобів захисту інформації використовуються найбільш успішно – спірне питання, яке переважає серед експертів.
https://voca.ro/12QdokjZD2Wr
Exam topic #16( The Essentials of Information Protection)
Present-day realities of the information society determine the necessity of protecting the informaton from unauthorised access, use, disclosure, disruption, modification, or destruction. The CIA triad is a model designed to guide policies for information security and consists of three main principles :confidentiality, integrity and availability. Information security policy should be end to end and it should cover all software, hardware devices, physical parameters, human resource, information/data, access control, etc.Whenever there is a major change in the organization, it should be ensured that the new updates are addressed in the policy as well. Incorporating the risk assessment is also the priority purpose. So, the information protection is based on the principles and includes above-mentioned characteristics that provide a good basis for further protection.
https://voca.ro/1leatmIRxN2p

·        #151

Anton Ardelyan RZ-211(Gvozd O.V.) 24.05 (Friday, 03 June 2022 10:32)

Today i have read the article "New method ensures complex programs are bug-free without testing": a collaborative effort between Microsoft, the University of Michigan and Carnegie Mellon University was recognized by the ACM's Programming Language Design and Implementation group with a Distinguished Paper Award for a method that ensures complex computer programs are bug-free without having to test them. The method uses a technique called formal verification to prove whether a piece of software would output the intended result.
Link: https://techxplore.com/news/2020-06-method-complex-bug-free.html
Audio: https://voca.ro/13LwsD3BiMKV
Phrases:
1)They also conduct research on the same.
Вони також проводять дослідження з цього приводу.
2)There is considerable disagreement about how much overcapacity exists.
Існують значні розбіжності щодо того, скільки існує надлишкових потужностей.
3)This highly controversial question was finally resolved.
Це дуже суперечливе питання було нарешті вирішене.
Audio: https://voca.ro/1bh6AnQ2YbQB

·        #150

Neblienko V. / RZ-212 / Lebedeva (Thursday, 02 June 2022 21:46)

Exam topic #12 Hardware firewall.

A hardware firewall is a physical appliance that is deployed to enforce a network boundary. All network links crossing this boundary pass through this firewall, which enables it to perform inspection of both inbound and outbound network traffic and enforce access controls and other security policies.
These firewalls, which contain both the hardware and software features necessary to enforce a network boundary, can offer a variety of different networking and security features, including URL filtering, an intrusion prevention system (IPS), and even Wi-Fi support.
Therefore, the dexterity of protecting networks and the use of security and protection of all kinds of traffic.

Vocaroo: https://voca.ro/13UieMAzI5Wu

·        #149

Neblienko V. / RZ-212 / Lebedeva (Thursday, 02 June 2022 21:23)

Today i have read the article titled: What we knew about water was right after all. This text tells about the manifestation of record-breaking small drops of hydrogen peroxide in water drops, the size of a micrometer.
The air-water interface is a crucial site for numerous natural, domestic and industrial processes such as ocean-atmosphere exchange, cloud and dew formation, aerated beverages and bioreactors. Yet, probing chemical transformations at the air-water interface is challenging due to the lack of surface-specific techniques or computational models.
In my opinion, it is quite possible to adapt this record in the right direction, despite the fact that there are no special methods for studying the air-water type.

Article: https://phys.org/news/2022-02-knew.html
Vocaroo: https://voca.ro/1nJf3LbUh3b6

Phrases:

comprehensive investigation of

The Secretary-General informed the Council that a more comprehensive investigation of the 5 June 1993 incident was being undertaken.

Генеральный секретарь информировал Совет о том, что ведется более широкое расследование инцидента, произошедшего 5 июня 1993 года.

condition imposed by

This new condition imposed by the Committee raises some difficult legal issues.

Выдвижение Комитетом такого нового условия не может не привести к возникновению серьезных юридических трудностей.

comparative investigation of

Stiftung Warentest carries out more than 200 comparative product tests and investigations of services from nearly all areas of everyday life every year.

Ежегодно Штифтунг Варентест проводит более 200 испытаний качества товаров и услуг, представляющих почти все сферы повседневной жизни.

Vocaroo: https://voca.ro/1491MVpmDpKH

·        #148

S.Mykhailiuk (Thursday, 02 June 2022 20:44)

To Anna Yakymova/ RZ-213 just good for two tasks. Thanks.

·        #147

S.Mykhailiuk (Thursday, 02 June 2022 20:38)

To Eugene Chervony RT-212 You’ve broke a record today! For all your activities you’ve earned 80 points.

·        #146

S.Mykhailiuk (Thursday, 02 June 2022 20:27)

To Tomchishina Polina RT-212

DEBT
Exam topic #12,
Benefits of Satellite TV + #9 are good.

·        #145

S.Mykhailiuk (Thursday, 02 June 2022 20:20)

To Tomchishina Polina RT-212 Thanks just 80 points.

·        #144

S.Mykhailiuk (Thursday, 02 June 2022 20:18)

To Stanislav Popik РТ-212 Task1 just 75 points .Talking about the transistor, one has to mention the elements - A small electronic device containing a semiconductor and having at least three electrical contacts, used in a circuit as an amplifier, detector, or switch.

·        #143

S.Mykhailiuk (Thursday, 02 June 2022 20:06)

To Tomchishina Polina RT-212 just 82 poi nuts for exam topics. Thanks

·        #142

S.Mykhailiuk (Thursday, 02 June 2022 19:59)

To Stanislav Popik РТ-212 Just good. Try to formulate the sentence clearer ( analog to digital transitions....).

·        #141

Popovych E. (Thursday, 02 June 2022 19:56)

To Povoznikov Artem RZ-212
Artem, thank you for your comment and voice message. But mind, pls, the exam topic and the comment are too long. It should include up to 100 words. Use Word Count Tool to check it. Go on working.

·        #140

S.Mykhailiuk (Thursday, 02 June 2022 19:50)

To Sergey Kyznyak RT-211, pls expand your vocabulary .” Allow-allows)”. Train your pronunciation before you record msg. Mind the word: an-ˈte-nə\ noun
(plural an·ten·nae \-(ˌ)nē).just satisfactory.

·        #139

Popovych E. (Thursday, 02 June 2022 19:49)

To Timophey Sipin RZ-212
Exam topic #20 (Principles of information protection) is well done.
Thank you, your comment, audio are quite correct as well as sentences with Phrases

·        #138

Popovych E. (Thursday, 02 June 2022 19:47)

To Kate Kholodova (RZ-212)
Exam topic #12 (8/10) Hardware firewall is well done.
Thank you, you have successfully completed the task.

·        #137

S.Mykhailiuk (Thursday, 02 June 2022 18:29)

To Pishtoi Misha (PT-212) Task1 on is good.

·        #136

S.Mykhailiuk (Thursday, 02 June 2022 18:22)

To Simchuk Alexey (Mykhailiuk RZ-213) Its a shallow approach, just pieces of texts. UNACCEPTED.

·        #135

S.Mykhailiuk (Thursday, 02 June 2022 18:19)

To Simchuk Alexey RZ-213 Task2 and task3 represent a piece of texts with quotes. Pls prepare thoroughly with conclusion. Just satisfactory.

·        #134

Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 18:16)

Відпрацювання 4
"Asteroid the size of a blue whale will fly past Earth in close impact on June 6", this article today made me wonder if we are safe. The asteroid is predicted to fly past Earth by more than 2 million miles. According to NASA, the asteroid is three times More blue whales will fly past Earth on Monday (June 6) at over 16,000 miles per hour (26,000 km/h).(Opens in a new tab).

The asteroid, named 2021 GT2, is predicted to safely fly past our planet more than 2.2 million miles (3.5 million kilometers), about 10 times the average distance between the Earth and the Moon. Astronomers first discovered the space rock last year and estimated its size to be between 121 and 272 feet (37 to 83 meters) wide. While that sounds like a lot — one to three times the length of a blue whale (opens in a new tab) — it's not big enough to be considered potentially dangerous to Earth.

2021 GT2 is an Aten-class asteroid, which means it orbits the Sun closer than Earth (in this case once every 342 days) and its orbital path intersects Earth's orbit. Astronomers are aware of more than 1,800 such asteroids, many of which are considered potentially dangerous. After June 6, its next close approach to Earth will occur on January 26, 2034, when the asteroid will pass within 9 million miles (14.5 million kilometers) of our planet - much further than the upcoming convergence.

An asteroid is considered a near-Earth object, a term given to asteroids and comets that orbit within 1.3 astronomical units of the Sun. (An astronomical unit is the distance between the Earth and the Sun, about 93 million miles or 149.6 million kilometers.) NASA tracks tens of thousands of these objects, predicting the paths of each from today to hundreds of years into the future. At the moment, astronomers do not think that any near-Earth objects pose a threat to the Earth.
However, scientists want to be prepared for the fact that the trajectory of a near-Earth asteroid will suddenly change after an unexpected incident - say, one near-Earth asteroid will collide with another and scatter large pieces of debris throughout the solar system.

NASA is currently testing whether it is possible to knock a large asteroid off course by hitting it with a rocket. In November 2021, NASA launched an asteroid-deflecting spacecraft called the Double Asteroid Redirection Test (DART) that will crash into the 530-foot-wide (160 m) asteroid Dimorphos in the fall of 2022. an asteroid, but it could change the rock's orbital path slightly, as Live Science previously reported.
Article:https://www.space.com/asteroid-2021-gt2-close-flyby-earth

·        #133

S.Mykhailiuk (Thursday, 02 June 2022 18:12)

To Simchuk Alexey (Mykhailiuk RZ-213) “Vcheni ochіkuyut, scho nezabarshe ... Pls don’t use Google translator as it can turn you down. Did you take the material for all comments you compiled from one source? Just satisfactory for all your tasks. Pls do it during the session scheduled.

·        #132

Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 18:07)

Відпрацювання 3
Each of us was interested in space and when people will be able to live on other planets, every year people are more and more moving towards this. One of the examples is the company "", they are trying to figure out how and why now people are not ready to live on other planets, but their the target is Mars. This is what I read about in an article titled: "SpaceX President confirms plans to land people on Mars by the end of the 2020s." She talks about how SpaceX President and COO Gwynne Shotwell reaffirmed SpaceX's goal of landing humans on Mars. She says landing humans on Mars is possible by the end of the 2020s, but landing humans on the moon could happen sooner.

NASA recently activated an option in one of its contracts with SpaceX to include the SpaceX Human Landing System design on the Artemis III mission. The space agency says it may give other aerospace agencies the opportunity to submit designs for lunar landers to ferry astronauts between lunar orbit and specific locations on the moon as part of its fledgling Sustaining Lunar Development program.
NASA plans to use the Artemis program and the Lunar Gateway to provide a more sustainable presence on the Moon than was possible during the Apollo program of the 1960s and early 1970s. NASA planned to develop more robust Apollo-based hardware for the extended lunar exploration missions that were planned under the Apollo Applications Program, but this was delayed due to budget cuts.

SpaceX's current contracts with NASA include launching the initial components of the Lunar Gateway on a Falcon Heavy rocket as early as May 2024. The company also has contracts with other aerospace companies such as Intuitive Machines to launch automated lunar landers that are being developed for NASA.

SpaceX is also working on its Starship/Super Heavy stack, which will be capable of everything from sending large payloads and people to Mars to sending cargo from point to point on Earth. Its scheduled orbital test for Starship is currently being delayed by the FAA's regulatory review process, resulting in months of delays.

If the FAA gets out of the way, SpaceX could get serious about its plans for Mars. Sending humans to Mars in ten years could be feasible if everything goes smoothly in the next few launch windows. The launch window for sending payloads (and eventually people) opens once every 26 months. In the video below, Mars Society President Robert Zubrin unveils an updated version of Mars Direct that uses SpaceX rockets as part of a cheaper plan to get humans to Mars in less time than other plans at the International Space Development Conference.
SpaceX could borrow elements from Mars Direct to get humans to Mars in less than a decade. Gwynne Shotwell mentioned that it might take a big gesture for the average person to see it's feasible: "I think we need to get a big payload to the surface of Mars and then people will start thinking more about it. … In five or six years, people will see that this is really a place to go.”
Article:https://www.redorbit.com/spacex-president-reiterates-plans-to-land-people-on-mars-by-end-of-2020s/

·        #131

S.Mykhailiuk (Thursday, 02 June 2022 18:06)

To Moskalenko Kirill(РТ-212) Task1 has no link to the article. The punctuation marks are different in English. Task2 is incomplete ( no phrases written separately) just satisfactory.

·        #130

Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 17:59)

Відпрацювання 2
We have always been scared of global warming, but not everyone knows about other planets where the temperature melts even stones. It was such an article that I came across today, it has an intrusive title, namely: "NASA is in the middle of hell: the last ones want to save the planet, on which the stone will melt." Vcheni ochіkuyut, scho nezabarshe able to report ahead to look at the "super-Earth", like 50 bright rocks in our planet.
Specialists are aware that an unprecedented look at a distant planet can be provided by the James Webb telescope, a scientific robot that will soon start in the lime.
About Phys.org. The planet under the name 55 Cancri e is moving so close to its own star, that the mind on the planet is literally similar to the description of biblical hell. Behind the words of the astronomers, the surface of the planet is constantly falling. Likewise, the planet can turn around, creating at once a thirsty mind.

"Even though the temperature on the surface of the planet is richer than the melting point of the most important rock-forming minerals, the bottom side is covered with lava oceans," according to NASA.

NASA has been assigned that nothing like this will be known until this hour in our Sonyachny system.
Let's guess, earlier in the day, ExoMiner discovered 301 exoplanets for additional neuromeasurement. The stinks added a list of 4569 planets that wrap around like distant stars, and already they were vіdomі vchenim.
Article:https://tsn.ua/nauka_it/nasa-zazirne-u-spravzhnye-peklo-doslidniki-hochut-vivchiti-planetu-na-yakiy-plavitsya-kaminnya-2076961.html

·        #129

Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 17:52)

Відпрацювання 1
"In the USA they created a controlled 0.5 mm robot," this is the title of the article that I read today and it surprised me, the University of the Northwest reported that its employees had designed a "Lilliputian" robot with the possibility of remote control. Its dimensions do not exceed half a millimeter, according to the developers, their brainchild is capable of walking, turning, tilting and jumping. The exterior of the bot resembles the shape of a crab. The average movement speed is 50% of its size per second.

The ability to move is provided, among other things, by the unique characteristics of the materials from which the robot was made. It is distinguished by such properties as shape memory and change under the influence of a rapid increase in temperature. Using a laser, you can change the shape of the robot's body and thus make it move.

The use of such developments in robotics in the near future can significantly help a number of industries, including the medical one.
Article:https://www.gismeteo.ru/news/science/v-ssha-sozdali-upravlyaemyj-0-5-millimetrovyj-robot/

·        #128

S.Mykhailiuk (Thursday, 02 June 2022 17:32)

To Sergey Kyznyak RT-211, The task contains general approach to the conclusion and has a grammar mistake ( remember :the article SAYS). Everybody has learned this.
Task2 with an unofficial language is UNACCEPTED!

·        #127

S.Mykhailiuk (Thursday, 02 June 2022 17:26)

To Moskalenko Kirill(РТ-212) The task one is incomplete and has no conclusion. Just 70 points.

·        #126

S.Mykhailiuk (Thursday, 02 June 2022 17:21)

To Khotynskiy Oleg (РЗ-212) the exam topic should be formulated by your own words and sentences. Just satisfactory. Task2 is 80 points. Keep on working hard.,

·        #125

S.Mykhailiuk (Thursday, 02 June 2022 17:08)

To Simchuk Alexey РЗ-213 The comments are too lengthy and without the conclusion. 60 points.

