Information Security, Radio electronics and Telecommunications
|Інформаційна безпека, радіоелектроніка та телекомунікації
Guestbook – June 2022
· #448
· Yershova Y. to Todorow D. RT-212 (Thursday, 30 June 2022 12:44)
Your final grade is 60 points. Good luck
· #447
Todorow D. RT-212 (Yershova Y.) (Thursday, 30 June 2022 10:04)
Exam topic: The major differences in a monochrome television and a color
television receiver.
The major difference between a monochrome television and a color television is
amount of electron guns in the picture tube.
Whilst a monocrhome TV has only one electron gun in the picture tube, which can
only show black, white or shades of grey in between,
the color TV has three electron guns, that represent three colors - Red, Green
and Blue. Varying these guns can give the full spectrum of color.
Beyond that there are differences in the reciever, which has to decode the data
for 3 guns instead of one, and in the drivers for the guns
Vocaroo: https://voca.ro/13ZFEwmcv14M
· #446
Yershova Y., Mykhailiuk S. to Todorow D. RT212 (Thursday, 30 June 2022 09:02)
1. Summarizing, Unit 9.
2. Topic: The major differences in a monochrome television and a color
television receiver.
3. Final Test paper 9.
Good luck!
· #445
Nedzvetskyi Vlad RT-212(Yershova Y.) (Friday, 24 June 2022 15:53)
Exam topic #4 (Commercial use of radio)
Over the last century, radio has evolved from a cumbersome experimental
environment to a modern mobile format. For many, radio was the fastest and most
reliable way to receive news about national and world events. Commercial radio
provides brands with a way to speak to millions of people via a medium they
trust. Radio provides reach, with nearly 37m listeners every week,resonance, as
an emotional influencer with power to enhance brand perceptions at a
subconscious level . Radio advertising is increasingly providing advertisers
with new and more creative ways to get their message across to potential
customers.
https://voca.ro/1eTU0E6JJ97g
· #444
Yershova Y. (Friday, 24 June 2022 11:02)
Nakempiy Konstantin RT-212(Yershova Y.) (Friday, 24 June 2022 10:47)
Your final grade is 65 points. Good luck
· #443
Nakempiy Konstantin RT-212(Yershova Y.) (Friday, 24 June 2022 10:47)
Topic: The new advancement of color Television.
Today I will be talking on the topic "The new advancement of color Television".
Today you can hear more and more about QLED TV technology. Previously, the TV
used simple LEDs. This solution had many disadvantages, such as overexposure in
the dark areas of the screen, poor black depth and insufficient contrast. Now
TVs will use quantum dots as a light source. Quantum dots are ultra-thin
semiconductor nanoscale materials. They do not have the previous disadvantages,
but are still very expensive to manufacture.
https://voca.ro/1kR9CHPh05Uz
· #442
Yershova Y., Mykhailiuk S. to RT-212 (Friday, 24 June 2022 08:04)
Good morning! The exam has started, read the instruction carefully, your tasks
are the following:
To Nedzvetskyi Vlad RT-212
1. Summarizing, Unit 5.
2. Topic: Commercial use of radio.
3. Final Test paper 5
To Nakempiy Konstantyn RT-212
1. Summarizing, Unit 7.
2. Topic: The new advancement of color Television.
3. Final Test paper 7.
Good luck!
· #441
· Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:39)
Exam topic #2 (Various security techniques.)
Today I will be talking on the topic "Different ways of security". Every user
knows that they need to protect their personal and confidential information from
pests and hackers. The first step is to install an antivirus on your device. It
will save the user from almost everything. Then you can use special extensions
in the browser to identify the link. But it is worth remembering that regardless
of the degree of protection, a person must always remember and be attentive,
because in any situation the person himself will be to blame, and not the
protection. You need to accustom yourself to look at the link where you go as
early as possible, and later this will happen automatically on a subconscious
level.
https://voca.ro/14wNZDDbdhIs
· #440
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:39)
Exam topic #20 (Principles of information protection.)
The fundamental principles of information protection are confidentiality,
integrity, availability. Confidentiality is designed to protect against
unauthorized disclosure of information. Integrity involves protection from
unauthorized modifications of data. The principle of integrity is designed to
ensure that data can be trusted to be accurate and that it has not been
inappropriately modified. Availability is protecting the functionality of
support systems and ensuring data is fully available at the point in time (or
period requirements) when it is needed by its users. Its objective is to ensure
that data is available to be used when it is needed to make decisions.
https://voca.ro/19X9sybOZqLB
· #439
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:38)
Exam topic #18 (Protection schemes.)
In my opinion protection schemes is very important in our digital world.
Our reason for differences among protection schemes is their different
functional properties the kinds of access control that can be expressed
naturally and enforced. There are two protection systems.
The first is unprotected systems. Some systems have no provision for preventing
a determined user from having access to every piece of information stored in the
system.
The second is all-or-nothing systems. These are systems that provide isolation
of users, sometimes moderated by total sharing of some pieces of information.
It was interesting theme for me.
https://voca.ro/16TxZeQ1WHWI
· #438
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:38)
Exam topic #16 (The Essentials of Information Protection.)
Nowadays, technologies are developing very rapidly, which leads to a rapid
increase in the amount of information in the world, not all of it can be kept
open, so at the moment the topic of protection of the same information is
relevant.
The first security measure is a strong password, it applies to everyone and
everything, so it must be complex and contain many characters, and be used only
on a particular site, so the cybercriminal will be harder to access your
information. Large companies and corporations have a huge risk of leaking
information, so they must have an effective security system - 1C, the most
modern and widespread system of information security. There are also the most
common approaches to information protection: Autonomous and Integrated.
Modern problems need modern solutions, so in my opinion, the information sphere
should use the new generation of technology to provide full protection, because
every day criminals are finding more and more ways to penetrate.
https://voca.ro/1hIIoMdqqzZU
· #437
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:37)
Exam topic #15 (The authentication of a user's claimed identity.)
The authentication method allows you to choose the appropriate configuration for
different situations: from passwords for computer games to permanent and
temporary passwords for some government services. The main task of
authentication is to make sure that the user is really who they say they are.
Material objects can act as reliability: hardware devices, body parts.
Intangible entities: code words, files. There is also a hardware token -
designed specifically for authentication. The token itself is an identity, the
user must have it with him and show it to the system - for example, connect it
to a computer or bring it to the reader.
https://voca.ro/1k091UhQYFrk
· #436
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:37)
Exam topic #14 (Authority Check.)
How do sites, programs, etc. check us for the authority to log into an account?
There are many ways, I will cover a few of them.
Firstly, when entering an account, we enter a password that already solves most
problems with authentication, but not everything is so simple. A double
authentication can be attached to the password in the form of a program on the
mobile phone to confirm the authentication or an email message.
Secondly, even if you logged into the site on a laptop, and then left somewhere,
it does not matter to another city or a cafe under the house, your IP address
changes and this causes suspicion in the site or program and it will ask you to
log in again.
In the end, I want to say that you need to be careful and always be on the
alert, cause the whole world is trying to deceive you!
https://voca.ro/1oS7fajjOqj7
· #435
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:36)
Exam topic #13 (Authentication mechanisms.)
Authentication is the process by which a user authenticates their identity to a
system. The system provides personal data only to its owner.
The authentication mechanism at the basic level is quite simple - you need to
enter data in the form of a username and password. Check the data for a match,
and if the data were identical with each other, then that you are the real owner
of the account.
An account is a collection of user data stored in the system. As a rule, only
one user has access to an account - its owner.
An example is this: You have lost your phone and until you have a password,
finger scanner or face.
https://voca.ro/1o5HNuxwLLgD
· #434
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:36)
Exam topic #4 (Information protection systems.)
Any company has critical information. And it needs to be somehow protected from
those who want to get access to it, because this is a question of the very life
of the organization. There are several information security tools. SIEM systems
- they collect and analyze a large amount of data, so they can detect attacks
very quickly. That is why many companies perceive SIEM systems as an important
part of corporate network security. Firewalls - Protect the corporate network
from intrusion attempts. To put it bluntly, this is indeed a wall that is
supposed to be able to stop intruders. There are dozens more systems, but these
two are the main ones.
https://voca.ro/13o6JR0xNYX4
· #433
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:35)
Exam topic #3 (Different approaches to secrecy and their defects.)
In Ukraine, the approach to defining secrets is in many ways similar to the
Soviet one. The main reason for this was the collapse of the USSR and the
transfer of some of its state secrets to independent Ukraine. Information with
limited access classified as a secret in Ukraine can be compared with the three
highest levels of information classification (according to the national
legislation of the NATO member states). The main document on the protection of
state secrets in Ukraine is the Law of Ukraine "On State Secrets". Restriction
of access to state secrets is carried out by providing an appropriate stamp for
restricting access to a material carrier of information.
https://voca.ro/11gsH6GRTHya
· #432
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Sunday, 19 June 2022 17:35)
Exam topic #5 (Technical basis of information protection in modern computer
systems.)
There are a lot of ways of protection information in modern computer systems.
Technical basis of information protection plays a big role in security of
company’s data. Technical basis combines hardware and software resources. Backup
and remote storage of the most important data should be on a regular basis.
Also, it`s very important to install the software that protects databases and
other information from unauthorized access. The company should not forget about
safety from fire or water damage of equipment. Technical basis of information
protection also includes measures to ensure the physical inaccessibility of
objects of computer networks, for example, such practical methods as equipping a
room with cameras and alarms.
https://voca.ro/1mS3XslQSg0M
· #431
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:40)
8
Today I've read the article «Using deep learning to predict parameters of
batteries on electric vehicles».
The batteries used to power electric vehicles have several key characterizing
parameters, including voltage, temperature, and state of change.
The researchers trained and evaluated their LSTM model on a dataset collected by
the Service and Management Center for electric vehicles. The researchers
observed that after its offline training was complete, the LSTM model could
perform fast and accurate online predictions. In other words, the fact that it
was trained offline did not appear to decrease the speed and accuracy of its
predictions.
To my mind In the future, the battery parameter prediction model developed by
this research team could help to enhance the safety.
https://techxplore.com/news/2019-08-deep-parameters-batteries-electric-vehicles.html
https://voca.ro/1lPw0XfGnf4c
1)when compared
This product has extended and faster-acting functions when compared to other
testosterone esters.
2)case studies
The case studies illustrate different approaches that countries take to
implementing IFRS.
3)multiple levels
And the beauty of the book is that it works on multiple levels.
https://voca.ro/1lofP78bE3g6
· #430
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:39)
7
Today I've read the article «Americans use more clean energy in 2016».
Americans used more renewable energy in 2016 compared to the previous year,
according to the most recent energy flow charts. All energy use results in some
losses, shown on the charts as rejected energy. This energy most often takes the
form of waste heat, such as the warm exhaust from automobiles and furnaces.
To my mind the energy Information Administration has changed the way it analyzes
and reports renewable energy use.
https://techxplore.com/news/2017-04-americans-energy.html
https://voca.ro/1ko7ZiDBvwt0
1)the main objective
The review had found that the main objective of offshoring was cost-saving.
2)by means of
The information can be extracted by means of your suffering.
3)published in
The latest progress report on combating social exclusion was published in
February 2007.
https://voca.ro/168yMKOlZJd5
· #429
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:39)
6
Today I've read the article «Researchers develop a dynamic keyboard character
recognition system».
Researchers at India have recently developed a new dynamic hand-gesture-based
keyboard character recognition system. Gesture recognition could enhance
human-computer interactions in a variety of areas. Traditional keyboards support
a broad range of characters. A gesture recognition system that covers all these
characters is very challenging to develop due to its significant database
requirements, as well as possible complications associated with hand detection,
tracking, extraction of features and the use of classifiers.
To my mind development of such a large vocabulary system will be a challenging
task.
https://techxplore.com/news/2019-01-dynamic-keyboard-character-recognition.html
https://voca.ro/1bBFGUJrL3yr
1)when compared
This product has extended and faster-acting functions when compared to other
testosterone esters.
2)case studies
The case studies illustrate different approaches that countries take to
implementing IFRS.
3)multiple levels
And the beauty of the book is that it works on multiple levels.
https://voca.ro/1lySAbOwnRNR
· #428
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:39)
5
Today I've read the article «New database interface looks like a spreadsheet».
When an organization needs a new database, it typically hires a contractor to
build it or buys a heavily supported product customized to its industry sector.
Usually, the organization already owns all the data it wants to put in the
database. Previous academic projects have explored techniques for database query
construction using editable flow-chart diagrams or virtual buttons that can be
snapped together.
To my mind it turns out that when you're dealing with people's data, you really
need to get it right
https://techxplore.com/news/2016-07-database-interface-spreadsheet.html
https://voca.ro/11iHe2BrBe0T
1)examined in detail
Moreover, prima facie duplication and overlap has to be examined in detail.
2)expanded upon
The issue would be expanded upon in Namibia's next report.
3)bear in mind
But bear in mind, your primary responsibility is to your respective clients.
https://voca.ro/1fX19jbUvhDb
· #427
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:38)
4
Today I've read the article «Using computers to better understand art».
When we talk about paintings, artistic style can refer to image features like
the brushstrokes, contour and distribution of colors that painters employ, often
implicitly, to construct their works.
Quantifying artistic style can help us trace the cultural history of art as
schools and artists influence each other through time. Computer analysis of even
previously well-studied images can yield new relationships that aren't
necessarily apparent to people.
To my mind it will help researchers in cognitive science understand how viewers
perceptually categorize, recognize and otherwise engage with art.
https://techxplore.com/news/2016-06-art.html
https://voca.ro/1b9NKtdeYMPl
1) a breakthrough in
The adoption of the Court's Statute is a clear breakthrough in the area.
2) ability to achieve
The Ministry of Justice affected the work of the committees and their ability to
achieve their objectives.
3) able to target
Scientists will be able to target tumors with increasing safety and
effectiveness.
https://voca.ro/141dOsemeX8f
· #426
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:37)
3
Today I've read the article «New algorithms advance the computing power of
early-stage quantum computers».
A group of scientists at the U.S. Department of Energy's Ames Laboratory has
developed computational quantum algorithms that are capable of efficient and
highly accurate simulations of static and dynamic properties of quantum systems.
The new algorithms tap into the capabilities of existing quantum computer
capabilities by adaptively generating and then tailoring the number and variety
of «educated guesses»
To my mind it will be great to reach 'quantum advantage' for materials— to
utilize quantum computing to achieve capabilities that cannot be achieved on any
supercomputer today.
https://techxplore.com/news/2021-11-algorithms-advance-power-early-stage-quantum.html
https://voca.ro/1foxZABDW8Xr
1)examine more closely
I think I will examine it more closely.
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
3)distinct
The stems have distinct smelling foliage when young.
https://voca.ro/1d3uRuDRaQaG
· #425
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:36)
2
Today I've read the article «Here are the 10 top tech trends you need to
understand right now».
Tech analyst firm Gartner has compiled a list of the top ten strategic
technology trends that organisations need to explore in 2019. According to
Garner, these technologies have substantial disruptive potential and are either
on the edge of making a big impact, or could reach a tipping point in the next
five years. Companies need to proactively address issues around digital ethics
and privacy. Current blockchain technologies and concepts are immature, poorly
understood and unproven in mission-critical, at-scale business operations, said
Gartner.
To my mind new tech trends are coming up every moment and its great for whole
world.
https://www.zdnet.com/article/here-are-the-10-top-tech-trends-you-need-to-understand-right-now/
https://voca.ro/1kSSSS230Nvs
1) digital version
The digital version is based on an especially developed viewer, providing the
following functions
2) in other word
So the benchmark is objective assessment or in other words reasonability.
3) in principle
The assessment leads to recommendations, which can be supported in principle.
https://voca.ro/1kH1MN3EeBT2
· #424
Vladyslav Parshykov (RZ-212, Popovych.E) debt (Thursday, 16 June 2022 16:36)
1
Today I've read the article «Pilot study: Group of Bradford Co, Pa. residents
concerned about health effects of hydrofracking».
Residents living in areas near natural gas operations, also known as hydraulic
fracturing, or fracking, are concerned their illnesses may be a result of nearby
drilling operations. Twenty-two percent of the participants in a small pilot
study surmise that hydrofracking may be the cause of such health concerns as
sinus problems, sleeping difficulties, and gastrointestinal problems.
The CEET team also mapped the addresses of patients who agreed to provide them
in relation to drilling to determine if proximity to drilling operations may
relate to health problems.
To my mind this pilot study will guide the development of future epidemiological
studies to determine whether health effects in communities in which natural
gas operations are occurring is associated with air.
https://phys.org/news/2013-04-group-bradford-pa-residents-health.html
https://voca.ro/1gisZULj9zg5
1) Pilot study
We hope this pilot study will guide the development of future epidemiological
studies.
2)flow chart
Flow charts to include state-by-state energy.
3)poorly understood
Poorly understood and unproven in mission-critical.
https://voca.ro/14rcectpmqBb
· #423
Arina Omelchenko RE-211 (Yershova) debt (Thursday, 16 June 2022 13:21)
Exam topic #12 (Media Video Processor)
A media video processor is a microprocessor-based system-on-a-chip which is
designed to deal with digital streaming data in real-time rates. These devices
can also be considered a class of digital signal processors. Unlike graphics
processing units, which are used for computer displays, media processors are
targeted at digital televisions and set-top boxes.
The streaming digital media classes include: uncompressed video and compressed
digital video. Previous to media processors, these streaming media datatypes
were processed using fixed-function, hardwired ASICs, which could not be updated
in the field. This was a big disadvantage when any of the media standards were
changed. Since media processors are software programmed devices, the processing
done on them could be updated with new software releases, which is indeed very
perspective for new generation of technologies.
https://voca.ro/1c73hmAerznV
· #422
Arina Omelchenko RE-211 (Yershova) debt (Thursday, 16 June 2022 12:48)
Exam topic #18 (Age of the Transistors)
The first transistor was successfully demonstrated on December 23, 1947, at Bell
Laboratories in Murray Hill, New Jersey. The invention of the transistor was an
unprecedented development in the electronics industry. It marked the beginning
of the current age in the electronics sector. After the transistor's invention,
advances in technology became more frequent, the most notable of which was
computer technology. The three physicists who invented the transistor; William
Shockley, John Bardeen, and Walter Brattain were awarded with the Nobel Prize.
Considering the inventions that the transistor paved the way for, one could
argue that it was the most important invention of the twentieth century.
https://voca.ro/1jU7XzOrsfZw
· #421
Stepanenko Vladyslav RT-212 (Yershova) (Thursday, 16 June 2022 12:21)
I have read the article "Recommendation algorithms that work on Amazon, Netflix
can also improve satellite imagery." This article tells us about algorithms that
help consumers decide what to watch online or what to buy. Not only can they
predict customer habits, they can help satellites see the Earth better,
according to a Rutgers study. Optical satellites lose sight of the Earth's
surface when it's covered in clouds, which is why, in my opinion, researchers
have long relied on inaccurate instruments to fill in blind spots, especially
along coastlines. I believe that this study is helpful.
https://techxplore.com/news/2022-05-algorithms-power-amazon-netflix-satellite.html
https://voca.ro/1zgGxaVCL51W
1) poorly understood
Open-source software used to be poorly understood by commercial forces, and it's
often approached in a biased way.
2)flow chart.
The flow chart has all its shapes, text, and colors, now.
3)pilot study
So far the pilot study has shown that especially the teachers who have
self-assessed themselves as beginners will advance significantly in almost all
areas of digital competence.
https://voca.ro/1oNNEklFEtgw
· #420
Yershova Y. (Thursday, 16 June 2022 11:49)
Stepanenko Vladyslav RT-212 (Yershova) (Thursday, 16 June 2022 11:43)
Exam topic (First radio speeches.) is rather informative, but you haven't posted
any comments on the articles during this second module period.
· #419
Yershova Y. (Thursday, 16 June 2022 11:45)
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 16 June 2022 10:53)
Thanks for your last exam topics, now you have no debts.
· #418
Stepanenko Vladyslav RT-212 (Yershova) (Thursday, 16 June 2022 11:43)
Exam topic (First radio speeches.)
The discovery of the electromagnetic field in 1845, to which the English
physicist M. Faraday had been working for a long time, became a sensation in the
19th century. Two decades later, also an Englishman, D.K. Maxwell theoretically
substantiated and formulated the existence of electromagnetic waves, one of the
types of which are radio waves. A person does not see or feel them, therefore,
without substantiating the theory of electrodynamics, it would be impossible to
create the radio receiver itself. On May 7, 1895, physicist Alexander Popov
carried out the world's first radio communication session using a radio receiver
he created.
https://voca.ro/1nfogQMlwGpr
· #417
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 16 June 2022 10:53)
I’m posting it again. Perhaps you didn't see message #315. Have i any debts?
Topic #10 (The major differences in a monochrome television and a color
television receiver)
After the World War II, the USA took up the development of civilian technology,
including television. Therefore, color TVs came to replace the monochrome TV.
The biggest difference is the number of electron guns in the picture tube. A
monochrome tv has only one gun as it can only show black, white, or shades of
grey in between. Color TVs have 3 guns: red, green, and blue. Varying these
tubes give you the full spectrum of color. Beyond that there are differences in
the reciever, which has to decode the data for 3 guns instead of one, and in the
drivers for the guns.
https://voca.ro/1ar5kibV9j3a
Topic #5 (¬First radio speeches)
On 13 May 1897, Guglielmo Marconi sent the world's first radio message across
open water. He was initially interested in contacting ships. It paved the way
for the radio and television broadcasts that we take for granted today. On 11
and 12 May Marconi's team placed a transmitter on Flat Holm, an island halfway
across the Channel, and began sending messages out into the airwaves. But, their
work was a failure, with the team member in Lavernock sat waiting for a
non-existent signal. Then on 13 May, Marconi sent a message of "CAN YOU HEAR
ME," which was received loud and clear. So, this became the communication
revolution
https://voca.ro/14lTt1qtMv4E
· #416
Igor Rudko (RZ-213) (Vorobyova E. V.) (Thursday, 16 June 2022 10:24)
Audio: https://voca.ro/1jhyhi3M4duA
Article: https://techxplore.com/news/2020-07-carbon-emissions-energy-states.html
Today I have read the article" Carbon emissions, energy flow charts for all U.S.
states". Renewable energy, specifically solar and wind energy, have made huge
strides in the energy supply sector contributing to the decrease in carbon
emissions since 2014. By the way, in states rich in renewable resources such as
Iowa, wind supplies make up well over a quarter of the state's electricity and
contribute to the state's ability to export electricity to its neighbors. In my
opinion, it is really great that the scientific society is interested in this
problem and trying to fix it.
Phrases
Audio: https://voca.ro/1kdLtAh3MIuY
1) A pilot study undertaken by researchers from the University of South
Australia, has developed a new way to undertake basic health checks of exotic
wildlife using a digital camera. - Пілотне дослідження, проведене дослідниками з
Університету Південної Австралії, розробило новий спосіб проведення базових
перевірок здоров’я екзотичних диких тварин за допомогою цифрової камери.
2) Current blockchain technologies and concepts are immature, poorly understood,
and unproven in mission-critical, at-scale business operations. - Сучасні
технології та концепції блокчейну є незрілими, погано зрозумілими та
недоказаними у критично важливих, масштабних бізнес-операціях.
3) Each year, LLNL releases flow charts that illustrate the nation's consumption
and use of energy. - Щороку LLNL випускає блок-схеми, які ілюструють споживання
та використання енергії нацією.
· #415
El-kadi RT-211(Popovych E.) (Thursday, 16 June 2022 10:21)
I read an article about computers on the network. It was written about the fact
that computer networks are widespread in the modern IT sector. Computer networks
are the arteries of databases, web and mobile applications, distributed systems,
and many other programs. A good understanding of the underlying networking
principles makes it easier to create more reliable and efficient software
products.
pilot study
Within this overall framework, the pilot study will comprise three sub-themes.
flow chart
The annex of the present document contains a flow chart of the proposed process.
poorly understood
Those interactions were still poorly understood.
· #414
Stepanenko Vladyslav RT-212 (Myhayliuk) (Thursday, 16 June 2022 10:05)
Exam topic (Cable television.)
Cable television is one of the options for transmitting a signal over a
distance. It is possible to transmit both analog and digital formats. Cable
television is opposed to conventional terrestrial and satellite television
broadcasting.
For a long time, the basis of cable television networks was coaxial cable. The
successful development of optical data transmission technologies has led to the
introduction of optical fiber in cable television networks in the form of
so-called hybrid, or fiber coaxial networks, which combine coaxial and fiber
optic cables.
Traditionally, analog cable television technology is successfully mastering
digital methods of data transmission.
https://voca.ro/1laz5xFFbmGv
· #413
Stepanenko Vladyslav RT-212 (Myhayliuk) (Thursday, 16 June 2022 09:55)
Exam topic (Turning the DTV signal.)
DTV channels are preferred to watch in all countries due to their availability
and the quality of the transmitted picture. Also, a significant part of them is
broadcast for free, and anyone can use them for their TV. For a TV to work with
this technology, its receiver must support DTV, receive a signal of this format,
and output a video and sound track at the output. The receiver is usually an
external receiver, but modern TV models are equipped with such a receiver by
default. The transmitted signal is encoded in MPEG digital format and
represented as a binary code. The basis of its popularity is that the signal is
not affected by weather conditions.
https://voca.ro/1Udog15aCgaB
· #412
Yershova Y. (Thursday, 16 June 2022 09:38)
Chervony Eugene RT-212(Yershova) (Thursday, 16 June 2022 09:29)
Exam Topic #10 (Radio equipment helping to save on bills) is quite reasonable.
· #411
Yershova Y. (Thursday, 16 June 2022 09:36)
Chervony Eugene RT-212(Yershova) (Thursday, 16 June 2022 09:26)
Exam Topic #9 (The new advancement of color Television) is well done, thanks.
· #410
Yershova Y. (Thursday, 16 June 2022 09:32)
Stanislav Popik РТ-212 (Yershova) (Wednesday, 15 June 2022 14:39)
Rather interesting, thank you.
· #409
Chervony Eugene RT-212(Yershova) (Thursday, 16 June 2022 09:29)
Exam Topic #10 (Radio equipment helping to save on bills)
It’s easy to get sucked into all of the bells and whistles on the most expensive
electronic options, but the extra features often aren’t necessary. You might
find the features that sound amazing are things you don’t actually use that
often. Sometimes the more features a device has, the more potential it has for
things to go wrong, which can make it more expensive with repairs or
replacements. Consider what features you actually need or will use on a regular
basis. If you find yourself drooling over fancy features, think about how
practical or necessary those features are to have a good experience with the
device. You might realize you can enjoy the new device just as much without
those extra features.
https://voca.ro/1RRjK80YRN9p
· #408
Chervony Eugene RT-212(Yershova) (Thursday, 16 June 2022 09:26)
Exam Topic #9 (The new advancement of color Television)
Comparing the significance of the invention of color television to the
development of space rockets sounds ludicrous to us today, but color television
was one of the most complex and transformative technological innovations of its
time, symbolizing a unique and thoroughly modern form of seeing and
representing. It was, in fact, often discussed by its proponents as an ideal
form of American postwar consumer vision: a way of seeing the world in a
spectacular form of living color. Color television was sold to viewers as a way
to experience everything from sports and nature to musical theater in a more
legible, realistic, captivating, and sensational way.
https://voca.ro/1czEE1CxVZzL
· #407
Yershova Y. (Thursday, 16 June 2022 09:25)
Roman Gavrilenko RZ-211 (Yershova) (Tuesday, 14 June 2022)
Exam topic #4 ( Information protection systems) and Exam topic #12 ( Hardware
firewall) are rather informative, thanks.
Your phrases' examples are good as well.
· #406
Roman Gavrilenko RZ-211 (Yershova) (Thursday, 16 June 2022 08:59)
Exam topic #12 ( Hardware firewall)
A physical firewall device or firewall hardware is an appliance that sits
in-between the uplink and the client system and filters
what traffic gets through based on pre-configured security policies, user
profiles, and business rules.
The uplink carries incoming traffic from public or private networks, whereas the
client system is a server, an employee desktop, a WFH system, an IoT node,etc.
Firewall solutions are an integral component of enterprise security. A 2020
report by Palo Alto Networks found that firewalls, including hardware
appliances,
were the no.1 security measure enterprises adopt to protect their
infrastructure. The report said that 96.6% of companies have a firewall in
place, with 53.8%
also deploying web application firewalls. In fact, more than 1 in 4
organizations rely solely on firewall hardware instead of software or
cloud-based solutions.
https://vocaroo.com/1hvPxyasfW9D
1)examine more closely
I think I will examine it more closely.
https://voca.ro/1nWP11xB6A47
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
https://voca.ro/1z4BBCa9h3sM
3)distinct
The stems have distinct smelling foliage when young.
https://voca.ro/1m0QSdndPbpo
· #405
Vorobyova E. to Simchuk from РЗ-213 (Thursday, 16 June 2022 08:17)
In general, good. But some of the reviews on the articles are too long. They should have 100 words, not more. Mind it and continue working.
· #404
Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:44)
Відпрацювання 5
Now almost every person was interested in his development and how smart he is,
tests don’t help with this, but how do we find out how smart computers or other
devices are
article titled: "AI software overcomes high hurdles in IQ tests, but still makes
stupid mistakes. Can better tests help?" will help us in this matter. Artificial
intelligence (AI) language models, trained on billions of words from books, news
articles and Wikipedia, can create incredibly human prose. They can create
tweets, summarize emails, and translate into dozens of languages. They can even
write tolerable poetry. And, like A students, they quickly master the tests,
called tests, that computer scientists develop for them.
It was Sam Bowman's sobering experience when he and his colleagues created a
hard new benchmark for language models called GLUE (Global Language
Understanding Assessment). GLUE gives AI models the ability to train on datasets
containing thousands of sentences and gives them nine tasks, such as determining
whether a test sentence is grammatical, assessing its sentiment, or assessing
whether one sentence logically entails another. After completing the tasks of
each model, an average score is set.
At first, Bowman, a computer scientist at New York University, thought he had
confused the models. The best of them scored less than 70 points out of 100
(D+). But in less than 1 year, the newer and better models scored about 90
points, surpassing humans. “We were very surprised by the surge,” Bowman says.
So in 2019, the researchers made the test more difficult, calling it SuperGLUE.
Some of the tasks required the AI models to answer reading comprehension
questions after digesting not only sentences but also paragraphs taken from
Wikipedia or news sites. Again, the humans had an initial lead of 20 points.
“What happened next wasn't all that shocking,” says Bowman. By early 2021,
computers were once again beating humans.
Competition for top test scores has led to real progress in the field of AI.
Many believe that the ImageNet challenge, a computer vision competition that
began in 2010, has revolutionized deep learning, a leading approach to
artificial intelligence in which brain-inspired "neural networks" learn on their
own from large sets of examples. But the best test takers aren't always
superhuman in the real world. Time and time again, models succeed in tests but
fail when deployed or scrutinized. “They fall apart pretty easily,” Bowman says.
Article:https://www.science.org/content/article/computers-ace-iq-tests-still-make-dumb-mistakes-can-different-tests-help
· #403
Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:44)
Відпрацювання 4
In 2022, each person has his own gadget in which he stores his confidential
information and each person has the right to privacy, but is this privacy itself
really, in the article that I read and I want to tell you about it, it is about
this and how we can avoid surveillance. Satcha is titled: "Technology Spying on
You? New AI Could Prevent Eavesdropping." The article is about the fact that
Companies use "bossware" to listen to their employees when they are near their
computers. Several "spy" applications can record phone calls. And home devices
like the Amazon Echo can record everyday conversations. A new technology called
Neural Voice Camouflage now offers protection. It generates its own audio noise
in the background when you speak, confusing the artificial intelligence (AI)
that decodes our recorded voices.
The new system uses an "adversarial attack". The strategy uses machine learning,
in which algorithms find patterns in data, to tune sounds in such a way that AI,
not humans, mistake them for something else. Essentially, you are using one AI
to fool another.
However, the process is not as simple as it seems. The machine learning AI has
to process the entire sound clip before it knows how to set it up, which doesn't
work when you want to mask in real time.
So in the new study, the researchers trained a neural network, a brain-inspired
machine learning system, to effectively predict the future. They trained him on
hours of speech recording so that he could constantly process 2-second snippets
of audio and mask out what was likely to be said next.
For example, if someone just said "enjoy a big feast", they cannot accurately
predict what will be said next. But, taking into account what has just been
said, as well as the characteristics of the speaker's voice, it produces sounds
that will break a number of possible phrases that may follow. This includes what
actually happened next; here the same speaker says, "It is being prepared." To
listeners, sound camouflage sounds like background noise and they have no
problem understanding spoken words. But cars stumble.
This is just the first step in protecting privacy in the face of AI, says Mia
Chikier, a computer scientist at Columbia University who led the study.
“Artificial intelligence collects data about our voice, faces and actions. We
need next-generation technology that respects our privacy."
Chiquier adds that the predictive part of the system has great potential for
other applications that require real-time processing, such as autonomous
vehicles. “You have to anticipate where the car will be, where the pedestrian
might be,” she says. The brain also works by waiting; you get surprised when
your brain mispredicts something. In this regard, Chikyo says: "We imitate the
way people act."
"There's something nice about how it combines future prediction, a classic
machine learning problem, with another adversarial machine learning problem,"
says Andrew Owens, a computer scientist at the University of Michigan at Ann
Arbor who studies audio processing. and visual camouflage and did not
participate in the work. Bo Li, a computer scientist at the University of
Illinois at Urbana-Champaign who has worked on audio adversarial attacks, was
impressed that the new approach worked even against a hardened ASR system.
Sound masking is badly needed, says Jay Stanley, senior policy analyst at the
American Civil Liberties Union. “We are all susceptible to our innocent speech
being misinterpreted by security algorithms.” Maintaining privacy is hard work,
he says. More precisely, it is a Harenar ov resonance.
Article:https://www.science.org/content/article/technology-spying-you-new-ai-could-prevent-eavesdropping
· #402
Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:36)
Відпрацювання 3
To date, very popular information about new diseases and viruses, this is the
article I came across when reading the news and scientific discoveries "Analysis
of 6.4 million genomes of SARS-CoV-2 revealed mutations associated with
adaptation", very intriguing and in at the same time frightening. Satya is very
big but, I want to show you how important to me is what is written in it. Satya
says that the SARS-CoV-2 pandemic was characterized by recurrent waves of cases
caused by the emergence of new lines with higher fitness, where fitness includes
any trait that affects the growth of the line, including its baseline
reproductive number (R 0). ability to evade existing immunity and generation
time. Rapid identification of such pedigrees as they emerge and accurate
prediction of their dynamics is crucial for controlling the response to an
outbreak. Effective implementation of this task will benefit from the ability to
study the entire global SARS-CoV-2 genomic data set. The large size (currently
more than 7.5 million viral genomes), as well as the geographical and temporal
variability of the available data, are serious problems that will become more
serious as more viruses are sequenced. Current phylogenetic approaches are
computationally inefficient for datasets with more than ~ 5,000 samples, and it
takes days to operate on this scale. Special methods for assessing the relative
suitability of specific SARS-CoV-2 lines are a computationally efficient
alternative.), But usually relied on models in which one or two lines of
interest are compared to all others and do not reflect the complex dynamics of
several circulating lines. When modeling the relative fitness of SARS-CoV-2
lines, we estimated their growth as a linear combination of the effects of
individual mutations. To this end, we have developed PyR 0, a hierarchical
Bayesian regression model that allows scalable analysis of the complete set of
publicly available SARS-CoV-2 genomes, which can be applied to any set of virus
genomic data and to other viral phenotypes. The model shown in Fig. S1,
described in detail in the supplementary materials, avoids the difficulty of
complete phylogenetic inference by initially clustering genomes by genetic
similarity (PANGO line refinement) and estimating the additional effect on the
growth rate of each of the most common amino acid substitutions in the lines in
which they occur. By regressing the growth rate along the genome sequence, the
model divides the statistical power among genetically similar lines, without
relying explicitly on phylogeny. By modeling only the polynomial proportions of
different pedigrees, not the absolute number of samples for each pedigree, and
doing so within 14-day intervals in 1560 globally distributed geographical
regions, the model achieves resilience to a number of bias sources that affect
all lines in different regions. and over time, including differences in data
collection and changes in transmission due to factors such as social behavior,
public health policies and vaccination.
Article:https://www.science.org/doi/10.1126/science.abm1208
· #401
Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:35)
Відпрацювання 2
I've always been interested in information about scientific discoveries and
breakthroughs, which is exactly the kind of article I came across, entitled
"Breakthrough in Fusion: What It Means for the Future of Energy." The article
begins with the fact that European scientists have announced a major
breakthrough in the desire to develop a practical nuclear fusion - an energy
process that feeds the stars. The British laboratory JET broke its own world
record for the amount of energy obtained by compressing two forms of hydrogen
together.
The experiments yielded 59 megajoules of energy in five seconds (11 megawatts of
power).
This is more than twice as much as was obtained during similar tests in 1997.
This is not too much energy - only about 60 kettles of water are enough to boil.
But the importance of this achievement lies in the fact that it confirmed the
correctness of the project developed for a larger thermonuclear reactor, which
is currently being built in France.
This is great information for me, but it doesn't end there.
The ITER facility, located in the south of France, is supported by a consortium
of world governments, including the EU, the United States, China and Russia. It
is expected that this will be the last step in confirming the fact that nuclear
fusion can become a reliable source of energy in the second half of this
century.
The operation of fusion-based power plants of the future will not lead to
greenhouse gas emissions and will generate only a very small amount of
short-lived radioactive waste.
"These experiments, which we have just completed, should have worked," said JET
CEO Professor Ian Chapman. "If they did not work, we would have real concerns
about whether ITER will be able to achieve its goals."
"The stakes were high, and what we've achieved has been achieved thanks to
incredible people and their faith in science," he told BBC News.
Thermonuclear fusion is based on the principle that energy can be released by
fusing atomic nuclei, rather than by fission, as in the case of fission
reactions, which operate existing nuclear power plants.
In the core of the Sun, this is due to the enormous gravitational pressure at
temperatures of about 10 million degrees Celsius. At a much lower pressure than
possible on Earth, the temperatures for synthesis must be much higher - more
than 100 million degrees Celsius.
There are no materials that can withstand direct contact with such heat.
Therefore, to achieve thermonuclear fusion in the laboratory, scientists have
developed a system in which superheated gas or plasma is kept inside a magnetic
field in the shape of a donut.
The Joint European Torus (JET) reactor, located in Kalham, Oxfordshire, has
pioneered this approach to synthesis, which it has been working on for almost 40
years. And over the last 10 years, it has been tuned to recreate the future look
of the ITER facility.
Article:https://www.bbc.com/ukrainian/features-60318751
· #400
Simchuk Alexey (Vorobyova RZ-213) (Thursday, 16 June 2022 07:34)
Відпрацювання 1
Today I read an interesting scientific article: "A geomagnetic storm blew out of
orbit over 40 satellites of Elon Musk." In which it is told about the fact that
Elon Musk's company "SpaceX" confirmed that a strong geomagnetic storm struck
over 40 satellites. They also added that, at the same time, the company began to
sing that the situation would not become a threat to people: there would be no
other companions, there would be no cosmic death.
SpaceX satellites are programmed to self-destruct every hour of re-entry into
the Earth's atmosphere.
Forecasters explain that the geomagnetic storm vinicked through the overworld
sleepy activity, as a result of which the Earth's atmosphere heats up and
expands.
There is nothing unusual in this world, but for the singing intensity of the
expansion of the atmosphere, it becomes unsafe for space objects that go to low
orbit.
Behind the front pranks, 40-49 SpaceX satellites suffered. Let's talk about the
party that was put into orbit last Thursday as part of the Starlink project,
something like that - to protect the entire planet with the Internet.
Article:https://www.bbc.com/ukrainian/news-60319205
· #399
Vorobyova E. to Shlapak from РЗ-213 (Wednesday, 15 June 2022 17:00)
Thank you for the update review on the article. It’s correct and informative. Good luck.
· #398
Vorobyova E. to Koval from РЗ-213 (Wednesday, 15 June 2022 16:58)
Well done, only mind the correct use of the articles “a/the”. Continue working at the exam topics.
· #397
Stanislav Popik РТ-212 (Yershova) (Wednesday, 15 June 2022 15:07)
In the early 1920s, the development of radio tubes reached a level sufficient
for the advent of radio broadcasting. While most experimenters were trying to
create something similar to telephone technology, others were trying to reach a
wider broadcast coverage. The first experimental radio station was created by
Charles Herrold in 1909 in San Jose, California. On November 6, 1919, the first
broadcasting station in Europe, PCGG, was founded in The Hague (Holland).
Evening programs were broadcast once or twice a week. Despite the remoteness of
the transmitter from England, the radio station had a large number of listeners
on the English side of the English Channel. The history of the development of
radio broadcasting is long and each country has its own, but these broadcasts
were among the first.
https://voca.ro/1lFOItAF85Kp
· #396
Stanislav Popik РТ-212 (Yershova) (Wednesday, 15 June 2022 14:39)
https://voca.ro/152xiri2MWYz - exam topik 9
· #395
Stanislav Popik РТ-212 (Yershova) (Wednesday, 15 June 2022 14:39)
Exam topic 9 "Development of television in your home country."
In Ukraine, the history of the emergence of television began in 1933, when the
All-Union Committee for Radio and Radio Broadcasting and the Committee for Radio
and Radio Broadcasting were created. The first official attempt to broadcast
live in the Ukrainian SSR was made on February 1, 1939. The shooting took place
in a small Kyiv studio. The broadcast lasted 40 minutes, during which a portrait
of Grigory Ordzhonikidze was shown. Due to the Great Patriotic War, the second
birth of Ukrainian television took place only on November 6, 1951. The Kyiv
television center aired the Soviet patriotic film The Great Glow.
· #394
Stanislav Popik РТ-212 (S. Mykhailiuk) (Wednesday, 15 June 2022 14:23)
Exam topic 8 “The new advancement of color Television.”
In 1938, Werner Flechsig patented the principle of the color kinescope, and the
color image transmission method was developed in 1940. In European cinemas,
color films appeared in 1941, the first of which were Women Are Still the Best
Diplomats and Hans Alber's film Munchausen. In 1953, the NTSC standard for
black-and-white television broadcasting was expanded in the United States - it
received the ability to transmit color, namely, "color" was added to
"brightness". On August 30, 1953, for the first time in history, NBC broadcast a
color broadcast of "Kukla, Fran and Ollie" in test mode via the NTSC standard.
The first full-fledged color broadcast was the opera Carmen, shown on October
31, 1953.
https://voca.ro/1iv2xQ7BZSN7
· #393
Artem Verhelis RT-211, Popovych E. (Wednesday, 15 June 2022 10:14)
Today I've read the article "Scientists discover how oxygen loss saps a
lithium-ion battery's voltage". When the battery is charging, in addition to
lithium ions, air atoms also enter, which ultimately leads to a decrease in the
battery's capacity. Scientists have proposed new ways to create electrodes to
prevent this. Lithium-ion batteries work like a rocking chair, moving lithium
ions back and forth between two electrodes that temporarily store charge. Based
on this knowledge, scientists will make a start in solving this problem. I found
this article quite informative because in our time people very often interact
with a similar technique.
Article:
https://techxplore.com/news/2021-06-scientists-oxygen-loss-saps-lithium-ion.html
Audio: https://voca.ro/18ZZU1u9ArO2
1) initial stages of
In its initial stages of adoption, GOSSIS is already gaining wide attention from
the medical community.
На
початкових етапах впровадження
GOSSIS
вже привертає увагу медичної спільноти.
2) more specifically
More specifically, papers written by people in the U.S., the U.K. and China are
far more heavily cited than are those from other countries such as Mexico and
Brazil.
Точніше, статті, написані людьми зі США, Великобританії та Китаю, цитуються
набагато частіше, ніж статті з інших країн, таких як Мексика та Бразилія.
3) numerous examples
The study found numerous examples to corroborate the existence of the
phenomenon.
При
дослідженні було знайдено численні
приклади на
підтвердження існування цього явища.
Audio: https://voca.ro/1amtqRaVpepB
· #392
Artem Verhelis RT-211, Popovych E. (Wednesday, 15 June 2022 10:11)
Exam topic #10
Radio equipment helping to save on bills.
Nowdays, one of the solutions to honest savings on bills can be a motion
sensors. They are often installed in corridors, vestibules or showers, are
relatively cheap, and for each type of room you can choose the optimal
sensitivity radius. It's not only consumes less electricity than lamp bulb, but
also lasts more time longer and the price difference is minor. For 3-5 years,
you won’t have to climb into the ceiling or chandelier to change a burned-out
light bulb. They are also not afraid of voltage drops, unlike lamp bulb, and
don't contain dangerous substances.
Audio: https://voca.ro/16PpdnC0HfQX
· #391
Lebedeva E. (Tuesday, 14 June 2022 10:55)
To Kovalzhi Andrey RZ-211 Well done, thank you.
