Information Security, Radio electronics and Telecommunications
|Інформаційна безпека, радіоелектроніка та телекомунікації
Guestbook – May 2022
· #1103
· Lebedeva E. (Tuesday, 31 May 2022 15:54)
To Diakin Nikita RZ-211 The comments are quite ok, but too short. Also, there are some mispronounced words. Now I am waiting for exam topics.
· #1102
S.Mykhailiuk (Tuesday, 31 May 2022 14:45)
To Kate Kholodova (RZ-212, just good for all activities.
· #1101
S.Mykhailiuk (Tuesday, 31 May 2022 14:42)
To Сhmel Maksim RF-211 just good.for your comments.
· #1100
S.Mykhailiuk (Tuesday, 31 May 2022 14:41)
To Vivchar Roman (RF-211 CV just good for all tasks. Thanx.
· #1099
S.Mykhailiuk (Tuesday, 31 May 2022 14:37)
To Сhmel Maksim RF-211 just good.
· #1098
S.Mykhailiuk (Tuesday, 31 May 2022 14:35)
To Kulaksyz S. (RF-211, just good for exam topics. Task2 is incomplete. Keep on working hard.
· #1097
S.Mykhailiuk (Tuesday, 31 May 2022 14:33)
To Vlada Gromovaya (RF-211) Very good , thanks.
· #1096
S.Mykhailiuk (Tuesday, 31 May 2022 14:31)
To Ivkov Yurii (RF-211) Very good, thanks.
· #1095
S.Mykhailiuk (Tuesday, 31 May 2022 14:28)
To Julia Shevchuk (RF-211) just 80 points , thanks.
· #1094
S.Mykhailiuk (Tuesday, 31 May 2022 14:25)
To Maksim Teliga (RF-211) CV just 74 points for all tasks. Make a conclusion pls.
· #1093
S.Mykhailiuk (Tuesday, 31 May 2022 14:22)
Rosinskiy Kyrylo RF-211 Just 72 points for topics There should be a conclusion. Task2 with phrases is good.
· #1092
S.Mykhailiuk (Tuesday, 31 May 2022 14:16)
Maksim Teliga (RF-211) There’s one student in the group who posted the same comment on the exact topic. Task2 is 73 points . Keep on working hard.
· #1091
S.Mykhailiuk (Tuesday, 31 May 2022 14:12)
To Pontus Natalia(RF-211) Task
1 is 73 points.Task2 is good.
Keep on working hag
· #1090
S.Mykhailiuk (Tuesday, 31 May 2022 14:06)
To Bilokamenskiy Anton (RF-211)pls make a conclusion at the end. 70 points, Task2 is incomplete. Keep on working hard.
· #1089
S.Mykhailiuk (Tuesday, 31 May 2022 14:00)
To
#1065
Shulyak Makar (RF-211) Pls make a conclusion but don’t state the known things .
Just 70 points.
· #1088
Diakin Nikita RZ-211 (Lebedeva) (Tuesday, 31 May 2022 13:59)
24 may
Today I have read an article “How explosion in ocean life built the first
mountains”. This article tells about recent research on this topic. Ultimately
what this research has shown is that the key to the formation of mountains was
life, demonstrating that the Earth and its biosphere are intimately linked in
ways not previously understood.
Article: https://phys.org/news/2021-11-explosion-ocean-life-built-mountains.html
AUDIO: https://voca.ro/1eYdJhUUj9Ku
the main objective
Recent reports by the Intergovernmental Panel on Climate Change conclude that
cutting fossil fuel emissions—the main objective of carbon dioxide.(ОстаннізвітиМіжурядовоїгрупиекспертівзізміникліматуроблятьвисновок,
щоскороченнявикидіввикопногопалива
—
головнеджереловуглекислогогазу)
by means of
Movement of small water droplets controlled by means of a magnet.(Рухомдрібнихкрапельводикеруютьзадопомогоюмагніту.)
published in
Related results were published in Earth System Science Data.
(Відповідні результати були опубліковані в Earth System Science Data.)
· #1087
Diakin Nikita RZ-211 (Lebedeva) (Tuesday, 31 May 2022 13:59)
19 may
Today I have read an article “Waters off French coast in winter may be a deadly
trap for small, foraging turtles”. It tells that waters off French coast in
winter are too cold for small, foraging turtles. Published in Frontiers in
Marine Science, satellite tracking data reveals that while some turtles may be
able to return home, after their rehabilitation and release to Florida in the
US, or Cape Verde off the African coast, younger individuals are at risk of
being trapped in the region.
Article - https://phys.org/news/2021-10-french-coast-winter-deadly-small.html
Audio - https://voca.ro/15Cbjaibe0rt
above the average
His standard of living on the farm was above average and he could employ
farmworkers to help him with the improvements.(Йогорівеньжиттянафермібуввищесереднього,
івінмігнайнятифермерів,
щобдопомогтийомузпокращенням.)
information management
The consultants stressed the importance of improved information management.(Консультантинаголосилинаважливостівдосконаленняуправлінняінформацією.)
inventions related
They have patented two inventions related to underwater photography.(Вонизапатентувалидвавинаходи,
пов’язанізпідводноюфотографією.)
· #1086
Diakin Nikita RZ-211 (Lebedeva) (Tuesday, 31 May 2022 13:58)
17 may
Today I have read an article “Russia launches classified military satellite”.
This article tells information that Russia on Thursday successfully placed into
orbit a military satellite. A Soyuz rocket carrying a classified payload blasted
off from the Plesetsk cosmodrome in northern Russia in the early hours of
Thursday morning. According to the Spaceflightnow website, which covers space
launches, the launch could be a delivery of a Tundra satellite.
Article: https://phys.org/news/2021-11-russia-military-satellite.html
AUDIO: https://voca.ro/15PYzKDvDt7e
practical problems
Yet when these experts bring AI into the real world and use it to solve
practical problems, they have to answer questions such as why the AI made a
specific prediction or decision.(Проте,
колиціекспертивпроваджуютьШІвреальнийсвітівикористовуютьйогодлявирішенняпрактичнихпроблем,
вониповиннівідповістинатакізапитання,
як,
чомуШІзробивконкретнепередбаченняаборішення,
ічидаєвіндостатньовпевненості,
щобмимоглидіяти.)
priority research area
A new study led by ANU has mapped priority research areas around the world to
protect thousands of mammal species.(Новедослідження,
проведене
ANU,
накреслилопріоритетнідослідницькіобластівусьомусвітідлязахистутисячвидівссавців.)
prevailing view
Study challenges prevailing view on how metal organic frameworks store gases by
Lynn Yarris, Lawrence Berkeley National Laboratory.(ЛіннЯрріс,
НаціональналабораторіяЛоуренсаБерклі,
вивчитипроблеми,
пов'язанізпереважаючимпоглядомнате,
якметалоорганічнікаркасизберігаютьгази.)
· #1085
Diakin Nikita RZ-211 (Lebedeva) (Tuesday, 31 May 2022 13:56)
12 may
Today I have read an article “South African groundwater project shows the power
of citizen science”. This article tells about how the South African groundwater
project has influenced the citizens. As a result of collecting data, people in
the villages are now curious about water. They want to know more and they are
really proud of being able to read the data—in other words, to be water
literate.
Article:
https://phys.org/news/2021-11-south-african-groundwater-power-citizen.html
AUDIO: https://voca.ro/125fkO9qIQn8
identify the areas
The study also identified areas in the world with the greatest diversity in
landraces of these 25 crops, which included parts of Bangladesh, Ethiopia,
India, Nepal, and Pakistan.(Дослідженнятакожвизначилорайонисвітузнайбільшоюрізноманітністюмісцевихсортівцих
25
культур,
яківключаличастиниБангладеш,
Ефіопії,
Індії,
НепалутаПакистану.)
grouped into
Referred to as partial synchronization, it emerges such that systems can be
grouped into clusters such that synchrony is only observed in each cluster.(Згадуєтьсяякчастковасинхронізація,
вінвиникаєтакимчином,
щосистемиможутьбутизгрупованівкластеритакимчином,
щосинхронністьспостерігаєтьсялишевкожномукластері.)
describe above
In addition to the common Skype interview I describe above, some interesting
twists are now seen in the marketplace.(Надодатокдозвичайногоінтерв’юв
Skype,
якеяописаввище,
заразнаринкуможнапобачитидеякіцікавіповороти.)
· #1084
Diakin Nikita RZ-211 (Lebedeva) (Tuesday, 31 May 2022 13:55)
10 may
Today I have read an article “Four reasons why physically punishing school
children doesn't work”. At the start of this article the author tells us his
life story and shares his experience about the topic, then he defines four main
reasons why physically punishing school children doesn't work. These reasons
are: Learning and the brain, Escalation, Role models and Psychological damage.
Article: https://phys.org/news/2021-11-physically-school-children-doesnt.html
focused primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation.
(Вони зосередилися насамперед на програмі SolSmart, програмі VEP, яка заохочує
місцеві органи влади впроваджувати найкращі практики для просування сонячних
установок.)
for a number of reasons
The technology is novel for a number of reasons, one being that it has the
potential to provide new insight into the environmental factors that have
significant impacts on air pollution levels.(Цятехнологіяєновоюзрядупричин,
одназякихполягаєвтому,
щовонаможедатиновеуявленняпрофакторинавколишньогосередовища,
якімаютьзначнийвпливнарівеньзабрудненняповітря.)
first use of
Researchers document the first use of maize in Mesoamerica.(ДослідникизадокументувалипершевикористаннякукурудзивМезоамериці.)
AUDIO: https://voca.ro/13KPWWrO3Ces
· #1083
Diakin Nikita RZ-211 (Lebedeva) (Tuesday, 31 May 2022 13:54)
5 may
Today I have read an article “Extreme drought in Brazil triggers fatal sand
storms”. It tells about unusually powered sandstorms that left six people dead
in San Paulo. All of these people were victims of falling trees or houses.
Sandstorms were the result of a long period of a lack of rain, high temperature
and low humidity. In addition to this, Brazil is facing its worst drought in 91
years.
Article:https://phys.org/news/2021-10-extreme-drought-brazil-triggers-fatal.html
AUDIO: https://voca.ro/13KPWWrO3Ces
distinct from
It is distinct from electrical science and technology, which deal with the flow
of electrons and other charge carriers through metal conductors such as copper.(Вінвідрізняєтьсявіделектричноїнаукитатехніки,
якімаютьсправузпотокомелектронівтаіншихносіївзарядучерезметалевіпровідники,
такіякмідь.)
examine more closely
If they took the time to more closely examine the environment, they usually find
that the processor is not the bottleneck that believe it to be.(Якщовонизнайшличас,
щоббільшуважновивчитинавколишнєсередовище,
вонизазвичайвиявляють,
щопроцесорнеєвузькиммісцем,
якимвінвважає.)
estimate the effects
The tool can also estimate the effects of felling existing woodland by
calculating the health costs attributable to the PM2.5 that would no longer be
removed from the air by those trees.(Інструменттакожможеоцінитинаслідкивирубкиіснуючоголісу,
обчислюючивитратинаохоронуздоров’я,
пов’язаніз
PM2,5,
якібільшенебудутьвидалятисязповітряцимидеревами.)
· #1082
S.Mykhailiuk (Tuesday, 31 May 2022 13:54)
To Gridnev Dmytro(RF-211) Task1 is too lengthy without a conclusion. Just 60 points. As to your audio file, , you need to train to make good record, Task2 is 75 points.
· #1081
Diakin Nikita RZ-211 (Lebedeva) (Tuesday, 31 May 2022 13:53)
3 may
Today I have read an article “Climate change is making one of the world's
strongest currents flow faster”. It tells about research that was made by
Scripps Institution of Oceanography at UC San Diego, Woods Hole Oceanographic
Institution, the Chinese Academy of Sciences, and UC Riverside. The research is
about The Antarctic Circumpolar Current (ACC), the only ocean current that
circumnavigates the planet, and it is speeding up.
Article:
https://phys.org/news/2021-11-climate-world-strongest-currents-faster.html
AUDIO: https://voca.ro/1lHER37z2mvu
keep track
The system lets the search commander keep track of several teams at once,
coordinate efforts and get an on-the-ground look at wilderness conditions and
clues.
(Система дозволяє командиру пошуку відстежувати кілька команд одночасно,
координувати зусилля та отримувати на місці умови та підказки.)
on the contrary
ML tools are, on the contrary, capable of detecting complex patterns in
relatively small datasets.(Інструменти
ML,
навпаки,
здатнівиявлятискладнізакономірностіувідносноневеликихнаборахданих.)
meet the demand
To meet the demand for strong and tough transparent thin films for sustainable
applications, Dr Sunanda Roy from GLA University India has led a multi-national
team to successfully develop a novel …(Щобзадовольнитипопитнаміцнітаміцніпрозорітонкіплівкидлядовготривалогозастосування,
докторСунандаРойз
GLA University India
очоливбагатонаціональнукомандууспішнорозробитиновий...)
· #1080
S.Mykhailiuk (Tuesday, 31 May 2022 13:47)
To Mashegirov Eugene (RF-211) Just good concerning the topic (too lengthy). Task2 is good too. Keep on working hard.
· #1079
Lebedeva E. (Tuesday, 31 May 2022 13:41)
To Andrey Mashovets RZ-212 You don't need to use "I find this article useful..." when you work with exam topics. Also, don't send the link to the literature. It is supposed that you are to work with more than one source when preparing the topic.
· #1078
Lebedeva E. (Tuesday, 31 May 2022 13:39)
To Ram Nassur Rz 212 There are some mispronounced words. Go on practising your pronunciation, you can train your reading with the help of Listen and Pronounce, which is on this page above the Guestbook chat.
· #1077
Andrey Mashovets RZ-212(Lebedeva E.) (Tuesday, 31 May 2022 12:53)
Exam Topics “Principles of information protection”.
This article is about information security and principles of information
security protection.
The purpose of this article is to tell what information security, what threats
and methods of response to threats.
A threat is defined as an event facilitated by a weakness that could lead to
unauthorised access to an electronic system. Some of the main cyber security
threats include ransomware, phishing attacks, unpatched vulnerabilities and
insider attacks.
I find this article useful for protecting information security.
https://voca.ro/145eVVcW6kmO
https://thecyphere.com/blog/principles-information-security/
Exam Topics “Authority check”.
This article is about the authority of the website.
The purpose of this article is to tell what is the authority of the site, as
well as to show methods of checking the authority of the site.
Some people call this "domain authority," which is not to be confused with the
Domain Authority (DA) metric from Moz. When we talk about domain authority,
we're talking about a general SEO concept that's synonymous with "website
authority".
This article will be useful in order to protect the use of the browser by
people.
https://voca.ro/1fEpgB5Vnbid
https://ahrefs.com/website-authority-checker
Exam Topics “Software firewall”.
This article is about what is a Firewall, what are the types, how it works,
types.
The purpose of this article is to tell and show the pros of using a firewall.
A firewall is a security device — computer hardware or software — that can help
protect your network by filtering traffic and blocking outsiders from gaining
unauthorized access to the private data on your computer. Not only does a
firewall block unwanted traffic, it can also help block malicious software from
infecting your computer.
This article will be useful for people who did not use the firewall and who
though learn what it is and how it works.
https://voca.ro/12wjtqrs7XKV
https://ahrefs.com/website-authority-checker
· #1076
Ram Nassur Rz 212 Lebedeva E.V (Tuesday, 31 May 2022 12:32)
If you've had an Apple TV, then you know how easy it is to lose the remote. Its
thin frame is its disadvantage.
Apple introduced AirTags, a disk that tracks your belongings through the Find My
app on the iPhone, and people joked that we could finally track the Apple TV
remote.
But it doesn't seem to be happening. During an interview with the MobileSyrup
website, the increase in the size of the Apple TV remote was enough to reduce
the rate of wastage.
After a while, Apple introduced a new version of Apple TV with an upgraded
remote control.
It also supports Siri so users can search for TV shows and movies using their
voice.
https://techxplore.com/news/2021-05-airtag-tech-lost-apple-tv.html
https://voca.ro/1lKtKsPbkx6t
meet the demand
to meet the demand for food with alternative food sources.
keep track
To keep track of neighbors even in dark or turbid environments, fish must
clearly rely on more than just vision.
on the contrary
tools are, on the contrary, capable of detecting complex patterns in relatively
small datasets.
https://voca.ro/18wmiEMLmCWP
· #1075
Timophey Sipin RZ-212(Popovych) (Tuesday, 31 May 2022 10:49)
Today I have read the text titled «Diversity, streaming reshape video games for
a new generation»
In which we are told about video games, or rather about their progress and
impact on people. The text also says that at the beginning of video games helped
us to unify age, gender, etc. But unfortunately, today games have only increased
these problems (or rather the problem of feminism )
In my opinion, video games still occupy a rather significant place in the life
of people today and even help many with some of their personal problems.
Therefore, I am sure that video games will develop and will soon solve problems
at the expense of gender equality.
https://techxplore.com/pdf523856743.pdf
https://voca.ro/120P7l9dFjnX
1. meet the demand -
задовольнитипопит
To meet the demand for strong and tough transparent thin films for sustainable
applications -
Щобзадовольнитипопитнаміцнітатвердіпрозорітонкіплівкидлядовготривалогозастосування.
2. keep track -
відслідковувати
The system lets the search commander keep track of several teams at once -
Системадозволяєкомандирупошукувідстежуватикількакомандодночасно.
3. on the contrary -
навпаки
On the contrary, all the stakeholders actually continue to interact with their
usual tools -
Навпаки,
усізацікавленісторонифактичнопродовжуютьвзаємодіятизадопомогоюсвоїхзвичайнихінструментів.
Audio: https://voca.ro/1jgsr2pg
· #1074
Gvozd to RZ-211 (Tuesday, 31 May 2022 10:47)
Vasilev A.O RZ-211
Beskrovnyi Vladimir RZ-211
Thank you for your active participation.
Well done.
· #1073
Popovych E. (Tuesday, 31 May 2022 10:26)
To Avdieiev Danil RT-211
Thank you for very thorough and informative article review.
It's interesting to read it. Well done.
· #1072
Popovych E. (Tuesday, 31 May 2022 10:24)
To Yeulizaveta Barsukova (RT-211)
Thank you for the comments and work with the phrases.
I
appreciate it. Keep on working.
· #1071
Popovych E. (Tuesday, 31 May 2022 10:23)
To Artem Verhelis RT-211
The comment of the article is written correctly from the grammatical and lexical
viewpoint and corresponds to the standards of independent student work of such
kind.
· #1070
Popovych E. (Tuesday, 31 May 2022 10:20)
To Sergey Kyznyak RT-211
#1057, 1058
I have read your tasks, they are quite correct and informative.
Exam Topic #8 Radio equipment is well done.
· #1069
Avdieiev Danil RT-211 Popovych E. (Tuesday, 31 May 2022 10:17)
Article: https://techxplore.com/news/2022-05-body-cameras-streaming.html
Today I have read the article titled "Body cameras, live streaming bring search
and rescue into the next generation". It describers about the RescueCASTR system
equips rescuers with 360-degree body cameras that send video and photos back
live to a central command post. To be honest I have an idea to do the same but
for each citisens. Of course optional. It will greatly reduce the crime rate and
crime investigation rate.
vocaroo: https://voca.ro/15BnDBOxeELx
1)on the contrary
We should not set that commitment aside; on the contrary, we must take it into
account in this context.
https://voca.ro/117XPUtNdDwx
Минеповиннівідкидатицезобов'язання;
навпаки,
миповинніцевраховувативцьомуконтексті.
2)keep track
The table is also intended to keep track on all standard references.
https://voca.ro/117XPUtNdDwx
Таблицятакожпризначенадлявідстеженнявсіхстандартнихпосилань.
3)meet the demand
Currently, the quality and accessibility of data do not meet the demand, a
situation that needs to be remedied.
https://voca.ro/1nSIiJquD9HC
Наразіякістьтадоступністьданихнезадовольняютьпопиту,
щопотребуєвиправлення.
· #1068
Lebedeva E. (Tuesday, 31 May 2022 10:11)
To Misha Donenko RZ-211 The exam topic is written correctly.
· #1067
Mashegirov Eugene (RF-211) (S.Mykhailiuk) (Tuesday, 31 May 2022 10:08)
Article: https://england.edu/book-store/laptop-vs-desktop-computer
A desktop and a laptop advantages and disadvantages
Both desktop and laptop computers have advantages and disadvantages. If you are
trying to determine which option will best suit your needs, take a look at the
advantages and benefits each of them offers.
Advantages of a desktop computer, as compared to a laptop computer:
• Desktop computers have more power and more features.
• Desktop computers are easier, and less expensive, to upgrade.
• Desktop computers are generally less expensive overall and offer a better
overall value.
• Desktop computers have a more comfortable keyboard and a much easier to use
mouse. It should be noted that an aftermarket large, comfortable mouse and mouse
pad are also possible with a laptop.
• Desktop computers have larger monitors.
• Desktop computers are generally easier, and less expensive, to repair.
• Desktop computers have a lower risk of theft, which means less chance of
losing your data and having to pay to replace your computer.
Advantages of a laptop computer, as compared to a desktop computer:
• Laptop computers are highly portable and allow you to use your computer almost
anywhere.
• If you are an international student, a laptop computer will be much easier to
transport from home to school and back again.
• Laptop computers take up less room on a desk or table and can be put away when
not in use.
• Laptop computers have a single cord to contend with, rather than the multiple
cords associated with desktop computer use.
I think that both devices have their advantages and disadvantages. There is no
universal option yet. Therefore it is necessary to choose this or that device
according to the purposes.
Audio: https://voca.ro/13q7xHl9MU1D
Phrases of the day
1. meet the demand -
задовольнитипопит
To meet the demand for strong and tough transparent thin films for sustainable
applications -
Щобзадовольнитипопитнаміцнітатвердіпрозорітонкіплівкидлядовготривалогозастосування.
2. keep track -
відслідковувати
The system lets the search commander keep track of several teams at once -
Системадозволяєкомандирупошукувідстежуватикількакомандодночасно.
3. on the contrary -
навпаки
On the contrary, all the stakeholders actually continue to interact with their
usual tools -
Навпаки,
усізацікавленісторонифактичнопродовжуютьвзаємодіятизадопомогоюсвоїхзвичайнихінструментів.
Audio: https://voca.ro/1jgsr2p1cMxR
· #1066
Gridnev Dmytro(RF-211)(S.Mykhailiuk) (Tuesday, 31 May 2022 10:07)
Exam theme:Antivirus programs.
Antivirus software is a class of program designed to prevent, detect and remove
malware infections on individual computing devices, networks and IT systems.
Antivirus software, originally designed to detect and remove viruses from
computers, can also protect against a wide variety of threats, including other
types of malicious software, such as keyloggers, browser hijackers, Trojan
horses, worms, rootkits, spyware, adware, botnets and ransomware.
How antivirus software works
Antivirus software typically runs as a background process, scanning computers,
servers or mobile devices to detect and restrict the spread of malware. Many
antivirus software programs include real-time threat detection and protection to
guard against potential vulnerabilities as they happen, as well as system scans
that monitor device and system files looking for possible risks.
Antivirus software usually performs these basic functions:
Scanning directories or specific files for known malicious patterns indicating
the presence of malicious software;
Allowing users to schedule scans so they run automatically;
Allowing users to initiate new scans at any time; and
Removing any malicious software it detects. Some antivirus software programs do
this automatically in the background, while others notify users of infections
and ask them if they want to clean the files.
In order to scan systems comprehensively, antivirus software must generally be
given privileged access to the entire system. This makes antivirus software
itself a common target for attackers, and researchers have discovered remote
code execution and other serious vulnerabilities in antivirus software products
in recent years.
Vocaroo:https://voca.ro/19yiUYucOKO8
Phrases of the day:
1)keep track-відслідковувати.
Computer need a reliable way to keep track of the virus and contain its spread.
Комп’ютер потребує надійного способу відстеження вірусу та стримування його
поширення.`
2)on the contrary-навпаки
On the contrary, by implementing stronger protocols, you can help to address the
problem at its source.
Навпаки, впроваджуючи сильніші протоколи, ви можете допомогти вирішити проблему
в її джерелі.
3)meet the demand-задовольнитипопит
Market is growing to meet the demand for electronics.
Ринок зростає, щоб задовольнити попит на електроніку.
Vocaroo:https://voca.ro/1hQz99NbN7RF
· #1065
Shulyak Makar (RF-211)(S.Mykhailiuk) (Tuesday, 31 May 2022 10:06)
Device drivers.
More commonly known as a driver, a device driver or hardware driver is a group
of files that enable one or more hardware devices to communicate with the
computer's operating system. Without drivers, the computer could not send and
receive data correctly to hardware devices, such as a printer. Today's operating
systems have many generic drivers that allow hardware to work at a basic level
without needing drivers or software. However, if that device has features
unknown to the operating system, it will not work without drivers. For example,
you could plug any keyboard into a computer and expect it to work. However, if
that keyboard has any special keys or features, they will not work until the
drivers are installed.
Audio: https://voca.ro/1com3FofhYNg
The Phrases of The Day:
1) It means that, wanting that, you will on the contrary do terrible things.
Це
означає, що, бажаючи цього, ви, навпаки, будете робити жахливі речі.
2)Someone, on the contrary, considering a townhouse as a temporary housing
option.
Хтосьже,
навпаки,
розглядаєтаунхаусяктимчасовийваріантжитла.
meet the demand –
задовольнитипотребу
3)Consequently, the Court may wish not to overstretch its work schedule in the
field at any given time.
Відповідно, Суд, можливо, забажає зробити більш напруженим свій графік роботи на
місцях у будь-який заданий період часу.
Audio: https://voca.ro/1nTxMNdfr9jm
· #1064
Dovzhenko Ilya RZ-211 (Lebedeva) (Tuesday, 31 May 2022 10:02)
Exam topic #2 Various security techniques.
Your network faces threats of all shapes and sizes, and thus should be prepared
to defend, identify and respond to a full range of attacks. But the reality is
that the biggest danger to most companies are not fly-by-night threat actors,
but rather attackers that are well-funded and are targeting specific
organizations for specific reasons. For that reason, your network security
strategy needs to be able to address the various methods these actors might
employ.
Access control allows you to increase your network security by limiting user
access and resources to only the parts of the network that directly apply to
individual users’ responsibilities.
Anti-malware tools are a kind of network security software designed to identify
dangerous programs and prevent them from spreading.
https://voca.ro/1kGXiu4GskPs
1)keep track
But the official numbers keep track only of those receiving unemployment
benefits.
Проте офіційна статистика враховує тільки тих з них, хто звертається за
допомогою з безробіття.
2)meet the demand
They need to understand what the tourists want and meet the demand.
Вониповиннізрозуміти,
чогохочутьтуристиізадовольнитипопит.
3)on the contrary
The real economic life, on the contrary, is always a mixture of elements of
different economic systems.
Реальна господарське життя, навпаки, завжди є сумішшю елементів різних
економічних систем.
https://voca.ro/1lGrG87eSt1J
· #1063
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 31 May 2022 10:01)
Class-work
Today I've read the articke 'Team develops mechanism to control actuation,
cooling and energy conversion for soft robotics'. Form-memory polymers have
become increasingly used in robotics. This material can shrink, expand, reshape,
and function like biological muscles when cooled. To accelerate passive cooling,
scientists have developed a flexible mechanism. It's made using 3D printing. The
resulting device can keep the temperature constant and convert thermal energy
into electricity. I think, this is an important development because it allows
you to more accurately control the change in the shape of the material and the
device will be almost independent of chargers.
Article:https://techxplore.com/news/2022-05-team-mechanism-actuation-cooling-energy.html
Audio1:https://voca.ro/1doHAtFemO4a
Phrases
1)on the contrary
We should not set that commitment aside; on the contrary, we must take it into
account in this context.
Ми
не повинні відкидати це зобов'язання; навпаки, ми повинні це враховувати в цьому
контексті.
2)keep track
The table is also intended to keep track on all standard references.
Таблицятакожпризначенадлявідстеженнявсіхстандартнихпосилань.
3)meet the demand
Currently, the quality and accessibility of data do not meet the demand, a
situation that needs to be remedied.
Наразі якість та доступність даних не задовольняють попиту, що потребує
виправлення.
Audio2:https://voca.ro/17qnInZaTAT8
· #1062
Beskrovnyi Vladimir RZ-211 (Gvozd O.V) (Tuesday, 31 May 2022 09:58)
1. Today I have read the article 'Autonomous vehicles can be tricked into
dangerous driving behavior'.
When a driverless car is in motion, one faulty decision by its
collision-avoidance system can lead to disaster, but researchers at the
University of California, Irvine have identified another possible risk:
Autonomous vehicles can be tricked into an abrupt halt or other undesired
driving behavior by the placement of an ordinary object on the side of the road.
The researchers found that cardboard boxes and bicycles placed on the side of
the road caused vehicles to permanently stop on empty thoroughfares and
intersections. In another test, autonomously driven cars, perceiving a
nonexistent threat, neglected to change lanes as planned.
If that is true, then I hope that this drawback will be fixed really quick, as
it can become a really big problem when people don't expect it.
2.
https://techxplore.com/news/2022-05-autonomous-vehicles-dangerous-behavior.html
3. https://voca.ro/1nVy46iGHmKs
4. 1) on the contrary
It doesn't seem ugly to me; on the contrary, I think it's rather beautiful
2) meet the demand
Officials scrambled for ways to meet the demand
3) keep track
Bank statements help you keep track of where your money is going.
5. https://voca.ro/110zuEEIHpOq
Exam topic #20: Principles of information protection
Information security (sometimes referred to as InfoSec) covers the tools and
processes that organizations use to protect information. This includes policy
settings that prevent unauthorized people from accessing business or personal
information. Overall, there are 3 main principles of information security:
1) Confidentiality
Confidentiality measures are designed to prevent unauthorized disclosure of
information.
2) Integrity
Consistency includes protection against unauthorized changes (additions,
deletions, alterations, etc.) to data.
3) Availability
Availability is the protection of a system’s ability to make software systems
and data fully available when a user needs it (or at a specified time).
· #1061
Bilokamenskiy Anton (RF-211) (S.Mykhailiuk) (Tuesday, 31 May 2022 09:58)
Exam Topic
The development of Windows versions
The original Windows 1 was released in November 1985 and was Microsoft’s first
true attempt at a graphical user interface in 16-bit and then on its base was
developed Windows 2.
Windows 95 arrived in August 1995 and with it brought the first ever Start
button and Start menu.
Windows 98 was created in June 1998 and added some features to Internet Explorer
and also, added a lot of Microsoft programms.
Windows 2000 was released in February 2000 and was based on Microsoft’s
business-orientated system Windows NT and later became the basis for Windows XP.
Arguably one of the best Windows versions, Windows XP was released in October
2001 and brought Microsoft’s enterprise line and consumer line of operating
systems under one roof.
Windows XP replaced by Windows Vista in January 2007. Vista updated the look and
feel of Windows with more focus on transparent elements, search and security.
Windows 7 was first released in October 2009. It was intended to fix all the
problems and criticism faced by Vista, with slight tweaks to its appearance and
a concentration on user-friendly features and less “dialogue box overload”.
Released in October 2012, Windows 8 was Microsoft’s most radical overhaul of the
Windows interface, ditching the Start button and Start menu in favour of a more
touch-friendly Start screen.
Announced on 30 September 2014, Windows 10 has only been released as a test
version for keen users to try. The “technical preview” is very much still a work
in progress.
Phrases of the day
1) It means that, wanting that, you will on the contrary do terrible things.
Це
означає, що, бажаючи цього, ви, навпаки, будете робити жахливі речі.
2) Well, my surgery can't meet the demand.
Ну,
мояопераціянеможезадовольнитипопит.
3) It's hard to keep track.
Важко відстежити.
Audio: https://voca.ro/169yuJxwa7AV
· #1060
Pontus Natalia(RF-211) (S.Mykhailiuk) (Tuesday, 31 May 2022 09:57)
Software industry
Software plays a critical role in today's global information economy:
individuals and businesses rely on operating systems and applications to carry
out daily tasks. Software runs the computers, networks and devices that enable
countless products and services from vast enterprise and communications systems
to small 'apps' that run on digital phones. The software industry consists of
the development, distribution, and maintenance of software. It can be broadly
divided into application software, system infrastructure software,
software-as-a-service (SaaS), operating systems, database and analytics
software. Fundamental forces have shaped the evolution of the industry, starting
with the emergence of personal computers, the development of computer networking
and client/server software, and the introduction and widespread adoption of the
Internet, and it continues to grow today.
https://voca.ro/19ZmQrD9sZ5D
Phrases of the day:
keep track –
відслідковувати
Some stations keep track, others don't.
Наоднихстанціяхвінловить,
наінших
-
ні.
on the contrary –натомість,
навпаки
Someone, on the contrary, considering a townhouse as a temporary housing option.
Хтосьже,
навпаки,
розглядаєтаунхаусяктимчасовийваріантжитла.
meet the demand –
задовольнитипотребу
They need to understand what the tourists want and meet the demand.
Вони повинні зрозуміти, чого хочуть туристи і задовольнити попит.
https://voca.ro/1kY426f6hVPo
· #1059
Artem Verhelis RT-211, Popovych E. (Tuesday, 31 May 2022 09:56)
Today I've read the article "When self-driving cars crash, who's responsible?
Courts and insurers need to know what's inside the 'black box' ".
This article is about accidents in Australia and the United States, created by
vehicles controlled by AI from the Tesla company.
The main question here is who to blame for such accidents. It is believed that
manufacturers and developers may not be able to foresee and control everything
that an autonom system does. However, if during testing and monitoring these
vehicles weren't good enough, their testers can be sued.
Audio: https://voca.ro/1fEt04CVJPKL
Article:
https://techxplore.com/news/2022-05-self-driving-cars-responsible-courts-black.html
1) meet the demand
Currently, the quality and accessibility of data do not meet the demand, a
situation that needs to be remedied.
Наявні в даний час дані за своєю якістю не відповідають існуючим потребам, що
потребує вжиття відповідних заходів.
2) on the contrary
On the contrary, identifying these additional dimensions is all part of the
process of building new kinds of machines.
Навпаки, визначення цих додаткових розмірів є частиною процесу створення нових
типів машин.
3) keep track
The system lets the search commander keep track of several teams at once,
coordinate efforts and get an on-the-ground look at wilderness conditions and
clues.
Система дозволяє командиру пошуку відстежувати кілька команд одночасно,
координувати зусилля та отримувати на місці умови та підказки.
Audio: https://voca.ro/18ytgzpnsgn9
· #1058
Sergey Kyznyak RT-211, Popovych E. (Tuesday, 31 May 2022 09:56)
(Article)
Today I have read the article 'Combining AI and computational science for
better, faster, energy efficient predictions'.
The article tells about the new technology "intelligent alloys", the main
purpose of which is combining the power of computational science with artificial
intelligence to develop models that complement simulations to predict the
evolution of science's most complex systems. By using this technology, the
researchers demonstrated that they can generate predictions thousands to a
million times faster than it would take to run the simulations with full
resolution or rely on partial or even faulty information through models. I think
this technology has a huge future that is coming right now.