·        #124

Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 13:36)

Exam topic #17
A password is a personal key to a computer system. Passwords help to ensure that only authorized individuals access computer systems. Passwords also help to determine accountability for all transactions and other changes made to system resources, including data. A good password is relatively easy to remember, but hard for somebody else to guess. There are a variety of techniques we can use to choose secure passwords. There are some tips for creating a passwords:
-Passwords should be long and unique.
-Old passwords should not be re-used.
-All passwords should conform to the guidelines outlined below.

https://voca.ro/17yrweGZOsaZ

·        #123

Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 13:16)

Exam topic #16
The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad. Confidentiality measures are designed to prevent unauthorized disclosure of information. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously. Availability is the protection of a system’s ability to make software systems and data fully available when a user needs it.

https://voca.ro/1856GReabYpR

·        #122

Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 13:05)

In the 21st century, more and more mechanized and most of what a person did is already done by a robot, but can a robot replace a person’s limbs or body part, in an article titled: “Printed electronic skin based on synaptic transistors for robots so that they can feel and learn," this is exactly what the story is about. It is expected that the electronic skin (e-skin) for the next generation of robots will have a biological skin similar to multimodal perception, signal coding and pre-processing. To do this, it is extremely important to have high-quality, uniformly responsive electronic devices distributed over large areas and capable of providing synaptic behavior with long-term and short-term memory. Here we present an approach to implement synaptic transistors (12 by 14 matrix) using ZnO nanowires printed on a flexible substrate with 100% yield and high uniformity. The presented devices demonstrate synaptic behavior in response to impulse stimuli, demonstrating excitatory (inhibitory) postsynaptic current, spike frequency-dependent plasticity, and transition from short-term to long-term memory. The implemented transistors exhibit excellent biosimilar synaptic behavior and show great potential for hardware learning. This has been demonstrated using a prototype computational electronic skin composed of event-driven sensors, synaptic transistors, and firing neurons that give the robotic arm a skin-like tactile experience. Through associative learning, the presented computer electronic skin can gradually acquire a pain reflex similar to the human body. Learned behavior can be reinforced by practice. Such localized learning, similar to the peripheral nervous system, could significantly reduce data latency and reduce the cognitive load on the robotic platform. the presented computer electronic skin can gradually acquire a pain reflex similar to the human body. Learned behavior can be reinforced by practice. Such localized learning, similar to the peripheral nervous system, could significantly reduce data latency and reduce the cognitive load on the robotic platform. the presented computer electronic skin can gradually acquire a pain reflex similar to the human body. Learned behavior can be reinforced by practice. Such localized learning, similar to the peripheral nervous system, could significantly reduce data latency and reduce the cognitive load on the robotic platform.

·        #121

Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 12:52)

Exam topic #15
Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions. This authentication method provides user information automatically so applications do not need to request it of the user and the user doesn't have to provide that information separately for different applications. Claims-based identity depends on trust relationships being established between those making the claims and any relying parties. A relying party will only accept claims about a user's identity from a trusted issuer.

https://voca.ro/1nHGWJEFt4FZ

·        #120

Anton Ardelyan RZ-211(Gvozd O.V.) 10.05 (Thursday, 02 June 2022 12:47)

Today i have read the article "Researcher hacks into 35 major technology firms" a Romanian threat researcher announced that he had been able to hack into computer systems at 35 major technology firms. Alex Birsan, an independent threat researcher, claimed that he had been able to hack into computers run by some of the biggest names in the IT business—Paypal, Apple, Microsoft, Tesla and Netflix—even after he had warned them ahead of time that he would be trying.
Link: https://techxplore.com/news/2021-02-hacks-major-technology-firms.html
Audio: https://voca.ro/1ij0Z3ru6XSp
Phrases:
1)In the present study, we undertook a comparative investigation of primary cilia in cultured primary human astrocytes and compared them to those found in five human astrocytoma/glioblastoma cell lines.
У цьому дослідженні ми провели порівняльне дослідження первинних вій у культивованих первинних астроцитах людини та порівняли їх з тими, які виявлені у п’яти клітинних лініях людської астроцитоми/гліобластоми
2)This was a unilateral condition imposed by David Trimble, the leader of Ulster's main Protestant party.
Це була одностороння умова, встановлена ​​Девідом Трімблом, лідером головної протестантської партії Ольстера.
3)This study is the most comprehensive investigation of the animal reservoir of SARS," Dr. Stöhr said
Це дослідження є найповнішим дослідженням резервуару ГРВІ у тварин», - сказав доктор Штер.
Audio: https://voca.ro/1dYrhoGHDIny

·        #119

Yershova Y. (Thursday, 02 June 2022 12:33)

Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 12:09)
You did this topic on Friday, 29 April 2022 18:16

·        #118

Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 02 June 2022 12:29)

Exam topic #20 (Principles of information protection)
Information protection is the practice of preventing unauthorized access, use, disclosure, distortion, alteration, research, recording or destruction of information. There are some basic principles of it including consistency, complexity and continuity that mean the need to take into account all weaknesses and vulnerabilities, harmonize the work of heterogeneous means and take appropriate measures at all stages of the cycle.The principle of flexibility in the management and application of the protection system implies the possibility of varying the level of its protection. Also, the protection should not be achieved at the expense of secrecy according to the principle of openness of security algorithms.So, information protection is based on the above- mentioned principles which ensure success of protection system.
https://voca.ro/1iNL9IRhkXw1

·        #117

Lebedeva E. (Thursday, 02 June 2022 12:29)

To Andrey Mashovets RZ-212 Now I am waiting for the work with phrases.
Badyuk Eduard RZ-212 Well done.

·        #116

Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 12:25)

Exam topic #14
Authority check is a check to determine whether the current user of a program has a certain authorization. The check compares a value with the corresponding entries in each authorization field in an authorization object in the user master record. Check indicators control whether an authorization check is performed. The system first checks authority to the library or directory path that contains the object. If the authority to the library or directory path is adequate, the system checks authority to the object itself. In the case of database files, authority checking is done at the time the file is opened, not when each individual operation to the file is performed.

https://voca.ro/15Uo6XUY38d2

·        #115

Khotynskiy Oleg (RZ-212, S.Mykhailiuk) (Thursday, 02 June 2022 12:23)

Exam topic #3 (Different approaches to secrecy and their defects.)

The group of technical means of information protection combines hardware and software. Main:

1. Backup and remote storage of the most important data arrays in a computer system - on a regular basis;
2. Duplication and redundancy of all network subsystems that are important for the safety of data;
3. Creation of an opportunity to redistribute network resources in cases of malfunction of individual elements;
4. Ensuring the ability to use backup power supply systems;
5. Ensuring safety from fire or water damage to equipment;
6. Installing software that protects databases and other information from unauthorized access.

The set of technical measures also includes measures to ensure the physical inaccessibility of computer network objects, for example, such practical methods as equipping a room with cameras and alarms.
https://voca.ro/1cDHlkF0Yubo

1) comprehensive investigation of
This is also the reason why Ethiopia has been adamantly resisting a comprehensive investigation of all the events that led to the current crisis.
Це також є причиною того, що Ефіопія непохитно протидіє комплексному розслідуванню всіх подій, які призвели до нинішньої кризи.

2) condition imposed by
Therefore, any condition imposed by the affected State must be reasonable and must not undermine the duty to ensure protection of persons on its territory.
Тому будь-яка умова, встановлена постраждалою державою, має бути розумною і не повинна підривати обов’язок забезпечити захист осіб на її території.

3) comparative investigation of
Comparative investigations based on DNA analysis were performed by the Netherlands Forensic Institute (NFI), in response to a request made by the United Nations Mission.
Порівняльні дослідження на основі аналізу ДНК були проведені Нідерландським інститутом судової експертизи (NFI) у відповідь на запит Місії ООН.
https://voca.ro/133zdRSpl6JM

·        #114

Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 12:23)

Today I have read the article : «Artificial intelligence can help you understand music better»
Algorithms and technology have so far helped listeners to more of the same music. Now, UiO researchers are working on new technology that can get people interested in a greater musical variety. Olivier Lartillot, researcher at RITMO Center for Interdisciplinary Studies in Rhythm, Time and Motion, believes technology can expand people's taste in music through a better understanding of musical elements. He says that people often listen to the music they can understand easily, therefore some more complicated types of music become less accessible, and that's where this technology comes in.
I liked this article because I love listening to music and too have some types of music I don't want to listen to because of their complexity.
https://voca.ro/1ehLiGb7UPdp

It's comment more correctly. I prepared it for the next lesson. I'm sorry, but i always forget about links to the articles. So, this comment without link too.

·        #113

Andrey Mashovets RZ-212(Lebedeva E.) (Thursday, 02 June 2022 12:20)

Exam Topics “Different protection mechanisms”.
This article is about general information on protection mechanisms.
The purpose of this article is to understand how different security mechanisms are used in information security management.
Protection mechanisms are used to enforce layers of trust between security levels of a system. Particular to operating systems, trust levels are used to provide a structured way to compartmentalize data access and create a hierarchical order. These protection mechanisms are used to protect processes and data and are discussed in the following sections: Layering, Abstraction, Data Hiding, Encryption.
The purpose of this article is to give a notion in knowledge of the protection mechanisms used in information security.
https://voca.ro/18O5fXz1UEBQ
https://www.pearsonitcertification.com/articles/article.aspx?p=30287&seqNum=8

·        #112

Yakymova Anna / RZ-213 (Vorobyova E. V.) (Thursday, 02 June 2022 12:18)

1.
Today I've read the article "PowerPoint Live helps Microsoft Teams users present remotely". It tells us about virtual presentations. This feature became available during the coronavirus pandemic thanks to the Microsoft Teams PowerPoint Live tool. I think it is a very comfortable environment for viewing presentations. For Presenter mode places the presenter at the "front and center" of the meeting, reducing the distraction of seeing multiple guests highlighted all at once. PowerPoint Live also includes a Live Reactions feature where users can use real-time emoji to interact.
In my opinion, it is the best environment for viewing presentations because it has many useful features.
link: https://techxplore.com/news/2021-03-powerpoint-microsoft-teams-users-remotely.html
audio recording: https://voca.ro/11WcTsZmgQ4i
2.
Today I have read the article "New theoretical model accounts for sun's rotation and magnetic field" about new research of the sun.UNIGE team developed new solar model which includes not only the evolution of rotation which was probably faster in the past, but also the magnetic instabilities it creates. This model not only does rightly predict the concentration of helium in the outer layers of the sun, but it also reflects that of lithium which resisted modeling until now.
I think this research will help to analyze the sun and other stars similar to ours.
link:https://phys.org/news/2022-05-theoretical-accounts-sun-rotation-magnetic.html
audio recording: https://voca.ro/11zCNhZz1ZjX
3.
Today I have read the article "Everything we knew about water was right". What is it about?
According to the article, one way or another, water releases hydrogen peroxide, although there is not much of it. At first there was no explanation for this phenomenon and everything was dismissed as "spontaneity". But recently the reason was found: under certain conditions, hydrogen peroxide is indeed formed in the reaction with ozone and nitrogen.
To be honest, I still don't really understand where this research can be useful. Perhaps it would make sense to create some conditions in the environment.
link:https://phys.org/news/2022-02-knew.html
audio recording: https://voca.ro/1auYKJrtn0WF
4.
Today I have read the article called 'Transformational' machine learning approach could accelerate the search for new treatments for diseases. It tells about how researchers have developed a new approach to machine learning that 'learns to learn' and outperforms existing machine learning methods for drug development, which in turn could accelerate the search for new treatments for diseases.The method, called transformational machine learning (TML), was developed by a team from the UK, Sweden, India and the Netherlands. It learns from multiple problems and boosts productivity while it learns.
I think machine learning can improve all areas of our lives, even the important and difficult ones like medicine
link:https://techxplore.com/news/2021-11-approach-machine-disease-treatments.html
audio recording: https://voca.ro/15CUCVkJ7EjW
5.
Today I have read the article "What is an algorithm? How computers know what to do with data". Everyone knows that computer programs are made up of algorithms, but what are algorithms consist of? In the most general sense, an algorithm is a series of instructions telling a computer how to transform a set of facts about the world into useful information, it has three steps: input(getting information to work with), transformation(working with data), output(result). Also, over time, the algorithms become more complicated, and it’s already difficult to simply describe all the algorithms by people, so machine learning was created for it.
I found this article interesting for me.
link: https://techxplore.com/news/2020-10-algorithm.html
audio recording: https://voca.ro/1lb35F2A18Ys

·        #111

Badyuk Eduard RZ-212 (Lebedeva E.V.) (Thursday, 02 June 2022 12:13)

Exam topic #15 (The authentication of a user's claimed identity.)

Authentication process can be described in two distinct phases - identification and actual authentication. Identification phase provides a user identity to the security system. This identity is provided in the form of a user ID. The security system will search all the abstract objects that it knows and find the specific one of which the actual user is currently applying. Once this is done, the user has been identified. The fact that the user claims does not necessarily mean that this is true. An actual user can be mapped to other abstract user object in the system, and therefore be granted rights and permissions to the user and user must give evidence to prove his identity to the system. The process of determining claimed user identity by checking user-provided evidence is called authentication and the evidence which is provided by the user during process of authentication is called a credential.
https://voca.ro/1kuSwdCNnoAj

1) comprehensive investigation of
Firstly, in late 2004 the Office of the Ombudsmen initiated a comprehensive investigation into prison management.
По-перше, наприкінці 2004 року Офіс омбудсменів розпочав комплексне розслідування щодо управління в’язницею.

2) condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.

3) comparative investigation of
Stiftung Warentest carries out more than 200 comparative product tests and investigations of services from nearly all areas of everyday life every year.
Stiftung Warentest щороку проводить понад 200 порівняльних тестів продуктів і досліджень послуг майже з усіх сфер повсякденного життя.
https://voca.ro/1eeecIj43UGW

·        #110

Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 12:09)

Topic # 9 (Development of television in your home country)
In Ukraine, the first acquaintance with television occurred on February 1, 1939. The first TV-sets were mechanical, they used the so-called Nipkow discs. They had only one advantage: his programs, transmitted in the middle wave range, could be received over a vast territory. However, the quality of the mechanical television picture was worse. A new page of Ukrainian electronic television was opened only on November 6, 1951 in Kyiv, on Khreshchatyk Street, a new television center was officially put into operation, next to it there was a radio transmission tower. In those days, television, compared with today, was quite simple. There were only 3 TV channels.
https://voca.ro/1m3xyFezufLg

·        #109

Yershova Y. (Thursday, 02 June 2022 12:06)

Pishtoi Misha (PT-212) Yershova Y. (Thursday, 02 June 2022 11:59)
The comment is quite interesting, but it isn't relevant to your specialty and doesn't contain your point of view. The task with phrases is well done.

·        #108

Povoznikov Artem RZ-212 (Popovych) (Thursday, 02 June 2022 12:04)

Today i have read the article: SSD-Insider++: A firmware-based approach to thwarting ransomware attacks.
This article tells about group of scientists who promote the idea of ​​using embedded software to prevent ransomware attacks before they can encrypt user data stored on a solid state drive (SSD). About 4 years ago, the group presented their ideas at an International Conference and decided to tell a reporter about your ideas.
Ransomware is a type of program that can block access to a computer until the user sends the required amount of money to the account of the organization that unleashed the attack. Over the past year, such incidents have become more frequent, but fortunately, scientists have come up with a way to counter this using a special code.
The job involved studying the ransomware code and then writing our own code to recognize it and stop it before it encodes user data. If SSD-Insider++ recognizes a ransomware attack, all activity on the SSD will stop and allow the user to take action to mitigate the threat. Of course, you have to pay for this approach.
Scientists have already tested and found that their program is able to stop 100% of attacks and is able to prevent damage in the initial stages of its development in less than 10 seconds. It seems to me that such a program will help computer users a lot. With its help, people can not worry about the theft or damage to their data.
Text: https://techxplore.com/news/2021-09-ssd-insider-firmware-based-approach-thwarting-ransomware.html
Audio: https://voca.ro/1kAgBCIFQGrw


1) conditions imposed

The team collected over 4,500 loan-related IMF documents to identify policy conditions imposed on 131 borrowing countries between 1985 and 2014.