· #390
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Tuesday, 14 June 2022 10:49)
Долг за 12.06
Today I have read the article : «Artificial intelligence can help you understand
music better»
Algorithms and technology have so far helped listeners to more of the same
music. Now, University of Ohio researchers are working on new technology that
can get people interested in a greater musical variety. Olivier Lartillot,
researcher at RITMO Center for Interdisciplinary Studies in Rhythm, Time and
Motion, believes technology can expand people's taste in music through a better
understanding of musical elements. He says that people often listen to the music
they can understand easily, therefore some more complicated types of music
become less accessible, and that's where this technology comes in.
I liked this article because I love listening to music and i would be very happy
to understand more about it.
https://voca.ro/12yuzIJZpFYU
https://phys.org/news/2022-06-scaling-heights-altitude.html
Daily phrases:
1) In other words
In other words, we can't say that gravity is a force.
Іншими словами, ми не можемо сказати, що гравітація це сила.
2)digital version
The playstation 5 was released as two different consoles: disk and digital
versions.
Playstation 5 вийшла у вигляді двох різних консолей: цифрової і дискової версій.
3)in principle
The same risk exists in principle for electronic communications.
Такий же ризик існує в принципі і для електронних повідомлень
https://voca.ro/18B0ZUdK1FNI
· #389
Popovych E. (Tuesday, 14 June 2022 10:35)
To Stanislav Kryvosheienko RT-211
Thank you, your comment, audio are quite correct as well as sentences with
Phrases
· #388
Lebedeva E. (Tuesday, 14 June 2022 10:33)
To Dovzhenko Ilya RZ-211 Use prtesent perfect in the first sentence: Today I HAVE read....
· #387
Popovych E. (Tuesday, 14 June 2022 10:33)
To Nastya Poddubrovskaya(RZ-212)
#380,381,382,383
Your comments are good. Thanks for your work.
· #386
Lebedeva E. (Tuesday, 14 June 2022 10:31)
To Denis Zavadsky Lebedeva RZ-211 The topic is written correctly, but there is no audio.
· #385
Lebedeva E. (Tuesday, 14 June 2022 10:29)
To Kuleshov Konstantin(RZ-211) Thanks for the comment, but there are some mistakes in your reading.
· #384
Stanislav Kryvosheienko RT-211 (Popovych) (Tuesday, 14 June 2022 10:21)
Today I have read the article "New model finds best sites for electric vehicle
charging stations". This article is about researchers from North Carolina State
University have developed a computational model that can be used to determine
the optimal places for locating electric vehicle (EV) charging facilities, as
well as how powerful the charging stations can be without placing an undue
burden on the local power grid. They have developed a model that allows planners
to optimize these decisions, serving the greatest number of people without
taxing the power system. The researchers are currently in discussions with state
and local government officials, as well as power utilities, to use the model to
inform the development of EV charging infrastructure in North Carolina.
Voice - https://voca.ro/1c5BIDx5xicp
Article -
https://techxplore.com/news/2022-06-sites-electric-vehicle-stations.html
Phrases
1) in principle - In principle, I pity him. - В принципе, я ему сочувствую.
2)digital version - The Times Reader is a digital version of The New York Times.
- «TheTimes Reader» - это цифровая версия «Нью-Йорк таймс».
3)in other words - So, in other words, you haven't actually solved these cases.
- Так, другими словами, у вас на самом деле нет решения этих случаев.
Voice - https://voca.ro/1aAB8cWzKdID
· #383
Nastya Poddubrovskaya(RZ-212, Popovych.E) (Tuesday, 14 June 2022 10:15)
Today I have read the article «Team uses hot water to form photocatalyst».The
production of chemical substances normally requires environmentally harmful
solvents.After the research group produced organic substances without harmful
substances for the first time by heating them in hot water, the researchers can
chalk up another success:Through hydrothermal synthesis, they succeeded in
jointly forming and combining organic and inorganic substances in the same
reaction vessel—specifically, an inorganic solid that encloses organic dye
molecules.When exposed to light the hybrid material functions like a
catalyst.Since the photocatalyst is a solid, it can be used multiple times.The
research team's specific targets for application are small organic molecules
that play a role in pharmaceuticals.
https://phys.org/news/2022-06-team-hot-photocatalyst.html
https://voca.ro/1bv0zBni5tEG
in principle
The same risk exists in principle for electronic communications.
Тот
же риск в принципе существует и при использовании электронных сообщений.
inotherwords
So,
inotherwords,
I'mgettingonyournerves.
Другими словами, я действую тебе на нервы
digital version
So, they wanted to have a digital version of a stuntman and that's what we've
been working on for the past few months.
И
они заказали цифровую версию каскадёра, мы работаем над ней уже несколько
месяцев.
https://voca.ro/1d1qMgeQSoEh
· #382
Nastya Poddubrovskaya(RZ-212, Popovych.E) (Tuesday, 14 June 2022 10:06)
Today I've read an article: "A step closer to understanding the 'cold spot' in
the cosmic microwave background".It tells about the research of scientists in
space and the Universe, in particular, the super-emptiness of Eridanus.
According to them, various voids are located between galaxies and, thanks to
dark energy, repel star clusters from each other. The problem is that scientists
had a Lambda-CDM method, which inherently either denied the veracity of this
phenomenon, or pointed to a cosmic anomaly. In addition, the researchers noticed
that the density of dark energy here is somewhat less than in other voids known
to man. I believe that this study is very important, as it brings us closer to
understanding and structure of the Universe, the processes taking place in it.
https://phys.org/news/2022-01-closer-cold-cosmic-microwave-background.html
https://voca.ro/14X1w9M6CUeo
in principle
Such individual reviews could in principle also address violations relating to
progressive realization.
Такое рассмотрение индивидуальных случаев в принципе могло бы также охватывать
нарушения, связанные с постепенным осуществлением.
inotherwords
So,
inotherwords,
youhaven'tactuallysolvedthesecases.
Так, другими словами, у вас на самом деле нет решения этих случаев
digital version
And this is what we used to give to the company Image Metrics to create a
rigged, digital version of Emily.
И
именно это мы использовали, чтобы дать компании
ImageMetrics
возможность создать цифровую версию
Эмили.
https://voca.ro/11QKy8C1mpZo
· #381
Nastya Poddubrovskaya(RZ-212, Popovych.E) (Tuesday, 14 June 2022 09:59)
Today, І have read thе аrtісlе «A new way to remove troublesome ions from water»
Converting seawater to freshwater is important in water-scarce countries. This
process requires the removal of certain charged particles from the water, known
as ions. When an electric current is applied, the ions are adsorbed on the
electrodes and are therefore removed from the water. Recent research by
scientists from Israel and the Netherlands is helping to improve this ion
removal process.
In my opinion, this approach opens up many interesting possibilities. It can
also be used to treat wastewater, in particular to remove arsenic or small
organic molecules such as drug residues or herbicides.
https://phys.org/news/2021-10-troublesome-ions.html
https://voca.ro/12LDyVbt23KW
in principle
Nevertheless, we agree in principle with its basic message.
Тем
не менее, в принципе, мы согласны с его сутью.
in other words
Each dissolution evokes unbridled elements, in other words, it opposes the
manifested Cosmos.
Каждое разложение влечет необузданность стихий, иначе говоря, противоречит
проявленному Космосу.
digital version
In addition, the digital version of the original English document will include a
reference to this corrigendum.
Кроме того, цифровая версия оригинала этого документа на английском языке будет
включать в себя ссылку на указанное исправление.
https://voca.ro/1deCuZVDRyCB
· #380
Nastya Poddubrovskaya(RZ-212, Popovych.E) (Tuesday, 14 June 2022 09:52)
Today I have read the article: "Cyber of the fittest: Researchers develop first
cyber agility framework to measure attacks". There is a computer system that
lures actual cyber-attacks—to attract and analyze malicious traffic according to
time and effectiveness. As both the attackers and the defenders created new
techniques, the researchers were able to understand better how a series of
engagements transformed into an adaptive, responsive, and agile pattern or what
they called an evolution generation. By the way, it is the first of its kind and
allows cyber defenders to test out numerous and varied responses to an attack.
In my opinion, it is really great that specialists are interested in this
problem.
Article: https://phys.org/news/2019-06-cyber-fittest-agility-framework.html
https://voca.ro/1nFFadpArp31
in principle
We believe that in principle the meetings would be organized by 2008.
Мы исходим из того, что в принципе эти мероприятия должны быть организованы к
2008 году.
in other words
So in other words, he just appears on the grid five years ago.
Другими словами, он просто появился пять лет назад.
digital version
The digital version is based on an especially developed viewer, providing the
following functions:
В основу цифровой версии положена специально разработанная система просмотра
файлов, позволяющая обеспечить такие функции, как:
https://voca.ro/18f0ogDlFem3
· #379
Popovych E. (Tuesday, 14 June 2022 09:50)
To Sasha Movsum-Zade RT-211
Your comment has clear layout and quite correct as well as the task with the
phrases, thank you.
· #378
Kuleshov Konstantin(RZ-211)(Lebedeva) (Tuesday, 14 June 2022 09:50)
Відпрацювання 09.06
Today I have read the article "PowerPoint Live helps Microsoft Teams users
present remotely". It tells us about virtual presentations. This feature became
available during the coronavirus pandemic thanks to the Microsoft Teams
PowerPoint Live tool. I think it is a very comfortable environment for viewing
presentations. For Presenter mode places the presenter at the "front and center"
of the meeting, reducing the distraction of seeing multiple guests highlighted
all at once. PowerPoint Live also includes a Live Reactions feature where users
can use real-time emoji to interact.
In my opinion, it is the best environment for viewing presentations because it
has many useful features
https://techxplore.com/news/2021-03-powerpoint-microsoft-teams-users-remotely.html
1.The digital version is based on an especially developed viewer, providing the
following functions.digital version
2.So, in other words, you haven't actually solved these cases. in other words
3.Such individual reviews could in principle also address violations relating to
progressive realization.in principle
https://voca.ro/1lwQfCg8hJal
· #377
Popovych E. (Tuesday, 14 June 2022 09:49)
To Nazariy Glugan (RT-211)
Thank you, you have successfully completed the task.
· #376
Popovych E. (Tuesday, 14 June 2022 09:47)
To Yeulizaveta Barsukova (RT-211)
#372, 364
Exam Topic #10 (Radio equipment helping to save on bills) is well done
Thank you for your informative and grammatically correct commentaries.
· #375
Roman Gavrilenko RZ-211 (Yershova) (Tuesday, 14 June 2022 09:47)
Exam topic #4 ( Information protection systems)
In order to run a successful, secure organization, IT leaders need
well-documented policies that address potential security issues and explain how
these issues will be managed within the company. These policies are also
fundamental to the IT audit process, as they establish controls that can be
examined and validated.
Examples of security policies
Security policies come in several forms, including the following:
General information security policy. Provides a holistic view of the
organization's need for security and defines activities used within the security
environment.
Access security policy. Addresses how users are granted access to applications,
data, databases and other IT resources. This policy is particularly important
for audits.
Authentication policy. Governs how users are verified to access a system's
resources.
Password policy. Defines how passwords are configured and managed.
Perimeter security policy. Defines how an organization protects its network
perimeter from unauthorized access and the technologies used to minimize
perimeter porosity.
Cybersecurity policy. Defines how an organization prepares and responds to
malware, phishing, viruses, ransomware and other attacks.
https://voca.ro/1k5ntY1VklqI
1)prevailing view
The prevailing view, however, was that the matter merited attention in the
context of the draft Convention.
https://voca.ro/1j30AvAbv9OP
2)priority research areas
The demand for more democratic input, finally, also seeks to influence research
priorities .
https://voca.ro/1jSQGGXljDVx
3)practical problems
Measures are being agreed to overcome these practical problems.
https://voca.ro/12DfiMSDhyku
· #374
Sasha Movsum-Zade RT-211 (Popovych E.) (Tuesday, 14 June 2022 09:45)
Today I have read the article titled "New imager microchip helps devices bring
hidden objects to light". This article describes how researchers at the
University of Texas at Dallas and Oklahoma State University have developed an
innovative terahertz imaging microchip that allows devices to detect objects and
create images through obstacles including fog, smoke, dust, and snow. It also
describes that the team is working on a device for industrial applications
requiring shooting at a distance of up to 20 meters. The technology could also
be adapted for use in cars to help drivers or autonomous vehicles navigate
dangerous environments that reduce visibility.
https://voca.ro/16Qz63ljd0mc
https://techxplore.com/news/2022-06-imager-microchip-devices-hidden.html
1)in other words
So the benchmark is objective assessment or in other words reasonability.
Таким чином, як критерій має виступати об'єктивна оцінка або, іншими словами,
обґрунтованість.
2)digital version
The digital version is based on an especially developed viewer.
В
основу цифрової версії покладено спеціально розроблену систему перегляду файлів.
3) in principle
The assessment leads to recommendations, which can be supported in principle.
На
основі цієї оцінки зроблено рекомендації, з якими, у принципі, можна погодитись.
https://voca.ro/1kzmeK93Z9dA
· #373
Nazariy Glugan (RT-211) Popovych E. (Tuesday, 14 June 2022 09:43)
Today I have read an interesting article "New imaging system captures text from
barely open books". investigates a new method for books with fragile binding.The
method allows you to scan books without opening them by more than 30 degrees.
Historians and librarians think the book is a valuable and important subject of
study, especially if the binding is original. It’s hard to open old books
without harming them. This project was developed under the leadership of Gregory
Rochester and the Lazarus Project team. I think this article is useful and this
information will help save old books.
https://techxplore.com/news/2021-10-imaging-captures-text.html
https://voca.ro/1n2cZadTPKKz
1) digital version
The digital version is based on an especially developed viewer, providing the
following functions
2) in other words
So the benchmark is objective assessment or in other words reasonability.
3) in principle
The assessment leads to recommendations, which can be supported in principle.
https://voca.ro/1kMP4dcsf6PS
· #372
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 14 June 2022 09:38)
Hello. Could you check this work, please? I sent it last Thursday to our other
teacher and I don’t know if he checked it or not because he didn’t write
anything. I'm just afraid she'll get lost. If you want to check if I really did
this, then this is comment #280. Thank you in advance.
Exam Topic #10 (Radio equipment helping to save on bills)
There are many ways to save on bills. However, they can all be combined into
one. To do this, we need to use a smart home system. It can control the
switching on or off of lighting or electrical equipment. It can also control the
irrigation system, turn on or off the water at a specified time. In addition, it
can control the microclimate in the house. As a result, electricity and water
bills will be reduced because we will not forget to turn off the lights in the
room and turn off the irrigation system.
Audio:https://voca.ro/1m8j7b54GbkF
· #371
Gvozd to Roman Gavrilenko RZ-211 (Tuesday, 14 June 2022 09:35)
Your tasks are quite correct and interesting.
· #370
Denis Zavadsky Lebedeva RZ-211 (Tuesday, 14 June 2022 09:35)
Technical basis of information protection in modern computer systems.
The basis of information protection in modern systems lies in the complication
of access to the information itself, which repeats the oldest ways of storing
data. Previously, various kinds of ciphers or tricks were used to read the text
on paper just like that was impossible, but today these methods have been
adapted to modern computer systems. For example, the PGP encryption system. This
is a method of encrypting data with the creation of a decryptor key. User 1
creates a document and encrypts it, generating a decryption key. User 1 gives
this text to user 2, and then his decryption key. This method is one of the most
popular ways to protect information today, and it lays the foundation for
information security in today's Internet environment.
· #369
Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 14 June 2022 09:27)
Долг:31.05
1)Today I've read an article called"Canada hospitals use drones to carry lungs
for transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by
Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western
Hospital on the city's west side to the roof of the downtown Toronto General
Hospital.The trip at the end of September took less than 10 minutes. It was
automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the
company, but a similar flight in April 2019 delivered a kidney to a hospital in
the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team
that whisked the package inside and successfully transplanted the lungs into a
waiting patient, saving the life of the 63-year-old man who'd been diagnosed
with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human
organs
https://voca.ro/1oNUOF2CvqeB
https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html
1)examine more closely
I think I will examine it more closely.
https://voca.ro/1nWP11xB6A47
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
https://voca.ro/1z4BBCa9h3sM
3)distinct
The stems have distinct smelling foliage when young.
https://voca.ro/1m0QSdndPbpo
· #368
Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 14 June 2022 09:24)
Долг:24.05
1)Today, І have read thе аrtісlе «Pianists learn to play with robotic third
thumb in just one hour»
Pianists equipped with a third robotic thumb were able to adapt to using the
extra digit after just one hour of practice, Imperial research has found.
Researchers from Imperial College London have been working to understand how
well the human brain can cope with using extra limbs made possible through
robotic technology.
To assess the effects of such devices on the brain, the research team, led by
Professor Aldo Faisal of Imperial's Department of Bioengineering, attached
robotic extra thumbs to a group of piano players next to their little finger
that could be controlled by the pianists using their feet.
My opinion, very interesting and informative, I think such technology will open
up new music for us.
https://voca.ro/1052xop3havH
https://techxplore.com/news/2021-11-pianists-robotic-thumb-hour.html
1:as a matter of
That is requested both as a matter of fairness and for the sake of regional
stability.
https://voca.ro/1ilv3d3ONghs
2)as distinct from
Pests cannot produce resistance to predators as distinct from pesticides.
https://voca.ro/19wEuxddrqKM
3)acquainted with
Taylor, you don't know me, but I think we should get acquainted.
https://voca.ro/1eNbXKTfK3sg
· #367
Dovzhenko Ilya RZ-211 (Lebedeva) (Tuesday, 14 June 2022 09:23)
Today I read an article about a liquid magnetic solution for sorting plastic
waste. Due to the insane growth in the production of plastic, we need to figure
out how to recycle it. Plastic pollution is very harmful to the environment. How
does this separator work? And everything is quite simple. There are different
types of plastic (heavy, light, etc.), so they need to be distributed. And they
are distributed just by these magnetic fluids. Thus, they are sorted by type and
it is easier to process. This method can easily and without errors separate
different types of plastic.
https://techxplore.com/news/2021-02-fluid-magnetic-solution-plastic.html
https://voca.ro/1HyMQNcgUylc
1)in principle
In principle, ideas can be embodied and can make a profit.
Але, принципово, ідеї можуть бути втілені і можуть приносити прибуток.
2)digital version
Enter this code here in order to activate the digital version of your book.
Введіть тут цей код, щоб активувати цифрову версію вашого підручника.
3)in other words
States in other words have to be able to govern .
Інакше кажучи, держава має бути здатною управляти .
https://voca.ro/1jPOGjT2dFGR
· #366
Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 14 June 2022 09:22)
Долг:17.05
1)Today I've read an article called"Innovative design of titanium alloy with
supreme properties by 3D printing".
The article tells about design of advanced titanium alloy.
A study led by scientists from City University of Hong Kong (CityU) has
successfully developed a super-strong, highly ductile and super-light
titanium-based alloy using additive manufacturing, commonly known as 3D
printing. Their findings open up a new pathway to design alloys with
unprecedented structures and properties for various structural applications.
The research team was led by Professor Liu Chain-Tsuan, University Distinguished
Professor in the College of Engineering and Senior Fellow of CityU's Hong Kong
Institute for Advanced Study (HKIAS). Dr. Zhang Tianlong, a postdoc in the
Department of Materials Science and Engineering (MSE), conducted the
experiments. Their paper, to which President Way Kuo of CityU also contributed,
was published recently in the prestigious scientific journal Science, titled "In
situ design of advanced titanium alloy with concentration modulations by
additive manufacturing."
in my opinion 3D printing as a revolutionary technology that can produce machine
parts with complex shapes within just one step.
2)https://voca.ro/1n49MgfA09Nc
3)https://techxplore.com/news/2021-10-titanium-alloy-supreme-properties-3d.html
4:
1)a series of experiments
So, now we need to design a series of experiments around emotional flexibility.
https://voca.ro/164g0zUymPxB
2)a new light on
You know, this puts a new light on the game.
https://voca.ro/1i8zd8O1K1Fi
· #365
Lebedeva E. (Tuesday, 14 June 2022 09:21)
To Denis Zavadsky RZ-211 Thanks for the comment.
· #364
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 14 June 2022 09:20)
Class-work
As we know, water is unusable, as most of us think. Most of the water goes to
oil production and resulting in formation waters. To be able to reuse this
water, engineers have developed a new method of purification - membrane
distillation. This technology allows to treat heavily contaminated wastewater.
Although this is an expensive technology but it can be made cheaper by using
waste heat to meet the technology's thermal energy requirements. In my opinion,
this is a very important development because it can be used not only for
formation waters but also for water contaminated with chemical compounds.
Article:https://techxplore.com/news/2022-06-method-recycle-fracking-drilling.html
Audio1:https://voca.ro/12BJtMWPXi3M
Phrases
1)in other words
So the benchmark is objective assessment or in other words reasonability.
Таким чином, як критерій має виступати об'єктивна оцінка або, іншими словами,
обґрунтованість.
2)digital version
The digital version is based on an especially developed viewer.
В
основу цифрової версії покладено спеціально розроблену систему перегляду файлів.
3) in principle
The assessment leads to recommendations, which can be supported in principle.
На
основі цієї оцінки зроблено рекомендації, з якими, у принципі, можна погодитись.
Audio2:https://voca.ro/17x6rPbgQhf1
· #363
Popovych E. (Tuesday, 14 June 2022 09:20)
To Sergey Kyznyak RT-211
#360,361
Exam #10 (Cable television) is well done.
Good work, thorough and clear, thank you.
· #362
Denis Zavadsky Lebedeva RZ-211 (Tuesday, 14 June 2022 09:16)
Долг: 31.05
Scientists from the Institute of Industrial Science at The University of Tokyo
fabricated three-dimensional vertically formed field-effect transistors to
produce high-density data storage devices by ferroelectric gate insulator and
atomic-layer-deposited oxide semiconductor channel. Furthermore, by using
antiferroelectric instead of ferroelectric, they found that only a tiny net
charge was required to erase data, which leads to more efficient write
operations. This work may allow for new, even smaller and more eco-friendly
data-storage memory.
I consider this an important study because it is a potential opportunity to
increase the memory size of electronic storage devices by reducing them in
volume.
https://techxplore.com/news/2022-06-data-storage-memory.html
The digital version is based on an especially developed viewer, providing the
following functions:
But in principle, I pity her.
So in other words, he just appears on the grid five years ago.
Цифрова версія заснована на спеціально розробленому програмі перегляду, що
забезпечує такі функції:
Але в принципі мені її шкода.
Іншими словами, він з’явився в мережі лише п’ять років тому.
https://voca.ro/1jAjcLA7kICV
· #361
Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 14 June 2022 09:07)
(Article)
Today I have read the article 'Combining AI and computational science for
better, faster, energy efficient predictions'.
The article tells about the new technology "intelligent alloys", the main
purpose of which is combining the power of computational science with artificial
intelligence to develop models that complement simulations to predict the
evolution of science's most complex systems. By using this technology, the
researchers demonstrated that they can generate predictions thousands to a
million times faster than it would take to run the simulations with full
resolution or rely on partial or even faulty information through models. I think
this technology has a huge future that is coming right now.
1)expected value
Either the present value or a future expected value should be used.
Следует использовать либо нынешнее значение, либо будущие ожидаемые значения.
2)technology capability
At least the exponential growth of information technology capability will
continue unabated.
По
крайней мере, возможности информационных технологий будут расти, не ослабевая, с
экспоненциальной скоростью.
3)work schedule
Consequently, the Court may wish not to overstretch its work schedule in the
field at any given time.
Соответственно, Суд, возможно, пожелает сделать более напряженным свой график
работы на местах в любой заданный период времени.
Vocaroo(article): https://voca.ro/1iVdA1qr4K25
Vocaroo(sentences): https://voca.ro/130pnPRxsJji
https://techxplore.com/news/2022-04-combining-ai-science-faster-energy.html
· #360
Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 14 June 2022 09:01)
Exam #10 (Cable television)
Cable TV in the modern world is already less popular than 5 years ago. Now
satellite and Internet television are popular. These are faster ways to receive
a signal than cable. It's also cheaper and better quality. Cable TV has
significant signal loss and the cost of running wires is higher. A couple of
years ago, cable television left Ukraine, analog signals no longer come to our
TVs, and we stepped forward in this area. I believe that progress can`t be
stopped and this is the right decision, we must improve and develop the types of
signal transmission and our television vision.
Vocaroo: https://voca.ro/1bkWxT1Pjxgb
· #359
Gvozd O.V. to RZ-211 (Tuesday, 14 June 2022 08:57)
Dear students!
This lesson is a good chance for you to post your debts. I am waiting for your
active work.
· #358
Khotynskiy Oleg (RZ-212, S.Mykhailiuk) (Tuesday, 14 June 2022 08:34)
Can I find out how many comments I need to turn in to close my debts?
· #357
Popovych E. (Tuesday, 14 June 2022 08:31)
To Mashovets Andrey (RZ 212)
Thank you for your comment and voice message.
· #356
Popovych E. (Tuesday, 14 June 2022 08:30)
To Kravchenko Kostiantyn (RZ-212)
Your comments are good, as usual. Thanks for your work. Good luck.
· #355
Popovych E. (Tuesday, 14 June 2022 08:28)
To Povoznikov Artem RZ-212
Thank you, you have successfully completed the task.
· #354
Mashovets Andrey (RZ 212, Popovich) (Tuesday, 14 June 2022 08:26)
Today I've read the article “Collapsing a leading theory for the quantum origin
of consciousness”.
This article is about destruction of the theory of quantum origin of
consciousness.
The purpose of this article is to show that the theory of quantum origin of
consciousness has been disproved and to demonstrate evidence of this and to show
new guesses in this growth.
А series of experiments in a lab deep under the Gran Sasso mountains, in Italy,
has failed to find evidence in support of a gravity-related quantum collapse
model, undermining the feasibility of this explanation for consciousness. The
result is reported in the journal Physics of Life Reviews.
I think this article will be useful for people interested in science.
https://voca.ro/1irMQ6Es5Q3R
https://phys.org/news/2022-06-collapsing-theory-quantum-consciousness.html
in other words
The current best practice in secure technology architecture used by major
businesses and organizations is a "zero trust" approach. In other words, no
person or system is trusted and every interaction is verified through a central
entity.
digital version
People with an Arizona driver's license or state identification card can now add
a digital version on their iPhone.
in principle
What I loved about this theory was that it is in principle testable and I
decided to search for evidence that might help confirm or falsify it
https://voca.ro/1k6Ebn2CMhFH
· #353
Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 14 June 2022 08:00)
Today I've read the article "SSD-Insider++: A firmware-based approach to
thwarting ransomware attacks"
The article covers the recent research of malware prevention technologies,
specifically a computer SSD's firmware.
This new technology consists of firmware, embedded right into the computer SSD,
making it harder for malware to bypass it. The firmware is able to recognize the
patterns displayed by ransomware, and in the event that a malware attack occurs
it will immediately stop all SSD activity in order to prevent the malware from
accessing any files.
I think this technology is fascinating, however, much like any tool, I believe
it could end up being used for terrible things. If the creators can embed
firmware into my SSD that I would not be able to edit myself, how would I know
that it's actually being used for malware detection and doesn't do something
significantly worse, whilst pretending to be useful?
Article:
https://techxplore.com/news/2021-09-ssd-insider-firmware-based-approach-thwarting-ransomware.html
Audio: https://voca.ro/13aQ06lOq3nt
Phrases:
1) In other words, no person or system is trusted and every interaction is
verified through a central server.
Іншими словами, жодна людина або система є довіреною, та кожна взаємодія
перевіряється через центральний сервер.
2) A digital version of the Electronics Show kicked off on Monday.
Цифрова версія шоу електронної апаратури розпочалась у понеділок.
3) In principle, however, the method is relevant for various chemical reactions.
Але, в принципі, метод є доречний для різних хімічний реакцій.
Audio: https://voca.ro/11Y5HP0vUNMh
· #352
Povoznikov Artem RZ-212 (Popovych) (Tuesday, 14 June 2022 07:56)
Today i have read the article: Fishers at risk in 'perfect storm'.
This article tells about Scientists who conducted research with fishermen and
sagged a survey about how they combine risk and reward during a storm. Since
climatic conditions cause extreme weather conditions, storms will increase in
the future across the UK, and this in turn will greatly affect the economic
instability of many fishermen. It is very difficult to solve such a problem, but
the researchers are trying to create policies that include improving the safety
of boats, less vulnerable fishing methods and the creation of insurance products
that are issued to fishermen during hazardous work. Researchers also created a
group from different universities and created various scenarios with factors
including wave height, wind speed and likely catch.
I think these are great and great methods to help fishing reduce their economic
problems.
Text: https://phys.org/news/2021-03-fishers-storm.html#!
Audio: https://voca.ro/11enipXIwjJN
1)In principle
In principle, however, the method is relevant for various chemical reactions and
thus the production of countless synthetic products.
2)digital version
The digital version is based on an especially developed viewer, providing the
following functions.
3)In other words
In other words, beauty really is in the eye of the beholder.
Audio: https://voca.ro/1iRrBOCrGr9R
· #351
Popovych E. (Tuesday, 14 June 2022 07:37)
To Artem Kotliarov RZ-212
Your tasks are performed completely correct, they are informative and detailed.
· #350
Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 14 June 2022 07:14)
1) 1. in other words
So in other words, he just appears on the grid five years ago - Іншими словами,
він з’явився в мережі лише п’ять років тому
2. in principle
In principle, however, the method is relevant for various chemical reactions and
thus the production of countless synthetic products. - В принципі, однак, цей
метод є актуальним для різних хімічних реакцій і, таким чином, виробництва
незліченної кількості синтетичних продуктів.
3. digital version
The digital version is based on an especially developed viewer, providing the
following functions - Цифрова версія заснована на спеціально розробленій
програмі перегляду, що забезпечує наступні функції
https://voca.ro/1oOYtHu1ponv
2) Today, І have read thе аrtісlе «A new way to remove troublesome ions from
water»
Converting seawater to freshwater is important in water-scarce countries. This
process requires the removal of certain charged particles from the water, known
as ions. When an electric current is applied, the ions are adsorbed on the
electrodes and are therefore removed from the water. Recent research by
scientists from Israel and the Netherlands is helping to improve this ion
removal process.
In my opinion, this approach opens up many interesting possibilities. It can
also be used to treat wastewater, in particular to remove arsenic or small
organic molecules such as drug residues or herbicides.
https://phys.org/news/2021-10-troublesome-ions.html
https://voca.ro/1ax3utozCR6h
· #349
Popovych E. (Tuesday, 14 June 2022 07:06)
Good morning!
The lesson will start soon, I am waiting for your active work. If you have
debts, it is high time to post them.
· #348
Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:56)
Exam topic#8 Passwords and their drawbacks
To protect your data and create an effective security system, it is important to
come up with a quality password for it. 90% of all users do not know about the
rules and hope for "maybe", as a result they lose access to their accounts and
become more vulnerable to attackers. Every year, data security companies collect
information about the most used passwords and publish them. Many users do not
take security very seriously when choosing common passwords. They can be broken
by rough selection, and if the code is used for several accounts - the user
risks being left without all profiles. A strong password reduces the risk of
account hacking. The main rule is that the more characters, the better for
security, because even in the case of rough selection, it will take a long time
to break. And if you follow all the above rules - without knowing the person
personally, it will be impossible to break.
voice: https://voca.ro/1k9Duh5T541o
· #347
Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:55)
Exam topic#6 An isolated virtual machine
A virtual machine is a software and hardware copy of a physical computer or
server, with any desired operating system and set of installed programs.
Visually, the system resembles real hardware, as if you are using PC resources
(processor, disk, adapter). Only this computer is not real, but virtual.
Resources are stored in the cloud and allow you to work autonomously. Simply
put, a virtual machine is an infrastructural, virtual environment that allows
you to create another computer on your computer. The virtual machine is stored
and duplicated as an isolated environment. You can run it later or copy it to
another computer. Preset configurations are saved automatically.
voice: https://voca.ro/1l1pcbecGuR4
· #346
Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:54)
Exam topic#4 Information protection systems.
Integrated information protection system - a set of organizational and
engineering measures aimed at ensuring the protection of information from
disclosure, leakage and unauthorized access. Organizational measures are a
mandatory component of building any system of protection. Engineering measures
are carried out as needed. Organizational measures include the creation of the
concept of information security, as well as the development of action plans in
case of detection of unauthorized access to information resources of the system,
failure of protection, emergency. If necessary, within the framework of
organizational measures, an information security service may be established, and
the system of record keeping and document storage may be reorganized.
voice: https://voca.ro/1dImOxhHWj1r
· #345
#344 Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:53)
Exam topic#2 Various security techniques
To develop the concept of information security, information means information
that is available for collection, storage, processing (editing, conversion), use
and transmission in various ways, including in computer networks and other
information systems. Such information is of high value and may be subject to
encroachment by third parties. The desire to protect information from threats is
the basis for creating information security systems. Formal means of protection:
electronic mechanisms that operate independently of information systems and
create barriers to access. Additional security features such as cameras, DVRs,
motion sensors also add a small "layer of protection" to the data.
voice:https://voca.ro/1oGODwqLXkt5
· #344
Dasha Semidetnova RZ-213 (Mykhailiuk) (Friday, 10 June 2022 16:53)
Exam topic#1 Concept of "Privacy"
Confidentiality is a property that is not subject to publicity; gullibility,
secrecy, pure privacy. Confidential information refers to information to which
access is restricted by federal laws. Constraints have different purposes. For
example, protecting the foundations of the constitutional order, morality,
health, rights and legitimate interests of certain individuals, ensuring the
defense of the country and the security of the state. Confidentiality means that
a person who has access to certain information does not have the right to
transfer such information to other persons without the consent of its owner. Any
journalist should know what kind of information is confidential, how to properly
use and disseminate it. Mishandling of confidential information can lead to
claims from regulatory authorities, litigation or even criminal prosecution.
voice:https://voca.ro/1ZfClx2fpsFC
· #343
Mitriev Vitaliy RZ-213 (S.Mykhailiuk) (Friday, 10 June 2022 12:13)
Exam topic #10
Software by using firewall is a firewall that is installed on a computer or
server, and tasked with network security. It works with a wide variety of other
technology security solutions to provide more robust and cohesive security for
enterprises of all sizes. When a software firewall is installed on a server, it
opens up like an umbrella of protection over all other computers connected to
the network. It is able to monitor both incoming and outgoing traffic for
potential risk or suspicious user behaviour, and also makes setting security
policies much easier, faster and more flexible. This type of firewall is also
critical as it requires very little space and can be installed remotely on any
number of devices. It’s far different from its counterpart, the hardware
firewall, which has many unique elements in its own right.
https://voca.ro/1g0WAFvG53mN
· #342
Kate Syrbu RZ-213 (S.Mykhailiuk) (Friday, 10 June 2022 12:01)
1) for a number of reasons - з ряду причин;
These problems have developed for a number of reasons.
Ці проблеми виникли з ряду причин.
2) first use of - перше використання;
The first use of corn may have been for an early form of liquor.
Перше використання кукурудзи, можливо, було для ранньої форми лікеру.
3) focused primarily on - зосереджено насамперед на;
This study focused primarily on salinity problems.
Це дослідження зосереджено на проблемах солоності.
https://voca.ro/17zuHO6Q56uI
Exam topic #19
A security violation occurs when a network or system is accessed by an
unauthorized individual or application. Once your system is infiltrated, the
intruders can steal data, install viruses, and compromise software. There are
seven of the most common types of security threats: man-in-the-middle attack,
denial-of-service (DoS) attack and distributed-denial-of-service (DDoS) attack,
phishing, password attack, eavesdrop attack, cross-site (XXS) attack, malware
attack. In my opinion, a system should include things like endpoint security
software, firewall management software, managed antivirus, and bring your own
device (BYOD)/mobile device management (MDM) software.
https://voca.ro/1hhT63u74m83
· #341
Igor Rudko (RZ-213) (S.Mykhailiuk) (Friday, 10 June 2022 11:57)
Audio: https://voca.ro/1hiiIPofCp2C
Article: https://phys.org/news/2019-06-cyber-fittest-agility-framework.html
Today I have read the article: "Cyber of the fittest: Researchers develop first
cyber agility framework to measure attacks". There is a computer system that
lures actual cyber-attacks—to attract and analyze malicious traffic according to
time and effectiveness. As both the attackers and the defenders created new
techniques, the researchers were able to understand better how a series of
engagements transformed into an adaptive, responsive, and agile pattern or what
they called an evolution generation. By the way, it is the first of its kind and
allows cyber defenders to test out numerous and varied responses to an attack.
In my opinion, it is really great that specialists are interested in this
problem.
Phrases
Audio: https://voca.ro/1hh312C0Iaiw
1) first use of - перше використання
Some group of scientists made an experiment that was the first use of
microscopic sound waves to study cell abnormalities - Деяка група вчених провела
експеримент, який став першим використанням мікроскопічних звукових хвиль для
вивчення аномалій клітин
2) focused primarily on - зосереджений насамперед на
The research is also unique because previous studies focused primarily on
firm-level consequences of behavior such as supplier sustainability risk and
corrupt opportunism. - Дослідження також унікальне, оскільки попередні
дослідження були зосереджені насамперед на наслідках поведінки на рівні фірми,
таких як ризик стійкості постачальників і корупційний опортунізм.
3) for a number of reasons - з ряду причин
The technology is novel for a number of reasons, one being that it has the
potential to provide new insight into the environmental factors that have
significant impacts on air pollution levels. - Ця технологія є новою з ряду
причин, одна з яких полягає в тому, що вона може дати нове уявлення про фактори
навколишнього середовища, які мають значний вплив на рівень забруднення повітря.
· #340
Chabanenko Ksenia RZ-213(S.Mykhailiuk) (Friday, 10 June 2022 11:19)
Exam topic #13 (Authentication mechanisms)
Authentication is the process in which users verify their identity.
Registration, authorization, restoring access and deletion are main
sub-processes of authentication. Login is the personal name and it can include
your email, phone number, original name or other account, for example, in
Facebook or Google. Its confirmation could be realized by entering password, SMS
or PIN code, access key, or by face or fingerprint scanning. Two-factor
authentication is the extra protecting measure when user should verify using
several methods. For example, it could be the combination of email and PIN code
verification. Authentication is important because there are a lot of cheaters
whose aim is to gain access to your account in order to steal the money or do
other bad stuff.
https://voca.ro/15zaTzeXWOHU
· #339
Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 10 June 2022 11:14)
Exam Topic:
Different Protection Mechanisms
Audio:https://voca.ro/13WrJmqKXXB6
Nowadays, more new viruses and new threats are emerging, that is why we need to
act quickly and effectively. And that`s why more new mechanisms are created.
The main protection mechanisms nowadays are, first of all, the creation of
software that does not allow you to pick up a virus so easily.
It is also possible to include different hardware devices that also perform the
function of different protection. But the most productive mechanism is a
combination of these tools, with the organization of certain security measures.
All this will help to reduce the risk of unauthorized access or picking up the
virus.
· #338
Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 10 June 2022)
Exam Topic:
Principles of information protection
Audio:https://voca.ro/16rWDcCjosVf
Creating the principle of information protection is very important because they
have to protect the rights of people, society, and the state.
The main principles of information protection in Ukraine are, first of all,
legality and balance of interests of the whole society and the state.
Equally important is integration into the international security system and the
prevention of all threats.
Because it is very important to act quickly, and efficiently and try to improve
security systems, in order to avoid all kinds of dangers that can affect the
lives and health of people
· #337
Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 10 June 2022 11:13)
Exam Topic:
Information protection systems
Audio:https://voca.ro/1m4vDSem4EDp
Our world is developing, and more things go online. That`s why it becomes even
more important to create other systems for the protection of information.
First, you need to understand that an information security system - is a set of
engineering and technical measures aimed at protecting information.
The development of an information security system is very difficult, as it
covers many different areas, from hardware protection to software, etc.
One of the areas of information protection in computer systems is the technical
protection of information, which is created to protect against unauthorized
access.
· #336
Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 10 June 2022 11:07)
information protection systems (exam topic 4)
Information security and protection of privacy are some of the most important
factors in the development of high-quality tools in the healthcare sector. If no
attention is paid to these aspects, there is substantial risk that individuals
may come to harm in healthcare situations. Leonardo Iwaya, PhD student in
computer science at Karlstad University, explores ways of securing information
and protecting privacy when using mobile applications in healthcare (mHealth).
Mobile apps are for example used in developing countries to increase the
coverage and the access to public healthcare. But many projects fail because
issues related to data security and privacy cannot be successfully integrated in
the systems.
For instance, in Brazil, mHealth tools have been used by community health
workers to improve patients' treatment in poor and rural areas, strengthening
the link between the society and the public health system. These patients often
have limited possibilities to visit healthcare clinics and the project instead
involved healthcare workers visiting patients at home. Smartphones are, for
example, used to streamline the handling of journals. Information gathered
during a visit is also used to analyse the impact of the conditions in the
specific areas on people's health, so that more prevention work can be done.
In my opinion these issues have to be considered from the start if people want
to develop digital healthcare systems in which information is properly secured
and privacy is protected. I think that this article is so interest
especially today. I would recommend reading this article to many people who do
not understand the importance of modern technology
· #335
Anna Yakymova/ РЗ-213(S.Mykhailiuk) (Friday, 10 June 2022 10:47)
passwords and their drawbacks(Exam topic 8)
The most basic form of user authentication, particularly on the Web, is the
password authentication protocol. This method of authentication forces you to
remember username/password combinations to access accounts or special sections
of a website. While effective and in some ways fundamentally a part of online
security, password authentication protocols fail when you don't address them
seriously. So the main disadvantage is that it can be simply guessed.
You typically can't guess a password unless you know something about the user of
that password, and then only if the password represents something knowable about
that user. Computer programs, however, can launch brute force attacks on
password systems. This means that a program literally reads through a provided
dictionary of terms, trying each word until the correct combination of
characters breaks the password. Typically, protecting yourself from these
attacks requires you to create complex passwords that include numbers, letters,
and special symbols, which can be hard to remember.
Also, don't forget about the danger for the password in public places.
First, someone physically near you may look over your shoulder and read your
password, or look at your keyboard and note your key strokes. Second, someone
connected to the network might try to intercept your password information as you
log in using network programs that monitor the local Wi-Fi hot spot.
Your password is the last point of defense between you and criminals who'd like
to access your personal data. Therefore, you should always follow the rules for
creating and using a password so that it has minimal drawbacks.
https://voca.ro/1W3umaZqXGnT
information protection systems(Exam topic 4)
More and more sectors of human activity are becoming so much imbued with these
new information technologies. But providing huge opportunities, information
technology, however, carry a greater risk and creating an entirely new,
little-studied area for possible threats, which implementation can lead to
unpredictable and even catastrophic consequences. An increasing number of
computer crimes that may lead ultimately to the decreasing of the economy.
Failure of information technology used in the management of nuclear power plants
or chemical plants can cause ecological disasters. And so it should be clear
that the information is a resource that must be protected.
Systems of information security are the same thing as the information protection
systems and they protect sensitive information from unauthorized activities,
including inspection, modification, recording, and any disruption or
destruction. The goal is to ensure the safety and privacy of critical data such
as customer account details, financial data or intellectual property.
There are such types of systems like :
Personal data protection systems, data access control systems, intrusion
detection and prevention system.
https://voca.ro/1jfFC847ewK4
· #334
Simchuk Alexey (Mykhailiuk RZ-213) (Friday, 10 June 2022 10:43)
Exam topic #9 Functions of firewalls
A firewall is a system specifically designed to prevent suspicious access from
entering a private network. Firewall itself can be hardware or software, it can
also consist of a combination of both.
Firewall (fire retaining wall) itself is actually inspired by a physical object
called a firewall that is installed in buildings to prevent the spread of fire
from its source. Firewalls for many buildings are installed, for example in
apartment complexes. To separate the two apartment units, a firewall was
installed so that in the event of a fire the fire does not quickly spread from
one unit to another.
Because the firewall serves as a barrier to the outside world, then for one
apartment unit that has four sides, for example, it must install a firewall at
all four border points. If one side is not limited by a firewall while the other
three are fitted with a firewall, it will be futile to try to hold back the fire
that will spread quickly. So is the case with firewalls for computers.
In order to function effectively, a firewall must meet certain standards, be
able to establish a ‘security fence’ around a private network, prevent
unauthorized access and various disruptions to documents or files on the user’s
computer. On the market, there are quite a number of firewall products offered
with varied functions. The difference between firewalls with one another is
usually in how tight the security and selectivity of access, and the scope of
protection at various layers of the OSI (Open System Interconnection).
· #333
Simchuk Alexey (Mykhailiuk RZ-213) (Friday, 10 June 2022 10:40)
Exam topic #12 (Hardware firewall)
A hardware firewall is a physical device, similar to a server, that filters
traffic to a computer. Instead of connecting a network cable to the server, it
connects to the firewall, placing the firewall between the uplink and the
computer. Like a standard computer with processor, memory and sophisticated
software, this device also uses powerful network components (hardware and
software) and forcibly inspects all traffic passing through this connection with
configurable rule sets that allow or deny access accordingly.