1)expected value
Either the present value or a future expected value should be used.
Следуетиспользоватьлибонынешнеезначение,
либобудущиеожидаемыезначения.
2)technology capability
At least the exponential growth of information technology capability will
continue unabated.
По
крайней мере, возможности информационных технологий будут расти, не ослабевая, с
экспоненциальной скоростью.
3)work schedule
Consequently, the Court may wish not to overstretch its work schedule in the
field at any given time.
Соответственно, Суд, возможно, пожелает сделать более напряженным свой график
работы на местах в любой заданный период времени.
Vocaroo(article): https://voca.ro/1iVdA1qr4K25
Vocaroo(sentences): https://voca.ro/130pnPRxsJji
https://techxplore.com/news/2022-04-combining-ai-science-faster-energy.html
· #1057
Sergey Kyznyak RT-211, Popovych E. (Tuesday, 31 May 2022 09:55)
Exam Topic #8 Radio equipment helping to save on bills.
Radio equipment helps to rescue on bills. For example: Radio Frequency
Identification. A technology for the unique identification of physical objects
using radio tags. The radio tag contains a microchip that stores the detection
detector, as well as a way for the antenna to convey information to special
radio receivers. This technology optimizes the development of diseases in a wide
area of the patient, which achieves the installation of labels on a specific
structure and tracking the route of its movement. This allows you to manage
efficient inventory down to a single item. It also allows you to monitor the
cost of electricity and more.
Vocaroo: https://voca.ro/1acXRFNzJMqC
· #1056
Vasilev A.O RZ-211 Gvozd O.V. (Tuesday, 31 May 2022 09:52)
Today i have read an article "3D computer models of gigantic archaeological
objects".This article is about new technologies in the archaeological field.
Nowadays 3D modeling is developing very quickly. Researchers have found
applications for it in archeology. With the help of a special camera, the object
is transferred to a computer, where it is already carefully studied. This method
will help them study archaeological finds in a much closer and more detailed
way.
In my opinion, this help to study ancient finds that were discovered earlier and
could not be studied.
https://voca.ro/16zHTivSNKSS
https://phys.org/news/2017-02-d-gigantic-archaeological.html
Exam topic #20 ( Principles of information protection)
The three core principles of information security are called the CIA triad. Data
protection risks are calculated based on likelihood and impacts on each of these
three core IT security principles.
The main components of data security are:
Confidentiality
Integrity
Availability
The purpose of Confidentiality is to protect the data from unauthorised access.
It is possible by implementing access restrictions to allow access to authorised
entities only.
Integrity means preserving the accuracy and completeness of data. This element
ensures that data has not been tampered with and can be trusted. Data security
is sometimes confused with data integrity. It deals with the protection of data,
whereas data integrity deals with trustworthiness.
This refers to the availability of data when authorized users require this data.
Devices, systems, applications, data are of little value to any organization if
their customers can’t access it when they need it. Denial of Service attacks
prevention is an example of ensuring data availability.
https://voca.ro/1nYJ4E9FLnfg
1)on the contrary
It means that, wanting that, you will on the contrary do terrible things.
https://voca.ro/11ckP2rZFKy4
2) keep track
You know I can't keep track any more
https://voca.ro/1gpvJZo3aYOc
3)meet the demand
I mean, pharmacies could stay open 24 hours and they still couldn't meet the
demand.
https://voca.ro/13vUKBDL9ABf
· #1055
Popovych E. (Tuesday, 31 May 2022 09:50)
To Artem Verhelis RT-211,
Exam topic #9 Commercial use of radio is well done.
· #1054
Popovych E. (Tuesday, 31 May 2022 09:49)
To Sasha Movsum-Zade RT-211
Your task is complete, informative and interesting.
Well done.
· #1053
Rosinskiy Kyrylo RF-211 (S.Mykhailiuk) (Tuesday, 31 May 2022 09:47)
Topic №4. A desktop and a laptop-advantages and disadvantages.
There are two types of popular computers: desktop one and laptop. Advantages of
desktop are: easy to modify with hardware parts and periphery devices, speed
work. Disadvantages here are that a desktop computer is not mobile, but
stationary, except on laptops that you can walk with anywhere, and periphery
devices should be bought separately, when in laptop keyboard, touchpad, dynamics
and mostly webcam are always in-build. One advantage of a laptop, that I didn’t
say yet, is comfort to work, you can work at any time and in any place.
Disadvantage here is the battery, often its capacity is not enough for user and
most of the time it stays on the charger.
Audio: https://voca.ro/1nG6KZWABQEv
Phrases of the Day
1. on the contrary -
навпаки
ENG: When we are done with this project we should not immediately start the new
one; on the contrary, we should support it by polishing and adding new features.
UKR: Коли ми закінчимо цей проект, ми не повинні відразу починати новий;
навпаки, ми повинні підтримувати його шляхом полірування та додавання нових
функцій.
2. meet the demand -
відповідативимогам
ENG: Code does not meet the demand, you should rewrite it.
UKR:
Кодневідповідаєвимогам,
йогослідпереписати.
3. keep track -
триматиуполізору
ENG: This part of the application can be bugged, keep track on anomaly things
that you get and try to solve them.
UKR: У цій частині програми можна виявити помилки, тримайте у полі зору
аномалії, які ви отримуєте, і спробуйте їх вирішити.
Audio: https://voca.ro/1246udi77afG
· #1052
Popovych E. (Tuesday, 31 May 2022 09:47)
To El-kadi RT-211
The task is not complete. Your Independent practice must contain an audio
record.
· #1051
Maksim Teliga (RF-211) (S.Mykhailiuk) (Tuesday, 31 May 2022 09:47)
Device drivers.
More commonly known as a driver, a device driver or hardware driver is a group
of files that enable one or more hardware devices to communicate with the
computer's operating system. Without drivers, the computer could not send and
receive data correctly to hardware devices, such as a printer. Today's operating
systems have many generic drivers that allow hardware to work at a basic level
without needing drivers or software. However, if that device has features
unknown to the operating system, it will not work without drivers. For example,
you could plug any keyboard into a computer and expect it to work. However, if
that keyboard has any special keys or features, they will not work until the
drivers are installed.
Audio: https://voca.ro/17Ms0Y2dxJ0Y
Topic: https://en.m.wikipedia.org/wiki/Device_driver
Phrases of the day:
meet the demand -
задовольнитипопит\
відповідатиіснуючимпотребам
1) This system’s resources don’t meet the demand.
-
Ресурсицієїсистеминевідповідаютьіснуючимпотребам.
on the contrary -
навпаки
2) Machine learning tools are, on the contrary, capable of detecting complex
patterns in relatively small datasets.
-
Засобимашинногонавчання,
навпаки,
здатнівиявлятискладніпатерниувідносноневеликихнаборахданих.
keep track -
відслідковувати\
тримативполізору
3) It is very hard to keep track of all possible mistakes in a large amount of
code, so it is good to use try-sequences.
-
Дужеважковідстежитивсіможливіпомилкиувеликійкількостікоду,
томудобревикористовуватипослідовностіспроб.
· #1050
Misha Donenko RZ-211 Lebedeva (Tuesday, 31 May 2022 09:45)
Password as a general technique of secrecy
Today we can install password everywhere. On your smartphone, on social network
page, on bank account. Password reliably protects your information, but only if
you made it hard and unusual. If your password is too easy, hackers will easily
guess it using special password recovery software.
Password must be long, with different numbers, with small and capital letters
and other characters, the harder the better. Also you must have different
passwords for different needs. if you follow these rules, your information will
be under protection and your information will not be stolen by hackers and
online thieves.
https://voca.ro/19ILA3EVWwwe
1) keep track
The system lets the search commander keep track of several teams at once,
coordinate efforts and get an on-the-ground look at wilderness conditions and
clues.
Система дозволяє командиру пошуку відслідковувати кілька команд одночасно,
координувати зусилля та отримувати на місці умови та підказки.
2) on the contrary
On the contrary, by implementing stronger protocols, you can help to address the
problem at its source.
Навпаки, впроваджуючи сильніші протоколи, ви можете допомогти вирішити проблему
в її джерелі.
3) meet the demand
Farmers continued to increase both the quantity and variety of local products to
meet demand.
Фермерипродовжувализбільшуватияккількість,
такірізноманітністьмісцевихпродуктів,
щобзадовольнитипопит.
https://voca.ro/13bXTUADoGfX
· #1049
Artem Verhelis RT-211, Popovych E. (Tuesday, 31 May 2022 09:44)
Exam topic #9
Commercial use of radio.
Commercial broadcasting is the broadcasting of television programs and radio
programming by privately owned corporate media, as opposed to state sponsorship.
Analog audio is the earliest form of radio broadcast. AM broadcasting began
around 1920. FM broadcasting was introduced in the late 1930s with
improved fidelity. Most radios can receive both AM and FM and are called AM/FM
receivers.
Radio delivers a larger audience than other media throughout the morning and is
used by people to accompany tasks and activities across the day, making it
easier for brands to people at relevant times and in relevant places.
Audio: https://voca.ro/1kXkz6bemyrH
· #1048
Popovych E. (Tuesday, 31 May 2022 09:43)
To Nazariy Glugan (RT-211)
Thank you, your tasks are quite correct.
· #1047
Sasha Movsum-Zade RT-211 (Popovych E.) (Tuesday, 31 May 2022 09:43)
Today I have read the article titled "How randomly moving electrons can improve
cyber security". This article describes that in October 2017, tech giant Yahoo!
disclosed a data breach that leaked sensitive information on more than 3 billion
user accounts, leaving them vulnerable to identity theft. The article also
describes that the Company had to force all affected users to change their
passwords and re-encrypt their credentials. In recent years, there have been
several instances of such security breaches that left users vulnerable.
https://techxplore.com/news/2022-05-randomly-electrons-cyber.html
https://voca.ro/1cyHGJmpmcYl
keep track
The table is also intended to keep track on all standard references.
Ця
таблиця спрямовано також те що, щоб у полі зору всі посилання стандарти.
on the contrary
We should not set that commitment aside; on the contrary, we must take it into
account in this context.
Ми
не повинні забувати про це зобов'язання; навпаки, нам слід зважити на це в
нинішньому контексті.
meet the demand
Currently, the quality and accessibility of data do not meet the demand, a
situation that needs to be remedied.
Наявніниніданіщодосвоєїякостіневідповідаютьіснуючимпотребам,
щопотребуєвжиттявідповіднихзаходів.
https://voca.ro/1aOzRFy0UXKs
· #1046
Lebedeva E. (Tuesday, 31 May 2022 09:40)
To Kapeliushnyi Vladyslav (RZ-211.), Mykola Zhmurak RZ-211 Your exam topics are interesting and informative.
· #1045
Gvozd to Vlasov Vadim RZ-211 (Tuesday, 31 May 2022 09:38)
Your reviews are rather interesting, but the quality of the audio recording is bad.
· #1044
Gvozd to RZ-211 (Tuesday, 31 May 2022 09:32)
Dear students!
It's high time to post your comments.
· #1043
Vlasov Vadim RZ-211 (Gvozd O.V) (Tuesday, 31 May 2022 09:32)
Ex
Nowadays authority check is everywhere. Sites use this way of protection to
avoid situations when someone is pretending someone else. There are a lot of way
to identify the person and save the data. The most common are password,
fingerprint, face id or even personal documents. By protecting your authority a
hundred of villains cant hack you, steal important information, change something
on your profile etc. This is very important and effective way to protect
everything and its even impossible to avoid it in routine life.
https://voca.ro/1dsNDMrsOiwX
Today i have read the article: "The biggest data breaches, hacks of 2021"
From the article we learn about the problem of data leakage in our time.
Nowadays, most people neglect their online security, which is why they often
suffer from malware.
In 2021, a type of ransomware spread, due to which a lot of people lost their
data. And also many popular sites were hacked and leaked user data.
In my opinion, such hacks most often occur due to the weak protection that users
choose, or because of its absence.
https://www.zdnet.com/article/the-biggest-data-breaches-of-2021/
https://voca.ro/1jzB6B7aKHec
meet the demand
To meet the demand for strong and tough transparent thin films
Длязадоволенняпопитунаміцнітаміцніпрозорітонкіплівки
on the contrary
On the contrary, by implementing stronger protocols
Навпаки,
шляхомвпровадженнясильнішихпротоколів
keep track
it can be impossible for drivers to keep track of everything around them
водіямможебутинеможливовідстежитивсе,
щоїхоточує
https://voca.ro/13XQWMQZvb43
· #1042
Mykola Zhmurak RZ-211(Lebedeva) (Tuesday, 31 May 2022 09:27)
An isolated virtual machine
The popularity and widespread adoption of cloud computing has resulted in
extensified and intensive use of virtualization technology. Virtualization
technology allows the sharing of the same physical resources among several
users. This enables the consolidation of servers and a multitude of user
machines into a very small set of physical servers, by replacing the physical
machines with virtual machines, running on the same physical servers.
Consequently, several users work on and store their data in the same physical
platform.Centralized storage and centralized computing thus naturally raise the
question of security of user’s data, and motivate studies on how data security
could possibly be compromised.
Vocaroo - https://voca.ro/1oQj08NGSAgB
Phrases :
1) meet the demand
We can't wait to convert buildings until the [electricity] generation,
transmission and storage infrastructure is sufficient to meet the demand.(Минеможемодочекатисяпереобладнаннябудівель,
покиінфраструктуравиробництва,
передачітазберігання
[електроенергії]
небудедостатньоюдлязадоволенняпопиту.)
2) on the contrary
"On the contrary, complex locomotion can emerge from many simple modules acting
in parallel.(«Навпаки,
складналокомоціяможевиникнутизбагатьохпростихмодулів,
щодіютьпаралельно.)
3) keep track
The system lets the search commander keep track of several teams at once,
coordinate efforts and get an on-the-ground look at wilderness conditions and
clues.(Системадозволяєкомандирупошукувідстежуватикількакомандодночасно,
координуватизусиллятаотримуватинамісціумовитапідказки.)
Vocaroo - https://voca.ro/13LUrHaUOwHN
· #1041
Julia Shevchuk (RF-211) (S.Mykhailiuk) (Tuesday, 31 May 2022 09:27)
Exam topic #7: The evolution of operating system.
Computers
have become an integral part of everyone's life, but few people know that only
thanks to operating systems a person was able to get the maximum benefit from
using this. Moreover, I want to say that computers were not always easy to use.
To
begin with, the first OS was invented in 1955, and only people who know the
software component could use it because an ordinary layman could not simply
"google" his request. In 1985, one company made a breakthrough by making an
interface pleasing to the eye out of inconvenient typing in text. Microsoft was
able to achieve the result by creating a graphical shell for its previous
version of the OS.
In
conclusion, we can not even imagine what our interaction will look like with a
computer in 10 years, but I'm sure that developers will not stop at windows 11.
https://voca.ro/191BgQvrMqwE
on the contrary —
навпаки
ML tools are, on the contrary, capable of detecting complex patterns in
relatively small datasets
Інструменти
ML,
навпаки,
здатнівиявлятискладнізакономірностіувідносноневеликихнаборахданих
meet the demand —
задовольнитипопит
Increase the quantity and quality of workers and experts to better meet the
demand of overseas labour markets
Збільшитикількістьіякістьпрацівниківтаекспертів,
щобкращезадовольнитипопитназакордоннихринкахпраці
keep track —
відслідковувати
To keep track of neighbors even in dark or turbid environments, fish must
clearly rely on more than just vision
Щобвідстежуватисусідівнавітьутемномуабокаламутномусередовищі,
рибаповиннапокладатисянетількиназір.
https://voca.ro/13cvjCNfcTlv
· #1040
Ivkov Yurii (RF-211)(S.Mykhailiuk) (Tuesday, 31 May 2022 09:24)
Topic №4. A desktop and a laptop - advantages and disadvantages
Laptops have compact sizes, so you can work wherever you have to; they are easy
to use because brand new devices are ready for usage. However, if you need a
well-performing laptop you’ll have to spend more money on it and there is no way
to fully upgrade it. Also because of compactness laptops cannot be cooled
properly.
Desktops in their turn, are cheaper if compared on the same level of power, and
basically, tend to be much more powerful in perspective then a laptop, so they
are suited for difficult and demanding tasks. But they are stationary, need some
space in the room, and consume more power than laptops.
In my opinion, when choosing between laptop and desktop people should consider
their budget and which way they are going to use the device because it may be
great in one way and bad in another.
Article: https://www.minitool.com/backup-tips/desktop-vs-laptop.html
Phrases of the day
meet the demand -
задовольнитипопит\
відповідатиіснуючимпотребам
1) This system’s resources don’t meet the demand.
-
Ресурсицієїсистеминевідповідаютьіснуючимпотребам.
on the contrary -
навпаки
2) Machine learning tools are, on the contrary, capable of detecting complex
patterns in relatively small datasets.
-
Засобимашинногонавчання,
навпаки,
здатнівиявлятискладніпатерниувідносноневеликихнаборахданих.
keep track -
відслідковувати\
тримативполізору
3) It is very hard to keep track of all possible mistakes in a large amount of
code, so it is good to use try-sequences.
-
Дужеважковідстежитивсіможливіпомилкиувеликійкількостікоду,
томудобревикористовуватипослідовностіспроб.
Vocaroo: https://vocaroo.com/19OkyvkE2aJY
· #1039
Vlada Gromovaya (RF-211) (S.Mykhailiuk) (Tuesday, 31 May 2022 09:23)
Exam topic # 6
Antivirus programs
An antivirus programme is a programme designed to combat computer viruses. These
programmes use various principles in their work to find and cure infected files.
An antivirus software works by scanning incoming files or code that's being
passed through your network traffic. Companies who build this software compile
an extensive database of already known viruses and malware and teach the
software how to detect, flag, and remove them. Once installed, most antivirus
software runs automatically in the background to provide real-time protection
against virus attacks. The most popular free programmes are Avira Free
Antivirus, Avast Free AntiVirus and Microsoft Security Essentials.
Every user must keep their antivirus software up to date to ensure proper
operation of their PC.
Audio: https://voca.ro/1hzmFvV8qunJ
Phrases of the day:
1) keep track -
відслідковувати
The system lets the search commander keep track of several teams at once,
coordinate efforts and get an on-the-ground look at wilderness conditions and
clues.
Система дозволяє командиру пошуку відслідковувати кілька команд одночасно,
координувати зусилля та отримувати на місці умови та підказки.
2) on the contrary -
навпаки
On the contrary, by implementing stronger protocols, you can help to address the
problem at its source.
Навпаки, впроваджуючи сильніші протоколи, ви можете допомогти вирішити проблему
в її джерелі.
3) meet the demand -
задовольнитипопит
Farmers continued to increase both the quantity and variety of local products to
meet demand.
Фермери продовжували збільшувати як кількість, так і різноманітність місцевих
продуктів, щоб задовольнити попит.
Audio: https://voca.ro/1aSqGUGjqhf4
· #1038
El-kadi RT-211(Popovych E.) (Tuesday, 31 May 2022 09:23)
First radio speeches.
The first radio communication session was carried out on May 7, 1895. It was
carried out by the Russian physicist Alexander Popov with the help of a radio
receiver he created.
127 years have passed - and we can no longer imagine our life without radio, or
rather its continuations: television, mobile communications, the Internet, types
of communication based on the transmission of a physical signal.
1) meet the demand
The tire has a robust build to meet the demands of modern SUVs.
Шинимаютьміцнуструктуру,
щобвідповідативимогамсучаснихпозашляховиків
2) keep track
Some stations keep track, others don't.
Наоднихстанціяхвінловить,
наінших
-
ні.
3) on the contrary
After reducing the volume, the skin does not sag, but on the contrary, it
becomes smooth and elastic.
Після зменшення обсягів шкіра не обвисає, а навпаки, стає гладкою і пружною.
· #1037
Nazariy Glugan (RT-211) Popovych E. (Tuesday, 31 May 2022 09:22)
Today I have read the article "Volcanoes on Mars could be active, raising
possibility of recent habitable conditions". This article tells us about recent
volcanic activity on Mars. Most volcanism on the Red Planet occurred between 3
and 4 billion years ago, with smaller eruptions in isolated locales continuing
perhaps as recently as 3 million years ago. But, until now, there was no
evidence to indicate whether Mars could still be volcanically active. Scientists
made this statement leaning on data from satellites orbiting Mars.
I liked this article because I like reading about planets.
https://phys.org/news/2021-05-volcanoes-mars-possibility-habitable-conditions.html
https://voca.ro/1kQKePOeiSd9
1) keep track
The table is also intended to keep track on all standard references.
2)meet the demand
Currently, the quality and accessibility of data do not meet the demand, a
situation that needs to be remedied.
3)on the contrary
We should not set that commitment aside; on the contrary, we must take it into
account in this context.
https://voca.ro/1kOmhjFV742K
· #1036
Lebedeva E. (Tuesday, 31 May 2022 09:20)
To Ivan Zarytskiy RZ-211 The exam topic is informative and detailed. Thank you.
· #1035
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Tuesday, 31 May 2022 09:17)
Exam topic #11
What is the difference between a hardware and a software firewall? A hardware
firewall will have a better level of security and is preferred by most business
users. However, it is slightly more expensive than a software firewall, and more
complex knowledge of system networks may be required to configure settings for
better and more desirable performance. On the other hand, a software firewall
will be cheaper, and setting up settings is often easier. They are preferred by
most home users. You can also use two firewalls at the same time. They provide
more protection, but also have more configurations and are more expensive.
https://voca.ro/1530kEWpx0Ih
1) To meet the demand for strong and tough transparent thin films for
sustainable applications.
Щоб
задовольнити попит на міцні та міцні прозорі тонкі плівки для довготривалого
застосування.
2) Complex locomotion can emerge from many simple modules acting in parallel.
Складна локомоція може виникнути з багатьох простих модулів, що діють
паралельно.
3) Systems use sensors to keep track of where the vehicle is within its lane.
Системи використовують датчики, щоб відстежувати, де транспортний засіб
перебуває на своїй смузі.
https://voca.ro/1eXP7jqmRvDV
· #1034
Kulaksyz S. (RF-211, S.Mykhailiuk) (Tuesday, 31 May 2022 09:15)
A device driver is a small piece of software that communicates with operating
systems and tell it how to work with that specific piece of hardware.Basically
device drivers are translators that translates the hardware's language to
operating system letting it know how it should work.Some people wonder when to
upda their updates - it's best to update a device driver only if it's currently
not working.The other reason you should update your drivers is if you need all
the features to work proprely and with the best performance at all times, some
drive utilities update their drivers for you but some require manual
installation.
The first programming language was invented way back in 1843.Ada Lovelace came
up with first ever algorithm machine codes that were manually inputted.After
that no progress has been made for a quite long period of time until 1944 when
Konrad Zuse developed the first "real" programming language called "Plan
Calculus". Konrad's language allowed to solve advanced math algorithms and
equasions. The further people got into computer techonologies - further the
progress has been made, but the major event that changed the world of
programming forever was a completion of a "C" programming language
developement.Later programming languages were based solely on "C" language and
it's libraries.
keep track
The table is also intended to keep track on all standard references.
meet the demand
Currently, the quality and accessibility of data do not meet the demand, a
situation that needs to be remedied.
on the contrary
We should not set that commitment aside; on the contrary, we must take it into
account in this context.
Vocaroo: https://voca.ro/12dtJE3Gpo3d
· #1033
Ivan Zarytskiy RZ-211 (Lebedeva) (Tuesday, 31 May 2022 09:03)
The difference between software and hardware firewall
The main difference between a hardware firewall and a software firewall is that
the hardware firewall runs on its own physical device, while a software firewall
is installed on another machine. A common example of a software firewall is the
firewall built into most operating systems like Windows and macOS. These OS
firewalls are bundled with the operating system and can run on any compatible
hardware.
However, these OS firewalls are not the only options for software firewalls.
Like hardware firewalls, software firewalls are also offered as standalone
solutions. An organization can purchase and deploy these firewalls in locations
where a hardware firewall may not be a viable option, such as in cloud
environments.
https://voca.ro/1gGLP85RQ5LA
meet the demand
To meet the demand for strong and tough transparent thin films for sustainable
applications,(Щобзадовольнитипопитнаміцнітаміцніпрозорітонкіплівкидлядовготривалогозастосування,)
keep track
The system lets the search commander keep track of several teams at once,
coordinate efforts and get an on-the-ground look at wilderness conditions and
clues.(Системадозволяєкомандирупошукувідстежуватикількакомандодночасно,
координуватизусиллятаотримуватинамісціумовитапідказки.)
on the contrary
On the contrary: "Public transportation, currently representing around 12% of
the overall trips in the Karlsruhe region, would profit from a redoubling of
sharing and pooling options with a slight increase, and the same goes for
bicycle usage," Wörle says.(Навпаки:
«Громадськийтранспорт,
якийнаразістановитьблизько
12%
відзагальноїкількостіпоїздокурегіоніКарлсруе,
отримаєвигодувідподвоєнняопційспільноговикористаннятаоб’єднаннязневеликимзбільшенням,
ітесаместосуєтьсявикористаннявелосипедів»,
–
кажеВьорле.)
https://voca.ro/13Hy5j7CyDp0
· #1032
Lebedeva E. (Tuesday, 31 May 2022 09:00)
To Ilinchuck Vladislav RZ-211 Not bad, but you should pracise reading more.
· #1031
Lebedeva E. (Tuesday, 31 May 2022 08:58)
To Daniil Dragin (RZ-211), Pontus Nataliia(RF-211), Kovalzhi Andrey RZ-211 Well done, thank you
· #1030
Сhmel Maksim RF-211 (S. Mykhailiuk ) (Tuesday, 31 May 2022 08:57)
Kernel development
The kernel is the main center of a computer operating system (OS). This is the
kernel that provides the core services for all other parts of the OS. This is
the main layer between the OS and the hardware, and it helps with process and
memory management, file systems, device management, and networking.
The kernel is often contrasted with the shell, which is the outermost part of
the OS that interacts with user commands. Kernel and shell are terms used more
often in Unix OS
The kernel is not to be confused with the Basic Input/Output System (BIOS),
which is an independent program stored on a chip on a computer circuit board.
https://voca.ro/1hkCmqo9CbJB
· #1029
Ilinchuck Vladislav RZ-211 (Lebedeva) (Tuesday, 31 May 2022 08:57)
#9 Functions of firewalls
A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established
security policies. At its most basic, a firewall is essentially the barrier that
sits between a private internal network and the public Internet. A firewall’s
main purpose is to allow non-threatening traffic in and to keep dangerous
traffic out.
A Firewall is a necessary part of any security architecture and takes the
guesswork out of host level protections and entrusts them to your network
security device. Firewalls, and especially Next Generation Firewalls, focus on
blocking malware and application-layer attacks, along with an integrated
intrusion prevention system (IPS), these Next Generation Firewalls can react
quickly and seamlessly to detect and react to outside attacks across the whole
network. They can set policies to better defend your network and carry out quick
assessments to detect invasive or suspicious activity, like malware, and shut it
down.erous traffic out.
As the cyber security landscape continues to evolve and attacks become more
sophisticated, Next Generation Firewalls will continue to be an essential
component of any organization’s security solution, whether you’re in the data
center, network, or cloud. To learn more about the essential capabilities your
Next Generation Firewall needs to have, download the Next Generation Firewall
(NGFW) Buyer’s Guide today.
1)https://voca.ro/19JRzTKmqH6u
keep track
'Cause I've been on so many, it's kind of hard to keep track.
Тому що я був на багатьох,
що
важко відстежити.
on the contrary
It means that, wanting that, you will on the contrary do terrible things.
Це
означає,
що,
бажаючи цього,
ви,
навпаки,
будете робити жахливі речі.
meet the demand
I mean, pharmacies could stay open 24 hours and they still couldn't meet the
demand.
Я
маю на увазі, що аптеки могли працювати цілодобово, і вони все одно не могли
задовольнити попит.
2)https://voca.ro/1cAGMQJJIafF
· #1028
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Tuesday, 31 May 2022 08:54)
exam theme #7 Different protection mechanisms
The main protective mechanisms are activities aimed at ensuring engineering
measures of confidentiality, integrity and availability of information.
Protective mechanisms are divided into:
Physical - various engineering tools and structures that complicate or eliminate
the physical intrusion of offenders into objects of protection and into material
carriers of confidential information;
Hardware - mechanical, electrical, electronic and other devices designed to
protect information from leakage, disclosure, modification, destruction, as well
as counteraction to technical intelligence;
Software - special programs for computers that implement the functions of
protecting information from unauthorized access, copying, modification,
destruction and blocking;
Cryptographic - technical and software means of data encryption based on the use
of various mathematical and algorithmic methods;
When combined, these three mechanisms provide very strong protection of data and
computers.
https://voca.ro/135I4EZEAAN2
Daily phrases:
1)keep track
These gadgets are used to keep track on migration of whales.
Эти
гаджеты используют для того чтобы следить за миграцией китов.
2)on the contrary
On the contrary, this type of batteries will only decrease the phone's battery
life.
Напротив, этот тип батарей только уменьшит время автономной работы телефона.
3)meet the demand
Today, methods of the protection of data do not meet the demand, because
technologies develop very fast.
В настоящее время методы защиты информации не отвечают соответствующим условиям,
потому что технологии развиваются очень быстро.
https://voca.ro/1cKLTx3VCjdP
· #1027
Pontus Nataliia(RF-211)(Lebedeva E.V.) (Tuesday, 31 May 2022 08:52)
Ex.2
1)It is the multiplexing of a single computer system among several users and the
authentication of a user's claimed identity.
2)A typical computer consists of a processor, a linearly addressed memory
system, and some collection of input/output devices associated with the
processor.
3)When one of the simulated processors is waiting for an input or output
operation to finish, another virtual processor may be able to progress at its
normal rate. Thus a single processor may be able to take the place of several.
4)The descriptor register is a mechanism that controls which part of the memory
is accessible.
5)The instruction that loads the descriptor register with a new descriptor
called he privileged state bit.
Ex.1
1) Computer science studies computer, programming, computation, software, system
controls, development of hardware.
2) Information science is a discipline that deals with the processes of storing
and transferring information.
3) Data processing is a conversation from raw data to machine-readable form.
4) Multiplexing is a process that transmitting multiple signals simultaneously
on single channel
Ex.2
1) What would happen if any running program could load it with any arbitrary
value?
2) What does the supervisor program do?
3) What will we do with our model of guards and walls in discussing of shared
information?
The authentication of a user's claimed identity
The authentication protocol defines a framework for these exchanges, defines a
number of actual mechanisms (but only a few of them), and allows for extensions.
The three defined methods are public-key, password, and host-based
authentication.
The authentication process is framed by client requests and server responses.
The “authentication” request actually includes elements of authorization (access
rights are checked as well). A request contains: username, server name,method
name and method-specific data (the particular authentication method used for the
request and any data needed with it. For example, if the method is password, the
data provided are the password itself.)
There can be other messages exchanged, depending on the authentication request.
But ultimately the server issues an authentication response.
https://voca.ro/1cOodaVX7Bzh
· #1026
Daniil Dragin (RZ-211 Lebedeva E) (Tuesday, 31 May 2022 08:52)
№17 Password as a general technique of secrecy
A password is a conditional word or an arbitrary set of characters, consisting
of letters, numbers and other symbols, and designed to confirm identity or
authority. All the simplest authentication systems use the password principle.
In this case, the user simply needs to know the password and enter it correctly
in order to gain unhindered access to the resource that he needs. Therefore,
password authentication is the most commonly used.
The advantage of this method is its simplicity. This factor and the fact that
the password method has been used for a very long time, appearing earlier than
all other methods, allows it to be used in a wide variety of computer programs.
Disadvantages of the password: they use passwords that can be easily and simply
guessed, can be simply intercepted or peeped in the process of entering it,
phishing.
https://voca.ro/1gMllc2AXnEH
1)meet the demand
Farmers continued to increase both the quantity and variety of local products to
meet demand.
Фермери продовжували збільшувати як кількість, так і різноманітність місцевих
продуктів, щоб задовольнити попит.
2)keep track
You know I can't keep track any more.
Ти знаєш, що я більше не можу стежити.
3)on the contrary
Us on the contrary nobody helps.
Нам, навпаки, ніхто не допомагає.
https://voca.ro/190MMTUDRrSQ
· #1025
Lebedeva E. (Tuesday, 31 May 2022 08:50)
To РЗ-211 Good morning! The lesson has started and I am waiting for your exam topics and work with phrases of the day. Good luck
· #1024
Gvozd O.V. to RZ-211 (Tuesday, 31 May 2022 08:49)
Good day!
The lesson will start soon, so I am waiting for your comments, sentences with
Phrases and audio recordings. Don't forget to write your Independent practice
and add the exam topic. Please, do it in one comment.
· #1023
Сhmel Maksim RF-211 (S. Mykhailiuk ) (Tuesday, 31 May 2022 08:48)
Today I have read an article about OC.
The operating system provides interaction between the user, programs, and
computer hardware.
The operating system communicates with the hardware using device drivers. A
driver is a piece of software, usually written by a hardware manufacturer, that
allows the operating system to communicate with the device.
For the user, the OS provides a user interface. In DOS, the entire interface was
on the command line. In Windows, the concept of an interface is much broader -
it includes a graphical shell, and standard dialogs, for example, open or save a
file, and a number of other things that are sometimes not quite obvious to the
user.
For programs, the OS provides user interface elements. In addition, if we are
talking about a multitasking system, then its competence includes the
distribution of computer resources between programs. In this case, resources
should be understood primarily as processor time - the OS must ensure that none
of the programs monopolizes all resources and does not conflict with other
running applications.
Also in charge of any operating system is the maintenance of the file system. By
the way, in the days of DOS, this was its main task, which was reflected in the
name.
In addition, the OS includes various auxiliary programs for setting up and
maintaining a PC - system utilities. In particular, these are programs for
fixing disk errors.
https://voca.ro/1fdb8WkikJiC
1)According to the Research Center, Currently, the quality and accessibility of
data do not meet the demand, a situation that needs to be remedied. and the
developers figured out how to do it
За даними Науково-дослідного центру, наразі якість та доступність даних не
відповідають попиту, що потребує виправлення. і розробники придумали, як це
зробити
2)The developers have recently added a new tool for the user. The table is also
intended to keep track on all standard references.
Нещодавно розробники додали новий інструмент для користувача. Таблиця також
призначена для відстеження всіх стандартних посилань.
3)"We should not set that commitment aside; on the contrary, we must take it
into account in this context." - these are the technical specifications that the
team leader gave to his subordinates
"Ви повинні не встановлювати те, що обліковується; на відповідь, ми повинні йти
в акцію в цьому контексті." - these are the technical specifications that the
team leader gave to his subordinates
https://voca.ro/1fik1KIJhCOo
· #1022
Popovych E. (Tuesday, 31 May 2022 08:48)
To
Neblienko V. / RZ-212 /
Thank you for your essay, it's well done but you missed a lot. Go on working.