2) comprehensive investigation

Credit: KAUST A comprehensive investigation by KAUST researchers sets the record straight on the formation of hydrogen peroxide in micrometer-sized water droplets, or microdroplets.

3) comparative investigation

"in our comparative investigation we observed more juvenile nathusius' pipistrelles dead beneath wind turbines than expected from their frequency in the local population.

Audio:https://voca.ro/1k2JB1vBPvQU


Exam topic #15 (The authentication of a user's claimed identity)

One of the main components of the information security system is the user authentication procedure. Authentication requires the protection of access to information, and the more important and valuable the information, the more reliable the authentication should be.

Reliability, as well as the type, technology and means of authentication of its protection, first of all, on the importance of protecting information, registration and rights of resource users and administrators. Also, the requirements for the reliability of authentication can identify the likelihood of occurrence and analysis of the risks of possible financial, reputational or organizational damage.

The type of authentication can be selected depending on the scenario of work - whether it is remote use of the system, mobile, or work with a home computer - and on the definition and access rights to the user's system (administrator, manager, manager).

Reliable protection in the process of admission to the two-factor authentication scheme. This is an authentication procedure that consists of entering data in two parallel ways. For example, an authorized user provides a smart card and enters a password on an input device. In this case, it will not be enough for attackers to pick up or spy on the password - it is also necessary to use a physical storage device, which is already becoming a big problem to steal.

·        #107

Pishtoi Misha (PT-212) Yershova Y. (Thursday, 02 June 2022 11:59)

Today I have read the article "Hydrogen can play key role in US decarbonization". The United States Department of Energy's Lawrence Berkeley National Laboratory is a major player in the research and development of pure hydrogen in science and applied technology.
One of the participants in this research has said that hydrogen is a clean energy carrier because it contains no carbon.
Hydrogen is a substance that can help decarbonise industries that are difficult to decarbonise.
There are about nine different departments involved in hydrogen research and different laboratories have different focuses, and to solve this problem, it is better to involve all of them.
https://techxplore.com/news/2021-10-hydrogen-key-role-decarbonization.html
https://voca.ro/1d5INHKFQX8G

The study represents the first systematic and comparative investigation of cognitive abilities in lemurs and provides important insights into the evolution of cognitive abilities in primates.


a condition imposed by competition authorities before the Monsanto deal could go ahead


ecologists is the first comprehensive investigation of how humans interacted with plant and animal

https://voca.ro/19eAoPMr9C0z

·        #106

Timophey Sipin RZ-212 (Popovych) (Thursday, 02 June 2022 11:55)

Exam topic #20 (Principles of information protection)
The primary principles of information protection form a triad-like model consisting of three main components: confidentiality, integrity and availability.
The principle of confidentiality asserts that the information in question is secure from any unauthorized access to it, and is kept secret.
Information integrity refers to the certainty that the information is not tampered or degraded, during and after submission or while working with it.
Availability of information suggests not only that the information is available to the authorized user when it is needed, but also that it doesn't compromise any information security in the process of delivering information to the user.
Audio: https://voca.ro/1akyxyfgbh

Today l have read the article titled «Viewpoint -- Give Yourself Some "Wiggle Room" to Drive Innovation and Change».Text tells us about the nessesary for people to change and improve themselves (talking about improvements in technology),but at the same time people are not ready to make changes in their lives. The article explains to us away out of this situation,the so-called golden mean, in which we will have practically no risks and we will be able to observe the success and progress in technology. In my opinion, this article helps us to correctly assess risks and motivates us to innovate and progress.

Audio:https://voca.ro/1f7tDhl2LXQ6

Phrases:
1) It is impossible to conduct research with the conditions imposed by superiors.
Неможливо проводити дослідження із умовами нав'язаними начальниками
2) Comprehensive investigation can be carried out only after the internal one.
Всебічне рослідювання може бути виконано лише після внутрішнього
3) Comparative investigation of goods and services should be held regularly.
Порівняльні дослідження товарів і послуг повинні проводитися регулярно.
Audio: https://voca.ro/1f5pgtt

·        #105

Kate Kholodova (RZ-212, Popovych) (Thursday, 02 June 2022 11:54)

Exam topic #12 (8/10) Hardware firewall.

A hardware firewall is a physical appliance that is deployed to enforce a network boundary. All network links crossing this boundary pass through this firewall, which enables it to perform inspection of both inbound and outbound network traffic and enforce access controls and other security policies. A network security solution, a hardware firewall is designed to protect an organization’s network boundary by being deployed in inline mode. This means that the physical network cables over which traffic can cross this boundary are connected to ports on the “inside” and “outside” of the firewall. When traffic enters a network firewall, it is subjected to security inspection and may have multiple different controls applied to it. At a high level, firewalls commonly are configured to block certain types of traffic from crossing the network boundary. This can help to block traffic over any unused or undesirable ports from entering the network and to stop certain types of traffic from leaving the network .

audio - https://voca.ro/1bUIR734A4OG

Today I’ve read the article "Hacking and loss of driving skills are major consumer concerns for self-driving cars".This article is about the advantages and disadvantages of self-driving cars. A survey was conducted and the biggest concerns of consumers were identified: Artificial Intelligence is imperfect, the consumer will lose driver skills, security breaches in the form of hacking a personal computer or online account similar to hacking. Also, three clear benefits were free time behind the wheel, elimination of driver accidents, and faster route processing. The results of this study illustrate the clear benefits of autonomous vehicles for consumers and how marketers can engage consumers in this growing market.
In my opinion, manufacturers and legislators have something to improve and change for the safety of people.

article - https://techxplore.com/news/2021-05-hacking-loss-skills-major-consumer.html
audio - https://voca.ro/19Lw5XDZiYiX

1) condition imposed by
We deem this most regrettable, because we have complied with the conditions imposed by the international community.

2) comparative investigation of
Comparative investigations of crystalline and amorphous silicon dioxide samples were undertaken around a hundred years ago.

3) comprehensive investigation of
The possibilities of the thermoelectromotive force study as a method for comprehensive investigation of semiconductors are shown.
 
audio ph - https://voca.ro/1hkXjbtSpilu

·        #104

Yershova Y. (Thursday, 02 June 2022 11:46)

Pishtoi Misha (PT-212) Yershova Y. (Thursday, 02 June 2022 11:41)
I can't accept this topic as you have already done it.

·        #103

Yershova Y. (Thursday, 02 June 2022 11:44)

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:29)
I've got it, thanks. Go on practising your speaking.

·        #102

Pishtoi Misha (PT-212) Yershova Y. (Thursday, 02 June 2022 11:41)

Exam Topic #4 Early radio development.

https://voca.ro/1nTTBqwwHOkC


The early history of radio is the history of special technology, which also makes southern radio instruments that emit radio waves. In the days of radio, many people contributed theories and inventions to what became radio. The development of radio began as "wireless telegraphy". More late radio history is increasingly concerned with broadcasting issues. After the discovery of these "Hertzian waves" (it'd get nearly twenty years for "radio" duration to be universally accepted for this type of electromagnetic radiation) many scientists and inventors experimented with the transmission and detection of Hertzian waves. Maxwell's theory, showing that light and Hertzian electromagnetic waves are the same phenomenon at different wavelengths, led "Maxwellian" scientists to assume that they're analogous to optical light.

·        #101

Yershova Y. (Thursday, 02 June 2022 11:40)

Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 11:24)
Your comment on the article is not complete, it's rather short, doesn't contain the article's title, and there is no link to the article. Your phrases' examples are good, thanks.

·        #100

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:29)

To #88
Here is my audio file for Exam topic #17
https://voca.ro/17Hp4vylqApU

·        #99

Lebedeva E. (Thursday, 02 June 2022 11:27)

To Kravchenko Kostiantyn (RZ-212) Well done, keep working.

·        #98

Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 11:24)

This article is about bow group of scientists developed computational quantum algorithms that are capable of efficient and highly accurate simulations of static and dynamic properties of quantum systems. The new algorithms tap into the capabilities of existing quantum computer capabilities by adaptively generating and then tailoring the number and variety of "educated guesses'' the computer needs to make in order to accurately describe the lowest-energy state and evolving quantum mechanics of a system. I think this product will help in further updating of algorithms and computers overall.
https://voca.ro/1mMiezgYEKDR

Comprehensive investigation can better understand the cause of this problem.

Condition imposed by the company can lead to consequences.

Comparative investigation showed good results.

https://voca.ro/18wyrl63TomD

·        #97

Moskalenko Kirill(РТ-212)(Mykhailiuk) (Thursday, 02 June 2022 11:23)

The new advancement of color Television. (7)
The development of color television began after the end of World War II. The US electronics industry, having lost defense orders, has taken up the development of civilian technologies, including television. At the same time, the latest achievements were used, which were previously used only in military developments. In addition, previously unused decimeter radio bands became available. Two main problems of electronic color television remained unresolved: compatibility with existing black and white receivers. On June 15, 1960, a radio amateur Chuev proposed a method for obtaining a color image on a black and white TV screen without making any changes to it. A simple result was achieved on the basis of the Benham-Fechner effect by alternating with a certain frequency shades of gray in a television picture.
https://voca.ro/19whabaJS5sO

·        #96

Yershova Y. (Thursday, 02 June 2022 11:21)

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:14)
Your Exam topic #15 First radio speeches is not bad, but not informative enough.

·        #95

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:20)

#88
I'm sorry, I accidentally deleted it, I'll rewrite it now

·        #94

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:19)

#92
I'm sorry, I accidentally sent the same thing twice

Debt
Exam topic #15
First radio speeches

On March 12, 1933, President Franklin D. Roosevelt delivered his first advocacy address—radio or "fireside chat"—directly from the White House. For twelve years, President Roosevelt's fireside chats have connected the White House to ordinary homes like never before. Perhaps it was the informal, conversational quality of fireside chats that made Americans want to find them. President Roosevelt was not the first chief executive to use the radio, although he was by far the most gifted practitioner of it.

https://voca.ro/1akSkYmGDA1y

https://www.whitehousehistory.org/the-fireside-chats-roosevelts-radio-talks

·        #93

Kravchenko Kostiantyn (RZ-212, Lebedeva E.) (Thursday, 02 June 2022 11:16)

Exam topic #20 (Principles of information protection)
The primary principles of information protection form a triad-like model consisting of three main components: confidentiality, integrity and availability.
The principle of confidentiality asserts that the information in question is secure from any unauthorized access to it, and is kept secret.
Information integrity refers to the certainty that the information is not tampered or degraded, during and after submission or while working with it.
Availability of information suggests not only that the information is available to the authorized user when it is needed, but also that it doesn't compromise any information security in the process of delivering information to the user.
Audio: https://voca.ro/1akyxyynILnH

Phrases:
1) It is impossible to conduct research with the conditions imposed by superiors.
Неможливо проводити дослідження із умовами нав'язаними начальниками
2) Comprehensive investigation can be carried out only after the internal one.
Всебічне рослідювання може бути виконано лише після внутрішнього
3) Comparative investigation of goods and services should be held regularly.
Порівняльні дослідження товарів і послуг повинні проводитися регулярно.
Audio: https://voca.ro/1f5puZ4HTatJ

·        #92

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:14)

DEBT
Exam topic #15
First radio speeches

On March 12, 1933, President Franklin D. Roosevelt delivered his first advocacy address—radio or "fireside chat"—directly from the White House. For twelve years, President Roosevelt's fireside chats have connected the White House to ordinary homes like never before. Perhaps it was the informal, conversational quality of fireside chats that made Americans want to find them. President Roosevelt was not the first chief executive to use the radio, although he was by far the most gifted practitioner of it.

https://voca.ro/1akSkYmGDA1y

https://www.whitehousehistory.org/the-fireside-chats-roosevelts-radio-talks

·        #91

Lebedeva E. (Thursday, 02 June 2022 11:12)

To Vova Kolomiets RZ-212 The sentences with phrases in the work #84 are absolutely identical to your work #89. I can't accept them.

·        #90

Lebedeva E. (Thursday, 02 June 2022 11:09)

To Vova Kolomiets RZ-212 Thanks for thge detailed comment. Now I am waiting for the exam topic.

·        #89

Vova Kolomiets RZ-212 (Lebedeva) (Thursday, 02 June 2022 11:09)

(that is work for 26.05)

Today i've read the article "Self-driving race cars make history in Indianapolis". It is about unusual race.
The winner was not a driver but an algorithm. Team from the Technical University of Munich won a $1 million prize. The Dallara IL-15, used by every team, comes with a price tag of $230,000. However, the technology on board makes each car worth more than $1 million. The commercial autonomous vehicle industry has been following the Indianapolis race closely, with contributions to the event topping $120 million.
I found this article interesting, because it tells us about the new techonologies and opportunities of science.
https://techxplore.com/news/2021-10-self-driving-cars-history-indianapolis.html
https://voca.ro/1aSX96TQM81G

1) comprehensive investigation of
The possibilities of the thermoelectromotive force study as a method for comprehensive investigation of semiconductors are shown.

2) condition imposed by
We deem this most regrettable, because we have complied with the conditions imposed by the international community.

3) comparative investigation of
Comparative investigations of crystalline and amorphous silicon dioxide samples were undertaken around a hundred years ago.

https://voca.ro/16xG40bKztDG

·        #88

Yershova Y. (Thursday, 02 June 2022 11:07)

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:03)
Sorry, your audio for the exam topic #17 could not be found. It may have expired or been deleted.

·        #87

Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 02 June 2022 11:06)

(Article)
Today I have read the article 'Combining AI and computational science for better, faster, energy efficient predictions'.
The article tells about the new technology "intelligent alloys", the main purpose of which is combining the power of computational science with artificial intelligence to develop models that complement simulations to predict the evolution of science's most complex systems. By using this technology, the researchers demonstrated that they can generate predictions thousands to a million times faster than it would take to run the simulations with full resolution or rely on partial or even faulty information through models. I think this technology has a huge future that is coming right now.

1)expected value
Either the present value or a future expected value should be used.
Следует использовать либо нынешнее значение, либо будущие ожидаемые значения.

2)technology capability
At least the exponential growth of information technology capability will continue unabated.
По крайней мере, возможности информационных технологий будут расти, не ослабевая, с экспоненциальной скоростью.

3)work schedule
Consequently, the Court may wish not to overstretch its work schedule in the field at any given time.
Соответственно, Суд, возможно, пожелает сделать более напряженным свой график работы на местах в любой заданный период времени.

Vocaroo(article): https://voca.ro/1iVdA1qr4K25
Vocaroo(sentences): https://voca.ro/130pnPRxsJji
https://techxplore.com/news/2022-04-combining-ai-science-faster-energy.html

·        #86

Yershova Y. (Thursday, 02 June 2022 11:03)

Stanislav Popik РТ-212 (Yershova) (Thursday, 02 June 2022 10:59)
Thanks for your effective work today.

·        #85

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:03)

DEBT
Exam topic #17
The new advancement of color Television.

Color television was more than just an addition or improvement to black and white television. In the post-war era, it represented the latest step in the technological replication and expansion of human vision: improved perception, the pinnacle of consumer vision and display, and the Cold War idealized technology of truth and revelation. While color television is just television now, and the idea of a black and white television seems distant and bizarre, there was a time when color television was, to use a very modern expression, a disruptor. It not only changed the way commercial television was produced and received, but also announced a change in the very way we look at the world and understand our relationship to it.

https://voca.ro/1gINbUzOPBTs

https://www.smithsonianmag.com/innovation/color-tv-transformed-way-americans-saw-world-world-saw-america-180971343/

·        #84

Vova Kolomiets RZ-212 (Lebedeva) (Thursday, 02 June 2022 11:02)

today i have read the article "Google Cloud unveils Healthcare Data Engine for a holistic view of health data"
this article is about the new development of google in the field of medicine. According to them, this invention helps to work faster with patient data. thanks to this, you can find out everything about the client, from his simple illnesses to clinical.
doctors say that for them a quick search for information about patients is a priority, as this will speed up their work. in addition, many companies have supported this idea and cooperate with hospitals.
This article really impressed me. I think this development is very important and useful today and i like that medicine is upgrading.
https://www.zdnet.com/article/google-cloud-unveils-healthcare-data-engine-for-a-holistic-view-of-health-data/
https://voca.ro/194FhNUSBst6

1) comprehensive investigation of
The possibilities of the thermoelectromotive force study as a method for comprehensive investigation of semiconductors are shown.