Anyone who has ever used a computer can probably tell you a story about firewall
blocking. As good Internet citizens, we encounter firewalls all the time,
usually in the form of a software firewall running on a personal laptop or
workstation. Their function is surprisingly modest. They inspect traffic as it
enters and exits the computer and, based on some simple rules, either allow or
deny that traffic.
Some common examples of software firewalls that you may be familiar with are
Windows Firewall.
UVB.
IP tables.
FirewallD.
A hardware firewall works similarly, except that it is outside the server.
· #332
Simchuk Alexey (Mykhailiuk RZ-213) (Friday, 10 June 2022 10:38)
Exam topic #17 (Password as a general technique of secrecy.)
Passwords are an important part of information and network security. Passwords
serve to protect against unauthorized access, but a poorly chosen password can
jeopardize the entire institution. As a result, all members of the TCNJ
community should take appropriate steps to ensure that their passwords are
strong and secure. The best password is one that is long and has never been used
before. Passwords are used to access any number of college systems. Bad, weak
passwords are easily cracked and put the entire system at risk. Therefore,
strong passwords are required. Try creating a password that is also easy to
remember.Your password should not be the same as your username. Your password
should be unique. Do not use the same password for multiple accounts
· #331
Shlapak Dmytro RZ-213 (Vorobyova) (Friday, 10 June 2022 09:22)
Exam topic #6 (An isolated virtual machine).
A virtual machine is a virtual computer artificially created with the help of
special software. A virtual computer has its own RAM, hard disk and processor.
Simply put, it is a computer in a computer that uses part of the resources of
the main computer (RAM, processor and hard disk).
Suppose there is a document, link or application created by an attacker to gain
access to your device and your data. You, as a reasonable person, run it in a
virtual environment in the hope that it will protect you from a potential
threat. For a successful attack, he needs to go beyond the virtual environment.
https://voca.ro/1ghOx6Qawplf
· #330
Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:54)
Today I've read an article: "Employer surveillance during COVID has damaged
trust".The author of the article explains a new report by the University of St
Andrews about how using staff surveillance by employers during the COVID-19
pandemic can endanger trust in the workplace. Research considers such methods of
control as: Webcam photographs, recording keystrokes, and movement trackers. But
researchers also warn employers not to sacrifice ethics for the sake of
efficiency as it can backfire leading to mental health
issues, productivity decline, and staff resignations. And I absolutely agree
with that.
https://phys.org/news/2021-11-employer-surveillance-covid.html
https://voca.ro/1nKRNcs2qzPT
· #329
Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:52)
Today I've read an article: "A step closer to understanding the 'cold spot' in
the cosmic microwave background".It tells about the research of scientists in
space and the Universe, in particular, the super-emptiness of Eridanus.
According to them, various voids are located between galaxies and, thanks to
dark energy, repel star clusters from each other. The problem is that scientists
had a Lambda-CDM method, which inherently either denied the veracity of this
phenomenon, or pointed to a cosmic anomaly. In addition, the researchers noticed
that the density of dark energy here is somewhat less than in other voids known
to man. I believe that this study is very important, as it brings us closer to
understanding and structure of the Universe, the processes taking place in it.
https://phys.org/news/2022-01-closer-cold-cosmic-microwave-background.html
https://voca.ro/16wHDOgR6bG6
· #328
Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:50)
Today I've read an article: "Massive cable project set to give Africa internet
boost". It says about how new high-speed Internet lines are being laid in Africa
right now. I really think this is important, because before, a lot of the
African people didn't even have the opportunity to go online. The Internet
allows you not only to keep in touch with the rest of the world, but also to get
knowledge, make purchases, etc. So the main idea of the article is to inform
people about what happens with African high-speed Internet right now. I liked
the article and considering it like a very useful one to all people.
https://techxplore.com/news/2020-05-massive-cable-africa-internet-boost.html
https://voca.ro/1m9LBf6cNYWe
· #327
Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:48)
Today I've read an article: "Key to resilient energy-efficient AI may reside in
human brain". A clearer understanding of how a type of brain cell known as
astrocytes function may result in better artificial intelligence (AI) and
machine learning, according to a team of Penn State researchers. This project
was created by trying computer models of simplistic neuron-synapse connections
and a lot of effort to understand how human brain works. I think this can
improve computer programs which use artificial intelligence (AI) and machine
learning in a way of more performance.
https://techxplore.com/news/2021-11-key-resilient-energy-efficient-ai-reside.html
https://voca.ro/1o1leSmykL8X
· #326
Koval Vlad (rz 213) (Vorobyova E.) debt (Thursday, 09 June 2022 19:39)
Today I've read an article: "Hacking and loss of driving skills are major
consumer concerns for self-driving cars". Self-driving cars have many
advantages, such as freeing of time, removing the issue of human error and
outperforming human capacity. But also we can't ignore such dangers as safety
risks of the vehicles, loss of competencies by the driving public and privacy
security breaches. I think this article will be helpful for everyone who wants
to buy and use self-driving car, so they could weigh the pros and cons.
https://techxplore.com/news/2021-05-hacking-loss-skills-major-consumer.html
https://voca.ro/1la6Q6X63Bfk
· #325
Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 19:33)
Today I've read an article: “Positive impact for police officers equipped with
mobile devices”.From this article I learned that the introduction of mobile
devices for police officers in Scotland has had a huge impact on safety and
well-being.Scientific research has shown that mobile working has improved work
efficiency . Officers reported that technology had a positive impact on their
well-being because they didn't have to spend time at the end of their shift
filling out paperwork. I think the introduction of mobile devices will have a
positive impact on their work, because we live in a time when it's much more
convenient to use devices than to write down all the information on paper.
https://phys.org/news/2021-11-positive-impact-police-officers-equipped.html
https://voca.ro/18qeaTV1soif
Can you please tell me if I still have any debts?
· #324
Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 19:22)
Today I've read an article: "New braking systems and satellite navigation to
help more trains run on Europe's tracks".Computers are very useful in our time.
They help to expand a person's horizons and teach new skills much faster than
books.One such useful thing is navigation, which can lead you to your
destination. For example, navigation helps ensure that trains run correctly.And
the new brake systems will help trains not to be late on their flights and know
about the stop in good time.After reading this article, I learned a lot of new
things, it turned out to be very interesting.
https://techxplore.com/news/2021-08-satellite-europe-tracks.html
https://voca.ro/1aAKlLfNtmee
· #323
Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 19:21)
Today I've read an article: "3-D computer models of gigantic archaeological
objects" by Monika Landgraf. It tells about the latest technologies in the
archaeological field. Nowadays 3D modeling is developing very quickly, so
researchers have found a way to use it in archeology. With the help of a special
camera, the object is being transformed into a computer-generated image. This
method will help the researchers study archaeological finds in a much closer and
more detailed way.
In my opinion, this technology would be very helpful, so I like that this
article is helpful in a certain way as well.
https://phys.org/news/2017-02-d-gigantic-archaeological.html
https://voca.ro/1ftAm4sBDrbn
· #322
Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 19:18)
Today I've read an article: "The dark side of social media networks". Research
from the University of Technology Sydney found 46 harmful effects from social
media use, ranging from physical and mental health problems to negative effects
on work and academic performance, as well as safety and privacy concerns. The
researchers grouped the negative effects into six themes: cost of social
exchange, annoying content, privacy concerns, security threats, cyberbullying,
low performance. Ms Borun is currently researching the factors that influence
social media addiction and the strategies people use to regulate their behavior.
This topic is very relevant, as I myself am faced with the dark sides of social
networks.
https://techxplore.com/news/2021-10-dark-side-social-media-networks.html
https://voca.ro/15sWxiQbF9Xe
· #321
Popovych E. (Thursday, 09 June 2022 18:29)
To Povoznikov Artem RZ-212
The exam topic is not complete. There is no audio recording.
Thanks for your comments, voice messages and work with the phrases. Keep on
working.
· #320
Popovych E. (Thursday, 09 June 2022 18:22)
To Timophey Sipin RZ-212
#304,306
Exam Topic: Potential security violations is well done. Thank you, you have
successfully completed the task.
· #319
Popovych E. (Thursday, 09 June 2022 18:16)
To Kate Kholodova (RZ-212)
Exam topic #9 Functions of firewalls is well done.Thank you for your informative
and grammatically correct commentaries.
· #318
Koval Vlad (rz 213) (S.Mykhailiuk) debt (Thursday, 09 June 2022 18:04)
Today i've read an article: A computer system allows a machine to recognize a
person's emotional state". The system created by researchers can be used to
automatically adapt the dialogue to the user's situation, so that the machine's
response is adequate to the person's emotional state. To detect the user's
emotional state, the scientists focused on negative emotions that can make
talking with an automatic system frustrating. Specifically, their work
considered anger, boredom and doubt. To automatically detect these feelings,
information regarding the tone of voice, the speed of speech, the duration of
pauses, the energy of the voice signal and so on, up to a total of sixty
different acoustic parameters, was used. To sum up, i think that this article is
really interesting and informative.
https://phys.org/news/2011-11-machine-person-emotional-state.html
https://voca.ro/11Fvu5doNGni
1. Considerable disagreement
While progress has been made, considerable disagreement remained with regard to
a number of crucial issues.
Хоча було досягнуто прогресу, залишаються значні розбіжності щодо низки важливих
питань.
2. Under international law, all countries have the right to conduct research and
develop their scientific capabilities for the peaceful uses of nuclear energy.
Відповідно до міжнародного права всі країни мають право проводити дослідження та
розвивати свої наукові можливості для мирного використання ядерної енергії.
3. Their work has provided new insights into the controversial question of
whether the languages we speak shape the way we think.
Їхня робота дала нове розуміння суперечливого питання про те, чи мови, якими ми
розмовляємо, формують наш спосіб мислення.
https://voca.ro/1aNBggGPbkcq
· #317
Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Thursday, 09 June 2022 15:04)
Sorry, how much tasks i need pass?
· #316
Parshykov Vladyslav(RZ-212) (Popovich/Mikhailuk) (Thursday, 09 June 2022 14:15)
I want to ask, how many works I need to write more? How many debts I have?
· #315
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 09 June 2022 13:55)
Topic #10 (The major differences in a monochrome television and a color
television receiver)
After the World War II, the USA took up the development of civilian technology,
including television. Therefore, color TVs came to replace the monochrome TV.
The biggest difference is the number of electron guns in the picture tube. A
monochrome tv has only one gun as it can only show black, white, or shades of
grey in between. Color TVs have 3 guns: red, green, and blue. Varying these
tubes give you the full spectrum of color. Beyond that there are differences in
the reciever, which has to decode the data for 3 guns instead of one, and in the
drivers for the guns.
https://voca.ro/1ar5kibV9j3a
Topic #5 (¬First radio speeches)
On 13 May 1897, Guglielmo Marconi sent the world's first radio message across
open water. He was initially interested in contacting ships. It paved the way
for the radio and television broadcasts that we take for granted today. On 11
and 12 May Marconi's team placed a transmitter on Flat Holm, an island halfway
across the Channel, and began sending messages out into the airwaves. But, their
work was a failure, with the team member in Lavernock sat waiting for a
non-existent signal. Then on 13 May, Marconi sent a message of "CAN YOU HEAR
ME," which was received loud and clear. So, this became the communication
revolution
https://voca.ro/14lTt1qtMv4E
· #314
Yershova Y. (Thursday, 09 June 2022 12:27)
Stanislav Popik РТ-212 (Yershova) (Thursday, 09 June 2022 11:46)
You have already done this topic. Be attentive.
· #313
Povoznikov Artem RZ-212 (Popovych) (Thursday, 09 June 2022 12:08)
Today i have read the article: Testing theories of cooperation between groups in
rural Georgia.
This article tells about a person from Bocconi University who decided to conduct
research to test the theory of cooperation between individuals in groups, he
talked about how people in groups come together for common protection when
threatened by an external force. But very little research has been done to find
out whether tact's seemingly logical assumptions are true. To do this, he
conducted his research in which people from 2 groups were invited to show a
sense of trust in such a way that it could be changed. Through such research,
Shayu found that people unite when they are threatened by an outsider. But, he
notes, he also discovered an unexpected degree of cooperation between
individuals of opposing groups - a possible step, in his opinion, by those who
live in villages to keep the peace.
Text:
https://phys.org/news/2017-10-theories-cooperation-groups-rural-georgia.html
Audio: https://voca.ro/1mnNlgWQiLIo
1)bear in mind
That might sound far-fetched but bear in mind that Korean PropTech company
Zigbang has already opened a 30-floor VR office called Metapolis.
2)expander upon
Zhou and Huang thus expanded upon this type of model, adding new elements that
allowed them to explore the interaction between a toxicant and a population in a
polluted river.
3)examined in detail
We believe that all issues within the Working Group's mandate should be examined
in detail.
Audio: https://voca.ro/1mBL3COYJTt3
Exam topic #12 (Hardware firewall)
This is the first line of defense as they are mostly configured on network boxes
(modems/routers) containing customized hardware and software. Every time it
detects a packet that is sent to your network, it checks its source, destination
address and header if it can be trusted. Only when a packet is received is it
allowed to pass through the hardware firewall and be configured on the
destination computer. Depending on the specific settings of the firewall, it
filters the traffic accordingly.
The hardware firewall has built-in IPS/IPDS (Intrusion Prevention Systems) that
are pre-discovered as a separate device. But now they're on, great protection.
· #312
Lebedeva E. (Thursday, 09 June 2022 11:58)
To Vova Kolomiets RZ-212 Well done, thank you.
· #311
Stanislav Popik РТ-212 (Yershova) (Thursday, 09 June 2022 11:46)
Exam topic #1“Cable television”
Cable TV in the modern world is already less popular than 5 years ago. Now
satellite and Internet television are popular. These are faster ways to receive
a signal than cable. It's also cheaper and better quality. Cable TV has
significant signal loss and the cost of running wires is higher. A couple of
years ago, cable television left Ukraine, analog signals no longer come to our
TVs, and we stepped forward in this area. I believe that progress can`t be
stopped and this is the right decision, we must improve and develop the types of
signal transmission and our television vision.
https://voca.ro/115prOs5YziK
· #310
Yershova Y. (Thursday, 09 June 2022 11:37)
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 09 June 2022 11:24)
The exam topics are rather good, but you have to work on your pronunciation.
· #309
Lebedeva E. (Thursday, 09 June 2022 11:26)
To Kravchenko Kostiantyn (RZ-212), Volodymir Kolomiets rz-212 Thank you for effective work .
· #308
Vova Kolomiets RZ-212 (Lebedeva) (Thursday, 09 June 2022 11:26)
(thats work for 26.05)
Exam topic #10 ("Software firewall")
Software firewall is a firewall that is installed on a computer or server, and
tasked with network security. It works with a wide variety of other technology
security solutions to provide more robust and cohesive security for enterprises
of all sizes. When a software firewall is installed on a server, it opens up
like an umbrella of protection over all other computers connected to the
network. It is able to monitor both incoming and outgoing traffic for potential
risk or suspicious user behaviour, and also makes setting security policies much
easier, faster and more flexible. This type of firewall is also critical as it
requires very little space and can be installed remotely on any number of
devices. It’s far different from its counterpart, the hardware firewall, which
has many unique elements in its own right.
https://voca.ro/1g0WAFvG53mN
· #307
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 09 June 2022 11:24)
Exam_topic @
Commercial use of radio
November 2, 1920 was the day of the widely acclaimed first commercial radio
broadcast, when Westinghouse Electric and Manufacturing Company broadcast the
results of the Harding-Cox presidential election live. Over the last century,
radio has evolved from a cumbersome experimental environment to a modern mobile
format. Radio has discovered new technologies such as television and cell
phones. For many, radio was the fastest and most reliable way to receive news
about national and world events. Even now, radio continues to be a hot form of
mass communication and remains one of the few free services.
https://voca.ro/127BZz0HbU10
Benefits of Satellite TV
Satellite TV has many advantages. The Satellite TV eliminates various
interferences and noises, allowing make the broadcast of the highest quality. An
important advantage is that satellite coverage extends to the whole of country,
so the location of the subscriber does not matter. By connecting to satellite
broadcasting, the subscriber chooses the desired channels for viewing, without
being tied to the packages of various operators. Therefore, satellite
broadcasting is quite profitable for the TV channels themselves, as the picture
is always high quality, and this only increases the prestige of the company
itself. Satellite TV also has a wealth of information that can be used for both
education and entertainment.
https://voca.ro/1ffD54j6lZ2Q
· #306
Timophey Sipin RZ-212(Popovych) (Thursday, 09 June 2022 11:22)
Today I have read the article ''Lithium-ion batteries that last longer in
extreme cold''.This article is about such a common problem for everyone that at
sub-zero temperatures, our lithium-ion batteries consume energy very quickly, or
even stop working altogether. To solve this problem, scientists from ACS Central
Science replaced the traditional graphite anode on a lithium-ion battery with a
rough carbon-based material that can withstand temperatures of -35 C without
problems. Testing was carried out at -35 C, which showed that when it is
discharged almost 100% of the charge stored in the battery.
In my opinion, such technologies will make our lives much easier, because each
of us has faced such a problem and knows how unpleasant it is.
2)https://techxplore.com/news/2022-06-lithium-ion-batteries-longer-extreme-cold.html
https://voca.ro/1iqCL5ED5
4)
1)examined in detail
Moreover, prima facie duplication and overlap has to be examined in detail.
Крім того, слід детально вивчити дублювання та накладення на перший погляд.
2)expanded upon
The issue would be expanded upon in Namibia's next report.
Це питання буде розширено в наступній доповіді Намібії.
3)bear in mind
But bear in mind, your primary responsibility is to your respective clients.
Але майте на увазі, що ваша основна відповідальність лежить перед відповідними
клієнтами.
https://voca.ro/1gwkUIE1
· #305
Kravchenko Kostiantyn (RZ-212, Lebedeva E.) (Thursday, 09 June 2022 11:22)
Exam topic #17 (Password as a general technique of secrecy.)
Passwords have been the staple of secrecy and access restriction since ancient
times. The roman military would utilize passwords for their sentries to safely
identify each other and only grant access to an area if they knew the password.
In modern times passwords have become the most common form of securing secrecy,
as they are generally used by governments, militaries, hospitals, banks or even
just the common citizen to prevent unauthorized access to their accounts and
information.
With developments in biometrics, single sign-ons and multi-factor
authentication, passwords as the general security tool may soon be facing
competitions after millennia, however, due to their cost, immediacy and
convenience, passwords can still be expected to remain the best option for
decades.
Audio: https://voca.ro/1phQYDzwVeOf
Phrases:
1) Researchers have expanded upon a clever trick and increased the speed of
electron microscope imaging by a factor of 20.
Дослідники розвинули хитрий трюк та підвищили швидкість зображення мікроскопу
електронів у 20 разів.
2) Aside from these risks, we also need to bear in mind that batteries are
highly resource consuming.
Окрім цих ризиків, ми також повинні мати на увазі, що акумулятори споживають
велику кількість ресурсів.
3) Surveillance laws were scrutinised and examined in detail.
Закони про спостереження були ретельно перевірени та розглянуті.
Audio: https://voca.ro/1e4dI4A5pGv6
· #304
Timophey Sipin RZ-212(Popovych) (Thursday, 09 June 2022 11:21)
Exam Topic:
Potential security violations
Audio:https://voca.ro/35GTddthr
Unfortunately, there is no perfect security system in the world.There is always
the possibility of violation and loss of data due to human factors.
But we always have the opportunity to reduce the risk of such security breaches.
Potential threats can be classified primarily on various grounds, it may be a
violation of the integrity, confidentiality and accessibility of information and
many others.
All this is evidence that we need to raise the level of security and improve the
knowledge of ordinary people in the field of cybersecurity
Because it will reduce the chance of losing very important information for a
person or company
· #303
Volodymir Kolomiets rz-212 (Lebedeva) (Thursday, 09 June 2022 10:59)
Exam topic #9 ("Functions of firewalls”)
Functions of firewalls are simple. Traffic flows to and from devices through
ports. The firewall is what controls what is allowed through these ports.
On most computers, especially regular laptops or desktops, or home networks, the
firewall should allow very little incoming traffic. There is rarely a legitimate
reason for other devices to connect to your device or home network
unnecessarily. The router that provides the Internet connection from your ISP to
your home or office is usually a hardware firewall. And on your computer,
wherever it is Windows macOS, it is most likely running a software firewall.
https://voca.ro/1gO42r1F5t9O
1) bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
2) expanded upon
The workshop topics are expanded upon in the discussion guide, which is to
supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні
анотації.
3) examined in detail
We believe that all issues within the Working Group's mandate should be examined
in detail.
Ми вважаємо, що всі питання, які входять до повноважень Робочої групи, мають
бути детально розглянуті.
https://voca.ro/1lTuv7XA2yJS
· #302
Kate Kholodova (RZ-212, Popovych) (Thursday, 09 June 2022 10:53)
(9/10) Exam topic #9 Functions of firewalls
Personal firewall is software that monitors the network activity of the computer
on which it is installed, as well as filtering traffic in accordance with the
specified rules. The functionality of a personal firewall is similar to that of
a firewall, however, due to its specificity, a personal firewall can also
provide additional capabilities to protect a computer:
Control over applications using ports. A personal firewall, unlike conventional
firewalls, is able to determine not only the protocol and network addresses
used, but the software that establishes or accepts the network connection.
Assigning separate rules to different users without additional network
authorization.
A special "Learning Mode" required to fine-tune the personal firewall for a
specific software configuration of the computer. In this mode, during the
initial network activity of any software, the user receives a request to allow
or prohibit the network activity of this application.
audio - https://voca.ro/1oCgSiAEjhGs
Today I have read the article "Smart urban solutions for more resilient cities".
It tells about a new project SMURBS, begun as part of the EU's ERA-PLANET
umbrella project, is working to increase urban resilience and raise the quality
of life in urban regions. To achieve this goal, it's focusing on challenges
related to air quality, urban growth, natural and man-made disasters, health and
migration. The project's first step is to stimulate strategic planning by
connecting with local authorities, urban planners and city-level stakeholders to
map out 'what is already out there' and 'what the users want'.
In my opinion, SMURBS will help cities with many problems related to sustainable
urban development.
article -
https://phys.org/news/2018-08-smart-urban-solutions-resilient-cities.html
audio - https://voca.ro/1bKJ15HnRaAx
1) bear in mind
These are important considerations which we should always bear in mind.
2) examined in detail
We believe that all issues within the Working Group's mandate should be examined
in detail.
3) expanded upon
The workshop topics are expanded upon in the discussion guide, which is to
supplement the present annotations.
audio ph - https://voca.ro/1fL5c0ExrCcL
· #301
Yershova Y. to PT-212, PE-211 (Thursday, 09 June 2022 10:43)
Good morning! It is high time to write the tests. Read the instruction carefully!
· #300
Lebedeva E. (Thursday, 09 June 2022 10:28)
To РЗ-212 Good morning! The lesson will start soon, so I am waiting for your works.
· #299
Avdieiev Danil (RT-211) S.Mykhailiuk (Thursday, 09 June 2022 10:28)
Article: https://www.zdnet.com/article/toshiba-to-pay-2b-settlement-on-laptops/
Today I have the article titled "Toshiba to pay $2B settlement on laptops". It
describes about Toshiba Corp. agreed to a $2.1 billion settlement for selling
allegedly defective laptop computers in the U.S., the first fallout from a wave
of lawsuits and government inquiries over a flaw that may be common to the
products of many major computer makers. I find this article intesting and
usfull, because this article describes us about Toshiba`s mistaces and how this
corp corrects it`s mistakes.
https://voca.ro/1ep7Jvr4kBvG
1)expanded upon
The workshop topics are expanded upon in the discussion guide, which is to
supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні
анотації.
https://voca.ro/1TB5LajXgMYD
2)examined in detail
We believe that all issues within the Working Group's mandate should be examined
in detail.
Ми вважаємо, що всі питання, які входять до повноважень Робочої групи, мають
бути детально розглянуті.
https://voca.ro/17RJig5TRfLy
3)bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
https://voca.ro/1il7WobeHu2f
· #298
Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:23)
Exam topic #9 (Turning the DTV signal)
The digital television transition, also called the digital switchover (DSO), the
analogue switch/sign-off (ASO), the digital migration, or the analogue shutdown,
is the process in which older analogue television broadcasting technology is
converted to and replaced by digital television. Conducted by individual nations
on different schedules, this primarily involves the conversion of analogue
terrestrial television broadcasting infrastructure to digital terrestrial (DTT),
a major benefit being extra frequencies on the radio spectrum and lower
broadcasting costs, as well as improved viewing qualities for consumers.
https://voca.ro/1g6bD4wFVtRC
· #297
Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:23)
Exam topic #8 (The major differences in a monochrome television and a color
television receiver)
The biggest difference is the number of electron guns in the picture tube. A
monochrome tv has only one gun as it can only show black, white, or shades of
grey in between. Color TVs have 3 guns: red, green, and blue. Varying these
tubes give you the full spectrum of color. Beyond that there are differences in
the reciever, which has to decode the data for 3 guns instead of one, and in the
drivers for the guns.
https://voca.ro/11wCNTotU9Vp
· #296
Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:22)
Exam topic #7 (Development of television in your home country)
In Ukraine, the first official acquaintance of the two "great" took place in
1939. According to the historical chronicle, the opening of television
broadcasting in Kyiv took place on February 1, 1939. True, some researchers tend
to believe that the first test TV broadcasts in Kyiv took place much earlier.
However, there is no official confirmation of this: perhaps there was something,
but it was done (like everything else in those days) in the strictest secrecy.
In addition, in the mid-30s, TV experiments were carried out in Odessa.
Television in the Ukrainian SSR was introduced in 1951. Now Ukrainian TV has 101
channels, including 65 regional TV companies.
https://voca.ro/1e2eLg0emU2Z
· #295
Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:20)
Exam topic #6 (The new advancement of color Television)
Color television is a television transmission technology that includes color
information for the picture, so the video image can be displayed in color on the
television set. It improves on the monochrome or black-and-white television
technology, which displays the image in shades of gray (grayscale). Television
broadcasting stations and networks in most parts of the world upgraded from
black-and-white to color transmission between the 1960s and the 1980s. The
invention of color television standards was an important part of the history and
technology of television.
https://voca.ro/1aVt8xkf7hKc
· #294
Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:20)
Exam topic #5 ( First radio speeches )
Experimental radio transmissions at the beginning of the century were carried
out by American inventors Reginald Fessenden and Lee de Forest. For the first
time, an experimental broadcast of a public speaking radio broadcast by P.A.
Fessenden carried out in 1900. Then, after his invention of the high-frequency
oscillator, he decided to try out the new technique in his workshop in Brand
Rock, Massachusetts, on Christmas Eve 1906, sending a human voice and music
instead of Morse code. Three days before the experiment, he sent
radiotelegraphic messages to the nearest ships with a request to receive his
message at a certain time. At the appointed hour, the operators in headphones
heard the voice of a man, a violin solo performed by the inventor, reading
passages from the Bible and congratulations on Christmas.
https://voca.ro/1hTM9lt8yjH5
· #293
Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:19)
Exam topic #4 (Commercial use of radio)
Commercial radio provides brands with a way to speak to millions of people via a
medium they trust.
Radio provides reach, with nearly 37m listeners every week; resonance, as an
emotional influencer with power to enhance brand perceptions at a subconscious
level .
Radio advertising also stretches beyond the traditional 30 second ad, with
longer ads, sponsorship, branded content and innovate digital solutions
increasingly providing advertisers with new and more creative ways to get their
message to potential customers.
https://voca.ro/16pcyY3Yf854
· #292
Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 09 June 2022 10:17)
Exam topic #3 (Early radio development)
Radio is the technology of signaling and communicating using radio waves.
Radio waves were first identified and studied by German physicist Heinrich
Hertz in 1886. The first practical radio transmitters and receivers were
developed around 1895–1896 by Italian Guglielmo Marconi, and radio began to be
used commercially around 1900. To prevent interference between users, the
emission of radio waves is regulated by law, coordinated by an international
body called the International Telecommunication Union (ITU), which allocates
frequency bands in the radio spectrum for different uses.
https://voca.ro/1bJwJxtv1KAt
· #291
Nazariy Glugan RT-211 (Myhayliuk S.L.) (Thursday, 09 June 2022 10:16)
Exam topic #2 (Benefits of Satellite TV)
Let's start with what is satellite TV
Satellite television is a system for transmitting a television signal from a
transmitting center to a consumer, using as a repeater artificial Earth
satellites located in space in a geostationary orbit (formerly in other types of
orbits) and equipped with transceiver equipment.One of the main advantages of
satellite TV is the image and sound quality. Many channels are already
broadcasting in high definition (HD) format and using stereo sound, which will
allow you to fully enjoy your favorite movie or sports broadcast.
https://voca.ro/1aESUUgwtoaZ
· #290
Nazariy Glugan RT-211 (Myhayliuk S.L.) (Thursday, 09 June 2022 10:15)
Exam topic #1 (Cable television)
Cable television is a method of hanging in which signals are transmitted over a
wired route using a coaxial or optical cable. It allows you to transmit multiple
multimedia data (signals) of various types, such as TV channels (audio and
video), radio channels (audio), broadband Internet access or stationary
telephony services, over one cable at once. In the simplest solution, such a
system comes down to installing an antenna post, from which, after gaining
power, several dozen TV channels are delivered to subscribers via cable.
https://voca.ro/1h4jkbgjQnQs
· #289
Lebedeva E. (Thursday, 09 June 2022 10:04)
To Ilinchuck Vladislav RZ-211 Not bad, put practise reading more.
· #288
Sasha Movsum-Zade RT-211 (Myhayliuk S.L.) (Thursday, 09 June 2022 10:00)
Today I have read the article titled "Researchers teleport quantum information
across rudimentary quantum network". This article describes how the Researchers
from Delft managed to teleport quantum information over an elementary network.
This is the first major step of its kind towards the future quantum internet. It
is also described that this breakthrough was made possible by greatly improved
quantum memory and improved quality of quantum links between the three nodes of
the network. In my opinion, this technology is still underdeveloped and requires
a lot of improvements before it can be used on a permanent basis.
https://voca.ro/1jbqTlLof43S
https://techxplore.com/news/2022-05-teleport-quantum-rudimentary-network.html
1)expanded upon
The workshop topics are expanded upon in the discussion guide, which is to
supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні
анотації.
2)examined in detail
We believe that all issues within the Working Group's mandate should be examined
in detail.
Ми вважаємо, що всі питання, які входять до повноважень Робочої групи, мають
бути детально розглянуті.
3)bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
https://voca.ro/1lzhR6YZlLGT
· #287
Yershova Y. (Thursday, 09 June 2022 09:58)
Botsaniuk Ivan RZ-211 (Yershova Y. A) (Thursday, 09 June 2022 09:52)
The article review is very informative and thorough, but too long.
· #286
Yershova Y. (Thursday, 09 June 2022 09:56)
Vlasov Vadim RZ-211 (Yershova) (Thursday, 09 June 2022 09:37)
The review is not bad, but the topic isn't relevant to your specialty.
· #285
Yershova Y. (Thursday, 09 June 2022 09:53)
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 09 June 2022 09:32)
The comment on the article is interesting and thoughtful, but long.
· #284
Artem Verhelis RT-211, Mykhailiuk S. (Thursday, 09 June 2022 09:53)
Exam topic #10
Radio equipment helping to save on bills.
Nowdays, one of the solutions to honest savings on bills can be a motion
sensors. They are often installed in corridors, vestibules or showers, are
relatively cheap, and for each type of room you can choose the optimal
sensitivity radius. It's not only consumes less electricity than lamp bulb, but
also lasts more time longer and the price difference is minor. For 3-5 years,
you won’t have to climb into the ceiling or chandelier to change a burned-out
light bulb. They are also not afraid of voltage drops, unlike lamp bulb, and
don't contain dangerous substances.
Audio: https://voca.ro/16PpdnC0HfQX
· #283
Botsaniuk Ivan RZ-211 (Yershova Y. A) (Thursday, 09 June 2022 09:52)
Today I have read the article “A chip that can classify nearly 2 billion images
per second”. In traditional neural networks used for image recognition, the
image of the target object is first formed on an image sensor, then the image
sensor converts light into electrical signals, and ultimately into the binary
data, which can then be processed, analyzed, stored and classified using
computer chips. While current, consumer-grade image classification technology on
a digital chip can perform billions of computations per second, making it fast
enough. The current speed limit of these technologies is set by the clock-based
schedule of computation steps in a computer processor. To address this
limitation, engineers have created the first scalable chip that classifies and
recognizes images almost instantaneously. They have achieved this through direct
processing of light received from the object of interest using an optical deep
neural network implemented on a 9.3 square millimeter chip. I think this
technology would be very useful because it will allow us to perform more complex
operations with less energy cost.
https://techxplore.com/news/2022-06-chip-billion-images.html
https://voca.ro/12sXIeqBJkAg
Phrases:
Examined in detail
The question of individual responsibility and non-State actors should also be
examined in detail.
bear in mind.
Tourists must bear in mind that they are visitors in another country.
expanded upon
The features in this version will be expanded upon in future releases of the
application.
https://voca.ro/17jvSatCfNvL
· #282
Artem Verhelis RT-211, Mykhailiuk S. (Thursday, 09 June 2022 09:49)
Today I've read the article "Scientists discover how oxygen loss saps a
lithium-ion battery's voltage". When the battery is charging, in addition to
lithium ions, air atoms also enter, which ultimately leads to a decrease in the
battery's capacity. Scientists have proposed new ways to create electrodes to
prevent this. Lithium-ion batteries work like a rocking chair, moving lithium
ions back and forth between two electrodes that temporarily store charge. Based
on this knowledge, scientists will make a start in solving this problem. I found
this article quite informative because in our time people very often interact
with a similar technique.
Article:
https://techxplore.com/news/2021-06-scientists-oxygen-loss-saps-lithium-ion.html
Audio: https://voca.ro/18ZZU1u9ArO2
1) expanded upon
Zhou and Huang thus expanded upon this type of model, adding new elements that
allowed them to explore the interaction between a toxicant and a population in a
polluted river.
Таким чином, Чжоу і Хуан розширили модель цього типу, додавши нові елементи, які
дозволили їм дослідити взаємодію між токсикантом і популяцією у забрудненій
річці.
2) bear in mind
It is important to also bear in mind that the cost of the best systems can be
significantly reduced if substantial investment is made to the technology.
Важливо також мати на увазі, що вартість найкращих систем може бути значно
знижена, якщо значні інвестиції будуть вкладені в технологію.
3) examined in detail
The target audience of workers was also examined and analyzed in detail.
Також було детально розглянуто та проаналізовано цільову аудиторію працівників.
Audio: https://voca.ro/1oRIHY8QI8RT
· #281
Ilinchuck Vladislav RZ-211 (Lebedeva) (Thursday, 09 June 2022 09:49)
Today I have read the article "Jupiter turns out to be inhomogeneous;
metallicity gives clues about origin".This article is about an international
team of astronomers, led by Yamila Miguel (SRON/Leiden Observatory), that has
found that Jupiter's gaseous envelope doesn't have a homogeneous distribution.
The inner part has more metals than the outer parts, adding up to a total of
between 11 and 30 earth masses, meaning 3–9% of Jupiter's total mass. The team
studied the distribution of metals because it gives them information about how
Jupiter was formed. The metals turn out to be not distributed homogeneously
across the envelope, with more in the inner part than in the outer parts. The
total adds up to between 11 and 30 Earth masses worth of metals.The finding that
the inner part of the envelope has more heavy elements than the outer part,
means that the abundance decreases outward with a gradient, instead of there
being a homogeneous mixing across the envelope.
In my opinion , this article is very interesting for everyone , especially for
people who love deep space and new technologies . I think this technology will
become very useful soon .
1)https://phys.org/news/2022-05-jupiter-inhomogeneous-metallicity-clues.html
2)https://voca.ro/14XBk1qDq9Yj
bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
examined in detail
The question of individual responsibility and non-State actors should also be
examined in detail.
Слід також детально розглянути питання індивідуальної відповідальності та
недержавних суб'єктів.
expanded upon
That point will be expanded upon in the following section.
Цей момент буде розширено в наступному розділі.
3)https://voca.ro/153Uo2fPoOzb
· #280
Yeulizaveta Barsukova (RT-211) S.Mykhailiuk (Thursday, 09 June 2022)
Exam Topic #10 (Radio equipment helping to save on bills)
There are many ways to save on bills. However, they can all be combined into
one. To do this, we need to use a smart home system. It can control the
switching on or off of lighting or electrical equipment. It can also control the
irrigation system, turn on or off the water at a specified time. In addition, it
can control the microclimate in the house. As a result, electricity and water
bills will be reduced because we will not forget to turn off the lights in the
room and turn off the irrigation system.
Audio:https://voca.ro/1m8j7b54GbkF
· #279
Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 09 June 2022 09:46)
(CLASS WORK)
Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This
article is about a US government that offers 10 million dollars for finding a
leader of the high-profile ransomware gang DarkSide. Washington blamed the
Russia-based group for the online assault that forced the shutdown of the
largest oil pipeline in the eastern United States in May. Cybercrimes have been
booming, with new data out in October showing $590 (five hundred nineteen)
million in ransomware-related payments were reported to US authorities in the
first half of 2021 alone. As for me, the fight against hackers is a very
difficult confrontation.
Sentences:
WHEN COMPARED
1)This figure is even less significant WHEN COMPARED to the assets such
enterprises control.
Ця цифра ще менш значна, якщо порівнювати з активами, які контролюються такими
підприємствами.
MULTIPLE LEVELS.
2)And the beauty of the book is that it works on MULTIPLE LEVELS.
І принадність книги в тому, що вона працює на кількох рівнях.
CASE STUDIES
3)The training will be based on CASE STUDIES, simulations and group
problem-solving exercises.
Навчання базуватиметься на тематичних дослідженнях, моделюванні та групових
вправах на вирішення проблем.
Vocaroo(sentence): https://voca.ro/1bPATAlHnboW
Vocaroo(aritcle): https://voca.ro/1k3bM50kGonB
https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
https://techcrunch.com/2021/11/05/state-department-darkside-bounty/
· #278
Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 09 June 2022 09:46)
Exam topic #9 “The new advancement of color Television.”
In 1938, Werner Flechsig patented the principle of the color kinescope, and the
color image transmission method was developed in 1940. In European cinemas,
color films appeared in 1941, the first of which were Women Are Still the Best
Diplomats and Hans Alber's film Munchausen. In 1953, the NTSC standard for
black-and-white television broadcasting was expanded in the United States - it
received the ability to transmit color, namely, "color" was added to
"brightness". On August 30, 1953, for the first time in history, NBC broadcast a
color broadcast of "Kukla, Fran and Ollie" in test mode via the NTSC standard.
The first full-fledged color broadcast was the opera Carmen, shown on October
31, 1953.
Vocaroo: https://voca.ro/1kNQhjXPbo1n
· #277
Lebedeva E. (Thursday, 09 June 2022 09:42)
To Ivan Zarytskyi RZ-211, Kapeliushnyi Vladyslav Thank you for the effective work.
· #276
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Thursday, 09 June 2022 09:41)
The article I have read "Hackers leaked data about the COVID-19 vaccine they
stole during a cyber attack." This article is about a cyber attack by unknown
hackers against the European Medicines Agency (EMA) for information on
coronavirus drugs. But as a result, no leak violates the office's privacy
policy. This is not the first attack on some of the pharmaceutical companies
that the EMA includes, and over time they have become more and more. In my
opinion, this article is interesting because today we need to know how to create
vaccines against diseases for which treatment has not yet been invented.
https://techxplore.com/news/2020-12-autonomous.html
https://voca.ro/1jEdXrRF7Nn5
1) The target audience of workers was also examined and analyzed in detail.
Також було детально розглянуто та проаналізовано цільову аудиторію працівників.
2) Aside from these risks, we also need to bear in mind that batteries are
highly resource consuming.
Окрім цих ризиків, ми також повинні мати на увазі, що батареї дуже споживають
ресурси.
3) This discovery means our understanding of the chemical formation of stars can
be hugely expanded upon.
Це відкриття означає, що наше розуміння хімічного утворення зірок може бути
значно розширено.
https://voca.ro/1e4YW66MRdEY
· #275
Lebedeva E. (Thursday, 09 June 2022 09:40)
To Artem Kotliarov RZ-212 well done, thank you.
· #274
Vlasov Vadim RZ-211 (Yershova) (Thursday, 09 June 2022 09:37)
Today I have read the article "The Turning Points of Climate Change."
The article is based on many years of collaboration between various research
institutions in the Netherlands and abroad, especially between Utrecht
University and Leiden University. Researchers have approached the idea of a
tipping point in a spatial context. The formation of spatial structures in
ecosystems, such as the spontaneous formation of complex vegetation structures,
is often explained as an early warning signal of a critical transition.
In my opinion, we need to avoid climate change as long as possible, which can
pose a long-term threat to humanity.
https://phys.org/news/2021-10-climate-simple-concept.html
https://voca.ro/15UwE8NB9xrh
examined in detail.
The problem -- first examined in detail by a former International Business
Machines Corp
bear in mind
It is important to also bear in mind that the cost of BEST systems can be
significantly
expanded upon
The researchers expanded upon the theory by applying it to both men and women
https://voca.ro/18UjGV8BcuXf
· #273
Artem Kotliarov RZ-212 (Lebedeva E.) (Thursday, 09 June 2022 09:36)
1) 1. The Vienna Declaration and Programme of Action examined in detail the
linkages between democracy, development and human rights. - У Віденській
декларації та Програмі дій детально розглянуто зв’язок між демократією,
розвитком та правами людини.
2. Using a quantum field theory framework, the physicists have expanded upon
previous research that showed that changes in acceleration affect entanglement.
- Використовуючи систему квантової теорії поля, фізики розширили попередні
дослідження, які показали, що зміни прискорення впливають на заплутування.
3. Regulators need to bear in mind that room for experimentation, as well as the
failures of some ventures, are all right. - Регулятори повинні мати на увазі, що
простір для експериментів, а також невдачі деяких підприємств — це все в
порядку.
https://voca.ro/1otfyExHfrww
2) Today, І have read thе аrtісlе «Charge-density-wave induces electronic
nematicity in Kagome superconductor»
Research team led by Prof. Chen Xianhui, Wu Tao and Wang Zhenyu from the
University of Science and Technology of China of the Chinese Academy of Sciences
found the key evidence for phase transition in a Kagome superconductor. At a low
temperature, the team observed a transition from charge-density-wave (CDW) order
to electronic nematicity.
In my opinion, the discovery of this phase transition demonstrated a new
electronic weakness and provided fundamental experimental evidence for further
understanding of the competition between superconductivity and the order of VZP
in Кagome systems.
https://phys.org/news/2022-02-charge-density-wave-electronic-nematicity-kagome-superconductor.html
https://voca.ro/1cSvcptPbdb0
3) Exam topic #20 ("Principles of information protection”)
Three basic principles of information protection that must be followed in an
information system:
1. confidentiality - a mandatory requirement for a person who has obtained
access to certain information not to transfer such information to third parties
without the consent of its owner, as well as ensuring that it is impossible to
access information to persons who do not have the appropriate permission (in
computer language - the corresponding access rights). 2. integrity-the absence
of any unauthorized changes (both accidental and intentional) in the protected
area. 3.reliability - a guarantee that information is obtained from a well-known
trusted or reliable source.
https://voca.ro/1gFLfLewgekK
· #272
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 09 June 2022 09:32)
1. Today I have read the article 'A strategy to attain amorphous silicon solar
cells with over 25% efficiency'.
Researchers at the Chinese Academy of Sciences (CAS), Zhongwei New Energy, and
King Abdullah University of Science and Technology (KAUST) have recently
introduced a new strategy that could significantly improve the efficiency of
Si:H thin films doped using boron. Liu and his colleagues assessed the
performance of their solar cells at a standard temperature of 25°C, using a
solar light simulator. Overall, the solar cells they doped using their method
exhibited a remarkable certified total-area power conversion efficiency of
25.18% with an FF of 85.42% on a 244.63 cm2 wafer.
A very interesting decision, in my opinion, as this strategy will enhance the
light harvesting properties of both existing and newly developed solar
technologies.
2.
https://techxplore.com/news/2022-06-strategy-amorphous-silicon-solar-cells.html
3. https://voca.ro/16Hh5O10uHBb
4. 1) examined in detail
The Chronicle examined in detail 27 cases in Houston and Harris County involving
violent or repeat offenders on dual supervision
2) bear in mind
Bear in mind that petrol stations are scarce in the more remote areas
3) expanded upon
The best scenarios are where memories are recalled and expanded upon, using the
senses to paint a picture.
5. https://voca.ro/1ooA1N02EXux
· #271
Yershova Y. (Thursday, 09 June 2022 09:32)
Vasilev A.O RZ-211 Yershova Y. (Thursday, 09 June 2022 09:22)
Your review ia informative and quite alright, but mind in the first sentence:
Today I've read THE article titled "Traveling fires pose an underestimated risk
to open building spaces"/ this article IS about traveling fires...