· #1021
Popovych E. (Tuesday, 31 May 2022 08:45)
To
Pushkash Maxim (RZ-212 )
Maxim, mind, pls. The first sentence should be: ''Today I’ve read the article
(the title of the article). It tells us about...''
· #1020
Popovych E. (Tuesday, 31 May 2022 08:42)
To
Povoznikov Artem RZ-212
Thank you for the comments and work with the phrases. I appreciate it. Keep on
working.
· #1019
Popovych E. (Tuesday, 31 May 2022 08:39)
To
Mashovets Andrey (RZ 212)
Thank you for your comment on the article, audio recording. Well done.
· #1018
Lebedeva E. (Tuesday, 31 May 2022 08:36)
To Mashegirov Eugene (RF-211) The tasks are done correctly.
· #1017
Lebedeva E. (Tuesday, 31 May 2022 08:35)
To Gromovaya Vlada (RF-211), Bilokamenskyi Anton (RF-211) Well done, thank you.
· #1016
Mashegirov Eugene (RF-211) (Lebedeva E.V.) (Tuesday, 31 May 2022 08:34)
Reading Module
Ex.2
1. An example of a complete isolation system is an isolated virtual machine.
2. Typical computer consists of a processor, a linearly addressed memory system,
and input/output devices connected with a processor.
3. The essence of multiprogramming is a scheme that allows a single processor to
take the place of several.
4. The descriptor register is a special hardware register that controls which
part of the memory is accessible.
5. The privileged state bit is an additional bit that regulates access to the
descriptor register.
Speaking Module
Ex.1
1. Information science is a discipline that deals with processes, storing and
transferring the information.
2. Computer science studies computer, computation, system controls, development
of hardware, software, programming.
Ex.2
1. What would happen if any program could load a descriptor register with any
arbitrary value?
2. What does the supervisor program do?
3. What are we going to learn in the discussion of shared information?
Writing Module
Quality and reliability of software
Software quality reflects how well software complies with or conforms to a given
design, based on functional requirements or specifications, while reliability
pertains to the probability of failure-free software operation for a specified
period of time in a particular environment. Reliability relates to operation
rather than design of the program, and hence it is dynamic rather than static.
It accounts for the frequency with which faults cause problems. Measuring and
predicting software reliability has become vital for software managers, software
engineers, managers and engineers of products that include software, and to
users of these products.
I think that quality and reliability is a must for any product, including
software.
Audio: https://voca.ro/167VIWMAaBZS
· #1015
Gromovaya Vlada (RF-211) (Lebedeva E.V.) (Tuesday, 31 May 2022 08:30)
READING MODULE
Ex. 2
1) An example of a complete isolation system is an isolated virtual machine.
2) A typical computer consists of a processor, a linearly addressed memory
system, and some collection of input/output devices associated with the
processor.
3) Processors is waiting for an input or output operation to finish, another
virtual processor may be able to progress at its normal rate.
4) Descriptor register allows virtual processor to be unaware of the existence
of the others, it is essential that some isolation mechanism be provided.
5) The instruction that loads the descriptor register with a new descriptor
called he privileged state bit.
SPEAKING MODULE
Ex. 1
1) Information science is a discipline that deals with the processes of storing
and transferring information.
2) Computer science studies computers, computation systems control, development
hardware and software programming.
3) Data processing is a conversion of raw data in machine-readable form.
4) Multiplexing is a process of transmitting multiple signals simultaneously to
a single channel.
Ex.2
1) What would happen if any program could load a descriptor register with any
arbitrary value?
2) What does the supervisor program do?
3) What are we going to learn in the discussion of shared information?
WRITING MODULE
Ex.2
The authentication of a user's claimed identity
The process of determining claimed user identity by checking user-provided
evidence is called authentication and the evidence which is provided by the user
during process of authentication is called a credential.
There are four general means of authenticating a user's identity, which can be
used alone or in combination:
Something the individual knows: Examples includes a password, a personal
identification number (PIN).
Something the individual possesses: Examples include electronic keycards, smart
cards, and physical keys.
Something the individual is (static biometrics): Examples include recognition by
fingerprint, retina, and face.
Something the individual does (dynamic biometrics): Examples include recognition
by voice pattern and handwriting characteristics.
Audio: https://voca.ro/14fwshTxbQrl
· #1014
Bilokamenskyi Anton (RF-211) (Lebedeva E.V.) (Tuesday, 31 May 2022 08:28)
Reading
Exercise 2
1. Virtual machine is an example of complete isolation system
2. A typical computer consists of a processor, a linearly addressed memory
system, and some collection of input/output devices associated with the
processor.
3. The essence of multiprogramming is a scheme that allows a single processor to
take the place of several.
4. The descriptor register controls exactly which part of memory is accessible
5. The privileged state bit is an additional bit that regulates access to the
descriptor register.
Speaking
Exercise 1
1. Information science is a discipline that deals with the processes of storing
and transferring information.
2. Computer science studies computers, computation, systems control,
development, hardware software and also a programming.
3.Data processing is a conversation from raw data to machine-readable form.
4. Multiplexing is a process that transmitting multiple signals simultaneously
on single channel
Exercise 2
1. What would happen if any program could load a descriptor register with any
arbitrary value?
2. What does the supervisor program do?
3. What are we going to learn in the discussion of shared information?
Writing
The authentication of a user's claimed identity
In the era of internet accounts on many different services we always need to be
fully protected, to be sure that our account is safe. There is different ways to
protect accounts, for example 3 questions, that only you can answer. But it is
still not the best way to be safe, because intruder can always use social
engineering and somehow know your answers, for example the city you were born.
Thats when the user authentication comes. It is the method, that requires you to
accept your login from, for example, your mobile device or email. That means if
somebody even have your login and password, he cant access to your account
without your phone or email account. This method used by many banks, large
digital accounts, cryptocurrency exchange. Also, user authentication can be
biometrical, for example Face ID from IPhones is biometrical user
authentication, as well as fingerprints.
https://voca.ro/134nzV4T33IL
· #1013
Neblienko V. / RZ-212 / Popovych (Tuesday, 31 May 2022 08:26)
Today i have read the article titled: "Strong but thin transparent films made
from cellulose nanofibers with wide applicability".
This article tells about the research of Dr. Sunand Roy of GLA University in
India, who led a multinational team to develop a new transparent thin film made
from cellulose nanofibers. The novelty of the film involves a new and effective
way of tailoring the interfacial bonding interactions between the fibers and the
glycerol and glutaraldehyde (GA), which functioned as a plasticizer and
cross-linking agent, respectively.
In my opinion, this research would be one of the greatest in XXI Century.
Article:
https://phys.org/news/2022-01-strong-thin-transparent-cellulose-nanofibers.html
Vocaroo: https://voca.ro/18ydyqxxvSpZ
Phrases
meet the demand
Increase the quantity and quality of workers and experts to better meet the
demand of overseas labour markets.
Увеличивать количество и качество рабочей силы и специалистов для более полного
удовлетворения спроса на зарубежных рынках труда.
On the contary
Today, on the contrary, the destinies he touches become his own.
Сейчас, напротив, судьбы, которых он коснётся, становятся его судьбой.
keep track
Movienizer will help you keep track on everything concerning movies.
Movienizer поможет отслеживать информацию, касающуюся фильмов.
Vocaroo: https://voca.ro/1dR2cSZvNf8k
· #1012
Pushkash Maxim (RZ-212 Popovich) (Tuesday, 31 May 2022 08:25)
It's not just humans who can wear health and fitness trackers. Tech company
Invoxia introduced the Smart Dog Collar, which uses sensors and other tech to
monitor a dog's health, keep track of its whereabouts and warn owners of any
potential health issues. The collar includes miniature radar sensors capable of
measuring a dog's respiratory rate and heart rate. It uses Wi-Fi, GPS and
Bluetooth to track the physical location of your pet in case it gets lost or
escapes. Users can also get alerts if their dog has escaped. It also measures a
dog's daily activities, including your time spent walking, resting and eating.
The collar is paired with an app owners use to keep track of their pet's health.
Voice: https://voca.ro/18j9DPnUWDyt
1) on the contrary
On the contrary, failure due to unintended consequences, low usage or other
issues can undermine faith in the issuing institution, he noted
2) meet the demand
To meet the demand for strong and tough transparent thin films for sustainable
applications, Dr Sunanda Roy from GLA University India has led a multi-national
team to successfully develop a novel
3) keep track
To keep track of neighbors even in dark or turbid environments, fish must
clearly rely on more than just vision
Voice: https://voca.ro/1kbzMxvJSwBm
· #1011
Povoznikov Artem RZ-212 (Popovych) (Tuesday, 31 May 2022 08:23)
Today i have read the article: New ultra-thin electrode material gets us a step
closer to next-generation semiconductors.
This article tells about implementation of artificial intelligence systems and
autonomous driving systems in which processors must be able to process more
data.
Silicon-based logic devices have limitations in that processing costs and power
consumption increase as miniaturization and integration progress. To overcome
these limitations, researchers are studying electronic and logic devices based
on thin two-dimensional semiconductors at the atomic layer level. However,
controlling electrical properties by doping 2D semiconductors is more difficult
than in conventional silicon-based semiconductor devices.
Thus, it was technically difficult to implement logic devices with
two-dimensional semiconductors. It has been difficult to implement additional
logic circuits with conventional 2D semiconductor devices because they exhibit
the characteristics of either N-type or P-type devices due to the Fermi-level
pinning phenomenon. In contrast, the new electrode material allows free control
of the characteristics of N-type and P-type devices by minimizing defects at the
semiconductor interface. In other words, one device performs the functions of
both N-type devices and P-type devices. Therefore, there is no need to
manufacture N-type and P-type devices separately. Using this device, the joint
research team has successfully realized a high-performance, low-power
complementary logic circuit that can perform logic operations such as NOR and
NAND.
Text:
https://techxplore.com/news/2022-05-ultra-thin-electrode-material-closer-next-generation.html
Audio: https://voca.ro/1nYJT8xEnkVi
1)On the contrary
On the contrary, we have found video games help satisfy fundamental
psychological needs, and therefore have enormous value for all ages.
2)keep track
The system lets the search commander keep track of several teams at once,
coordinate efforts and get an on-the-ground look at wilderness conditions and
clues.
3)meet the demand
To meet the demand for strong and tough transparent thin films for sustainable
applications, Dr Sunanda Roy from GLA University India has led a multi-national
team.
Audio:https://voca.ro/11N6XxahU2y1
· #1010
Lebedeva E. (Tuesday, 31 May 2022 08:23)
To Maksim Teliga (RF-211) and Shulyak Makar (RF-211) Well done, thank you.
· #1009
Maksim Teliga (RF-211)(Lebedeva E.V.) (Tuesday, 31 May 2022 08:15)
Ex.2
1) Two concrete examples: the multiplexing of a single computer system among
several users and the authentication of a user's claimed identity.
2) A typical computer consists of a processor, a linearly addressed memory
system, and some collection of input/output devices associated with the
processor.
3) Processors is waiting for an input or output operation to finish, another
virtual processor may be able to progress at its normal rate.
4) Descriptor register allows virtual processor to be unaware of the existence
of the others, it is essential that some isolation mechanism be provided.
5) The instruction that loads the descriptor register with a new descriptor
called he privileged state bit.
Speaking
1) Data processing is the series of operations that are carried out on data.
2) he system comprises three key modules, which are centred on the Network
Control System Console.
1. 3) You may make one copy of the software in machine - readable form for
backup purposes only
4) Radio waves, like light waves and sound, are a means of transmitting energy.
Ex.2
1)What should the program be able to do so that it does not have protection?
2) What does the supervisor program do?
3) What will we do later?
An isolated virtual machine is a very useful software. A lot of users have this
machine for different needs. Firstly, you can emulate another operating system
in this machine. For example, you have Windows and you can use Linux on this
machine. Secondly, you can check programs on this machine, if it has viruses.
So, this machine can be useful in different ways for you.
Audio: https://voca.ro/18lpjorcExqc
· #1008
Vivchar Roman (RF-211) S. Mykhailiuk (Tuesday, 31 May 2022 08:15)
-
Keep track.
It is better to keep track on the number of your points for the module.
Краще тримати у полі зору кількість своїх балів за модуль.
- On the contrary.
You should not neglect the memory your computer, on the contrary, we need to
clean it all the time.
Ти не повинний нехтувати пам'яттю свого комп'ютера, навпаки потрібно весь час
чистити її.
- Meet the demand.
It will be better if you meet the demand of your university.
Краще буде, якщо ви відповідатимете існуючим потребам свого університету.
History of kernel development.
The kernel is the central part of the operating system that implements the
interface between application processes and computer hardware. It is loaded into
the computer's RAM and interacts directly with the hardware, providing hardware
management, support for simultaneous operation of many users, support for
parallel execution of many processes in the system. Typically, the kernel makes
these objects available to application processes through interprocess
interaction mechanisms and system calls.
The main task of the kernel is to manage computer resources and manage their
availability to other programs to run and use. As a rule, the main resources of
the kernel are:
- CPU;
- RAM;
- Any input and output devices.
First there were the early kernels of operating systems, followed by operating
systems with time distribution. Over time, cores such as Amiga, a platform
developed by Commodore International and released in 1985, and Unix came into
the human world. Mac OS was first introduced in 1984. It was the main operating
system of the Macintosh personal computer from Apple Computer. The most popular
Microsoft Windows system was introduced in 1985 as an add-on to MS-DOS. Due to
the dependence on other operating systems, the first versions of Windows are
called the operating environment. Windows became a full-fledged Windows
operating system with the advent of the Windows 9x series.
Audio: https://voca.ro/1kX3r94l7b2G
· #1007
Mashovets Andrey (RZ 212, Popovich) (Tuesday, 31 May 2022 08:13)
Today I’ve read the article (Exam Topics) “Password as a general technique of
secrecy”.
This article is about how to create a strong password and why a strong password
is important.
The purpose of this article is to show the importance of password reliability.
Passwords safeguard your online accounts from other people who use the same
computer. More importantly, they protect you against hackers who want to steal
your personal information.
I find this article very useful because the password is the main protection of
your data.
https://voca.ro/1mKTJ180SJrO
https://www.lifewire.com/how-to-create-a-strong-password-4783955
1.keep track
The system lets the search commander keep track of several teams at once,
coordinate efforts and get an on-the-ground look at wilderness conditions and
clues.
2.on the contrary
"On the contrary, complex locomotion can emerge from many simple modules acting
in parallel.
3.meet the demand
Plantations expanded to meet the demand.
https://voca.ro/1oEhAwDjHenL
· #1006
Shulyak Makar (RF-211)(Lebedeva E.V.) (Tuesday, 31 May 2022 08:12)
Ex.2
1) Two concrete examples: the multiplexing of a single computer system among
several users and the authentication of a user's claimed identity.
2) A typical computer consists of a processor, a linearly addressed memory
system, and some collection of input/output devices associated with the
processor.
3) Processors is waiting for an input or output operation to finish, another
virtual processor may be able to progress at its normal rate.
4) Descriptor register allows virtual processor to be unaware of the existence
of the others, it is essential that some isolation mechanism be provided.
5) The instruction that loads the descriptor register with a new descriptor
called he privileged state bit.
Speaking
Ex.1
1) Data processing is the series of operations that are carried out on data.
2) he system comprises three key modules, which are centred on the Network
Control System Console.
1. 3) You may make one copy of the software in machine - readable form for
backup purposes only
4) Radio waves, like light waves and sound, are a means of transmitting energy.
Ex.2
1)What should the program be able to do so that it does not have protection?
2) What does the supervisor program do?
3) What will we do later?
Writing exercise:Ex.2
Authentication of the claimed identity of the user
Authentication - an authentication procedure, for example:
checking the effectiveness of using the method of comparing the entered password
(for choosing a login) with the password stored in the database of impressive
logins;
email authentication
verification of the checksum of the file in the collection, intended by the
author of this file.
Mainly in the field of information technology.
identification of the degree of trust and external security of systems, the
ongoing verification of publicity can be unilateral or mutual. It is usually
used with cryptographic operations.
Authentication should not be confused with authorization (the procedure for
granting certain rights to a subject) and identification (the procedure for
determining a value by its identifier).
Top user authentication methods
1)Password-Based User Authentication Methods
2) Passwordless User Authentication Methods
3) Biometrics
4) Email Authentication
Audio: https://voca.ro/14GsVKfgvU3K
· #1005
Lebedeva E. (Tuesday, 31 May 2022 08:10)
To Rosinskiy Kyrylo RF-211 and Ivkov Yurii (RF-211) Well done, thank you.
· #1004
Julia Shevchuk (RF-211) (Lebedeva E.V.) (Tuesday, 31 May 2022 08:09)
Ex
2 Reading
1. An example of a complete isolation system is an isolated virtual machine.
2. Typical computer consists of a processor, a linearly addressed memory system,
and input/output devices connected with a processor.
3. The essence of multiprogramming is a scheme that allows a single processor to
take the place of several.
4.
The descriptor register is a special hardware register that controls which part
of the memory is accessible.
5. The privileged state bit is an additional bit that regulates access to the
descriptor register.
Speaking ex1
Internationalisation deals with the process of designing software so that it can
accommodate changing environments without changes to the code.
Computer memory is the storage space in the computer, where data is to be
processed and instructions required for processing are stored.
Get to systems control and pull the computer core.
Speaking ex 2
1. in which case the program would not have protection?
2. what does the supervisor program do?
3.what are we going to do with the model of guards and walls?
The multiplexing of a single computer system among several users
Multiplexing is a way of sending multiple signals or streams of information over
a communications link at the same time in the form of a single, complex signal.
When the signal reaches its destination, a process called demultiplexing
recovers the separate signals and outputs them to individual lines.
Multiplexing is a method used by networks to consolidate multiple signals --
digital or analog -- into a single composite signal that is transported over a
common medium, such as a fiber optic cable or radio wave. When the composite
signal reaches its destination, it is demultiplexed, and the individual signals
are restored and made available for processing.
https://voca.ro/1lembYzXZEF5
· #1003
Rosinskiy Kyrylo RF-211 (Lebedeva E.) (Tuesday, 31 May 2022 08:08)
The
Reading Module, ex 1
1. Two concrete examples: the multiplexing of a single computer system among
several users and the authentication of a user's claimed identity.
2. A typical computer consists of a processor, a linearly addressed memory
system, and some collection of input/output devices associated with the
processor.
3. Processors is waiting for an input or output operation to finish, another
virtual processor may be able to progress at its normal rate.
4. Descriptor register allows virtual processor to be unaware of the existence
of the others, it is essential that some isolation mechanism be provided.
5. The instruction that loads the descriptor register with a new descriptor
called he privileged state bit.
The Speaking Module, ex 1
1. Information science is a discipline that deals with the processes of storing
and transferring information.
2. Computer science studies computers, computation systems control, development
hardware and software programming.
3. Data processing is a conversion of raw data in machine-readable form.
4. Multiplexing is a process of transmitting multiple signals simultaneously to
a single channel.
The Speaking Module, ex 2
1. What would happen if any running program could load the descriptor register?
2. What is the purpose of a supervisor?
3. What will you expend in the discussion of shared information?
The Writing Module, ex 2
"The authentication of a user's claimed identity"
Authentication is the process of recognizing a user’s identity. It is the
mechanism of associating an incoming request with a set of identifying
credentials. The authentication process always runs at the start of the
application, before the permission and throttling checks occur, and before any
other code is allowed to proceed. The security system will search all the
abstract objects that it knows and find the specific one of which the actual
user is currently applying. Once this is done, the user has been identified.
Audio: https://voca.ro/1igHCBvdrOv0
· #1002
Kate Kholodova (RZ-212, Mikhailuk) (Tuesday, 31 May 2022 08:03)
Today I have read the article "Electrocaloric refrigerator offers alternative
way to cool everything from food to computers" This article focuses on
alternative way to cool everything. Researchers have built an electrocaloric
refrigerator the size of a beverage coaster that can generate a temperature
difference of about 2 K between the hot and cold ends of the device. The cooling
mechanism, which is based on the electrocaloric effect, involves alternately
applying and removing an electric field to a material to increase and decrease
the material's temperature, respectively. The new cooling method can potentially
achieve a higher efficiency than current methods, indicating that electrocaloric
cooling devices may one day replace today's refrigerators and other cooling
devices. I think this is useful study.
Article:
https://phys.org/news/2017-06-electrocaloric-refrigerator-alternative-cool-food.html
Audio: https://voca.ro/1rIaK5ZqWRH2
1. meet the demand
Currently, the quality and accessibility of data do not meet the demand, a
situation that needs to be remedied.
Наразі якість та доступність даних не задовольняють попиту, і цю ситуацію
потрібно виправити.
2. keep track
The table is also intended to keep track on all standard references.
Таблиця також призначена для відстеження всіх стандартних посилань.
3. on the contrary
We should not set that commitment aside; on the contrary, we must take it into
account in this context.
Ми не повинні відкидати це зобов'язання; навпаки, ми повинні це враховувати в
цьому контексті.
Audio ph: https://voca.ro/11RkHLEgf6j1
· #1001
Ivkov Yurii (RF-211)(Lebedeva E.V.) (Tuesday, 31 May 2022 07:58)
Reading Module ex.2
1. An example of a complete isolation system is an isolated virtual machine.
2. Typical computer consists of a processor, a linearly addressed memory system,
and input/output devices connected with a processor.
3. The essence of multiprogramming is a scheme that allows a single processor to
take the place of several.
4. The descriptor register is a special hardware register that controls which
part of the memory is accessible.
5. The privileged state bit is an additional bit that regulates access to the
descriptor register.
Speaking Module ex.1
1. Information science is a discipline that deals with processes, storing and
transferring the information.
2. Computer science studies computer, computation, system controls, development
of hardware, software, programming.
Speaking Module ex.2
1. What would happen if any program could load a descriptor register with any
arbitrary value?
2. What does the supervisor program do?
3. What are we going to learn in the discussion of shared information?
Writing Module. An isolated virtual machine.
Virtual machine is an isolated environment with access to a subset of physical
resources of the computer system. Each virtual machine performs as an
independent instance of the computer, though they are supported by the same
physical system.
It was important to create some isolation mechanism, thus the descriptor
register was made to regulate the memory access by each of the processor
instances. It regulates which piece of memory is accessible, and the processor
is able to use this range if register allows.
Also there is an additional bit, called the privileged state bit that controls
programs’ access to change the register’s value. The program, named supervisor,
which runs with bit ON controls the simulation for other programs.
Vocaroo: https://vocaroo.com/1kIWaGJlTLik
· #1000
Lebedeva E. (Tuesday, 31 May 2022 07:57)
To Gridnev Dmytro(RF-211) Go on practising your pronunciation, you can train your reading with the help of Listen and Pronounce, which is on this page above the Guestbook chat.
· #999
S.Mykhailiuk (Tuesday, 31 May 2022 07:54)
To students from 1/3 РФ-211 and РЗ-212. Good morning! The lesson has started and I am waiting for your tasks (comments on th article and phrases)) and audio recordings. During the session 3 today you are requested to do the following tasks: ( exam topics and phrases of the day with appropriate links to your voice record msgs). Pls work hard to reach best results!
· #998
Popovych E. (Tuesday, 31 May 2022 07:47)
To
Kravchenko Kostiantyn (RZ-212)
Thanks for your comment. It's informative and interesting to read.
· #997
Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 31 May 2022 07:43)
Today I've read the article "Dear passwords: Forget you. Here's what is going to
protect us instead"
The article covers the idea that passwords are becoming obsolete in modern
times.
The article suggests that passwords are bound to be replaced within the next 5
years with more modern authorization methods, such as biometrical scans, face
and speech recognition. However due to concerns and little consensus on what
works best, companies restrain themselves from implementing immediate solutions.
In my opinion, the article is unimaginably controversial. I do happen to agree
with the argument of single factor authentication, however the rest of its
arguments are nothing but bold claims with little basis, like the trade-off
between personal privacy and security.
Article: https://techxplore.com/news/2020-03-dear-passwords.html
Audio: https://voca.ro/1mcBeyHmadx2
Phrases:
1) It can be impossible for drivers to keep track of everything around them
Іноді водіям може бути неможливо услідити за всім навколо них.
2) Plantations expanded to meet the demand.
Плантації розширилися, щоб задовольнити потреби.
3) On the contrary, the algorithms developed on one robotic guide dog can be
easily deployed to another robot.
З іншого боку, алгоритми розроблені на одному роботі собаці-поводиря можуть бути
легко використані на іншому роботі.
Audio: https://voca.ro/15bjfsySn7kI
· #996
Popovych E. (Tuesday, 31 May 2022 07:28)
To
Kolomiets Volodymir RZ 212
The task is not complete. The task Phrases of the day must contain audio.
· #995
Gridnev Dmytro(RF-211)(Lebedeva E.V.) (Tuesday, 31 May 2022 07:28)
Ex.2
1) Two concrete examples: the multiplexing of a single computer system among
several users and the authentication of a user's claimed identity.
2) A typical computer consists of a processor, a linearly addressed memory
system, and some collection of input/output devices associated with the
processor.
3) Processors is waiting for an input or output operation to finish, another
virtual processor may be able to progress at its normal rate.
4) Descriptor register allows virtual processor to be unaware of the existence
of the others, it is essential that some isolation mechanism be provided.
5) The instruction that loads the descriptor register with a new descriptor
called he privileged state bit.
Speaking
Ex.1
1) Data processing is the series of operations that are carried out on data.
2) he system comprises three key modules, which are centred on the Network
Control System Console.
1. 3) You may make one copy of the software in machine - readable form for
backup purposes only
4) Radio waves, like light waves and sound, are a means of transmitting energy.
Ex.2
1)What should the program be able to do so that it does not have protection?
2) What does the supervisor program do?
3) What will we do later?
Writing exercise:Ex.2
2) The authentication of a user's claimed identity
User authentication is a security process that covers all of the
human-to-computer interactions that require the user to register and log in.
Said more simply, authentication asks each user, “who are you?” and verifies
their response. How user authentication works
In order to gain access, users must prove to the website that they are who they
say they are. The ID and key are enough to confirm the user’s identity, which
will allow the system to authorize the user.
To put it simply, user authentication has three tasks:
1. Manage the connection between the human (user) and the website’s server
(computer).
2. Verify users’ identities.
3. Approve (or decline) the authentication so the system can move to authorizing
the user.
The importance of user authentication
Understanding user authentication is crucial because it’s a key step in the
process that keeps unauthorized users from gaining access to sensitive
information. A strengthened authentication process ensures that User A only has
access to the information they need and can’t see the sensitive information of
User B.
Top user authentication methods
1)Password-Based User Authentication Methods
2) Passwordless User Authentication Methods
3) Biometrics
4) Email Authentication
Vocaroo:https://voca.ro/1jjNhJQwXd7D
· #994
Popovych E. (Tuesday, 31 May 2022 07:26)
To
Artem Kotliarov RZ-212
Your task is complete, informative and interesting. Well done.
· #993
Popovych E. (Tuesday, 31 May 2022)
Good morning! The lesson has started, I am waiting for your comments, summaries and audio recordings, please, insert the link to the article in your comment. Do not forget about Phrases of the day. Good luck!
· #992
Kolomiets Volodymir RZ 212 (Popovych) (Tuesday, 31 May 2022 07:01)
today i have read the article "Google Cloud unveils Healthcare Data Engine for a
holistic view of health data"
this article is about the new development of google in the field of medicine.
According to them, this invention helps to work faster with patient data. thanks
to this, you can find out everything about the client, from his simple illnesses
to clinical.
doctors say that for them a quick search for information about patients is a
priority, as this will speed up their work. in addition, many companies have
supported this idea and cooperate with hospitals.
This article really impressed me. I think this development is very important and
useful today and i like that medicine is upgrading.
https://www.zdnet.com/article/google-cloud-unveils-healthcare-data-engine-for-a-holistic-view-of-health-data/
https://voca.ro/194FhNUSBst6
1) on the contrary
On the contrary, failure due to unintended consequences, low usage or other
issues can undermine faith in the issuing institution, he noted
Навпаки, збій через непередбачувані наслідки, низьке використання або інші
проблеми може підірвати віру в установу, яка видає, — зазначив він.
2) meet the demand
To meet the demand for strong and tough transparent thin films for sustainable
applications, Dr Sunanda Roy from GLA University India has led a multi-national
team to successfully develop a novel
Щоб задовольнити попит на міцні та міцні прозорі тонкі плівки для довготривалого
застосування, доктор Сунанда Рой з GLA University India очолив багатонаціональну
команду, щоб успішно розробити новий роман.
3) keep track
To keep track of neighbors even in dark or turbid environments, fish must
clearly rely on more than just vision
Щоб відстежувати сусідів навіть у темному або каламутному середовищі, риба
повинна покладатися не тільки на зір.
· #991
Lebedeva E (Tuesday, 31 May 2022 07:01)
To РФ-211 Good morning! The lesson has started and I am waiting for your tasks and audio recordings.
· #990
Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 31 May 2022 04:16)
1)
1. on the contrary
It means that, wanting that, you will on the contrary do terrible things - Це
означає, що, бажаючи цього, ви, навпаки, будете робити жахливі речі
2. keep track
The trend towards autonomous aids for the driver can help keep track of the
roadsides to detect animals - Тенденція до автономних допоміжних засобів для
водія може допомогти відстежувати узбіччя для виявлення тварин
3. meet the demand
Farmers continued to increase both the quantity and variety of local products to
meet demand. - Фермери продовжували збільшувати як кількість, так і
різноманітність місцевих продуктів, щоб задовольнити попит.
https://voca.ro/16rKkoC6roPM
2) Today I have read the article “Universal mechanism of methane formation
discovered”.
The formation of methane greenhouse gas is based on a universal mechanism. This
discovery was made by scientists at the University of Heidelberg and the Planck
Institute for Terrestrial Microbiology. They found that methane is produced in
the cells of organisms by a purely chemical process. Studies explain, among
other things, why methane is released not only as a result of the activity of
special microorganisms, but - as has long been observed - also by plants and
fungi.
In my opinion, these results are an important step towards understanding the
aerobic formation of methane in the environment.
https://phys.org/news/2022-03-universal-mechanism-methane-formation.html
https://voca.ro/1bNg1nBYlBmR
· #989
Lebedeva E (Monday, 30 May 2022 20:45)
To Denis Zavadsky RZ-211 The tasks are done correctly. Keep working.
· #988
Lebedeva E (Monday, 30 May 2022 20:40)
To Kovalzhi Andrey RZ-211 Thanks for the work. well done.
· #987
Kovalzhi Andrey RZ-211(Lebedeva E.) (Monday, 30 May 2022 20:07)
Долг за 26.05
Today I have read the article "DoorDash takes aim at Europe with purchase of
Wolt". This article reveals that DoorDash has added Europe to its menu by
purchasing Finnish food delivery company Wolt in an $8.1 billion deal, the
company said on Tuesday. The company reported it on the same day that DoorDash
said it's revenues rose 45 percent to $1.3 billion in the recently ended
quarter, but that its loss more than doubled to $101 million from the same
period last year. It also revealed that San Francisco-based DoorDash shares were
up more than 19 percent to surpass $229 in secondary trading following the
announcement.
https://techxplore.com/news/2021-11-doordash-aim-europe-wolt.html
https://voca.ro/1okMtjZu6oFX
Daily phrases:
1) when investigating
We encourage that international tribunal to continue safeguarding the rights of
children when investigating war crimes and crimes against humanity.
Мы призываем этот международный трибунал к продолжению деятельности в защиту
прав детей при расследовании военных преступлений и преступлений против
человечности.
2) a sharp rise
These three components have caused such a sharp rise in the cost of final
product.
Эти три компонента и вызвали такое резкое повышение цены конечного продукта.
3) with the aid of
With the aid of the exoskelton, he could control his legs.
Он мог контролировать свои ноги с помощью экзоскелета .
https://voca.ro/1cUvfieOMA4l
· #986
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Monday, 30 May 2022 20:00)
долг за 10.05
exam topic #16
The Essentials of Information Protection
Information protection is a set of methods and means that ensure the integrity,
confidentiality and accessibility of information under the influence of threats
of natural or artificial nature, the implementation of which may harm the owners
and users of information. Information protection is conducted to maintain such
properties of information as:
-integrity;
-privacy;
-accessibility;
Types of information protection:
Technical - provides restriction of access to the message carrier by hardware
and technical means:
-prevention of leakage through technical channels;
-blocking prevention;
Engineering - prevents the destruction of the media due to intentional actions
or natural influences by engineering and technical means.
Cryptographic - prevents access by means of mathematical transformations of the
message (SP):
prevention of unauthorized modification;
emergency warning disclosure.
Organizational - prevention of access to the object of information activities of
third parties through organizational measures
https://voca.ro/1ogDFlhAPOdi
1)first use of
Researchers document the first use of maize in Mesoamerica
Исследователи задокументировали первое использование кукурузы в Мезоамерике
2)for a number of reasons
People in many industries treat 3d printing as a key topic of interest both in
techniques and printing materials for a number of reasons
Люди во многих отраслях относятся к 3D-печати как к ключевой теме интереса как к
технологиям, так и к материалам для печати по ряду причин.
3)focused primarily on
To date, research into the subject has focused primarily on women who already
have children.
Сегодня, исследования этой темы сфокусированы преимущественно на женщинах у
которых уже есть дети.
https://voca.ro/12yO9jc3HGN6
· #985
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Monday, 30 May 2022 19:51)
Долг за 05.05
Today I have read the article ”Can your mobile phone get a virus? Yes, and
you'll have to look carefully to see the signs”. Last year, cyber security
company Kaspersky detected nearly 3.5 million malicious attacks on mobile phone
users. The spam messages we get on our phones via text message or email will
often contain links to viruses, which are a type of malicious software.
According to a global report commissioned by private company Zimperium, more
than one-fifth of mobile devices have encountered malware. So, in my opinion
people should watch the signs as: poor performance, such as apps taking longer
than usual to open, or crashing randomly; excessive battery drain; increased
mobile data consumption; unexplained billing charges; unusual pop-ups, and the
device overheating unexpectedly. And on top of that users must install
antiviruses on their devices.
https://techxplore.com/news/2022-04-mobile-virus-youll-carefully.html
https://voca.ro/1kVnmT6ubUTc
Daily phrases:
1) examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
Уместно внимательнее изучить обязательства стран по МПЕСКП «принять меры».
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
Он смог оценить влияние выбросов на здоровье людей и биоразнообразие
3) distinct from
Engineering and technology are disciplines distinct from one another and from
science.
https://voca.ro/151FH5Ya0Go5
· #984
Denis Zavadsky Lebedeva RZ-211 (Monday, 30 May 2022 19:44)
Долг за 26.05
Just a half-millimeter wide, the tiny crabs can bend, twist, crawl, walk, turn
and even jump. The researchers also developed millimeter-sized robots resembling
inchworms, crickets and beetles. Although the research is exploratory at this
point, the researchers believe their technology might bring the field closer to
realizing micro-sized robots that can perform practical tasks inside tightly
confined spaces.