2) condition imposed by
We deem this most regrettable, because we have complied with the conditions imposed by the international community.

3) comparative investigation of
Comparative investigations of crystalline and amorphous silicon dioxide samples were undertaken around a hundred years ago.

https://voca.ro/16xG40bKztDG

·        #83

Yershova Y. (Thursday, 02 June 2022 11:01)

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 10:54)
In general, it's reasonable, but I'd like to know more about your attitude towards the issue presented.

·        #82

Stanislav Popik РТ-212 (Yershova) (Thursday, 02 June 2022 10:59)

Exam topic 8 “The new advancement of color Television.”
In 1938, Werner Flechsig patented the principle of the color kinescope, and the color image transmission method was developed in 1940. In European cinemas, color films appeared in 1941, the first of which were Women Are Still the Best Diplomats and Hans Alber's film Munchausen. In 1953, the NTSC standard for black-and-white television broadcasting was expanded in the United States - it received the ability to transmit color, namely, "color" was added to "brightness". On August 30, 1953, for the first time in history, NBC broadcast a color broadcast of "Kukla, Fran and Ollie" in test mode via the NTSC standard. The first full-fledged color broadcast was the opera Carmen, shown on October 31, 1953.

https://voca.ro/1iv2xQ7BZSN7

·        #81

Stanislav Popik РТ-212 (Yershova) (Thursday, 02 June 2022 10:55)

Today I have read the article "Urban magnetic fields reveal clues about energy efficiency, pollution
by American Institute of Physics" It's about Studying a city's magnetic footprint, which can be used to monitor the state of that city, including a possible early warning system for pollution problems. Magnetic field activity from various sources in a city can give an idea of ​​what is happening over the 24 Hours The researchers hope that their combination of networked magnetometry and data mining can become a valuable tool for interdisciplinary urban research, and I believe that this research could provide a boost to many things in the future.

https://phys.org/news/2022-05-urban-magnetic-fields-reveal-clues.html
https://voca.ro/1aLLZD8XewpR

1. Condition imposed by
Condition imposed by the company can lead to consequences.

2. Comparative investigation.
Comparative investigation showed good results.

3. Comprehensive investigation.
Сomprehensive investigation can better understand the cause of this problem.

https://voca.ro/19OgvC2Sj8NU

·        #80

Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 10:54)

1. Comprehensive investigation of
Their collaboration with anthropologists, archaeologists, and ecologists is the first comprehensive investigation of how humans interacted with plant and animal species in different cultures worldwide through time.
2. Comparative investigations off
The complete genome of the orange clownfish was published a few years ago, so it was only fitting that the publication of the false clownfish genome followed for comparative investigations.
3. Conditions imposed by
Bayer and Monsanto will have to accept all the conditions imposed by the regulator to close the deal, but will have the right to legally challenge the verdict in court, it said.

https://voca.ro/101I8dsPjoLI

Today I have read the article "Tech vs telecoms: EU ignites debate on 'net neutrality'". Tech and streaming giants are consuming massive amounts of bandwidth, so this week the EU revived a long-standing idea to force them to pay telecoms that maintain the infrastructure. But the idea has sparked howls of disapproval from tech giants like Facebook, Apple, Amazon, Microsoft, Google and Netflix. According to media reports, the bill will be ready by the end of the year. But the scramble for internet infrastructure has raised concerns that the EU could end up jeopardizing "net neutrality," in which telecoms are barred from selling higher internet speeds to certain companies.

https://voca.ro/1ng8WqrRyeUI

https://techxplore.com/news/2022-05-tech-telecoms-eu-ignites-debate.html

·        #79

Yershova Y. (Thursday, 02 June 2022 10:50)

Eugene Chervony RT-212(Yershova) (Thursday, 02 June 2022)
All your tasks are well done, thank you.

·        #78

Moskalenko Kirill(РТ-212)(Mykhailiuk) (Thursday, 02 June 2022 10:48)

Today I have read the text with title “The how social media and AI enable companies to track brand reputations in real-time”. This text tells how artificial intelligence and social media can help monitor brand status. Brand status can change for the better and for the worse, but how do you check? Social media, such as Twitter, will help with this issue, as you can get real-time ratings and brand reputation through tweets. With AI, it is possible to understand where a company or a brand is going, as well as to know the reason for the decline or increase in brand ratings. In conclusion, I’d like to say, that In the digital world, social media and AI are making it easier to turn the brand around.

https://voca.ro/11kPhy8PV2B7

Comprehensive investigation can better understand the cause of this problem.
Комплексне дослідження може краще зрозуміти причину цієї проблеми.

Condition imposed by the company can lead to consequences.
Умова, встановлена компанією, може призвести до наслідків.

Comparative investigation showed good results.
Порівняльне дослідження показало хороші результати.

https://voca.ro/18wyrl63TomD

·        #77

Igor Rudko (RZ-213) (Vorobyova E. V.) Home-work (Thursday, 02 June 2022 10:46)

Audio: https://voca.ro/1e9PvcI944KL
Article: https://phys.org/news/2022-06-gulf-mexico-ancient-mass-extinction.html
Today I have read the article: "Research shows how the Gulf of Mexico escaped ancient mass extinction". An ancient bout of global warming 56 million years ago that acidified oceans and wiped-out marine life had a milder effect in the Gulf of Mexico, where life was sheltered by the basin's unique geology. The findings not only shed light on ancient mass extinction but could also help scientists determine how current climate change will affect marine life and aid in efforts to find deposits of oil and gas. And although the Gulf of Mexico is very different today. I think that valuable lessons can be drawn about climate change today from how the Gulf was impacted in the past.
Phrases
Audio: https://voca.ro/19RZkTI62ns6
1) The abundance of helium is correctly reproduced by the new model because the internal rotation of the sun condition imposed by the magnetic fields generates a turbulent mixing - Нова модель правильно відтворює велику кількість гелію, оскільки внутрішнє обертання сонця, накладене магнітними полями, породжує турбулентне перемішування
2) Comprehensive investigation of whether epigenetic aging is the manifestation of one or more aging hallmarks - Всебічне дослідження того, чи є епігенетичне старіння проявом однієї чи кількох ознак старіння
3) In Comparative investigation we observed more juvenile Nathusius' pipistrelles dead beneath wind turbines. - У порівняльному дослідженні ми спостерігали більше молодих піпістрелів Натусіуса, мертвих під вітрогенераторами.

·        #76

Chervony Eugene RT-212(Yershova) (Thursday, 02 June 2022 10:45)

Exam Topic #8 (Cable television)

Cable television is one of the options for transmitting a signal (both television and radio signals) over a distance. Both analog and digital format transmission is possible. For the first time in the world, cable television appeared in the spring of 1948 in Mahanoy City, Pennsylvania, USA. A modern cable television network includes a head station, trunk communication channels, sub-trunk lines and home distribution networks. Cable TV has some advantages over digital and satellite: higher signal quality, high noise immunity, no problems with signal transmission in cities with dense multi-storey buildings.

https://voca.ro/1eM5VKkeKIXh

·        #75

Chervony Eugene RT-212(Yershova) (Thursday, 02 June 2022 10:42)

Exam Topic #7 (First radio speeches)

In 1904, English radio engineer John Fleming invented the first radio tube. By the early 1920s, the development of radio tubes had reached a level sufficient for the advent of radio broadcasting. While most experimenters were trying to create something similar to telephone technology, others were trying to reach a wider broadcast coverage. The first experimental radio station was created by Charles Herrold in 1909. Gerrold placed the transmitter and antenna on the roof of his radio engineering college. Initially, only dots and dashes were transmitted. But already in 1912, weekly broadcasts of phonographic records began.

https://voca.ro/187p5zaAwKJt

·        #74

Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 02 June 2022 10:42)

1.comprehensive investigation of- комплексне розслідування;
After gaining state independence increased the importance of comprehensive investigation of folklore samples.-Після здобуття державної незалежності зросла значення всебічного дослідження фольклорних зразків.
2.comparative investigation of- порівняльне дослідження ;
Comparative investigation of goods and services should be held regularly.-Порівняльні дослідження товарів і послуг повинні проводитися регулярно.
3.condition imposed by- умова, встановлена;
This new condition imposed by the Committee raises some difficult legal issues.-Ця нова умова, встановлена ​​Комітетом, викликає ряд складних правових питань.
https://voca.ro/1nI5RNWJZh2z
Today I've read the article about the new methods that accurately detect the deepfake videos. The ability to identify manipulated videos is neccesary as political and social opinions are transmitted in such a way.The Riverside method divides the task into two components within a deep neural network. The first branch discerns facial expressions and feeds information about the regions that contain the expression, such as the mouth, eyes, or forehead, into a second branch, known as an encoder-decoder. The encoder-decoder architecture is responsible for manipulation detection and localization. So, deep fake detection methods allow people to understand whether what they see is true or manipulative information.
https://voca.ro/14aTW4Ho2koF
https://techxplore.com/news/2022-05-method-deepfake-videos-accuracy.html

·        #73

Eugene Chervony RT-212(Yershova) (Thursday, 02 June 2022 10:41)

debt
Today I have read the article "A new duality solves a physics mystery". It says that in conventional wisdom, producing a curved space requires distortions, such as bending or stretching a flat space. A team of researchers have discovered a new method to create curved spaces that also solves a mystery in physics. Without any physical distortions of physical systems, the team has designed a scheme using non-Hermiticity, which exists in any systems coupled to environments, to create a hyperbolic surface and a variety of other prototypical curved spaces. I believe that this fundamental research can change the understanding of physics.

https://phys.org/news/2022-06-duality-physics-mystery.html
https://voca.ro/17tBkVPp9Csz

·        #72

Eugene Chervony RT-212(Yershova) (Thursday, 02 June 2022 10:39)

Today I have read the article "Why ketamine is a speedster antidepressant". It says that ketamine is the speedster of antidepressants, working within hours compared to more common antidepressants that can take several weeks. But ketamine can only be given for a limited amount of time because of its many side effects. The study in mice shows ketamine works as a rapid antidepressant by increasing the activity of the very small number of newborn neurons, which are part of an ongoing neurogenesis in the brain. The goal is to develop an antidepressant that doesn't take three to four weeks to work because people don't do well during that period of time. I think that researchers have a chance to create such an antidepressant.

https://medicalxpress.com/news/2022-06-ketamine-speedster-antidepressant.html
https://voca.ro/1kspamxeYNXv

1) conditions imposed by
It is impossible to conduct research with the conditions imposed by superiors.
2) comprehensive investigation of
Сomprehensive investigation can be carried out only after the internal one.
3) сomparative investigations of
A comparative study was not conducted due to misunderstandings.

https://voca.ro/12Xo6jw109Zc

·        #71

Lebedeva E. (Thursday, 02 June 2022 10:35)

To РЗ-212 Good morning! The lesson has started and I am waiting for your exam topics and work with phrases of the day.

·        #70

Chernetskiy Nikita.RZ-213. (Vorobyova) (Thursday, 02 June 2022 10:32)

Today I've read an article called"Canada hospitals use drones to carry lungs for transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western Hospital on the city's west side to the roof of the downtown Toronto General Hospital.The trip at the end of September took less than 10 minutes. It was automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the company, but a similar flight in April 2019 delivered a kidney to a hospital in the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team that whisked the package inside and successfully transplanted the lungs into a waiting patient, saving the life of the 63-year-old man who'd been diagnosed with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human organs.
Audio:https://voca.ro/15rxpcCP4ZR3
Article:https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html
1)comprehensive investigation of
After gaining state independence increased the importance of comprehensive investigation of folklore samples and followed by new scientific projects.
2)conditions imposed by
Unilateralism and conditions imposed by the powerful upon others are rampant throughout the world.
3)Comparative investigations of
The Institute of legal and comparative investigations is established in Kazakhstan

·        #69

Igor Rudko (RZ-213) (Vorobyova E. V.) (Thursday, 02 June 2022 10:31)

Article: https://phys.org/news/2022-05-year-old-city-emerges-tigris-river.html
Audio: https://voca.ro/13in98p5fz3v
Today I have read the article: " A 3,400 year-old city emerges from the Tigris River". Archaeologists have uncovered an old Mittani Empire-era city once located on the Tigris River. By the way, this ancient city had been submerged decades ago without any prior archaeological investigations. It is located at Kemune in the Kurdistan Region of Iraq. The settlement emerged from the waters of the Mosul reservoir early this year as water levels fell rapidly due to extreme drought in Iraq. This unforeseen event put archaeologists under sudden pressure to dig and document at least parts of this large, important city as quickly as possible before it was resubmerged. In my opinion, it is really great that archeologists trying to find forgotten places and save them.
Phrases
Audio: https://voca.ro/1jqv8WYCB887
1)A new study shows that lending conditions imposed by the International Monetary Fund undermine "state capacity" in developing nations - Нове дослідження показує, що умови кредитування, встановлені Міжнародним валютним фондом, підривають «спроможність держави» в країнах, що розвиваються.
2)A comprehensive investigation by KAUST researchers sets the record straight on the formation of hydrogen peroxide in micrometer-sized water droplets - Комплексне дослідження, проведене дослідниками KAUST, встановлює рекорд утворення перекису водню в краплях води мікрометрового розміру.
3)In the Journal of Applied Physics, researchers from the United States and Germany present a comparative investigation of urban magnetic fields between two U.S. cities. - У Journal of Applied Physics дослідники зі Сполучених Штатів та Німеччини представляють порівняльне дослідження міських магнітних полів між двома містами США.
Exam topic Authentication mechanisms
Audio: https://voca.ro/1f64bcIC7E0I
The users who want to access your protected resources can be challenged to provide credentials to access with the various authentication technologies. Authentication mechanisms are modules that authenticate the user with a specific challenge or authentication technology, such as user name and password, and one-time password. The order in which the authentication mechanisms are run is controlled by an authentication policy. An authentication policy is an XML document that you create with the authentication policy editor. The authentication policy dictates the order of authentication mechanisms to execute. I guess that it is really cool that there are many ways to protect a user account.

·        #68

Lebedeva E. (Thursday, 02 June 2022 10:28)

To Kovalzhi Andrey RZ-211 Well done, thank you.

·        #67

Pishtoi Misha (PT-212) S.Mykhailiuk (Thursday, 02 June 2022 10:25)

https://voca.ro/14lmDBpEFVOb
Linux is perhaps the only operating system that has the most dedicated and committed followers. Development of the components of Linux started in the year 1991. Linus built the kernel that formed the heart of Linux operating system and included UNIX programs and utilities, and additional programs and utilities from Richard Stallman. Since then many versions of Linux, which have amazing functionalities and animations, have been produced. Examples of such versions include Ubuntu, Fedora, Red Hat, and SUSE.
So, Linux is perhaps the only operating system that has so many followers because of their quality not only of kernel.
The study represents the first systematic and comparative investigation of cognitive abilities in lemurs and provides important insights into the evolution of cognitive abilities in primates.


a condition imposed by competition authorities before the Monsanto deal could go ahead

ecologists is the first comprehensive investigation of how humans interacted with plant and animal

·        #66

Shpychka Olecksandr/ RZ-213 (Vorobyova E. V.) (Thursday, 02 June 2022 10:24)

Exam topic #4 Information protection systems.
The most important thing in the field of information is its protection. Since attackers often want to gain access to important and confidential data, information security is often a priority. To do this, information security systems were created, for example, SIEM - systems that quickly detect external and internal attacks, analyze incidents and events, evaluate the level of information system protection, generate reports and other analytics. There are also many protection methods by type of data masking.
In my opinion, protecting information is something that should take a lot of effort and investment.