· #270
Ivan Zarytskyi RZ-211 (Lebedeva) (Thursday, 09 June 2022 09:27)
Today I have read the article “Radio waves for the detection of hardware
tampering”. This article is about a new method of detecting cyberattacks.
Researchers in Bochum have developed a new method to detect such manipulations.
They monitor the systems with radio waves that react to the slightest changes in
the ambient conditions. Unlike conventional methods, they can thus protect
entire systems, not just individual components—and they can do it at a lower
cost. In my opinion, this method can decrease cyberattacks in all structures.
https://techxplore.com/news/2022-06-radio-hardware-tampering.html
https://voca.ro/1iZz9Pu0S7sR
examined in detail
The problem -- first examined in detail by a former International Business
Machines Corp.(Проблема -- вперше детально розглянута колишньою International
Business Machines Corp.)
expanded upon
Zhou and Huang thus expanded upon this type of model, adding new elements that
allowed them to explore the interaction between a toxicant and a population in a
polluted river.(Таким чином, Чжоу і Хуан розширили цей тип моделі, додавши нові
елементи, які дозволили їм дослідити взаємодію між токсикантом і населенням у
забрудненій річці.)
bear in mind
It is important to also bear in mind that the cost of BEST systems can be
significantly reduced if substantial investment is made to the
technology.(Важливо також мати на увазі, що вартість систем BEST може бути
значно знижена, якщо значні інвестиції будуть вкладені в технологію.)
https://voca.ro/1nVcN9gsSC26
· #269
Vasilev A.O RZ-211 Yershova Y. (Thursday, 09 June 2022 09:22)
Today I've read an article titled, this article about"Traveling fires pose an
underestimated risk to open building spaces"
The article tells about traveling fires which are distributed which big speed.
But researchers are currently trying to correct these mistakes.
Dr. Egle Rackauskaite, who led the work while at Imperial's Department of
Mechanical Engineering, said: "Despite the lack of advanced studies, traveling
fires have been observed in real incidents—for example, in the World Trade
Centre towers after the 11 September 2001 attacks. However, these fires have
rarely been studied on an experimental basis. At the same time, some modern
structures have open-plan spaces between 4 and 50 times larger than the largest
compartment fire experiments conducted to date."
I think it's right that researchers are trying to protect society from the
threat of traveling fires.
https://techxplore.com/news/2021-10-pose-underestimated-spaces.html
https://voca.ro/1991MdQmDC9h
1)bear in mind
It was important to bear in mind the new political realities and to leave behind
outdated stereotypes.
https://voca.ro/1jhM824cxpBj
2)examined in detail
The question of individual responsibility and non-State actors should also be
examined in detail.
https://voca.ro/1F3YikOLM6us
3)expanded upon
In that context, he asked Professor to expanded upon his comment about the
misuse of regulations.
https://voca.ro/14JOUDOAp6H5
· #268
Lebedeva E. (Thursday, 09 June 2022 09:22)
To Mykola Zhmurak RZ-211 and Misha Donenko RZ-211 Your comments are clear and informative. In general, well done, but there are some mispronounced words.
· #267
Misha Donenko RZ-211 Lebedeva (Thursday, 09 June 2022 09:19)
Today I’ve read the article “Microsoft launches community college campaign to
address cybersecurity workforce shortage”. Microsoft launched a training program
for community college students on Thursday in an effort to fill 250,000
cybersecurity jobs by 2025. The company will make its cybersecurity curriculum
available for free to all public community colleges across the country and offer
25,000 scholarships. With 464,000 cybersecurity jobs open nationally,
Microsoft's goal is to help fill half those positions with this campaign. It
adds to a growing list of investments the company has made to combat
cybersecurity threats. The initiative comes just days after Microsoft flagged
that Russian-backed hackers have been targeting government and corporate
computer networks since the summer.
Microsoft launches community college campaign to address cybersecurity workforce
shortage (techxplore.com)
https://voca.ro/12RSSCm6X7Nr
1.bear in mind
Now, let's all bear in mind these are poetic abstracts from long-lost ancient
texts.
Тепер давайте всі пам’ятаємо, що це поетичні витяги із давно втрачених
стародавніх текстів.
2.examined in detail
The question of individual responsibility and non-State actors should also
be examined in detail.
Слід також детально розглянути питання індивідуальної відповідальності та
недержавних суб'єктів.
3.expanded upon
European human rights institutions have recognized and expanded upon these
principles.
Європейські інституції з прав людини визнали і розширили ці принципи.
https://voca.ro/17htsTc4ykDD
· #266
Mykola Zhmurak RZ-211(Lebedeva) (Thursday, 09 June 2022 09:17)
Today I’ve read the article "Turning organic waste into renewable biofuel
additives using radiation". This article is about engineers from Lancaster
University which have led research that discovers a way to generate renewable
biofuel additives, using radiation that could be derived from nuclear waste.
This research presents a new advance that utilizes radiation that could, in the
future, be derived from nuclear waste to produce renewable biofuel additives
from biodiesel waste. An increase of 5 per cent to 20 per cent v/v in the
renewable proportion of commercial petroleum blends is forecast by 2030. This
research is really important for world. Because this discovery of a new
production pathway for these additives could help in the fight to cut carbon
dioxide emissions and tackle climate change.
Article:https://techxplore.com/news/2021-09-renewable-biofuel-additives.html
Vocaroo: https://voca.ro/1eqpOMFxMGmA
Phrases:
1) bear in mind
It is important to also bear in mind that the cost of BEST systems can be
significantly reduced if substantial investment is made to the
technology.(Важливо також мати на увазі, що вартість систем BEST може бути
значно знижена, якщо значні інвестиції в технологію.)
2) examined in detail
Surveillance laws were scrutinised and examined in detail.(Закони про нагляд
було вивчено та детально досліджено.)
3) expanded upon
Zhou and Huang thus expanded upon this type of model, adding new elements.(Таким
чином, Чжоу і Хуан розширили цей тип моделі, додавши нові елементи.)
Vocaroo - https://voca.ro/1onMjUHCqVxP
· #265
Yeulizaveta Barsukova (RT-211) S.Mykhailiuk (Thursday, 09 June 2022 09:16)
Class-work
Today I've read the article 'Demonstrating significant energy savings using
neuromorphic hardware'. A chip based on neuromorphic equipment has recently been
developed. Such equipment was developed on the basis of the human brain. The
developers want it to be able to process information as well as our brains, then
they are developing algorithms that work with temporal processes. The study
found that a chip based on this requires 4 to 16 times less energy to process
information than chips based on other bases. I think that the development of
such equipment is important because it will save expensive energy.
Article:https://techxplore.com/news/2022-05-significant-energy-neuromorphic-hardware.html
Audio1:https://voca.ro/139A76j8ica3
Phrases
1)examined in detail
We believe that all issues within the Working Group's mandate should be examined
in detail.
Ми вважаємо, що всі питання, які входять до повноважень Робочої групи, мають
бути детально розглянуті.
2) expanded upon
The workshop topics are expanded upon in the discussion guide, which is to
supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні
анотації.
3) bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
Audio2:https://voca.ro/11P2E3KBti5O
· #264
Lebedeva E. (Thursday, 09 June 2022 09:14)
To Denis Zavadsky RZ-211 There is something wrong with your audio. I can'y here anything. Send it again.
· #263
Yershova Y. to PЗ-211 (Thursday, 09 June 2022 09:14)
Good morning! The lesson has started, it’s high time to join today’s on-line activities with articles and sentences with the phrases of the Day. Good luck!
· #262
Denis Zavadsky RZ-211 Lebedeva (Thursday, 09 June 2022 09:12)
Some people living in the U.S. Midwest have trouble with their electric cars in
the dead of winter, and why it's risky to use these batteries in space
explorations. Recently, scientists determined that the flat orientation of
graphite in the anode is responsible for the drop in a lithium-ion battery's
energy storage capacity in the cold. So, Xi Wang, Jiannian Yao and colleagues
wanted to modify the surface structure of a carbon-based material to improve the
anode's charge transfer process.
I consider this worthwhile research as it will help in many areas of battery
powered mechanical devices.
https://techxplore.com/news/2022-06-lithium-ion-batteries-longer-extreme-cold.html
That point will be expanded upon in the following section.
The question of individual responsibility and non-State actors should also be
examined in detail.
These are important considerations which we should always bear in mind.
Цей момент буде розширено в наступному розділі.
Слід також детально розглянути питання індивідуальної відповідальності та
недержавних суб'єктів.
Це важливі міркування, які ми завжди повинні мати на увазі
https://voca.ro/1iyZioPyG2r2
· #261
Lebedeva E. (Thursday, 09 June 2022 09:01)
To Daniil Dragin (RZ-211 ) Well done, thank you.
· #260
Daniil Dragin (RZ-211 Lebedeva E) (Thursday, 09 June 2022 08:51)
1)Today I have read the article ''Lithium-ion batteries that last longer in
extreme cold''.This article is about such a common problem for everyone that at
sub-zero temperatures, our lithium-ion batteries consume energy very quickly, or
even stop working altogether. To solve this problem, scientists from ACS Central
Science replaced the traditional graphite anode on a lithium-ion battery with a
rough carbon-based material that can withstand temperatures of -35 C without
problems. Testing was carried out at -35 C, which showed that when it is
discharged almost 100% of the charge stored in the battery.
In my opinion, such technologies will make our lives much easier, because each
of us has faced such a problem and knows how unpleasant it is.
2)https://techxplore.com/news/2022-06-lithium-ion-batteries-longer-extreme-cold.html
3)https://voca.ro/1iqCL5ED8CNM
4)
1)examined in detail
Moreover, prima facie duplication and overlap has to be examined in detail.
Крім того, слід детально вивчити дублювання та накладення на перший погляд.
2)expanded upon
The issue would be expanded upon in Namibia's next report.
Це питання буде розширено в наступній доповіді Намібії.
3)bear in mind
But bear in mind, your primary responsibility is to your respective clients.
Але майте на увазі, що ваша основна відповідальність лежить перед відповідними
клієнтами.
5)https://voca.ro/1gwkUIE1utyA
· #259
Lebedeva E. (Thursday, 09 June 2022 08:49)
To Good morning! The lesson has started and I am waiting for your comments on the article and phrases of the day.
· #258
Anton Ardelyan RZ-211(Gvozd O.V.) (Thursday, 09 June 2022 08:39)
Today i have read the article "Construction begins on energy storage system
relying on gravity" British startup Gravitricity began construction of a
renewable energy storage system that will rely on gravity—it will manipulate
massive weights in a shaft as a means of storing energy, which will be drop via
gravity when energy is needed, turning a shaft that drives an electric
generator. The shafts are to be nearly a mile high and the weights will range
from 500 to 5,000 tons.
Link: https://techxplore.com/news/2020-09-energy-storage-gravity.html
Audio: https://voca.ro/1nHcEvyeFD8S
Phrases:
1)This tournament replaced and expanded upon the quadrennial World Team
Olympiad, which began in 1960.
Цей турнір замінив і розширив чотирирічну Всесвітню командну олімпіаду, яка
розпочалася в 1960 році.
2)Just something to bear in mind
Просто щось треба мати на увазі
3)He failed to mention that the charges have been examined in detail and shown
to be false
Він не зазначив, що звинувачення були детально розглянуті та доведено, що вони
неправдиві
Audio: https://voca.ro/1bdE2rZlcNQr
· #257
Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 09 June 2022 08:10)
Exam Topic:
Function of Firewall
Audio:https://voca.ro/1bKZBndbRTmh
Nowadays, there are many opportunities to hack data and pick up different types
of viruses. But the most numerous and effective, through network and Internet
traffic.
To reduce the risk of catching the virus, there are special programs such as
firewall which help prevent viruses from entering your computer. It can be as a
separate device or software.
Simply put, it helps to filter all Internet traffic using certain rules and pass
to different areas of the network
But depending on the type of task, they can be divided into stateless, which
uses only static filtering rules, and stateful, which can better analyze and
better combat a variety of DDoS attacks.
· #256
Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 09 June 2022 08:10)
Exam Topic:
Potential security violations
Audio:https://voca.ro/1381voXSz9cI
Unfortunately, there is no perfect security system in the world.There is always
the possibility of violation and loss of data due to human factors.
But we always have the opportunity to reduce the risk of such security breaches.
Potential threats can be classified primarily on various grounds, it may be a
violation of the integrity, confidentiality and accessibility of information and
many others.
All this is evidence that we need to raise the level of security and improve the
knowledge of ordinary people in the field of cybersecurity
Because it will reduce the chance of losing very important information for a
person or company
· #255
Yakymova Anna / РЗ-213 (Vorobyova E. V.) (Wednesday, 08 June 2022 10:24)
Today I've read the article "Employer surveillance during COVID has damaged
trust".The author of the article explains a new report by the University of St
Andrews about how using staff surveillance by employers during the COVID-19
pandemic can endanger trust in the workplace. Research considers such methods of
control as: photographs, recording keystrokes, and movement trackers. But
researchers also warn employers not to sacrifice ethics for the sake of
efficiency as it can backfire leading to mental health
issues, productivity decline, and staff resignations. And I absolutely agree
with that.
https://voca.ro/1mej0OoRvSNp
https://phys.org/news/2021-11-employer-surveillance-covid.html
· #254
Anna Yakymova/ РЗ-213(S.Mykhailiuk) (Wednesday, 08 June 2022 10:10)
https://phys.org/news/2019-04-conservationists-clash-ways-core-aims.html
Today I've read the article "Conservationists clash over ways forward despite
sharing 'core aims', study finds".That article about research in which considers
the views held by those working to protect the natural world. Every one of those
agrees with reasons and purposes (maintaining ecosystems, securing public
support, and reducing environmental impact), but they can't get a consensus
about ways to achieve that purposes. For example, researchers can't come to a
common decision on that topics :
protected areas are required or not?
invasive species offer value to conservation or not?
is it a pragmatic way an assigning monetary value to nature or it is
reprehensible to put price tag on priceless things?
https://phys.org/news/2019-04-conservationists-clash-ways-core-aims.html
https://voca.ro/13LmEW7k3yDb
· #253
Anna Yakymova/ RZ-213(S.Mykhailiuk) (Wednesday, 08 June 2022 10:05)
Exam topic # 10
Password as a general technique of secrecy.
A password is your personal key to a computer system. Passwords help to ensure
that only authorized individuals access computer systems. Passwords also help to
determine accountability for all transactions and other changes made to system
resources, including data. If you share your password with a colleague or
friend, you may be giving an unauthorized individual access to the system and
may be held responsible for their actions. What if the individual gives your
password to someone else? What if some of your files are deleted or otherwise
rendered unusable? Are you willing to take the blame if an unauthorized
individual uses your access to damage or to make unauthorized changes to data or
systems?
https://voca.ro/1cIjTpYT1Vp7
· #252
Anna Yakymova/ RZ-213(S.Mykhailiuk) (Wednesday, 08 June 2022 09:51)
I have read the article about scientists create a plastic alternative made from
milk and clay. This topic are very interesting. Why do social sciences research
this issue?
I consider throughout the 21st century, people have been struggling with what
they themselves have created. Plastic is a global problem in today's world. The
scientists in this article have created a new kind of rapidly degradable
substance that we can use in the same way as plastic. Already, many scientists
have developed their own rapidly degradable substances.
To sum up, we should be more interested in new alternatives to plastic and
replace it with more progressive things.
https://www.zdnet.com/article/scientists-create-a-plastic-alternative-made-from-milk-and-clay/
https://voca.ro/16zZ0nvIbloe
· #251
Vorobyova E. to РЗ-213 (Wednesday, 08 June 2022 09:05)
To Mitriev, Shpychka, Chernetskiy, Rudko, Yakimova, Chabanenko, Syrbu and
Tsvetkov
Students, I accept your comments and exam topics. They are well done. Thank you.
· #250
Popovych E. (Tuesday, 07 June 2022 13:03)
To Stanislav Kryvosheienko RT-211
Exam topic "Digital devices" is well done
· #249
Biehin Yevhen (RF-211) (Lebedeva E. V.) (Tuesday, 07 June 2022 12:45)
Biehin Yevhen RF-211
31.05.2022
Ex. 2 Reading:
1) An Isolated Virtual Machine
2) A typical computer consists of a processor, a linearly addressed memory
system, and some collection of input/output devices associated with the
processor.
3) Thus a single processor may be able to take the place of several. Such a
scheme is the essence of a multiprogramming system.
4) In this figure, all memory references by the processor are checked by an
extra piece of hardware that is interposed in the path to the memory. The
descriptor register controls exactly which part of memory is accessible. The
descriptor register contains two components: a base value and a bound value.
5) If any running program could load it with any arbitrary value, there would be
no protection. The instruction that loads the descriptor register with a new
descriptor must have some special controls--either on the values it will load or
on who may use it. It is easier to control who may use the descriptor, and a
common scheme is to introduce an additional bit in the processor state. This bit
is called the privileged state bit.
Ex. 1 Speaking:
1) Information science is a discipline that deals with the processes of storing
and transferring information.
2) Computer Science is a study of computers, computation, system control and
development of hardware of software programming
3) Data processing is a conversion of raw data to machine-readable form
4) Multiplexing is a process of transmitting of multiple signals simultaneously
to a single channel
Ex. 2 Speaking:
1)
2) What does the program name supervisor do?
3) What will you do with your model in the future?
Ex. 2 Writing:
The multiplexing of a single computer system among several users
Multiplexing is a way of sending multiple signals or streams of information over
a communication link at the same time in the form of a single, complex signal.
When the signal reaches its destination, a process called demultiplexing,
recovers the separate signals and outputs them to individual lines.
Multiplexing is used in a wide variety of industries to facilitate both analog a
digital communication. Organizations implement multiplexing for two main
reasons:
1) To enable network devices to communicate with each other without needing a
dedicated connection between each device
2) To better utilize scarce or expensive network resources.
· #248
Popovych E. (Tuesday, 07 June 2022 11:20)
To Timophey Sipin RZ-212
Your comment is thoughtful and well done, thank you.
· #247
Stanislav Kryvosheienko RT-211 (Popovych) (Tuesday, 07 June 2022 10:50)
Exam topic "Digital devices"
Information system is made up of five components: hardware, software, data,
people, and process. The physical parts of computing devices – those that you
can actually touch – are referred to as hardware. Computer hardware encompasses
digital devices that you can physically touch. This includes devices such as the
following: desktop computers, laptop computer, mobile phones, tablet computers,
e-readers, storage devices, such as flash drives input devices, such as
keyboards, mice, and scanners, output devices such as printers and speakers. A
digital device processes electronic signals that represent either a one “on” or
a zero “off”. The on state is represented by the presence of an electronic
signal, off state respectively disabled.
Voice - https://voca.ro/1g8ASLM9nMdA
· #246
Timophey Sipin RZ-212(Popovych) (Tuesday, 07 June 2022 10:42)
Today l have read the article titled «I selfie, therefore I am': Instagram 10
years on».In this text, we are told about the changes in Instagram over 10
years, as well as the pros and cons of this app. For example, we are told about
a significant improvement in the service , from the usual photo processing 10
years ago, to an element without which now is difficult to imagine our life.
Instagram (based on information from the text) helped many companies, brands and
ordinary people to make life easier.
In my opinion, we need Instagram today, but as the psychologist correctly noted
in the text, teenagers do not need to strive for the ideal life that they see in
the Internet application.
https://techxplore.com/news/2020-10-selfie-instagram-years.html
https://voca.ro/1fg9FoYZ6wS
1) 1. another way of
We need to find another way of thinking, one based on principles and values that
can sustain a new test of civilization. - Нам потрібно знайти інший спосіб
мислення, заснований на принципах і цінностях, які можуть витримати нове
випробування цивілізації.
2. alternative way
They found an alternative way to control the mass density of the fluid by simply
engineering the thickness of the fluid channel. - Вони знайшли альтернативний
спосіб контролю масової щільності рідини шляхом простого визначення товщини
каналу рідини.
3. able to eliminate
I think we may be able to eliminate that threat for them once and for all. - Я
думаю, що ми зможемо усунути цю загрозу для них раз і назавжди.
https://voca.ro/1n2Kvlmfr
· #245
Popovych E. (Tuesday, 07 June 2022 09:53)
To Sergey Kyznyak RT-211
Your task is complete, informative and interesting. The task Phrases of the day
and your exam topic #9 “The new advancement of color Television'' were performed
correctly.
· #244
Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 07 June 2022 09:18)
1)"The vaccine is not spreading as quickly as any of us expected, and new
international travel restrictions requiring customers to test negative for
Covid-19 have reduced demand."
Said in a letter from CEO Doug Parker and President Robert Isom
American no longer expects to reach full capacity this summer, they said.
The Americans laid off 19,000 workers in October after the expiration of the
previous round of federal support, but brought back the workers.
In a letter to employees, the airline said the airline expects to fly at least
45% less in the first quarter, extending the industry's downturn as travel
recovery expectations are delayed due to the slow rollout of coronavirus
vaccines.
Due to the coronavirus, flights have been reduced so as not to spread the virus
to other countries and the planet itself. In order to avoid this, the management
of the airport issued a decree that at least 45% of flights would operate. They
will also maintain the stability of the reception of passengers, when the
vaccine is released, they will resume all flights.
2) https://techxplore.com/news/2021-02-american-airlines-layoffs.html
3) https://voca.ro/11RLFm8Qjprc
4) first quarter
In the first quarter of 2020, the Ministry of Education and Science issued a
decree to close all enterprises for quarantine.
worker
During this period, any worker must stay at home.
early retirement
In some countries, older people were forced into early retirement.
5) https://voca.ro/19VCZ36Fm1RW
· #243
Roman Gavrilenko RZ-211 (Gvozd) (Tuesday, 07 June 2022 09:13)
1) Reflection-removing camera: Device uses depth sensor and signal processing to
capture clear images through windows
In recent years, computer scientists have studied a number of methods for
removing reflections from digital photographs taken through glass.
This week at the Institute of Electrical and Electronic Engineers' International
Conference on Acoustics, Speech and Signal Processing, members of the MIT Media
Lab's Camera Culture Group will present a fundamentally different approach to
image separation.
In earlier projects, the Camera Culture Group measured the time of arrival of
reflected light using an ultra-fast sensor called a strip camera. At first
glance, such commercial devices may seem too slow to produce the precise
discrimination needed to remove reflections.
Fourier transform, which is widely used in signal processing, is a method of
decomposing a signal into its component frequencies. Each frequency in the
Fourier expansion has two properties. First, its amplitude or the height of the
wave crests. This describes how much it contributes to the composite signal.
Based on the information, the creators wanted to get rid of glass reflections.
2)
https://techxplore.com/news/2016-03-reflection-removing-camera-device-depth-sensor.html
3) https://voca.ro/13yOWfoJHyDN
4) 1. those at MIT
Some have tried to use variability in focal distance or the polarization of
light; others, like those at MIT, have exploited the fact that a pane of glass
produces not one but two reflections, slightly offset from each other.
2. earlier projects
In earlier projects, the Camera Culture Group has measured the arrival times of
reflected light by using an ultrafast sensor called a streak camera.
3. terahertz imaging
And in other settings, such as terahertz imaging, measuring phase as well as
intensity can dramatically increase costs.
5) https://voca.ro/1eke6EaDATRg
· #242
Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 07 June 2022 09:12)
(CLASS WORK)
Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This
article is about a US government that offers 10 million dollars for finding a
leader of the high-profile ransomware gang DarkSide. Washington blamed the
Russia-based group for the online assault that forced the shutdown of the
largest oil pipeline in the eastern United States in May. Cybercrimes have been
booming, with new data out in October showing $590 (five hundred nineteen)
million in ransomware-related payments were reported to US authorities in the
first half of 2021 alone. As for me, the fight against hackers is a very
difficult confrontation.
Sentences:
WHEN COMPARED
1)This figure is even less significant WHEN COMPARED to the assets such
enterprises control.
Ця цифра ще менш значна, якщо порівнювати з активами, які контролюються такими
підприємствами.
MULTIPLE LEVELS.
2)And the beauty of the book is that it works on MULTIPLE LEVELS.
І принадність книги в тому, що вона працює на кількох рівнях.
CASE STUDIES
3)The training will be based on CASE STUDIES, simulations and group
problem-solving exercises.
Навчання базуватиметься на тематичних дослідженнях, моделюванні та групових
вправах на вирішення проблем.
Vocaroo(sentence): https://voca.ro/1bPATAlHnboW
Vocaroo(aritcle): https://voca.ro/1k3bM50kGonB
https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
https://techcrunch.com/2021/11/05/state-department-darkside-bounty/
· #241
Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 07 June 2022 09:12)
Exam topic #9 “The new advancement of color Television.”
In 1938, Werner Flechsig patented the principle of the color kinescope, and the
color image transmission method was developed in 1940. In European cinemas,
color films appeared in 1941, the first of which were Women Are Still the Best
Diplomats and Hans Alber's film Munchausen. In 1953, the NTSC standard for
black-and-white television broadcasting was expanded in the United States - it
received the ability to transmit color, namely, "color" was added to
"brightness". On August 30, 1953, for the first time in history, NBC broadcast a
color broadcast of "Kukla, Fran and Ollie" in test mode via the NTSC standard.
The first full-fledged color broadcast was the opera Carmen, shown on October
31, 1953.
Vocaroo: https://voca.ro/1kNQhjXPbo1n
· #240
Popovych E. (Tuesday, 07 June 2022 08:49)
To Kolomiets Volodymir RZ 212
Your comment has clear layout and quite correct as well as the task with the
phrases, thank you.
· #239
Gvozd O.V. to RZ-211 (Tuesday, 07 June 2022 08:47)
Good morning!
The lesson will start soon. Read the instructions again and do your module Test.
· #238
Timophey Sipin RZ-212 (Tuesday, 07 June 2022 08:38)
Today l have read the article titled «I selfie, therefore I am': Instagram 10
years on».In this text, we are told about the changes in Instagram over 10
years, as well as the pros and cons of this app. For example, we are told about
a significant improvement in the service , from the usual photo processing 10
years ago, to an element without which now is difficult to imagine our life.
Instagram (based on information from the text) helped many companies, brands and
ordinary people to make life easier.
In my opinion, we need Instagram today, but as the psychologist correctly noted
in the text, teenagers do not need to strive for the ideal life that they see in
the Internet application.
https://techxplore.com/news/2020-10-selfie-instagram-years.html
https://voca.ro/1fg9FoYZ6wS
1) 1. another way of
We need to find another way of thinking, one based on principles and values that
can sustain a new test of civilization. - Нам потрібно знайти інший спосіб
мислення, заснований на принципах і цінностях, які можуть витримати нове
випробування цивілізації.
2. alternative way
They found an alternative way to control the mass density of the fluid by simply
engineering the thickness of the fluid channel. - Вони знайшли альтернативний
спосіб контролю масової щільності рідини шляхом простого визначення товщини
каналу рідини.
3. able to eliminate
I think we may be able to eliminate that threat for them once and for all. - Я
думаю, що ми зможемо усунути цю загрозу для них раз і назавжди.
https://voca.ro/1n2Kvlmfr
· #237
Kolomiets Volodymir RZ 212 (Popovych) (Tuesday, 07 June 2022 08:33)
Today i have read the article "It's crystal clear: Crushed glass could save our
sand". This article is about a new way to safe our enviroment. Some engineers
started using recucled glass instead of sand in making shotconcrete. They say
that it is cheaper and will save our nature because the sand began to run out
rather quickly. According to them this is extremely necessary because our
grandchildren may not see the sandy beaches. There have been many tests done
with this mixture and it has shown itself to be quite good. Soon they plan to do
large-scale projects with this concrete.
i found this article very interesting, because this information can change even
my town, so i like it.
https://techxplore.com/news/2021-05-crystal-glass-sand.html
https://voca.ro/12bIttE8GH1V
1) able to eliminate
As highlighted by one of the heads of the study, Professor Álvaro Caballero, the
researchers were able to eliminate the impurities of used graphite
Як підкреслив один з керівників дослідження, професор Альваро Кабальєро,
дослідникам вдалося усунути домішки використаного графіту.
2) another way of
There is another way of analysing this situation
Є й інший спосіб аналізу цієї ситуації
3) alternative way
LPAs offer an alternative way to accelerate and boost the energies of the
particles
LPA пропонують альтернативний спосіб прискорення та збільшення енергії частинок
https://voca.ro/1lBhGoIMM1FR
· #236
Popovych E. (Tuesday, 07 June 2022 08:31)
To Povoznikov Artem RZ-212
I have read your tasks, they are quite correct and informative but mind, pls,
that your comment should include up to 100 words. Use Word Count Tool to check
it. Go on working.
· #235
Povoznikov Artem RZ-212 (Popovych) (Tuesday, 07 June 2022 08:25)
Today i have read the article: Computer simulation brings us closer to schools
of fishlike underwater research drones.
This article tells about The researchers used 3D modeling to show that small
fish swimming in a school can sense the position and tail strokes of their
neighbors as a change in water pressure on the side of their body.
This mechanism allows the fish to maximize the swimming efficiency of the group
even in complete darkness when there are no visual cues. Understanding the group
movement of fish is useful for predicting their migration and designing aquatic
research robots. Previous research suggests that swimming in groups of fish can
benefit from adopting optimal relative positions and synchronizing their
movements. In order to keep track of neighbors, even in a dark or cloudy
environment, fish must clearly rely on more than just sight.
In this study, scientists simulate two tetra-nosed fish swimming side by side in
various configurations in calm waters.
They examine the pressure signals propagating through the water from the body of
one fish to the body of another. In fact, there is a new trend in robotics that
will increasingly see modular designs of small robots working in teams.
Similarly, swarms of robotic fish equipped with pressure sensors could use the
hydrodynamic advantages of moving in a group to replace larger underwater drones
that explore historic shipwrecks, such as Ernest Shackleton's newly discovered
endurance, or observe fish behavior.
I think this is a great invention for underwater research. With it, we will be
able to explore the underwater world even better.
Text:
https://techxplore.com/news/2022-03-simulation-closer-schools-fishlike-underwater.html
Audio: https://voca.ro/130rJomezQzu
1) able to eliminate
I think we may be able to eliminate that threat for them once and for all.
2)alternative way
Many of them are, however, large and costly. LPAs offer an alternative way to
accelerate and boost the energies of the particles.
3)another way of
There is another way of analysing this situation.
Audio:https://voca.ro/13j6aWvFRJ39
· #234
Popovych E. (Tuesday, 07 June 2022 08:13)
To Kravchenko Kostiantyn (RZ-212)
Thank you for your comment on the article and for your work. It is nice that you
do it regularly.
· #233
Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 07 June 2022 08:03)
Today I've read the article "Dear passwords: Forget you. Here's what is going to
protect us instead"
The article covers the idea that passwords are becoming obsolete in modern
times.
The article suggests that passwords are bound to be replaced within the next 5
years with more modern authorization methods, such as biometrical scans, face
and speech recognition. However due to concerns and little consensus on what
works best, companies restrain themselves from implementing immediate solutions.
In my opinion, the article is rather controversial. Although I would consider
password relevancy quite the discussion in modern times, the article fails to
bring any valid arguments, apart from making bold claims.
Article: https://techxplore.com/news/2020-03-dear-passwords.html
Audio: https://voca.ro/1cWFA2wC5MPF
Phrases:
1) Electrocaloric refrigerator offers an alternative way to cool everything from
food to computers.
Електрокалорійні холодильники пропонують алтернативний спосіб охолодження
всього, від їжі до комп'ютерів.
2) As we come up with a solution, the hackers are thinking of another way to
attack.
Доки ми знаходимо рішення, хакери мислять про нові шляхи для атаки.
3) The researchers were able to eliminate the impurities of used graphite.
Дослідники змогли ліквідувати домішки у використаному графіті.
Audio: https://voca.ro/18LP6y7fSO8j
· #232
Popovych E. (Tuesday, 07 June 2022 07:13)
To Artem Kotliarov RZ-212
Your task is complete, informative and interesting. Well done.
· #231
Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 07 June 2022 07:06)
1) 1. another way of
We need to find another way of thinking, one based on principles and values that
can sustain a new test of civilization. - Нам потрібно знайти інший спосіб
мислення, заснований на принципах і цінностях, які можуть витримати нове
випробування цивілізації.
2. alternative way
They found an alternative way to control the mass density of the fluid by simply
engineering the thickness of the fluid channel. - Вони знайшли альтернативний
спосіб контролю масової щільності рідини шляхом простого визначення товщини
каналу рідини.
3. able to eliminate
I think we may be able to eliminate that threat for them once and for all. - Я
думаю, що ми зможемо усунути цю загрозу для них раз і назавжди.
https://voca.ro/1n2KvlmQUjiQ
2) Today, І have read thе аrtісlе «Pushing the boundaries of space exploration
with X-ray polarimetry»
IXPE is a space observatory developed in collaboration with the Italian Space
Agency, launched by NASA on December 9, 2021. It contains three identical
telescopes, each of which has an X-ray detector that is sensitive to the
polarization of light in focus. Equipped with them, IXPE can explore some of the
brightest sources of cosmic X-rays in our universe, such as pulsars, black holes
and neutron stars.
In my opinion, IXPE thanks to state-of-the-art telescopes and detectors, IXPE
has the potential to expand the horizons of our knowledge of the universe.
https://phys.org/news/2022-04-boundaries-space-exploration-x-ray-polarimetry.html
https://voca.ro/1lk5QX12WzdR
· #230
Popovych E. (Tuesday, 07 June 2022 06:56)
Good morning!
The lesson will start soon, so I am waiting for your comments and audio
recordings. Don't forget to write the sentences with Phrases and record them.
Please, do it in one post!
· #229
Popovych E. (Monday, 06 June 2022 14:04)
To Nastya Poddubrovskaya(RZ - 212)
##218,219, 220,222,225,226
Thank you, your tasks are quite correct, but it is better to work regularly.
· #228
Lebedeva E. (Monday, 06 June 2022 12:55)
To Kozhushko Dima RZ-211 I got your exam topics and comments. Now it's time to work with phrases.
· #227
Lebedeva E. (Monday, 06 June 2022 12:54)
To Neblienko V. / RZ-212 / Badyuk Eduard RZ-212 Thanks for the work. Go on working.
· #226
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 12:03)
Exam topic # 10
Password as a general technique of secrecy.
A password is your personal key to a computer system. Passwords help to ensure
that only authorized individuals access computer systems. Passwords also help to
determine accountability for all transactions and other changes made to system
resources, including data. If you share your password with a colleague or
friend, you may be giving an unauthorized individual access to the system and
may be held responsible for their actions. What if the individual gives your
password to someone else? What if some of your files are deleted or otherwise
rendered unusable? Are you willing to take the blame if an unauthorized
individual uses your access to damage or to make unauthorized changes to data or
systems?
https://voca.ro/1oNwCEXjre5u
· #225
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 11:52)
Exam topic # 9
Potential security violations.
A security breach is any incident that results in unauthorized access to
computer data, applications, networks or devices. It results in information
being accessed without authorization. Typically, it occurs when an intruder is
able to bypass security mechanisms.When a major organization has a security
breach, it always hits the headlines. Example of security breach: Yahoo - 3
billion user accounts were compromised in 2013 after a phishing attempt gave
hackers access to the network.You'd never dream of leaving your house door open
all day for anyone to walk in. Think of your computer the same way. Keep your
network access and your personal data tightly secured, and don't leave any
windows or doors open for a hacker to get through.
https://voca.ro/1jh4abL0OqcY
· #224
Badyuk Eduard RZ-212 (Lebedeva E.V.) (Work for 26.05.) (Monday, 06 June 2022 11:49)
Exam topic #19 (Potential security violations.)
Any security violation and breach certainly includes illicit access to some
resources, being systems, data, or operations. In this context, the evolution of
security policies has brought access control at the core of security, but also
privacy protection. Therefore, beyond legacy access control models, such as the
Discretionary Access Control (DAC), the Mandatory Access Control (MAC), and the
well-adopted Role-Based Access Control (RBAC), a variety of systems have been
proposed, introducing a manifold of additional features. Most of the prominent
approaches typically propose enhancements to RBAC models in order to incorporate
different criteria in access control decisions, rather than just which user
holding which role is performing which action on which object.
https://voca.ro/1nbfdhig4JvA
· #223
Badyuk Eduard RZ-212 (Lebedeva E.V.) (Work for 12.05) (Monday, 06 June 2022 11:44)
Exam topic #14 (Authority check.)
AUTHORITY-CHECK statements are used in ABAP codes while development of ABAP
Programs/Reports. Authorization objects along with the necessary field values
are inserted into the ABAP code for authorization check against user actions
through that particular program.
Hence these statements must be used to protect programs where users are able to
perform all actions without any authorization check. These check for
authorization object values against the values present in user master records.
The authorization check is carried out if the check indicator for the specified
authorization object for the current context is set to check with any proposal
status. So, if the check indicator is set to no check, no authorization check is
carried out and sy-subrc is set to 0, as with a successful check.
https://voca.ro/1ipeBmHpEVk1
· #222
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 11:37)
Exam topic # 8
The authentication of a user's claimed identity.
Authentication is the process of determining whether someone or something is, in
fact, who or what it says it is. Authentication technology provides access
control for systems by checking to see if a user's credentials match the
credentials in a database of authorized users or in a data authentication
server. In doing this, authentication assures secure systems, secure processes
and enterprise information security.It is important to realize that each access
point is a potential intrusion point. Each networked device needs strong machine
authentication, and despite their normally limited activity, these devices must
be configured for limited permissions access to restrict what can be done even
if they are breached.
https://voca.ro/18gC2xhNVlyh
· #221
Badyuk Eduard RZ-212 (Lebedeva E.V.) (Work for 05.05) (Monday, 06 June 2022 11:32)
Exam topic #17 (Password as a general technique of secrecy.)
Passwords provide the first line of defense against unauthorized access to your
computer and personal information. The stronger your password, the more
protected your computer will be from hackers and malicious software. You should
maintain strong passwords for all accounts on your computer.
Here are some useful tips to for creating strong passwords and keeping your
information secure.
1. Use a unique password for each of your important accounts.
2. Your password should be at least 8 characters long.
3. Do not use personal information such as your name, age, date of birth,
child’s name, pet’s name, or favorite color/song when constructing your
password.
4. Avoid consecutive keyboard combinations (i.e. qwerty or asdfg).
5. Always log off/sign out if you leave your device for the day.
6. Avoid entering passwords on computers you don't control.
https://voca.ro/1gey6lK5B6D6
1) a breakthrough in
The adoption of the Court's Statute is a clear breakthrough in the area of
humanitarian law and human rights protection.
Прийняття Статуту Суду є явним проривом у сфері гуманітарного права та захисту
прав людини.
2) ability to achieve
This omission on the part of the Ministry of Justice affected the work of the
committees and their ability to achieve their objectives.
Це упущення з боку Мін’юсту вплинуло на роботу комітетів та їхню здатність
досягати поставлених цілей.
3) able to target
Second, as their knowledge base expands, scientists will be able to target
tumors with increasing safety and effectiveness.
По-друге, у міру розширення їхньої бази знань вчені зможуть націлюватися на
пухлини з більшою безпекою та ефективністю.
https://voca.ro/16eg3auf6PWG
· #220
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 11:14)
Exam #7
Authority check
"Website authority" is an SEO concept that refers to the "strength" of a given
domain.Generally speaking, the higher the "authority" of your domain, the
better.
But it's important not to judge Domain Rating in absolute terms. That's because
Domain Rating is a relative metric by definition. It's not possible to say that
a Domain Rating of 30 is good, or 50, or 60, or 70. It's all relative.If your
website "authority" is higher than that of your competitors, then your site is
stronger than theirs in terms of "link popularity."Still, never judge the
quality of a website on site-wide "authority" alone.
https://voca.ro/1kuV18FS4xJL
· #219
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 11:02)
Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This
article is about a US government that offers 10 million dollars for finding a
leader of the high-profile ransomware gang DarkSide. Washington blamed the
Russia-based group for the online assault that forced the shutdown of the
largest oil pipeline in the eastern United States in May. Cybercrimes have been
booming, with new data out in October showing $590 (five hundred nineteen)
million in ransomware-related payments were reported to US authorities in the
first half of 2021 alone. As for me, the fight against hackers is a very
difficult confrontation.
https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
a breakthrough in
I need a breakthrough in Eloise's case to save me from full-blown Hindenberg.
Мне нужен прорыв в деле Элоизы, чтобы спасти меня от полного провала.
able to target
Second, as their knowledge base expands, scientists will be able to target
tumors with increasing safety and effectiveness.
Во-вторых, по мере накопления знаний ученые научатся бороться с опухолями более
безопасными и эффективными способами.
ability to achieve
Her ability to achieve maximum results while staying within the budget is one of
the greatest company resources.
Ее способность достигать максимальных результатов при заданном бюджете является
одним из лучших ресурсов компании.
https://voca.ro/1cESdGiaqqJ2
· #218
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Monday, 06 June 2022 10:53)
Today I've read the article about storing energy in red bricks. We've been using
red bricks for thousands of years since it's the world's cheapest and most
familiar building material. Surprisingly, chemists in Art&Science have developed
a method to make modified "smart bricks" that are capable of storing energy
until required for powering device. This method is suitable for regular or
recycled bricks and new bricks as well. Buildings and walls made of red bricks
are already everywhere so we can improve them and use them as electrical
storages. D'Arcy and colleagues demonstrated the way we can convert red bricks
into supercapacitors. This type of bricks can provide energy to emergency
lightning and can be recharged hundreds of thousands of times. There was a video
of their experiment in this article. In my opinion, this research paves the way
for totally new method to save energy. article:
https://techxplore.com/news/2020-08-energy-red-bricks.html
https://voca.ro/1bpuzes3yHQR
a breakthrough in
Your holistic detective agency is a breakthrough in applied quantum mechanics.
Твоё холистическое детективное агентство - это прорыв в прикладной квантовой
механике.
able to target
My alien sister is not leaving here until we figure out how Cadmus was able to
target only aliens.
Моя сестра-пришелец не уйдёт отсюда, пока мы не выясним, как Кадмус смог
поразить только пришельцев.
ability to achieve
This phenomenon has a serious adverse effect on our ability to achieve unity at
the continental level in Africa for the peaceful resolution of conflicts.
Это явление оказывает серьезное отрицательное воздействие на нашу способность
достигать единства на континентальном уровне в Африке в целях мирного
урегулирования конфликтов.
https://voca.ro/13Q8WJN59sRV
· #217
Petrova E.I. (Monday, 06 June 2022 10:22)
Pour les étudiants qui apprennent le français.
Chers étudiants ! J’attends vos devoirs. Dépéchez-vous! Il ne vous reste que
quelques jours pour les faire et envoyer.Laissez vos commentaires et vos
enregistrements ici. Allez-y! Bon travail.
· #216
Neblienko V. / RZ-212 / Lebedeva (Sunday, 05 June 2022 18:45)
Exam topic #11 The differences between a software and hardware firewall.
Here the difference:
Hardware firewalls can protect a whole network of computers in an organization,
while a software firewall is required to be installed on individual computers.
Hardware firewalls are more complex to set up while software firewalls are much
simpler and easier to install on computers.
Hardware firewalls entail a big investment, which is proportional to the
sophistication required, while software firewalls generally mean less
investment. However, the cost of software firewalls increases if an organization
hosts computers of different brands and operating systems.
Hardware firewalls free up the critical server resources as the related software
is installed outside the server in the hardware firewall itself.
Vocaroo: https://voca.ro/1boZodflhIXe
· #215
Neblienko V. / RZ-212 / Lebedeva (Sunday, 05 June 2022 18:38)
Today i have read the article titled: 'New NASA mission to help us better
estimate asteroid impact hazard'. This article tells about the sensors that
every year detect nuclear explosions in the upper atmosphere, which are
harmless, as a result of the disintegration of an asteroid.
According to NASA's NEO program, there are more than 1,300 "Potentially
Hazardous Asteroids" (PHAs) – objects at least 150 yards (about 140 meters)
across with a very small chance of impacting us someday because their orbital
paths take them close to Earth's orbit.
In my opinion, you should not forget about the cosmic threat and also pay
attention to the danger and the possibility of dangerous objects entering our
planet.
Article: https://phys.org/news/2013-02-nasa-mission-asteroid-impact-hazard.html
Vocaroo: https://voca.ro/1i3UnxabVq7t
Phrases:
estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
Она способна оценивать воздействие выбросов на здоровье человека и
биоразнообразие.
distinct from
Such people often live in politically marginalized groups distinct from the
dominant culture.
Зачастую такие люди принадлежат к политически маргинализованным группам, и их
образ жизни отличается от преобладающих культурных традиций.
examine more closely
However, it might be worthwhile to examine more closely the differences between
the Secretariat and its counterparts in New York, namely, UNICEF and UNDP.
Тем не менее, возможно, стоит более внимательно изучить различия между
Секретариатом и его аналогами в Нью-Йорке, а именно ЮНИСЕФ и ПРООН.