I consider this worthwhile research, since such an invention has many
applications today.
https://techxplore.com/news/2022-05-tiny-robotic-crab-smallest-ever-remote-controlled.html
Reproductive health received the bulk of the additional funds.
The same as yesterday, please.
However, to our knowledge there are no well-defined international practices in
such cases.
Основну частину додаткових коштів отримало репродуктивне здоров'я.
Так само, як і вчора, будь ласка.
Однак, наскільки нам відомо, чітко визначеної міжнародної практики в таких
випадках немає.
https://voca.ro/1lwVOjxeiiiv
· #983
Denis Zavadsky Lebedeva RZ-211 (Monday, 30 May 2022 19:34)
Долг за 28.04 и 19.05
ITC managed to prove mathematically that many traffic jams can be prevented if
you intervene early enough, said its co-founder and chief technology officer
Dvir Kenig, citing a 30 percent drop in traffic at the two junctions using their
system. The company says road congestion is a global scourge, calculating that
the average driver spends three days a year stuck in traffic, also pumping out
greenhouse gas emissions.
I consider this a good achievement, since this will solve a very old problem
related to traffic jams. It is possible that the technology will spread to the
whole world.
https://techxplore.com/news/2022-05-traffic-maths-problem-israeli-ai.html
San Diego scientists have developed a system for cars capable of autonomous
driving, a system that prevents the driver from dangerous behavior on the road.
Professor Alfred claims that the system will read the driver's driving style and
behavior on the road in real time, by which means the AI will be able to prevent
a possible attempt on the driver's life.
I consider this a good discovery, because it is a serious contribution to our
security in the field of automotive infrastructure.
https://techxplore.com/news/2022-05-autonomous-vehicles-dangerous-behavior.html
Malta consults with requesting States as a matter of practice.
Similarly, sensitivity as distinct from vulnerability is related to resistance
and resilience.
We are acquainted with their reporting requirements and monitoring committees.
There was considerable disagreement regarding the definition of terrorism.
A good example is the potentially controversial question of prevention.
They shipped it here to conduct research.
Мальта на практиці проводить консультації із запитуючими державами.
Аналогічно, чутливість на відміну від вразливості пов’язана зі стійкістю та
стійкістю.
Ми ознайомлені з їхніми вимогами до звітності та моніторингових комітетів.
Існували значні розбіжності щодо визначення тероризму.
Хорошим прикладом є потенційно спірне питання профілактики.
Вони відправили його сюди, щоб провести дослідження.
https://voca.ro/1n2I0WwswdeO
· #982
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Monday, 30 May 2022 19:11)
долг за 03.05
exam topic #13
Computer protection tips
1. Use Windows Firewall built-in and automatic
firewall enabled.
2. Software update
Be sure to turn on Automatic Updates in Windows Update to keep Windows,
Microsoft Office, and other Microsoft programs up to date. You should also
enable automatic updates for third-party software, especially browsers, Adobe
Acrobat Reader, and other programs you use regularly.
3. Use of anti-virus software and its current version
If you run Windows Device Security in Windows or Windows Defender, you already
have Security Center installed.
4. Make sure your passwords are well-chosen and secure.
For information on how to do this, see in the article Password protection.
5. Do not open suspicious attachments and do not follow unusual links in
messages.
They can appear in emails, tweets, posts, online advertising, messages or
attachments, and sometimes pretend to be well-known and reliable sources.
6. Safe web browsing
Do not visit sites that offer potentially illegal content. Many of these sites
instantly install malicious software or offer downloads that contain malicious
software. Use a modern browser, such as Microsoft Edge, to block malicious
websites and prevent malicious code from running on your computer.
7. Stay away from pirated materials
Avoid streaming and downloading movies, music, books, or programs that do not
come from trusted sources. They may contain malware.
8. Do not use USBs or other external devices unless you own them
To avoid getting infected with malware and viruses, make sure all external
devices belong to you or come from a trusted source.
https://voca.ro/19CUAB27HhJf
Daily phrases:
1)considerable disagreement
There were considerable disagreements about use of this technology.
2)controversial question
The controversial question is whether proton a particle or not.
3)conduct research
The budget of 2 million dollars was allocated to conduct this research.
https://voca.ro/146fUtZoPBJw
· #981
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Monday, 30 May 2022 18:59)
Долг за 28.04
Today I’ve read the article "New model recognizes emotions in deaf individuals
by analyzing EEG signals".Researchers at Tianjin University of Technology in
China have recently developed a new brain network-based framework for
recognizing the emotions of deaf individuals. The study provided valuable
insight about the differences between the brain activity of deaf and hearing
individuals in different emotional states. This is an interesting experiment.
People with disabilities have slightly different perceptions of emotion than we
do, which can lead to psychological abnormalities in everyday life. This model
is provided free of charge and I hope that this experiment will continue and
this model will be improved.
https://techxplore.com/news/2021-09-emotions-deaf-individuals-eeg.html
https://voca.ro/1kNh4k2t5kTJ
Daily phrases:
1)considerable disagreement
There was considerable disagreement regarding the definition of terrorism.
По поводу определения терроризма существуют серьезные разногласия.
2)controversial question
The age at which religious instruction was begun was also very important and was
a very controversial question.
Большое значение имеет также возраст, с которого начинается религиозное
воспитание, и это весьма спорный вопрос.
3)conduct research
They shipped it here to conduct research.
Они обосновались здесь чтобы проводить исследования.
https://voca.ro/1oyjjvyVHQzM
· #980
S.Mykhailiuk (Friday, 27 May 2022 14:32)
To Tikhonov Ivan РЗ-213 just satisfactory. Pls work on speciality exam topics next time.
· #979
S.Mykhailiuk (Friday, 27 May 2022 14:29)
To Ivan Siglyanyk(RZ-213). Task1 is 60 points ( stick to the appropriate procedure: a phrase with translation and then usage in the sentence). Task 2 is 75 points Focus on speciality exam topic next session.
· #978
S.Mykhailiuk (Friday, 27 May 2022 14:24)
To Shlapak Dmytro RZ-213 Just good . Pls work on speciality exam topics next time .
· #977
S.Mykhailiuk (Friday, 27 May 2022 14:21)
To Shpychka Olecksandr/ RZ-213 Thanks just very good. Select speciality exam topics next time.
· #976
S.Mykhailiuk (Friday, 27 May 2022 14:18)
To Kate Syrbu RZ-213 Thanks Just 82 points. Next time focus on exam topics posted on the website.
· #975
S.Mykhailiuk (Friday, 27 May 2022 14:15)
To Chabanenko Ksenia RZ-213 .Thanks , just 85 points. Keep on working hard.
· #974
S.Mykhailiuk (Friday, 27 May 2022 14:12)
To Igor Rudko (RZ-213) Pls think carefully about the conclusion: to state that it’s great that ‘the scientific society is interested in this case.’ Is not enough. Just 67 points . Other task is 75 points.
· #973
Lebedeva E. (Friday, 27 May 2022 12:38)
To Neblienko V. / RZ-212 / Kravchenko Kostiantyn (RZ-212), Thank you for your informative exam topics and work with phrases. Well done.
· #972
Lebedeva E. (Friday, 27 May 2022 12:36)
To Andrey Mashovets RZ-212 The comment is quite informative. Now I am waiting for your exam topic.
· #971
Igor Rudko (RZ-213) (S.Mykhailiuk) (Friday, 27 May 2022 12:09)
Audio: https://voca.ro/1o9Z9Nar1TPJ
Article: https://phys.org/news/2021-07-attack-proof-quantum.html
Today I have read the article: "Researchers bring attack-proof quantum
communication two steps forward". Some group of scientists has developed two
methods, one theoretical and one experimental, to ensure that QKD communications
cannot be attacked in this way. By the way, Quantum key distribution (QKD) is a
method for secure communication that uses quantum mechanics to encrypt
information. The first is an ultra-secure cryptography protocol that can be
deployed in any communication network that needs long-term security. The second
is a first-of-its-kind device that defends QKD systems against bright light
pulse attacks by creating a power threshold. In my opinion, it is really great
that the scientific society is interested in this case.
Phrases
Audio: https://voca.ro/13r7uMSwtQ8Y
1) the bulk of - основна маса
The bulk of America's orphaned wells is thought to be in eastern states where
the industry was born. - Вважається, що основна частина американських осиротілих
колодязів знаходиться в східних штатах, де зародилася галузь.
2) The same as - те саме, що
While the prediction was grim, reaching this 1.5 deg C threshold is not the same
as hitting the one signed onto in the Paris Agreement. - Хоча прогноз був
похмурим, досягнення цього порогу в 1,5 градуса C не те саме, що досягти того,
що було підписано в Паризькій угоді.
3) to our knowledge - наскільки нам відомо
To our knowledge, these are the first microorganisms demonstrated to cleave the
ether bond of 2-PAP. - Наскільки нам відомо, це перші мікроорганізми, які
розщеплюють ефірний зв’язок 2-PAP.
· #970
Chabanenko Ksenia RZ-213(S.Mykhailiuk) (Friday, 27 May 2022 11:51)
1.the same as- такий же як і;
Encryption methods are not the same as hashing techniques.-Методи шифрування не
те саме, що методи хешування.
2.the bulk of- основна маса;
Fossil fuels supply the bulk of global energy requirements.-Викопне паливо
забезпечує основну частину глобальних потреб в енергії.
3.to our knowledge- як нам відомо;
To our knowledge, agricultural sphere requires special cyber security measures
as well.-Наскільки нам відомо, сільськогосподарська сфера також потребує
спеціальних заходів кібербезпеки.
https://voca.ro/1f5tnoU4BTAp
Exam topic #12( Hardware firewall)
A hardware firewall is a physical applience that acts as a gatekeeper. Hardware
firewall provides a number of benefits including consistent security, standalone
protection, simplified management and centralized visibility.It has four main
categories: input devices, output devices, storage, and internal
components.Keyboard, mouse, monitor, printer, CPU, hard disk, RAM, ROM are
physical components of the computer that hardware firewall reffers to.If
hardware is damaged, user can replace it with the new one but not by
transferring it electrically through network. So, hardware consists of physical
electronic devices that cause processing of data and it couldn't be affected by
computer viruses.
https://voca.ro/1gyuC1VQs9HG
· #969
Kate Syrbu RZ-213 (S.Mykhailiuk) (Friday, 27 May 2022 11:47)
1)
the same as - такий же як і;
Account expiration period is the same as using traditional top-up methods.
Термін дії рахунку такий же, як і при традиційних методах поповнення.
2) to our knowledge - як нам відомо;
However, to our knowledge there are no well-defined international practices in
such cases.
Однак, наскільки нам відомо, чітко визначеної міжнародної практики в таких
випадках немає.
3) the bulk of - основна маса/більшість;
Fossil fuels supply the bulk of global energy requirements.
Викопне паливо забезпечує основну частину глобальних потреб в енергії.
https://voca.ro/1mWfFskgFg2Z
Today i have read the article that tells about the so-called mirror-circuit
method which is faster and more accurate than conventional tests and it also
helping scientists develop the technologies that are most likely to lead to the
world's first practical quantum computer, which could greatly accelerate
research for medicine, chemistry, physics, agriculture and national security. A
mirror circuit is a computer routine that performs a set of calculations and
then reverses it. In my opinion, the mirror-circuit method is important because
it gives scientists greater insight into how to improve current quantum
computers.
https://phys.org/news/2021-12-quantum-power-faster-accurate.html
https://voca.ro/199GI1AjQix0
· #968
Petrova E.I. (Friday, 27 May 2022 11:28)
Pour les étudiants qui apprennent le français.
Chers étudiants ! Travaillez régulièrement. J’attends vos devoirs. Laissez vos
commentaires et vos enregistrements ici. Allez-y! Bon travail.
· #967
Shpychka Olecksandr/ RZ-213 (S.Mykhailiuk) (Friday, 27 May 2022 11:26)
Article: https://phys.org/news/2018-08-teenagers-cybersecurity.html
Audio: https://voca.ro/1amRjD9dtpbY
Today i have read the article: "What teenagers need to know about
cybersecurity".
From the article, we learn about a specialist who teaches teenagers to protect
themselves on the Internet. Now young guys often trust their data to various
sites and programs, which is why they need to be trained to choose good, not
dangerous programs.
Teenagers are taught to behave appropriately in social networks and games, not
trusting anyone with their data. Many of them neglect their safety and get into
unforeseen situations.
In my opinion, every teenager should know the basic rules of their safety on the
Internet.
Phrases of the day:
1)to our knowledge
This new study is, to our knowledge, the first time that a hybrid approach
(Це нове дослідження, наскільки нам відомо, вперше використовує гібридний
підхід)
2)the same as
Light conditions in water are not the same as on land
(Умови освітлення у воді не такі, як на суші)
3)the bulk of
Most of the bulk of a planet like Earth is mantle.
(Більшу частину такої планети, як Земля, становить мантія.)
Audio: https://voca.ro/1am39RwlnXGr
· #966
Shlapak Dmytro RZ-213 (Mikhailyuk) (Friday, 27 May 2022 11:14)
1.
The bulk of services are protected from various cyber attacks.
Основна частина сервісів захищена від різних кібератак.
2. To our knowledge, this virus is not a problem for us.
Наскільки нам відомо, цей вірус не представляє для нас проблеми.
3. This is the same protection as the Swiss.
Це такий же захист, як і у швейцарців.
https://voca.ro/1g8f7vLxwPsj
Today I have read the article "Silicone wristbands track firefighters' exposure
to harmful chemicals". I am very pleased with this research, it will really help
a person. It can also push those people who once wanted to become a firefighter
but were afraid for their health to become a firefighter. As a result, there
will be more people ready to save and help others. Although scientists cannot
yet say exactly why firefighters receive such a dose of chemicals, the practical
application of this study will be useless. I would like them to succeed. Once I
really wanted to become a firefighter.
https://phys.org/news/2022-05-silicone-wristbands-track-firefighters-exposure.html
https://voca.ro/1aist72S4kW3
· #965
Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 27 May 2022 11:10)
Prhases of Day
the same as: https://voca.ro/1hIaQhpoDJJa
For comparison, this is the same as launching 70 James Webb Space Telescopes at
once
Для порівняння, це те саме, що запустити відразу 70 космічних телескопів Джеймса
Вебба
the bulk of : https://voca.ro/1mJ88LhRxeyu
For many people today, the bulk of food calories come from crop plants
domesticated thousands of years ago.
Для багатьох людей сьогодні основна частина харчових калорій надходить із
сільськогосподарських рослин, одомашнених тисячі років тому.
to our knowledge : https://voca.ro/1c9jm39aI2P5
"To our knowledge, this is the first experimental proof that selection can drive
the ability to adapt in a Darwinian sense and increase evolvability," says
Wagner.
Наскільки нам відомо, це перший експериментальний доказ того, що відбір може
стимулювати здатність адаптуватися в дарвінівському сенсі та підвищувати
здатність до еволюції — говорить Вагнер.
Article: https://phys.org/news/2018-11-skills-cybersecurity-professional.html
Audio: https://voca.ro/16Qdyid37vSH
Today, I have had an opportunity to read a very important article about the
necessary skills for a cybersecurity specialist.
According to the article, cybersecurity experts are very important in our time,
because now is the era of new technologies. As a result, the need for a large
number of quality professionals.
But the most important part of the article tells about the activities of these
specialists, and the most necessary skills for future professionals.
According to the analysis of several people in the field of Cybersecurity, we
can understand that the most important thing is communication. Because only an
honest team can achieve great results in defending something.
Honestly, I didn't think much about the importance of team communication. But I
hope that the information I received will help me succeed
· #964
Tikhonov Ivan РЗ-213 (S.Mykhailiuk) (Friday, 27 May 2022 10:52)
1.
to our knowledge
translate: насколько нам известно
example: The exam, as far as we know, will be held in person.The exam, as far as
we know, will be held in person.
2. the bulk of
translate: большая часть
example: Fossil fuels supply the bulk of global energy requirements.
3. the same as
tranalate: такой же, как
example: Account expiration period is the same as using traditional top-up
methods.
Today I read an article about a new threshold of global warming coming our way
in the near future. There is a 50-50 chance that the temperature will rise by
1.5 degrees in the next 5 years. According to scientists, although a 1.5 degree
warming is not critical, it will have serious consequences for the climate. And
as always the problem is associated with greenhouse gases, which are always
mentioned in talks about global warming. Gretta Thunberg also spoke on this
topic, stating that greenhouse gases will cause irreversible consequences, but
no one really listened to her words, as always, although she is right.
Article: https://phys.org/news/2022-05-key-global-threshold-years.html
Voice: https://voca.ro/191udQblhofE
· #963
Popovych E. (Thursday, 26 May 2022 16:00)
To
Nastya Poddubrovskaya(RZ - 212)
Topic # 6 An isolated virtual machine is well done.
· #962
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Thursday, 26 May 2022 15:30)
Topic # 6
An isolated virtual machine.
The popularity and widespread adoption of cloud computing has resulted in
extensified and intensive use of virtualization technology. Virtualization
technology allows the sharing of the same physical resources among several
users. This enables the consolidation of servers and a multitude of user
machines into a very small set of physical servers, by replacing the physical
machines with virtual machines, running on the same physical servers.
Consequently, several users work on and store their data in the same physical
platform. A software layer is used to enable the sharing of hardware between the
different users.
https://voca.ro/172mGrnPZUm2
· #961
Popovych E. (Thursday, 26 May 2022 15:23)
To
Nastya Poddubrovskaya(RZ - 212, Popovych.E)
Your exam topic # 5 is well done.
· #960
Popovych E. (Thursday, 26 May 2022 15:21)
To
Nastya Poddubrovskaya(RZ - 212)
#949 950,951,953,954
Your tasks are performed completely correct, they are informative and detailed.
· #959
Popovych E. (Thursday, 26 May 2022 15:19)
To
Povoznikov Artem RZ-212
Thank you, you have successfully completed the task.
· #958
Popovych E. (Thursday, 26 May 2022 15:17)
Timophey Sipin RZ-212
Exam topic #7 (Turning the DTV signal) is well done
· #957
Popovych E. (Thursday, 26 May 2022 15:11)
To
Pushkash Maxim (RZ-212 )
#927,938
Everything is good as well as your exam topic #9 (different protection
mechanisms)
· #956
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Thursday, 26 May 2022 15:08)
Topic # 5
Technical basis of information protection in modern computer systems.
Information is created by people, then transformed into data, and then entered
into automated systems in the form of electronic documents, which together with
other such documents represent information resources. Computers exchange data
over communications channels. During the operation of automated systems, data
(electronic documents) are transformed in accord with information technologies
being applied. Therefore, we may identify the following seven components of
technical security:
authentication of participants involved in information exchange
protection of hardware from unauthorized access
delineation of access to documents, personal computer resources, and networks
protection of electronic documents
protection of data in communications channels
protection of information technologies
delineation of access to datastreams
https://voca.ro/1okCJDLU5IVo
· #955
Popovych E. (Thursday, 26 May 2022 15:03)
To
Kate Kholodova (RZ-212)
Your exam topic #7 Different protection mechanisms and your comment is
thoughtful and well done, thank you.
· #954
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Thursday, 26 May 2022 14:59)
Topic #4
Information protection systems.
Information security (sometimes referred to as InfoSec) covers the tools and
processes that organizations use to protect information. This includes policy
settings that prevent unauthorized people from accessing business or personal
information. InfoSec is a growing and evolving field that covers a wide range of
fields, from network and infrastructure security to testing and auditing.
Information security protects sensitive information from unauthorized
activities, including inspection, modification, recording, and any disruption or
destruction. The goal is to ensure the safety and privacy of critical data such
as customer account details, financial data or intellectual property.
https://voca.ro/1oAIOh560FvP
· #953
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Thursday, 26 May 2022 14:39)
Topic#3
Different approaches to secrecy and their defects.
International cyberattacks with the intent to steal intellectual property (IP)
continue to dominate the news, leaving many firms scrambling to shore up their
computer networks to thwart such hacks.However, the greatest threat may be
already within a company. In more than 85 percent of the trade secret lawsuits
in state and federal courts of the United States, the alleged misappropriator
was either an employee or a business partner. That is the startling finding of A
Statistical Analysis of Trade Secret Litigation in Federal Courts, which is
believed to be the first statistical study on the subject.
https://voca.ro/1Y8Lqy7cBoYI
· #952
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 14:14)
To
#943
Sorry, I accidentally sent you outdated exam topics twice in a row, so you
didn't accept them. But comments # 942 and # 940 are my new exam topics on other
topics. Wouldn't it be difficult for you to check them? Have I already sent you
enough comments by the end of the second module check?
· #951
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Thursday, 26 May 2022 14:12)
Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This
article is about a US government that offers 10 million dollars for finding a
leader of the high-profile ransomware gang DarkSide. Washington blamed the
Russia-based group for the online assault that forced the shutdown of the
largest oil pipeline in the eastern United States in May. Cybercrimes have been
booming, with new data out in October showing $590 (five hundred nineteen)
million in ransomware-related payments were reported to US authorities in the
first half of 2021 alone. As for me, the fight against hackers is a very
difficult confrontation.
https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
https://voca.ro/1oJ2CnP5Rjsm
when investigating
The Act restricts these activities to persons authorised by government issued
licences and provides Police with powers of search and arrest when investigating
suspected offences.
Этот закон разрешает заниматься этими видами деятельности только лицам,
уполномоченным делать это на основании лицензий, выданных правительством, и
предоставляет полиции право проводить обыски и аресты при расследовании
предполагаемых преступлений.
a sharp rise
The fading away of cold-war tensions and the considerable increase in the number
of participants in space activities have led to a sharp rise in levels of
international cooperation and to the growing realization that space can address
common concerns.
С исчезновением напряженности в межгосударственных отношениях периода холодной
войны и в связи с существенным ростом числа желающих участвовать в космической
деятельности произошло резкое повышение уровня международного сотрудничества и
выросло понимание потенциальных возможностей космоса в решении общих для
человечества проблем.
with the aid of
To that end, MONUC will deploy as soon as possible, with the aid of additional
air assets.
С этой целью МООНДРК с помощью дополнительных авиационных средств проведет
развертывание в кратчайшие, по возможности, сроки.
https://voca.ro/12HvjRj8Kf7G
· #950
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Thursday, 26 May 2022 14:05)
Today, І have read thе аrtісlе «Virtual reality becomes more real".Scientists
from the Skoltech ADASE lab have found a way to enhance depth map resolution,
which should make virtual reality and computer graphics more realistic. One of
the issues of depth cameras is that their resolution, that is, the spatial
frequency of distance measurements, is insufficient for restoring the high
quality shape of the object, making the virtual reconstructions look all but
unrealistic.They propose a method that uses human perception of the difference
between visualizing three-dimensional reconstructions derived from ultra-high
resolution maps and reference depth maps. I hope that their method will find
wide application.
https://techxplore.com/news/2019-11-virtual-reality-real.html
Audio:https://voca.ro/14KyTRLOHft5
when investigating
This right might be restricted, as specified by legislation, to prevent crime or
to find out true facts when investigating criminal case.
Это право в предусмотренном законом порядке может быть ограничено для
предотвращения преступления или выявления истины во время расследования
уголовного дела.
a sharp rise
After a sharp rise in 2007, the global flow of FDI was again slowing down, which
would affect least developed countries.
После резкого роста в 2007 году глобальный приток ПИИ вновь замедляется, что
окажет негативное влияние на наименее развитые страны.
with the aid of
We cut through the glass with the aid of our sonic knife.
Мы прорезаем стекло при помощи нашего звукового ножа.
https://voca.ro/15cFqBjPIaup
· #949
Nastya Poddubrovskaya(RZ - 212, Popovych.E) (Thursday, 26 May 2022 13:59)
Today I have read the article entitled "DoorDash takes aim at Europe with
purchase of Wolt". This article reveals that DoorDash has added Europe to its
menu by purchasing Finnish food delivery company Wolt in an $8.1 billion deal,
the company said on Tuesday. The company reported it on the same day that
DoorDash said its revenues rose 45 percent to $1.3 billion in the recently ended
quarter, but that its loss more than doubled to $101 million from the same
period last year. It also revealed that San Francisco-based DoorDash shares were
up more than 19 percent to surpass $229 in secondary trading following the
announcement.
https://techxplore.com/news/2021-11-doordash-aim-europe-wolt.html
Audio:https://voca.ro/158Ix0emPaDX
when investigating
We encourage that international tribunal to continue safeguarding the rights of
children when investigating war crimes and crimes against humanity.
Мы призываем этот международный трибунал к продолжению деятельности в защиту
прав детей при расследовании военных преступлений и преступлений против
человечности.
a sharp rise
These three components have caused such a sharp rise.
Вот эти три компонента и вызвали такое резкое повышение.
with the aid of
Yes, with the aid of the machine, he could control us all.
Да, и с помощью этой машины он сможет контролировать нас всех.
https://voca.ro/11UTkzM5cPg1
· #948
Neblienko V. / RZ-212 / Lebedeva (Thursday, 26 May 2022 13:51)
Today i have read the article titled: "Vegetation of planet Earth: Researchers
publish unique database as open access". This text tells about a large database
of various kinds of plants that are located in different parts of the world. The
database was compiled by an international team of researchers led by Martin
Luther University Halle-Wittenberg (MLU), the German Centre for Integrative
Biodiversity Research (iDiv) and the French National Centre for Scientific
Research (CNRS). In my opinion, this database will be useful to different
sections of society: both environmentalists and ordinary people. I would find
another use for this database in a school biology course.
Article:
https://phys.org/news/2021-06-vegetation-planet-earth-publish-unique.html
Vocaroo: https://voca.ro/1mnJsXIUAZwP
Phrases
with the aid of
To that end, MONUC will deploy as soon as possible, with the aid of additional
air assets.
С этой целью МООНДРК с помощью дополнительных авиационных средств проведет
развертывание в кратчайшие, по возможности, сроки.
when investigating
We encourage that international tribunal to continue safeguarding the rights of
children when investigating war crimes and crimes against humanity.
Мы призываем этот международный трибунал к продолжению деятельности в защиту
прав детей при расследовании военных преступлений и преступлений против
человечности.
a sharp rise
The state budget ran into serious deficits, which in turn led to a sharp rise in
inflation and a rapid depreciation in the parallel market rate of the national
currency.
Государственный бюджет был сведен с большим дефицитом, что в свою очередь
привело к резкому росту темпов инфляции и быстрому обесценению национальной
валюты на параллельном рынке.
Vocaroo: https://voca.ro/1c9dDLcrGwfT
· #947
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 26 May 2022 13:32)
Sorry I must have forgotten to refresh the site
· #946
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 26 May 2022 13:31)
Sorry I must have forgotten to update the site
· #945
Neblienko V. / RZ-212 / Lebedeva (Thursday, 26 May 2022 13:07)
Exam topic #20
Principles of information protection.
When creating software and hardware information security tools, developers are
guided by the basic principles established by the current state laws and
regulations on information security, maintaining state secrets and ensuring the
secrecy of work carried out in automated systems. The principle of reasonable
access.
It consists in the obligatory fulfillment of two main conditions for providing
access to the performer (user) to AS information:
the executor (user) must have a sufficient 'permission form' to access
information of a given level of confidentiality - a secrecy stamp (mandatory
condition);
the executor (user) needs access to this information to perform his production
functions (traditional condition).
Vocaroo: https://voca.ro/1bXpg1f4Jd5r
· #944
Yershova Y. (Thursday, 26 May 2022 12:31)
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 26 May 2022 11:59)
Your article review is not bad, but the task with phrases has been wrongly done.
Please, check today's phrases.
· #943
Yershova Y. (Thursday, 26 May 2022 12:28)
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 26 May 2022 11:52)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 12:02)
Thanks, I've got yur exam topics.
· #942
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 12:11)
Exam Topic #13 (Early radio development.)
While radio has a long and interesting history, its earliest beginnings are
still controversial. There is some debate about who actually invented the radio.
Prior to World War I, radio communications were not very clear, so operators
generally relied on messages in Morse code. During the war, it was used almost
exclusively by the military and became an invaluable tool for sending and
receiving messages to the military in real time. Until the start of World War
II, radio was a source of entertainment in the form of serial programs, after
the war it became more focused on playing the music of the time. In general, the
radio made it possible for new directions in music to appear.
https://voca.ro/1ITkl1rlf0ui
https://www.techwholesale.com/history-of-the-radio.html
· #941
Andrey Mashovets RZ-212(Lebedeva E.) (Thursday, 26 May 2022 12:05)
Today I’ve read the article “Vegetation of planet Earth: Researchers publish
unique database as open access”.
This article states that one of the largest vegetation databases, as well as all
climatic zones on Earth, was made publicly available.
The purpose of this article is to tell about opening access to a very useful and
necessary database.
It's a treasure trove of data: The global geodatabase of vegetation plots
"sPlotOpen" is now freely accessible. It contains data on vegetation from 114
countries and from all climate zones on Earth.
This article will be useful for people interested in botany and geography.
https://voca.ro/130kteHtNxwM
https://phys.org/news/2021-06-vegetation-planet-earth-publish-unique.html
1.when investigating
The police provided descriptions of the investigative steps that are usually
included when investigating a rape case.
2.a sharp rise
A sharp rise in climate migrants could strain relations between developed
countries and their neighbors, the report on migration found, particularly if
wealthy countries enact restrictive policies that push people into countries
with fewer resources.
3.with the aid of
With the aid of "sPlotOpen," scientists could figure out whether the data was
collected from a forest—with various tree and grass species—or a meadow.
https://voca.ro/15kNFL0XhRpf
· #940
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 12:02)
Debt
Exam Topic #12 (Benefits of Satellite TV.)
Satellite TV has many advantages. The Satellite TV eliminates various
interferences and noises, allowing make the broadcast of the highest quality. An
important advantage is that satellite coverage extends to the whole of country,
so the location of the subscriber does not matter. By connecting to satellite
broadcasting, the subscriber chooses the desired channels for viewing, without
being tied to the packages of various operators. Therefore, satellite
broadcasting is quite profitable for the TV channels themselves, as the picture
is always high quality, and this only increases the prestige of the company
itself. Satellite TV also has a wealth of information that can be used for both
education and entertainment.
https://voca.ro/1hNdLjSYJzZW
· #939
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 26 May 2022 11:59)
https://voca.ro/18h9UfJsZwqM
Today I have read an article about experimental device that generates
electricity from the coldness of universe.
Some scientists have noticed that the same optoelectronic physics used to
collect solar energy, can be used to collect cold energy from space.
An international team create a device that can uses the temperature differences
between Earth and space to produce the electricity then faces the sky. In
contrast to leveraging incoming energy as a normal solar cell would, the
negative illumination effect allows electrical energy to be harvested as heat
leaves a surface.
In my opinion its very promising technology that can be another alternative
source of energy
https://voca.ro/1oLHH1R0Gyly
Each row represents a device and columns represent categories.
The analysis of microglia performed with RAPID revealed significant differences
between various brain regions
the field is then possible under certain assumptions
· #938
Pushkash Maxim (RZ-212 Popovich) (Thursday, 26 May 2022 11:57)
The
research team discovered a new method of protonated hydrogen. Using laser
pulses, they were able to trigger a reaction between water molecules, resulting
in trihydrogen. This situation simulates space conditions that can be called
extreme: no atmosphere, incessant radiation and cold. This is certainly a
forbidding environment for organisms like us, but it may well have played a
positive role in the emergence of our life on the planet. This ionized molecule,
is made up of three protons and two electrons, and takes the form of an
equilateral triangle. Owing to its highly reactive nature, protonated hydrogen
promotes the formation of more complex hydrocarbons. It is therefore regarded as
an important catalyst for the synthesis of organic, carbon-based molecules that
form the basis of life as we know it.
Voice: https://voca.ro/1kZpQgPmbirc
1) when investigating
When investigating the trend at other sites in Europe the picture is more
complicated.
2) a sharp rise
Stainless steels undergo a sharp rise in pitting corrosion rate as the
potential, solution concentration, or temperature is changed only slightly.
3) with the aid of
The models of the links are assembled into a unit with the aid of cylindrical
and ball hinges.
Voice:https://voca.ro/1bAJEcGrqbkZ
· #937
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 26 May 2022 11:52)
Exam Topic #7 Commercial use of radio.
https://voca.ro/16Knh0A2nQYU
Radio is not one of the highly profitable sectors of the media industry. It is
mainly used for advertising In most cases local and regional radio stations are
used as advertising media, because the coverage of each station depends on the
power of the radio transmitter and on the capacity of the radio network. I think
Radio in the usual sense is already outdated and the Internet is completely
replacing radio. It has been used since the war for encrypted and secure
communication in some commercial industries to try to abandon this outdated
technology. In this era, radio has long been obsolete.
· #936
Yershova Y. (Thursday, 26 May 2022 11:48)
Arina Omelchenko RE-211 (Yershova) (Thursday, 26 May 2022 11:27)
Thank you for your effective work with the phrases. Your article review is very
interesing and informative, but it's too long, mind that.
· #935
Yershova Y. (Thursday, 26 May 2022 11:45)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 11:12)
You have posted the topic #1 before.
· #934
Kravchenko Kostiantyn (RZ-212, Lebedeva E.) (Thursday, 26 May 2022 11:41)
Exam topic #18 (Protection schemes)
Over time, as computer systems became more globally recognized, it brought great
minds and innovations to the field. Many different designs have been implemented
over time for protecting information in computers, one reason for differences
among protection schemes is their different functional properties, under which
they can be categorized into unprotected, all-or-nothing and controlled sharing
systems.
Unprotected systems offer no real file access protection and they were
significantly more popular in the 1970's when computer information security
wasn't as important.
All-or-nothing systems provide total isolation of users from accessing most
files, or giving the user complete access over it.
Controlled sharing systems allow the administrator to set specific permissions
to users, such as reading, writing or executing files.
Audio: https://voca.ro/16NK3ov33a8K
Phrases:
1) This could prove useful when investigating delicate materials.
Це може виявитись корисним при розслідюванні витонченних матеріалів.
2) This is leading to a sharp rise in resignations.
Це призводить до різкого підйому в кількості відставок.
3) With the aid of bacteria, the researchers were able to show that the extent
of methane formation directly relates to metabolic activity.
За допомогою бактерії, вчені змогли показати, що ступінь утворення метана
безпосередньо зв'язано з метаболічною діяльністю.
Audio: https://voca.ro/1mJYKupVWTlu
· #933
Yershova Y. (Thursday, 26 May 2022 11:39)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 11:09)
Your comment is clear as well as the task with the Phrases.
You have 20 topics to choose and write for the lesson, but it's already the 3rd
time you are trying to pass the topic # 7. You have to post the topic every
session. Good luck!