·        #65

Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (Thursday, 02 June 2022 10:22)

Exam Topic: Different protection mechanisms

The main protective mechanisms are activities aimed at ensuring engineering measures of confidentiality, integrity and availability of information. Protective mechanisms are divided into:
Physical - various engineering tools and structures that complicate or eliminate the physical intrusion of offenders into objects of protection and into material carriers of confidential information;
Hardware - mechanical, electrical, electronic and other devices designed to protect information from leakage, disclosure, modification, destruction, as well as counteraction to technical intelligence;
Software - special programs for computers that implement the functions of protecting information from unauthorized access, copying, modification, destruction and blocking;
Cryptographic - technical and software means of data encryption based on the use of various mathematical and algorithmic methods;
When combined, these three mechanisms provide very strong protection of data and computers.

Link to voice: https://voca.ro/135I4EZEAAN2

·        #64

Kovalzhi Andrey RZ-211 (Lebedeva E.) (Thursday, 02 June 2022 10:22)

Today I have read the article "Primate brain size does not predict their intelligence".
Monkeys are known to have large brains and are our closest relatives. But does brain size really affect the mind of an animal?
Scientists conducted a study that showed that the relationship between brain size and cognitive abilities cannot be generalized and it provides new insights into the evolution of cognitive abilities in primates. The results of the new study show that despite their smaller brains lemurs average cognitive performance in the tests of the PCTB was not fundamentally different from the performances of the other primate species.
Further comparative studies in a variety of other species are essential to answer the many questions about the relationship between brain size, diet, social life and cognition.
https://phys.org/news/2020-09-primate-brain-size-intelligence.html
https://voca.ro/156UpSvHuYSF
Daily phrases:
1) condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Новые условия, навязанные комитетом, вызывают ряд сложных правовых вопросов.
2)comprehensive investigation of
Accordingly, scientists support the calls for a more comprehensive investigation.
Соответственно, ученые поддерживают призывы к более всестороннему исследованию
3) comparative investigation of
The comparative investigation showed the usefulness of the first item.
Сравнительное исследование показало полезность первого предмета.
https://voca.ro/1kKD93lWxYbf

·        #63

Gorbatiuk Stanislav RZ-213 (Vorobyova E.V.) (Thursday, 02 June 2022 10:21)

1. Comparative investigations of
A comparative investigation of methods for longitudinal data with limits of detection through a case study shows a lot of new discoveries in paleontology. Порівняльне дослідження методів поздовжніх даних з межами виявлення на прикладі показує багато нових відкриттів у палеонтології.
2. In conclusion, it is proposed that ageing is the condition, imposed by natural selection, that lets organisms to outlast the obligatory reproductive time. На закінчення припускається, що старіння — це умова, встановлена природним добором, що дозволяє організмам пережити обов’язковий час відтворення.
3. A comprehensive investigation of the basin revealed its lateral and vertical dimensions and hydrogeological characteristics. Комплексне дослідження басейну виявило його бічні та вертикальні розміри та гідрогеологічні характеристики.
https://voca.ro/1hJLkWKPdCxo

Today I've read the article, which is titled "Astronomers detect a new radio source of unknown origin". This article tells us about how Australian astronomers have discovered a mysterious bright and compact radio source during radio continuum observations of a spiral galaxy known as NGC 2082. The origin and nature of this source is unknown and requires further investigation. The finding is reported in a paper published May 23 on the arXiv pre-print repository. The astronomers concluded that the most likely remaining possibility is that this radio source is an extragalactic background source, such as quasi-stellar object, radio galaxy or active galactic nucleus.
https://voca.ro/12cuBkYHOAUQ
https://phys.org/news/2022-05-astronomers-radio-source-unknown.html

·        #62

Vorobyova E. to Shpychka from РЗ-213 (Thursday, 02 June 2022 10:21)

I accept your class work. It’s okay. Continue working like this.

·        #61

Vorobyova E. to Syrbu from РЗ-213 (Thursday, 02 June 2022)

Your exam topic is prepared properly. Your task from Phrases of the Day Practice is all right too. Go on working. Thank you.

·        #60

Lebedeva E. (Thursday, 02 June 2022 10:18)

To To Dovzhenko Ilya RZ-211 and Kuleshov Konstantin(RZ-211) Thank you for your clear and full comments.

·        #59

Yershova Y. (Thursday, 02 June 2022 10:16)

Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 02 June 2022 10:00)
DEBT for 26.05.2022. I appreciate your comment, it’s quite informative.

·        #58

Yershova Y. (Thursday, 02 June 2022 10:14)

Vasilev A.O RZ-211 Yershova Y. (Thursday, 02 June 2022 09:59)
You comment is interesting, but too long, mind that.

·        #57

Dovzhenko Ilya RZ-211 (Lebedeva) (Thursday, 02 June 2022 10:12)

Today I have read an article about how artificial intelligence will help unmanned vehicles not stand idle at red lights. A new study from MIT looks at using new technology in self-driving cars to reduce travel time, fuel consumption, or battery life. Thus, all machines will know where they are, and will be able to transmit data about their location to each other. This will help other cars to slow down or accelerate at the right moment to prevent an accident. The use of this technology will help to completely get rid of traffic lights, and reduce the number of accidents to a minimum.
https://techxplore.com/news/2022-05-artificial-intelligence-autonomous-vehicles-idling.html
https://voca.ro/18DAS7v3rdAo
1)comprehensive investigation of
We demand objective and comprehensive investigation of this case .
Очікуємо на об'єктивне та справедливе розслідування цієї справи .
2)condition imposed by
Not just time stopped, which is the condition imposed by all photographs, but objects held in a suspension.
Зупинився не просто час, що є умовою для всіх фотографій, а об’єкти, які тримаються у підвішеному стані.
3)comparative investigation of'
He introduced the comparative historical method of investigation of the organic world.
Він ввів порівняльно-історичний метод дослідження органічного світу.
https://voca.ro/1o5Kvw6tTkCK

·        #56

Yershova Y. (Thursday, 02 June 2022 10:12)

Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 02 June 2022 09:58)
Thanks for your review, It's reasonable but too long.

·        #55

Shpychka Olecksandr/ RZ-213 (Vorobyova E. V.) (Thursday, 02 June 2022 10:11)

Article: https://phys.org/news/2022-03-games-classroom-success-teacher.html
Audio: https://voca.ro/1d69UgLjXm2p
Today i have read the article: "Computer games in the classroom: Educational success depends on the teacher"
From the article, we learn that future teachers support the introduction of computer games into the learning environment. Many future teachers who are now studying at universities are rapidly promoting this idea. Computer games play an important role for children, namely, they help in the study of mass media. Research has shown that games can help develop many skills. Moreover, students will definitely like this idea.
In my opinion, computer games have a huge potential in the field of education.


Phrases of the day:
1)The conditions imposed by in which people live or work affect comfort.
2)So a comprehensive investigation of the problem is still lacking.
3)Your comparative investigation of answer should display understanding of each text.
Audio: https://voca.ro/1oazrKCqwbZr

·        #54

Yershova Y. (Thursday, 02 June 2022 10:09)

Vlasov Vadim RZ-211 (Yershova) (Thursday, 02 June 2022 09:47)
Your comment is quite informative, thank you.

·        #53

Kuleshov Konstantin(RZ-211)(Lebedeva) (Thursday, 02 June 2022 10:08)

Today I have read the article "New Perspectives on Metal 3D Printing". This article explores how 3D printing has opened up exciting new possibilities for engineers and forced product designers to rethink what they can do. The ability to print complex metal parts using advanced alloys anywhere in the world is certainly impressive, but not without its downsides. It works by depositing thin layers of metal powder particles that are bound together by intense heat delivered by powerful lasers. But this process can lead to the formation of tiny pores that weaken the overall structure. This is a serious disadvantage for the industry, especially when highly reliable components are required on an ongoing basis.
This scientific discovery will speed up the process of metal production, make it reliable and easy to manufacture.
1)The Secretary-General informed the Council that a more comprehensive investigation of the 5 June 1993 incident was being undertaken.comprehensive investigation of
2)Unilateralism and conditions imposed by the powerful upon others are rampant throughout the world.conditions imposed by
3)The Institute of legal and comparative investigations is established in Kazakhstan (2009).Comparative investigations of
https://techxplore.com/news/2022-05-insights-3d-metals.html
https://voca.ro/19z132NXcvWE

·        #52

Yershova Y. (Thursday, 02 June 2022 10:07)

Sofia Gilenko РЗ-211 (Yershova Y.A.) (Thursday, 02 June 2022 09:31)
Thank you for your clear and full comment. I share your opinion. Be attentive, the last phrases' example is not informative enough.

·        #51

Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 02 June 2022 10:00)

DEBT for 26.06.2022
Today I have read the article “Cyber attacks could jeopardize global food supplies”. Researchers say that smart sensors and systems which are used to monitor crops, plants, the environment, water, soil moisture, and diseases; progress in production, genetic modification for drought-resistant crops, and other technologies are prone to cyber-attacks—particularly if the ag-tech sector doesn't take adequate precautions like other corporate or defense sectors, as seen by interference to a U.S. watering system, a meatpacking firm, wool broker software and an Australian beverage company. So I think that ag-tech companies should invest into precautions about the vulnerabilities of digital agriculture to cyber-attack, with an eye on the potential serious effects on the general population in terms of food supply.
https://techxplore.com/news/2022-05-cyber-jeopardize-global-food.html
https://voca.ro/1beHgxHZMQrO


Phrases:
When investigating
When investigating a truck accident, evidence must be gathered to prove the culpability of the negligent parties.
with the aid of
They cut through the glass with the aid of our sonic knife.
a sharp rise
These three components have caused such a sharp rise.
https://voca.ro/1U9V4vqu7xse

·        #50

Vasilev A.O RZ-211 Yershova Y. (Thursday, 02 June 2022 09:59)

Today I've read an article called"Canada hospitals use drones to carry lungs for transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western Hospital on the city's west side to the roof of the downtown Toronto General Hospital.The trip at the end of September took less than 10 minutes. It was automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the company, but a similar flight in April 2019 delivered a kidney to a hospital in the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team that whisked the package inside and successfully transplanted the lungs into a waiting patient, saving the life of the 63-year-old man who'd been diagnosed with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human organs.

https://voca.ro/1oNUOF2CvqeB

https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html

1)comprehensive investigation of
After gaining state independence increased the importance of comprehensive investigation of folklore samples and followed by new scientific projects.

https://voca.ro/1i7HwCEPGXlp

2)conditions imposed by
Unilateralism and conditions imposed by the powerful upon others are rampant throughout the world.

https://voca.ro/1kzuue3dyLV0

3)Comparative investigations of
The Institute of legal and comparative investigations is established in Kazakhstan

https://voca.ro/1neQdwYSVpFc

·        #49

Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 02 June 2022 09:58)

Article
Today I have read the article “There are systems 'guarding' your data in cyberspace, but who is guarding the guards?”. As our IT systems become more complex, the potential for vulnerabilities increases. More and more organizations are being breached, leading to financial loss, interrupted supply chains and identity fraud. The current best practice in secure technology architecture used by major businesses and organizations is a "zero trust" approach when no person or system is trusted and every interaction is verified through a central entity. But absolute trust is then placed in the verification system being used. So breaching this system gives an attacker access to the whole system. To address this issue, "decentralization" is a new paradigm that removes any single point of vulnerability. So I think that this approach is better than an uncontrolled system but researchers should work on bolstering the security of the verification processes so many of us rely on.
https://techxplore.com/news/2022-05-cyberspace.html
https://voca.ro/15SailTYnU5h

Phrases:
1)conditions imposed by/
Contract-holders should use this form to tell a proposed sub-holder of conditions imposed by the head landlord.
2)Comparative investigations of/
Comparative investigations of apices by strictly anatomical methods have definite limits which are soon reached.
3)Comprehensive investigation of/
A systematic and comprehensive investigation of methods to build and evaluate fault prediction models.
https://voca.ro/1eSjDdBNY6Lp

·        #48

Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 09:56)

1) comparative investigation of - порівняльне дослідження;
A comparative investigation of methods for longitudinal data with limits of detection through a case study.
Порівняльне дослідження методів для поздовжніх даних з межами виявлення на прикладі.
2) condition imposed by - умова, встановлена;
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена ​​Комітетом, викликає ряд складних правових питань.
3) comprehensive investigation of - комплексне розслідування;
This is also the reason why Ethiopia has been adamantly resisting a comprehensive investigation of all the events that led to the current crisis.
Це також є причиною того, що Ефіопія непохитно протидіє комплексному розслідуванню всіх подій, які призвели до нинішньої кризи.
https://voca.ro/169aANrsgmDg

Exam topic #13
Authentication mechanisms are modules that authenticate the user with a specific challenge or authentication technology, such as user name and password and one-time password. The order on which the authentication mechanisms are run is controlled by an authentication policy. An authentication policy is an XML document that you create with the authentication policy editor. The authentication policy dictates the order of authentication mechanisms to execute. There are different types of authentication mechanisms: one-time password, Username and Password mechanism, HTTP Redirect mechanism, Consent to device registration mechanism, FIDO Universal 2nd Factor mechanism.

https://voca.ro/1ooXkATJyQCN

·        #47

Popovych E. (Thursday, 02 June 2022 09:55)

To Pushkash Maxim (RZ-212 Popovich)
#27,44
Exam Topic #10 (information protection systems) is well done.
Thank you, you have successfully completed the task.

·        #46

Vlasov Vadim RZ-211 (Yershova) (Thursday, 02 June 2022 09:47)

Today i have read the article "Google Cloud unveils Healthcare Data Engine for a holistic view of health data"
this article is about the new development of google in the field of medicine. According to them, this invention helps to work faster with patient data. thanks to this, you can find out everything about the client, from his simple illnesses to clinical.
doctors say that for them a quick search for information about patients is a priority, as this will speed up their work. in addition, many companies have supported this idea and cooperate with hospitals.
This article really impressed me. I think this development is very important and useful today and i like that medicine is upgrading.
https://www.zdnet.com/article/google-cloud-unveils-healthcare-data-engine-for-a-holistic-view-of-health-data/
https://voca.ro/1leCZVUWV7lu

ecologists is the first comprehensive investigation of how humans interacted with plant

A new study shows that lending conditions imposed by the International Monetary Fund

in our comparative investigation we observed more juvenile
https://voca.ro/193NROf4CNZ6

·        #45

Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 02 June 2022 09:42)

Exam Topic #8 *Radio equipment helping to save on bills."

Radio equipment helps to rescue on bills. For example: Radio Frequency Identification. A technology for the unique identification of physical objects using radio tags. The radio tag contains a microchip that stores the detection detector, as well as a way for the antenna to convey information to special radio receivers. This technology optimizes the development of diseases in a wide area of the patient, which achieves the installation of labels on a specific structure and tracking the route of its movement. This allows you to manage efficient inventory down to a single item. It also allows you to monitor the cost of electricity and more.

Vocaroo: https://voca.ro/1acXRFNzJMqC

·        #44

Pushkash Maxim (RZ-212 Popovich) (Thursday, 02 June 2022 09:41)

Researchers from Institut Fresnel introduce a novel optical horn antenna platform for label-free detection of single proteins in the UV with unprecedented resolutions and sensitivity. The approach combines (i) a conical horn reflector for fluorescence collection at ultrahigh angles with (ii) a metal nanoaperture for fluorescence enhancement and background screening. To experimentally demonstrate the usefulness of the approach and its direct application to biochemical challenges, the real-time detection of UV autofluorescence from immobilized and diffusing single proteins is demonstrated, together with experiments monitoring unfolding and dissociation upon denaturation of a widely used protein with single-molecule resolution. Importantly for biochemical applications, all the single-molecule experiments are performed on label-free proteins and at physiological conditions, which is unique in this scientific.
Voice: https://voca.ro/17c60HhYQF0z

1) comparative investigation of
A comparative investigation of methods for longitudinal data with limits of detection through a case study.
2) condition imposed by
The condition imposed by the Fates had been met , and the decree was irrevocable
3) comprehensive investigation of
In the dissertation, comprehensive investigation of the helical FCG and of the power conditioning circuit is carried out theoretically, numerically and experimentally.
Voice: https://voca.ro/1jtmAv93X5PK

·        #43

Lebedeva E. (Thursday, 02 June 2022 09:40)

To Ivan Zarytskiy RZ-211, Kapeliushnyi Vladyslav (RZ-211), Artem Kotliarov RZ-212, Ilinchuck Vladislav RZ-211, Misha Donenko RZ-211, Denis Zavadsky Lebedeva RZ-211 Thank you for your effective work.