Vocaroo: https://voca.ro/11a90pgBjnYi
· #214
Anton Ardelyan RZ-211(Gvozd O.V.) (Sunday, 05 June 2022 16:55)
Today i have read the article "Japan's 'flying car' gets off ground, with a
person aboard (Video)" It was a good year for technology research of all kinds;
a team at Japan's SkyDrive Inc., demonstrated their "flying car"—it took off
with a person aboard, hovered approximately 1 to 2 meters above the ground for
approximately four minutes and then returned safely to the ground. Tomohiro
Fukuzawa, who heads the company, said at the demonstration that he hopes to have
a product for sale within a couple of years.
Link: https://techxplore.com/news/2020-08-japan-car-ground-person-aboard.html
Audio: https://voca.ro/143Nb5eyvYyu
Phrases:
1)To estimate the effects of interacting variables, we employed a two-step
estimation approach
Щоб оцінити вплив взаємодіючих змінних, ми застосували двоетапний підхід до
оцінки
2)That's distinct from advertising.
Це відрізняється від реклами.
3)This pair of posts will examine more closely four types of weapons.
У цій парі постів детальніше буде розглянуто чотири види зброї.
Audio:https://voca.ro/1o5wSTm8tDLE
· #213
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:45)
Today I've read the article Crossing the Line: How Robots Can Control Roads.
International experts, including those from Flinders University, say there is a
need to create a strong collective ethical framework developed by government,
citizens and other stakeholders to guide the introduction of new traffic rules
for connected and automated vehicles (CAV).
They warn that a strict ban on all kinds of CAVs from violating existing traffic
rules could reduce road safety, contrary to what most people might argue.
However, this requires careful scrutiny so that these high-tech vehicles can
fulfill their potential to reduce road accidents.
I think this article is useful for understanding what awaits us in the near
future and what we will have to face.
1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.
https://voca.ro/1o18vKz9EZev
https://voca.ro/195t5OqF0yme
· #212
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:44)
Sofia Gilenko РЗ-211 (Vorobyova)
Today I've read the article Crossing the Line: How Robots Can Control Roads.
International experts, including those from Flinders University, say there is a
need to create a strong collective ethical framework developed by government,
citizens and other stakeholders to guide the introduction of new traffic rules
for connected and automated vehicles (CAV).
They warn that a strict ban on all kinds of CAVs from violating existing traffic
rules could reduce road safety, contrary to what most people might argue.
However, this requires careful scrutiny so that these high-tech vehicles can
fulfill their potential to reduce road accidents.
I think this article is useful for understanding what awaits us in the near
future and what we will have to face.
1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.
https://voca.ro/1o18vKz9EZev
https://voca.ro/195t5OqF0yme
· #211
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:43)
Today I’ve read the article “Sex, drugs and TikTok: Keeping young people safe
needs a mature response, not a moral panic”. TikTok "serves up" sex and drug
videos to minors. Media reports have described the video-sharing platform, which
is designed predominantly for young people, as an "addiction machine" that
promotes harmful content. TikTok's algorithm actively "serves up" drug content
to minors, who "may lack the capability to stop watching and don't have
supportive adults around them" to help moderate their opinions. Parents have
been encouraged to stop their children using it, and the app has been urged to
censor drug content entirely. If we are serious about protecting young people
online, we need to be driven by evidence, not fear.
https://techxplore.com/news/2021-10-sex-drugs-tiktok-young-people.html
1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.
https://voca.ro/1amMuABY9bGL
https://voca.ro/195t5OqF0yme
· #210
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:43)
Today I've read the article "Using AI and old reports to understand new medical
images".
This article is about the use of artificial intelligence in medicine. Getting a
quick and accurate reading of an X-ray or some other medical images can be vital
to a patient's health and might even save a life.Obtaining such an assessment
depends on the availability of a skilled radiologist and, consequently, a rapid
response is not always possible.For this reason, CSAIL scientists want to train
machines that can replicate what radiologists do every day.
This is done on the basis of the myriad of radiological reports that accompany
medical images written by radiologists in daily clinical practice. In my
opinion, this article is very important, because this technology can not only
save lives of people around the world, but it can also be used for any images
and related text - inside or outside the field of medicine.
1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.
https://voca.ro/1leBq6VRdo9d
https://voca.ro/195t5OqF0yme
· #209
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:42)
Today I've read the article "Engineers are developing a way to use everyday
Wi-Fi to help robots see and navigate indoors better."
UC San Diego engineers have developed low-cost, low-power technology that helps
robots accurately navigate indoors, even in poor lighting and without
recognizable landmarks or features.
I think this article is useful because using WiFi technology can offer a
cost-effective alternative to expensive and power-hungry LiDARs.
https://techxplore.com/news/2022-05-everyday-wifi-robots-indoors.html
1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.
https://voca.ro/1k8CMtOZbjFp
https://voca.ro/195t5OqF0yme
· #208
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:41)
Today I've read the article "New technology gives smart cars 'X-ray' vision by
detecting hidden pedestrians and cyclists."
Australian researchers have developed a breakthrough technology that allows
autonomous vehicles to track running pedestrians hidden behind buildings and
cyclists hidden behind larger cars, trucks and buses.
I think this article is useful for both human-driven and autonomous vehicles, it
will significantly improve the efficiency and safety of road transport.
https://techxplore-com.translate.goog/news/2021-11-technology-smart-cars-x-ray-vision.html?_x_tr_sl=auto&_x_tr_tl=ru&_x_tr_hl=ru&_x_tr_pto=nui,op
1.examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
2.estimate the effects of
A few Parties were able to estimate the effect of particular measures.
3.distinct from
This role was distinct from law enforcement but complementary.
https://voca.ro/11Cz3jfWs4g3
https://voca.ro/195t5OqF0yme
· #207
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:41)
Exam Topic #10 (information protection systems)
The basic tenets of information security are confidentiality, integrity and
availability. Every element of the information security program must be designed
to implement one or more of these principles. Together they are called the CIA
Triad. Confidentiality
Confidentiality measures are designed to prevent unauthorized disclosure of
information. Integrity
Consistency includes protection against unauthorized changes (additions,
deletions, alterations, etc.) to data. Availability
Availability is the protection of a system’s ability to make software systems
and data fully available when a user needs it (or at a specified time).
https://voca.ro/15dPhJ5uDcdK
· #206
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:39)
Exam topic #18 ("Protection schemes”)
Nowadays, protection schemes are everywhere. Each bank, company, organization
etc. have their own protection schemes. These schemes are usually some code
written by a high-quality specialist to secure data from the villain. It's
always very important to have individual way to protect a big amount of
information, that's why schemes are always checking to have a stable control on
situation, because at least one mistake can destroy all the system. In general,
only robbers and hackers want to get the access to the system to stole
information or money.
https://voca.ro/1dzdSb03RGXw
· #205
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:39)
Exam topic #1 (Concept of “Privacy”. )
The possibilities of information exchange on the Internet today are truly
limitless and continue to grow rapidly.
But privacy is an important element of the Internet's open information space.
Neglect of a person's right to confidentiality, or rather, his right to control
the composition and extent of distribution of personal information, leads to a
loss of user confidence, increased control and, as a result, to a decrease in
innovation, intensity and volume of information exchange.
https://voca.ro/1nHV96ZET9ax
· #204
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:38)
Exam topic #19 (Principles of information protection.)
In computing, the concept of security is very broad. It implies both the
reliability of the computer, and the safety of valuable data, and the protection
of information from being changed by unauthorized persons, and the preservation
of the secrecy of correspondence in electronic communications. Of course, in all
civilized countries, the safety of citizens is protected by laws, but in
computer technology, law enforcement practice is not yet developed, and the
law-making process does not keep pace with the development of technology, and
the reliability of computer systems largely relies on self-defense measures.
https://voca.ro/1kvMLYZtRuHN
· #203
Sofia Gilenko РЗ-211 (Gvozd O.V) (Sunday, 05 June 2022 00:37)
Exam topic #15 (The Essentials of Information Protection.)
It must be clearly understood that no hardware, software or any other solutions
can guarantee the absolute reliability and security of data in information
systems. At the same time, it is possible to significantly reduce the risk of
losses with an integrated approach to security issues.
A large concentration of protective means in an information system can lead not
only to the fact that the system will be very expensive and therefore
unprofitable and uncompetitive, but also to the fact that it will have a
significant decrease in the availability factor. Therefore, the main thing in
determining the measures and principles of information protection is to
skillfully determine the boundaries of reasonable security and the cost of
protection tools on the one hand and maintaining the system in working condition
and acceptable risk on the other.
https://voca.ro/17IYoJOO5nrX
· #202
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:53)
Exam topic #16 (The Essentials of Information Protection)
The most important rules in the internet is Essentials of Information
Protection. The main ones are passwords, key-phrases and id-verifications. But
it should be noted that a lot of information could be stolen in free acces.
Don’t post any important information, your phone number, personal photos,
documents, etc. on messangers, sites and personal messages with people you don’t
trust. Use only safe resources to your needs and never try to find something in
suspicious sites, there are can be some hacker’s trups like fishing and other
stuff to stole your data or even to take control on your device
Audio: https://voca.ro/1dnegvxH6LXd
· #201
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:52)
Exam topic #1 (Concept of “Privacy”)
Confidentiality is the right to remain calm or free from interference or
intrusion. Confidentiality of information is the right to some control over how
your personal information is collected and used. Thanks to technological
innovations, it is becoming increasingly difficult to maintain the
confidentiality of information as more and more data is collected and exchanged.
And this forces organizations to face an incredibly complex matrix of risks to
ensure the protection of personal information.
Confidentiality has quickly become perhaps the most important issue of consumer
protection - if not the protection of citizens - in the global information
economy.
Audio: https://voca.ro/1auXMJK6qnLi
· #200
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:52)
Exam topic #19 (Potential Security Violations)
Over the recent decades we've observed many types of cyber attacks; for
convenience security specialists have widely agreed upon categorization of these
potential security violations into three main classes.
Unauthorized information release, in which a hacker can read and take advantage
of the information stored on the system, or track patterns of illegible code
with the intention of deciphering it into proper information.
Unauthorized information modification, in which the attacker can sabotage the
system by modifying the stored information.
And lastly, unauthorized denial of use, in which the intruder can prevent an
authorized user from accessing the system, or its stored information in any
capacity.
Audio: https://voca.ro/1onh3aOk1bhV
· #199
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:51)
Exam topic #13 (Authentication mechanisms)
Authentication is the process by which a user confirms the authenticity of his
identity in any system. The system provides personal data only to its owner. The
authentication mechanism is one of the administration tools. It allows you to
determine which of the users listed in the list of system users is connecting to
the application solution at the moment. The authentication mechanism at the
basic level is quite simple - you need to enter data in the form of a username
and password. Check the data for a match, and if the data matched, then you are
the true owner of the account.
Audio: https://voca.ro/19lSzpOmkY1Q
· #198
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:50)
Exam topic #17 Password as a general technique of secrecy
Today we can install password everywhere. On your smartphone, on social network
page, on bank account. Password reliably protects your information, but only if
you made it hard and unusual. If your password is too easy, hackers will easily
guess it using special password recovery software.
Password must be long, with different numbers, with small and capital letters
and other characters, the harder the better. Also you must have different
passwords for different needs. if you follow these rules, your information will
be under protection and your information will not be stolen by hackers and
online thieves.
Audio: https://voca.ro/1oOJXzwwPWU2
· #197
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:49)
Today I've read the article about the study that explores how a robot's inner
speech affects a human user's trust. Trust is a very important part of
human-robot interactions as well as it affects the widespread implementation of
robots in our life. However, trust is a very complicated process that requires
specific and individual circumstances. Researches at University of Palermo
provide a perspective study about the impact of robots' inner speech. They've
made some experiments and discovered that people trust robots more when they
hear the strategy and the structure of robots' "thoughts". They claim that it
makes robots more anthropomorphic or human-like. Unfortunately, the team has
analyzed the level of trust of only 27 people, but they intend to make their
research more precise and broader. In my opinion, the robots' inner speech is
capable of making them more trustworthy and thus helps people rely on them in
different areas.
Article:
https://techxplore.com/news/2021-10-explores-robot-speech-affects-human.html
Audio: https://voca.ro/15jv7GBySLnA
· #196
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:48)
Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This
article is about a US government that offers 10 million dollars for finding a
leader of the high-profile ransomware gang DarkSide. Washington blamed the
Russia-based group for the online assault that forced the shutdown of the
largest oil pipeline in the eastern United States in May. Cybercrimes have been
booming, with new data out in October showing $590 million in ransomware-related
payments were reported to US authorities in the first half of 2021 alone. As for
me, the fight against hackers is a very difficult confrontation.
Article: https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
Audio: https://voca.ro/1bE5AYWgXLDa
· #195
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:48)
Today i’ve read an article “Making voice assistants accessible for older
patients”
This article tells us about voice assistants made by different technology
companies, like Apple, Google, Amazon and others, and their enormous potential
to make our life easier. Also this assistants can help old people to manage
their health. Using these eye- and hands-free tools, patients could make
appointments, confer with clinicians, receive medication reminders and perform
other tasks. But current devices have not been designed with older patients, or
even healthcare, in mind. If engineers and designers will work in this
direction, they can really help different groups of people. Also important thing
in teaching people use this technology often and correct.
This article is important to read if you want to know about newest technologies,
which really can help people.
Article:
https://techxplore.com/news/2021-11-voice-accessible-older-patients.html
Audio: https://voca.ro/1e6sNwMVQzxt
· #194
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:47)
Today I have read the article The Dark Side of Social Media
A systematic review of research on the dark side of social media use identified
46 harmful effects, ranging from physical and mental health problems to negative
impacts on work and academic performance, as well as safety and privacy
concerns.
Social networks like Facebook and Instagram are used by over 3.6 billion people
worldwide. Raising awareness of potential dangers can stimulate user moderation
and help software developers, educators, and policymakers develop ways to
minimize negative impacts.
In my opinion, the harm caused by social media is mainly psycho-logical.
Article:
https://techxplore.com/news/2021-10-dark-side-social-media-networks.html
Audio: https://voca.ro/1h4LGE4WD0kd
· #193
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:46)
Today I have read the article "Robots popular with older adults" .This article
explores the myth that older people are skeptical of robots. The myth was
debunked in an experiment in which older participants were openly positive about
cars and even more open than participants in the younger comparison group.
Similarly, scientists have suggested that robots can help people with autism,
because it is important for them that their environment is predictable, and this
is exactly the effect that can be achieved with the help of robots.
I believe that robots are an irreplaceable part of the future, in which they
will be not just workers, but a part of society.
Article: https://techxplore.com/news/2020-03-robots-popular-older-adults.html
Audio: https://voca.ro/1aXKshP9pjR2
· #192
Kozhushko Dima RZ-211(Lebedeva) (Saturday, 04 June 2022 19:45)
Today I've read the article Crossing the Line: How Robots Can Control Roads.
International experts, including those from Flinders University, say there is a
need to create a strong collective ethical framework developed by government,
citizens and other stakeholders to guide the introduction of new traffic rules
for connected and automated vehicles (CAV).
They warn that a strict ban on all kinds of CAVs from violating existing traffic
rules could reduce road safety, contrary to what most people might argue.
However, this requires careful scrutiny so that these high-tech vehicles can
fulfill their potential to reduce road accidents.
I think this article is useful for understanding what awaits us in the near
future and what we will have to face.
Article:
https://techxplore-com.translate.goog/news/2021-10-line-robots-roads.html?_x_tr_sl=auto&_x_tr_tl=ru&_x_tr_hl=ru&_x_tr_pto=nui
Audio: https://voca.ro/129PKBYxS6Dn
Phrases:
· #191
Neblienko V. / RZ-212 / Lebedeva (Saturday, 04 June 2022 19:08)
(Отработка за 05.05.2022)
Exam topic #10 Software firewall.
Software firewall is a firewall that is installed on a computer or server, and
tasked with network security. It works with a wide variety of other technology
security solutions to provide more robust and cohesive security for enterprises
of all sizes.
When a software firewall is installed on a server, it opens up like an umbrella
of protection over all other computers connected to the network. It is able to
monitor both incoming and outgoing traffic for potential risk or suspicious user
behaviour, and also makes setting security policies much easier, faster and more
flexible.
Vocaroo: https://voca.ro/1ajCG1k5CyNn
· #190
Neblienko V. / RZ-212 / Lebedeva (Saturday, 04 June 2022 19:01)
(Отработка за 05.05.2022)
Today i've read the article titled: 'Substance derived from tire debris is toxic
to two trout species, not just coho salmon'. This article tells about
6PPD-quinone, which, thanks to the rain, rendered unusable the coho salmon fish,
thanks to which it was determined that the effect could be on the famous trout
fish. Rubber tires are fortified with protectants, such as
N-(1,3-dimethylbutyl)-N'-phenyl-p-phenylenediamine or simply 6PPD, so they can
be safely driven for a long time. However, as the treads wear down and pieces
flake off over time, small rubber particles scatter across roads. In my opinion,
it is worth reducing emissions, which greatly affect both the environment and
the fauna, which suffer enormously from all sorts of factories and industrial
zones.
Article: https://phys.org/news/2022-03-substance-derived-debris-toxic-trout.html
Vocaroo: https://voca.ro/1b08rwMNJYnM
Phrases:
derived from
Obsessed with anything derived from Norse mythology...
Одержимые всем, что каким-либо образом связано с норвежской мифологией...
de facto
Three formerly de facto abolitionist countries resumed executions.
Три страны, ранее де-факто отменившие смертную казнь, возобновили приведение в
исполнение смертных приговоров.
deserves special attention
The situation of the Twa minority deserves special attention, but unfortunately
does not always receive it.
Положение меньшинства заслуживают особого внимания, которое, к сожалению,
проявляется далеко не всегда.
Vocaroo: https://voca.ro/1dLpqYXFh3qC
· #189
S.Mykhailiuk (Saturday, 04 June 2022 15:01)
To Chabanenko Ksenia RZ-213 Thanks. Just very good.
· #188
S.Mykhailiuk (Saturday, 04 June 2022 14:58)
To Ivan Siglyanyk(RZ-213) Just 80 points for your activities.Thanks.
· #187
S.Mykhailiuk (Saturday, 04 June 2022 14:55)
To Anna Yakymova/ RZ-213 just 79 points for all tasks.
· #186
S.Mykhailiuk (Saturday, 04 June 2022 14:50)
To Shpychka Olecksandr/ RZ-213 Thanks .just 82 points for 2 tasks.
· #185
S.Mykhailiuk (Saturday, 04 June 2022)
To Kate Syrbu RZ-213 Task1 is very good. Task2 is good.
· #184
S.Mykhailiuk (Saturday, 04 June 2022 14:45)
To Igor Rudko (RZ-213) just good for both tasks.
· #183
S.Mykhailiuk (Saturday, 04 June 2022 14:41)
To Gorbatiuk Stanislav RZ-213 Just good for both tasks.
· #182
S.Mykhailiuk (Saturday, 04 June 2022 14:37)
To Denis Tsvietkov. РЗ-213 Task1 and Task2 are 70 points . Pls do not use the direct speech (quotes) from the article in your comments. You see what it stands for without working regularly on line.
· #181
S.Mykhailiuk (Saturday, 04 June 2022 14:28)
To Denis Tsvietkov. РЗ-213 just 67 points as the task contains some grammar mistakes. Pls train your pronunciation to avoid mispronouncing words.
· #180
S.Mykhailiuk (Saturday, 04 June 2022 14:11)
To Denis Tsvietkov. РЗ-213 Task1 is very good. Task2 is 60 points only. Pls avoid using general phrases that might be used for all articles. (In general, I liked this article, because it describes methods of solving one of the important problems, I also liked the structure of writing. I will recommend my friends to read this article, because nowadays it is quite useful). The conclusion should be derived from the contents of the article.
· #179
Lebedeva E. (Friday, 03 June 2022 19:51)
To Neblienko V. / RZ-212 / Thanks for the work. Go on working.
· #178
Botsaniuk Ivan RZ-211 (Gvozd O.V) (Friday, 03 June 2022 13:51)
Debt for 24.05
Exam topic #11 “The differences between a software and hardware firewall”.
Hardware firewalls allow you to protect your entire network from the outside
world with a single physical device. This device is installed between your
computer network and the internet. A hardware firewall monitors packets of data
as they are transmitted. The firewall then blocks or transfers the data,
according to predefined rules. Dedicated hardware firewalls require advanced IT
knowledge to install and usually require a dedicated IT employee or department
to monitor and manage once installed.
A software firewall is installed on an individual computer and it protects that
single device. If multiple computers need protection, the software must be
installed on each device. A software firewall controls the behavior of specific
applications. Software firewalls are also useful If a threat does manage to
infect a computer, as it can protect the other computers connected to the same
network. Since they are easier to install, many home and SMB users will utilize
a software firewall.
https://voca.ro/1oHQDrlCxAsb
Review
Today I have read the article “Unglitching the system: Advancement in predicting
software vulnerabilities”. Software vulnerabilities are prevalent across all
systems that are built using source codes, causing a variety of problems
including deadlock, hacking or even system failures. To help combat this,
researchers developed the LineVul approach and found it increased accuracy in
predicting software vulnerabilities by more than 300% while spending only half
the usual amount of time and effort, when compared to current best-in-class
prediction tools. LineVul is also able to guard against the top 25 most
dangerous and common weaknesses in source codes, and can be applied broadly to
strengthen cybersecurity across any application built with source code. I think
that this approach would be very useful because it helps to predict the most
critical areas of vulnerability and to specifically identify the location of
vulnerabilities down to the exact line of code.
https://voca.ro/16bT51BllGfy
Phrases
by means of
The demographic data were gathered by means of a survey (Демографічні дані були
зібрані за допомогою опитування).
the main objective
The main objective of private industry is to generate income (Основна мета
приватної промисловості - отримання доходу).
published in
Articles published in Nature have an exceptionally wide impact, both among
scientists and, frequently, among the general public (Статті, опубліковані в
Nature, мають надзвичайно широкий вплив як серед науковців, так і, часто, серед
широкої громадськості).
https://voca.ro/1jk3Ts8pcDGX
· #177
Botsaniuk Ivan RZ-211 (Gvozd O.V) (Friday, 03 June 2022 13:50)
Debt for 31.05.
Exam topic # 8 Passwords and their drawbacks.
There are three main drawbacks of passwords: 1) passwords are prone to brute
force attacks. This means that a program literally reads through a provided
dictionary of terms, trying each word until the correct combination of
characters breaks the password. Typically, protecting yourself from these
attacks requires you to create complex passwords which can be hard to remember.
2) Storage and Encryption. When you use password authentication, you must store
passwords and usernames in a database to authenticate users. If you don't have
strong server security, someone can break into the database and read the
passwords.
3)Secrecy and Public Use. First, someone physically near you may look over your
shoulder and read your password, or look at your keyboard and note your key
strokes. Second, someone connected to the network might try to intercept your
password information
https://voca.ro/19mm2EkptvsQ
article
Today I have read the article “How randomly moving electrons can improve cyber
security”. Almost everything we do on the internet is encrypted for security.
The strength of this encryption depends on the quality of random number
generation. Encrypted information can be decoded only by authorized users who
have access to a cryptographic "key." But the key needs to be unpredictable and,
therefore, randomly generated to resist hacking. In device developed by
researchers, random numbers are generated using the random motion of electrons.
It consists of an artificial electron trap constructed by stacking
atomically-thin layers of materials like black phosphorus and graphene.
https://techxplore.com/news/2022-05-randomly-electrons-cyber.html
https://voca.ro/1gkqSIp03Ujg
1)considerable disagreement
Finding considerable disagreement, he asks how we should teach the NOS if there
is no consensus on the matter.(Знайшовши значні розбіжності, він запитує, як ми
повинні навчати NOS, якщо немає консенсусу з цього питання.)
2)controversial question
On the controversial question of countermeasures, he felt the draft articles
represented a considerable improvement.(Щодо спірного питання про контрзаходи,
він вважає, що проекти статей представляють значне покращення.)
3)conduct research
The aim was to conduct research and establish a dialogue on reforming the
international financial system with a view to reducing financial
volatility.(Метою було провести дослідження та налагодити діалог щодо
реформування міжнародної фінансової системи з метою зменшення фінансової
нестабільності.)
https://voca.ro/1lQLgQHGmRia
· #176
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 13:37)
Today i've read the article "Sony's AI system GT Sophy beats 95% of human
competitors at Gran Turismo Sport"
the article tells about A collaboration between engineers at Sony AI, Polyphony
Digital Inc.
and Sony Interactive Entertainment has led to the development of an AI
application called GT Sophy
that is capable of playing the Formula I car racing video game Gran Turismo
Sport.
Scientists say driving a Formula 1 race car is a really difficult task. Drivers
not only have to understand the intricacies of driving,
but also have to contend with the unpredictable behavior of their competitors
and often with dizzying calls from officials.
Announcing its press release , Sony noted that in addition to the technical
breakthroughs made in developing the application,
the company also demonstrated how artificial intelligence systems can improve
the overall experience for players.
This article is worth reading to keep up with the latest developments in the
world of motorsports.
https://techxplore.com/news/2022-02-sony-ai-gt-sophy-human.html
https://voca.ro/1etb5xMsqhLk
1)when compared
This product has extended and faster-acting functions when compared to other
testosterone esters.
2)case studies
The case studies illustrate different approaches that countries take to
implementing IFRS.
3)multiple levels
And the beauty of the book is that it works on multiple levels.
https://voca.ro/18oyOpcyTWxz
· #175
Denis Tsvetkov (Vorobyova RZ-213) (Friday, 03 June 2022 12:55)
Відпрацювання
Стаття :
https://www.zdnet.com/article/if-we-put-computers-in-our-brains-strange-things-might-happen-to-our-minds/
Today I have read the article "If we put computers in our brains, strange things
might happen to our minds"
This article is about how the human brain is incredibly adaptable. Thanks to
this, it can interact with an additional chip attached to the brain. And also
that with the help of this ability of the brain it will be possible to restore
some of its capabilities. For example, to help people with injuries of the brain
and spinal cord overcome paralysis of the limbs or loss of touch in parts of the
body.
I believe that this technology can help both in medicine and in everyday life,
and in the future it can help make new scientific discoveries.
Голосове : https://voca.ro/1dTvQmv48F2d
· #174
Denis Tsvetkov (Vorobyova RZ-213) (Friday, 03 June 2022 12:52)
Відпрацювання
Стаття : https://phys.org/news/2021-11-smart-octopus.html
Today i have read article "How smart is an octopus?"This article about how
researchers from the University of Queensland have discovered octopuses' unique
brainpower. They have studied several species that lived in different
environments and interacted with other animals with varying frequencies. The
study has shown that active interaction means more complex behavior comparable
to that of small mammals. It was also determined that larger brain's surface
area indicates more intricate cognitive abilities.
This article does a great job of shedding light on complexity of the octopus'
nervous system. To my mind, we know too little about marine life and the ocean
itself to set our minds on space.
Голосове : https://voca.ro/16yLgjBPZl2l
· #173
Denis Tsvetkov (Vorobyova RZ-213) (Friday, 03 June 2022 12:51)
Відпрацювання
Стаття :
https://theconversation.com/six-areas-where-action-must-focus-to-rescue-this-planet-170885.
Today I read the article "Six areas where actions should be concentrated to save
this planet." This article deals with a document that consists of six levels at
which environmental action should be taken. These six areas are energy
production, natural climate solutions, pollutants, food system reform,
population stability and economic reform. You can read exactly what actions need
to be taken to prevent global devastation. The main point of this document is to
draw attention to global problems and encourage people to do something useful
for our planet. In conclusion, I want to say that it is important for all of us
to unite and act as a truly effective cooperation.
Голосове : https://voca.ro/1okct2CKJPQk
· #172
Denis Tsvetkov (Vorobyova RZ-213) (Friday, 03 June 2022 12:50)
Відпрацювання
Стаття :
https://phys.org/news/2022-01-method-enzymes-ability-catalyze-new-to-nature.html
Today I have read an article ”Researchers develop a method that gives enzymes
the ability to catalyze new-to-nature reactions”.Enzymes are the preferred
natural catalysts and can catalyze reactions with surprising selectivity.Yang
and his research team have developed a method by which certain enzymes can be
coaxed into facilitating useful reactions that were never previously observed in
the biological world, thereby widening their repertoire and opening
possibilities for processes never before conducted by enzymes.The overall goal
of the researchers is to apply the developed biocatalysts in the pharmaceutical
and agrochemical industries.I fully agree with Associate Professor Yang that
with the help of new tools we will be able to develop valuable medicines and
herbicides that will be useful for our society.
Голосове : https://voca.ro/1motAjwszL8U
· #171
Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:48)
Відпрацювання
Стаття : https://phys.org/news/2021-07-teacher-burnout-exodus.html
Today I have read a short article called "Scientists Find Out That Burnout
Teachers Lead to Mass Quit." The teaching profession is very difficult
psychologically and many young teachers leave their jobs within 5 years. This
problem especially gained scale after the spread of COVID-19. Psychologists
argue that teacher burnout occurs in three stages: emotional exhaustion,
depersonalization, and declining academic performance. Undoubtedly, the
profession of a teacher is very important and valuable for us, although many do
not understand this. protecting teachers from burnout should be a central
element of international policy to reduce teacher turnover.
Голосове : https://voca.ro/15mL9U7jWyIM
· #170
Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:46)
Відпрацювання
Стаття : https://techxplore.com/news/2021-09-smart-city.html
Today I have read the article "Moving through a smart city." This is a very
interesting article, thanks to which I learned a lot of new interesting and
useful information.
This article discusses how to minimize the harmful effects of exhaust gases in
modern cities. Nowadays, this problem is quite relevant, as cars account for a
significant share of all environmental pollutants.
In general, I liked this article, because it describes methods of solving one of
the important problems, I also liked the structure of writing. I will recommend
my friends to read this article, because nowadays it is quite useful.
Голосове : https://voca.ro/1btAUIvvleBA
· #169
Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:46)
Відпрацювання
Стаття : https://techxplore.com/news/2020-09-5g-networks-health.html
Today I read an article ”5G networks: are there health risks?”.This article
raised such questions as: "What is 5G?"; "Special concerns about 5G?".5G is a
network that promises an exponential jump in the amount and speed of wireless
data transfer, and therefore more antennas will be required to communicate with
phones, as the 5G signal is blocked by buildings.Phones, TVs and other
electrical devices emit radiation, and with the 5G network, the WHO says no
radiation was detected during studies.5G networks currently use frequencies
close to those of Wi-Fi, but they will eventually use much higher frequencies.I
believe that 5G is a very important step for more advanced technologies in the
future.
Голосове : https://voca.ro/1c6uZ204Nj0Q
· #168
Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:45)
Відпрацювання
Стаття : https://phys.org/news/2022-04-composition-glasses.html
Today I have read the article "Improving the composition of radiation protection
glasses".It's about borate glasses, which are used in scintillation detectors of
ionizing radiation and for radiation protection.Boron oxide glass is an
environmentally friendly alternative to lead glass.But they have a low density,
which is one of the most important factors affecting the quality of radiation
protection.Also, they have the ability of the shielding material to attenuate
the passing gamma or X-ray radiation increases with increasing concentration of
cadmium in the glass composition.The fact that a high level of consumption is
important for the consumption of glass has been revealed, since such glasses are
used in a variety of cases.
Голосове : https://voca.ro/1ee7MSLYNg0h
· #167
Denis Tsvietkov. РЗ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:44)
Відпрацювання
Стаття:https://www.sciencedaily.com/releases/2022/04/220422094315.htm
Today I’ve read the article “Water processing: Light helps degrade
hormones”.Micropollutants in water often are hormones that accumulate in the
environment and may have negative impacts on humans and animals. Researchers of
Karlsruhe Institute of Technology (KIT) and Leibniz Institute of Surface
Engineering (IOM) in Leipzig have now developed a process for the photocatalytic
degradation of these pollutants when they flow through polymer membranes. It is
presented in Nature Nanotechnology. Irradiation with light triggers a chemical
reaction, as a result of which steroid hormones are degraded on the membranes
coated with titanium dioxide. "Supplying people with clean drinking water
presently is one of the most important challenges worldwide," says Professor
Andrea Iris Schäfer, Head of Institute for Advanced Membrane Technology.
Голосове : https://voca.ro/1lQfDvwd2ZNC
· #166
Neblienko V. / RZ-212 / Lebedeva (Friday, 03 June 2022 12:41)
(Отработка за 12.05.2022)
Exam topic #10 Software firewall.
A software firewall is a firewall that is installed on a computer or server and
is responsible for network security. It works with a wide range of other
security technology solutions to provide stronger, more consistent security for
businesses of all sizes.
When a software firewall is installed on a server, it expands like an umbrella
to protect all other computers connected to the network. It can monitor both
incoming and outgoing traffic for potential risk or suspicious user behavior,
and greatly simplifies, speeds up, and makes setting up security policies more
flexible.
Vocaroo: https://voca.ro/1cFEpgPskJFS
· #165
Neblienko V. / RZ-212 / Lebedeva (Friday, 03 June 2022 12:25)
(Отработка за 12.05.2022)
Today i have read the article titled: 'Societies living in harsh environments
more likely to believe in moralizing gods, study finds'. This text talks about a
new study that is not tied to the paradigm that the less food a person has, the
more likely he is to believe in some kind of deity, which, according to belief,
will descend on him and give him everything he needs. "When life is tough or
when it's uncertain, people believe in big gods," says Russell Gray, a professor
at the University of Auckland and a founding director of the Max Planck
Institute for History and the Sciences in Jena, Germany. "Prosocial behavior
maybe helps people do well in harsh or unpredictable environments." In my
opinion, this is true, because in hopelessness a person turns specifically to
the 'higher powers'.
Article:
https://phys.org/news/2014-11-societies-harsh-environments-moralizing-gods.html
Vocaroo: https://voca.ro/1lN85LNqjAO1
Phrases:
considerable disagreement
However, there was considerable disagreement among participants on the value of
some of the unconventional actions being taken by young people instead.
Тем не менее среди участников отмечались существенные разногласия по вопросу о
достоинствах некоторых из нетрадиционных мер, принимаемых взамен молодыми
людьми.
conduct research
Also, ISAR welcomed voluntary contributions by Governments and/or organizations
to conduct research and studies on environmental accounting.
Кроме того, МСУО приветствовала добровольные взносы правительств и/или
организаций для проведения исследований в области экологического учета.
controversial question
Another controversial question within the Liability Convention relates to the
provisions on the applicable law.
Применительно к Конвенции об ответственности возникает и другой спорный вопрос,
связанный с положениями, касающимися применимого права.
Vocaroo: https://voca.ro/1fy8vMP3tyIT
· #164
Gorbatiuk Stanislav RZ-213 (S.Mykhailiuk) (Friday, 03 June 2022 12:07)
1. Considerable disagreement
While progress has been made, considerable disagreement remained with regard to
a number of crucial issues. Хоча було досягнуто прогресу, залишаються значні
розбіжності щодо низки важливих питань.
2. Under international law, all countries have the right to conduct research and
develop their scientific capabilities for the peaceful uses of nuclear energy.
Відповідно до міжнародного права всі країни мають право проводити дослідження та
розвивати свої наукові можливості для мирного використання ядерної енергії.
3. Their work has provided new insights into the controversial question of
whether the languages we speak shape the way we think. Їхня робота дала нове
розуміння суперечливого питання про те, чи мови, якими ми розмовляємо, формують
наш спосіб мислення.
https://voca.ro/15XiXZqyImAN
Today I've read the article, which is titled "Robots may run future farms,
researchers say". This article tells us about how two University of Florida
professors say robots and information technology will rule the roost on farms in
the coming years. In the face of global challenges to produce more food, more
sustainably, the researchers urge scientists and growers to radically rethink
their approaches to farming. Robots and drones that could operate autonomously
24/7, may also collect large amounts of farm data and carry out tasks on the
field. The collected information can be used to optimize food production and
resource use, the researchers say, resulting in higher yields with less
fertilizer and pesticides. It definitely opens up new opportunities for other
jobs like developing and maintaining robots, drones, software and more.
https://techxplore.com/news/2019-02-robots-future-farms.html
https://voca.ro/1lFqp8JLNMgM
· #163
Igor Rudko (RZ-213) (S.Mykhailiuk) (Friday, 03 June 2022 12:05)
Audio: https://voca.ro/1l0INkGngAwW
Article: https://techxplore.com/news/2022-05-cyber-intrusion-industrial.html
Today I have read the article: "A cyber security intrusion detection system for
industrial control systems". Some group of scientists has developed technology
to help industry and government detect cyber threats to networks used in
critical infrastructure and manufacturing systems. By the way, the new
algorithms applied to the test network recognized normal Modbus or TCP traffic
and identified cyberattack vectors such as out-of-band timing, address probing,
and data fuzzing or manipulation. The algorithms classify data packets as
"regular" if they come from an uncompromised industrial control device or
"attack" if the source is an unexpected or compromised device. In my opinion, it
is really great that scientific society is interested in privacy problems and
trying to secure company's data
Phrases
Audio: https://voca.ro/17Md2U0JOPWz
1) conduct research - провести дослідження
Scientists trained an AI agent—an autonomous computational program that observes
and acts—how to conduct research experiments at superhuman levels by using the
same approach - Вчені навчили агента штучного інтелекту — автономну
обчислювальну програму, яка спостерігає та діє — як проводити дослідницькі
експерименти на надлюдських рівнях, використовуючи той самий підхід
2) considerable disagreement - значні розбіжності
When researchers discuss the forces that shaped human history, there is
considerable disagreement as to whether our behavior is primarily determined by
culture or by the environment - Коли дослідники обговорюють сили, які сформували
історію людства, виникають значні розбіжності щодо того, чи наша поведінка
визначається насамперед культурою чи навколишнім середовищем.
3) controversial question - спірне питання
Scientists have been searching for answers for years—mainly to the very
controversial question of whether the planets play a role in solar activity. -
Вчені роками шукали відповіді — в основному на дуже суперечливе питання про те,
чи відіграють планети роль у сонячній активності.
· #162
Kate Syrbu RZ-213 (S.Mykhailiuk) (Friday, 03 June 2022 11:53)
1) conduct research - провести дослідження;
It also has the authority to conduct research and studies and to carry out
construction projects.
Він також має повноваження проводити дослідження та виконувати будівельні
проекти.
2) considerable disagreement - значні розбіжності;
There was considerable disagreement regarding the definition of terrorism.
Існували значні розбіжності щодо визначення тероризму.
3) controversial question - спірне питання;
A good example is the potentially controversial question of prevention.
Хорошим прикладом є потенційно спірне питання профілактики.
https://voca.ro/1nCMWM3WaVbp
Exam topic #18
Special protection schemes (SPS) are designed to detect abnormal system
conditions and take predetermined, corrective action (other than the isolation
of faulted elements) to preserve system integrity and provide
acceptable system performance. SPS generally refers to controllers having some
or all of the following characteristics:
- SPS can be armed or disarmed depending on the system conditions.
- SPS usually employ discrete, feed-forward control laws.
- The control action taken is predetermined in most cases.
In my opinion, protection schemes are necessary devices that are used to protect
the power systems from faults.
https://voca.ro/1mWAqMwfmU3a
· #161
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:30)
The main protective mechanisms are activities aimed at ensuring engineering
measures of confidentiality, integrity and availability of information.
Protective mechanisms are divided into:
Physical - various engineering tools and structures that complicate or eliminate
the physical intrusion of offenders into objects of protection and into material
carriers of confidential information;
Hardware - mechanical, electrical, electronic and other devices designed to
protect information from leakage, disclosure, modification, destruction, as well
as counteraction to technical intelligence;
Software - special programs for computers that implement the functions of
protecting information from unauthorized access, copying, modification,
destruction and blocking;
Cryptographic - technical and software means of data encryption based on the use
of various mathematical and algorithmic methods;
When combined, these three mechanisms provide very strong protection of data and
computers.
https://voca.ro/1ivwiKOxaqX1
There was considerable disagreement regarding the definition of terrorism.
They shipped it here to conduct research.
A good example is the potentially controversial question of prevention.
https://voca.ro/11sJ2zPSfZK8
· #160
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:25)
Today i've read the article "Researchers propose novel blind source separation
framework for sound mixing"
the article tells about A Blind source separation (BSS) aims to estimate source
signals from observed
mixtures without prior information about the source or mixing system.
Recently, researchers from the Institute of Acoustics of the Chinese Academy of
Sciences (IACAS)
proposed a BSS framework based on the frequency-domain convolution transfer
function, which provides
a new idea for solving the BSS problem in highly reverberant environments.
Without employing the narrowband assumption, they approximated the time-domain
convolutive mixture using
a frequency-wise convolutive mixture, and proposed a convolution transfer
function (CTF)-based multichannel
nonnegative matrix factorization (MNMF) framework for BSS in highly reverberant
environments.
This article is worth reading for people who are into music to keep up to date
with new sound mixing systems.
https://techxplore.com/news/2022-03-source-framework.html
https://voca.ro/17tjHvY8PdJ7
1)the main objective
The review had found that the main objective of offshoring was cost-saving.
2)by means of
The information can be extracted by means of your suffering.
3)published in
The latest progress report on combating social exclusion was published in
February 2007.
https://voca.ro/19J04WPzfzK4
· #159
Shpychka Olecksandr/ RZ-213 (S.Mykhailiuk) (Friday, 03 June 2022 11:22)
Article:
https://techxplore.com/news/2022-03-cyberattacks-requires-smarter-approach.html
Audio: https://voca.ro/16Bmt1ss3Zgi
Today i have read the article: "Protection against cyberattacks requires smarter
approach"
From the article, we learn that companies often neglect the security of their
data. This is due to the fact that not so much money is allocated for
cybersecurity. Many companies are investing in security practices that were
previously used by other companies. By doing so, they expose themselves to data
leakage, which can often be very secret. And because of this, they lose even
more money.
In my opinion, in order to limit themselves from the risks of cyber attacks,
companies should properly invest in their security.
Phrases of the day:
1)conduct research
Scientists are going to conduct research of cybersecurity in the company.
(Вчені планують провести дослідження кібербезпеки у компанії.)
2)controversial questions
There are controversial questions in the topic of algorithms.
(У темі алгоритмів є спірні питання.)
3)considerable disagreement
There are considerable disagreement on each of these aspects of the strategy.
(Існують значні розбіжності щодо кожного з цих аспектів стратегії.)
Audio: https://voca.ro/11iOW6Nl1Gws
· #158
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:22)
Different protection mechanisms.
The article is devoted to the little-studied problem of mass psychological
defense mechanisms. Despite the achievements of world psychology,
this problem remains an "unknown land" for the humanities. A description is
given of the functioning of all the basic defense mechanisms of civilization,
as enshrined in its system-forming parts, such as politics, ideology, religion,
philosophy, and everyday practice. Examples of projection, introjection,
idealization, sublimation, identification, rationalization, retroflexion,
confluence, etc. are given. Psychological protection is a necessary
characteristic of culture,
which provides answers to various civilizational challenges and reduces the
likelihood of crisis risks. The further existence and development of
civilization,
will lead to the emergence of new forms of protective mechanisms, so a broad
strengthening of existing ones is required.
https://voca.ro/1mG35emKQU6L
1)little is known about
Very little is known about fighting elsewhere in this vast territory.
2)main limitation
As you can see the process is very simple to implement, let's see now what is
the main limitation.
3)based partly on
Our drive systems are based partly on magnetic and gravitational principles.
https://voca.ro/1koFi4HQSXVt
· #157
Bogdan Gorbatiy RZ-211 (Vorobyova E. V.) (Friday, 03 June 2022 11:20)
Today i've read the article "Sony's AI system GT Sophy beats 95% of human
competitors at Gran Turismo Sport"
the article tells about A collaboration between engineers at Sony AI, Polyphony
Digital Inc.
and Sony Interactive Entertainment has led to the development of an AI
application called GT Sophy
that is capable of playing the Formula I car racing video game Gran Turismo
Sport.
Scientists say driving a Formula 1 race car is a really difficult task. Drivers
not only have to understand the intricacies of driving,
but also have to contend with the unpredictable behavior of their competitors
and often with dizzying calls from officials.
Announcing its press release , Sony noted that in addition to the technical
breakthroughs made in developing the application,
the company also demonstrated how artificial intelligence systems can improve
the overall experience for players.
This article is worth reading to keep up with the latest developments in the
world of motorsports.
https://techxplore.com/news/2022-02-sony-ai-gt-sophy-human.html
https://voca.ro/1etb5xMsqhLk
1)when compared
This product has extended and faster-acting functions when compared to other
testosterone esters.
2)case studies
The case studies illustrate different approaches that countries take to
implementing IFRS.
3)multiple levels
And the beauty of the book is that it works on multiple levels.
https://voca.ro/18oyOpcyTWxz
· #156
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:13)
today i have read the article "Google Cloud unveils Healthcare Data Engine for a
holistic view of health data"
this article is about the new development of google in the field of medicine.