· #932
Timophey Sipin RZ-212(Popovych) (Thursday, 26 May 2022 11:33)
Article: https://phys.org/news/2021-06-global-plastics-production-falls.html
Today I have read the article: "Coronavirus puts brakes on global plastics
production". Global plastics production declined slightly in 2020 as a result of
the economic fallout from the coronavirus pandemic, only the third time since
World War II that output has fallen. While there had been expectations of an
increase in consumption of medical plastics due to the pandemic, medical
plastics only accounted for 1.5-2.0 percent of total volumes. plastics prices
had fallen by just under seven percent in Europe as a result of the drop in oil
prices. In my opinion, people should ignore plastic to prevent pollution in the
immediate future
Phrases:
Audio: https://voca.ro/16s3fgvyhfgv
1) The federation said that factory closures due to coronavirus restrictions and
a reduction in stockpiles had fuelled a sharp rise—of eight percent in plastics
prices - Федерація заявила, що закриття фабрик через обмеження коронавірусу та
скорочення запасів сприяли різкому зростанню цін на пластик на вісім відсотків.
2) The researchers combined the power of the most advanced telescopes, such as
HST and GTC, with the aid of "natural telescopes" - Дослідники поєднали
потужність найдосконаліших телескопів, таких як HST і GTC, з допомогою
«природних телескопів».
3) Looking at a system without having to destroy it is very useful when
investigating structures. - Дивитися на систему без необхідності руйнувати її
дуже корисно при дослідженні структур.
· #931
Povoznikov Artem RZ-212 (Popovych) (Thursday, 26 May 2022 11:33)
Today i have read the article: Indonesia raises alert level for Krakatoa's
offspring volcano.
This article tells about Indonesian government has raised the alert level for
the progeny of the infamous Krakatau volcano to the second highest level, a day
after it erupted and sent a huge cloud of ash up to 3,000 meters into the sky.
Authorities raised the threat of Anak Krakatoa, meaning "Child of Krakatoa", to
the third level of a four-level volcano alert system after witnessing a spike in
activity last month.
They also expanded the exclusion zone around the crater the next day after
warning nearby residents wear masks outside because of the large plume of ash it
spewed over the strait separating the islands of Java and Sumatra.
Anak Krakatoa last erupted in 2018, triggering a tsunami that killed 429 people
and left thousands homeless.
Indonesia is located on the Pacific Ring of Fire, where the confluence of
continental plates is causing high volcanic and seismic activity.
Four other volcanoes in the Southeast Asian archipelago are currently ranked
second in danger.
Text: https://phys.org/news/2022-04-indonesia-krakatoa-offspring-volcano.html
Audio:https://voca.ro/1eeyfKNKzWsv
1) With the aid of
With the aid of artificial stem cells, it will soon be possible to establish new
treatments for previously incurable diseases such as Alzheimer's disease.
2) When investigating
The police provided descriptions of the investigative steps that are usually
included when investigating a rape case.
3) A sharp rise
This is leading to a sharp rise in resignations as workers re-evaluate their
jobs and find new positions offering more money, flexibility and satisfaction.
Audio:https://voca.ro/1oSqklUWSECD
Exam topic #1 (Concept of “Privacy”.)
Confidential information also includes information to which access is restricted
by federal laws. Constraints have different purposes. For example, protecting
the foundations of the constitutional order, morality, health, rights and
legitimate interests of certain individuals, ensuring the protection of the
country and the security of the state. Confidentiality means that a person who
has access to information does not have the right to transfer such information
about other territories without the freedom of its owner.
Any journalist should know what kind of information is confidential, how to
properly use and disseminate it. Mishandling of confidential information can
lead to claims against regulatory authorities, litigation, or even criminal
prosecution.
· #930
Yershova Y. (Thursday, 26 May 2022 11:32)
Stanislav Popik РТ-212 (Yershova) (Thursday, 26 May 2022 11:07)
Your exam topic is quite reasonable.
· #929
Timophey Sipin RZ-212(Popovych) (Thursday, 26 May 2022 11:30)
Exam topic #7 (Turning the DTV signal)
Turning the DTV signal - DTV (digital television) means the transmission and
processing of a television signal in digital form. The television signal
includes both video and audio. A digital waveform is an encoding of information
in MPEG format when the entire signal is represented as a sequence of "0" and
"1". Such signal transmission is not observed due to interference, which usually
manifests itself when the signal is exposed to the environment in the form of
snow, dashes and other small interference. This is a modern type of signal that
is actively used everywhere at the moment. The connection speed is faster than
the analog signal, but inferior to the satellite signal. I believe this is an
alternative television signal.
· #928
Yershova Y. (Thursday, 26 May 2022 11:29)
Stanislav Popik РТ-212 (Yershova) (Thursday, 26 May 2022)
Your comment is thoughtful, thank you. The sentences with phrases are quite
interesting but the 1st and 3rd sentences are from our site examples. Be
attentive and continue working.
· #927
Pushkash Maxim (RZ-212 Popovich) (Thursday, 26 May 2022 11:27)
Exam topic #9 (different protection mechanisms)
Protection mechanisms are used to enforce layers of trust between security
levels of a system. These protection mechanisms are used to protect processes
and data and are discussed in the following sections: Layering, Abstraction,
Data Hiding, Encryption. A traditional kernel-based operating system, such as
Unix, uses a two-layer approach in which the system resources are managed in a
protected kernel and everything else runs in an outer layer. Abstraction is a
common term in the world of object-oriented design. It is when data is managed
as a collection called an object. no access methods are provided as an interface
to this data. Data Hiding. This is called data hiding because the data is hidden
and inaccessible from the other layers. Encryption. Cryptography is the science
of creating algorithms used to encrypt data for the storage or transmission of
data. Encryption uses those algorithms to convert data into an unintelligible
form.
Voice: https://voca.ro/132Z03Dxq6RK
· #926
Arina Omelchenko RE-211 (Yershova) (Thursday, 26 May 2022 11:27)
phrases of the day:
a sharp rise
a sharp rise in climate migrants could strain relations between developed
countries and their neighbors
when investigating
This could prove useful when investigating delicate materials.
with the aid of
The researchers combined the power of the most advanced telescopes, such as HST
and GTC, with the aid of "natural telescopes"
https://voca.ro/1nGrvsucsPEE
Handshake team is focused on human-robot interactions
Today I've read the article about the handshake team that is focused on
human-robot interactions. Engineers have gained a great success in developing
technical skills of robots. But what about their social interaction? They might
help parents while sitting with their children. They might also help people with
mental difficulties adopt
and stop feeling helpless in our society. Elderly people could get polite
treatment with all the patience and empathy. The ENSTA research team have
designed a robot that is capable of elicting different emotions depending on the
context and conditions, adapting, for instance, their arm shaking. The team also
has a research about the robots being able to distinguish the gender and how
extrovert the person whose hand they shake are, based on hardness and the
movement style of handshaking. The scientists compared human-human handshaking
with human-robot ones. The results are promising. In my opinion, even though
robots could never replace human interaction, they'll be able to help us improve
it.
https://techxplore.com/news/2017-09-handshake-team-focused-human-robot-interactions.html
https://voca.ro/1dLW8J09QnfV
· #925
Yershova Y. (Thursday, 26 May 2022 11:26)
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 26 May 2022 10:52)
In general, not bad, but you missed the article link. Mind: ..with THE title.
The sentences with phrases are quite interesting but the 1st one is from our
site examples. Be attentive and continue working on the exam topic.
· #924
Kate Kholodova (RZ-212, Popovych) (Thursday, 26 May 2022 11:23)
Today I have read the article “T-GPS processes a graph with a trillion edges on
a single computer”. This article is about a Graps. Graphs are widely used to
represent and analyze real-world objects in many fields such as social media,
business intelligence, biology, and neuroscience. As the number of graph
applications grows rapidly, developing and testing new graph algorithms becomes
more important. Currently, many industrial applications require a graph
algorithm to handle large-scale graphs. The research team solved the problem
with the traditional two-step approach. It loads the initial small real graph
into main memory. Then T-GPS processes the graph algorithm on a small real
graph. After running the algorithm, T-GPS returns the same result as the
traditional two-step approach. The key idea behind T-GPS is to create only that
part of the synthetic graph that the algorithm needs to access on the fly.
Article: https://techxplore.com/news/2021-05-t-gps-graph-trillion-edges.html
Audio: https://voca.ro/1bn90mR1aisp
1) when investigating
When investigating the trend at other sites in Europe the picture is more
complicated.
2) a sharp rise
Stainless steels undergo a sharp rise in pitting corrosion rate as the
potential, solution concentration, or temperature is changed only slightly.
3) with the aid of
The models of the links are assembled into a unit with the aid of cylindrical
and ball hinges.
Audio ph: https://voca.ro/13IijQ2WFCQn
Exam topic #7 Different protection mechanisms.
Standart protection mechanisms:
- encryption tools;
- means of imitation protection;
- means of coding;
- means of making key documents;
Encryption means - providing the ability to delimit access to information.
Encryption tools in which part of the crypto transformations is carried out
using manual operations are called means of coding. Electronic documents
containing key information required to perform cryptographic transformations
using encryption tools are commonly called key documents. The means of
encryption that ensure the creation of key documents are called means of
production of key documents. Protection against the imposition of false
information, the ability to detect changes in information using the
cryptographic mechanisms implemented in the ISS are provided by means of
imitation protection.
Audio: https://voca.ro/1k9QrYMVVHdl
· #923
Vorobyova E. to Tikhonov from РЗ-213 (Thursday, 26 May 2022 11:21)
Mind your grammar mistakes at the beginning of your class work: “I HAVE read THE article today that TELLS US about…”. Read my remarks attentively and please, don’t make the same mistakes. Go on working.
· #922
Vorobyova E. to Rudko from РЗ-213 (Thursday, 26 May 2022 11:18)
Your work is fruitful. I appreciate your understanding of the articles, exam topic and sentences with new phrases and I approve of your regular work. Thank you.
· #921
Lebedeva E (Thursday, 26 May 2022 11:16)
To Artem Kotliarov RZ-212 The comment and exam topic are written correctly.
· #920
Vorobyova E. to РЗ-213 (Thursday, 26 May 2022 11:15)
To
Chabanenko, Gorbatiuk, Yakimova, Syrbu
Well done, students! I am thankful for your correct answers. Continue working
like this.
· #919
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 11:12)
Exam Topic #1 (Cable television)
Саble televisіon systems come in two types. In thе sуstem оf the first tуpe, the
cоnversion of the trаnsmitted image into a digital signal and the reverse
conversion of the digital signal into an image are cаrrіed out directly in the
converters and signal-light. In аll links of the image and sound transmission
path, information is transmitted in digital form. In cable TV systems of the
second type, the analog signal received from the sensors is converted into a
digital form, transmitted, and then again acquires an analog form in the
receiver, in which it is fed to the video monitor. This uses existing analog TV
signal sensors and signal-to-light converters in television receivers.
https://voca.ro/1od2JoS2p8vy
· #918
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 11:11)
Excuse me, but how many exam topics do I need to submit ?
DEBT
Exam Topic #7
(The new advancement of color Television.)
Color TV is a television broadcast technology that allows you to transmit color
information so that the TV can display video images in color. The transmission
of color images using mechanical scanners dates back to the 1880s. The advent
and development of electronic scanning and displays have made it possible to use
entirely electronic systems. The first monochrome transmission standards were
developed before World War II, but the development of civil electronics was
halted during the war. The idea of using three monochrome images to create a
color image arose and was experimented with almost immediately after the advent
of black and white television.
https://voca.ro/1nYFF70nhA3M
· #917
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 26 May 2022 11:09)
1.
When investigating
The police provided descriptions of the investigative steps that are usually
included when investigating a rape case.
2. A sharp rise
This is leading to a sharp rise in resignations as workers re-evaluate their
jobs and find new positions offering more money, flexibility and satisfaction.
3. With the aid of
The research team has observed, with the aid of advanced microscopy techniques
and electrochemical measurements, that the fabricated anode aids in reducing the
initial energy, which accelerates the four-electron transfer process in the
oxygen evolution reaction.
https://voca.ro/17Mlu7xfFN2b
Today I have read the article “A step closer to a hydrogen-fueled economy using
an efficient anode for water splitting”. To address the challenges the depletion
of fossil fuels depletion, alternative sources must be sought. There are many
various alternative green energy sources such as solar, wind, hydrothermal,
tidal, etc. are gaining attention for reducing the global carbon footprint. The
difficulty lies in the fact that they are intermittent and not available all the
time. Water splitting is one promising energy storage solution that could
potentially lead the world to a hydrogen-powered economy. I think this research
is an important milestone on the road to improving the efficiency of water
separation technology.
https://voca.ro/1gAuhRI5eu3f
https://phys.org/news/2021-06-closer-hydrogen-fueled-economy-efficient-anode.html
· #916
Stanislav Popik РТ-212 (Yershova) (Thursday, 26 May 2022 11:07)
Exam topic 7 “Commercial use of radio.”
The commercial use of radio is not an easy thing. Let's understand what
"commerce" is. Commercial is any use outside of your normal circle of friends or
family. So all the radio in institutions, cafes, etc. is commercial use. Radio,
in turn, must have a license to use a specific composition on the air. This
means that those who use the radio must have a similar agreement with the
performers who play in their institution, even through the radio. This is
evidenced by the law on copyright, which is in Ukrainian legislation as well.
https://voca.ro/14U8ShoWoDsK
· #915
Stanislav Popik РТ-212 (Yershova) (Thursday, 26 May 2022 11:05)
Today I have read the article called"Lyrebird offers technology to copy the
voice of any person." This article is about the voice simulation algorithm.
which will read any text with a given emotion. Lyrebird is a group that develops
speech synthesis technologies. The target audience for this product will be
those interested in reproducing voice through audio recording. The development
is already working well and you can even control various emotions. Also, this
technology can be used not for good purposes, this problem is still being worked
on.
I believe that this is a great treasure in the development of science, will help
us to better visualize the past and not only that.
https://techxplore.com/news/2017-04-lyrebird-tech-voice.html
https://voca.ro/12ianY4Z91xp
1) when investigating
When investigating the trend at other sites in Europe the picture is more
complicated.
2) a sharp rise
The sharp rise in the price of oil and energy products was a matter of concern.
3)with the aid of
The models of the links are assembled into a unit with the aid of cylindrical
and ball hinges.
https://voca.ro/1fUs6aMaxswm
· #914
Artem Kotliarov RZ-212 (Lebedeva E.) (Thursday, 26 May 2022 10:54)
1)
1. when investigating
The police provided descriptions of the investigative steps that are usually
included when investigating a theft case. - Поліція надала описи слідчих дій,
які зазвичай включаються при розслідуванні справи про крадіжку
2. a sharp rise
This is leading to a sharp rise in resignations as workers re-evaluate their
jobs and find new positions offering more money, flexibility and satisfaction. -
Це призводить до різкого зростання кількості звільнень, оскільки працівники
переоцінюють свою роботу та знаходять нові посади, які пропонують більше грошей,
гнучкості та задоволення.
3. with the aid of
Civil engineers use a comparable mechanism in pre-stressed concrete with the aid
of high-strength steel, and thus produce crack-resistant structural elements. -
Інженери-будівельники використовують аналогічний механізм у попередньо
напруженому бетоні за допомогою високоміцної сталі, і таким чином виготовляють
стійкі до тріщин конструктивні елементи.
https://voca.ro/14FRuF8cwyPX
2) Today I have read the article “Universal mechanism of methane formation
discovered”.
The formation of methane greenhouse gas is based on a universal mechanism. This
discovery was made by scientists at the University of Heidelberg and the Planck
Institute for Terrestrial Microbiology. They found that methane is produced in
the cells of organisms by a purely chemical process. Studies explain, among
other things, why methane is released not only as a result of the activity of
special microorganisms, but - as has long been observed - also by plants and
fungi.
In my opinion, these results are an important step towards understanding the
aerobic formation of methane in the environment.
https://phys.org/news/2022-03-universal-mechanism-methane-formation.html
https://voca.ro/1bNg1nBYlBmR
3)Exam topics #20(Principles of information protection)
Three basic principles of information protection that must be followed in an
information system:
1. confidentiality - a mandatory requirement for a person who has obtained
access to certain information not to transfer such information to third parties
without the consent of its owner, as well as ensuring that it is impossible to
access information to persons who do not have the appropriate permission (in
computer language - the corresponding access rights). 2. integrity-the absence
of any unauthorized changes (both accidental and intentional) in the protected
area. 3.reliability - a guarantee that information is obtained from a
well-known, trusted or reliable source.
https://voca.ro/1dbmqOGiQGig
· #913
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 26 May 2022 10:52)
Today I have read the text with title " The researchers test electric personal
flying machine". On my opinion this ability will help humanity in future to
communicate more faster than now. We will be able to travel in any place of
world by seconds if scientists make public flying transport as it described in
films and books. But today we have only tests of personal flying machine and
this fact didn`t impressed me because first prototypes of so-called jetpacks
were made more than 5 years ago. Still, flying transport it is good prospect
that can be realized in near future and fully replace airplanes.
I liked this article, and i want to fly on this flying machine.
https://voca.ro/16mbkWVecIBI
1. When investigating the trend at other sites in Europe the picture is more
complicated.
2. We cut through the glass with the aid of our sonic knife.
3. These three components have caused such a sharp rise.
https://voca.ro/1fG8fQuV0fah
· #912
Lebedeva E (Thursday, 26 May 2022 10:51)
To Nikitina Anastasia RZ-212 Well done, thank you.
· #911
S.Mykhailiuk (Thursday, 26 May 2022 10:51)
To Avdieiev Danil (RT-211) Task1 has some grammar mistakes, This is not a conclusion you’ve made. Just 60 points. Pls focus on speciality topics Task2 is UNACCEPTED. You have the phrases and the same sentences with them comparing with other students like Nazariy Glugan (RT-211) and others. Do you know that this is a plagiarism? Pls do the tasks on your own to get positive points.
· #910
Tikhonov Ivan РЗ-213 (Vorobyova) (Thursday, 26 May 2022 10:45)
1.
a sharp rise
translate: резкое повышение
example: The sharp rise in the price of oil and energy products was a matter of
concern.
2. with the aid of
translate: с помощью
example: With a can opener I was able to open that can.
3. when investigating
translate: при изучении
I read an article today that talked about the emigration of U.S. residents due
to changing weather conditions. When I studied the problem, it turned out that
most migrants move to nearby democracies. This greatly increases the instability
between the U.S. and its adversaries, which are already very tense. Joe Biden's
administration has published risk assessments related to migration. The report
states that if the U.S. and Europe do not develop a strategy to combat climate
migration, China, Russia and other countries can take advantage of the situation
by assisting the affected countries to get approval from U.S. citizens. The
report also says that if the government does not address the problem of
greenhouse gas emissions, millions of people will be forced to leave their homes
and move.
article: https://phys.org/news/2021-10-climate-migrants.html
voice: https://voca.ro/14d8IUlvFnpW
· #909
Nikitina Anastasia RZ-212(Lebedeva E.) (Thursday, 26 May 2022 10:41)
Exam topic #20 (Principles of information protection).
The principles of information security include: legality, balance of interests
of the individual, society and the state; complexity; systematicity; integration
with international security systems; economic efficiency.
It is impossible to create a system whose protection cannot be broken, the main
principle may be the creation of such a protection mechanism, the cost of which
will be more expensive than the information available. Therefore, it is
necessary to implement security software, which is built into the software of
the system and is necessary to perform security functions.
https://voca.ro/1cu6NA9rgt6U
1When investigating
The police provided descriptions of the investigative steps that are usually
included when investigating a rape case.
Поліція надала опис слідчих дій, які зазвичай включаються під час розслідування
справи про зґвалтування.
2. with the aid of
With the aid of next-generation genome sequencing methods that allow for a
comparison between the genomes of both sexes
За допомогою методів секвенування геному наступного покоління, які дозволяють
порівняти геноми обох статей
3. a sharp rise
A sharp rise in climate migrants could strain relations between developed
countries and their neighbors
Різке зростання кліматичних мігрантів може погіршити відносини між розвиненими
країнами та їхніми сусідами.
https://voca.ro/1iRZMcQo8I6K
· #908
Lebedeva E (Thursday, 26 May 2022 10:40)
To РЗ-212 The lesson will start soon and I am waiting for your exam topics and work with phrases.
· #907
S.Mykhailiuk (Thursday, 26 May 2022 10:38)
To
Nazariy Glugan (RT-211) pls do not copy the phrases with the sentences from your
mates posting tasks into the Guestbook.
It looks like a plagiarism.
· #906
Igor Rudko (RZ-213) (Vorobyova E. V.) Home-work (Thursday, 26 May 2022 10:38)
Audio:https://voca.ro/1fKr8WtjTyYH
Article: https://phys.org/news/2021-06-global-plastics-production-falls.html
Today I have read the article: "Coronavirus puts brakes on global plastics
production". Global plastics production declined slightly in 2020 as a result of
the economic fallout from the coronavirus pandemic, only the third time since
World War II that output has fallen. While there had been expectations of an
increase in consumption of medical plastics due to the pandemic, medical
plastics only accounted for 1.5-2.0 percent of total volumes. plastics prices
had fallen by just under seven percent in Europe as a result of the drop in oil
prices. In my opinion, people should ignore plastic to prevent pollution in the
immediate future
Phrases:
Audio: https://voca.ro/16s3cp9bgT5s
1) The federation said that factory closures due to coronavirus restrictions and
a reduction in stockpiles had fuelled a sharp rise—of eight percent in plastics
prices - Федерація заявила, що закриття фабрик через обмеження коронавірусу та
скорочення запасів сприяли різкому зростанню цін на пластик на вісім відсотків.
2) The researchers combined the power of the most advanced telescopes, such as
HST and GTC, with the aid of "natural telescopes" - Дослідники поєднали
потужність найдосконаліших телескопів, таких як HST і GTC, з допомогою
«природних телескопів».
3) Looking at a system without having to destroy it is very useful when
investigating structures. - Дивитися на систему без необхідності руйнувати її
дуже корисно при дослідженні структур.
· #905
S.Mykhailiuk (Thursday, 26 May 2022 10:33)
To Nazariy Glugan (RT-211) pls focus on your speciality topics. I hope you are not a part of medical staff. Just satisfactory. Task2 is UNACCEPTED. Pls translate into Ukrainian. Keep on working hard.
· #904
S.Mykhailiuk (Thursday, 26 May 2022 10:26)
To Artem Verhelis RT-211, pls train your pronunciation. Mind the word ‘climate’- ˈklaɪmət, ˈklaɪmɪt/.Work hard to improve your language speaking skills.
· #903
Igor Rudko (RZ-213) (Vorobyova E. V.) (Thursday, 26 May 2022 10:25)
Audio: https://voca.ro/13WyhhDCkPb5
Article: https://phys.org/news/2021-11-roles-bacteria-global-carbon.html
Today I have read the article: "Study digs up roles bacteria play in global
carbon cycle". Soil bacteria are difficult to study because they are a key to
the health of our biosphere. They convert plant biomass into soil organic
matter, which is the basis for soil fertility and holds three times more carbon
than the atmosphere. So, bacteria control how much carbon ends up in the
atmosphere or is stored in the soil. Every year, soil microbes process about six
times more carbon than all anthropogenic emissions combined. I guess that we
need to understand what is happening with microbes and then make better
decisions about how to manage our soil.
Phrases:
Audio: https://voca.ro/1eL6tG0dX621
1)The energy deposited is much lower when using electrons, this could prove
helpful when investigating delicate materials. - Енергія, що відкладається,
набагато нижча при використанні електронів, це може виявитися корисним при
дослідженні делікатних матеріалів.
2) Now scientists have succeeded in showing that methane can also be formed
without such a catalyst—with the aid of a purely chemical mechanism. - Тепер
вченим вдалося показати, що метан також може утворюватися без такого
каталізатора — за допомогою суто хімічного механізму.
3)This is leading to a sharp rise in resignations as workers re-evaluate their
jobs and find new positions offering more money, flexibility, and satisfaction.
- Це призводить до різкого зростання кількості звільнень, оскільки працівники
переоцінюють свою роботу та знаходять нові посади, які пропонують більше грошей,
гнучкості та задоволення.
Тема іспиту
Exam topic
Password and their drawbacks
Audio: https://voca.ro/17viwJmIiQTx
To try and make passwords more secure, consumers are asked to make them more
complex, by using numbers, uppercase letters, lowercase letters, and special
characters. This makes them hard to remember. And if people can’t remember them,
they write them down or use the same password on multiple websites…which makes
them less secure. Passwords can be shared, guessed, or stolen, which means they
aren’t secure. Over 50% of young people admit that they share their log-in
details with friends, and 59% of respondents admitted to reusing the same
passwords across multiple sites.
In my opinion, people need to find a balance between security and usability.
· #902
Avdieiev Danil (RT-211) S.Mykhailiuk (Thursday, 26 May 2022 10:25)
Article: https://phys.org/news/2021-09-benefit-employees.html
Today I have read the article titled "Study shows benefit of employees managing
themselves". It describes us about that more U.S. companies could benefit from
encouraging and developing self-leadership in employees, a concept that allows
workers to manage themselves instead of relying on supervisor. Self-leadership
involves employees influencing their own behaviors, thoughts and moods, making
them less dependent on traditional leaders to complete goals and achieve peak
performance in the workplace. I find this article interesting because we can
read how people improve themself and who peolpe become independenced.
https://voca.ro/1bkgeY0JKkAu
with the aid of
The models of the links are assembled into a unit with the aid of cylindrical
and ball hinges.
https://voca.ro/16piOhz2hP6t
Моделі ланок ланцюга збирають у блок за допомогою циліндричних та кульових
шарнірів.
when investigating
When investigating the trend at other sites in Europe the picture is more
complicated.
https://voca.ro/1eRsqyjO8eqE
При вивченні тренду на інших європейських ділянках вимальовується складніша
картина
a sharp rise
Stainless steels undergo a sharp rise in pitting corrosion rate as the
potential, solution concentration, or temperature is changed only slightly.
https://voca.ro/1geJHG6NuLGz
Швидкість точкової корозії нержавіючих сталей різко зростає, оскільки потенціал,
концентрація розчину або температура незначно змінюються.
· #901
Nazariy Glugan (RT-211) Mykhailiuk S. (Thursday, 26 May 2022 10:22)
Today i have read the article "Using bacterial cocktails to fight infections".
Probably almost all people have already faced such a situation when you get sick
and have to take broad-spectrum antibiotics, but unfortunately this drug
destroys both bad and good bacteria in your intestines, which occupy the most
important niches and help fight off pathogens. E. coli is one of the most
well-known bacteria in the human gut and is almost always referred to as a bad
bacterium, however Berbel Stecher and his team have found that commensal E. coli
protects against Salmoenella infection. I liked this article, here I could read
a lot of interesting things about bacteria.
https://phys.org/news/2021-10-bacterial-cocktails-infections.html
https://voca.ro/16fo5WEH6dQX
1) when investigating
When investigating the trend at other sites in Europe the picture is more
complicated.
При изучении тренда на других европейских участках вырисовывается более сложная
картина
2) a sharp rise
Stainless steels undergo a sharp rise in pitting corrosion rate as the
potential, solution concentration, or temperature is changed only slightly.
Скорость точечной коррозии нержавеющих сталей резко возрастает, поскольку
потенциал, концентрация раствора или температура изменяются незначительно.
3)with the aid of
The models of the links are assembled into a unit with the aid of cylindrical
and ball hinges.
Модели звеньев цепи собирают в блок с помощью цилиндрических и шаровых шарниров.
https://voca.ro/1bl9Wa5MgStF
· #900
S.Mykhailiuk (Thursday, 26 May 2022 10:20)
Artem Verhelis RT-211, pls focus on your speciality topics.I hope the ecology is not part of your speciality. Just 63 points. Task2 is good. Pls translate the phrases themselves. Keep on working hard.
· #899
Yershova Y. (Thursday, 26 May 2022 10:19)
Sofia Gilenko РЗ-211 (Yershova Y.A.) (Thursday, 26 May 2022 09:59)
Thank you for your clear and full comment. I share your opinion, but don't
forget the review must be around 100 words. The task with phrases is well done.
· #898
Kate Syrbu RZ-213 (Vorobyova) (Thursday, 26 May 2022 10:18)
1)
with the aid of - за допомогою;
The helicopters were observed by navigation lights and with the aid of night
vision devices.
За гелікоптерами спостерігали за навігаційними вогнями та за допомогою приладів
нічного бачення.
2) a sharp rise - різкий підйом;
The prolonged "hunger gap" has contributed to a sharp rise in malnutrition.
Тривалий «голодний розрив» сприяв різкому росту недоїдання.
3) when investigating - під час вивчення/розслідування;
The Police have powers of search and seizure when investigating alleged offences
relating to these items.
Поліція має повноваження проводити обшуки та виїмки під час розслідування
ймовірних правопорушень, пов’язаних із цими предметами.
https://voca.ro/12UfximRsJHw
Today i have read the article that tells about an international team of
researchers that has gained new insights into the protein structure and function
of the ion channels that control the heartbeat. The results of their research
could contribute to the development of cardiac drugs with fewer side effects.
Using the molecular dynamic simulation on the high-performance computer
researchers investigated the function of HCN channels. This method allows us to
watch the protein at work, as it were. In my opinion, this research is valuable
because the disadvantages and side effects of currently used drugs could perhaps
be prevented with a better understanding of the channels in a new generation of
drugs.
https://phys.org/news/2021-07-high-performance-insights-function-ion-channels.html
https://voca.ro/1g5vSEtCntmr
My exam topics #496-#504
· #897
Yakymova Anna / RZ-213 (Vorobyova E. V.) (Thursday, 26 May 2022 10:18)
Principles of information protection
Exam topic 20
I want to tell you about principles of information protection.Information
security (sometimes referred to as InfoSec) covers the tools and processes that
organizations use to protect information.
What are the 3 Principles of Information Security?The basic tenets of
information security are confidentiality, integrity and availability. Every
element of the information security program must be designed to implement one or
more of these principles. Together they are called the CIA Triad.Confidentiality
measures are designed to prevent unauthorized disclosure of information. The
principle of integrity ensures that data is accurate and reliable and is not
modified incorrectly.Availability is the protection of a system’s ability to
make software systems and data fully available when a user needs it (or at a
specified time).
In addition, information security is very important in the digital world.
https://voca.ro/1aIxJ2HBcqzb
· #896
Gorbatiuk Stanislav RZ-213 (Vorobyova E.V) (Thursday, 26 May 2022 10:16)
1.
This achievement was possible with the aid of incredible science skills. Це
досягнення стало можливим за допомогою неймовірних наукових навичок.
2. This same expenditure profile leads to a sharp rise in subsequent years. Цей
самий профіль витрат призводить до різкого зростання в наступні роки.
3. When investigating modern crimes it is sometimes good to seek help from the
other professionals as well. При розслідуванні сучасних злочинів іноді корисно
звернутися за допомогою і до інших фахівців.
https://voca.ro/1ogBs6hrInzO
Today I've read the article, which is titled "Shark bites are rare: Eight things
to avoid to make them even rarer". This article tells us about how the
"SharkSmart" approach, adopted by the Queensland government, aims to educate and
urge people to take responsibility for reducing the risk of shark bites by
changing their own behavior. Many SharkSmart behaviors are well known, such as
not swimming at dusk or dawn when sharks may be more prevalent. It is suggested
that by not doing these eight things shown in the survey, we can make shark
bites even rarer than they already are. Even though shark bite incidents are
extremely rare in Australia but by making small changes, people can drive down
the danger even further.
https://phys.org/news/2021-12-shark-rare-rarer.html
https://voca.ro/1lhZEm0U7EKb
· #895
Yershova Y. (Thursday, 26 May 2022 10:15)
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 26 May 2022 09:40)
Your review is reasonable and informaive, but it's too long, don't forget about
100 words. Thank you for your effective work with the phrases.
· #894
S.Mykhailiuk (Thursday, 26 May 2022 10:14)
To Yeulizaveta Barsukova (RT-211) Just good. Invite other students from Group RT-211 to join our on-line session today. We don’t have much time left within the session.
· #893
Yershova Y. (Thursday, 26 May 2022 10:13)
Vlasov Vadim RZ-211 (Yershova) (Thursday, 26 May 2022 09:25)
The comment is well done, but mind the pronunciation. The examples with phrases
are quite interesting but the 1st one is not informative enugh. Go on practising
your reading.
· #892
Artem Verhelis RT-211, Mykhailiuk S. (Thursday, 26 May 2022 10:12)
Today I've read the article "Discovery of 'ghost' fossils reveals plankton
resilience to past global warming events". The article is about discovering by
international team of scientists "ghost" fossils of a plankton species called
Coccolithophores. This species of plankton plays an important role in today's
oceans by supporting marine food webs and sequestering carbon in sediment.
Scientists have also found that this plankton has been seriously affected by
climate change and ocean pollution. I think this discover is very useful,
because now people can thoroughly study this species of plankton and help it
survive climate changes.
Audio: https://voca.ro/1061CxLBhH2b
Article:
https://phys.org/news/2022-05-discovery-ghost-fossils-reveals-plankton.html
1) when investigating
Looking at a system without having to destroy it is very useful when
investigating structures.
Дивитися на систему, не руйнуючи її, дуже корисно під час дослідження структур.
2) a sharp rise
A sharp rise in climate migrants could strain relations between developed
countries and their neighbor
Різке зростання кліматичних мігрантів може погіршити відносини між розвиненими
країнами та їхніми сусідами
3) with the aid of
With the aid of the bacteria Bacillus subtilis, the researchers were able to
show that the extent of methane formation directly relates to metabolic
activity.
За допомогою бактерії Bacillus subtilis дослідники змогли показати, що ступінь
утворення метану безпосередньо пов’язана з метаболічної активністю.
Audio: https://voca.ro/1erpcjvuby4M
· #891
Lebedeva E (Thursday, 26 May 2022 10:11)
To Dovzhenko Ilya RZ-211 Thanks for the comment. Well done.
· #890
S.Mykhailiuk (Thursday, 26 May 2022 10:08)
To Sasha Movsum-Zade RT-211 Task1 should contain a conclusion. Just 67 points Task2 is done with free interpretation .just 74points. Pls translate the phrases themselves. Keep on working hard.
· #889
Dovzhenko Ilya RZ-211 (Lebedeva) (Thursday, 26 May 2022 10:03)
Today I have read the article "New AI navigation prevents crashes in space".
This article tells us that engineers are developing collision avoidance systems
that will help autonomous robots maintain, assemble or manufacture satellites in
orbit. Scientists must develop a reliable collision avoidance algorithm and work
schedule
that works in real time so that autonomous systems can safely complete the
mission, using explainable artificial intelligence. The new artificial
intelligence is based on physics rather than relying solely on data, so it's
more reliable.
This article is useful for AI researchers and developers. I was interested in
reading this article.
https://voca.ro/14XLkBjo9Snt
1) with the aid of
All of the records this is exchanged can be scrambled with the aid of it.
Всі записи цього відбувається обмін може бути видерся за допомогою нього.
2)a sharp rise
LinkedIn itself announced that it is not necessary to wait on them a sharp rise
in profits.
LinkedIn сама оголосила, що не варто чекати від них різкого зростання прибутків.
3)when investigating
And people also tend to become too emotionally volatile when investigating their
own spouse.