·        #42

Vorobyova E. to Shlapak from РЗ-213 (Thursday, 02 June 2022 09:37)

You have coped with the tasks, I have found no mistakes in your class work. Go on working like this.

·        #41

Vorobyova E. to Siglyanyk from РЗ-213 (Thursday, 02 June 2022 09:35)

Well done, thanks for your understanding of the article and effective work with the new phrases.

·        #40

Ivan Zarytskiy RZ-211 (Lebedeva) (Thursday, 02 June 2022 09:35)

Today I have read the article “A new way to train deepfake detection algorithms improves their success”. This article is about an improved system of deepfack detection. Deepfakes are images and videos which combine mixed source materials to produce a synthetic result. Their use ranges from trivial to malicious, so methods to detect them are sought after, with the latest techniques often based on networks trained using pairs of original and synthesized images. A new method defies this convention by training algorithms using novel synthesized images created in a unique way. Known as self-blended images, these novel training data can demonstrably improve algorithms designed to spot deepfake images and video. In my opinion, this can decrease the number of fakes on the internet and on TV.

https://techxplore.com/news/2022-05-deepfake-algorithms-success.html

https://voca.ro/1c0M2NrTM0mp

comparative investigation of
in our comparative investigation we observed more juvenile nathusius' pipistrelles (pipistrellus nathusii) dead beneath wind turbines than expected from their frequency in the local population(Y нашому порівняльному дослідженні ми спостерігали більше молодих натузіусів (pipistrellus nathusii) загиблих під вітрогенераторами, ніж очікувалося з огляду на їхню частоту серед місцевого населення)

comprehensive investigation of
Their collaboration with anthropologists, archaeologists, and ecologists is the first comprehensive investigation of how humans interacted with plant and animal species in different cultures.(Їхня співпраця з антропологами, археологами та екологами є першим комплексним дослідженням того, як люди взаємодіяли з видами рослин і тварин у різних культурах.)

condition imposed by
The team collected over 4,500 loan-related IMF documents to identify policy conditions imposed on 131 borrowing countries between 1985 and 2014.(Команда зібрала понад 4500 документів МВФ, пов’язаних із кредитами, щоб визначити умови політики, накладені на 131 країну-позичаль у період з 1985 по 2014 рік.)

https://voca.ro/1ltbLD5QKk7G

·        #39

Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 02 June 2022 09:32)

Exam topic #6 «Benefits of Satellite TV.»
One of the main advantages of satellite TV is the picture and sound quality. Many channels are already broadcasting in high definition (HD) format and using stereo sound, which will allow you to fully enjoy your favorite movie or sports broadcast.
No less important is the fact that no terrestrial television operator can offer the widest choice of television channels for every taste, broadcast from satellite.
I believe that the transition from analog signals to satellite television greatly simplifies our lives and contributes to the development of technology and improved signal quality.

https://voca.ro/1gKczsH57ChN

·        #38

Vorobyova E. to Yakimova from РЗ-213 (Thursday, 02 June 2022 09:32)

It’s not bad, but mind the articles and Sequence of Tenses in the sentence of the review on the article: “THE scientists…THE study showed that…COULD NOT…it PROVIDED…”. Continue working.

·        #37

Sofia Gilenko РЗ-211 (Yershova Y.A.) (Thursday, 02 June 2022 09:31)

Today I've read the article "Artificial skin capable of feeling pain could lead to a new generation of touch-sensitive robots".
An electronic skin that can learn from the feeling of "pain" could help create a new generation of smart robots with human sensitivity.
Scientists have been working for decades to create artificial skin that is sensitive to touch. One method that has been widely researched is to spread an array of contact or pressure sensors over the surface of the e-skin to allow it to detect when it is making contact with an object.
In my opinion, this article is very important, because in the future this research can become the basis for a more advanced electronic skin, which will allow robots to explore the world and interact with it.
https://techxplore.com/news/2022-06-artificial-skin-capable-pain-touch-sensitive.html
1) conditions imposed by
It is impossible to conduct research with the conditions imposed by superiors.
2)comprehensive investigation of
Accordingly, I support the calls for a more comprehensive investigation.
3) comparative investigation of
Comparative investigation of constitutive models for shotcrete based on numerical simulations of deep tunnel advance

https://voca.ro/1brGurQ3L1RY
https://voca.ro/1izTxtneTHwL

·        #36

Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 02 June 2022 09:29)

Exam topic #14
Commercial use of radio

November 2, 1920 was the day of the widely acclaimed first commercial radio broadcast, when Westinghouse Electric and Manufacturing Company broadcast the results of the Harding-Cox presidential election live. Over the last century, radio has evolved from a cumbersome experimental environment to a modern mobile format. Radio has discovered new technologies such as television and cell phones. For many, radio was the fastest and most reliable way to receive news about national and world events. Even now, radio continues to be a hot form of mass communication and remains one of the few free services.

https://voca.ro/1mKwxbqEs1JY
https://www.fcc.gov/media/radio/history-of-commercial-radio

Exam Topic #12
Benefits of Satellite TV

Satellite TV has many advantages. The Satellite TV eliminates various interferences and noises, allowing make the broadcast of the highest quality. An important advantage is that satellite coverage extends to the whole of country, so the location of the subscriber does not matter. By connecting to satellite broadcasting, the subscriber chooses the desired channels for viewing, without being tied to the packages of various operators. Therefore, satellite broadcasting is quite profitable for the TV channels themselves, as the picture is always high quality, and this only increases the prestige of the company itself. Satellite TV also has a wealth of information that can be used for both education and entertainment.

https://voca.ro/1hNdLjSYJzZW
https://www.streetdirectory.com/travel_guide/121722/televisions/the_top_benefits_of_satellite_tv_in_your_home.html

·        #35

Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 02 June 2022 09:29)

Today i have read the article called"A highly performing transistor based on an inorganic metal halide perovskite" which tells us about transistors. Transistors are electronic components that amplify and control the flow of electricity within most electronic devices in existence. The principle behind the operation of the new transistors is similar to the principle underlying the operation of conventional enhancement-mode silicon transistors. computers, TVs and smartphones. At present, the developed tin-based transistor shows high performance, but its stability in air is low.
I believe that even such well-established technologies need to be improved.

https://techxplore.com/news/2022-03-highly-transistor-based-inorganic-metal.html
https://voca.ro/1fWGshGyQXo4

1. Condition imposed by
Condition imposed by the company can lead to consequences.
Умова, встановлена ​​компанією, може призвести до наслідків.

2. Comparative investigation.
Comparative investigation showed good results.
Порівняльне дослідження показало хороші результати.


3. Comprehensive investigation.
Сomprehensive investigation can better understand the cause of this problem.
Комплексне дослідження може краще зрозуміти причину цієї проблеми.

https://voca.ro/19OgvC2Sj8NU

·        #34

Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 02 June 2022 09:28)

DEBT
Exam topic #12
Benefits of Satellite TV

From a consumer's point of view, cable and satellite TV packages may seem almost identical. While both have many of the same features, there are also some differences. Satellite TV providers usually offer a wider selection of channels than most cable companies. One of the advantages of satellite television is its wide availability. The picture offered by both satellite TV providers is often better compared to cable TV. As a satellite TV user, I believe this is the best investment in enjoying a wide range of digital programming.

https://voca.ro/1dXu3KHuOsuG
https://itstillworks.com/difference-between-digital-cable-satellite-6082624.html

DEBT
Exam topic #9
Development of television in your home country.
Telecommunications is the most modern, diverse and rapidly growing sector of the Ukrainian economy. Unlike the country's dominant export industries, telecommunications rank high in European and global rankings. The main TV channels are part of large financial holdings. In Ukraine, people have a choice between many TV channels. The head of the Public Television and Radio Company of Ukraine, said that all programs on all channels of the company - both national and regional - will be accompanied by sign language, but there are no approximate dates for implementation yet. The most viewed TV channels in Ukraine are commercial.

https://voca.ro/1nwJg1MAeuxa
https://studopedia.org/5-97958.html

·        #33

Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Thursday, 02 June 2022 09:26)

The article I have read today "Scientists break through exascale barrier for quantum chemistry simulations". The author of the article talks about a team led by scientists who succeeded in becoming the first group in the world to overcome the main barrier to "exaflop" - more than 1 trillion floating point operations per second - for computational scientific applications. Thanks to this achievement, they set a new world record. They made a breakthrough with the help of the Perlmutter supercomputer. Perlmutter is currently the fifth fastest computer in the world.

https://techxplore.com/news/2022-06-scientists-exascale-barrier-quantum-chemistry.html

https://voca.ro/1nLksUZqZaBm

1) The study represents the most comprehensive investigation of historic genetic diversity in whales.
Дослідження являє собою найбільш повне дослідження історичного генетичного різноманіття китів.

2) Without the conditions imposed, the operation will significantly reduce the alternatives that Mexican farmers.
Без встановлених умов операція значно зменшить альтернативи мексиканським фермерам.

3) In our comparative investigation we observed many juvenile nathusius.
У нашому порівняльному дослідженні ми спостерігали багато молодих натусів.

https://voca.ro/1j82YZi7ehlP

·        #32

Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 02 June 2022 09:25)

1. Сonditions imposed by
Умови, нав'язані
That affordability makes hematite attractive as an oxygen-carrier material, but high performance at the conditions imposed by the chemical looping process is also important.
Така доступність робить гематит привабливим як матеріал-переносник кисню, але також важлива висока продуктивність в умовах, пов’язаних з хімічним циклом.
2. Comparative investigations of
Порівняльні дослідження
The time to revive the comparative investigations of approach has arrived.
Настав час відродити порівняльні дослідження підходу.
3. Сomprehensive investigation of
Комплексне дослідження
To our knowledge, this study is the first comprehensive investigation of artificial neural networks
Наскільки нам відомо, це дослідження є першим комплексним дослідженням штучних нейронних мереж

Today I read the article entitled "Intelligent optical chip to improve telecommunications". This article is about the discovery in optical technology. These technologies use optical pulsed sources to transmit, extract or compute information. Scientists have developed an intelligent pulse shaper integrated into the chip. The device has long-term reliability, low losses, fiber optic connection and maximum functionality. The team's next steps include exploring more complex chip designs. The goal is to improve device performance as well as built-in optical sampling integration.

https://voca.ro/17I5NAQ7vhoS

https://phys.org/news/2021-10-intelligent-optical-chip-telecommunications.html

·        #31

Artem Kotliarov RZ-212 (Lebedeva E.) (Thursday, 02 June 2022 09:24)

1) 1. condition imposed by
Where a country's capacity to develop has been disrupted by conflict, the financial conditions imposed by international lending institutions should be relaxed. - Якщо здатність країни до розвитку була порушена через конфлікт, фінансові умови, встановлені міжнародними кредитними установами, мають бути пом’якшеними.
2. comprehensive investigation of
The most comprehensive investigation of the function of these inner retinal photoreceptors has come from studies of retinal degeneration in mammals. - Найбільш повне дослідження функції цих внутрішніх фоторецепторів сітківки отримало дослідження дегенерації сітківки у ссавців.
3. comparative investigation of
Comparative investigation of constitutive models for shotcrete based on numerical simulations of deep tunnel advance - Порівняльне дослідження конститутивних моделей для торкрету на основі чисельного моделювання просування глибокого тунелю
https://voca.ro/1bKXJb9w0Lfg
2) Today, І have read thе аrtісlе «New research explores the impact of the COVID-19 pandemic on nuclear security»
Researchers from King's College, London, have published a new study examining how Britain's civilian nuclear sector has responded to the challenges posed by COVID-19. The COVID-19 pandemic has had a significant impact on the nuclear sector and its critical national infrastructure. Challenges include increasing absenteeism due to infections and forced isolation, limiting the number of staff in enterprises, physical restrictions on those on site to minimize disease transmission, and the large-scale shift to remote work.
In my opinion, this study provides a new insight into how nuclear safety was introduced at the operational level after the launch of COVID-19.
https://techxplore.com/news/2022-02-explores-impact-covid-pandemic-nuclear.html
https://voca.ro/1kZiu1bHRzqd
3) Exam topic #18 ("Protection schemes”)
Nowadays, protection schemes are everywhere. Each bank, company, organization etc. have their own protection schemes. These schemes are usually some code written by a high-quality specialist to secure data from the villain. It's always very important to have individual way to protect a big amount of information, that's why schemes are always checking to have a stable control on situation, because at least one mistake can destroy all the system. In general, only robbers and hackers want to get the access to the system to stole information or money.
https://voca.ro/1fFR53ctWGWs

·        #30

Yershova Y. (Thursday, 02 June 2022 09:22)

Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 02 June 2022 09:14)
Your comment is thoughtful. Thank you for your effective work with the phrases.

·        #29

Ilinchuck Vladislav RZ-211 (Lebedeva) (Thursday, 02 June 2022 09:21)

Today I have read the article "Scaling new heights with new research showing how plants can grow at altitude". This the article is about a new study has found that plant species are adapted to the altitude where they grow by 'sensing' the oxygen levels that surround them. Research led by scientists at the University of Nottingham has identified a mechanism through which plants can sense atmospheric oxygen levels (that decrease with altitude) that will help to understand how plants live at high altitude.Researchers analyzed plants growing at low and high-altitude locations. The team, working in Nottingham, Ecuador and Spain was able to identify how oxygen-sensing controls the pathway of chlorophyll synthesis, permitting plants to match the levels of a key toxic chemical to surrounding oxygen levels.
In my opinion , this article is very interesting for everyone , especially for people who love plants and new technologies . I think this technology will become very useful soon
1)https://phys.org/news/2022-06-scaling-heights-altitude.html
2)https://voca.ro/13HlFsD9vKE8

condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.
comparative investigation of
Stiftung Warentest carries out more than 200 comparative product tests and investigations of services from nearly all areas of everyday life every year.
Stiftung Warentest щороку проводить понад 200 порівняльних тестів продуктів і досліджень послуг майже з усіх сфер повсякденного життя.
comprehensive investigation of
This is also the reason why Ethiopia has been adamantly resisting a comprehensive investigation of all the events that led to the current crisis.
Це також є причиною того, що Ефіопія непохитно протидіє комплексному розслідуванню всіх подій, які призвели до нинішньої кризи.
3)https://voca.ro/1iTpWuoRMV7o

·        #28

Misha Donenko RZ-211 Lebedeva (Thursday, 02 June 2022 09:21)

Today I’ve read the article “How children are being targeted with hidden ads on social media”. Using funny memes, insider-driven stories or inspirational content, this type of advertising disguises its commercial nature. Anything works so long as it promotes positive emotions in the consumer. Research has shown how they result in consumers constructing raising mental defenses as they realize they're being sold to. To my mind children have fewer skills for recognizing advertising than adults—they just don't have the experience and 17–24 year-old children are more prone to process advertising affectively because, as neuroscientific research confirms, their brain structure is undergoing dramatic changes and the neocortex is in upheaval.
How children are being targeted with hidden ads on social media (techxplore.com)
https://voca.ro/1ab8L3FsYFI7

1)comparative investigation of
This Note provides the results of the comparative investigation requested.
Ця примітка містить результати запитуваного порівняльного дослідження.
2)comprehensive investigation of
Accordingly, I support the calls for a more comprehensive investigation.
Відповідно, я підтримую заклики до більш комплексного розслідування.
3)condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.
https://voca.ro/1grJCHeuZSN6

·        #27

Pushkash Maxim (RZ-212 Popovich) (Thursday, 02 June 2022 09:19)

Exam Topic #10 (information protection systems)

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad. Confidentiality
Confidentiality measures are designed to prevent unauthorized disclosure of information. Integrity
Consistency includes protection against unauthorized changes (additions, deletions, alterations, etc.) to data. Availability
Availability is the protection of a system’s ability to make software systems and data fully available when a user needs it (or at a specified time).
Voice: https://voca.ro/1hNvplpMJGW7

·        #26

Denis Zavadsky Lebedeva RZ-211 (Thursday, 02 June 2022 09:17)

Additive manufacturing, the technical name for 3D printing, encompasses a variety of material processing techniques, the most widely adopted among them being laser powder bed fusion (LPBF). It works by spreading thin layers of metallic powder particles that are bonded together through intense heat delivered by high-powered lasers. But this process can result in the formation of tiny pores that weaken the overall structure.