According to them, this invention helps to work faster with patient data. thanks
to this, you can find out everything about the client, from his simple illnesses
to clinical.
doctors say that for them a quick search for information about patients is a
priority, as this will speed up their work. in addition, many companies have
supported this idea and cooperate with hospitals.
This article really impressed me. I think this development is very important and
useful today and i like that medicine is upgrading.
https://www.zdnet.com/article/google-cloud-unveils-healthcare-data-engine-for-a-holistic-view-of-health-data/
https://voca.ro/1MT4PLWJPkxf
The report concludes by outlining briefly major issues in the financing of the
sectoral clusters under review
Anti-personnel mines are classified as excessively injurious weapons.
He knows technical details beyond the scope of his job
https://voca.ro/1i4CrCGPCoCN
· #155
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 03 June 2022 11:09)
The primary principles of information protection form a triad-like model
consisting of three main components: confidentiality, integrity and
availability.
The principle of confidentiality asserts that the information in question is
secure from any unauthorized access to it, and is kept secret.
Information integrity refers to the certainty that the information is not
tampered or degraded, during and after submission or while working with it.
Availability of information suggests not only that the information is available
to the authorized user when it is needed, but also that it doesn't compromise
any information security in the process of delivering information to the user.
https://voca.ro/1jc4jv81Wkjt
1) It is impossible to conduct research with the conditions imposed by
superiors.
2) Comprehensive investigation can be carried out only after the internal one.
3) Comparative investigation of goods and services should be held regularly.
https://voca.ro/18oJwAYSnDUY
· #154
Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 03 June 2022 11:09)
Prhases of Day
considerable disagreement(значні розбіжності): https://voca.ro/101jTZiTnHG8
There's been considerable disagreement among lawmakers and the space community
on how best to accomplish this.
Між законодавцями та космічним співтовариством виникли значні розбіжності щодо
того, як найкраще цього досягти.
conduct research(провести дослідження) : https://voca.ro/18yH6JO7eu1z
Data centers form the "cloud" that helps people stream movies, conduct research
at the touch of a button, buy things and store photos and videos
Центри обробки даних утворюють «хмару», яка допомагає людям транслювати фільми,
проводити дослідження одним натисканням кнопки, купувати речі та зберігати
фотографії та відео
controversial question(спірне питання) : https://voca.ro/1mhnD3LunZLZ
In particular, how the disease is transmitted to great apes was a controversial
question until now.
Зокрема, питання про те, як ця хвороба передається людиноподібним мавпам, досі
було спірним.
Article: https://phys.org/news/2015-10-cyberattack.html
Audio: https://voca.ro/1fmW5CXT4MhH
Today, I have had an opportunity to read the article about the things you need
to know to prevent cyberattacks.
First, we all need to understand that there is no perfect security system, and
therefore there is always a risk of hacking, or cyber attacks
The next thing that is mentioned is the security update of systems, software,
telephony and more. Because this ensures that certain vulnerabilities in the
system have been fixed.
As a result, you should not use software or operating systems that are not
supported such as Windows XP.
But in my opinion, the most important thing is to use different passwords,
different computers for work and other things, not to open unknown sites or
software and not to give them access to the system
I am sure that these tips will help reduce the risk of hacking and cyber attacks
to a minimum.
· #153
Anna Yakymova/ RZ-213(S.Mykhailiuk) (Friday, 03 June 2022 11:01)
Phrases of the day:
1) controversial question - спірне питання
Whether fishes are sentient beings remains an unresolved and controversial
question.
(Чи є риби розумними істотами, залишається невирішеним і суперечливим питанням.)
Links: https://phys.org/news/2015-11-fish-emotional-fever.html
https://voca.ro/15R5ZUqCCBqW
2) conduct research - провести дослідження
But lack of connectivity severely hinders an organization's ability to perform
simple functions, conduct research, and compete for grants.
(Але відсутність зв’язку серйозно заважає організації виконувати прості функції,
проводити дослідження та змагатися за гранти.)
Links: https://techxplore.com/news/2020-10-internet-oxygen.html
https://voca.ro/1mT3bx2NSQAL
3) considerable disagreement - значні розбіжності
Even in a small organization, there is likely to be considerable disagreement on
each of these aspects of strategy.
(Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо
кожного з цих аспектів стратегії.)
Links: https://phys.org/news/2019-12-social-efforts-effective.html
https://voca.ro/16q63F9fYOo0
Review:
Today I’ve read the article “Robots may run future farms, researchers say”. It
tells about the automation of agriculture with the help of drones and robots.
This solution can reduce labor costs. Robots will also be a good replacement for
the tractor, as heavy machinery used in place of higher labor costs has
compacted the soil, resulting in slower root growth, reduced soil fertility, and
ultimately lower yields. Drones will be able to collect large amounts of farm
data.
I think this is a great idea, as it will make food cheaper and give rise to new
professions.
links : https://techxplore.com/news/2019-02-robots-future-farms.html
https://voca.ro/15FeqAm68ZXe
· #152
Chabanenko Ksenia RZ-213(S.Mykhailiuk) (Friday, 03 June 2022 11:01)
1.considerable disagreement - значні розбіжності/суперечки ;
There was considerable disagreement over several key sections of the project
among the researchers.-Серед дослідників виникли значні розбіжності щодо кількох
ключових розділів проекту.
2.conduct research-провести дослідження;
The university enjoys facilities and expertise to conduct research in the field
of protection of the data.-Університет має засоби та досвід для проведення
досліджень у сфері захисту даних.
3.controversial question -спірне питання;
Which of the information protection measures are most successfully used is the
controversial question that is prevalent among experts.-Які із засобів захисту
інформації використовуються найбільш успішно – спірне питання, яке переважає
серед експертів.
https://voca.ro/12QdokjZD2Wr
Exam topic #16( The Essentials of Information Protection)
Present-day realities of the information society determine the necessity of
protecting the informaton from unauthorised access, use, disclosure, disruption,
modification, or destruction. The CIA triad is a model designed to guide
policies for information security and consists of three main principles
:confidentiality, integrity and availability. Information security policy should
be end to end and it should cover all software, hardware devices, physical
parameters, human resource, information/data, access control, etc.Whenever there
is a major change in the organization, it should be ensured that the new updates
are addressed in the policy as well. Incorporating the risk assessment is also
the priority purpose. So, the information protection is based on the principles
and includes above-mentioned characteristics that provide a good basis for
further protection.
https://voca.ro/1leatmIRxN2p
· #151
Anton Ardelyan RZ-211(Gvozd O.V.) 24.05 (Friday, 03 June 2022 10:32)
Today i have read the article "New method ensures complex programs are bug-free
without testing": a collaborative effort between Microsoft, the University of
Michigan and Carnegie Mellon University was recognized by the ACM's Programming
Language Design and Implementation group with a Distinguished Paper Award for a
method that ensures complex computer programs are bug-free without having to
test them. The method uses a technique called formal verification to prove
whether a piece of software would output the intended result.
Link: https://techxplore.com/news/2020-06-method-complex-bug-free.html
Audio: https://voca.ro/13LwsD3BiMKV
Phrases:
1)They also conduct research on the same.
Вони також проводять дослідження з цього приводу.
2)There is considerable disagreement about how much overcapacity exists.
Існують значні розбіжності щодо того, скільки існує надлишкових потужностей.
3)This highly controversial question was finally resolved.
Це дуже суперечливе питання було нарешті вирішене.
Audio: https://voca.ro/1bh6AnQ2YbQB
· #150
Neblienko V. / RZ-212 / Lebedeva (Thursday, 02 June 2022 21:46)
Exam topic #12 Hardware firewall.
A hardware firewall is a physical appliance that is deployed to enforce a
network boundary. All network links crossing this boundary pass through this
firewall, which enables it to perform inspection of both inbound and outbound
network traffic and enforce access controls and other security policies.
These firewalls, which contain both the hardware and software features necessary
to enforce a network boundary, can offer a variety of different networking and
security features, including URL filtering, an intrusion prevention system
(IPS), and even Wi-Fi support.
Therefore, the dexterity of protecting networks and the use of security and
protection of all kinds of traffic.
Vocaroo: https://voca.ro/13UieMAzI5Wu
· #149
Neblienko V. / RZ-212 / Lebedeva (Thursday, 02 June 2022 21:23)
Today i have read the article titled: What we knew about water was right after
all. This text tells about the manifestation of record-breaking small drops of
hydrogen peroxide in water drops, the size of a micrometer.
The air-water interface is a crucial site for numerous natural, domestic and
industrial processes such as ocean-atmosphere exchange, cloud and dew formation,
aerated beverages and bioreactors. Yet, probing chemical transformations at the
air-water interface is challenging due to the lack of surface-specific
techniques or computational models.
In my opinion, it is quite possible to adapt this record in the right direction,
despite the fact that there are no special methods for studying the air-water
type.
Article: https://phys.org/news/2022-02-knew.html
Vocaroo: https://voca.ro/1nJf3LbUh3b6
Phrases:
comprehensive investigation of
The Secretary-General informed the Council that a more comprehensive
investigation of the 5 June 1993 incident was being undertaken.
Генеральный секретарь информировал Совет о том, что ведется более широкое
расследование инцидента, произошедшего 5 июня 1993 года.
condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Выдвижение Комитетом такого нового условия не может не привести к возникновению
серьезных юридических трудностей.
comparative investigation of
Stiftung Warentest carries out more than 200 comparative product tests and
investigations of services from nearly all areas of everyday life every year.
Ежегодно Штифтунг Варентест проводит более 200 испытаний качества товаров и
услуг, представляющих почти все сферы повседневной жизни.
Vocaroo: https://voca.ro/1491MVpmDpKH
· #148
S.Mykhailiuk (Thursday, 02 June 2022 20:44)
To Anna Yakymova/ RZ-213 just good for two tasks. Thanks.
· #147
S.Mykhailiuk (Thursday, 02 June 2022 20:38)
To Eugene Chervony RT-212 You’ve broke a record today! For all your activities you’ve earned 80 points.
· #146
S.Mykhailiuk (Thursday, 02 June 2022 20:27)
To Tomchishina Polina RT-212
DEBT
Exam topic #12,
Benefits of Satellite TV + #9 are good.
· #145
S.Mykhailiuk (Thursday, 02 June 2022 20:20)
To Tomchishina Polina RT-212 Thanks just 80 points.
· #144
S.Mykhailiuk (Thursday, 02 June 2022 20:18)
To Stanislav Popik РТ-212 Task1 just 75 points .Talking about the transistor, one has to mention the elements - A small electronic device containing a semiconductor and having at least three electrical contacts, used in a circuit as an amplifier, detector, or switch.
· #143
S.Mykhailiuk (Thursday, 02 June 2022 20:06)
To Tomchishina Polina RT-212 just 82 poi nuts for exam topics. Thanks
· #142
S.Mykhailiuk (Thursday, 02 June 2022 19:59)
To Stanislav Popik РТ-212 Just good. Try to formulate the sentence clearer ( analog to digital transitions....).
· #141
Popovych E. (Thursday, 02 June 2022 19:56)
To Povoznikov Artem RZ-212
Artem, thank you for your comment and voice message. But mind, pls, the exam
topic and the comment are too long. It should include up to 100 words. Use Word
Count Tool to check it. Go on working.
· #140
S.Mykhailiuk (Thursday, 02 June 2022 19:50)
To Sergey Kyznyak RT-211, pls expand your vocabulary .” Allow-allows)”. Train
your pronunciation before you record msg. Mind the word: an-ˈte-nə\ noun
(plural an·ten·nae \-(ˌ)nē).just satisfactory.
· #139
Popovych E. (Thursday, 02 June 2022 19:49)
To Timophey Sipin RZ-212
Exam topic #20 (Principles of information protection) is well done.
Thank you, your comment, audio are quite correct as well as sentences with
Phrases
· #138
Popovych E. (Thursday, 02 June 2022 19:47)
To Kate Kholodova (RZ-212)
Exam topic #12 (8/10) Hardware firewall is well done.
Thank you, you have successfully completed the task.
· #137
S.Mykhailiuk (Thursday, 02 June 2022 18:29)
To Pishtoi Misha (PT-212) Task1 on is good.
· #136
S.Mykhailiuk (Thursday, 02 June 2022 18:22)
To Simchuk Alexey (Mykhailiuk RZ-213) Its a shallow approach, just pieces of texts. UNACCEPTED.
· #135
S.Mykhailiuk (Thursday, 02 June 2022 18:19)
To Simchuk Alexey RZ-213 Task2 and task3 represent a piece of texts with quotes. Pls prepare thoroughly with conclusion. Just satisfactory.
· #134
Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 18:16)
Відпрацювання 4
"Asteroid the size of a blue whale will fly past Earth in close impact on June
6", this article today made me wonder if we are safe. The asteroid is predicted
to fly past Earth by more than 2 million miles. According to NASA, the asteroid
is three times More blue whales will fly past Earth on Monday (June 6) at over
16,000 miles per hour (26,000 km/h).(Opens in a new tab).
The asteroid, named 2021 GT2, is predicted to safely fly past our planet more
than 2.2 million miles (3.5 million kilometers), about 10 times the average
distance between the Earth and the Moon. Astronomers first discovered the space
rock last year and estimated its size to be between 121 and 272 feet (37 to 83
meters) wide. While that sounds like a lot — one to three times the length of a
blue whale (opens in a new tab) — it's not big enough to be considered
potentially dangerous to Earth.
2021 GT2 is an Aten-class asteroid, which means it orbits the Sun closer than
Earth (in this case once every 342 days) and its orbital path intersects Earth's
orbit. Astronomers are aware of more than 1,800 such asteroids, many of which
are considered potentially dangerous. After June 6, its next close approach to
Earth will occur on January 26, 2034, when the asteroid will pass within 9
million miles (14.5 million kilometers) of our planet - much further than the
upcoming convergence.
An asteroid is considered a near-Earth object, a term given to asteroids and
comets that orbit within 1.3 astronomical units of the Sun. (An astronomical
unit is the distance between the Earth and the Sun, about 93 million miles or
149.6 million kilometers.) NASA tracks tens of thousands of these objects,
predicting the paths of each from today to hundreds of years into the future. At
the moment, astronomers do not think that any near-Earth objects pose a threat
to the Earth.
However, scientists want to be prepared for the fact that the trajectory of a
near-Earth asteroid will suddenly change after an unexpected incident - say, one
near-Earth asteroid will collide with another and scatter large pieces of debris
throughout the solar system.
NASA is currently testing whether it is possible to knock a large asteroid off
course by hitting it with a rocket. In November 2021, NASA launched an
asteroid-deflecting spacecraft called the Double Asteroid Redirection Test
(DART) that will crash into the 530-foot-wide (160 m) asteroid Dimorphos in the
fall of 2022. an asteroid, but it could change the rock's orbital path slightly,
as Live Science previously reported.
Article:https://www.space.com/asteroid-2021-gt2-close-flyby-earth
· #133
S.Mykhailiuk (Thursday, 02 June 2022 18:12)
To Simchuk Alexey (Mykhailiuk RZ-213) “Vcheni ochіkuyut, scho nezabarshe ... Pls don’t use Google translator as it can turn you down. Did you take the material for all comments you compiled from one source? Just satisfactory for all your tasks. Pls do it during the session scheduled.
· #132
Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 18:07)
Відпрацювання 3
Each of us was interested in space and when people will be able to live on other
planets, every year people are more and more moving towards this. One of the
examples is the company "", they are trying to figure out how and why now people
are not ready to live on other planets, but their the target is Mars. This is
what I read about in an article titled: "SpaceX President confirms plans to land
people on Mars by the end of the 2020s." She talks about how SpaceX President
and COO Gwynne Shotwell reaffirmed SpaceX's goal of landing humans on Mars. She
says landing humans on Mars is possible by the end of the 2020s, but landing
humans on the moon could happen sooner.
NASA recently activated an option in one of its contracts with SpaceX to include
the SpaceX Human Landing System design on the Artemis III mission. The space
agency says it may give other aerospace agencies the opportunity to submit
designs for lunar landers to ferry astronauts between lunar orbit and specific
locations on the moon as part of its fledgling Sustaining Lunar Development
program.
NASA plans to use the Artemis program and the Lunar Gateway to provide a more
sustainable presence on the Moon than was possible during the Apollo program of
the 1960s and early 1970s. NASA planned to develop more robust Apollo-based
hardware for the extended lunar exploration missions that were planned under the
Apollo Applications Program, but this was delayed due to budget cuts.
SpaceX's current contracts with NASA include launching the initial components of
the Lunar Gateway on a Falcon Heavy rocket as early as May 2024. The company
also has contracts with other aerospace companies such as Intuitive Machines to
launch automated lunar landers that are being developed for NASA.
SpaceX is also working on its Starship/Super Heavy stack, which will be capable
of everything from sending large payloads and people to Mars to sending cargo
from point to point on Earth. Its scheduled orbital test for Starship is
currently being delayed by the FAA's regulatory review process, resulting in
months of delays.
If the FAA gets out of the way, SpaceX could get serious about its plans for
Mars. Sending humans to Mars in ten years could be feasible if everything goes
smoothly in the next few launch windows. The launch window for sending payloads
(and eventually people) opens once every 26 months. In the video below, Mars
Society President Robert Zubrin unveils an updated version of Mars Direct that
uses SpaceX rockets as part of a cheaper plan to get humans to Mars in less time
than other plans at the International Space Development Conference.
SpaceX could borrow elements from Mars Direct to get humans to Mars in less than
a decade. Gwynne Shotwell mentioned that it might take a big gesture for the
average person to see it's feasible: "I think we need to get a big payload to
the surface of Mars and then people will start thinking more about it. … In five
or six years, people will see that this is really a place to go.”
Article:https://www.redorbit.com/spacex-president-reiterates-plans-to-land-people-on-mars-by-end-of-2020s/
· #131
S.Mykhailiuk (Thursday, 02 June 2022 18:06)
To Moskalenko Kirill(РТ-212) Task1 has no link to the article. The punctuation marks are different in English. Task2 is incomplete ( no phrases written separately) just satisfactory.
· #130
Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 17:59)
Відпрацювання 2
We have always been scared of global warming, but not everyone knows about other
planets where the temperature melts even stones. It was such an article that I
came across today, it has an intrusive title, namely: "NASA is in the middle of
hell: the last ones want to save the planet, on which the stone will melt."
Vcheni ochіkuyut, scho nezabarshe able to report ahead to look at the
"super-Earth", like 50 bright rocks in our planet.
Specialists are aware that an unprecedented look at a distant planet can be
provided by the James Webb telescope, a scientific robot that will soon start in
the lime.
About Phys.org. The planet under the name 55 Cancri e is moving so close to its
own star, that the mind on the planet is literally similar to the description of
biblical hell. Behind the words of the astronomers, the surface of the planet is
constantly falling. Likewise, the planet can turn around, creating at once a
thirsty mind.
"Even though the temperature on the surface of the planet is richer than the
melting point of the most important rock-forming minerals, the bottom side is
covered with lava oceans," according to NASA.
NASA has been assigned that nothing like this will be known until this hour in
our Sonyachny system.
Let's guess, earlier in the day, ExoMiner discovered 301 exoplanets for
additional neuromeasurement. The stinks added a list of 4569 planets that wrap
around like distant stars, and already they were vіdomі vchenim.
Article:https://tsn.ua/nauka_it/nasa-zazirne-u-spravzhnye-peklo-doslidniki-hochut-vivchiti-planetu-na-yakiy-plavitsya-kaminnya-2076961.html
· #129
Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 17:52)
Відпрацювання 1
"In the USA they created a controlled 0.5 mm robot," this is the title of the
article that I read today and it surprised me, the University of the Northwest
reported that its employees had designed a "Lilliputian" robot with the
possibility of remote control. Its dimensions do not exceed half a millimeter,
according to the developers, their brainchild is capable of walking, turning,
tilting and jumping. The exterior of the bot resembles the shape of a crab. The
average movement speed is 50% of its size per second.
The ability to move is provided, among other things, by the unique
characteristics of the materials from which the robot was made. It is
distinguished by such properties as shape memory and change under the influence
of a rapid increase in temperature. Using a laser, you can change the shape of
the robot's body and thus make it move.
The use of such developments in robotics in the near future can significantly
help a number of industries, including the medical one.
Article:https://www.gismeteo.ru/news/science/v-ssha-sozdali-upravlyaemyj-0-5-millimetrovyj-robot/
· #128
S.Mykhailiuk (Thursday, 02 June 2022 17:32)
To Sergey Kyznyak RT-211, The task contains general approach to the conclusion
and has a grammar mistake ( remember :the article SAYS). Everybody has learned
this.
Task2 with an unofficial language is UNACCEPTED!
· #127
S.Mykhailiuk (Thursday, 02 June 2022 17:26)
To Moskalenko Kirill(РТ-212) The task one is incomplete and has no conclusion. Just 70 points.
· #126
S.Mykhailiuk (Thursday, 02 June 2022 17:21)
To Khotynskiy Oleg (РЗ-212) the exam topic should be formulated by your own words and sentences. Just satisfactory. Task2 is 80 points. Keep on working hard.,
· #125
S.Mykhailiuk (Thursday, 02 June 2022 17:08)
To Simchuk Alexey РЗ-213 The comments are too lengthy and without the conclusion. 60 points.
· #124
Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 13:36)
Exam topic #17
A password is a personal key to a computer system. Passwords help to ensure that
only authorized individuals access computer systems. Passwords also help to
determine accountability for all transactions and other changes made to system
resources, including data. A good password is relatively easy to remember, but
hard for somebody else to guess. There are a variety of techniques we can use to
choose secure passwords. There are some tips for creating a passwords:
-Passwords should be long and unique.
-Old passwords should not be re-used.
-All passwords should conform to the guidelines outlined below.
https://voca.ro/17yrweGZOsaZ
· #123
Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 13:16)
Exam topic #16
The basic tenets of information security are confidentiality, integrity and
availability. Every element of the information security program must be designed
to implement one or more of these principles. Together they are called the CIA
Triad. Confidentiality measures are designed to prevent unauthorized disclosure
of information. The principle of integrity ensures that data is accurate and
reliable and is not modified incorrectly, whether accidentally or maliciously.
Availability is the protection of a system’s ability to make software systems
and data fully available when a user needs it.
https://voca.ro/1856GReabYpR
· #122
Simchuk Alexey (Mykhailiuk RZ-213) (Thursday, 02 June 2022 13:05)
In the 21st century, more and more mechanized and most of what a person did is already done by a robot, but can a robot replace a person’s limbs or body part, in an article titled: “Printed electronic skin based on synaptic transistors for robots so that they can feel and learn," this is exactly what the story is about. It is expected that the electronic skin (e-skin) for the next generation of robots will have a biological skin similar to multimodal perception, signal coding and pre-processing. To do this, it is extremely important to have high-quality, uniformly responsive electronic devices distributed over large areas and capable of providing synaptic behavior with long-term and short-term memory. Here we present an approach to implement synaptic transistors (12 by 14 matrix) using ZnO nanowires printed on a flexible substrate with 100% yield and high uniformity. The presented devices demonstrate synaptic behavior in response to impulse stimuli, demonstrating excitatory (inhibitory) postsynaptic current, spike frequency-dependent plasticity, and transition from short-term to long-term memory. The implemented transistors exhibit excellent biosimilar synaptic behavior and show great potential for hardware learning. This has been demonstrated using a prototype computational electronic skin composed of event-driven sensors, synaptic transistors, and firing neurons that give the robotic arm a skin-like tactile experience. Through associative learning, the presented computer electronic skin can gradually acquire a pain reflex similar to the human body. Learned behavior can be reinforced by practice. Such localized learning, similar to the peripheral nervous system, could significantly reduce data latency and reduce the cognitive load on the robotic platform. the presented computer electronic skin can gradually acquire a pain reflex similar to the human body. Learned behavior can be reinforced by practice. Such localized learning, similar to the peripheral nervous system, could significantly reduce data latency and reduce the cognitive load on the robotic platform. the presented computer electronic skin can gradually acquire a pain reflex similar to the human body. Learned behavior can be reinforced by practice. Such localized learning, similar to the peripheral nervous system, could significantly reduce data latency and reduce the cognitive load on the robotic platform.
· #121
Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 12:52)
Exam topic #15
Claims-based identity is a means of authenticating an end user, application or
device to another system in a way that abstracts the entity's specific
information while providing data that authorizes it for appropriate and relevant
interactions. This authentication method provides user information automatically
so applications do not need to request it of the user and the user doesn't have
to provide that information separately for different applications. Claims-based
identity depends on trust relationships being established between those making
the claims and any relying parties. A relying party will only accept claims
about a user's identity from a trusted issuer.
https://voca.ro/1nHGWJEFt4FZ
· #120
Anton Ardelyan RZ-211(Gvozd O.V.) 10.05 (Thursday, 02 June 2022 12:47)
Today i have read the article "Researcher hacks into 35 major technology firms"
a Romanian threat researcher announced that he had been able to hack into
computer systems at 35 major technology firms. Alex Birsan, an independent
threat researcher, claimed that he had been able to hack into computers run by
some of the biggest names in the IT business—Paypal, Apple, Microsoft, Tesla and
Netflix—even after he had warned them ahead of time that he would be trying.
Link: https://techxplore.com/news/2021-02-hacks-major-technology-firms.html
Audio: https://voca.ro/1ij0Z3ru6XSp
Phrases:
1)In the present study, we undertook a comparative investigation of primary
cilia in cultured primary human astrocytes and compared them to those found in
five human astrocytoma/glioblastoma cell lines.
У цьому дослідженні ми провели порівняльне дослідження первинних вій у
культивованих первинних астроцитах людини та порівняли їх з тими, які виявлені у
п’яти клітинних лініях людської астроцитоми/гліобластоми
2)This was a unilateral condition imposed by David Trimble, the leader of
Ulster's main Protestant party.
Це була одностороння умова, встановлена Девідом Трімблом, лідером головної
протестантської партії Ольстера.
3)This study is the most comprehensive investigation of the animal reservoir of
SARS," Dr. Stöhr said
Це дослідження є найповнішим дослідженням резервуару ГРВІ у тварин», - сказав
доктор Штер.
Audio: https://voca.ro/1dYrhoGHDIny
· #119
Yershova Y. (Thursday, 02 June 2022 12:33)
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 12:09)
You did this topic on Friday, 29 April 2022 18:16
· #118
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 02 June 2022 12:29)
Exam topic #20 (Principles of information protection)
Information protection is the practice of preventing unauthorized access, use,
disclosure, distortion, alteration, research, recording or destruction of
information. There are some basic principles of it including consistency,
complexity and continuity that mean the need to take into account all weaknesses
and vulnerabilities, harmonize the work of heterogeneous means and take
appropriate measures at all stages of the cycle.The principle of flexibility in
the management and application of the protection system implies the possibility
of varying the level of its protection. Also, the protection should not be
achieved at the expense of secrecy according to the principle of openness of
security algorithms.So, information protection is based on the above- mentioned
principles which ensure success of protection system.
https://voca.ro/1iNL9IRhkXw1
· #117
Lebedeva E. (Thursday, 02 June 2022 12:29)
To Andrey Mashovets RZ-212 Now I am waiting for the work with phrases.
Badyuk Eduard RZ-212 Well done.
· #116
Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 12:25)
Exam topic #14
Authority check is a check to determine whether the current user of a program
has a certain authorization. The check compares a value with the corresponding
entries in each authorization field in an authorization object in the user
master record. Check indicators control whether an authorization check is
performed. The system first checks authority to the library or directory path
that contains the object. If the authority to the library or directory path is
adequate, the system checks authority to the object itself. In the case of
database files, authority checking is done at the time the file is opened, not
when each individual operation to the file is performed.
https://voca.ro/15Uo6XUY38d2
· #115
Khotynskiy Oleg (RZ-212, S.Mykhailiuk) (Thursday, 02 June 2022 12:23)
Exam topic #3 (Different approaches to secrecy and their defects.)
The group of technical means of information protection combines hardware and
software. Main:
1. Backup and remote storage of the most important data arrays in a computer
system - on a regular basis;
2. Duplication and redundancy of all network subsystems that are important for
the safety of data;
3. Creation of an opportunity to redistribute network resources in cases of
malfunction of individual elements;
4. Ensuring the ability to use backup power supply systems;
5. Ensuring safety from fire or water damage to equipment;
6. Installing software that protects databases and other information from
unauthorized access.
The set of technical measures also includes measures to ensure the physical
inaccessibility of computer network objects, for example, such practical methods
as equipping a room with cameras and alarms.
https://voca.ro/1cDHlkF0Yubo
1) comprehensive investigation of
This is also the reason why Ethiopia has been adamantly resisting a
comprehensive investigation of all the events that led to the current crisis.
Це також є причиною того, що Ефіопія непохитно протидіє комплексному
розслідуванню всіх подій, які призвели до нинішньої кризи.
2) condition imposed by
Therefore, any condition imposed by the affected State must be reasonable and
must not undermine the duty to ensure protection of persons on its territory.
Тому будь-яка умова, встановлена постраждалою державою, має бути розумною і не
повинна підривати обов’язок забезпечити захист осіб на її території.
3) comparative investigation of
Comparative investigations based on DNA analysis were performed by the
Netherlands Forensic Institute (NFI), in response to a request made by the
United Nations Mission.
Порівняльні дослідження на основі аналізу ДНК були проведені Нідерландським
інститутом судової експертизи (NFI) у відповідь на запит Місії ООН.
https://voca.ro/133zdRSpl6JM
· #114
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 12:23)
Today I have read the article : «Artificial intelligence can help you understand
music better»
Algorithms and technology have so far helped listeners to more of the same
music. Now, UiO researchers are working on new technology that can get people
interested in a greater musical variety. Olivier Lartillot, researcher at RITMO
Center for Interdisciplinary Studies in Rhythm, Time and Motion, believes
technology can expand people's taste in music through a better understanding of
musical elements. He says that people often listen to the music they can
understand easily, therefore some more complicated types of music become less
accessible, and that's where this technology comes in.
I liked this article because I love listening to music and too have some types
of music I don't want to listen to because of their complexity.
https://voca.ro/1ehLiGb7UPdp
It's comment more correctly. I prepared it for the next lesson. I'm sorry, but i
always forget about links to the articles. So, this comment without link too.
· #113
Andrey Mashovets RZ-212(Lebedeva E.) (Thursday, 02 June 2022 12:20)
Exam Topics “Different protection mechanisms”.
This article is about general information on protection mechanisms.
The purpose of this article is to understand how different security mechanisms
are used in information security management.
Protection mechanisms are used to enforce layers of trust between security
levels of a system. Particular to operating systems, trust levels are used to
provide a structured way to compartmentalize data access and create a
hierarchical order. These protection mechanisms are used to protect processes
and data and are discussed in the following sections: Layering, Abstraction,
Data Hiding, Encryption.
The purpose of this article is to give a notion in knowledge of the protection
mechanisms used in information security.
https://voca.ro/18O5fXz1UEBQ
https://www.pearsonitcertification.com/articles/article.aspx?p=30287&seqNum=8
· #112
Yakymova Anna / RZ-213 (Vorobyova E. V.) (Thursday, 02 June 2022 12:18)
1.
Today I've read the article "PowerPoint Live helps Microsoft Teams users present
remotely". It tells us about virtual presentations. This feature became
available during the coronavirus pandemic thanks to the Microsoft Teams
PowerPoint Live tool. I think it is a very comfortable environment for viewing
presentations. For Presenter mode places the presenter at the "front and center"
of the meeting, reducing the distraction of seeing multiple guests highlighted
all at once. PowerPoint Live also includes a Live Reactions feature where users
can use real-time emoji to interact.
In my opinion, it is the best environment for viewing presentations because it
has many useful features.
link:
https://techxplore.com/news/2021-03-powerpoint-microsoft-teams-users-remotely.html
audio recording: https://voca.ro/11WcTsZmgQ4i
2.
Today I have read the article "New theoretical model accounts for sun's rotation
and magnetic field" about new research of the sun.UNIGE team developed new solar
model which includes not only the evolution of rotation which was probably
faster in the past, but also the magnetic instabilities it creates. This model
not only does rightly predict the concentration of helium in the outer layers of
the sun, but it also reflects that of lithium which resisted modeling until now.
I think this research will help to analyze the sun and other stars similar to
ours.
link:https://phys.org/news/2022-05-theoretical-accounts-sun-rotation-magnetic.html
audio recording: https://voca.ro/11zCNhZz1ZjX
3.
Today I have read the article "Everything we knew about water was right". What
is it about?
According to the article, one way or another, water releases hydrogen peroxide,
although there is not much of it. At first there was no explanation for this
phenomenon and everything was dismissed as "spontaneity". But recently the
reason was found: under certain conditions, hydrogen peroxide is indeed formed
in the reaction with ozone and nitrogen.
To be honest, I still don't really understand where this research can be useful.
Perhaps it would make sense to create some conditions in the environment.
link:https://phys.org/news/2022-02-knew.html
audio recording: https://voca.ro/1auYKJrtn0WF
4.
Today I have read the article called 'Transformational' machine learning
approach could accelerate the search for new treatments for diseases. It tells
about how researchers have developed a new approach to machine learning that
'learns to learn' and outperforms existing machine learning methods for drug
development, which in turn could accelerate the search for new treatments for
diseases.The method, called transformational machine learning (TML), was
developed by a team from the UK, Sweden, India and the Netherlands. It learns
from multiple problems and boosts productivity while it learns.
I think machine learning can improve all areas of our lives, even the important
and difficult ones like medicine
link:https://techxplore.com/news/2021-11-approach-machine-disease-treatments.html
audio recording: https://voca.ro/15CUCVkJ7EjW
5.
Today I have read the article "What is an algorithm? How computers know what to
do with data". Everyone knows that computer programs are made up of algorithms,
but what are algorithms consist of? In the most general sense, an algorithm is a
series of instructions telling a computer how to transform a set of facts about
the world into useful information, it has three steps: input(getting information
to work with), transformation(working with data), output(result). Also, over
time, the algorithms become more complicated, and it’s already difficult to
simply describe all the algorithms by people, so machine learning was created
for it.
I found this article interesting for me.
link: https://techxplore.com/news/2020-10-algorithm.html
audio recording: https://voca.ro/1lb35F2A18Ys
· #111
Badyuk Eduard RZ-212 (Lebedeva E.V.) (Thursday, 02 June 2022 12:13)
Exam topic #15 (The authentication of a user's claimed identity.)
Authentication process can be described in two distinct phases - identification
and actual authentication. Identification phase provides a user identity to the
security system. This identity is provided in the form of a user ID. The
security system will search all the abstract objects that it knows and find the
specific one of which the actual user is currently applying. Once this is done,
the user has been identified. The fact that the user claims does not necessarily
mean that this is true. An actual user can be mapped to other abstract user
object in the system, and therefore be granted rights and permissions to the
user and user must give evidence to prove his identity to the system. The
process of determining claimed user identity by checking user-provided evidence
is called authentication and the evidence which is provided by the user during
process of authentication is called a credential.
https://voca.ro/1kuSwdCNnoAj
1) comprehensive investigation of
Firstly, in late 2004 the Office of the Ombudsmen initiated a comprehensive
investigation into prison management.
По-перше, наприкінці 2004 року Офіс омбудсменів розпочав комплексне
розслідування щодо управління в’язницею.
2) condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.
3) comparative investigation of
Stiftung Warentest carries out more than 200 comparative product tests and
investigations of services from nearly all areas of everyday life every year.
Stiftung Warentest щороку проводить понад 200 порівняльних тестів продуктів і
досліджень послуг майже з усіх сфер повсякденного життя.
https://voca.ro/1eeecIj43UGW
· #110
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 12:09)
Topic # 9 (Development of television in your home country)
In Ukraine, the first acquaintance with television occurred on February 1, 1939.
The first TV-sets were mechanical, they used the so-called Nipkow discs. They
had only one advantage: his programs, transmitted in the middle wave range,
could be received over a vast territory. However, the quality of the mechanical
television picture was worse. A new page of Ukrainian electronic television was
opened only on November 6, 1951 in Kyiv, on Khreshchatyk Street, a new
television center was officially put into operation, next to it there was a
radio transmission tower. In those days, television, compared with today, was
quite simple. There were only 3 TV channels.
https://voca.ro/1m3xyFezufLg
· #109
Yershova Y. (Thursday, 02 June 2022 12:06)
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 02 June 2022 11:59)
The comment is quite interesting, but it isn't relevant to your specialty and
doesn't contain your point of view. The task with phrases is well done.
· #108
Povoznikov Artem RZ-212 (Popovych) (Thursday, 02 June 2022 12:04)
Today i have read the article: SSD-Insider++: A firmware-based approach to
thwarting ransomware attacks.
This article tells about group of scientists who promote the idea of using
embedded software to prevent ransomware attacks before they can encrypt user
data stored on a solid state drive (SSD). About 4 years ago, the group presented
their ideas at an International Conference and decided to tell a reporter about
your ideas.
Ransomware is a type of program that can block access to a computer until the
user sends the required amount of money to the account of the organization that
unleashed the attack. Over the past year, such incidents have become more
frequent, but fortunately, scientists have come up with a way to counter this
using a special code.
The job involved studying the ransomware code and then writing our own code to
recognize it and stop it before it encodes user data. If SSD-Insider++
recognizes a ransomware attack, all activity on the SSD will stop and allow the
user to take action to mitigate the threat. Of course, you have to pay for this
approach.
Scientists have already tested and found that their program is able to stop 100%
of attacks and is able to prevent damage in the initial stages of its
development in less than 10 seconds. It seems to me that such a program will
help computer users a lot. With its help, people can not worry about the theft
or damage to their data.
Text:
https://techxplore.com/news/2021-09-ssd-insider-firmware-based-approach-thwarting-ransomware.html
Audio: https://voca.ro/1kAgBCIFQGrw
1) conditions imposed
The team collected over 4,500 loan-related IMF documents to identify policy
conditions imposed on 131 borrowing countries between 1985 and 2014.
2) comprehensive investigation
Credit: KAUST A comprehensive investigation by KAUST researchers sets the record
straight on the formation of hydrogen peroxide in micrometer-sized water
droplets, or microdroplets.
3) comparative investigation
"in our comparative investigation we observed more juvenile nathusius'
pipistrelles dead beneath wind turbines than expected from their frequency in
the local population.
Audio:https://voca.ro/1k2JB1vBPvQU
Exam topic #15 (The authentication of a user's claimed identity)
One of the main components of the information security system is the user
authentication procedure. Authentication requires the protection of access to
information, and the more important and valuable the information, the more
reliable the authentication should be.
Reliability, as well as the type, technology and means of authentication of its
protection, first of all, on the importance of protecting information,
registration and rights of resource users and administrators. Also, the
requirements for the reliability of authentication can identify the likelihood
of occurrence and analysis of the risks of possible financial, reputational or
organizational damage.
The type of authentication can be selected depending on the scenario of work -
whether it is remote use of the system, mobile, or work with a home computer -
and on the definition and access rights to the user's system (administrator,
manager, manager).
Reliable protection in the process of admission to the two-factor authentication
scheme. This is an authentication procedure that consists of entering data in
two parallel ways. For example, an authorized user provides a smart card and
enters a password on an input device. In this case, it will not be enough for
attackers to pick up or spy on the password - it is also necessary to use a
physical storage device, which is already becoming a big problem to steal.
· #107
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 02 June 2022 11:59)
Today I have read the article "Hydrogen can play key role in US
decarbonization". The United States Department of Energy's Lawrence Berkeley
National Laboratory is a major player in the research and development of pure
hydrogen in science and applied technology.
One of the participants in this research has said that hydrogen is a clean
energy carrier because it contains no carbon.
Hydrogen is a substance that can help decarbonise industries that are difficult
to decarbonise.
There are about nine different departments involved in hydrogen research and
different laboratories have different focuses, and to solve this problem, it is
better to involve all of them.
https://techxplore.com/news/2021-10-hydrogen-key-role-decarbonization.html
https://voca.ro/1d5INHKFQX8G
The study represents the first systematic and comparative investigation of
cognitive abilities in lemurs and provides important insights into the evolution
of cognitive abilities in primates.
a condition imposed by competition authorities before the Monsanto deal could go
ahead
ecologists is the first comprehensive investigation of how humans interacted
with plant and animal
https://voca.ro/19eAoPMr9C0z
· #106
Timophey Sipin RZ-212 (Popovych) (Thursday, 02 June 2022 11:55)
Exam topic #20 (Principles of information protection)
The primary principles of information protection form a triad-like model
consisting of three main components: confidentiality, integrity and
availability.
The principle of confidentiality asserts that the information in question is
secure from any unauthorized access to it, and is kept secret.
Information integrity refers to the certainty that the information is not
tampered or degraded, during and after submission or while working with it.
Availability of information suggests not only that the information is available
to the authorized user when it is needed, but also that it doesn't compromise
any information security in the process of delivering information to the user.
Audio: https://voca.ro/1akyxyfgbh
Today l have read the article titled «Viewpoint -- Give Yourself Some "Wiggle
Room" to Drive Innovation and Change».Text tells us about the nessesary for
people to change and improve themselves (talking about improvements in
technology),but at the same time people are not ready to make changes in their
lives. The article explains to us away out of this situation,the so-called
golden mean, in which we will have practically no risks and we will be able to
observe the success and progress in technology. In my opinion, this article
helps us to correctly assess risks and motivates us to innovate and progress.
Audio:https://voca.ro/1f7tDhl2LXQ6
Phrases:
1) It is impossible to conduct research with the conditions imposed by
superiors.
Неможливо проводити дослідження із умовами нав'язаними начальниками
2) Comprehensive investigation can be carried out only after the internal one.
Всебічне рослідювання може бути виконано лише після внутрішнього
3) Comparative investigation of goods and services should be held regularly.
Порівняльні дослідження товарів і послуг повинні проводитися регулярно.
Audio: https://voca.ro/1f5pgtt
· #105
Kate Kholodova (RZ-212, Popovych) (Thursday, 02 June 2022 11:54)
Exam topic #12 (8/10) Hardware firewall.
A hardware firewall is a physical appliance that is deployed to enforce a
network boundary. All network links crossing this boundary pass through this
firewall, which enables it to perform inspection of both inbound and outbound
network traffic and enforce access controls and other security policies.
A network security solution, a hardware firewall is designed to protect an
organization’s network boundary by being deployed in inline mode. This means
that the physical network cables over which traffic can cross this boundary are
connected to ports on the “inside” and “outside” of the firewall. When traffic
enters a network firewall, it is subjected to security inspection and may have
multiple different controls applied to it. At a high level, firewalls commonly
are configured to block certain types of traffic from crossing the network
boundary. This can help to block traffic over any unused or undesirable ports
from entering the network and to stop certain types of traffic from leaving the
network .
audio - https://voca.ro/1bUIR734A4OG
Today I’ve read the article "Hacking and loss of driving skills are major
consumer concerns for self-driving cars".This article is about the advantages
and disadvantages of self-driving cars. A survey was conducted and the biggest
concerns of consumers were identified: Artificial Intelligence is imperfect, the
consumer will lose driver skills, security breaches in the form of hacking a
personal computer or online account similar to hacking. Also, three clear
benefits were free time behind the wheel, elimination of driver accidents, and
faster route processing. The results of this study illustrate the clear benefits
of autonomous vehicles for consumers and how marketers can engage consumers in
this growing market.
In my opinion, manufacturers and legislators have something to improve and
change for the safety of people.
article -
https://techxplore.com/news/2021-05-hacking-loss-skills-major-consumer.html
audio - https://voca.ro/19Lw5XDZiYiX
1) condition imposed by
We deem this most regrettable, because we have complied with the conditions
imposed by the international community.
2) comparative investigation of
Comparative investigations of crystalline and amorphous silicon dioxide samples
were undertaken around a hundred years ago.
3) comprehensive investigation of
The possibilities of the thermoelectromotive force study as a method
for comprehensive investigation of semiconductors are shown.
audio ph - https://voca.ro/1hkXjbtSpilu
· #104
Yershova Y. (Thursday, 02 June 2022 11:46)
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 02 June 2022 11:41)
I can't accept this topic as you have already done it.
· #103
Yershova Y. (Thursday, 02 June 2022 11:44)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:29)
I've got it, thanks. Go on practising your speaking.
· #102
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 02 June 2022 11:41)
Exam Topic #4 Early radio development.
https://voca.ro/1nTTBqwwHOkC
The early history of radio is the history of special technology, which also
makes southern radio instruments that emit radio waves. In the days of radio,
many people contributed theories and inventions to what became radio. The
development of radio began as "wireless telegraphy". More late radio history is
increasingly concerned with broadcasting issues. After the discovery of these
"Hertzian waves" (it'd get nearly twenty years for "radio" duration to be
universally accepted for this type of electromagnetic radiation) many scientists
and inventors experimented with the transmission and detection of Hertzian
waves. Maxwell's theory, showing that light and Hertzian electromagnetic waves
are the same phenomenon at different wavelengths, led "Maxwellian" scientists to
assume that they're analogous to optical light.