І люди також мають тенденцію ставати занадто емоційно нестійкими при дослідженні
їх власного на предмет зради їх дружина.
https://voca.ro/18r1om8pZnum
· #888
Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (Thursday, 26 May 2022 10:02)
Link to article:
https://phys.org/news/2018-08-smart-urban-solutions-resilient-cities.html
link to voice: https://voca.ro/1GEkCI4i6XdC
Today I have read the article "Smart urban solutions for more resilient cities".
It tells about a new project SMURBS, begun as part of the EU's ERA-PLANET
umbrella project, is working to increase urban resilience and enhance the
quality of life in urban regions.
To achieve this goal, it's focusing on challenges related to air quality, urban
growth, natural and
man-made disasters, health and migration. The project's first step is to
stimulate strategic planning by
connecting with local authorities, urban planners and city-level stakeholders to
map out 'what is already
out there' and 'what the users want'.
In my opinion, SMURBS will help cities with many problems related to sustainable
urban development.
1. Yes, with the aid of the machine, he could control us all.
Так, за допомогою машини він міг керувати нами всіма.
2. These three components have caused such a sharp rise.
Ці три складові викликали такий різкий підйом.
3. This right might be restricted, as specified by legislation, to prevent crime
or to find out true facts when investigating criminal case.
Це право може бути обмежене в установленому законодавством порядку для
запобігання злочину або з'ясування істинних фактів при розслідуванні
кримінальної справи.
· #887
Sofia Gilenko РЗ-211 (Yershova Y.A.) (Thursday, 26 May 2022 09:59)
Today I've read the article "A new machine learning system helps robots
understand and perform certain social interactions."
Robots can deliver food to campus
college and punching a hole in the golf course, but even the most sophisticated
robot cannot perform basic social interactions that are critical to human daily
life.
The researchers also showed that their model creates realistic and predictable
social interactions. When they showed people videos of simulated robots
interacting with each other, viewers generally agreed with the model about what
type of social behavior was taking place.
In my opinion, this article is important because robots will soon begin to live
in our world, and we really need to learn how to communicate with them on a
human basis.
https://techxplore-com.translate.goog/news/2021-11-machine-learning-robots-social-interactions.html?_x_tr_sl=auto&_x_tr_tl=ru&_x_tr_hl=ru&_x_tr_pto=nui,op
1.when investigating
When investigating the trend at other sites in Europe the picture is more
complicated.
2.with the aid of
This can be done very conveniently with the aid of viewports.
3.a sharp rise
There has been a sharp rise in the number of people out of work.
https://voca.ro/1aK8onEo9aiN
https://voca.ro/1cc1gC9vsro8
· #886
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 26 May 2022 09:59)
Exam topic #7(Different protection mechanisms)
The significance of information protection calls for multiple mechanisms that
allow people to protect their right to decide what information could be
available for other people. Methods of protection of informational systems
include access control, encryption mechanisms and regulation. It means that we
need to use antivirus programs and cryptographic closure of information to
create necessary conditions. Obstruction, enforcement and encouragement are used
as such methods as well. The point of it is to make people who have the access
to information to adhere to all established procedures to keep data save. So,
protection mechanisms are based on technical methods that actually guard the
data and on human factor which means different rules that every member of the
team should follow.
https://voca.ro/169Mxg5i4hsH
Exam topic #11 (The differences between a software and hardware firewall)
A computer system is divided into hardware and software. Hardware is the
physical parts of the computer that cause processing of data. It is manufactured
and invulnerable to computer viruses . Meanwhile software is the developed set
of instructions that tells a computer exactly what to do and that could be
affected by computer emergency. So hardware can not perform any task without
software while software can not be executed without hardware. One more
difference lies in transferring which means that we can’t transfer hardware from
one place to another electrically through network unlike software. So, hardware
and software are two parts of the computer and have different functions but
inability to work one without another is the thing in common.
https://voca.ro/1eO1HJWyiM5P
· #885
S.Mykhailiuk (Thursday, 26 May 2022 09:57)
To Sergey Kyznyak RT-211, Pls train to read the exam topic before recording it. It sounds unnatural. Just 70 points. Keep on working hard.
· #884
Yeulizaveta Barsukova (RT-211) S.Mykhailiuk (Thursday, 26 May 2022 09:54)
Exam Topic #9 (Development of television in your home country)
Ukraine has a large audiovisual offering. With some 322 TV broadcasting stations
and 590 cable TV companies . Ukraine's three chief TV channels are “Inter”,
“1+1” and “UT-1”. The TV system in the Ukraine is run by the National TV Company
of the Ukraine as well as 26 regional TV/Radio institutions. Ukraine’s TV
channel “1+1” is the largest private TV channel. This 24 hour channel has about
95% coverage and is found on UT-2. Channel “UT-1” has the highest coverage with
98%. “Inter” makes use of channel UT-3. Different parts of the country can also
receive television broadcasts from neighboring countries.
Audio:https://voca.ro/1bQZR1wQaXb6
· #883
Lebedeva E (Thursday, 26 May 2022 09:54)
To Mykola Zhmurak RZ-211 There is a mistake in the last sentence: But if they ARE able to do this, it will be the new step in automated systems.
· #882
Ivan Zarytskyi RZ-211 (Lebedeva) (Thursday, 26 May 2022 09:53)
Today I read the article “New method to kill cyberattacks in less than a
second”. This article is about a new method that could automatically detect and
kill cyberattacks on our laptops, computers, and smart devices in under a
second. Using artificial intelligence in a completely novel way, the method has
been shown to successfully prevent up to 92 percent of files on a computer from
being corrupted, with it taking just 0.3 seconds on average for a piece of
malware to be wiped out. In my opinion, it’s a piece of good news for everyone
who struggles with viruses and cyberattacks on their devices.
https://techxplore.com/news/2022-05-method-cyberattacks.html
https://voca.ro/1kYbDgW1iR5A
when investigating
The police provided descriptions of the investigative steps that are usually
included when investigating a rape case.(Поліція надала опис слідчих дій, які
зазвичай передбачають під час розслідування справи про зґвалтування.)
a sharp rise
A sharp rise in climate migrants could strain relations between developed
countries and their neighbors(Різке зростання кліматичних мігрантів може
погіршити відносини між розвиненими країнами та їхніми сусідами)
with the aid of
With the aid of "sPlotOpen," scientists could figure out whether the data was
collected from a forest—with various tree and grass species—or a meadow.(За
допомогою «sPlotOpen» вчені могли з’ясувати, чи були дані зібрані з лісу — з
різними видами дерев і трав — чи з лугу.)
https://voca.ro/1CTYw3mW2xy1
· #881
S.Mykhailiuk (Thursday, 26 May 2022 09:51)
To Sergey Kyznyak RT-211, Task1 has some surplus words ( repetition). Just good. Task2 is UNACCEPTED. Pls translate into Ukrainian.
· #880
Sasha Movsum-Zade RT-211 (Myhayliuk S.L.) (Thursday, 26 May 2022 09:49)
Today I have read the article titled "Finding superconductivity in nickelates".
This article describes what, according to Antia Botan, professor of physics at
Arizona State University, the study of superconductivity is rife with
disappointments, dead ends, and accidental discoveries. “As theorists, we
generally cannot predict the emergence of new superconductors,” she said.
However, in 2021, she experienced the climax of her early career. Working with
experimenter Julia Mundy at Harvard University, she discovered a new
superconducting material, five-layer nickelate. They reported their findings to
Nature Materials in September 2021.
https://phys.org/news/2022-05-superconductivity-nickelates.html
https://voca.ro/1iYD2WdMV4lY
with the aid of
The models of the links are assembled into a unit with the aid of cylindrical
and ball hinges.
https://voca.ro/1lTuDC7vH3od
Моделі ланок ланцюга збирають у блок за допомогою циліндричних та кульових
шарнірів.
when investigating
When investigating the trend at other sites in Europe the picture is more
complicated.
https://voca.ro/12JRE0EU317D
При вивченні тренду на інших європейських ділянках вимальовується складніша
картина
a sharp rise
Stainless steels undergo a sharp rise in pitting corrosion rate as the
potential, solution concentration, or temperature is changed only slightly.
https://voca.ro/1fLmpqE4LTnM
Швидкість точкової корозії нержавіючих сталей різко зростає, оскільки потенціал,
концентрація розчину або температура незначно змінюються.
· #879
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 26 May 2022 09:40)
1.
Today I have read the article 'New biobattery for hydrogen storage'.
We know, that right now, the fight against climate change is making the search
for carbon-neutral energy sources increasingly urgent. That's why, a team of
microbiologists from Goethe University Frankfurt has found an enzyme in bacteria
that live in the absence of air and bind hydrogen directly to CO2, producing
formic acid. Normally, however, this formic acid is just an intermediate product
of their metabolism and further digested into acetic acid and ethanol. But the
team led by Professor Volker Müller, head of the Department of Molecular
Microbiology and Bioenergetics, has adapted the bacteria in such a way that
makes it possible not only to stop this process at the formic acid stage but
also to reverse it.
I think this is a good research, as people continue to find more ways of
obstaining a good, reliable green energy.
2. https://techxplore.com/news/2022-05-biobattery-hydrogen-storage.html
3. https://voca.ro/1b0bqFiXqApq
4. 1) when investigating
There are different ways to control for a third factor when investigating a
relationship between two variables
2) with the aid of
With the aid of a computer, concordances of many kinds can be made with
comparatively little difficulty
3) a sharp rise
There has been a sharp rise in the number of people out of work.
5. https://voca.ro/1Q2jEiSpm0Qw
· #878
S.Mykhailiuk (Thursday, 26 May 2022 09:40)
To Yeulizaveta Barsukova (RT-211) Pls mind the narration style in your comment: you are not a researcher of the testing of micro and nanofibers'. Just 65 points .Task2 is 83 points. Pls translate the phrases themselves. Keep on working hard.
· #877
Mykola Zhmurak RZ-211(Lebedeva) (Thursday, 26 May 2022 09:38)
Today i have read article the titled "Crossing the line: How robots can rule the
roads". This article is about international experts which want to minimize road
safety risk. But they says that this is gonna be hard, because they need to
create collective ethical framework developed by government, citizens and other
stakeholders. The researchers say it will be critical that there is a
standardized framework to enable vehicles traveling from one jurisdiction into
the next. But if they will be able to do this, it's will be the new step in
automated systems.
Article - https://techxplore.com/news/2021-10-line-robots-roads.html
Vocaroo - https://voca.ro/11U8rnfUJzlY
Phrases :
1) a sharp rise
A sharp rise in climate migrants could strain relations between developed
countries and their neighbors.(Різке зростання кліматичних мігрантів може
погіршити відносини між розвиненими країнами та їхніми сусідами.)
2) with the aid of
With the aid of the bacteria Bacillus subtilis, the researchers were able to
show that the extent of methane formation directly relates to metabolic
activity.(За допомогою бактерії Bacillus subtilis дослідники змогли показати, що
ступінь утворення метану безпосередньо пов’язана з метаболічної активністю.)
3) when investigating
The police provided descriptions of the investigative steps that are usually
included when investigating a rape case.(Поліція надала опис слідчих дій, які
зазвичай включаються під час розслідування справи про зґвалтування.)
Vocaroo - https://voca.ro/1cZZM2cY2o9U
· #876
Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 26 May 2022 09:37)
Exam topic #7 (Turning the DTV signal)
Turning the DTV signal - DTV (digital television) means the transmission and
processing of a television signal in digital form. The television signal
includes both video and audio. A digital waveform is an encoding of information
in MPEG format when the entire signal is represented as a sequence of "0" and
"1". Such signal transmission is not observed due to interference, which usually
manifests itself when the signal is exposed to the environment in the form of
snow, dashes and other small interference. This is a modern type of signal that
is actively used everywhere at the moment. The connection speed is faster than
the analog signal, but inferior to the satellite signal. I believe this is an
alternative television signal.
Vocaroo: https://voca.ro/1gzIoV5Apz5o
· #875
Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 26 May 2022 09:37)
(Article)
Today I have read the article 'An aIgorithm trained to detect unhappiness on
social networks'.
Researchers from the University of Catalonia (UOC) has developed an algorithm
that aims to help psychologists diagnose possible mental health problems through
the content people post on social platforms such as Instagram, Facebook and
Twitter. Drawing on neural networks and databases, the experts trained an
algorithm to identify the content of the images and to categorize textual
content by assigning different labels proposed by psychologists, who compared
the results with a database containing over 30,000 images, captions and
comments.
A very interesting algorithm, in my opinion, which will automatically will give
the psychologists results they need, depending on our mood
(sentences)
1)"turns out that"
Turns out that there is still huge unlocked potential.
Оказывается, что до сих пор остаётся огромный неиспользованный потенциал.
2)"practical problems"
There are practical problems with the installation as well.
Существуют и практические проблемы с установкой.
3) "priority research areas"
As well as priority research areas for the next decade.
А также приоритетные направления исследований на ближайшее десятилетие.
Vocaroo(article): https://voca.ro/1o5XoBlXPZp2
Vocaroo(sentences): https://voca.ro/1gZttCaginJz
https://techxplore.com/news/2022-05-algorithm-unhappiness-social-networks.html
· #874
Vorobyova E. to Shlapak from РЗ-213 (Thursday, 26 May 2022 09:36)
Your commentary on the article is grammatically correct, but mind your mispronounced words in it: “chemical”, “era”, “since”, “microcosm”. Your task with Phrases is good. Continue working.
· #873
Lebedeva E (Thursday, 26 May 2022 09:35)
To Kapeliushnyi Vladyslav (RZ-211), Kuleshov Konstantin(RZ-211), Misha Donenko RZ-211, Ilinchuck Vladislav RZ-211 the comments are interesting and detailed, but next time choose topics that are more relevant to your specialty.
· #872
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 26 May 2022 09:34)
1.with the aid of -за допомогою;
The helicopters were observed with the aid of night vision devices.-За
гелікоптерами спостерігали за допомогою приладів нічного бачення.
2.when investigating -під час розслідування;
It is often difficult to determine the exact source of ignition when
investigating after an explosion.-Часто буває важко визначити точне джерело
займання при розслідуванні після вибуху;
3. a sharp rise - різкий підйом;
The sharp rise in domestic demand in the region was reflected in a rising volume
of goods and services imports.-Різке зростання внутрішнього попиту в регіоні
відбилося на зростанні обсягів імпорту товарів та послуг.
https://voca.ro/16amxFGA7PEe
Today I've read the article about the way cyber attacks could jeopardize global
food supplies. Danger is that technologies which are used in digital agriculture
are prone to cyber attacks. Actually the ag-tech sector doesn't take adequate
precautions like other corporate or defense sectors. Considering the fact that
labor-intensive food production jobs have been shifted into the digital domain ,
cybersecurity measures should be prioritized. Generally speaking the problem of
vulnerabilities of digital agriculture to cyber attacks should be solved in the
immediate future in order to avoid the food unfit .
https://voca.ro/1l8mvI1A7Fed
https://techxplore.com/news/2022-05-cyber-jeopardize-global-food.html
· #871
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Thursday, 26 May 2022 09:28)
The
article I have read today is "Lakes are changing worldwide". The author of the
article claims that the temperature of lakes around the world is rising, the ice
cover is getting shorter and thinner. He also claims that it affects the
ecosystems of lakes, drinking water and fishing. To prove this, the team
developed several computer simulations with lake models on a global scale. The
researchers found a clear similarity between the observed changes in the lakes
and the modeling of lake models. It can be concluded that human-induced climate
change has already affected even lakes.
https://phys.org/news/2021-10-lakes-worldwide.html
https://voca.ro/12msAk8gYiFe
1) With the aid of the bacteria Bacillus subtilis, the researchers were able to
show that the extent of methane formation directly relates to metabolic
activity.
За допомогою бактерії Bacillus subtilis дослідники змогли показати, що ступінь
утворення метану безпосередньо пов’язана з метаболічної активністю.
2) Looking at a system without having to destroy it is very useful when
investigating structures.
Дивитися на систему без необхідності руйнувати її дуже корисно під час
дослідження структур.
3) A sharp rise in climate migrants could strain relations between developed
countries.
Різке зростання кліматичних мігрантів може погіршити відносини між розвиненими
країнами.
https://voca.ro/13rcyhMmfLIo
· #870
Kuleshov Konstantin(RZ-211)(Lebedeva) (Thursday, 26 May 2022)
Today I have read the article "Companies dream of taxis flying over traffic
jams." As city traffic becomes more and more miserable, entrepreneurs are
looking to a future where commuters will use "air taxis" to navigate busy roads.
The rooftops of nearby garages or malls can serve as departure or arrival points
for electric vertical takeoff and landing (eVTOL) aircraft. Riders can drive the
rest of the journey at their own discretion, even synchronizing rides with
car-sharing services like Uber, which owns a stake in Santa Cruz-based
California-based Joby. Thousands of regional airports, used mainly for
recreation, could become part of the air networks.
Currently, it is necessary to look for an alternative to conventional transport.
In large cities, traffic jams have become part of the life they spend on their
way to work.
https://techxplore.com/news/2022-05-companies-envision-taxis-traffic.html
1.Reference chemicals do not need to be employed when investigating a test
substance.
2.This can be done very conveniently with the aid of viewports..with the aid of
3.We are witnessing a sharp rise in terrorist acts and violent insurgency in
Afghanistan..a sharp rise
https://voca.ro/1keZzleisPwm
· #869
Vlasov Vadim RZ-211 (Yershova) (Thursday, 26 May 2022 09:25)
Today I’ve read the article “Patent talk: IBM's traffic signal timing turns
cognitive”.
This article is about the introduction of new traffic lights to be operated by
the AI.
The purpose of this article is to tell about a new invention that will get rid
of perpetual traffic jams thanks to a new traffic light system.
The idea would be that a computer would analyze the real-time flow of traffic
and then figure out the best way to manage the barrage of vehicles that clog up
our highways every single day.
I think this article will be useful for artificial intelligence developers
https://techxplore.com/news/2018-05-patent-ibm-traffic-cognitive.html
https://voca.ro/1468RVeaR99v
with the aid of
With the aid of next-generation genome sequencing methods
a sharp rise
A sharp rise in climate migrants could strain relations between developed
countries
When investigating
This could prove useful when investigating delicate materials.
https://voca.ro/1ax7gGgCFfcl
· #868
Misha Donenko RZ-211 Lebedeva (Thursday, 26 May 2022 09:25)
Today I’ve read the article “Sex, drugs and TikTok: Keeping young people safe
needs a mature response, not a moral panic”. TikTok "serves up" sex and drug
videos to minors. Media reports have described the video-sharing platform, which
is designed predominantly for young people, as an "addiction machine" that
promotes harmful content. TikTok's algorithm actively "serves up" drug content
to minors, who "may lack the capability to stop watching and don't have
supportive adults around them" to help moderate their opinions. Parents have
been encouraged to stop their children using it, and the app has been urged to
censor drug content entirely. If we are serious about protecting young
people online, we need to be driven by evidence, not fear.
https://techxplore.com/news/2021-10-sex-drugs-tiktok-young-people.html
https://voca.ro/18BBYwQCCRwp
1.with the aid of
We cut through the glass with the aid of our sonic knife.
Ми розрізаємо скло за допомогою нашого звукового ножа.
2.a sharp rise
These three components have caused such a sharp rise.
Ці три складові викликали такий різкий підйом.
3.when investigating
We encourage that international tribunal to continue safeguarding the rights of
children when investigating war crimes and crimes against humanity.
Ми закликаємо цей міжнародний трибунал продовжувати захищати права дітей під час
розслідування військових злочинів і злочинів проти людства.
https://voca.ro/1iKJUdLICGl6
· #867
Shlapak Dmytro RZ-213 (Vorobyova) (Thursday, 26 May 2022 09:17)
1.
When investigating this virus, we identifying a virus inside it.
2. The crisis in the country a sharp rise due to the recent hacking of the TKN.
3. We have assembled this satellite with the aid of the latest technology.
Today I have read the article "Discovering the universal relationship between
physical properties and fractal dimensions". Another study in the piggy bank is
not the most useful. As far as I know, a person cannot yet fully contact
nanoparticles, only at the chemical level, but chemical atoms probably consist
of nanoparticles. Based on this, we can conclude that it is too early for us to
enter this area, although on the other hand. Since we have already mastered the
macrocosm and I think we have learned a little about the megacosm, it would not
be bad to fully master the microcosm that we have right under our noses.
https://phys.org/news/2022-02-universal-relationship-physical-properties-fractal.html
https://voca.ro/1f9QGynmFFdz
· #866
Vorobyova E. to Siglyanyk from РЗ-213 (Thursday, 26 May 2022 09:14)
Very good, you have coped with the tasks. Thank you and continue working like this.
· #865
Ilinchuck Vladislav RZ-211 (Lebedeva) (Thursday, 26 May 2022 09:14)
Today I have read the article "Tiny robotic crab is smallest-ever
remote-controlled walking robot".This article is about the new development of
the world's smallest remote-controlled walking robot, and it represents the
important role of the adorable pikito crab.Just a half-millimeter wide, the tiny
crabs can bend, twist, crawl, walk, turn and even jump. Although the research is
exploratory at this point, the researchers believe their technology might bring
the field closer to realizing micro-sized robots that can perform practical
tasks inside tightly confined spaces.its power lies within the elastic
resilience of its body. To construct the robot, the researchers used a
shape-memory alloy material that transforms to its "remembered" shape when
heated.
In my opinion this article is very interesting to read for everyone, especially
for people who love new technologies and care about future.
1)https://techxplore.com/news/2022-05-tiny-robotic-crab-smallest-ever-remote-controlled.html
2)https://voca.ro/13eH7hEhZsWe
when investigating
The Acts provide Police with powers of entry, search and seizure when
investigating suspected offences.
Закони надають поліції повноваження на проникнення, обшук та вилучення під час
розслідування підозрюваних правопорушень.
a sharp rise
These three components have caused such a sharp rise.
Ці три складові викликали такий різкий підйом.
with the aid of
We cut through the glass with the aid of our sonic knife.
Ми розрізаємо скло за допомогою нашого звукового ножа.
3)https://voca.ro/1f9iWnTQ6TIo
· #864
Lebedeva E (Thursday, 26 May 2022 09:12)
To Daniil Dragin (RZ-211) The comment is quite informative. well done, thank you.
· #863
Yeulizaveta Barsukova (RT-211) S.Mykhailiuk (Thursday, 26 May 2022 09:11)
Class-work
Today I've read the artcle 'New method for the mechanical tensile testing of
micro and nanofibers'. Recently, researchers have developed a method to test the
mechanical tension of micro and nanofibers. To do this, they used magnets.As a
result, it took less time to connect the fiber to the power sensor, allowing us
to quickly change material without changing the sensor. This method allows us to
test the fibers in conditions close to real.Also, the results have become more
accurate.I think that it's very important because we can make the device taking
into account all the shortcomings of the fiber.
Audio1:https://voca.ro/1iJ9pyJEVs7B
Article:https://phys.org/news/2022-05-method-mechanical-tensile-micro-nanofibers.html
Phrases
1)a sharp rise
Stainless steels undergo a sharp rise in pitting corrosion rate as the
potential, solution concentration, or temperature is changed only slightly.
Нержавіюча сталь зазнає різкого зростання швидкості точкової корозії, оскільки
потенціал, концентрація розчину або температура змінюються лише незначно.
2) with the aid of
The models of the links are assembled into a unit with the aid of cylindrical
and ball hinges.
Моделі ланок збираються в один блок за допомогою циліндричних і кулькових
петель.
3)when investigating
When investigating the trend at other sites in Europe the picture is more
complicated.
Якщо досліджувати тенденцію на інших сайтах Європи, картина виявляється
складнішою.
Audio2:https://voca.ro/1dZRoh4XLDFG
· #862
Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 26 May 2022 09:02)
Prhases of Day
1. with the aid of : https://voca.ro/1diE6dzXG883
Renewable fuel from carbon dioxide with the aid of solar energy
Відновлюване паливо з вуглекислого газу за допомогою сонячної енергії
2. when investigating : https://voca.ro/1lhxiD9dBd97
This swipe technique will do more than help police get faster answers when
investigating drug crimes
Ця техніка пальців допоможе поліції швидше отримувати відповіді під час
розслідування злочинів, пов’язаних із наркотиками
3. a sharp rise : https://voca.ro/192G2WvWbZNl
The UN has warned that inaction could lead to a sharp rise in the number of
people being pushed into slavery because of COVID-19
ООН попередила, що бездіяльність може призвести до різкого зростання кількості
людей, які потрапляють у рабство через COVID-19.
Article: https://phys.org/news/2016-07-apps-online-tools-racist.html
Audio: https://voca.ro/1kfhp1WacXcj
Today, i have had an opportunity to read the article about the impact of online
tools against racist attacks.
According to the article, it is very important nowadays to fight cyberracism,
and one of the most effective tools is the phone.
This opens up opportunities for an immediate response to various manifestations
of racism
Specially created applications for collecting data on cases of racism, which
helps to better see the situation in certain countries
I hope that the problem of racism will be solved, because more and more people
commit suicide without enduring such mental strain
· #861
Vorobyova E. to Mitriev from РЗ-213 (Thursday, 26 May 2022 08:53)
Your home work is well done. Only don’t forget about the articles “a/the” (AN interesting article, THE tests…) Good luck.
· #860
Daniil Dragin (RZ-211 Lebedeva E) (Thursday, 26 May 2022 08:50)
1)Today I have read the article ''Reducing water usage in concentrated solar
power plants with radiative cooling and cold storage''.This article is about a
new way to cool solar stations that convert solar energy into electrical energy
using steam engines or turbines. Such systems evaporate a lot of water. For
greater efficiency, these systems are installed in hot regions where there are
significant water problems. Scientists have developed a cooling method that
combines the best qualities of dry and wet cooling. Radiation cooling is a dry
cooling method that uses coolers made of a material that reflects sunlight well.
In my opinion, this system will have a positive impact on the environment,
because water is one of the most important resources, but also reduce the cost
of such energy, because the issue of logistics is being solved, because less
water is required.
2)https://techxplore.com/news/2022-05-usage-solar-power-radiative-cooling.html
3)https://voca.ro/1kCGrbClkcJg
4)
1)the same as
Since it's the industry standard, the sensor is the same as found on any ship or
lab working with CO2 measurements.
Оскільки це промисловий стандарт, датчик такий самий, як і на будь-якому кораблі
чи лабораторії, що працює з вимірюванням CO2.
2)to our knowledge
To our knowledge this is the largest successful computational screen to date.
Наскільки нам відомо, це найбільший успішний обчислювальний екран на
сьогоднішній день.
3)the bulk of
Fossil fuels supply the bulk of global energy requirements.
Викопне паливо забезпечує основну частину глобальних потреб в енергії.
5)https://voca.ro/1nwyMBNJHedJ
· #859
Lebedeva E (Thursday, 26 May 2022 08:46)
To РЗ-211 Good morning! The lesson will start soon and I am waiting for your comments and work with phrases.
· #858
Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (HomeWork) (Wednesday, 25 May 2022 16:17)
Link to article:
https://phys.org/news/2021-10-corrosion-materials-durability.html
Link to voice: https://voca.ro/1mrgeE4XRGxX
Today I've read interesting article about methods that would help engineers
delay structural failure.
In tests by removing atoms from the tip of the crack, modeling showed that
researchers could prevent
crack propagation by dramatically improving the mechanical properties of the
material. The article discusses the effects of the
environment on the material, including dissolution, oxide formation,
re-deposition of the material, and hydrogen embrittlement.
In my opinion, keeping structures safe means keeping the lives of the people who
work for them safe. And such research can solve a dangerous problem!
1) The first column represents the comparable tapes, the second and third
columns represent tapes' width and thickness correspondingly.
Перший стовпець представляє порівняні стрічки, другий і третій стовпці
представляють ширину та товщину стрічок відповідно.
2) If there were no tax advantages for issuing debt, and equity could be freely
issued, Miller and Modigliani showed that, under certain assumptions, the value
of a leveraged firm and the value of an unleveraged firm should be the same.
Якби не було податкових переваг для випуску боргових зобов’язань, а акціонерний
капітал міг би вільно випускатися, Міллер і Модільяні показали, що за певних
припущень вартість фірми з кредитним плечом і вартість фірми без кредитного
плеча повинні бути однаковими.
3) The surgery is performed with regards of individual approach to the patient.
Операція проводиться з урахуванням індивідуального підходу до пацієнта.
· #857
Neblienko V. / RZ-212 / Popovych (Wednesday, 25 May 2022 14:19)
(Отработка за 24.05.2022)
Today i ` ve read the article titled: "Scientists use quantum computers to
simulate quantum materials". This text talks about research in the field of
quantum computers, which have high hopes for those calculations that were
previously considered impossible. In a new study from the U.S. Department of
Energy's (DOE) Argonne National Laboratory and the University of Chicago,
researchers performed quantum simulations of spin defects, which are specific
impurities in materials that could offer a promising basis for new quantum
technologies. In my opinion, this study will be the greatest in the history of
mankind and will raise research to a new level.
Article:
https://phys.org/news/2022-05-scientists-quantum-simulate-materials.html
Vocaroo: https://voca.ro/1e8DM5WuGosP
Phrases:
Columns represent
Are columns that represent two particular solutions of the same homogeneous
system, explain why the sum c1 + c2 must also represent a solution of the
system.
Являются ли столбцы, которые представляют два частных решения одной и той же
однородной системы, объясните, почему сумма c1 + c2 также должна представлять
решение системы.
Performed with
Common Tasks Performed with Visual Basic Operators perform many common tasks
involving one or more expressions called operands.
Общие задачи, выполняемые с помощью операторов Visual Basic, выполняют множество
общих задач, связанных с одним или несколькими выражениями, называемыми
операндами.
under certain assumptions
National sample surveys are rarely large enough to produce small area data
directly but they do represent a valuable current source of information that can
be used, under certain assumptions, in combination with other sources to produce
small area data.
Национальные выборочные обследования редко бывают достаточно масштабными, чтобы
напрямую получать данные по малым районам, но они представляют собой ценный
текущий источник информации, который можно использовать при определенных
предположениях в сочетании с другими источниками для получения данных по малым
районам.
Vocaroo: https://voca.ro/1el7Cr4K4V5Y
· #856
Petrova E.I. (Wednesday, 25 May 2022 10:17)
Pour les étudiants qui apprennent le français.
Chers étudiants ! Travaillez régulièrement. J’attends vos devoirs. Laissez vos
commentaires et vos enregistrements ici. Allez-y! Bon travail.
· #855
S.Mykhailiuk (Tuesday, 24 May 2022 13:06)
To
students from subgroup RF-211
Yakubovska,Kulaksiz and Siropulo
I haven’t seen your tasks and activities on the website today.
To students from subgroup РЗ-212
Fudulaki, Khizhnjak, Khotinsky
Where are your tasks performed for today session.
To Kholodova , group monitor, pls do not forget to invite your students to work
on line at the designated time. You all have to work hard regularly.
· #854
Lebedeva E. (Tuesday, 24 May 2022 10:43)
To Ivan Zaritskiy RZ-211. The exam topic is written correctly. Thanks.
· #853
Lebedeva E. (Tuesday, 24 May 2022 10:20)
To Misha Donenko RZ-211,Mykola Zhmurak, Denis Zavadsky Thanks for the work. Well done.
· #852
Ivan Zaritskiy RZ-211 (Lebedeva) (Tuesday, 24 May 2022 10:20)
An
isolated virtual machine.
A VM is an isolated environment with access to a subset of physical resources of
the computer system. Each VM appears to be running on the bare hardware, giving
the appearance of multiple instances of the same computer, though all are
supported by a single physical system. The history of VMs can be traced back to
the early 1960s.2 In the early 1970s IBM released its widely used VM 370 system
followed in 1974 by the VMS (Multiple Virtual Storage) systems.
There are two types of VMs, process, and system
A process VM is a virtual platform created for an individual process and
destroyed once the process terminates. Virtually all operating systems provide a
process VM for each one of the applications running.
A system VM supports an OS together with many user processes. When the VM runs
under the control of a normal OS and provides a platform-independent host for a
single application we have an application VM, e.g., Java Virtual Machine (JVM).
https://voca.ro/1m6UtCRaHZ5s
the main objective
Recent reports by the Intergovernmental Panel on Climate Change conclude that
cutting fossil fuel emissions—the main objective of carbon dioxide.(Останні
звіти Міжурядової групи експертів зі зміни клімату роблять висновок, що
скорочення викидів викопного палива — головне джерело вуглекислого газу)
by means of
Movement of small water droplets controlled by means of a magnet.(Рухом дрібних
крапель води керують за допомогою магніту.)
published in
Related results were published in Earth System Science Data. (Відповідні
результати були опубліковані в Earth System Science Data.)
https://voca.ro/1bUcxfrPkp88
· #851
Misha Donenko RZ-211 Lebedeva (Tuesday, 24 May 2022 10:15)
Different approaches to secrecy and their defects.
To protect your organization from cyber attacks, there are several technologies
to combat it. The most famous of them: data loss prevention, intrusion detection
and prevention system, security incident and event management, firewall,
antivirus.Let's consider two of the techniques proposed above. Prevent data loss
(verification technology, data sent by the organization for the content of
confidential data) Intrusion Detection System (IDS) is a technology that
monitors all traffic coming into an organization to make sure it is not harmful.
Therefore, in order to protect the system from any of the security incidents,
the organization must use technology to protect its systems.
https://voca.ro/1oVndT6kkRrf
1.published in
This photo could be published in a fashion magazine.
Це фото можна було б опублікувати в модному журналі.
2. the main objective
The review had found that the main objective of offshoring was costsaving.
Огляд виявив, що головною метою офшорингу була економія витрат.
3. by means of
The information can be extracted by means of your suffering.
Інформацію можна витягти за допомогою ваших страждань.
https://voca.ro/11V5JUuOeWEl
· #850
Popovych E. (Tuesday, 24 May 2022 10:14)
To
Yeulizaveta Barsukova (RT-211)
I have read your tasks, they are quite correct and informative.
· #849
Popovych E. (Tuesday, 24 May 2022 10:13)
To
Artem Verhelis RT-211
Thank you for your active work, well done.
· #848
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 24 May 2022 10:08)
Class-work
Today I've read the article about two-dimensional holey graphyne. As we know,
graphite and diamond are made up of carbon atoms. Other substances have also
been discovered in the composition of which we will consider graphene. It's good
properties that can be used in semiconductors.Its main disadvantage is the
electronic structure with zero band gap, which limits the application. To solve
this problem, scientists make holes in the structure. The number and place of
their appearance cannot be controlled, but it gave good results. I think that
the study of such material can lead to a new generation of electronics.
Audio1:https://voca.ro/126Agja8rk7J
Article:https://phys.org/news/2022-05-synthesis-two-dimensional-holey-graphyne.html
Phrases
1) the main objective
Thus the main objective of the restructuring process - to avoid any deficit -
has been achieved.
Таким чином, головна мета процесу реструктуризації - уникнути будь-якого
дефіциту - була досягнута.
2) by means of
The question of remuneration of the participants, for example by means of
honoraria, was raised.
Порушувалося питання винагороди учасників, наприклад за рахунок гонорарів.
3) published in
This result is published in the Annals of Mathematics.