I think this is a worthwhile discovery, since a metal 3D printer can help with a huge number of problems.

https://techxplore.com/news/2022-05-insights-3d-metals.html

The Secretary-General informed the Council that a more comprehensive investigation of the 5 June 1993 incident was being undertaken.
The Institute of legal and comparative investigations is established in Kazakhstan (2009).
He argued that privatization was often a loan condition imposed by IFIs.

Генеральний секретар поінформував Раду про те, що проводиться більш комплексне розслідування інциденту 5 червня 1993 року.
У Казахстані створено Інститут правових і порівняльних розслідувань (2009).
Він стверджував, що приватизація часто була умовою позики, яку накладають міжнародні фінансові установи.

https://voca.ro/1onJ8sZ0vgjc

·        #25

Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 02 June 2022 09:14)

1. Today I have read the article 'Novel solar cell architecture performs well under real-world constraints'.
To overcome the limit of received electricity from converting sunligth, researchers have made different designs for solar cells to make them more effective. For instance, hot-carrier solar cells (HCSCs) make use of the excess kinetic energy of photoexcited electrons (before they are lost as heat) to improve PCE. JPE Editor-in-Chief Sean Shaheen (University of Colorado Boulder) remarks, "Hot-carrier photovoltaics have been proposed since the early 1980s as a way to achieve higher efficiencies that break the conventional 'detailed-balance' limit, but they have yet to be realized in practice.
In my opinion, improving the ways of obstaining the green energy is a really good decision, and that way, non-renewable energy with the time will be put aside.
2. https://techxplore.com/news/2022-06-solar-cell-architecture-real-world-constraints.html
3. https://voca.ro/18Ns4ITPV3DN
4. 1) comparative investigation of
A comparative investigation of methods for longitudinal data with limits of detection through a case study.
2) condition imposed by
The condition imposed by the Fates had been met , and the decree was irrevocable
3) comprehensive investigation of
In the dissertation, comprehensive investigation of the helical FCG and of the power conditioning circuit is carried out theoretically, numerically and experimentally.
5. https://voca.ro/168otw2Hi86j

·        #24

Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 02 June 2022 09:12)

Exam Topic #4 (Turning the DTV signal)

Digital television (DTV) is the transmission of television signals using digital encoding, in contrast to the earlier analog television technology which used analog signals. At the time of its development it was considered an innovative advancement and represented the first significant evolution in television technology since color television in the 1950s. Modern digital television is transmitted in high-definition television (HDTV) with greater resolution than analog TV. It typically uses a widescreen aspect ratio (commonly 16:9) in contrast to the narrower format of analog TV.

https://voca.ro/12sVOmWxr0ha

·        #23

Lebedeva E. (Thursday, 02 June 2022 09:11)

To Mykola Zhmurak RZ-211 The comment is informative and detailed.

·        #22

Shlapak Dmytro RZ-213 (Vorobyova) (Thursday, 02 June 2022 09:11)

1. With the help of a comprehensive investigation of, our company has achieved high mortality rates among employees.
2. - Why have your comparative investigations of not yielded any results for 3 months?
3. - We will not fulfill these conditions imposed on us by the country.

Today I have read the article "Mexico sets conditions for Bayer-Monsanto merger". I don't really understand business, how companies buy each other, how major deals are concluded, etc.. But, I like the idea of merging two large companies, that and small ones too. As for me, when two companies that have something in common merge, something very promising turns out, something that can give a person something new and useful. I also like how Bayer offered its competitor to buy companies, as for me this is a very worthy move, because in this way Bayer shows its respect for the competitor.

https://phys.org/news/2018-06-mexico-conditions-bayer-monsanto-merger.html

https://voca.ro/1eeOQUhjnEKP

·        #21

Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 02 June 2022 09:08)

Exam Topic #3 (Early radio development)

The early history of radio is the history of technology that produces and uses radio instruments that use radio waves. Within the timeline of radio, many people contributed theory and inventions in what became radio. Radio development began as "wireless telegraphy". Later radio history increasingly involves matters of broadcasting. After the discovery of these "Hertzian waves" (it would take almost 20 years for the term "radio" to be universally adopted for this type of electromagnetic radiation) many scientists and inventors experimented with transmitting and detecting Hertzian waves. Maxwell's theory showing that light and Hertzian electromagnetic waves were the same phenomenon at different wavelengths led "Maxwellian" scientists to assume they would be analogous to optical light.

https://voca.ro/1o94wgf6k4rn

·        #20

Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 02 June 2022 09:06)

Prhases of Day
1. condition imposed by : https://voca.ro/11PXPXEAqzAS
It finally gained approval after agreeing to 400 separate environmental conditions imposed by the Chilean government
Він нарешті отримав схвалення після погодження з 400 окремими екологічними умовами, встановленими урядом Чилі

2. comprehensive investigation of : https://voca.ro/13yr879IGLQB
ANSTO has contributed to a comprehensive investigation of a promising type of nanoparticle that could potentially be used for intractable brain cancers in a combined therapy.
ANSTO внесла внесок у комплексне дослідження перспективного типу наночастинок, які потенційно можуть бути використані для лікування раку мозку, який не можна вилікувати, у комбінованій терапії.

3. comparative investigation of : https://voca.ro/1fZjhpV8eHFk
The study represents the first systematic and comparative investigation of cognitive abilities in lemurs and provides important insights into the evolution of cognitive abilities in primates.
Дослідження являє собою перше систематичне і порівняльне дослідження когнітивних здібностей у лемурів і дає важливе уявлення про еволюцію когнітивних здібностей у приматів.


Article: https://phys.org/news/2018-11-stronger-cybersecurity-strategy.html
Audio: https://voca.ro/1iJDkitZ5dpm
Today, an interesting article was read by me.The main idea is to create strategies to combat cybercrime.
It consists of two parts: before the incident and after the incident. It is very important that everyone knows the plan of action for any of the parts.
For example, in the first part, each specialist must work to identify certain vulnerabilities in the system, and communicate with other employees to effectively solve this problem.
In the second part, each structure or company must describe actions to avoid maximum damage to systems and further protection against cyber attacks, etc.
In my opinion, it is very important to have an action plan for any development of the situation, because it will increase the effectiveness of solving such problems

·        #19

Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 02 June 2022 09:05)

Today I have read the article "Topologically tuned terahertz on a nonlinear photonic chip". It says that compact terahertz functional devices are highly useful for high-speed wireless communication, biochemical sensing and non-destructive inspection. However, controlled terahertz generation, alongside transport and detection is challenging for chip-scale devices, due to low coupling efficiency and absorption losses. The team used femtosecond-laser writing technology to develop the construct with a topological defect at the central interface. I believe that this research will allow the development of future photonic technologies.

https://phys.org/news/2022-06-topologically-tuned-terahertz-nonlinear-photonic.html
https://voca.ro/1dpSKtrvFOSn

1) conditions imposed by
It is impossible to conduct research with the conditions imposed by superiors.
Неможливо проводити дослідження з умовами, які нав’язує начальство.
2) comprehensive investigation of
Сomprehensive investigation can be carried out only after the internal one.
Всесторонне дослідження можна проводити тільки після внутрішнього.
3) сomparative investigations of
A comparative study was not conducted due to misunderstandings.
Порівняльне дослідження не проводилося через недорозуміння.

https://voca.ro/12Xo6jw109Zc

·        #18

Anna Yakymova/ RZ-213(Vorobyova E.V.) (Thursday, 02 June 2022 09:00)

Phrases of the day(02/06/2022):
1. comprehensive investigation of - комплексне розслідування
Their collaboration with anthropologists, archaeologists, and ecologists is the first comprehensive investigation of how humans interacted with plant and animal species in different cultures.( Їхня співпраця з антропологами, археологами та екологами є першим комплексним дослідженням того, як люди взаємодіяли з видами рослин і тварин у різних культурах.)
link: https://phys.org/news/2019-02-reveals-humanity-roles-ecosystems.html
audio recording: https://voca.ro/1kHW6C5GFFYB
2. comparative investigation of - порівняльне дослідження про
The study represents the first systematic and comparative investigation of cognitive abilities in lemurs and provides important insights into the evolution of cognitive abilities in primates.
(Дослідження являє собою перше систематичне і порівняльне дослідження когнітивних здібностей у лемурів і дає важливе уявлення про еволюцію когнітивних здібностей у приматів.)
link: https://phys.org/news/2020-09-primate-brain-size-intelligence.html
audio recording: https://voca.ro/17UizLdt4a0J
3. condition imposed by - умова встановлена
"Without the conditions imposed, the operation will significantly reduce the alternatives that Mexican farmers have at their disposal to a broad range of seeds and non-selective pesticides, which could lead to higher prices and less innovation, research and development of new products," the regulator said.
(«Без встановлених умов операція значно зменшить альтернативи, які мають у своєму розпорядженні мексиканські фермери, до широкого спектру насіння та неселективних пестицидів, що може призвести до підвищення цін і меншої кількості інновацій, досліджень і розробок нових продуктів», – сказав регулятор.)
link: https://phys.org/news/2018-06-mexico-conditions-bayer-monsanto-merger.html
audio recording: https://voca.ro/1k2SN67JCXRn
Review:
Today I have read the article "Primate brain size does not predict their intelligence".
Monkeys are known to have large brains and are our closest relatives. But does brain size really affect the mind of an animal?
Scientists conducted a study that showed that the relationship between brain size and cognitive abilities cannot be generalized and it provides new insights into the evolution of cognitive abilities in primates. The results of the new study show that despite their smaller brains lemurs average cognitive performance in the tests of the PCTB was not fundamentally different from the performances of the other primate species.
Further comparative studies in a variety of other species are essential to answer the many questions about the relationship between brain size, diet, social life and cognition.
Link: https://phys.org/news/2020-09-primate-brain-size-intelligence.html
Audio recording: https://voca.ro/1K2Z8Sj7BgR2

·        #17

Lebedeva E. (Thursday, 02 June 2022 08:54)

To Daniil Dragin (RZ-211) Thanks for the comment.

·        #16

Mykola Zhmurak RZ-211(Lebedeva) (Thursday, 02 June 2022 08:53)

Today i have read the article titled "Toward speech recognition for uncommon spoken languages". This article is about automated speech-recognition technology. But this technology didn't spread for uncommon spoken languages. Researchers at MIT and elsewhere have now tackled this problem by developing a simple technique that reduces the complexity of an advanced speech-learning model, enabling it to run more efficiently and achieve higher performance. This is an important problem that needed to solve. Because other uncommon languages underexplored in the world.
Article - https://techxplore.com/news/2021-11-speech-recognition-uncommon-spoken-languages.html
Vocaroo - https://voca.ro/1o13PdU1VBfN
Phrases :
1) comprehensive investigation of
After gaining state independence increased the importance of comprehensive investigation of folklore samples and followed by new scientific projects.(Після здобуття державної незалежності зросло значення всебічного дослідження фольклорних зразків, а за ним почалися нові наукові проекти.)
2) comparative investigation of
Comparative investigations based on DNA analysis were performed by the Netherlands Forensic Institute (NFI), in response to a request made by the United Nations Mission.(Порівняльні дослідження на основі аналізу ДНК були проведені Нідерландським інститутом судової експертизи (NFI) у відповідь на запит Місії ООН.)
3) condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.(Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.)
Vocaroo - https://voca.ro/1lWxO6MjqX6S

·        #15

Daniil Dragin (RZ-211 Lebedeva E) (Thursday, 02 June 2022 08:49)

1)Today I have read the article '''New technique offers faster security for non-volatile memory tech''.This article is about a new hardware and software method to improve file system(NVM) security. NVM is a new technology that provides fast data access and retains data even in the event of a system crash or power outage. Their hardware-software method can improve the performance of all programs that work with file encryption, because it speeds up the encryption and reading of these files, as well as making the system more stable and protected from external threats.
In my opinion, our future will be completely connected with information, which means that information will become the most important resource, and if we have methods for protecting information, this can lead to chaos in the world.
2)https://techxplore.com/news/2022-04-technique-faster-non-volatile-memory-tech.html
3)https://voca.ro/1mMGxfZUP0gN
4)
1)comparative investigation of
This Note provides the results of the comparative investigation requested.
Ця примітка містить результати запитуваного порівняльного дослідження.
2)comprehensive investigation of
Accordingly, I support the calls for a more comprehensive investigation.
Відповідно, я підтримую заклики до більш комплексного розслідування.
3)condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.
5)https://voca.ro/1arQu54ORnOx

·        #14

Lebedeva E. (Thursday, 02 June 2022 08:47)

To РЗ-211 The lesson will start soon, so I am waiting for your comments, sentences with Phrases and audio recordings

·        #13

Yershova Y. to PЗ-211 (Thursday, 02 June 2022 08:21)

Good morning! The lesson has started. Please, don't waste your time and work within the timeframe of your session. Good luck!

·        #12

Anton Ardelyan RZ-211(Gvozd O.V.) 03.05 (Wednesday, 01 June 2022 17:17)

Today i have read the article "DuckDuckGo can now block the Google Chrome tracking method, FLoC" an alternative search engine provider, announced in early spring that it had developed an extension for the Chrome browser that blocks FLoC tracking. FLoC is a "feature" Google added to its browser to track user habits for targeted advertising. Many users have complained about the invasion of privacy, and that is why DuckDuckGo created an extension to block it.
Link: https://techxplore.com/news/2021-04-duckduckgo-block-google-chrome-tracking.html
Audio: https://voca.ro/1luwEtDX7cOb
Phrases:
1)It's beyond the scope of this work.
Це виходить за рамки цієї роботи.
2)Start by outlining the situation you were in.
Почніть з опису ситуації, в якій ви опинилися.
3)Such processes are classified as electrocyclic.
Такі процеси відносять до електроциклічних.
Audio: https://voca.ro/1Htx1FEoOx6A

·        #11

Anna Yakymova/ RZ-213(S.Mykhailiuk) (Wednesday, 01 June 2022 12:41)

1.
https://phys.org/news/2015-09-nasa-upper-level-westerly-affecting-tropical.html
https://voca.ro/1mGvqk0HHHSg
I ` m going to write a few words about the article I have recently read. The article is headlined «NASA shows upper-level westerly winds affecting Tropical Storm Fred». The article is about changes in weather. Much attention is given to the effect of upper-level winds on a tropical storm. NASA's Aqua satellite imagery showed the highest thunderstorms southeast of the storm's center. AIRS data also showed some of the highest, coldest, strongest thunderstorms with the temperature of the top of the clouds over storm Fred. Then this cyclone is encountering strong upper-level winds, so weakening is forecast.
In my view, this information is useful because it is especially difficult to predict weather changes. And everyone wants to know what the weather will be like tomorrow.
2.
https://techxplore.com/news/2021-08-drones-obstacles-high.html
https://voca.ro/1HAj8zLWQhom
Today I have read the article :"System trains drones to fly around obstacles at high speeds".This article is about how scientists teach drones to fly as efficiently as possible at high speeds. In drone races, accidents are very common due to crashes and misbehavior at high speeds. Scientists have developed a drone behavior algorithm based on theory and practice. Studying the behavior of drones in practice is very expensive due to the fact that drones are often crashed and in order to minimize losses, scientists have created an algorithm that contains theoretical data and fills in their gaps with data from real flights. Drones using such algorithms fly slower than regular ones in some places, but in the end they outperform regular drones.In my opinion, such drones are very useful because they can help people in difficult situations. For example, to search for survivors of natural disasters.