· #101
Yershova Y. (Thursday, 02 June 2022 11:40)
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 11:24)
Your comment on the article is not complete, it's rather short, doesn't contain
the article's title, and there is no link to the article. Your phrases' examples
are good, thanks.
· #100
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:29)
To #88
Here is my audio file for Exam topic #17
https://voca.ro/17Hp4vylqApU
· #99
Lebedeva E. (Thursday, 02 June 2022 11:27)
To Kravchenko Kostiantyn (RZ-212) Well done, keep working.
· #98
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 02 June 2022 11:24)
This article is about bow group of scientists developed computational quantum
algorithms that are capable of efficient and highly accurate simulations of
static and dynamic properties of quantum systems. The new algorithms tap into
the capabilities of existing quantum computer capabilities by adaptively
generating and then tailoring the number and variety of "educated guesses'' the
computer needs to make in order to accurately describe the lowest-energy state
and evolving quantum mechanics of a system. I think this product will help in
further updating of algorithms and computers overall.
https://voca.ro/1mMiezgYEKDR
Comprehensive investigation can better understand the cause of this problem.
Condition imposed by the company can lead to consequences.
Comparative investigation showed good results.
https://voca.ro/18wyrl63TomD
· #97
Moskalenko Kirill(РТ-212)(Mykhailiuk) (Thursday, 02 June 2022 11:23)
The new advancement of color Television. (7)
The development of color television began after the end of World War II. The US
electronics industry, having lost defense orders, has taken up the development
of civilian technologies, including television. At the same time, the latest
achievements were used, which were previously used only in military
developments. In addition, previously unused decimeter radio bands became
available. Two main problems of electronic color television remained unresolved:
compatibility with existing black and white receivers. On June 15, 1960, a radio
amateur Chuev proposed a method for obtaining a color image on a black and white
TV screen without making any changes to it. A simple result was achieved on the
basis of the Benham-Fechner effect by alternating with a certain frequency
shades of gray in a television picture.
https://voca.ro/19whabaJS5sO
· #96
Yershova Y. (Thursday, 02 June 2022 11:21)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:14)
Your Exam topic #15 First radio speeches is not bad, but not informative enough.
· #95
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:20)
#88
I'm sorry, I accidentally deleted it, I'll rewrite it now
· #94
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:19)
#92
I'm sorry, I accidentally sent the same thing twice
Debt
Exam topic #15
First radio speeches
On March 12, 1933, President Franklin D. Roosevelt delivered his first advocacy
address—radio or "fireside chat"—directly from the White House. For twelve
years, President Roosevelt's fireside chats have connected the White House to
ordinary homes like never before. Perhaps it was the informal, conversational
quality of fireside chats that made Americans want to find them. President
Roosevelt was not the first chief executive to use the radio, although he was by
far the most gifted practitioner of it.
https://voca.ro/1akSkYmGDA1y
https://www.whitehousehistory.org/the-fireside-chats-roosevelts-radio-talks
· #93
Kravchenko Kostiantyn (RZ-212, Lebedeva E.) (Thursday, 02 June 2022 11:16)
Exam topic #20 (Principles of information protection)
The primary principles of information protection form a triad-like model
consisting of three main components: confidentiality, integrity and
availability.
The principle of confidentiality asserts that the information in question is
secure from any unauthorized access to it, and is kept secret.
Information integrity refers to the certainty that the information is not
tampered or degraded, during and after submission or while working with it.
Availability of information suggests not only that the information is available
to the authorized user when it is needed, but also that it doesn't compromise
any information security in the process of delivering information to the user.
Audio: https://voca.ro/1akyxyynILnH
Phrases:
1) It is impossible to conduct research with the conditions imposed by
superiors.
Неможливо проводити дослідження із умовами нав'язаними начальниками
2) Comprehensive investigation can be carried out only after the internal one.
Всебічне рослідювання може бути виконано лише після внутрішнього
3) Comparative investigation of goods and services should be held regularly.
Порівняльні дослідження товарів і послуг повинні проводитися регулярно.
Audio: https://voca.ro/1f5puZ4HTatJ
· #92
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:14)
DEBT
Exam topic #15
First radio speeches
On March 12, 1933, President Franklin D. Roosevelt delivered his first advocacy
address—radio or "fireside chat"—directly from the White House. For twelve
years, President Roosevelt's fireside chats have connected the White House to
ordinary homes like never before. Perhaps it was the informal, conversational
quality of fireside chats that made Americans want to find them. President
Roosevelt was not the first chief executive to use the radio, although he was by
far the most gifted practitioner of it.
https://voca.ro/1akSkYmGDA1y
https://www.whitehousehistory.org/the-fireside-chats-roosevelts-radio-talks
· #91
Lebedeva E. (Thursday, 02 June 2022 11:12)
To Vova Kolomiets RZ-212 The sentences with phrases in the work #84 are absolutely identical to your work #89. I can't accept them.
· #90
Lebedeva E. (Thursday, 02 June 2022 11:09)
To Vova Kolomiets RZ-212 Thanks for thge detailed comment. Now I am waiting for the exam topic.
· #89
Vova Kolomiets RZ-212 (Lebedeva) (Thursday, 02 June 2022 11:09)
(that is work for 26.05)
Today i've read the article "Self-driving race cars make history in
Indianapolis". It is about unusual race.
The winner was not a driver but an algorithm. Team from the Technical University
of Munich won a $1 million prize. The Dallara IL-15, used by every team, comes
with a price tag of $230,000. However, the technology on board makes each car
worth more than $1 million. The commercial autonomous vehicle industry has been
following the Indianapolis race closely, with contributions to the event topping
$120 million.
I found this article interesting, because it tells us about the new
techonologies and opportunities of science.
https://techxplore.com/news/2021-10-self-driving-cars-history-indianapolis.html
https://voca.ro/1aSX96TQM81G
1) comprehensive investigation of
The possibilities of the thermoelectromotive force study as a method for
comprehensive investigation of semiconductors are shown.
2) condition imposed by
We deem this most regrettable, because we have complied with the conditions
imposed by the international community.
3) comparative investigation of
Comparative investigations of crystalline and amorphous silicon dioxide samples
were undertaken around a hundred years ago.
https://voca.ro/16xG40bKztDG
· #88
Yershova Y. (Thursday, 02 June 2022 11:07)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:03)
Sorry, your audio for the exam topic #17 could not be found. It may have expired
or been deleted.
· #87
Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 02 June 2022 11:06)
(Article)
Today I have read the article 'Combining AI and computational science for
better, faster, energy efficient predictions'.
The article tells about the new technology "intelligent alloys", the main
purpose of which is combining the power of computational science with artificial
intelligence to develop models that complement simulations to predict the
evolution of science's most complex systems. By using this technology, the
researchers demonstrated that they can generate predictions thousands to a
million times faster than it would take to run the simulations with full
resolution or rely on partial or even faulty information through models. I think
this technology has a huge future that is coming right now.
1)expected value
Either the present value or a future expected value should be used.
Следует использовать либо нынешнее значение, либо будущие ожидаемые значения.
2)technology capability
At least the exponential growth of information technology capability will
continue unabated.
По крайней мере, возможности информационных технологий будут расти, не
ослабевая, с экспоненциальной скоростью.
3)work schedule
Consequently, the Court may wish not to overstretch its work schedule in the
field at any given time.
Соответственно, Суд, возможно, пожелает сделать более напряженным свой график
работы на местах в любой заданный период времени.
Vocaroo(article): https://voca.ro/1iVdA1qr4K25
Vocaroo(sentences): https://voca.ro/130pnPRxsJji
https://techxplore.com/news/2022-04-combining-ai-science-faster-energy.html
· #86
Yershova Y. (Thursday, 02 June 2022 11:03)
Stanislav Popik РТ-212 (Yershova) (Thursday, 02 June 2022 10:59)
Thanks for your effective work today.
· #85
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 11:03)
DEBT
Exam topic #17
The new advancement of color Television.
Color television was more than just an addition or improvement to black and
white television. In the post-war era, it represented the latest step in the
technological replication and expansion of human vision: improved perception,
the pinnacle of consumer vision and display, and the Cold War idealized
technology of truth and revelation. While color television is just television
now, and the idea of a black and white television seems distant and bizarre,
there was a time when color television was, to use a very modern expression, a
disruptor. It not only changed the way commercial television was produced and
received, but also announced a change in the very way we look at the world and
understand our relationship to it.
https://voca.ro/1gINbUzOPBTs
https://www.smithsonianmag.com/innovation/color-tv-transformed-way-americans-saw-world-world-saw-america-180971343/
· #84
Vova Kolomiets RZ-212 (Lebedeva) (Thursday, 02 June 2022 11:02)
today i have read the article "Google Cloud unveils Healthcare Data Engine for a
holistic view of health data"
this article is about the new development of google in the field of medicine.
According to them, this invention helps to work faster with patient data. thanks
to this, you can find out everything about the client, from his simple illnesses
to clinical.
doctors say that for them a quick search for information about patients is a
priority, as this will speed up their work. in addition, many companies have
supported this idea and cooperate with hospitals.
This article really impressed me. I think this development is very important and
useful today and i like that medicine is upgrading.
https://www.zdnet.com/article/google-cloud-unveils-healthcare-data-engine-for-a-holistic-view-of-health-data/
https://voca.ro/194FhNUSBst6
1) comprehensive investigation of
The possibilities of the thermoelectromotive force study as a method for
comprehensive investigation of semiconductors are shown.
2) condition imposed by
We deem this most regrettable, because we have complied with the conditions
imposed by the international community.
3) comparative investigation of
Comparative investigations of crystalline and amorphous silicon dioxide samples
were undertaken around a hundred years ago.
https://voca.ro/16xG40bKztDG
· #83
Yershova Y. (Thursday, 02 June 2022 11:01)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 10:54)
In general, it's reasonable, but I'd like to know more about your attitude
towards the issue presented.
· #82
Stanislav Popik РТ-212 (Yershova) (Thursday, 02 June 2022 10:59)
Exam topic 8 “The new advancement of color Television.”
In 1938, Werner Flechsig patented the principle of the color kinescope, and the
color image transmission method was developed in 1940. In European cinemas,
color films appeared in 1941, the first of which were Women Are Still the Best
Diplomats and Hans Alber's film Munchausen. In 1953, the NTSC standard for
black-and-white television broadcasting was expanded in the United States - it
received the ability to transmit color, namely, "color" was added to
"brightness". On August 30, 1953, for the first time in history, NBC broadcast a
color broadcast of "Kukla, Fran and Ollie" in test mode via the NTSC standard.
The first full-fledged color broadcast was the opera Carmen, shown on October
31, 1953.
https://voca.ro/1iv2xQ7BZSN7
· #81
Stanislav Popik РТ-212 (Yershova) (Thursday, 02 June 2022 10:55)
Today I have read the article "Urban magnetic fields reveal clues about energy
efficiency, pollution
by American Institute of Physics" It's about Studying a city's magnetic
footprint, which can be used to monitor the state of that city, including a
possible early warning system for pollution problems. Magnetic field activity
from various sources in a city can give an idea of what is happening over the
24 Hours The researchers hope that their combination of networked magnetometry
and data mining can become a valuable tool for interdisciplinary urban research,
and I believe that this research could provide a boost to many things in the
future.
https://phys.org/news/2022-05-urban-magnetic-fields-reveal-clues.html
https://voca.ro/1aLLZD8XewpR
1. Condition imposed by
Condition imposed by the company can lead to consequences.
2. Comparative investigation.
Comparative investigation showed good results.
3. Comprehensive investigation.
Сomprehensive investigation can better understand the cause of this problem.
https://voca.ro/19OgvC2Sj8NU
· #80
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 02 June 2022 10:54)
1. Comprehensive investigation of
Their collaboration with anthropologists, archaeologists, and ecologists is the
first comprehensive investigation of how humans interacted with plant and animal
species in different cultures worldwide through time.
2. Comparative investigations off
The complete genome of the orange clownfish was published a few years ago, so it
was only fitting that the publication of the false clownfish genome followed for
comparative investigations.
3. Conditions imposed by
Bayer and Monsanto will have to accept all the conditions imposed by the
regulator to close the deal, but will have the right to legally challenge the
verdict in court, it said.
https://voca.ro/101I8dsPjoLI
Today I have read the article "Tech vs telecoms: EU ignites debate on 'net
neutrality'". Tech and streaming giants are consuming massive amounts of
bandwidth, so this week the EU revived a long-standing idea to force them to pay
telecoms that maintain the infrastructure. But the idea has sparked howls of
disapproval from tech giants like Facebook, Apple, Amazon, Microsoft, Google and
Netflix. According to media reports, the bill will be ready by the end of the
year. But the scramble for internet infrastructure has raised concerns that the
EU could end up jeopardizing "net neutrality," in which telecoms are barred from
selling higher internet speeds to certain companies.
https://voca.ro/1ng8WqrRyeUI
https://techxplore.com/news/2022-05-tech-telecoms-eu-ignites-debate.html
· #79
Yershova Y. (Thursday, 02 June 2022 10:50)
Eugene Chervony RT-212(Yershova) (Thursday, 02 June 2022)
All your tasks are well done, thank you.
· #78
Moskalenko Kirill(РТ-212)(Mykhailiuk) (Thursday, 02 June 2022 10:48)
Today I have read the text with title “The how social media and AI enable
companies to track brand reputations in real-time”. This text tells how
artificial intelligence and social media can help monitor brand status. Brand
status can change for the better and for the worse, but how do you check? Social
media, such as Twitter, will help with this issue, as you can get real-time
ratings and brand reputation through tweets. With AI, it is possible to
understand where a company or a brand is going, as well as to know the reason
for the decline or increase in brand ratings. In conclusion, I’d like to say,
that In the digital world, social media and AI are making it easier to turn the
brand around.
https://voca.ro/11kPhy8PV2B7
Comprehensive investigation can better understand the cause of this problem.
Комплексне дослідження може краще зрозуміти причину цієї проблеми.
Condition imposed by the company can lead to consequences.
Умова, встановлена компанією, може призвести до наслідків.
Comparative investigation showed good results.
Порівняльне дослідження показало хороші результати.
https://voca.ro/18wyrl63TomD
· #77
Igor Rudko (RZ-213) (Vorobyova E. V.) Home-work (Thursday, 02 June 2022 10:46)
Audio: https://voca.ro/1e9PvcI944KL
Article: https://phys.org/news/2022-06-gulf-mexico-ancient-mass-extinction.html
Today I have read the article: "Research shows how the Gulf of Mexico escaped
ancient mass extinction". An ancient bout of global warming 56 million years ago
that acidified oceans and wiped-out marine life had a milder effect in the Gulf
of Mexico, where life was sheltered by the basin's unique geology. The findings
not only shed light on ancient mass extinction but could also help scientists
determine how current climate change will affect marine life and aid in efforts
to find deposits of oil and gas. And although the Gulf of Mexico is very
different today. I think that valuable lessons can be drawn about climate change
today from how the Gulf was impacted in the past.
Phrases
Audio: https://voca.ro/19RZkTI62ns6
1) The abundance of helium is correctly reproduced by the new model because the
internal rotation of the sun condition imposed by the magnetic fields generates
a turbulent mixing - Нова модель правильно відтворює велику кількість гелію,
оскільки внутрішнє обертання сонця, накладене магнітними полями, породжує
турбулентне перемішування
2) Comprehensive investigation of whether epigenetic aging is the manifestation
of one or more aging hallmarks - Всебічне дослідження того, чи є епігенетичне
старіння проявом однієї чи кількох ознак старіння
3) In Comparative investigation we observed more juvenile Nathusius'
pipistrelles dead beneath wind turbines. - У порівняльному дослідженні ми
спостерігали більше молодих піпістрелів Натусіуса, мертвих під
вітрогенераторами.
· #76
Chervony Eugene RT-212(Yershova) (Thursday, 02 June 2022 10:45)
Exam Topic #8 (Cable television)
Cable television is one of the options for transmitting a signal (both
television and radio signals) over a distance. Both analog and digital format
transmission is possible. For the first time in the world, cable television
appeared in the spring of 1948 in Mahanoy City, Pennsylvania, USA. A modern
cable television network includes a head station, trunk communication channels,
sub-trunk lines and home distribution networks. Cable TV has some advantages
over digital and satellite: higher signal quality, high noise immunity, no
problems with signal transmission in cities with dense multi-storey buildings.
https://voca.ro/1eM5VKkeKIXh
· #75
Chervony Eugene RT-212(Yershova) (Thursday, 02 June 2022 10:42)
Exam Topic #7 (First radio speeches)
In 1904, English radio engineer John Fleming invented the first radio tube. By
the early 1920s, the development of radio tubes had reached a level sufficient
for the advent of radio broadcasting. While most experimenters were trying to
create something similar to telephone technology, others were trying to reach a
wider broadcast coverage. The first experimental radio station was created by
Charles Herrold in 1909. Gerrold placed the transmitter and antenna on the roof
of his radio engineering college. Initially, only dots and dashes were
transmitted. But already in 1912, weekly broadcasts of phonographic records
began.
https://voca.ro/187p5zaAwKJt
· #74
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 02 June 2022 10:42)
1.comprehensive investigation of- комплексне розслідування;
After gaining state independence increased the importance of comprehensive
investigation of folklore samples.-Після здобуття державної незалежності зросла
значення всебічного дослідження фольклорних зразків.
2.comparative investigation of- порівняльне дослідження ;
Comparative investigation of goods and services should be held
regularly.-Порівняльні дослідження товарів і послуг повинні проводитися
регулярно.
3.condition imposed by- умова, встановлена;
This new condition imposed by the Committee raises some difficult legal
issues.-Ця нова умова, встановлена Комітетом, викликає ряд складних правових
питань.
https://voca.ro/1nI5RNWJZh2z
Today I've read the article about the new methods that accurately detect the
deepfake videos. The ability to identify manipulated videos is neccesary as
political and social opinions are transmitted in such a way.The Riverside method
divides the task into two components within a deep neural network. The first
branch discerns facial expressions and feeds information about the regions that
contain the expression, such as the mouth, eyes, or forehead, into a second
branch, known as an encoder-decoder. The encoder-decoder architecture is
responsible for manipulation detection and localization. So, deep fake detection
methods allow people to understand whether what they see is true or manipulative
information.
https://voca.ro/14aTW4Ho2koF
https://techxplore.com/news/2022-05-method-deepfake-videos-accuracy.html
· #73
Eugene Chervony RT-212(Yershova) (Thursday, 02 June 2022 10:41)
debt
Today I have read the article "A new duality solves a physics mystery". It says
that in conventional wisdom, producing a curved space requires distortions, such
as bending or stretching a flat space. A team of researchers have discovered a
new method to create curved spaces that also solves a mystery in physics.
Without any physical distortions of physical systems, the team has designed a
scheme using non-Hermiticity, which exists in any systems coupled to
environments, to create a hyperbolic surface and a variety of other prototypical
curved spaces. I believe that this fundamental research can change the
understanding of physics.
https://phys.org/news/2022-06-duality-physics-mystery.html
https://voca.ro/17tBkVPp9Csz
· #72
Eugene Chervony RT-212(Yershova) (Thursday, 02 June 2022 10:39)
Today I have read the article "Why ketamine is a speedster antidepressant". It
says that ketamine is the speedster of antidepressants, working within hours
compared to more common antidepressants that can take several weeks. But
ketamine can only be given for a limited amount of time because of its many side
effects. The study in mice shows ketamine works as a rapid antidepressant by
increasing the activity of the very small number of newborn neurons, which are
part of an ongoing neurogenesis in the brain. The goal is to develop an
antidepressant that doesn't take three to four weeks to work because people
don't do well during that period of time. I think that researchers have a chance
to create such an antidepressant.
https://medicalxpress.com/news/2022-06-ketamine-speedster-antidepressant.html
https://voca.ro/1kspamxeYNXv
1) conditions imposed by
It is impossible to conduct research with the conditions imposed by superiors.
2) comprehensive investigation of
Сomprehensive investigation can be carried out only after the internal one.
3) сomparative investigations of
A comparative study was not conducted due to misunderstandings.
https://voca.ro/12Xo6jw109Zc
· #71
Lebedeva E. (Thursday, 02 June 2022 10:35)
To РЗ-212 Good morning! The lesson has started and I am waiting for your exam topics and work with phrases of the day.
· #70
Chernetskiy Nikita.RZ-213. (Vorobyova) (Thursday, 02 June 2022 10:32)
Today I've read an article called"Canada hospitals use drones to carry lungs for
transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by
Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western
Hospital on the city's west side to the roof of the downtown Toronto General
Hospital.The trip at the end of September took less than 10 minutes. It was
automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the
company, but a similar flight in April 2019 delivered a kidney to a hospital in
the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team
that whisked the package inside and successfully transplanted the lungs into a
waiting patient, saving the life of the 63-year-old man who'd been diagnosed
with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human
organs.
Audio:https://voca.ro/15rxpcCP4ZR3
Article:https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html
1)comprehensive investigation of
After gaining state independence increased the importance of comprehensive
investigation of folklore samples and followed by new scientific projects.
2)conditions imposed by
Unilateralism and conditions imposed by the powerful upon others are rampant
throughout the world.
3)Comparative investigations of
The Institute of legal and comparative investigations is established in
Kazakhstan
· #69
Igor Rudko (RZ-213) (Vorobyova E. V.) (Thursday, 02 June 2022 10:31)
Article: https://phys.org/news/2022-05-year-old-city-emerges-tigris-river.html
Audio: https://voca.ro/13in98p5fz3v
Today I have read the article: " A 3,400 year-old city emerges from the Tigris
River". Archaeologists have uncovered an old Mittani Empire-era city once
located on the Tigris River. By the way, this ancient city had been submerged
decades ago without any prior archaeological investigations. It is located at
Kemune in the Kurdistan Region of Iraq. The settlement emerged from the waters
of the Mosul reservoir early this year as water levels fell rapidly due to
extreme drought in Iraq. This unforeseen event put archaeologists under sudden
pressure to dig and document at least parts of this large, important city as
quickly as possible before it was resubmerged. In my opinion, it is really great
that archeologists trying to find forgotten places and save them.
Phrases
Audio: https://voca.ro/1jqv8WYCB887
1)A new study shows that lending conditions imposed by the International
Monetary Fund undermine "state capacity" in developing nations - Нове
дослідження показує, що умови кредитування, встановлені Міжнародним валютним
фондом, підривають «спроможність держави» в країнах, що розвиваються.
2)A comprehensive investigation by KAUST researchers sets the record straight on
the formation of hydrogen peroxide in micrometer-sized water droplets -
Комплексне дослідження, проведене дослідниками KAUST, встановлює рекорд
утворення перекису водню в краплях води мікрометрового розміру.
3)In the Journal of Applied Physics, researchers from the United States and
Germany present a comparative investigation of urban magnetic fields between two
U.S. cities. - У Journal of Applied Physics дослідники зі Сполучених Штатів та
Німеччини представляють порівняльне дослідження міських магнітних полів між
двома містами США.
Exam topic Authentication mechanisms
Audio: https://voca.ro/1f64bcIC7E0I
The users who want to access your protected resources can be challenged to
provide credentials to access with the various authentication technologies.
Authentication mechanisms are modules that authenticate the user with a specific
challenge or authentication technology, such as user name and password, and
one-time password. The order in which the authentication mechanisms are run is
controlled by an authentication policy. An authentication policy is an XML
document that you create with the authentication policy editor. The
authentication policy dictates the order of authentication mechanisms to
execute. I guess that it is really cool that there are many ways to protect a
user account.
· #68
Lebedeva E. (Thursday, 02 June 2022 10:28)
To Kovalzhi Andrey RZ-211 Well done, thank you.
· #67
Pishtoi Misha (PT-212) S.Mykhailiuk (Thursday, 02 June 2022 10:25)
https://voca.ro/14lmDBpEFVOb
Linux is perhaps the only operating system that has the most dedicated and
committed followers. Development of the components of Linux started in the year
1991. Linus built the kernel that formed the heart of Linux operating system and
included UNIX programs and utilities, and additional programs and utilities from
Richard Stallman. Since then many versions of Linux, which have amazing
functionalities and animations, have been produced. Examples of such versions
include Ubuntu, Fedora, Red Hat, and SUSE.
So, Linux is perhaps the only operating system that has so many followers
because of their quality not only of kernel.
The study represents the first systematic and comparative investigation of
cognitive abilities in lemurs and provides important insights into the evolution
of cognitive abilities in primates.
a condition imposed by competition authorities before the Monsanto deal could go
ahead
ecologists is the first comprehensive investigation of how humans interacted
with plant and animal
· #66
Shpychka Olecksandr/ RZ-213 (Vorobyova E. V.) (Thursday, 02 June 2022 10:24)
Exam topic #4 Information protection systems.
The most important thing in the field of information is its protection. Since
attackers often want to gain access to important and confidential data,
information security is often a priority. To do this, information security
systems were created, for example, SIEM - systems that quickly detect external
and internal attacks, analyze incidents and events, evaluate the level of
information system protection, generate reports and other analytics. There are
also many protection methods by type of data masking.
In my opinion, protecting information is something that should take a lot of
effort and investment.
· #65
Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (Thursday, 02 June 2022 10:22)
Exam Topic: Different protection mechanisms
The main protective mechanisms are activities aimed at ensuring engineering
measures of confidentiality, integrity and availability of information.
Protective mechanisms are divided into:
Physical - various engineering tools and structures that complicate or eliminate
the physical intrusion of offenders into objects of protection and into material
carriers of confidential information;
Hardware - mechanical, electrical, electronic and other devices designed to
protect information from leakage, disclosure, modification, destruction, as well
as counteraction to technical intelligence;
Software - special programs for computers that implement the functions of
protecting information from unauthorized access, copying, modification,
destruction and blocking;
Cryptographic - technical and software means of data encryption based on the use
of various mathematical and algorithmic methods;
When combined, these three mechanisms provide very strong protection of data and
computers.
Link to voice: https://voca.ro/135I4EZEAAN2
· #64
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Thursday, 02 June 2022 10:22)
Today I have read the article "Primate brain size does not predict their
intelligence".
Monkeys are known to have large brains and are our closest relatives. But does
brain size really affect the mind of an animal?
Scientists conducted a study that showed that the relationship between brain
size and cognitive abilities cannot be generalized and it provides new insights
into the evolution of cognitive abilities in primates. The results of the new
study show that despite their smaller brains lemurs average cognitive
performance in the tests of the PCTB was not fundamentally different from the
performances of the other primate species.
Further comparative studies in a variety of other species are essential to
answer the many questions about the relationship between brain size, diet,
social life and cognition.
https://phys.org/news/2020-09-primate-brain-size-intelligence.html
https://voca.ro/156UpSvHuYSF
Daily phrases:
1) condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Новые условия, навязанные комитетом, вызывают ряд сложных правовых вопросов.
2)comprehensive investigation of
Accordingly, scientists support the calls for a more comprehensive
investigation.
Соответственно, ученые поддерживают призывы к более всестороннему исследованию
3) comparative investigation of
The comparative investigation showed the usefulness of the first item.
Сравнительное исследование показало полезность первого предмета.
https://voca.ro/1kKD93lWxYbf
· #63
Gorbatiuk Stanislav RZ-213 (Vorobyova E.V.) (Thursday, 02 June 2022 10:21)
1. Comparative investigations of
A comparative investigation of methods for longitudinal data with limits of
detection through a case study shows a lot of new discoveries in paleontology.
Порівняльне дослідження методів поздовжніх даних з межами виявлення на прикладі
показує багато нових відкриттів у палеонтології.
2. In conclusion, it is proposed that ageing is the condition, imposed by
natural selection, that lets organisms to outlast the obligatory reproductive
time. На закінчення припускається, що старіння — це умова, встановлена природним
добором, що дозволяє організмам пережити обов’язковий час відтворення.
3. A comprehensive investigation of the basin revealed its lateral and vertical
dimensions and hydrogeological characteristics. Комплексне дослідження басейну
виявило його бічні та вертикальні розміри та гідрогеологічні характеристики.
https://voca.ro/1hJLkWKPdCxo
Today I've read the article, which is titled "Astronomers detect a new radio
source of unknown origin". This article tells us about how Australian
astronomers have discovered a mysterious bright and compact radio source during
radio continuum observations of a spiral galaxy known as NGC 2082. The origin
and nature of this source is unknown and requires further investigation. The
finding is reported in a paper published May 23 on the arXiv pre-print
repository. The astronomers concluded that the most likely remaining possibility
is that this radio source is an extragalactic background source, such as
quasi-stellar object, radio galaxy or active galactic nucleus.
https://voca.ro/12cuBkYHOAUQ
https://phys.org/news/2022-05-astronomers-radio-source-unknown.html
· #62
Vorobyova E. to Shpychka from РЗ-213 (Thursday, 02 June 2022 10:21)
I accept your class work. It’s okay. Continue working like this.
· #61
Vorobyova E. to Syrbu from РЗ-213 (Thursday, 02 June 2022)
Your exam topic is prepared properly. Your task from Phrases of the Day Practice is all right too. Go on working. Thank you.
· #60
Lebedeva E. (Thursday, 02 June 2022 10:18)
To To Dovzhenko Ilya RZ-211 and Kuleshov Konstantin(RZ-211) Thank you for your clear and full comments.
· #59
Yershova Y. (Thursday, 02 June 2022 10:16)
Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 02 June 2022 10:00)
DEBT for 26.05.2022. I appreciate your comment, it’s quite informative.
· #58
Yershova Y. (Thursday, 02 June 2022 10:14)
Vasilev A.O RZ-211 Yershova Y. (Thursday, 02 June 2022 09:59)
You comment is interesting, but too long, mind that.
· #57
Dovzhenko Ilya RZ-211 (Lebedeva) (Thursday, 02 June 2022 10:12)
Today I have read an article about how artificial intelligence will help
unmanned vehicles not stand idle at red lights. A new study from MIT looks at
using new technology in self-driving cars to reduce travel time, fuel
consumption, or battery life. Thus, all machines will know where they are, and
will be able to transmit data about their location to each other. This will help
other cars to slow down or accelerate at the right moment to prevent an
accident. The use of this technology will help to completely get rid of traffic
lights, and reduce the number of accidents to a minimum.
https://techxplore.com/news/2022-05-artificial-intelligence-autonomous-vehicles-idling.html
https://voca.ro/18DAS7v3rdAo
1)comprehensive investigation of
We demand objective and comprehensive investigation of this case .
Очікуємо на об'єктивне та справедливе розслідування цієї справи .
2)condition imposed by
Not just time stopped, which is the condition imposed by all photographs, but
objects held in a suspension.
Зупинився не просто час, що є умовою для всіх фотографій, а об’єкти, які
тримаються у підвішеному стані.
3)comparative investigation of'
He introduced the comparative historical method of investigation of the organic
world.
Він ввів порівняльно-історичний метод дослідження органічного світу.
https://voca.ro/1o5Kvw6tTkCK
· #56
Yershova Y. (Thursday, 02 June 2022 10:12)
Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 02 June 2022 09:58)
Thanks for your review, It's reasonable but too long.
· #55
Shpychka Olecksandr/ RZ-213 (Vorobyova E. V.) (Thursday, 02 June 2022 10:11)
Article: https://phys.org/news/2022-03-games-classroom-success-teacher.html
Audio: https://voca.ro/1d69UgLjXm2p
Today i have read the article: "Computer games in the classroom: Educational
success depends on the teacher"
From the article, we learn that future teachers support the introduction of
computer games into the learning environment. Many future teachers who are now
studying at universities are rapidly promoting this idea. Computer games play an
important role for children, namely, they help in the study of mass media.
Research has shown that games can help develop many skills. Moreover, students
will definitely like this idea.
In my opinion, computer games have a huge potential in the field of education.
Phrases of the day:
1)The conditions imposed by in which people live or work affect comfort.
2)So a comprehensive investigation of the problem is still lacking.
3)Your comparative investigation of answer should display understanding of each
text.
Audio: https://voca.ro/1oazrKCqwbZr
· #54
Yershova Y. (Thursday, 02 June 2022 10:09)
Vlasov Vadim RZ-211 (Yershova) (Thursday, 02 June 2022 09:47)
Your comment is quite informative, thank you.
· #53
Kuleshov Konstantin(RZ-211)(Lebedeva) (Thursday, 02 June 2022 10:08)
Today I have read the article "New Perspectives on Metal 3D Printing". This
article explores how 3D printing has opened up exciting new possibilities for
engineers and forced product designers to rethink what they can do. The ability
to print complex metal parts using advanced alloys anywhere in the world is
certainly impressive, but not without its downsides. It works by depositing thin
layers of metal powder particles that are bound together by intense heat
delivered by powerful lasers. But this process can lead to the formation of tiny
pores that weaken the overall structure. This is a serious disadvantage for the
industry, especially when highly reliable components are required on an ongoing
basis.
This scientific discovery will speed up the process of metal production, make it
reliable and easy to manufacture.
1)The Secretary-General informed the Council that a more comprehensive
investigation of the 5 June 1993 incident was being undertaken.comprehensive
investigation of
2)Unilateralism and conditions imposed by the powerful upon others are rampant
throughout the world.conditions imposed by
3)The Institute of legal and comparative investigations is established in
Kazakhstan (2009).Comparative investigations of
https://techxplore.com/news/2022-05-insights-3d-metals.html
https://voca.ro/19z132NXcvWE
· #52
Yershova Y. (Thursday, 02 June 2022 10:07)
Sofia Gilenko РЗ-211 (Yershova Y.A.) (Thursday, 02 June 2022 09:31)
Thank you for your clear and full comment. I share your opinion. Be attentive,
the last phrases' example is not informative enough.
· #51
Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 02 June 2022 10:00)
DEBT for 26.06.2022
Today I have read the article “Cyber attacks could jeopardize global food
supplies”. Researchers say that smart sensors and systems which are used to
monitor crops, plants, the environment, water, soil moisture, and diseases;
progress in production, genetic modification for drought-resistant crops, and
other technologies are prone to cyber-attacks—particularly if the ag-tech sector
doesn't take adequate precautions like other corporate or defense sectors, as
seen by interference to a U.S. watering system, a meatpacking firm, wool broker
software and an Australian beverage company. So I think that ag-tech companies
should invest into precautions about the vulnerabilities of digital agriculture
to cyber-attack, with an eye on the potential serious effects on the general
population in terms of food supply.
https://techxplore.com/news/2022-05-cyber-jeopardize-global-food.html
https://voca.ro/1beHgxHZMQrO
Phrases:
When investigating
When investigating a truck accident, evidence must be gathered to prove the
culpability of the negligent parties.
with the aid of
They cut through the glass with the aid of our sonic knife.
a sharp rise
These three components have caused such a sharp rise.
https://voca.ro/1U9V4vqu7xse
· #50
Vasilev A.O RZ-211 Yershova Y. (Thursday, 02 June 2022 09:59)
Today I've read an article called"Canada hospitals use drones to carry lungs for
transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by
Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western
Hospital on the city's west side to the roof of the downtown Toronto General
Hospital.The trip at the end of September took less than 10 minutes. It was
automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the
company, but a similar flight in April 2019 delivered a kidney to a hospital in
the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team
that whisked the package inside and successfully transplanted the lungs into a
waiting patient, saving the life of the 63-year-old man who'd been diagnosed
with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human
organs.
https://voca.ro/1oNUOF2CvqeB
https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html
1)comprehensive investigation of
After gaining state independence increased the importance of comprehensive
investigation of folklore samples and followed by new scientific projects.
https://voca.ro/1i7HwCEPGXlp
2)conditions imposed by
Unilateralism and conditions imposed by the powerful upon others are rampant
throughout the world.
https://voca.ro/1kzuue3dyLV0
3)Comparative investigations of
The Institute of legal and comparative investigations is established in
Kazakhstan
https://voca.ro/1neQdwYSVpFc
· #49
Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 02 June 2022 09:58)
Article
Today I have read the article “There are systems 'guarding' your data in
cyberspace, but who is guarding the guards?”. As our IT systems become more
complex, the potential for vulnerabilities increases. More and more
organizations are being breached, leading to financial loss, interrupted supply
chains and identity fraud. The current best practice in secure technology
architecture used by major businesses and organizations is a "zero trust"
approach when no person or system is trusted and every interaction is verified
through a central entity. But absolute trust is then placed in the verification
system being used. So breaching this system gives an attacker access to the
whole system. To address this issue, "decentralization" is a new paradigm that
removes any single point of vulnerability. So I think that this approach is
better than an uncontrolled system but researchers should work on bolstering the
security of the verification processes so many of us rely on.
https://techxplore.com/news/2022-05-cyberspace.html
https://voca.ro/15SailTYnU5h
Phrases:
1)conditions imposed by/
Contract-holders should use this form to tell a proposed sub-holder of
conditions imposed by the head landlord.
2)Comparative investigations of/
Comparative investigations of apices by strictly anatomical methods have
definite limits which are soon reached.
3)Comprehensive investigation of/
A systematic and comprehensive investigation of methods to build and evaluate
fault prediction models.
https://voca.ro/1eSjDdBNY6Lp
· #48
Kate Syrbu RZ-213 (Vorobyova) (Thursday, 02 June 2022 09:56)
1) comparative investigation of - порівняльне дослідження;
A comparative investigation of methods for longitudinal data with limits of
detection through a case study.
Порівняльне дослідження методів для поздовжніх даних з межами виявлення на
прикладі.
2) condition imposed by - умова, встановлена;
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.
3) comprehensive investigation of - комплексне розслідування;
This is also the reason why Ethiopia has been adamantly resisting a
comprehensive investigation of all the events that led to the current crisis.
Це також є причиною того, що Ефіопія непохитно протидіє комплексному
розслідуванню всіх подій, які призвели до нинішньої кризи.
https://voca.ro/169aANrsgmDg
Exam topic #13
Authentication mechanisms are modules that authenticate the user with a specific
challenge or authentication technology, such as user name and password and
one-time password. The order on which the authentication mechanisms are run is
controlled by an authentication policy. An authentication policy is an XML
document that you create with the authentication policy editor. The
authentication policy dictates the order of authentication mechanisms to
execute. There are different types of authentication mechanisms: one-time
password, Username and Password mechanism, HTTP Redirect mechanism, Consent to
device registration mechanism, FIDO Universal 2nd Factor mechanism.
https://voca.ro/1ooXkATJyQCN
· #47
Popovych E. (Thursday, 02 June 2022 09:55)
To Pushkash Maxim (RZ-212 Popovich)
#27,44
Exam Topic #10 (information protection systems) is well done.
Thank you, you have successfully completed the task.
· #46
Vlasov Vadim RZ-211 (Yershova) (Thursday, 02 June 2022 09:47)
Today i have read the article "Google Cloud unveils Healthcare Data Engine for a
holistic view of health data"
this article is about the new development of google in the field of medicine.
According to them, this invention helps to work faster with patient data. thanks
to this, you can find out everything about the client, from his simple illnesses
to clinical.
doctors say that for them a quick search for information about patients is a
priority, as this will speed up their work. in addition, many companies have
supported this idea and cooperate with hospitals.
This article really impressed me. I think this development is very important and
useful today and i like that medicine is upgrading.
https://www.zdnet.com/article/google-cloud-unveils-healthcare-data-engine-for-a-holistic-view-of-health-data/
https://voca.ro/1leCZVUWV7lu
ecologists is the first comprehensive investigation of how humans interacted
with plant
A new study shows that lending conditions imposed by the International Monetary
Fund
in our comparative investigation we observed more juvenile
https://voca.ro/193NROf4CNZ6
· #45
Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 02 June 2022 09:42)
Exam Topic #8 *Radio equipment helping to save on bills."
Radio equipment helps to rescue on bills. For example: Radio Frequency
Identification. A technology for the unique identification of physical objects
using radio tags. The radio tag contains a microchip that stores the detection
detector, as well as a way for the antenna to convey information to special
radio receivers. This technology optimizes the development of diseases in a wide
area of the patient, which achieves the installation of labels on a specific
structure and tracking the route of its movement. This allows you to manage
efficient inventory down to a single item. It also allows you to monitor the
cost of electricity and more.
Vocaroo: https://voca.ro/1acXRFNzJMqC
· #44
Pushkash Maxim (RZ-212 Popovich) (Thursday, 02 June 2022 09:41)
Researchers from Institut Fresnel introduce a novel optical horn antenna
platform for label-free detection of single proteins in the UV with
unprecedented resolutions and sensitivity. The approach combines (i) a conical
horn reflector for fluorescence collection at ultrahigh angles with (ii) a metal
nanoaperture for fluorescence enhancement and background screening. To
experimentally demonstrate the usefulness of the approach and its direct
application to biochemical challenges, the real-time detection of UV
autofluorescence from immobilized and diffusing single proteins is demonstrated,
together with experiments monitoring unfolding and dissociation upon
denaturation of a widely used protein with single-molecule resolution.
Importantly for biochemical applications, all the single-molecule experiments
are performed on label-free proteins and at physiological conditions, which is
unique in this scientific.
Voice: https://voca.ro/17c60HhYQF0z
1) comparative investigation of
A comparative investigation of methods for longitudinal data with limits of
detection through a case study.
2) condition imposed by
The condition imposed by the Fates had been met , and the decree was irrevocable
3) comprehensive investigation of
In the dissertation, comprehensive investigation of the helical FCG and of the
power conditioning circuit is carried out theoretically, numerically and
experimentally.
Voice: https://voca.ro/1jtmAv93X5PK
· #43
Lebedeva E. (Thursday, 02 June 2022 09:40)
To Ivan Zarytskiy RZ-211, Kapeliushnyi Vladyslav (RZ-211), Artem Kotliarov RZ-212, Ilinchuck Vladislav RZ-211, Misha Donenko RZ-211, Denis Zavadsky Lebedeva RZ-211 Thank you for your effective work.
· #42
Vorobyova E. to Shlapak from РЗ-213 (Thursday, 02 June 2022 09:37)
You have coped with the tasks, I have found no mistakes in your class work. Go on working like this.
· #41
Vorobyova E. to Siglyanyk from РЗ-213 (Thursday, 02 June 2022 09:35)
Well done, thanks for your understanding of the article and effective work with the new phrases.
· #40
Ivan Zarytskiy RZ-211 (Lebedeva) (Thursday, 02 June 2022 09:35)
Today I have read the article “A new way to train deepfake detection algorithms
improves their success”. This article is about an improved system of deepfack
detection. Deepfakes are images and videos which combine mixed source materials
to produce a synthetic result. Their use ranges from trivial to malicious, so
methods to detect them are sought after, with the latest techniques often based
on networks trained using pairs of original and synthesized images. A new method
defies this convention by training algorithms using novel synthesized images
created in a unique way. Known as self-blended images, these novel training data
can demonstrably improve algorithms designed to spot deepfake images and video.
In my opinion, this can decrease the number of fakes on the internet and on TV.
https://techxplore.com/news/2022-05-deepfake-algorithms-success.html
https://voca.ro/1c0M2NrTM0mp
comparative investigation of
in our comparative investigation we observed more juvenile nathusius'
pipistrelles (pipistrellus nathusii) dead beneath wind turbines than expected
from their frequency in the local population(Y нашому порівняльному дослідженні
ми спостерігали більше молодих натузіусів (pipistrellus nathusii) загиблих під
вітрогенераторами, ніж очікувалося з огляду на їхню частоту серед місцевого
населення)
comprehensive investigation of
Their collaboration with anthropologists, archaeologists, and ecologists is the
first comprehensive investigation of how humans interacted with plant and animal
species in different cultures.(Їхня співпраця з антропологами, археологами та
екологами є першим комплексним дослідженням того, як люди взаємодіяли з видами
рослин і тварин у різних культурах.)
condition imposed by
The team collected over 4,500 loan-related IMF documents to identify policy
conditions imposed on 131 borrowing countries between 1985 and 2014.(Команда
зібрала понад 4500 документів МВФ, пов’язаних із кредитами, щоб визначити умови
політики, накладені на 131 країну-позичаль у період з 1985 по 2014 рік.)
https://voca.ro/1ltbLD5QKk7G
· #39
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 02 June 2022 09:32)
Exam topic #6 «Benefits of Satellite TV.»
One of the main advantages of satellite TV is the picture and sound quality.
Many channels are already broadcasting in high definition (HD) format and using
stereo sound, which will allow you to fully enjoy your favorite movie or sports
broadcast.
No less important is the fact that no terrestrial television operator can offer
the widest choice of television channels for every taste, broadcast from
satellite.
I believe that the transition from analog signals to satellite television
greatly simplifies our lives and contributes to the development of technology
and improved signal quality.
https://voca.ro/1gKczsH57ChN
· #38
Vorobyova E. to Yakimova from РЗ-213 (Thursday, 02 June 2022 09:32)
It’s not bad, but mind the articles and Sequence of Tenses in the sentence of the review on the article: “THE scientists…THE study showed that…COULD NOT…it PROVIDED…”. Continue working.
· #37
Sofia Gilenko РЗ-211 (Yershova Y.A.) (Thursday, 02 June 2022 09:31)
Today I've read the article "Artificial skin capable of feeling pain could lead
to a new generation of touch-sensitive robots".