Цей результат опубліковано в Annals of Mathematics.
Audio2:https://voca.ro/1dvaTN5WgUuj
· #847
Artem Verhelis RT-211, Popovych E. (Tuesday, 24 May 2022 09:58)
Today I've read the article "Engineering team creates monitoring toolkit to
speed production of biologic drugs".
This article covered by American Chemical Society journal is about new tool,
made by two Rutgers University engineers. Their tool allows to enginers who
specialises in the process of making drugs to monitor the biologic drug quality
in near real-time during the biomanufacturing process. Monitoring and control of
biomanufacturing processes are critical to ensuring drug quality.
I'm sure that this tool will be very usefull, especially when it's some medical
pillows or other demanding drugs, so it will help deliver more quality products.
Audio: https://voca.ro/1cqFaNhP4B4g
Article:
https://phys.org/news/2022-05-team-toolkit-production-biologic-drugs.html
1) published in
A new study published in Science Advances has examined the complex regulating
networks that affect how the plant's defenses are strengthened by external
influences.
Нове дослідження, опубліковане в Science Advances вивчає складні регулюючі
мережі, які впливають на те, як зовнішній вплив зміцнює захист рослини.
2) by means of
Movement of small water droplets controlled by means of a magnet.
Рух дрібних крапель води керується за допомогою магніту.
3) the main objective
The main objective of this study was to identify the specific traits.
Головною метою цього дослідження було виявлення конкретних характеристик.
Audio: https://voca.ro/1dzhsNsKr1EI
· #846
Popovych E. (Tuesday, 24 May 2022 09:56)
To
Sasha Movsum-Zade RT-211
Your task is complete, informative and interesting. Well done.
· #845
Popovych E. (Tuesday, 24 May 2022 09:55)
To
Artem Verhelis RT-211
Exam topic #8 is well done.
· #844
Gvozd to Beskrovnyi Vladimir RZ-211 (Tuesday, 24 May 2022 09:54)
Your review is interesting to read, the exam topic is informative.
· #843
Popovych E. (Tuesday, 24 May 2022 09:53)
To
Sergey Kyznyak RT-211,
#834,834,836
Exam topic #7 (Turning the DTV signal) well done. Thank you, your comment, audio
are quite correct as well as sentences with Phrases .
#836 Be more attentive.
· #842
Mykola Zhmurak RZ-211(Lebedeva) (Tuesday, 24 May 2022 09:49)
Today I’ve read the article "New design kit opens door to next generation of
chips". This article is about a new computer chip design kit to facilitate the
development of new chips – and are making it freely available in order to
encourage growth and innovation in the field. This kit called "FreePDK3."
FreePDK3 was developed at NC State with financial and technical support from
Synopsys. Specifically, FreePDK3 is a set of libraries and scripts that were
developed to work with the Synopsys Fusion Design Platform and Synopsys Custom
Design Platform to help people design state-of-the-art chips needed to move the
field of chip design forward. This invention is really helpful for engineers on
advanced technologies and that will be beneficial to the industry.
Article - https://techxplore.com/news/2021-08-kit-door-chips.html
Vocaroo - https://voca.ro/19zm7w05nDIm
Phrases:
1) the main objective
These measures will protect civilians, which is the main objective of
anti-personnel land-mine controls.(Ці заходи забезпечать захист цивільного
населення, що є основною метою боротьби з протипіхотними наземними мінами.)
2) by means of
Movement of small water droplets controlled by means of a magnet.(Рухом дрібних
крапель води керують за допомогою магніту.)
3) published in
The groundbreaking discovery was published in the Journal of Veterinary
Diagnostic Investigation.(Новаторське відкриття було опубліковано в Journal of
Veterinary Diagnostic Investigation.)
Vocaroo - https://voca.ro/1jt4caiMNu3h
· #841
Popovych E. (Tuesday, 24 May 2022 09:48)
To
Timophey Sipin RZ-212
Thank you, you have successfully completed the task.
· #840
Sasha Movsum-Zade RT-211 (Popovych E.) (Tuesday, 24 May 2022 09:48)
Today I have read the article titled "Halting a wave in its tracks". This
article describes how topological ideas have recently taken center stage in
modern electromagnetism. Typical topological photonic systems are based on
non-reciprocal materials, a class of materials that allow for asymmetric
interactions between light and matter. The article also describes that, in
particular, non-reciprocal platforms can support unidirectional channels that
allow propagation in a given direction of space - say, from left to right, but
not vice versa. Such unidirectional guides are of key importance in optical
systems because their modular design allows one-way interaction requiring
optical isolation of the various modules.
https://voca.ro/1rEznS2iDj9a
https://phys.org/news/2022-05-halting-tracks.html
by means of
The question of remuneration of the participants, for example by means of
honoraria, was raised.
Було порушено й питання про винагороду учасників, наприклад, через виплату
гонорарів.
published in
This result is published in the Annals of Mathematics.
Ця пізніша робота була також опублікована в Annals of Mathematics.
the main objective
Thus the main objective of the restructuring process - to avoid any deficit -
has been achieved.
Таким чином, основна мета процесу структурної перебудови - уникнути будь-якого
дефіциту - досягнута.
https://voca.ro/14Iuy8pBRBmw
· #839
Beskrovnyi Vladimir RZ-211 (Gvozd O.V) (Tuesday, 24 May 2022)
1.
Today I have read the article ''I don't even remember what I read': People enter
a 'dissociative state' when using social media'.
A group of researchers from University of Washington wondered if people enter a
state of dissociation, when during the reading of a good book, they had a
feeling, as if they were transported into another world, when surfing social
media. The problem with social media platforms, the researchers said, is not
that people lack the self-control needed to not get sucked in, but instead that
the platforms themselves are not designed to maximize what people value.
In my opinion, in the times when social media becomes an inevitable part of
people to interact with somebody, this can be a serious problem, and I'm hoping,
that with the help of professional researches this problem will be solved very
quickly in the future.
2.
https://techxplore.com/news/2022-05-dont-people-dissociative-state-social.html
3. https://voca.ro/13xWZjJfw78B
4. 1) published in
The names are published in alphabetical order
2) the main objective
The main objective is to find a solution that is agreeable to the company in
terms of cost
3) by means of
The lake communicates with the sea by means of a canal.
5. https://voca.ro/1gXxr00DzNvg
Exam topic #1 "Concept of “Privacy”
Privacy is a state of affairs where information regarding individual’s life and
conditions that are private in nature is beyond the reach and knowledge of
others. In the current technological milieu where one can access the personal
details and information regarding individual’s diverse affairs, all what privacy
means is that people want to have a control over what information needs to be
there in the public domain. Privacy ordains that the individual is at liberty to
avoid unsanctioned intrusions in his life and personal affairs and pre-supposes
that the individual will have unqualified control over the information
pertaining to him. Privacy is an interest of the human personality. It protects
the inviolate personality, the individual’s independence, dignity and integrity.
· #838
Denis Zavadsky Lebedeva RZ-211 (Tuesday, 24 May 2022 09:40)
A
new method that could automatically detect and kill cyberattacks on our laptops,
computers and smart devices in under a second has been created by researchers at
Cardiff University. Using artificial intelligence in a completely novel way, the
method has been shown to successfully prevent up to 92 percent of files on a
computer from being corrupted, with it taking just 0.3 seconds on average for a
piece of malware to be wiped out.
I consider this an extremely worthwhile discovery, because the threat of cyber
attacks today has extremely high risks, and this is now one of the most pressing
problems.
https://techxplore.com/news/2022-05-method-cyberattacks.html
The review had found that the main objective of offshoring was cost-saving.
It is forced upon people by means of weapons and fleets of spaceships.
If adopted both documents will be published in 1996.
Огляд виявив, що головною метою офшорингу була економія витрат.
Його нав'язують людям за допомогою зброї та флотів космічних кораблів.
У разі прийняття обидва документи будуть опубліковані в 1996 році.
https://voca.ro/1bWiR0QUcRgL
· #837
Artem Verhelis RT-211, Popovych E. (Tuesday, 24 May 2022 09:39)
Exam topic #8
The major differences in a monochrome television and a color television
receiver.
Television broadcasting stations and networks in most parts of the world
upgraded from black-and-white to color transmission between the 1960s and the
1980s. The biggest difference is the number of electron guns in the picture
tube. An electron gun is an electrical component in some vacuum tubes that
produces a narrow, collimated electron beam that has a precise kinetic energy.
A monochrome tv has only one gun as it can only show black, white, or shades of
grey in between. Color TVs have 3 guns: red, green, and blue. Varying these
tubes give you the full spectrum of colors.
Audio: https://voca.ro/1fg1vzVPvQZQ
· #836
Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 24 May 2022 09:37)
I'm sorry, but I sent my Article and Exam Topic #6 to the wrong teacher last week. They have numbers of #583 and #584
· #835
Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 24 May 2022 09:36)
(Article)
Today I have read the article 'An aIgorithm trained to detect unhappiness on
social networks'.
Researchers from the University of Catalonia (UOC) has developed an algorithm
that aims to help psychologists diagnose possible mental health problems through
the content people post on social platforms such as Instagram, Facebook and
Twitter. Drawing on neural networks and databases, the experts trained an
algorithm to identify the content of the images and to categorize textual
content by assigning different labels proposed by psychologists, who compared
the results with a database containing over 30,000 images, captions and
comments.
A very interesting algorithm, in my opinion, which will automatically will give
the psychologists results they need, depending on our mood
(sentences)
1)"turns out that"
Turns out that there is still huge unlocked potential.
Оказывается, что до сих пор остаётся огромный неиспользованный потенциал.
2)"practical problems"
There are practical problems with the installation as well.
Существуют и практические проблемы с установкой.
3) "priority research areas"
As well as priority research areas for the next decade.
А также приоритетные направления исследований на ближайшее десятилетие.
Vocaroo(article): https://voca.ro/1o5XoBlXPZp2
Vocaroo(sentences): https://voca.ro/1gZttCaginJz
https://techxplore.com/news/2022-05-algorithm-unhappiness-social-networks.html
· #834
Sergey Kyznyak RT-211, (Popovych E.) (Tuesday, 24 May 2022 09:35)
Exam topic #7 (Turning the DTV signal)
Turning the DTV signal - DTV (digital television) means the transmission and
processing of a television signal in digital form. The television signal
includes both video and audio. A digital waveform is an encoding of information
in MPEG format when the entire signal is represented as a sequence of "0" and
"1". Such signal transmission is not observed due to interference, which usually
manifests itself when the signal is exposed to the environment in the form of
snow, dashes and other small interference. This is a modern type of signal that
is actively used everywhere at the moment. The connection speed is faster than
the analog signal, but inferior to the satellite signal. I believe this is an
alternative television signal.
Vocaroo: https://voca.ro/1gzIoV5Apz5o
· #833
Ram Nassur Rz 212 Lebedeva E.V (Tuesday, 24 May 2022 09:35)
Carbon nanohorns are carbon with promising properties for various applications.
Despite their promise, the underlying carrier type is poorly understood and so
far only indirect measurements have been used to get results.
Here, we directly determine the type of majority carriers using thermoEMF
measurements. Using this direct method, we show that the films show a positive
coefficient, indicating that the films behave like p-type semiconductors. This
study is confirmed by adjusting the electron density in the film layers.
These results show the basis for both measuring and chemically tuning the main
carrier type in this new nanocarbon semiconductor.
https://phys.org/news/2022-05-elucidating-electronic-properties-single-wall-carbon.html
https://voca.ro/1hSlET3aWqWB
published in
Related results were published in Earth System Science Data.
by means of
The molecular deflection of light radiation by means of diamantane
https://voca.ro/1lBOlD7khmAR
· #832
Ilinchuck Vladislav RZ-211 (Lebedeva) (Tuesday, 24 May 2022 09:29)
#13
Authentication mechanisms
Authentication is the process of ensuring that an individual is the person that
they claim to be. This involves matching a person’s claimed identity—asserted
through a credential (e.g., an ID card or unique ID number)—against one or more
authentication factors that are bound to that credential. Potential
authenticators include:
Possession factors: Something that a person demonstrates that they have, such as
a physical or virtual card or certificate, or a hardware token.
Knowledge factors: Something that a person already knows (e.g., a challenge
question or image) or memorizes (e.g., a password or PIN)
Inherent factors: Some physical attribute that a person can demonstrate that
they have (e.g., a fingerprint or iris scan).
Secure authentication (i.e., for higher levels of assurance) requires a
multi-factor approach. In general, the combination of authentication factors
should include some or all of the three above categories. In addition,
sub-factors—such as location (where are you?) and time (when are you trying to
authenticate?)—can be used in combination with the other core factors to create
further conditionality when authenticating.
1)https://voca.ro/1k3UHl15vaZ0
published in
This photo could be published in a fashion magazine.
Це фото можна було б опублікувати в модному журналі.
the main objective
The review had found that the main objective of offshoring was cost-saving.
Огляд виявив, що головною метою офшорингу була економія витрат.
by means of
The information can be extracted by means of your suffering.
Інформацію можна витягти за допомогою ваших страждань.
2)https://voca.ro/1bqGoeOGN9Jg
· #831
Kuleshov Konstantin(RZ-211)(Lebedeva) (Tuesday, 24 May 2022 09:20)
Topic 8 Passwords and their drawback
Now everyone knows what a password and login are, but not everyone knows how to
safely store an use them.Using one password for all sites is extremely
dangerous. Having hacked one user's page, hackers have easy access to all the
others: financial services, cloud services, e-mail and other user applications.
Therefore, unique passwords are created for each resource.In order not to worry,
you can use password managers - these are specialized services for secure
storage of all codes. They securely encrypt data: passwords, logins, information
about the service where you want to enter passwords and logins.
1)It is forced upon people by means of weapons and fleets of
spaceships.Подчинение народа посредством оружия и космического флота.
2)The review had found that the main objective of offshoring was
cost-saving.Результаты обзора свидетельствуют о том, что основной целью перевода
на периферию является сокращение затрат
3)The review had found that the main objective of offshoring was
cost-saving.Результаты обзора свидетельствуют о том, что основной целью перевода
на периферию является сокращение затрат.
https://voca.ro/1fxspJXhOvfR
· #830
Gvozd to RZ-211 (Tuesday, 24 May 2022 09:18)
Vlasov Vadim RZ-211
Vasilev A.O RZ-211
Thank you for your active work, everything is well done.
· #829
Dovzhenko Ilya RZ-211 (Lebedeva) (Tuesday, 24 May 2022 09:18)
Information in our time is more expensive than any resources, since it can lead
to them, which is why there is a huge demand for information on any occasion.
Where there is demand, there are thieves, and therefore information must be
protected. You can protect it with a fairly large variation of methods, the main
one being encryption. It also has a lot of possibilities of application and
reproduction methods, because it was created back in very ancient times, for
example, the texts of the authors were written looking in the mirror, and
perhaps on an inverted notebook, so that it was impossible to just take and read
the contents. Now there are more modern ways to classify information in this
way.
https://voca.ro/15WsB6j9HtH2
1)the main objective
Often, the main objective of any website is quality service to their customers.
Найчастіше, головним завданням будь-якого сайту є якісне сервісне обслуговування
своїх клієнтів.
2)by means of
The adults' bite is corrected by means of non-removable braces system.
За допомогою незнімних брекет-систем виправляють прикус у дорослих.
3)published in
The discovery was published in Astronomy&Astrophysics in September 2018.
Відкриття було опубліковано в журналі астрономії та астрофізиці у вересні 2018
року.
https://voca.ro/1845w9ftBqJM
· #828
Kovalzhi Andrey RZ-211(lebedeva E.) (Tuesday, 24 May 2022 09:17)
Exam topic #9 (Functions of firewalls)
The first-generation firewall works as a packet filter, comparing basic
information, such as the original source, packet destination, port, or protocol
used to a specific set of rules.
The second generation of the firewall contains another parameter for filter
settings - connection status. Based on this information, the technology can
track connection start and current connection data.
Third-generation firewalls are built to filter information using all levels of
the OSI model including the application level. They recognize programs and some
common protocols such as FTP and HTTP.
Based on this information, the firewall can detect attacks trying to bypass
through the allowed port or unauthorized use of the protocol.
https://voca.ro/153UihXc6GCw
1. by means of
Informing is carried out by means of telephone and/or e-mail.
Информация доставляется по телефону и/или электронной почте.
2. published in
The results of this research were published in 1985.
Результаты этого исследования были опубликованы в 1985.
3. main objective
The main objective of the research was to determine whether or not graphit rods
are suitable as a moderator of nuclear reactions.
Основная цель исследования состояла в том, чтобы определить, подходят ли
графитовые стержни в качестве замедлителя ядерных реакций.
https://voca.ro/14PcBrDJ0Bjd
· #827
Timophey Sipin RZ-212(Popovych) (Tuesday, 24 May 2022 09:12)
Today I have read the article and the title of it,is «Climate change is
accelerating, according to comprehensive study»
This article talking us about the rapid climate change in our world. In my
opinion, this problem is very relevant today, because we need to take care of
the world in which we live.
Based on the article, we can understand that humanity can affect on the climate
in the better side.
For example, due to reduced emissions from factories, increasing the numbers of
electric machines, in a one word, concern for the ecology and control of
emissions into the atmosphere.
https://phys.org/news/2021-08-climate-comprehensive.htm
https://voca.ro/11d8LAglK7Bg
the main objective
The main objective of this study was to identify the specific traits that allow
empathizing
Основною метою цього дослідження було виявлення специфічних рис, які дозволяють
співпереживати
by means of
Movement of small water droplets controlled by means of a magnet
Рухом дрібних крапель води керують за допомогою магніту
published in
The results were recently published in the Biophysical Journal
Результати нещодавно були опубліковані в Biophysical Journal.
https://voca.ro/16PXRdYejd
· #826
Vlasov Vadim RZ-211 (Gvozd O.V) (Tuesday, 24 May 2022 09:10)
Exam topic #9 (Functions of firewalls.)
First, let's define what a firewall is. A firewall is a network security device
that monitors incoming and outgoing network traffic and permits or blocks data
packets based on a set of security rules.
A firewall doesn't have many features, and to be precise it's main purpose is to
allow non-threatening traffic in and to keep dangerous traffic out.
Firewalls, and especially Next Generation Firewalls, focus on blocking malware
and application-layer attacks, along with an integrated intrusion prevention
system (IPS), these Next Generation Firewalls can react quickly and seamlessly
to detect and react to outside attacks across the whole network.
https://voca.ro/18pySGCK43Bm
Today I’ve read the article “Patent talk: IBM's traffic signal timing turns
cognitive”.
This article is about the introduction of new traffic lights to be operated by
the AI.
The purpose of this article is to tell about a new invention that will get rid
of perpetual traffic jams thanks to a new traffic light system.
The idea would be that a computer would analyze the real-time flow of traffic
and then figure out the best way to manage the barrage of vehicles that clog up
our highways every single day.
I think this article will be useful for artificial intelligence developers
https://techxplore.com/news/2018-05-patent-ibm-traffic-cognitive.html
https://voca.ro/1468RVeaR99v
the main objective
The main objective of this study was to identify the specific traits that allow
empathizing
Основною метою цього дослідження було виявлення специфічних рис, які дозволяють
співпереживати
by means of
Movement of small water droplets controlled by means of a magnet
Рухом дрібних крапель води керують за допомогою магніту
published in
The results were recently published in the Biophysical Journal
Результати нещодавно були опубліковані в Biophysical Journal.
https://voca.ro/16PXRQHAMXTG
· #825
Vasilev A.O RZ-211 Gvozd O.V. (Tuesday, 24 May 2022 09:08)
Today I've read an article called"Apple updates App Store payment rules in
concession to developers".
The article tells about conviction Epic and Apple.
Apple will be able to ask users for basic information, such as names and e-mail
addresses, "as long as this request remains optional", said the iPhone maker.
But the concession is unlikely to satisfy firms like "Fortnite" developer Epic
Games, with which the tech giant has been grappling in a drawn-out dispute over
its payments policy.
Epic launched a case aiming to break Apple's grip on the App Store, accusing the
iPhone maker of operating a monopoly in its shop for digital goods or services
but they couldn't do it.
in my opinion, this dispute did not affect the user in any way
https://voca.ro/1kRZuNnieLbt
https://techxplore.com/news/2021-10-apple-app-payment-concession.html
Exam topic #6 ( Different protection mechanisms)
In psychoanalytic theory, a defence mechanism , is an unconscious psychological
operation that functions to protect a person from anxiety-producing thoughts and
feelings related to internal conflicts and outer stressors.
Defence mechanisms may result in healthy or unhealthy consequences depending on
the circumstances and frequency with which the mechanism is used. Defence
mechanisms are psychological strategies brought into play by the unconscious
mind to manipulate, deny, or distort reality in order to defend against feelings
of anxiety and unacceptable impulses . These processes that manipulate, deny, or
distort reality may include the following: repression, or the burying of a
painful feeling or thought from one's awareness even though it may resurface in
a symbolic form; identification, incorporating an object or thought into
oneself; and rationalization, the justification of one's behaviour and
motivations by substituting "good" acceptable reasons for the actual
motivations.
https://voca.ro/15eL394ZEb8Y
1)published in
this is published in 2020
https://voca.ro/1nLOXx9EJYOt
2) the main objective
This is the main objective of our Meeting
https://voca.ro/1ngQsS6Mi8Jl
3) by means of
The information can be extracted by means of your diligence
https://voca.ro/1aWojLR0M074
· #824
Popovych E. (Tuesday, 24 May 2022 09:07)
To
El-kadi RT-211
Read my remarks attentively, pls.. You are making the same mistakes.I hope I'll
hear your voice record one day.
· #823
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Tuesday, 24 May 2022 09:06)
Exam topic #9
In network security, a firewall is a system based on software or hardware, which
is a kind of intermediary between secure and untested networks, as well as their
parts. The main function of a firewall is to filter out harmful and potentially
dangerous content and connections. In computer networks, a firewall detects and
blocks network traffic based on predefined or dynamic rules. They protect
networks and devices from the intrusion of potentially dangerous cybercriminals
who can infect devices and use them for malicious purposes. Modern firewalls
often have built-in additional security systems.
https://voca.ro/13NHkIRxt0Mu
1) Related results were published in Earth System Science Data.
Відповідні результати були опубліковані в Earth System Science Data.
2) The medicane evolution was clearly captured by the model, by means of
increased sea level.
Модель чітко відобразила еволюцію медицини за допомогою підвищення рівня моря.
3) The main objective of the Paris Agreement, a global framework to tackle
climate change.
Головна мета Паризької угоди — глобальна рамка для боротьби зі зміною клімату.
https://voca.ro/1lRxh4gBQhmk
· #822
Popovych E. (Tuesday, 24 May 2022 09:05)
To
Mashovets Andrey (RZ 212)
Thanks for your comment, it's reasonable
· #821
Popovych E. (Tuesday, 24 May 2022 09:04)
To
Pushkash Maxim (RZ-212 )
#802, 809
Exam topic#8 (principles of information protection) is well done. Your comment
is thoughtful and well done, thank you.
· #820
Popovych E. (Tuesday, 24 May 2022 09:01)
To
Nikitina Anastasia RZ-212
#796,799
Your task is complete, informative and interesting. The task Phrases of the day
and your exam topic #17 (Password as a general technique of secrecy) were
performed correctly.
· #819
Popovych E. (Tuesday, 24 May 2022 08:59)
To
Kravchenko Kostiantyn (RZ-212)
Your task is complete, informative and interesting. The task Phrases of the day
was performed correctly.
· #818
Popovych E. (Tuesday, 24 May 2022 08:57)
To
Povoznikov Artem RZ-212
Your comment is thoughtful and well done, thank you.
· #817
El-kadi RT-211 (Popovych) (Tuesday, 24 May 2022 08:56)
I
read an article about the history of computer viruses. And the most large-scale
threat is the computer virus "Melissa". Within a few hours, the threat infected
tens of thousands of computers around the world, including the devices of state
institutions. This threat spread through an email with an attached Word
document, after which the infected email was automatically sent to another 50
addresses of the victim. This "Melisa" malware caused $80 million in damage.
The action from the poles of the body is by means of the nerves. Дія з полюсів
тіла відбувається за допомогою нервів.
Privacy has always been the main objective of the European Union. Приватність
завжди була основним завданням Євросоюзу.
Abstracts selected will be published in collection of articles of conference.
Тези доповідей, що пройшли конкурсний відбір, будуть опубліковані в Збірці праць
конференції.
· #816
Daniil Dragin (RZ-211 Lebedeva E.) (Tuesday, 24 May 2022 08:52)
The
main protective mechanisms - activities aimed at ensuring engineering measures
of confidentiality, integrity and availability of information. Protective
mechanisms are divided into:
Physical - various engineering tools and structures that complicate or eliminate
the physical intrusion of offenders into objects of protection and into material
carriers of confidential information;
Hardware - mechanical, electrical, electronic and other devices designed to
protect information from leakage, disclosure, modification, destruction, as well
as counteraction to technical intelligence;
Software - special programs for computers that implement the functions of
protecting information from unauthorized access, copying, modification,
destruction and blocking;
Cryptographic - technical and software means of data encryption based on the use
of various mathematical and algorithmic methods;
Combined - the combined implementation of hardware and software and
cryptographic methods of information security.
https://voca.ro/1b4hftxozNcH
1)by means of
Movement of small water droplets controlled by means of a magnet
Рухом дрібних крапель води керують за допомогою магніту
2)the main objective
The review had found that the main objective of offshoring was cost-saving.
Огляд виявив, що головною метою офшорингу була економія витрат.
3)published in
Millions of research papers are published in a year.
За рік публікуються мільйони наукових робіт.
https://voca.ro/1kmGRnR86ETs
· #815
Gvozd O.V. to RZ-211 (Tuesday, 24 May 2022 08:47)
Good day!
The lesson will start soon, so I am waiting for your comments, sentences with
Phrases and audio recordings. Don't forget to write your Independent practice
and add the exam topic. Please, do it in one comment.
· #814
Lebedeva E. (Tuesday, 24 May 2022 08:47)
To РЗ-211 Good morning! The lesson will start soon, so I am waiting for your exam topics and work with phrases of the day. Good luck.
· #813
Lebedeva E. (Tuesday, 24 May 2022 08:45)
To Pontus Nataliia(RF-211) Thanks for your comment. It's very informative and interesting to read.
· #812
Pontus Nataliia(RF-211)(Lebedeva E.V.) (Tuesday, 24 May 2022 08:44)
Today I have read the article “A new machine-learning system helps robots
understand and perform certain social interactions”. Robots can deliver food on
a college campus and hit a hole in one on the golf course, but even the most
sophisticated robot can't perform basic social interactions that are critical to
everyday human life.That's why to study social interactions, the researchers
created a simulated environment where robots pursue physical and social goals as
they move around a two-dimensional grid.The researchers also showed that their
model creates realistic and predictable social interactions. Enabling robots to
exhibit social skills could lead to more positive human-robot interactions.
Robots will live in our world soon enough and they really need to learn how to
communicate with us on human terms.
Audio: https://voca.ro/1mK6mQX8SPvT
Article:https://techxplore.com/news/2021-11-machine-learning-robots-social-interactions.html
Phrases of the Day:
1)by means of
Informing is carried out by means of telephone and/or e-mail.
Інформування здійснюється за допомогою засобів телефонного зв'язку та/або
електронної пошти.
2) published in
Research results published in international dental journals can be found on
Medline.
Результати досліджень, опубліковані в міжнародних стоматологічних журналах,
можна знайти по «Medline».
3) the main objective
Privacy has always been the main objective of the European Union.
Приватність завжди була основним завданням Євросоюзу.
Audio: https://voca.ro/1e1ow3aXp2a9
· #811
S.Mykhailiuk (Tuesday, 24 May 2022 08:41)
To Chmel Maksim RF-211 Task1 is Good. Task2 is UNACCEPTED .Pls translate the sentences with the phrases into Ukrainian.
· #810
Lebedeva E. (Tuesday, 24 May 2022 08:40)
To Gromovaya Vlada (RF-211) , Bilokamenskyi Anton (RF-211), Alexander Shibaev (RF-211), Shulyak Makar (RF-211) Mashegirov Eugene (RF-211) Thank you for the participation in discussion on the articles. Your comments are quite good.
· #809
Pushkash Maxim (RZ-212 Popovich) (Tuesday, 24 May 2022 08:35)
Single-walled carbon nanohorns are an allotrope of carbon with promising
properties for a variety of applications. Despite their promise, the majority
carrier type (i.e., electrons or holes) that defines the electronic properties
of this novel semiconductor is poorly understood and so far only indirect
measurements have been employed to arrive at contradictory results.
Here, we directly determine the majority carrier type in single-wall carbon
nanohorns for the first time by means of thermopower measurements. Using this
direct method, we show that SWCNH films exhibit a positive Seebeck coefficient
indicating that SWCNHs behave as p-type semiconductors. This result is further
corroborated by intentionally tuning the hole or electron concentrations of
SWCNH layers via redox doping with molecular electron acceptors and donors,
respectively.
These results provide a framework for both measuring and chemically tuning the
majority carrier type in this emerging nanocarbon semiconductor.
Voice: https://voca.ro/1cV8HEknjILH
1. published in
This study was recently published in the Agronomy Journal
2. by means of
Movement of small water droplets controlled by means of a magnet.
3.the main objective
Thus the main objective of the restructuring process - to avoid any deficit -
has been achieved.
Voice: https://voca.ro/18TsPJRo4bmv
· #808
Chmel Maksim RF-211 (S.Mykhailiuk) (Tuesday, 24 May 2022 08:35)
It’s generally accepted that Ada Lovelace’s “Algorithm for the Analytical
Engine” is the first computer language ever created. Its purpose was to help
Charles Babbage with Bernoulli number computations and Ada designed it. Lovelace
describes her machine as different from previous calculating machines because of
its ability to be programmed to solve problems of any complexity. Her
contributions to the computer programming world are important because it showed
the capabilites of computed devices almost 100 years before the thought of a
modern programming computer was realized.
https://voca.ro/1eYk4eaFGoAc
1)Scientists recently conducted a study. This result is published in Annals of
Mathematics.
Ученые недавно провели исследование. Этот результат опубликован в Annals of
Mathematics.
2)The trials were successful and the issue of remuneration of the participants,
for example in the form of fees, was raised.
Испытания прошли успешно, и был поднят вопрос о вознаграждении участников,
например, в виде гонорара.
3)State production of all goods in the required volume. Thus, the main goal of
the restructuring process - to avoid any deficit - has been achieved.
Государственное производство всех товаров в необходимом объеме. Таким образом,
основная цель процесса реструктуризации - избежать любого дефицита - достигнута.
https://voca.ro/1mJWBxCl7Oxm
· #807
S.Mykhailiuk (Tuesday, 24 May 2022 08:34)
To Kate Kholodova (RZ-212, Pls read the task of the session in the Guestbook set by me. Just good for both tasks. Now pls prepare the exam topic and post it into the Guestbook.
· #806
Gromovaya Vlada (RF-211) (Lebedeva E.V.) (Tuesday, 24 May 2022 08:27)
Today I have read an article titled: “Movement of small water droplets
controlled by means of a magnet” by University of the Basque Country. This
article is about how droplet manipulation is of great interest in several areas,
including technological applications and fundamental research on dynamical
systems. The Lab-on-a-chip community is particularly interested in the precise
manipulation of small volumes of fluids, microfluidics of droplets.
The study, showed that a superparamagnetic ring spontaneously forms around a
water droplet when an oil-based ferrofluid is in contact with the droplet under
the influence of a magnetic field, and changes according to the strength of the
applied magnetic field.
Under the influence of the magnetic field, water droplets can be enclosed in the
ferrofluid and move remotely, moving the magnet, due to the magnetic properties
of the ferrofluid.
I find this research quite useful, as this finding makes reliable, controlled,
and programmable manipulation of confined water droplets possible.
Audio: https://voca.ro/1vM2zrxPf6vt
Phrases of the day:
1) The results were recently published in the Biophysical Journal.
Результати нещодавно були опубліковані в Biophysical Journal.
2) Biden’s main objective in Japan is to check China at every step.
Основна мета Байдена в Японії – перевіряти Китай на кожному кроці.
3) Here, we directly determine the majority carrier type in single-wall carbon
nanohorns for the first time by means of thermopower measurements.
Тут ми вперше безпосередньо визначили тип мажоритарних носіїв у одностінних
вуглецевих наноріжках за допомогою термоенергетичних вимірів.
Audio: https://voca.ro/1l3rTtPrzLgx
· #805
Mashovets Andrey (RZ 212, Popovich) (Tuesday, 24 May 2022 08:25)
Today I’ve read the article “Movement of small water droplets controlled by
means of a magnet”.
This article is about the ability to manipulate drops, which is of great
interest in many fields, including technology applications and basic research in
dynamic systems.
The purpose of this article is to tell about a study in which scientists try to
control a drop of water with the help of a magnet.
under a magnetic field the water droplets can be encapsulated in the ferrofluid,
and be moved remotely by moving a magnet, thanks to the magnetic properties of
the ferrofluid.
I think this article will be useful for people interested in molecular physics.
https://voca.ro/1bPsOOjruKaP
https://phys.org/news/2021-08-movement-small-droplets-magnet.html
1.the main objective
The main objective of the Paris Agreement, a global framework to tackle climate
change, is to hold the global average temperature increase to well below 2°C
above pre-industrial levels and endeavor to limit the temperature increase to
1.5°C.
2.published in
The groundbreaking discovery was published in the Journal of Veterinary
Diagnostic Investigation.
3.by means of
Movement of small water droplets controlled by means of a magnet
https://voca.ro/13OkkuvBGjyF
· #804
Bilokamenskyi Anton (RF-211) (Lebedeva E.V.) (Tuesday, 24 May 2022 08:24)
Today i have read article, called "It's official: Science says grannies are good
for you" by CC0 Public Domain. It talks about researchers at Emory University.
Using functional magnetic resonance imaging they scanned brain of grandmothers,
while showing them their grandchildren`s photo. "When they see the photo, they
feels the same emotion as a grandchildren, for example, if kid expressing the
joy, they are feeling it as well, because of the brain that are involved with
emotional empathy," - said James Rilling, the neuroscientist who led the study.
In contrast, when they saw photo of their adult child, there was a stronger
activation of brain regions linked to cognitive empathy—trying to understand
what a person is thinking or feeling and why, without as much emotional
engagement. Many grandmothers felt they could be more present now that they were
free of the time and financial pressure they experienced when raising their own
child. I found this article really important, because it shows everyone that our
grandparents are also a huge part of our live, even because they are emotionnaly
connected to us.
Article: https://phys.org/news/2021-11-science-grannies-good.html
Audio: https://voca.ro/14JrfYGsPxKl
Phrases of the day:
1. The information can be extracted by means of your suffering.
Інформацію можна витягти за допомогою ваших страждань.
2. Information about the approval was published in the Official Journal on 3 May
2006.
Інформація про схвалення була опублікована в Офіційному журналі 3 травня 2006
року.
3. The review had found that the main objective of offshoring was cost-saving.
Огляд виявив, що головною метою офшорингу була економія витрат.