3.
https://techxplore.com/news/2021-10-social-media-speech-online-gaming.html
https://voca.ro/1cJbGFzlNciC
I've read the article "Social media can learn how to regulate speech"
The author's point of view is that social media evolved from games as places where people could communicate, and though there is not explicit gameplay involved, such sites are in fact a game of their own, with people seeking likes, retweets or other cooperation. The authors argued a bottom-up approach would work better because of economies of scale and cultural differences. Social media companies employ thousands of people to review problematic posts and make decisions about whether they are allowable.
In my opinion this is an interesting article with an interesting thought.
4.
The article is headlined «A visual database of human plasma compounds». The article is about creation of a database of metabolites from blood samples by Japanese scientists. This database is available online for the whole world. Other countries and regions also cover similar bases. Many people add samples to jMorp so that the application is useful and scientists can analyze the data. And scientists update the database every year.
I found the article interesting because such a database is convenient and useful in the digital age.
https://phys.org/news/2017-12-visual-database-human-plasma-compounds.html
https://voca.ro/12k88qZdhSCH
5.
The article is headlined 'FBI launches phone app to help find missing children'. The article is about application for searching for missing children, created by the FBI. Parents can enter the child's physical IDs for easy find in the app. For example, height and weight. But the application is only available on the iPhone because of the FBI wants to increase the functionality.
In my view, this article is useful because thousands of children are lost or disappear every day and this application is convenient for their search.
https://phys.org/news/2011-08-fbi-app-children.html
https://voca.ro/18RsOPUJNzPE

·        #10

Lebedeva E. (Wednesday, 01 June 2022 12:24)

To Neblienko V. / RZ-212 / Thanks for the work. Keep on this way.

·        #9

Neblienko V. / RZ-212 / Lebedeva (Wednesday, 01 June 2022 12:07)

(Отработка за 19.05.2022)
Today i have read the article titled: 'Breakthrough Listen project releases analysis of previously detected signal'. This article describes a detailed study of the signal, allegedly from the Proxima Centauri system, although the researchers are inclined to believe that this signal is of terrestrial origin and has no connection with the above cluster system.
Two research papers, published in Nature Astronomy, discuss both the detection of the candidate signal and an advanced data analysis process that can finely discern "false positives."
In my opinion, although this study of the signal did not bring anything special and sensational, the researchers consolidated the experience of studying and processing signals, which is just as good.

Article: https://phys.org/news/2021-10-breakthrough-analysis-previously.html
Vocaroo: https://voca.ro/1frWFtuZLCr4

Phrases:

by outlining

The report concludes by outlining briefly major issues in the financing of the sectoral clusters under review

В заключительной части доклада кратко освещаются основные вопросы, связанные с финансированием рассматриваемых секторов.

classified as

Anti-personnel mines are classified as excessively injurious weapons.

Противопехотные мины классифицируются как оружие, производящее чрезмерно травмирующее действие.

beyond the scope of

He knows technical details beyond the scope of his job

Он знает технические подробности больше, чем того требуют его функции.

Vocaroo: https://voca.ro/196VkSFads7d

·        #8

Neblienko V. / RZ-212 / Lebedeva (Wednesday, 01 June 2022 11:52)

(Отработка за 19.05.2022)
Exam topic Password as a general technique of secrecy #17
Password - a conditional word or an arbitrary set of characters, consisting of letters, numbers and other symbols, and designed to confirm identity or authority. If only numbers are allowed, then such a combination is sometimes called a PIN code (from the English abbreviation PIN - personal identification number).
Passwords are often used to protect information from unauthorized access. Most computing systems use a username/password combination to authenticate a user.
Despite the origin of the term, the password does not have to be, in fact, a word. A combination that is not a word is harder to guess or guess, so these passwords are preferred.
Vocaroo: https://voca.ro/182j59X5x36N

·        #7

Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:50)

Відпрацювання 5
Now almost every person was interested in his development and how smart he is, tests don’t help with this, but how do we find out how smart computers or other devices are
article titled: "AI software overcomes high hurdles in IQ tests, but still makes stupid mistakes. Can better tests help?" will help us in this matter. Artificial intelligence (AI) language models, trained on billions of words from books, news articles and Wikipedia, can create incredibly human prose. They can create tweets, summarize emails, and translate into dozens of languages. They can even write tolerable poetry. And, like A students, they quickly master the tests, called tests, that computer scientists develop for them.

It was Sam Bowman's sobering experience when he and his colleagues created a hard new benchmark for language models called GLUE (Global Language Understanding Assessment). GLUE gives AI models the ability to train on datasets containing thousands of sentences and gives them nine tasks, such as determining whether a test sentence is grammatical, assessing its sentiment, or assessing whether one sentence logically entails another. After completing the tasks of each model, an average score is set.

At first, Bowman, a computer scientist at New York University, thought he had confused the models. The best of them scored less than 70 points out of 100 (D+). But in less than 1 year, the newer and better models scored about 90 points, surpassing humans. “We were very surprised by the surge,” Bowman says. So in 2019, the researchers made the test more difficult, calling it SuperGLUE. Some of the tasks required the AI ​​models to answer reading comprehension questions after digesting not only sentences but also paragraphs taken from Wikipedia or news sites. Again, the humans had an initial lead of 20 points. “What happened next wasn't all that shocking,” says Bowman. By early 2021, computers were once again beating humans.

Competition for top test scores has led to real progress in the field of AI. Many believe that the ImageNet challenge, a computer vision competition that began in 2010, has revolutionized deep learning, a leading approach to artificial intelligence in which brain-inspired "neural networks" learn on their own from large sets of examples. But the best test takers aren't always superhuman in the real world. Time and time again, models succeed in tests but fail when deployed or scrutinized. “They fall apart pretty easily,” Bowman says.
Article:https://www.science.org/content/article/computers-ace-iq-tests-still-make-dumb-mistakes-can-different-tests-help

·        #6

Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (Wednesday, 01 June 2022 11:21)

Exam Topic: Antivirus programs.
How antivirus software works
Antivirus software typically runs as a background process, scanning computers, servers or mobile devices to detect and restrict the spread of malware. Many antivirus software programs include real-time threat detection and protection to guard against potential vulnerabilities as they happen, as well as system scans that monitor device and system files looking for possible risks.
Vocaroo:https://voca.ro/19yiUYucOKO8

·        #5

Mitriev Vitaliy RZ-213(Vorobyova RZ-213)(Homework) (Wednesday, 01 June 2022 11:19)

Exam Topic: Different protection mechanisms

The main protective mechanisms are activities aimed at ensuring engineering measures of confidentiality, integrity and availability of information. Protective mechanisms are divided into:
Physical - various engineering tools and structures that complicate or eliminate the physical intrusion of offenders into objects of protection and into material carriers of confidential information;
Hardware - mechanical, electrical, electronic and other devices designed to protect information from leakage, disclosure, modification, destruction, as well as counteraction to technical intelligence;
Software - special programs for computers that implement the functions of protecting information from unauthorized access, copying, modification, destruction and blocking;
Cryptographic - technical and software means of data encryption based on the use of various mathematical and algorithmic methods;
When combined, these three mechanisms provide very strong protection of data and computers.
https://voca.ro/135I4EZEAAN2

·        #4

Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:16)

Відпрацювання 4
In 2022, each person has his own gadget in which he stores his confidential information and each person has the right to privacy, but is this privacy itself really, in the article that I read and I want to tell you about it, it is about this and how we can avoid surveillance. Satcha is titled: "Technology Spying on You? New AI Could Prevent Eavesdropping." The article is about the fact that Companies use "bossware" to listen to their employees when they are near their computers. Several "spy" applications can record phone calls. And home devices like the Amazon Echo can record everyday conversations. A new technology called Neural Voice Camouflage now offers protection. It generates its own audio noise in the background when you speak, confusing the artificial intelligence (AI) that decodes our recorded voices.

The new system uses an "adversarial attack". The strategy uses machine learning, in which algorithms find patterns in data, to tune sounds in such a way that AI, not humans, mistake them for something else. Essentially, you are using one AI to fool another.

However, the process is not as simple as it seems. The machine learning AI has to process the entire sound clip before it knows how to set it up, which doesn't work when you want to mask in real time.

So in the new study, the researchers trained a neural network, a brain-inspired machine learning system, to effectively predict the future. They trained him on hours of speech recording so that he could constantly process 2-second snippets of audio and mask out what was likely to be said next.

For example, if someone just said "enjoy a big feast", they cannot accurately predict what will be said next. But, taking into account what has just been said, as well as the characteristics of the speaker's voice, it produces sounds that will break a number of possible phrases that may follow. This includes what actually happened next; here the same speaker says, "It is being prepared." To listeners, sound camouflage sounds like background noise and they have no problem understanding spoken words. But cars stumble.
This is just the first step in protecting privacy in the face of AI, says Mia Chikier, a computer scientist at Columbia University who led the study. “Artificial intelligence collects data about our voice, faces and actions. We need next-generation technology that respects our privacy."

Chiquier adds that the predictive part of the system has great potential for other applications that require real-time processing, such as autonomous vehicles. “You have to anticipate where the car will be, where the pedestrian might be,” she says. The brain also works by waiting; you get surprised when your brain mispredicts something. In this regard, Chikyo says: "We imitate the way people act."

"There's something nice about how it combines future prediction, a classic machine learning problem, with another adversarial machine learning problem," says Andrew Owens, a computer scientist at the University of Michigan at Ann Arbor who studies audio processing. and visual camouflage and did not participate in the work. Bo Li, a computer scientist at the University of Illinois at Urbana-Champaign who has worked on audio adversarial attacks, was impressed that the new approach worked even against a hardened ASR system.

Sound masking is badly needed, says Jay Stanley, senior policy analyst at the American Civil Liberties Union. “We are all susceptible to our innocent speech being misinterpreted by security algorithms.” Maintaining privacy is hard work, he says. More precisely, it is a Harenar ov resonance.
Article:https://www.science.org/content/article/technology-spying-you-new-ai-could-prevent-eavesdropping

·        #3

Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:15)

Відпрацювання 3
To date, very popular information about new diseases and viruses, this is the article I came across when reading the news and scientific discoveries "Analysis of 6.4 million genomes of SARS-CoV-2 revealed mutations associated with adaptation", very intriguing and in at the same time frightening. Satya is very big but, I want to show you how important to me is what is written in it. Satya says that the SARS-CoV-2 pandemic was characterized by recurrent waves of cases caused by the emergence of new lines with higher fitness, where fitness includes any trait that affects the growth of the line, including its baseline reproductive number (R 0). ability to evade existing immunity and generation time. Rapid identification of such pedigrees as they emerge and accurate prediction of their dynamics is crucial for controlling the response to an outbreak. Effective implementation of this task will benefit from the ability to study the entire global SARS-CoV-2 genomic data set. The large size (currently more than 7.5 million viral genomes), as well as the geographical and temporal variability of the available data, are serious problems that will become more serious as more viruses are sequenced. Current phylogenetic approaches are computationally inefficient for datasets with more than ~ 5,000 samples, and it takes days to operate on this scale. Special methods for assessing the relative suitability of specific SARS-CoV-2 lines are a computationally efficient alternative.), But usually relied on models in which one or two lines of interest are compared to all others and do not reflect the complex dynamics of several circulating lines. When modeling the relative fitness of SARS-CoV-2 lines, we estimated their growth as a linear combination of the effects of individual mutations. To this end, we have developed PyR 0, a hierarchical Bayesian regression model that allows scalable analysis of the complete set of publicly available SARS-CoV-2 genomes, which can be applied to any set of virus genomic data and to other viral phenotypes. The model shown in Fig. S1, described in detail in the supplementary materials, avoids the difficulty of complete phylogenetic inference by initially clustering genomes by genetic similarity (PANGO line refinement) and estimating the additional effect on the growth rate of each of the most common amino acid substitutions in the lines in which they occur. By regressing the growth rate along the genome sequence, the model divides the statistical power among genetically similar lines, without relying explicitly on phylogeny. By modeling only the polynomial proportions of different pedigrees, not the absolute number of samples for each pedigree, and doing so within 14-day intervals in 1560 globally distributed geographical regions, the model achieves resilience to a number of bias sources that affect all lines in different regions. and over time, including differences in data collection and changes in transmission due to factors such as social behavior, public health policies and vaccination.
Article:https://www.science.org/doi/10.1126/science.abm1208

·        #2

Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:14)

Відпрацювання 2
I've always been interested in information about scientific discoveries and breakthroughs, which is exactly the kind of article I came across, entitled "Breakthrough in Fusion: What It Means for the Future of Energy." The article begins with the fact that European scientists have announced a major breakthrough in the desire to develop a practical nuclear fusion - an energy process that feeds the stars. The British laboratory JET broke its own world record for the amount of energy obtained by compressing two forms of hydrogen together.

The experiments yielded 59 megajoules of energy in five seconds (11 megawatts of power).

This is more than twice as much as was obtained during similar tests in 1997. This is not too much energy - only about 60 kettles of water are enough to boil.

But the importance of this achievement lies in the fact that it confirmed the correctness of the project developed for a larger thermonuclear reactor, which is currently being built in France.
This is great information for me, but it doesn't end there.
The ITER facility, located in the south of France, is supported by a consortium of world governments, including the EU, the United States, China and Russia. It is expected that this will be the last step in confirming the fact that nuclear fusion can become a reliable source of energy in the second half of this century.

The operation of fusion-based power plants of the future will not lead to greenhouse gas emissions and will generate only a very small amount of short-lived radioactive waste.

"These experiments, which we have just completed, should have worked," said JET CEO Professor Ian Chapman. "If they did not work, we would have real concerns about whether ITER will be able to achieve its goals."

"The stakes were high, and what we've achieved has been achieved thanks to incredible people and their faith in science," he told BBC News.

Thermonuclear fusion is based on the principle that energy can be released by fusing atomic nuclei, rather than by fission, as in the case of fission reactions, which operate existing nuclear power plants.

In the core of the Sun, this is due to the enormous gravitational pressure at temperatures of about 10 million degrees Celsius. At a much lower pressure than possible on Earth, the temperatures for synthesis must be much higher - more than 100 million degrees Celsius.

There are no materials that can withstand direct contact with such heat. Therefore, to achieve thermonuclear fusion in the laboratory, scientists have developed a system in which superheated gas or plasma is kept inside a magnetic field in the shape of a donut.

The Joint European Torus (JET) reactor, located in Kalham, Oxfordshire, has pioneered this approach to synthesis, which it has been working on for almost 40 years. And over the last 10 years, it has been tuned to recreate the future look of the ITER facility.
Article:https://www.bbc.com/ukrainian/features-60318751

·        #1

Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:13)

Відпрацювання 1
Today I read an interesting scientific article: "A geomagnetic storm blew out of orbit over 40 satellites of Elon Musk." In which it is told about the fact that Elon Musk's company "SpaceX" confirmed that a strong geomagnetic storm struck over 40 satellites. They also added that, at the same time, the company began to sing that the situation would not become a threat to people: there would be no other companions, there would be no cosmic death.

SpaceX satellites are programmed to self-destruct every hour of re-entry into the Earth's atmosphere.
Forecasters explain that the geomagnetic storm vinicked through the overworld sleepy activity, as a result of which the Earth's atmosphere heats up and expands.

There is nothing unusual in this world, but for the singing intensity of the expansion of the atmosphere, it becomes unsafe for space objects that go to low orbit.

Behind the front pranks, 40-49 SpaceX satellites suffered. Let's talk about the party that was put into orbit last Thursday as part of the Starlink project, something like that - to protect the entire planet with the Internet.
Article:https://www.bbc.com/ukrainian/news-60319205

 

Free Web Hosting