An electronic skin that can learn from the feeling of "pain" could help create a
new generation of smart robots with human sensitivity.
Scientists have been working for decades to create artificial skin that is
sensitive to touch. One method that has been widely researched is to spread an
array of contact or pressure sensors over the surface of the e-skin to allow it
to detect when it is making contact with an object.
In my opinion, this article is very important, because in the future this
research can become the basis for a more advanced electronic skin, which will
allow robots to explore the world and interact with it.
https://techxplore.com/news/2022-06-artificial-skin-capable-pain-touch-sensitive.html
1) conditions imposed by
It is impossible to conduct research with the conditions imposed by superiors.
2)comprehensive investigation of
Accordingly, I support the calls for a more comprehensive investigation.
3) comparative investigation of
Comparative investigation of constitutive models for shotcrete based on
numerical simulations of deep tunnel advance
https://voca.ro/1brGurQ3L1RY
https://voca.ro/1izTxtneTHwL
· #36
Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 02 June 2022 09:29)
Exam topic #14
Commercial use of radio
November 2, 1920 was the day of the widely acclaimed first commercial radio
broadcast, when Westinghouse Electric and Manufacturing Company broadcast the
results of the Harding-Cox presidential election live. Over the last century,
radio has evolved from a cumbersome experimental environment to a modern mobile
format. Radio has discovered new technologies such as television and cell
phones. For many, radio was the fastest and most reliable way to receive news
about national and world events. Even now, radio continues to be a hot form of
mass communication and remains one of the few free services.
https://voca.ro/1mKwxbqEs1JY
https://www.fcc.gov/media/radio/history-of-commercial-radio
Exam Topic #12
Benefits of Satellite TV
Satellite TV has many advantages. The Satellite TV eliminates various
interferences and noises, allowing make the broadcast of the highest quality. An
important advantage is that satellite coverage extends to the whole of country,
so the location of the subscriber does not matter. By connecting to satellite
broadcasting, the subscriber chooses the desired channels for viewing, without
being tied to the packages of various operators. Therefore, satellite
broadcasting is quite profitable for the TV channels themselves, as the picture
is always high quality, and this only increases the prestige of the company
itself. Satellite TV also has a wealth of information that can be used for both
education and entertainment.
https://voca.ro/1hNdLjSYJzZW
https://www.streetdirectory.com/travel_guide/121722/televisions/the_top_benefits_of_satellite_tv_in_your_home.html
· #35
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 02 June 2022 09:29)
Today i have read the article called"A highly performing transistor based on an
inorganic metal halide perovskite" which tells us about transistors. Transistors
are electronic components that amplify and control the flow of electricity
within most electronic devices in existence. The principle behind the operation
of the new transistors is similar to the principle underlying the operation of
conventional enhancement-mode silicon transistors. computers, TVs and
smartphones. At present, the developed tin-based transistor shows high
performance, but its stability in air is low.
I believe that even such well-established technologies need to be improved.
https://techxplore.com/news/2022-03-highly-transistor-based-inorganic-metal.html
https://voca.ro/1fWGshGyQXo4
1. Condition imposed by
Condition imposed by the company can lead to consequences.
Умова, встановлена компанією, може призвести до наслідків.
2. Comparative investigation.
Comparative investigation showed good results.
Порівняльне дослідження показало хороші результати.
3. Comprehensive investigation.
Сomprehensive investigation can better understand the cause of this problem.
Комплексне дослідження може краще зрозуміти причину цієї проблеми.
https://voca.ro/19OgvC2Sj8NU
· #34
Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 02 June 2022 09:28)
DEBT
Exam topic #12
Benefits of Satellite TV
From a consumer's point of view, cable and satellite TV packages may seem almost
identical. While both have many of the same features, there are also some
differences. Satellite TV providers usually offer a wider selection of channels
than most cable companies. One of the advantages of satellite television is its
wide availability. The picture offered by both satellite TV providers is often
better compared to cable TV. As a satellite TV user, I believe this is the best
investment in enjoying a wide range of digital programming.
https://voca.ro/1dXu3KHuOsuG
https://itstillworks.com/difference-between-digital-cable-satellite-6082624.html
DEBT
Exam topic #9
Development of television in your home country.
Telecommunications is the most modern, diverse and rapidly growing sector of the
Ukrainian economy. Unlike the country's dominant export industries,
telecommunications rank high in European and global rankings. The main TV
channels are part of large financial holdings. In Ukraine, people have a choice
between many TV channels. The head of the Public Television and Radio Company of
Ukraine, said that all programs on all channels of the company - both national
and regional - will be accompanied by sign language, but there are no
approximate dates for implementation yet. The most viewed TV channels in Ukraine
are commercial.
https://voca.ro/1nwJg1MAeuxa
https://studopedia.org/5-97958.html
· #33
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Thursday, 02 June 2022 09:26)
The article I have read today "Scientists break through exascale barrier for
quantum chemistry simulations". The author of the article talks about a team led
by scientists who succeeded in becoming the first group in the world to overcome
the main barrier to "exaflop" - more than 1 trillion floating point operations
per second - for computational scientific applications. Thanks to this
achievement, they set a new world record. They made a breakthrough with the help
of the Perlmutter supercomputer. Perlmutter is currently the fifth fastest
computer in the world.
https://techxplore.com/news/2022-06-scientists-exascale-barrier-quantum-chemistry.html
https://voca.ro/1nLksUZqZaBm
1) The study represents the most comprehensive investigation of historic genetic
diversity in whales.
Дослідження являє собою найбільш повне дослідження історичного генетичного
різноманіття китів.
2) Without the conditions imposed, the operation will significantly reduce the
alternatives that Mexican farmers.
Без встановлених умов операція значно зменшить альтернативи мексиканським
фермерам.
3) In our comparative investigation we observed many juvenile nathusius.
У нашому порівняльному дослідженні ми спостерігали багато молодих натусів.
https://voca.ro/1j82YZi7ehlP
· #32
Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 02 June 2022 09:25)
1. Сonditions imposed by
Умови, нав'язані
That affordability makes hematite attractive as an oxygen-carrier material, but
high performance at the conditions imposed by the chemical looping process is
also important.
Така доступність робить гематит привабливим як матеріал-переносник кисню, але
також важлива висока продуктивність в умовах, пов’язаних з хімічним циклом.
2. Comparative investigations of
Порівняльні дослідження
The time to revive the comparative investigations of approach has arrived.
Настав час відродити порівняльні дослідження підходу.
3. Сomprehensive investigation of
Комплексне дослідження
To our knowledge, this study is the first comprehensive investigation of
artificial neural networks
Наскільки нам відомо, це дослідження є першим комплексним дослідженням штучних
нейронних мереж
Today I read the article entitled "Intelligent optical chip to improve
telecommunications". This article is about the discovery in optical technology.
These technologies use optical pulsed sources to transmit, extract or compute
information. Scientists have developed an intelligent pulse shaper integrated
into the chip. The device has long-term reliability, low losses, fiber optic
connection and maximum functionality. The team's next steps include exploring
more complex chip designs. The goal is to improve device performance as well as
built-in optical sampling integration.
https://voca.ro/17I5NAQ7vhoS
https://phys.org/news/2021-10-intelligent-optical-chip-telecommunications.html
· #31
Artem Kotliarov RZ-212 (Lebedeva E.) (Thursday, 02 June 2022 09:24)
1) 1. condition imposed by
Where a country's capacity to develop has been disrupted by conflict, the
financial conditions imposed by international lending institutions should be
relaxed. - Якщо здатність країни до розвитку була порушена через конфлікт,
фінансові умови, встановлені міжнародними кредитними установами, мають бути
пом’якшеними.
2. comprehensive investigation of
The most comprehensive investigation of the function of these inner retinal
photoreceptors has come from studies of retinal degeneration in mammals. -
Найбільш повне дослідження функції цих внутрішніх фоторецепторів сітківки
отримало дослідження дегенерації сітківки у ссавців.
3. comparative investigation of
Comparative investigation of constitutive models for shotcrete based on
numerical simulations of deep tunnel advance - Порівняльне дослідження
конститутивних моделей для торкрету на основі чисельного моделювання просування
глибокого тунелю
https://voca.ro/1bKXJb9w0Lfg
2) Today, І have read thе аrtісlе «New research explores the impact of the
COVID-19 pandemic on nuclear security»
Researchers from King's College, London, have published a new study examining
how Britain's civilian nuclear sector has responded to the challenges posed by
COVID-19. The COVID-19 pandemic has had a significant impact on the nuclear
sector and its critical national infrastructure. Challenges include increasing
absenteeism due to infections and forced isolation, limiting the number of staff
in enterprises, physical restrictions on those on site to minimize disease
transmission, and the large-scale shift to remote work.
In my opinion, this study provides a new insight into how nuclear safety was
introduced at the operational level after the launch of COVID-19.
https://techxplore.com/news/2022-02-explores-impact-covid-pandemic-nuclear.html
https://voca.ro/1kZiu1bHRzqd
3) Exam topic #18 ("Protection schemes”)
Nowadays, protection schemes are everywhere. Each bank, company, organization
etc. have their own protection schemes. These schemes are usually some code
written by a high-quality specialist to secure data from the villain. It's
always very important to have individual way to protect a big amount of
information, that's why schemes are always checking to have a stable control on
situation, because at least one mistake can destroy all the system. In general,
only robbers and hackers want to get the access to the system to stole
information or money.
https://voca.ro/1fFR53ctWGWs
· #30
Yershova Y. (Thursday, 02 June 2022 09:22)
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 02 June 2022 09:14)
Your comment is thoughtful. Thank you for your effective work with the phrases.
· #29
Ilinchuck Vladislav RZ-211 (Lebedeva) (Thursday, 02 June 2022 09:21)
Today I have read the article "Scaling new heights with new research showing how
plants can grow at altitude". This the article is about a new study has found
that plant species are adapted to the altitude where they grow by 'sensing' the
oxygen levels that surround them. Research led by scientists at the University
of Nottingham has identified a mechanism through which plants can sense
atmospheric oxygen levels (that decrease with altitude) that will help to
understand how plants live at high altitude.Researchers analyzed plants growing
at low and high-altitude locations. The team, working in Nottingham, Ecuador and
Spain was able to identify how oxygen-sensing controls the pathway of
chlorophyll synthesis, permitting plants to match the levels of a key toxic
chemical to surrounding oxygen levels.
In my opinion , this article is very interesting for everyone , especially for
people who love plants and new technologies . I think this technology will
become very useful soon
1)https://phys.org/news/2022-06-scaling-heights-altitude.html
2)https://voca.ro/13HlFsD9vKE8
condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.
comparative investigation of
Stiftung Warentest carries out more than 200 comparative product tests and
investigations of services from nearly all areas of everyday life every year.
Stiftung Warentest щороку проводить понад 200 порівняльних тестів продуктів і
досліджень послуг майже з усіх сфер повсякденного життя.
comprehensive investigation of
This is also the reason why Ethiopia has been adamantly resisting a
comprehensive investigation of all the events that led to the current crisis.
Це також є причиною того, що Ефіопія непохитно протидіє комплексному
розслідуванню всіх подій, які призвели до нинішньої кризи.
3)https://voca.ro/1iTpWuoRMV7o
· #28
Misha Donenko RZ-211 Lebedeva (Thursday, 02 June 2022 09:21)
Today I’ve read the article “How children are being targeted with hidden ads on
social media”. Using funny memes, insider-driven stories or inspirational
content, this type of advertising disguises its commercial nature. Anything
works so long as it promotes positive emotions in the consumer. Research has
shown how they result in consumers constructing raising mental defenses as they
realize they're being sold to. To my mind children have fewer skills for
recognizing advertising than adults—they just don't have the experience and
17–24 year-old children are more prone to process
advertising affectively because, as neuroscientific research confirms,
their brain structure is undergoing dramatic changes and the neocortex is in
upheaval.
How children are being targeted with hidden ads on social media (techxplore.com)
https://voca.ro/1ab8L3FsYFI7
1)comparative investigation of
This Note provides the results of the comparative investigation requested.
Ця примітка містить результати запитуваного порівняльного дослідження.
2)comprehensive investigation of
Accordingly, I support the calls for a more comprehensive investigation.
Відповідно, я підтримую заклики до більш комплексного розслідування.
3)condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.
https://voca.ro/1grJCHeuZSN6
· #27
Pushkash Maxim (RZ-212 Popovich) (Thursday, 02 June 2022 09:19)
Exam Topic #10 (information protection systems)
The basic tenets of information security are confidentiality, integrity and
availability. Every element of the information security program must be designed
to implement one or more of these principles. Together they are called the CIA
Triad. Confidentiality
Confidentiality measures are designed to prevent unauthorized disclosure of
information. Integrity
Consistency includes protection against unauthorized changes (additions,
deletions, alterations, etc.) to data. Availability
Availability is the protection of a system’s ability to make software systems
and data fully available when a user needs it (or at a specified time).
Voice: https://voca.ro/1hNvplpMJGW7
· #26
Denis Zavadsky Lebedeva RZ-211 (Thursday, 02 June 2022 09:17)
Additive manufacturing, the technical name for 3D printing, encompasses a
variety of material processing techniques, the most widely adopted among them
being laser powder bed fusion (LPBF). It works by spreading thin layers of
metallic powder particles that are bonded together through intense heat
delivered by high-powered lasers. But this process can result in the formation
of tiny pores that weaken the overall structure.
I think this is a worthwhile discovery, since a metal 3D printer can help with a
huge number of problems.
https://techxplore.com/news/2022-05-insights-3d-metals.html
The Secretary-General informed the Council that a more comprehensive
investigation of the 5 June 1993 incident was being undertaken.
The Institute of legal and comparative investigations is established in
Kazakhstan (2009).
He argued that privatization was often a loan condition imposed by IFIs.
Генеральний секретар поінформував Раду про те, що проводиться більш комплексне
розслідування інциденту 5 червня 1993 року.
У Казахстані створено Інститут правових і порівняльних розслідувань (2009).
Він стверджував, що приватизація часто була умовою позики, яку накладають
міжнародні фінансові установи.
https://voca.ro/1onJ8sZ0vgjc
· #25
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 02 June 2022 09:14)
1. Today I have read the article 'Novel solar cell architecture performs well
under real-world constraints'.
To overcome the limit of received electricity from converting sunligth,
researchers have made different designs for solar cells to make them more
effective. For instance, hot-carrier solar cells (HCSCs) make use of the excess
kinetic energy of photoexcited electrons (before they are lost as heat) to
improve PCE. JPE Editor-in-Chief Sean Shaheen (University of Colorado Boulder)
remarks, "Hot-carrier photovoltaics have been proposed since the early 1980s as
a way to achieve higher efficiencies that break the conventional
'detailed-balance' limit, but they have yet to be realized in practice.
In my opinion, improving the ways of obstaining the green energy is a really
good decision, and that way, non-renewable energy with the time will be put
aside.
2.
https://techxplore.com/news/2022-06-solar-cell-architecture-real-world-constraints.html
3. https://voca.ro/18Ns4ITPV3DN
4. 1) comparative investigation of
A comparative investigation of methods for longitudinal data with limits of
detection through a case study.
2) condition imposed by
The condition imposed by the Fates had been met , and the decree was irrevocable
3) comprehensive investigation of
In the dissertation, comprehensive investigation of the helical FCG and of the
power conditioning circuit is carried out theoretically, numerically and
experimentally.
5. https://voca.ro/168otw2Hi86j
· #24
Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 02 June 2022 09:12)
Exam Topic #4 (Turning the DTV signal)
Digital television (DTV) is the transmission of television signals using digital
encoding, in contrast to the earlier analog television technology which used
analog signals. At the time of its development it was considered an innovative
advancement and represented the first significant evolution in television
technology since color television in the 1950s. Modern digital television is
transmitted in high-definition television (HDTV) with greater resolution than
analog TV. It typically uses a widescreen aspect ratio (commonly 16:9) in
contrast to the narrower format of analog TV.
https://voca.ro/12sVOmWxr0ha
· #23
Lebedeva E. (Thursday, 02 June 2022 09:11)
To Mykola Zhmurak RZ-211 The comment is informative and detailed.
· #22
Shlapak Dmytro RZ-213 (Vorobyova) (Thursday, 02 June 2022 09:11)
1. With the help of a comprehensive investigation of, our company has achieved
high mortality rates among employees.
2. - Why have your comparative investigations of not yielded any results for 3
months?
3. - We will not fulfill these conditions imposed on us by the country.
Today I have read the article "Mexico sets conditions for Bayer-Monsanto
merger". I don't really understand business, how companies buy each other, how
major deals are concluded, etc.. But, I like the idea of merging two large
companies, that and small ones too. As for me, when two companies that have
something in common merge, something very promising turns out, something that
can give a person something new and useful. I also like how Bayer offered its
competitor to buy companies, as for me this is a very worthy move, because in
this way Bayer shows its respect for the competitor.
https://phys.org/news/2018-06-mexico-conditions-bayer-monsanto-merger.html
https://voca.ro/1eeOQUhjnEKP
· #21
Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 02 June 2022 09:08)
Exam Topic #3 (Early radio development)
The early history of radio is the history of technology that produces and uses
radio instruments that use radio waves. Within the timeline of radio, many
people contributed theory and inventions in what became radio. Radio development
began as "wireless telegraphy". Later radio history increasingly involves
matters of broadcasting. After the discovery of these "Hertzian waves" (it would
take almost 20 years for the term "radio" to be universally adopted for this
type of electromagnetic radiation) many scientists and inventors experimented
with transmitting and detecting Hertzian waves. Maxwell's theory showing that
light and Hertzian electromagnetic waves were the same phenomenon at different
wavelengths led "Maxwellian" scientists to assume they would be analogous to
optical light.
https://voca.ro/1o94wgf6k4rn
· #20
Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 02 June 2022 09:06)
Prhases of Day
1. condition imposed by : https://voca.ro/11PXPXEAqzAS
It finally gained approval after agreeing to 400 separate environmental
conditions imposed by the Chilean government
Він нарешті отримав схвалення після погодження з 400 окремими екологічними
умовами, встановленими урядом Чилі
2. comprehensive investigation of : https://voca.ro/13yr879IGLQB
ANSTO has contributed to a comprehensive investigation of a promising type of
nanoparticle that could potentially be used for intractable brain cancers in a
combined therapy.
ANSTO внесла внесок у комплексне дослідження перспективного типу наночастинок,
які потенційно можуть бути використані для лікування раку мозку, який не можна
вилікувати, у комбінованій терапії.
3. comparative investigation of : https://voca.ro/1fZjhpV8eHFk
The study represents the first systematic and comparative investigation of
cognitive abilities in lemurs and provides important insights into the evolution
of cognitive abilities in primates.
Дослідження являє собою перше систематичне і порівняльне дослідження когнітивних
здібностей у лемурів і дає важливе уявлення про еволюцію когнітивних здібностей
у приматів.
Article: https://phys.org/news/2018-11-stronger-cybersecurity-strategy.html
Audio: https://voca.ro/1iJDkitZ5dpm
Today, an interesting article was read by me.The main idea is to create
strategies to combat cybercrime.
It consists of two parts: before the incident and after the incident. It is very
important that everyone knows the plan of action for any of the parts.
For example, in the first part, each specialist must work to identify certain
vulnerabilities in the system, and communicate with other employees to
effectively solve this problem.
In the second part, each structure or company must describe actions to avoid
maximum damage to systems and further protection against cyber attacks, etc.
In my opinion, it is very important to have an action plan for any development
of the situation, because it will increase the effectiveness of solving such
problems
· #19
Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 02 June 2022 09:05)
Today I have read the article "Topologically tuned terahertz on a nonlinear
photonic chip". It says that compact terahertz functional devices are highly
useful for high-speed wireless communication, biochemical sensing and
non-destructive inspection. However, controlled terahertz generation, alongside
transport and detection is challenging for chip-scale devices, due to low
coupling efficiency and absorption losses. The team used femtosecond-laser
writing technology to develop the construct with a topological defect at the
central interface. I believe that this research will allow the development of
future photonic technologies.
https://phys.org/news/2022-06-topologically-tuned-terahertz-nonlinear-photonic.html
https://voca.ro/1dpSKtrvFOSn
1) conditions imposed by
It is impossible to conduct research with the conditions imposed by superiors.
Неможливо проводити дослідження з умовами, які нав’язує начальство.
2) comprehensive investigation of
Сomprehensive investigation can be carried out only after the internal one.
Всесторонне дослідження можна проводити тільки після внутрішнього.
3) сomparative investigations of
A comparative study was not conducted due to misunderstandings.
Порівняльне дослідження не проводилося через недорозуміння.
https://voca.ro/12Xo6jw109Zc
· #18
Anna Yakymova/ RZ-213(Vorobyova E.V.) (Thursday, 02 June 2022 09:00)
Phrases of the day(02/06/2022):
1. comprehensive investigation of - комплексне розслідування
Their collaboration with anthropologists, archaeologists, and ecologists is the
first comprehensive investigation of how humans interacted with plant and animal
species in different cultures.( Їхня співпраця з антропологами, археологами та
екологами є першим комплексним дослідженням того, як люди взаємодіяли з видами
рослин і тварин у різних культурах.)
link: https://phys.org/news/2019-02-reveals-humanity-roles-ecosystems.html
audio recording: https://voca.ro/1kHW6C5GFFYB
2. comparative investigation of - порівняльне дослідження про
The study represents the first systematic and comparative investigation of
cognitive abilities in lemurs and provides important insights into the evolution
of cognitive abilities in primates.
(Дослідження являє собою перше систематичне і порівняльне дослідження
когнітивних здібностей у лемурів і дає важливе уявлення про еволюцію когнітивних
здібностей у приматів.)
link: https://phys.org/news/2020-09-primate-brain-size-intelligence.html
audio recording: https://voca.ro/17UizLdt4a0J
3. condition imposed by - умова встановлена
"Without the conditions imposed, the operation will significantly reduce the
alternatives that Mexican farmers have at their disposal to a broad range of
seeds and non-selective pesticides, which could lead to higher prices and less
innovation, research and development of new products," the regulator said.
(«Без встановлених умов операція значно зменшить альтернативи, які мають у
своєму розпорядженні мексиканські фермери, до широкого спектру насіння та
неселективних пестицидів, що може призвести до підвищення цін і меншої кількості
інновацій, досліджень і розробок нових продуктів», – сказав регулятор.)
link: https://phys.org/news/2018-06-mexico-conditions-bayer-monsanto-merger.html
audio recording: https://voca.ro/1k2SN67JCXRn
Review:
Today I have read the article "Primate brain size does not predict their
intelligence".
Monkeys are known to have large brains and are our closest relatives. But does
brain size really affect the mind of an animal?
Scientists conducted a study that showed that the relationship between brain
size and cognitive abilities cannot be generalized and it provides new insights
into the evolution of cognitive abilities in primates. The results of the new
study show that despite their smaller brains lemurs average cognitive
performance in the tests of the PCTB was not fundamentally different from the
performances of the other primate species.
Further comparative studies in a variety of other species are essential to
answer the many questions about the relationship between brain size, diet,
social life and cognition.
Link: https://phys.org/news/2020-09-primate-brain-size-intelligence.html
Audio recording: https://voca.ro/1K2Z8Sj7BgR2
· #17
Lebedeva E. (Thursday, 02 June 2022 08:54)
To Daniil Dragin (RZ-211) Thanks for the comment.
· #16
Mykola Zhmurak RZ-211(Lebedeva) (Thursday, 02 June 2022 08:53)
Today i have read the article titled "Toward speech recognition for uncommon
spoken languages". This article is about automated speech-recognition
technology. But this technology didn't spread for uncommon spoken languages.
Researchers at MIT and elsewhere have now tackled this problem by developing a
simple technique that reduces the complexity of an advanced speech-learning
model, enabling it to run more efficiently and achieve higher performance. This
is an important problem that needed to solve. Because other uncommon languages
underexplored in the world.
Article -
https://techxplore.com/news/2021-11-speech-recognition-uncommon-spoken-languages.html
Vocaroo - https://voca.ro/1o13PdU1VBfN
Phrases :
1) comprehensive investigation of
After gaining state independence increased the importance of comprehensive
investigation of folklore samples and followed by new scientific projects.(Після
здобуття державної незалежності зросло значення всебічного дослідження
фольклорних зразків, а за ним почалися нові наукові проекти.)
2) comparative investigation of
Comparative investigations based on DNA analysis were performed by the
Netherlands Forensic Institute (NFI), in response to a request made by the
United Nations Mission.(Порівняльні дослідження на основі аналізу ДНК були
проведені Нідерландським інститутом судової експертизи (NFI) у відповідь на
запит Місії ООН.)
3) condition imposed by
This new condition imposed by the Committee raises some difficult legal
issues.(Ця нова умова, встановлена Комітетом, викликає ряд складних правових
питань.)
Vocaroo - https://voca.ro/1lWxO6MjqX6S
· #15
Daniil Dragin (RZ-211 Lebedeva E) (Thursday, 02 June 2022 08:49)
1)Today I have read the article '''New technique offers faster security for
non-volatile memory tech''.This article is about a new hardware and software
method to improve file system(NVM) security. NVM is a new technology that
provides fast data access and retains data even in the event of a system crash
or power outage. Their hardware-software method can improve the performance of
all programs that work with file encryption, because it speeds up the encryption
and reading of these files, as well as making the system more stable and
protected from external threats.
In my opinion, our future will be completely connected with information, which
means that information will become the most important resource, and if we have
methods for protecting information, this can lead to chaos in the world.
2)https://techxplore.com/news/2022-04-technique-faster-non-volatile-memory-tech.html
3)https://voca.ro/1mMGxfZUP0gN
4)
1)comparative investigation of
This Note provides the results of the comparative investigation requested.
Ця примітка містить результати запитуваного порівняльного дослідження.
2)comprehensive investigation of
Accordingly, I support the calls for a more comprehensive investigation.
Відповідно, я підтримую заклики до більш комплексного розслідування.
3)condition imposed by
This new condition imposed by the Committee raises some difficult legal issues.
Ця нова умова, встановлена Комітетом, викликає ряд складних правових питань.
5)https://voca.ro/1arQu54ORnOx
· #14
Lebedeva E. (Thursday, 02 June 2022 08:47)
To РЗ-211 The lesson will start soon, so I am waiting for your comments, sentences with Phrases and audio recordings
· #13
Yershova Y. to PЗ-211 (Thursday, 02 June 2022 08:21)
Good morning! The lesson has started. Please, don't waste your time and work within the timeframe of your session. Good luck!
· #12
Anton Ardelyan RZ-211(Gvozd O.V.) 03.05 (Wednesday, 01 June 2022 17:17)
Today i have read the article "DuckDuckGo can now block the Google Chrome
tracking method, FLoC" an alternative search engine provider, announced in early
spring that it had developed an extension for the Chrome browser that blocks
FLoC tracking. FLoC is a "feature" Google added to its browser to track user
habits for targeted advertising. Many users have complained about the invasion
of privacy, and that is why DuckDuckGo created an extension to block it.
Link:
https://techxplore.com/news/2021-04-duckduckgo-block-google-chrome-tracking.html
Audio: https://voca.ro/1luwEtDX7cOb
Phrases:
1)It's beyond the scope of this work.
Це виходить за рамки цієї роботи.
2)Start by outlining the situation you were in.
Почніть з опису ситуації, в якій ви опинилися.
3)Such processes are classified as electrocyclic.
Такі процеси відносять до електроциклічних.
Audio: https://voca.ro/1Htx1FEoOx6A
· #11
Anna Yakymova/ RZ-213(S.Mykhailiuk) (Wednesday, 01 June 2022 12:41)
1.
https://phys.org/news/2015-09-nasa-upper-level-westerly-affecting-tropical.html
https://voca.ro/1mGvqk0HHHSg
I ` m going to write a few words about the article I have recently read. The
article is headlined «NASA shows upper-level westerly winds affecting Tropical
Storm Fred». The article is about changes in weather. Much attention is given to
the effect of upper-level winds on a tropical storm. NASA's Aqua satellite
imagery showed the highest thunderstorms southeast of the storm's center. AIRS
data also showed some of the highest, coldest, strongest thunderstorms with the
temperature of the top of the clouds over storm Fred. Then this cyclone is
encountering strong upper-level winds, so weakening is forecast.
In my view, this information is useful because it is especially difficult to
predict weather changes. And everyone wants to know what the weather will be
like tomorrow.
2.
https://techxplore.com/news/2021-08-drones-obstacles-high.html
https://voca.ro/1HAj8zLWQhom
Today I have read the article :"System trains drones to fly around obstacles at
high speeds".This article is about how scientists teach drones to fly as
efficiently as possible at high speeds. In drone races, accidents are very
common due to crashes and misbehavior at high speeds. Scientists have developed
a drone behavior algorithm based on theory and practice. Studying the behavior
of drones in practice is very expensive due to the fact that drones are often
crashed and in order to minimize losses, scientists have created an algorithm
that contains theoretical data and fills in their gaps with data from real
flights. Drones using such algorithms fly slower than regular ones in some
places, but in the end they outperform regular drones.In my opinion, such drones
are very useful because they can help people in difficult situations. For
example, to search for survivors of natural disasters.
3.
https://techxplore.com/news/2021-10-social-media-speech-online-gaming.html
https://voca.ro/1cJbGFzlNciC
I've read the article "Social media can learn how to regulate speech"
The author's point of view is that social media evolved from games as places
where people could communicate, and though there is not explicit gameplay
involved, such sites are in fact a game of their own, with people seeking likes,
retweets or other cooperation. The authors argued a bottom-up approach would
work better because of economies of scale and cultural differences. Social media
companies employ thousands of people to review problematic posts and make
decisions about whether they are allowable.
In my opinion this is an interesting article with an interesting thought.
4.
The article is headlined «A visual database of human plasma compounds». The
article is about creation of a database of metabolites from blood samples by
Japanese scientists. This database is available online for the whole world.
Other countries and regions also cover similar bases. Many people add samples to
jMorp so that the application is useful and scientists can analyze the data. And
scientists update the database every year.
I found the article interesting because such a database is convenient and useful
in the digital age.
https://phys.org/news/2017-12-visual-database-human-plasma-compounds.html
https://voca.ro/12k88qZdhSCH
5.
The article is headlined 'FBI launches phone app to help find missing children'.
The article is about application for searching for missing children, created by
the FBI. Parents can enter the child's physical IDs for easy find in the app.
For example, height and weight. But the application is only available on the
iPhone because of the FBI wants to increase the functionality.
In my view, this article is useful because thousands of children are lost or
disappear every day and this application is convenient for their search.
https://phys.org/news/2011-08-fbi-app-children.html
https://voca.ro/18RsOPUJNzPE
· #10
Lebedeva E. (Wednesday, 01 June 2022 12:24)
To Neblienko V. / RZ-212 / Thanks for the work. Keep on this way.
· #9
Neblienko V. / RZ-212 / Lebedeva (Wednesday, 01 June 2022 12:07)
(Отработка за 19.05.2022)
Today i have read the article titled: 'Breakthrough Listen project releases
analysis of previously detected signal'. This article describes a detailed study
of the signal, allegedly from the Proxima Centauri system, although the
researchers are inclined to believe that this signal is of terrestrial origin
and has no connection with the above cluster system.
Two research papers, published in Nature Astronomy, discuss both the detection
of the candidate signal and an advanced data analysis process that can finely
discern "false positives."
In my opinion, although this study of the signal did not bring anything special
and sensational, the researchers consolidated the experience of studying and
processing signals, which is just as good.
Article: https://phys.org/news/2021-10-breakthrough-analysis-previously.html
Vocaroo: https://voca.ro/1frWFtuZLCr4
Phrases:
by outlining
The report concludes by outlining briefly major issues in the financing of the
sectoral clusters under review
В заключительной части доклада кратко освещаются основные вопросы, связанные с
финансированием рассматриваемых секторов.
classified as
Anti-personnel mines are classified as excessively injurious weapons.
Противопехотные мины классифицируются как оружие, производящее чрезмерно
травмирующее действие.
beyond the scope of
He knows technical details beyond the scope of his job
Он знает технические подробности больше, чем того требуют его функции.
Vocaroo: https://voca.ro/196VkSFads7d
· #8
Neblienko V. / RZ-212 / Lebedeva (Wednesday, 01 June 2022 11:52)
(Отработка за 19.05.2022)
Exam topic Password as a general technique of secrecy #17
Password - a conditional word or an arbitrary set of characters, consisting of
letters, numbers and other symbols, and designed to confirm identity or
authority. If only numbers are allowed, then such a combination is sometimes
called a PIN code (from the English abbreviation PIN - personal identification
number).
Passwords are often used to protect information from unauthorized access. Most
computing systems use a username/password combination to authenticate a user.
Despite the origin of the term, the password does not have to be, in fact, a
word. A combination that is not a word is harder to guess or guess, so these
passwords are preferred.
Vocaroo: https://voca.ro/182j59X5x36N
· #7
Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:50)
Відпрацювання 5
Now almost every person was interested in his development and how smart he is,
tests don’t help with this, but how do we find out how smart computers or other
devices are
article titled: "AI software overcomes high hurdles in IQ tests, but still makes
stupid mistakes. Can better tests help?" will help us in this matter. Artificial
intelligence (AI) language models, trained on billions of words from books, news
articles and Wikipedia, can create incredibly human prose. They can create
tweets, summarize emails, and translate into dozens of languages. They can even
write tolerable poetry. And, like A students, they quickly master the tests,
called tests, that computer scientists develop for them.
It was Sam Bowman's sobering experience when he and his colleagues created a
hard new benchmark for language models called GLUE (Global Language
Understanding Assessment). GLUE gives AI models the ability to train on datasets
containing thousands of sentences and gives them nine tasks, such as determining
whether a test sentence is grammatical, assessing its sentiment, or assessing
whether one sentence logically entails another. After completing the tasks of
each model, an average score is set.
At first, Bowman, a computer scientist at New York University, thought he had
confused the models. The best of them scored less than 70 points out of 100
(D+). But in less than 1 year, the newer and better models scored about 90
points, surpassing humans. “We were very surprised by the surge,” Bowman says.
So in 2019, the researchers made the test more difficult, calling it SuperGLUE.
Some of the tasks required the AI models to answer reading comprehension
questions after digesting not only sentences but also paragraphs taken from
Wikipedia or news sites. Again, the humans had an initial lead of 20 points.
“What happened next wasn't all that shocking,” says Bowman. By early 2021,
computers were once again beating humans.
Competition for top test scores has led to real progress in the field of AI.
Many believe that the ImageNet challenge, a computer vision competition that
began in 2010, has revolutionized deep learning, a leading approach to
artificial intelligence in which brain-inspired "neural networks" learn on their
own from large sets of examples. But the best test takers aren't always
superhuman in the real world. Time and time again, models succeed in tests but
fail when deployed or scrutinized. “They fall apart pretty easily,” Bowman says.
Article:https://www.science.org/content/article/computers-ace-iq-tests-still-make-dumb-mistakes-can-different-tests-help
· #6
Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (Wednesday, 01 June 2022 11:21)
Exam Topic: Antivirus programs.
How antivirus software works
Antivirus software typically runs as a background process, scanning computers,
servers or mobile devices to detect and restrict the spread of malware. Many
antivirus software programs include real-time threat detection and protection to
guard against potential vulnerabilities as they happen, as well as system scans
that monitor device and system files looking for possible risks.
Vocaroo:https://voca.ro/19yiUYucOKO8
· #5
Mitriev Vitaliy RZ-213(Vorobyova RZ-213)(Homework) (Wednesday, 01 June 2022 11:19)
Exam Topic: Different protection mechanisms
The main protective mechanisms are activities aimed at ensuring engineering
measures of confidentiality, integrity and availability of information.
Protective mechanisms are divided into:
Physical - various engineering tools and structures that complicate or eliminate
the physical intrusion of offenders into objects of protection and into material
carriers of confidential information;
Hardware - mechanical, electrical, electronic and other devices designed to
protect information from leakage, disclosure, modification, destruction, as well
as counteraction to technical intelligence;
Software - special programs for computers that implement the functions of
protecting information from unauthorized access, copying, modification,
destruction and blocking;
Cryptographic - technical and software means of data encryption based on the use
of various mathematical and algorithmic methods;
When combined, these three mechanisms provide very strong protection of data and
computers.
https://voca.ro/135I4EZEAAN2
· #4
Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:16)
Відпрацювання 4
In 2022, each person has his own gadget in which he stores his confidential
information and each person has the right to privacy, but is this privacy itself
really, in the article that I read and I want to tell you about it, it is about
this and how we can avoid surveillance. Satcha is titled: "Technology Spying on
You? New AI Could Prevent Eavesdropping." The article is about the fact that
Companies use "bossware" to listen to their employees when they are near their
computers. Several "spy" applications can record phone calls. And home devices
like the Amazon Echo can record everyday conversations. A new technology called
Neural Voice Camouflage now offers protection. It generates its own audio noise
in the background when you speak, confusing the artificial intelligence (AI)
that decodes our recorded voices.
The new system uses an "adversarial attack". The strategy uses machine learning,
in which algorithms find patterns in data, to tune sounds in such a way that AI,
not humans, mistake them for something else. Essentially, you are using one AI
to fool another.
However, the process is not as simple as it seems. The machine learning AI has
to process the entire sound clip before it knows how to set it up, which doesn't
work when you want to mask in real time.
So in the new study, the researchers trained a neural network, a brain-inspired
machine learning system, to effectively predict the future. They trained him on
hours of speech recording so that he could constantly process 2-second snippets
of audio and mask out what was likely to be said next.
For example, if someone just said "enjoy a big feast", they cannot accurately
predict what will be said next. But, taking into account what has just been
said, as well as the characteristics of the speaker's voice, it produces sounds
that will break a number of possible phrases that may follow. This includes what
actually happened next; here the same speaker says, "It is being prepared." To
listeners, sound camouflage sounds like background noise and they have no
problem understanding spoken words. But cars stumble.
This is just the first step in protecting privacy in the face of AI, says Mia
Chikier, a computer scientist at Columbia University who led the study.
“Artificial intelligence collects data about our voice, faces and actions. We
need next-generation technology that respects our privacy."
Chiquier adds that the predictive part of the system has great potential for
other applications that require real-time processing, such as autonomous
vehicles. “You have to anticipate where the car will be, where the pedestrian
might be,” she says. The brain also works by waiting; you get surprised when
your brain mispredicts something. In this regard, Chikyo says: "We imitate the
way people act."
"There's something nice about how it combines future prediction, a classic
machine learning problem, with another adversarial machine learning problem,"
says Andrew Owens, a computer scientist at the University of Michigan at Ann
Arbor who studies audio processing. and visual camouflage and did not
participate in the work. Bo Li, a computer scientist at the University of
Illinois at Urbana-Champaign who has worked on audio adversarial attacks, was
impressed that the new approach worked even against a hardened ASR system.
Sound masking is badly needed, says Jay Stanley, senior policy analyst at the
American Civil Liberties Union. “We are all susceptible to our innocent speech
being misinterpreted by security algorithms.” Maintaining privacy is hard work,
he says. More precisely, it is a Harenar ov resonance.
Article:https://www.science.org/content/article/technology-spying-you-new-ai-could-prevent-eavesdropping
· #3
Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:15)
Відпрацювання 3
To date, very popular information about new diseases and viruses, this is the
article I came across when reading the news and scientific discoveries "Analysis
of 6.4 million genomes of SARS-CoV-2 revealed mutations associated with
adaptation", very intriguing and in at the same time frightening. Satya is very
big but, I want to show you how important to me is what is written in it. Satya
says that the SARS-CoV-2 pandemic was characterized by recurrent waves of cases
caused by the emergence of new lines with higher fitness, where fitness includes
any trait that affects the growth of the line, including its baseline
reproductive number (R 0). ability to evade existing immunity and generation
time. Rapid identification of such pedigrees as they emerge and accurate
prediction of their dynamics is crucial for controlling the response to an
outbreak. Effective implementation of this task will benefit from the ability to
study the entire global SARS-CoV-2 genomic data set. The large size (currently
more than 7.5 million viral genomes), as well as the geographical and temporal
variability of the available data, are serious problems that will become more
serious as more viruses are sequenced. Current phylogenetic approaches are
computationally inefficient for datasets with more than ~ 5,000 samples, and it
takes days to operate on this scale. Special methods for assessing the relative
suitability of specific SARS-CoV-2 lines are a computationally efficient
alternative.), But usually relied on models in which one or two lines of
interest are compared to all others and do not reflect the complex dynamics of
several circulating lines. When modeling the relative fitness of SARS-CoV-2
lines, we estimated their growth as a linear combination of the effects of
individual mutations. To this end, we have developed PyR 0, a hierarchical
Bayesian regression model that allows scalable analysis of the complete set of
publicly available SARS-CoV-2 genomes, which can be applied to any set of virus
genomic data and to other viral phenotypes. The model shown in Fig. S1,
described in detail in the supplementary materials, avoids the difficulty of
complete phylogenetic inference by initially clustering genomes by genetic
similarity (PANGO line refinement) and estimating the additional effect on the
growth rate of each of the most common amino acid substitutions in the lines in
which they occur. By regressing the growth rate along the genome sequence, the
model divides the statistical power among genetically similar lines, without
relying explicitly on phylogeny. By modeling only the polynomial proportions of
different pedigrees, not the absolute number of samples for each pedigree, and
doing so within 14-day intervals in 1560 globally distributed geographical
regions, the model achieves resilience to a number of bias sources that affect
all lines in different regions. and over time, including differences in data
collection and changes in transmission due to factors such as social behavior,
public health policies and vaccination.
Article:https://www.science.org/doi/10.1126/science.abm1208
· #2
Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:14)
Відпрацювання 2
I've always been interested in information about scientific discoveries and
breakthroughs, which is exactly the kind of article I came across, entitled
"Breakthrough in Fusion: What It Means for the Future of Energy." The article
begins with the fact that European scientists have announced a major
breakthrough in the desire to develop a practical nuclear fusion - an energy
process that feeds the stars. The British laboratory JET broke its own world
record for the amount of energy obtained by compressing two forms of hydrogen
together.
The experiments yielded 59 megajoules of energy in five seconds (11 megawatts of
power).
This is more than twice as much as was obtained during similar tests in 1997.
This is not too much energy - only about 60 kettles of water are enough to boil.
But the importance of this achievement lies in the fact that it confirmed the
correctness of the project developed for a larger thermonuclear reactor, which
is currently being built in France.
This is great information for me, but it doesn't end there.
The ITER facility, located in the south of France, is supported by a consortium
of world governments, including the EU, the United States, China and Russia. It
is expected that this will be the last step in confirming the fact that nuclear
fusion can become a reliable source of energy in the second half of this
century.
The operation of fusion-based power plants of the future will not lead to
greenhouse gas emissions and will generate only a very small amount of
short-lived radioactive waste.
"These experiments, which we have just completed, should have worked," said JET
CEO Professor Ian Chapman. "If they did not work, we would have real concerns
about whether ITER will be able to achieve its goals."
"The stakes were high, and what we've achieved has been achieved thanks to
incredible people and their faith in science," he told BBC News.
Thermonuclear fusion is based on the principle that energy can be released by
fusing atomic nuclei, rather than by fission, as in the case of fission
reactions, which operate existing nuclear power plants.
In the core of the Sun, this is due to the enormous gravitational pressure at
temperatures of about 10 million degrees Celsius. At a much lower pressure than
possible on Earth, the temperatures for synthesis must be much higher - more
than 100 million degrees Celsius.
There are no materials that can withstand direct contact with such heat.
Therefore, to achieve thermonuclear fusion in the laboratory, scientists have
developed a system in which superheated gas or plasma is kept inside a magnetic
field in the shape of a donut.
The Joint European Torus (JET) reactor, located in Kalham, Oxfordshire, has
pioneered this approach to synthesis, which it has been working on for almost 40
years. And over the last 10 years, it has been tuned to recreate the future look
of the ITER facility.
Article:https://www.bbc.com/ukrainian/features-60318751
· #1
Simchuk Alexey (Vorobyova RZ-213) (Wednesday, 01 June 2022 11:13)
Відпрацювання 1
Today I read an interesting scientific article: "A geomagnetic storm blew out of
orbit over 40 satellites of Elon Musk." In which it is told about the fact that
Elon Musk's company "SpaceX" confirmed that a strong geomagnetic storm struck
over 40 satellites. They also added that, at the same time, the company began to
sing that the situation would not become a threat to people: there would be no
other companions, there would be no cosmic death.
SpaceX satellites are programmed to self-destruct every hour of re-entry into
the Earth's atmosphere.
Forecasters explain that the geomagnetic storm vinicked through the overworld
sleepy activity, as a result of which the Earth's atmosphere heats up and
expands.
There is nothing unusual in this world, but for the singing intensity of the
expansion of the atmosphere, it becomes unsafe for space objects that go to low
orbit.
Behind the front pranks, 40-49 SpaceX satellites suffered. Let's talk about the
party that was put into orbit last Thursday as part of the Starlink project,
something like that - to protect the entire planet with the Internet.
Article:https://www.bbc.com/ukrainian/news-60319205