· #803
Alexander Shibaev (RF-211, Lebedeva E.V.) (Tuesday, 24 May 2022 08:23)
Today I've read an article "Engineers evaluate the factors affecting battery
performance at low temperatures" published by Tsinghua University Press.
The main face of this paper is professor Yi-Chun Lu from the China University of
Hong Kong.
This article tells us about battery function under cold conditions that is an
ongoing challenge, motivating researchers to improve low temperature performance
of batteries. Energy storage with rechargeable battery technologies powers our
digital lifestyles and supports renewable energy integration into the power
grid. The main challenges for low temperature aqueous batteries are that the
electrolytes freeze, the ions diffuse slowly, and the redox kinetics are
consequently sluggish. These parameters are closely related to the
physicochemical properties of the low temperature aqueous electrolytes used in
batteries. To improve battery performance under cold conditions, therefore,
requires understanding how the electrolytes respond to cold. Study author Lu
predicted that "ideal antifreezing aqueous electrolytes should not only exhibit
low freezing temperature Tm but also possess strong supercooling ability," i.e.
the liquid electrolyte medium should remain liquid even below freezing
temperature.
So, in the future, the authors hope to further study the physicochemical
properties of electrolytes that contribute to improved aqueous battery
performance at low temperatures. This will not only increase their energy
efficiency, but also increase their capacity.
Article:
https://phys.org/news/2022-05-factors-affecting-battery-temperatures.html
PHRASES OF THE DAY
1. The research was published in the journal. - Дослідження опубліковано в
журналі.
2. The properties of the product can be controlled very precisely by means of
the recipe. - Властивості продукту можна дуже точно контролювати за допомогою
рецептури.
3. The main objective was to bring prices down. - Головною метою було знизити
ціни.
· #802
Pushkash Maxim (RZ-212 Popovich) (Tuesday, 24 May 2022 08:21)
Exam topic#8 (principles of information protection)
Some of the key security controls that you can use to maintain confidentiality
are: Encrypting information ensures that even if an unauthorized user is able to
get access to the information, without the decryption key the information will
be in an unreadable format. By having strong passwords it reduces the chances of
someone being able to access accounts or resources by guessing the password. Two
factor authentication supplements traditional login information by requiring an
additional code. Identity and Access Management, Proper Technical Controls and
Physical Locks and Doors.
Voice: https://voca.ro/18SybeawCUFl
· #801
Shulyak Makar (RF-211)(Lebedeva E.V.) (Tuesday, 24 May 2022 08:19)
Today I have read the article:"Shining new light on cell membranes with improved
imaging". It was so interesting.
Research from the lab of Matthew Lew at Washington University in St. Louis
offers entirely new ways to see the very small.
They have developed novel hardware and algorithms that allow them to visualize
the building blocks of the biological world beyond three dimensions in a way
that, until now, wasn't feasible. After all, cells are 3D objects and full of
"stuff"—molecules—that moves around, rotates, spins and tumbles to drive life
itself.
Wu's research also provides a new way to image cell membranes and, in a way, to
see inside of them. Using fluorescent tracer molecules, she maps how the tracers
interact with fat and cholesterol molecules in the membrane, determining how the
lipids are arranged and organized
The researchers developed computational imaging technology, which synergizes
software and hardware together, to successfully see the previously unseeable.
Audio:https://voca.ro/137CFqWiINkI
-----------------------------------------------------------------
1)published in - опубліковано в
The research was published in the journal
Дослідження опубліковано в журналі
2) by means of- за допомогою
The properties of the product can be controlled very precisely by means of the
recipe.
Властивості продукту можна дуже точно контролювати за допомогою рецептури.
3) the main objective- головна мета.
The main objective was to bring prices down.
Головною метою було знизити ціни.
Audio: https://voca.ro/1hLNfRWcBJjh
· #800
Mashegirov Eugene (RF-211) (Lebedeva E.V.) (Tuesday, 24 May 2022 08:18)
Article: https://phys.org/news/2021-08-movement-small-droplets-magnet.html
Audio(text + phrases): https://voca.ro/18d8YDMZZIUz
Today i have read an article titled "Movement of small water droplets controlled
by means of a magnet".
The text says that droplet manipulation is kindling great interest in several
fields, including technological applications and basic studies in dynamic
systems. A piece of research conducted by the UPV/EHU's Microfluidics Cluster
has found that a superparamagnetic ring forms spontaneously around a water
droplet when an oil-based ferrofluid is in contact with the droplet under the
influence of a magnetic field and varies according to the strength of the
magnetic field applied. The ring consists of an oil-based ferrofluid, a stable
suspension of ferromagnetic particles in an oil phase. It appears spontaneously
due to the oil-water interfacial interaction under the influence of a magnetic
field. This work opens the door to new applications in inverted or open-surface
microfluidics, lays the foundations for new studies into interactions between
two immiscible liquids and could lead to new studies, a new piece of knowledge
relating to liquid-liquid interaction.
I think that the results of these studies will soon find their scope.
Phrases of the day
1. by means of - за допомогою
Movement of small water droplets controlled by means of a magnet - Рухом дрібних
крапель води керують за допомогою магніту.
2. published in - опубліковано в
The groundbreaking discovery was published in the Journal of Veterinary
Diagnostic Investigation - Новаторське відкриття було опубліковано в Журналі
ветеринарно-діагностичних досліджень.
3. the main objective - головна мета
Glaser et al designed the new system to feature three main objectives, which
they positioned below the specimen to provide an unobstructed open top for
three-dimensional imaging - Глейзер та інші розробили нову систему, щоб мати три
основні цілі, які вони розташували під зразком, щоб забезпечити безперешкодний
відкритий верх для тривимірного зображення.
· #799
Nikitina Anastasia RZ-212(Popovych E.) (Tuesday, 24 May 2022 08:16)
Today I have read the article " Higher levels of organic pollutants found in
homes located near natural gas wells, study finds". This article states that a
study by the University of Toronto found that those who live near natural gas
wells are exposed to higher levels of certain organic pollutants in their homes.
The study looked at the levels of volatile organic compounds (VOCs) in the air
and drinking water in the homes of pregnant women living in northeastern British
Columbia. I find this article useful because there is very little research on
indoor air quality in regions with a lot of unconventional use of natural gas.
https://phys.org/news/2021-09-higher-pollutants-homes-natural-gas.html
https://voca.ro/1hW1bFZmMr5A
1. published in
This study was recently published in the Agronomy Journal
Це дослідження нещодавно опубліковано в Agronomy Journal
2. by means of
Movement of small water droplets controlled by means of a magnet.
Рух дрібних крапель води керується за допомогою магніту.
3.the main objective
Thus the main objective of the restructuring process - to avoid any deficit -
has been achieved.
Таким чином головна мета процесу реструктуризації – уникнути будь-якого дефіциту
– була досягнута
. https://voca.ro/13t6N3Z4b1ig
· #798
S.Mykhailiuk (Tuesday, 24 May 2022 08:15)
To Vivchar Roman (RF-211) Thanks. Nothing ventured nothing have as proverb says, the quickness and at the expense of quality. Be attentive and train your pronunciation, consult your dictionary. There are a lot of mistakes in pronunciation of words and word combinations relating to your speciality (e.g. antivirus, objective, specialized, appeared, unequivocally, etc.) . Pls consult the dictionary first. Task 2 is 67 points, Task1 is good. Be assiduous and keep on working hard to improve your speaking skills!
· #797
Lebedeva E. (Tuesday, 24 May 2022 08:11)
To Rosinskiy Kyrylo RF-211, Gridnev Dmytro(RF-211), Teliga Maksim (RF-211) and Julia Shevchuk (RF-211) Well done, thank you!
· #796
Nikitina Anastasia RZ-212(Popovych E.) (Tuesday, 24 May 2022 08:10)
Exam topic #17 (Password as a general technique of secrecy)
A password is your personal key to a computer system. Passwords help to ensure
that only authorized individuals access computer systems. Passwords also help to
determine accountability for all transactions and other changes made to system
resources, including data. Passwords are a critical part of information and
network security. Passwords serve to protect against unauthorized access, but a
poorly chosen password could put the entire institution at risk. There are few
general recommendations about creating passwords: 1) Passwords should be long
and unique; 2)Old passwords should not be re-used.
https://voca.ro/1kV6VTck6lDd
· #795
Gvozd to Burlak Yevhen RZ-211 (Tuesday, 24 May 2022 08:08)
As far as I understand you have decided to do everything in advance... Well, the tasks are not bad.
· #794
Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 24 May 2022 08:02)
Today I've read the article "Smart farming: AI technologies for sustainable
agriculture"
The article covers the recent attempt at implementation of AI technology into
the agricultural field.
The agricultural sector is starting to face major challenges, which the NaLamKI
project attempts to address. Utilizing AI technology, this project will aid
farmers in analyzing crop and soil conditions over large areas of land, as well
as providing farmers other means of aid, such as providing recommendations on
how to address soil with low water levels.
Overall, I find this project to be interesting, albeit vastly over-engineered. I
frankly disagree that every possible sector needs the implementation of high-end
technologies like AI, I find simpler solutions to often be more effective.
Article:
https://phys.org/news/2021-11-smart-farming-ai-technologies-sustainable.html
Audio: https://voca.ro/1SoBcEoazuPm
1) Their study was published in the journal Nature Microbiology.
Їхне дослідження було опубліковано в журналі Природа Мікробіології.
2) The main objective of the meeting was to discuss a framework for accelerating
the implementation of the global and regional platforms for action in Africa.
Головною метою зустрічі було обговорення структури для прискорення реалізації
глобальних та регіональних платформ для дій в Африці.
3) Movement of small water droplets controlled by means of a magnet.
Рух малих краплей води за допомогою магніту.
Audio: https://voca.ro/1g017brH7TGz
· #793
Kate Kholodova (RZ-212, Mikhailuk) (Tuesday, 24 May 2022 08:01)
Today I have read the article "Electrocaloric refrigerator offers alternative
way to cool everything from food to computers" This article focuses on
alternative way to cool everything. Researchers have built an electrocaloric
refrigerator the size of a beverage coaster that can generate a temperature
difference of about 2 K between the hot and cold ends of the device. The cooling
mechanism, which is based on the electrocaloric effect, involves alternately
applying and removing an electric field to a material to increase and decrease
the material's temperature, respectively. The new cooling method can potentially
achieve a higher efficiency than current methods, indicating that electrocaloric
cooling devices may one day replace today's refrigerators and other cooling
devices. I think this is useful study.
Article:
https://phys.org/news/2017-06-electrocaloric-refrigerator-alternative-cool-food.html
Audio: https://voca.ro/1rIaK5ZqWRH2
1. the main objective
Thus the main objective of the restructuring process - to avoid any deficit -
has been achieved.
Таким чином головна мета процесу реструктуризації – уникнути будь-якого дефіциту
– була досягнута.
2. published in
This result is published in the Annals of Mathematics.
Цей результат опубліковано в Annals of Mathematics.
3. by means of
The question of remuneration of the participants, for example by means of
honoraria, was raised.
Порушувалося питання винагороди учасників, наприклад за рахунок гонорарів.
Audio ph: https://voca.ro/1bH7vuUaKE9c
· #792
Povoznikov Artem RZ-212 (Popovych) (Tuesday, 24 May 2022 08:00)
Today i have read the article: Making racetrack noise bearable with physics.
This article tells about Bonnie Schnitt and his team, who decided to reduce
noise in the Michigan area from a nearby race track.
A discussion of this problem took place during the 182nd meeting of the Acoustic
Society of America.
Race tracks can generate noise from many types of vehicles such as racing cars,
street racing cars, racing bikes, go-karts, monster trucks, and cheering
spectators. Schnitta and her team studied several different types of barriers,
including berms, acoustic barriers, or dense foliage, to keep this noise from
penetrating surrounding homes and businesses.
The team mathematically modeled a Michigan race track, focusing on sections of
the track where cars tend to accelerate and make the most noise. From there, the
sound was softened by strategically placed projections. The goal was to reduce
the level of sound heard in the surrounding area by no more than 5 decibels
above the background level.
Schnitt said that the most effective solution to street noise may even be social
in nature. Racetrack made an agreement with a nearby church to suspend services
during services combined with acoustic treatment and said the best strategy is
diplomacy with a set of math solutions used in the discussion.
Text: https://phys.org/news/2022-05-racetrack-noise-bearable-physics.html
Audio:https://voca.ro/1cJObVRcATyq
1)The main objective
Thus the main objective of the restructuring process - to avoid any deficit -
has been achieved.
2)published in
Related results were published in Earth System Science Data.
3)By means of
Movement of small water droplets controlled by means of a magnet.
Audio:https://voca.ro/16eey8ahv8WN
· #791
Gridnev Dmytro(RF-211)(Lebedeva E.V.) (Tuesday, 24 May 2022 07:59)
The
article is headlined “The most effective ways to reduce car traffic”. The author
of the article is Lund University.
The main idea of the article is a problem of major source of climate pollution
in Europe – traffic.And researchers gave 12 measures to reduce car use:
1)Congestion charge
2. Parking & traffic control
3. Limited traffic zone
4. Mobility service for commuters
5. Workplace parking charge
6. Workplace travel planning
7. University travel planning
8. Mobility services for university
9. Car sharing
10. School travel planning
11. Personalised travel planning
12. App for sustainable mobility
"We didn't find one silver bullet—the cities that were successful combined a few
different policy instruments, especially charging for or restricting driving and
parking, combined with investing in public and active transport infrastructure
like bike lanes," says Kimberly Nicholas. Especially effective measures included
a congestion charge, which cities including London, Milan, Stockholm, and
Gothenburg have used to reduce traffic across the whole city center by 12–33%.
Oslo's replacement of parking spaces with strollable car-free streets and bike
lanes, and Rome's restriction on cars entering the city center, with violation
fines used to finance public transport, both reduced car traffic around
10–20%.Collaborations between cities, employers and universities could also play
an important role in reducing traffic.
I think these measures for traffic management will have a good effect on the
atmosphere and improving quality of life and sustainable mobility for residents.
Article: https://phys.org/news/2022-04-effective-ways-car-traffic.html
Vocaroo:https://voca.ro/1iCpn54gJXFt
Phrases of the day
1)published in - опубліковано в
The research was published in the journal
Дослідження опубліковано в журналі
2) by means of- за допомогою
The properties of the product can be controlled very precisely by means of the
recipe.
Властивості продукту можна дуже точно контролювати за допомогою рецептури.
3) the main objective- головна мета.
The main objective was to bring prices down.
Головною метою було знизити ціни.
Vicaroo:https://voca.ro/1l3NYd1huuU8
· #790
Teliga Maksim (RF-211)(Lebedeva E.V.) (Tuesday, 24 May 2022 07:55)
A
new method that could automatically detect and kill cyberattacks on our laptops,
computers and smart devices in under a second has been created by researchers at
Cardiff University.Using artificial intelligence in a completely novel way, the
method has been shown to successfully prevent up to 92 percent of files on a
computer from being corrupted, with it taking just 0.3 seconds on average for a
piece of malware to be wiped out.By training computers to run simulations on
specific pieces of malware, it is possible to make a very quick prediction in
less than a second of how the malware will behave further down the line.
Vocaroo:https://voca.ro/1aHxQbN8Yh4Q
1) published in (публікувати)
The newspaper is published daily
Газета виходить щодня
2) by means of ( за допомогою)
insects propagate themselves by means of eggs
комахи розмножуються за допомогою яєць
3) the main objective(головна мета)
The main objective was to bring prices down
Головною метою було знизити ціни
· #789
Julia Shevchuk (RF-211) (Lebedeva E.V.) (Tuesday, 24 May 2022 07:53)
Today I've read the article called "Bird populations in eastern Canada declining
due to forest 'degradation,' research shows". It tells us about bird species
that live in wooded areas. The scientists looked at how the forest degradation
affected bird habitat. Researchers found that the loss of habitat for nesting
occurred in 66% of the 54 most common bird species in the forest from 1985 to
2020 and was closely linked to the loss of old forests. They assumed that after
cutting down a natural forest if you plant more trees, all other plants and
animals will be filled, but a new study shows that this is not the case.
https://voca.ro/1nnWWlDHAgYH
published in
Related results were published in Earth System Science Data
Відповідні результати були опубліковані в Дані науки про Землю
the main objective
This task has become the main objective for 1998 of the Human Rights Field
Office.
Це завдання стало головним завданням польового офісу з прав людини на 1998 рік.
by means of
Movement of small water droplets controlled by means of a magnet.
Рухом дрібних крапель води керують за допомогою магніту.
https://voca.ro/186e9WkVrw7A
· #788
Lebedeva E. (Tuesday, 24 May 2022 07:52)
To Ivkov Yurii (RF-211) Thank you for your comment. It's detailed and informative.
· #787
Rosinskiy Kyrylo RF-211 (Lebedeva E.) (Tuesday, 24 May 2022 07:52)
Today I’ve read an article “Blockchain bridge Wormhole pays record $10m bug
bounty reward”. An ethical hacker has earned a record $10 million bug bounty
reward after discovering a critical security vulnerability in the Wormhole core
bridge contract on Ethereum. Wormhole is a decentralized, universal
message-passing protocol that enables interoperability between blockchains such
as Ethereum, Terra, and Binance Smart Chain (BSC). An attacker exploiting the
vulnerability “could have held the entire protocol to ransom with the threat
that the Ethereum Wormhole bridge would be bricked, and all the funds residing
in that contract lost forever”. I think people like him are making the world
better, they don’t abuse a bug to steal but solve it so everybody’s finances can
be safe.
Article:
https://portswigger.net/daily-swig/blockchain-bridge-wormhole-pays-record-10m-bug-bounty-reward?&web_view=true
Audio: https://voca.ro/13nbQ0zdhRjw
Phrases of the Day
1. by means of - за рахунок
ENG: The question of remuneration of the participants, for example by means of
honoraria, was raised.
UKR: Порушувалося питання винагороди учасників, наприклад за рахунок гонорарів.
2. published in - опубліковано
ENG: This result is published in the Annals of Mathematics.
UKR: Цей результат опубліковано в Annals of Mathematics.
3. the main objective - головна мета
ENG: Thus the main objective of the restructuring process - to avoid any deficit
- has been achieved.
UKR: Таким чином, головна мета процесу реструктуризації - уникнути будь-якого
дефіциту - була досягнута.
Audio: https://voca.ro/1mofozrExZ7Y
· #786
Ivkov Yurii (RF-211)(Lebedeva E.V.) (Tuesday, 24 May 2022 07:41)
Today I’ve read an article about how artificial intelligence is used to predict
Leptospirosis in dogs.
It is stated that traditional testing lacks sensitivity in the early disease
process and can take more than two weeks, while the AI model is capable of
making a precise and swift diagnosis. AI was trained on more than 400 samples,
and as a result it can find 100% of leptospirosis positive and 90% of
leptospirosis negative dogs.
The group of researchers hope this testing model will be available on an online
resource for veterinarians to enter patient data and receive a timely
prediction. Also it may be applied into human medicine, and the group actively
pursues AI for predicting other infections.
Article:
https://phys.org/news/2022-05-artificial-intelligence-life-threatening-bacterial-disease.html
Phrases of the day
1. published in
The article was finally published in a science journal.
- Нарешті стаття була опублікована в науковому журналі.
2. by means of
Only by means of these interactions were they able to find out the problem.
- Тільки за допомогою цих взаємодій вони змогли з’ясувати проблему.
3. the main objective
The main objective is to create a maintainable and flexible information system.
- Основна мета – створити функціональну та гнучку інформаційну систему.
Vocaroo: https://vocaroo.com/1ngi5HGY9g4q
· #785
Vivchar Roman (RF-211) S. Mykhailiuk (Tuesday, 24 May 2022 07:33)
-
By means of.
It is necessary to collect points for the module, for example by means of
independent ones.
Потрібно добирати бали на модуль, наприклад за допомогою здачі самостійних.
- The main objective.
The main objective of most students is to get a diploma.
Основною метою більшості студентів є отримання диплома.
- Published in.
My comment was published in infopolytech8.
Мій коментар був опублікований у infopolytech8.
Antivirus programs.
An anti-virus program is a specialized program for detecting computer viruses,
as well as unwanted programs and recovering files infected by such programs and
preventing malware from infecting files or the operating system with malicious
code.
The first antiviruses appeared in the late 1980s, it is difficult to
unequivocally establish the time of their appearance. The pioneers were AntiVir
and Dr. Solomon's Anti-Virus Toolkit, created in 1988, and Symantec antivirus
for Macintosh, launched a year later.
In November 2014, the international human rights organization Amnesty
International released the Detect anti-virus program, designed to detect malware
distributed by government agencies to spy on civil activists and political
opponents. The antivirus, according to the creators, performs a deeper scan of
the hard drive than conventional antiviruses. The antivirus, according to the
creators, performs a deeper scan of the hard drive than conventional
antiviruses. Analytical company Imperva, as part of the Hacker Intelligence
Initiative project, has published a study that shows the low effectiveness of
most antiviruses in real conditions.
According to the results of various synthetic tests, antiviruses show an average
efficiency of around 97%, but these tests are carried out on databases of
hundreds of thousands of samples, the vast majority of which are no longer used
for attacks.
Audio: https://voca.ro/1CCnFJ82I64q
· #784
Popovych E. (Tuesday, 24 May 2022 07:29)
To
Stanislav Kryvosheienko RT-211
Your commentary is quite interesting and informative, the tasks Phrases of the
day were performed correctly.
· #783
Lebedeva E. (Tuesday, 24 May 2022 07:28)
To Biehin Yevhen RF-211 Thank you for your comment. It's quite all right.
· #782
Popovych E. (Tuesday, 24 May 2022 07:26)
To
Artem Kotliarov RZ-212
Your task is complete, informative and interesting. The task Phrases of the day
and your exam topic #10 were performed correctly.
· #781
Biehin Yevhen RF-211 (Lebedeva E.) (Tuesday, 24 May 2022 07:20)
Today I have read an article titled: “Using artificial intelligence to predict
life-threatening bacterial disease in dogs”. This article tells us about a
disease that can cause liver failure or severe bleeding into the lungs in dogs.
Fortunately, the AI has already been created to accurately recognize if dog has
this disease. The research involved historical data of patients at the UC Davis
Veterinary Medical Teaching Hospital that had been tested for leptospirosis.
Routinely collected blood work from these 413 dogs was used to train an AI
prediction model. Over the next year, the hospital treated an additional 53 dogs
with suspected leptospirosis. The model correctly identified all nine dogs that
were positive for leptospirosis. The model also correctly identified
approximately 90% of the 44 dogs that were ultimately leptospirosis negative.
Article:
https://phys.org/news/2022-05-artificial-intelligence-life-threatening-bacterial-disease.html
Phrases:
1) published in
The newspaper is published daily
Газета виходить щодня
2) by means of
insects propagate themselves by means of eggs
комахи розмножуються за допомогою яєць
3) the main objective
The main objective was to bring prices down
Головною метою було знизити ціни
Audio: https://voca.ro/184KYXne2wbV
· #780
Stanislav Kryvosheienko RT-211 (Popovych) (Tuesday, 24 May 2022 07:19)
Today I've read the article "What happens when plants have stress reactions to
touch".
It has previously been established that touch can trigger stress reactions in
plants. Now researchers at Lund University in Sweden have found genetic keys
that explain how plants respond so strongly to mechanical stimuli. When you
water your garden plants, they react directly at a biochemical level. When a
knife edge cuts a rhubarb stalk, thousands of genes are activated, and stress
hormones are released. Unlike humans, plants can not feel pain, but they still
react strongly to mechanical stimuli from human touch, hungry animals, wind and
rain, for example.
article - https://phys.org/news/2022-05-stress-reactions.html
audio - https://voca.ro/1mbF3iOdtOf6
Phrases
1) the main objective - This is the main objective of our Meeting. Это является
главной целью нашего Совещания.
2) by means of - Insects propagate themselves by means of eggs. Hасекомые
размножаются с помощью яиц.
3) published in - This photo could be published in a fashion magazine. Теперь
эта фотография может быть опубликована в модном журнале.
audio - https://voca.ro/12EsDaAG4Tsy
· #779
S.Mykhailiuk (Tuesday, 24 May 2022 07:11)
To
students from subgroups RF-211 and РЗ-212
Welcome back to our today’s session.Pls prepare the following tasks: exam
speciality topics and phrases of the day practice. Post them into the Guestbook
with appropriate links to the topics and phrases and voice record msgs. Wish you
all the best!
· #778
Lebedeva E. (Tuesday, 24 May 2022 07:07)
To РФ-211 Good morning! The lesson has started and I am waiting for your comments on the article and phrases of the day.
· #777
Popovych E. (Tuesday, 24 May 2022 06:59)
Good morning!
The lesson will start soon, so I am waiting for your comments and audio
recordings. Don't forget to write the sentences with Phrases and record them.
Please, do it in one postt!
· #776
Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 24 May 2022 05:04)
1)
1. published in
A new study published in Science Advances has examined the complex regulating
networks that affect how the plant's defences are strengthened by external
influences. - У новому дослідженні, опублікованому в Science Advances,
досліджено складні регулюючі мережі, які впливають на те, як зовнішній вплив
посилює захист рослин.
2. the main objective
The review had found that the main objective of offshoring was cost-saving. -
Огляд виявив, що головною метою офшорингу була економія витрат.
3. by means of
Movement of small water droplets controlled by means of a magnet.- Рухом дрібних
крапель води керують за допомогою магніту.
https://voca.ro/1lpvb9aXewbC
2) Today I have read the article “Smart farming: AI technologies for sustainable
agriculture”.
Changing climatic conditions, the shortage of skilled workers, the use of
pesticides—a wide range of factors have an impact on the quality and flow of
agricultural processes. Researchers at the Heinrich Hertz Institute, are aiming
to make this more efficient and sustainable by means of cloud and AI
technologies. The data and AI services will be provided in a decentralized
manner using cloud infrastructure with data sovereignty. What's more, a
decentralized, distributed-learning AI system will be established, with data
stored locally at the farms.
In my opinion, AI will significantly improve agricultural production
https://phys.org/news/2021-11-smart-farming-ai-technologies-sustainable.html
https://voca.ro/1jRwHwIqF6Me
3) Exam topic#10 (Software firewall)
A software firewall is a firewall that is installed on a computer or server, and
tasked with network security. It provides more robust and cohesive security for
enterprises of all sizes by working with a wide variety of other technology
security solutions. A software firewall is needed to monitor incoming and
outgoing traffic for potential risk or suspicious user behaviour. It is able to
make setting security policies much easier, faster and more flexible. This type
of firewall is also critical as it requires very little space and can be
installed remotely on any number of devices. So it is fast becoming in the
solution of choice for many reasons.
https://voca.ro/1je8YqMA76H1
· #775
Tomchishina Polina RT-212 (Yershova Y.A.) (Monday, 23 May 2022 09:16)
I'm
sorry, I accidentally sent you an exam topic that you've checked before.
Check my exam topics, please (#695 #720). Sorry again
· #774
S.Mykhailiuk (Sunday, 22 May 2022 21:06)
To Shpychka Olecksandr/ RZ-213 Thanks.Task1 is good. There is one grammar mistake. Unable to listen to your voice msg as it can hardly be opened.Just 76 points. Task2 is 78 points. Stick to the procedures pls. Keep on working hard.
· #773
Burlak Yevhen RZ-211 Gvozd O.V. (долг за 31.05) (Saturday, 21 May 2022 13:44)
Today i have read the article "Zero-trust architecture may hold the answer to
cybersecurity insider threats". This article tells us about a defensive approach
to cybersecurity. Now cloud storage is popular, which means that the company
allows an employee to work with data from anywhere in the world. This popularity
is the holy grail for vindictors and people who carry out cyberattacks. Constant
high-profile incidents with hacks and cyber attacks confirm this. I believe that
this has a bad effect on the protection of the data of ordinary users and the
countries themselves. A good group of people with cyberattack knowledge can hack
anything, and that has to be fought.
https://techxplore.com/news/2022-05-zero-trust-architecture-cybersecurity-insider-threats.html
https://voca.ro/17N8JXtquOqE
1)security
Secrecy is security, and security is victory.
2)government organizations
Bilateral and multilateral agencies, development banks and government
organizations can play a major role in improving this situation.
3)paradigm shift
it's a space where a supervisor and an employee engage in a knowledge transfer
about an impending vocational paradigm shift.
https://voca.ro/157Zc7eQP1mx
· #772
Burlak Yevhen RZ-211 Gvozd O.V. (долг за 24.05) (Saturday, 21 May 2022 13:33)
Today i have read the article "Cyber attack causes chaos in Costa Rica
government systems". This article tells us about about a cyberattack that
disabled government computer systems in Costa Rica. The country refused to pay
the ransom, and the Russian-speaking Conti gang announced a cyber attack. The
cyberattack disrupted the country's import and export logistics. The situation
itself can be described in a nutshell "the power of the Internet", it is
terrible, people millions of kilometers from the country can hack its data, sell
it or distribute it for free, destroy the entire economy and people's lives, it
is clear that Costa Rica is not the most informationally developed country , but
the very fact that this happened makes many people wonder if I am safe from a
cyber attack.
https://techxplore.com/news/2022-04-cyber-chaos-costa-rica.html
https://voca.ro/17etCYUGcqNX
1)report
The officers submitted an internal report upon completion of the mission
2)computer system
Icinga is an open-source computer system and network monitoring application.
3)initial attack
We thought he was killed during the initial attack.
https://voca.ro/15yUTc25kPfi
· #771
Burlak Yevhen RZ-211 Gvozd O.V. (долг за 17.05) (Saturday, 21 May 2022 13:16)
Today i have read the article "The 'bots' at heart of Twitter buyout row". This
article tells us about deal with Twitter and bots. Bots have put Elon Musk on
hold on his twitter purchase, bots have become sophisticated in the last 10
years and are one of the top cyber threats. Bots are used in more than in three
out of four cyber crimes and fraud incidents that occur online. Why would
Twitter use bots when there are so many people there? It's simple, more
visibility, more money from sponsors who look at user reach. I believe that bots
that are used for evil purposes harm people who have been deceived by bots.
https://techxplore.com/news/2022-05-bots-heart-twitter-buyout-row.html
https://voca.ro/1eppOdgcvYI3
1)software
Internet spy software works in hidden mode so it is known as stealth keylogger
software.
2) fake accounts
Create fake accounts and rate yourself.
3)social media platforms
The Department also promoted volunteering opportunities through its social media
platforms.
https://voca.ro/13EVlEK2jYzi
· #770
Burlak Yevhen RZ-211 Gvozd O.V. (долг за 10.05) (Saturday, 21 May 2022 13:02)
Today i have read the article "Social network Grindr going public at $2.1 bn
value". This article tells us about the social network Grindr, the owner of
which has announced that it has announced a merger with a special company to go
public, the cost of which is estimated at 2.1 billion dollars. This social
network is focused on the LGBTQ+ community. The Chinese cybersecurity service
carried out an operation to eliminate the application from the country, and the
Norwegian government fined the application due to the distribution of user data.
I believe that this application violates the laws of the countries in which it
is located, which was confirmed by China and Norway, if you do not take into
account the fact that the world has not treated people of a different
orientation badly for a long time, but in China this is a taboo, so this
application has defiled it laws and should be punished.
https://techxplore.com/news/2022-05-social-network-grindr-bn.html
https://voca.ro/18IxqQ6waBkC
1)public company
The proponent was the public company "Hrvatska elektroprivreda" of Croatia.
2)company
That company is called Tufnell Engineering, the company co-owned by Mr Rafael
Cilenti.
3)personal data
Your minions are mining personal data off that old equipment, which can only
mean you're committing identity theft.
https://voca.ro/12ZjnXmmDMJg
· #769
Burlak Yevhen RZ-211 Gvozd O.V. (долг за 3.05) (Saturday, 21 May 2022 12:47)
Today i have read the article "Wi-Fi may be coming soon to a lamppost near you".
This article tells us about the widespread use of WI-FI in cities. Researchers
have developed and tested a new model that will help wireless providers analyze
at what height to attach Wi-Fi equipment to lampposts. The studies were
confirmed in practice and the test was successful, which meant further
distribution. This means that WI-FI will become even more accessible to all
citizens. I believe that this will have a positive impact on Internet users and
help technology reach more people.
https://techxplore.com/news/2022-05-wi-fi-lamppost.html
https://voca.ro/12QrWemMpJsK
1)transmission frequency
PG Control Inverter High Voltage IPE200 Engineering Transmission Frequency
2) antenna design
He encoded the S.O.S. antenna design into the music box.
3)transmitter
You can dismantle that transmitter by removing the encoder chip.
https://voca.ro/1i5uG1Rp2hul
· #768
S.Mykhailiuk (Friday, 20 May 2022 16:13)
To
students from Group РЗ-213
Be advised that 10 students participated in our today’s on-line activities only
. Thank you and next session, I’d like you all to work with your exam topics
from the list of our website + phrases of the day. All the best, students.
· #767
S.Mykhailiuk (Friday, 20 May 2022 16:05)
To Anna Yakymova/ RZ-213 Task1 is very good. Task2 is 72 points.Pls focus on the speciality articles as a priority in your on-line activities during the sessions.
· #766
S.Mykhailiuk (Friday, 20 May 2022 15:59)
To Mitriev Vitaliy RZ-213 Pls focus on the topic related to your speciality. Just 65 points. Task2 should be done according to the procedure ( a phrase with translation). Do you know about that? Just 60 points . Take my remarks into account and improve your approach to get better results in the sessions to come.
· #765
S.Mykhailiuk (Friday, 20 May 2022 15:52)
To Shlapak Dmytro RZ-213 Pls follow the requirements for the phrases of the day practice. You comments on the article were not revealed. The conclusion is different from the fact your perceive the phenomenon and treat it. Just 67 points for all activities. Keep on working hard.
· #764
Neblienko V. / RZ-212 / Popovych (Friday, 20 May 2022 15:46)
(Отработка за 17.05.2022)
Today i have read the article titled: Sophisticated fluid mechanics model:
Space–time isogeometric analysis of car and tire aerodynamics.
This article tell ` s about complex aerodynamics and how scientists at Rice
University and Waseda University in Tokyo have perfected their computer modeling
techniques to the point where you can see right down to the flow around rolling
tires. The results are there for all to see in a video produced by Takashi
Kuraishi, a research associate in the George R. Brown School of Engineering lab
of Tayfun Tezduyar, the James F. Barbour Professor of Mechanical Engineering,
and a student of alumnus Kenji Takizawa, a professor at Waseda and an adjunct
professor at Rice. In my opinion, this research will be extremely useful in the
field of physics and the study of car streamlining in order to give a more
aerodynamic shape to future cars.
Article:
https://techxplore.com/news/2022-05-sophisticated-fluid-mechanics-spacetime-isogeometric.html
Vocaroo: https://voca.ro/1h4X29uH3G2v
Phrases:
computer simulation
Specialists in fluid dynamics at Rice University and Waseda University in Tokyo
have developed their computer simulation methods to the point where it's
possible to accurately model moving cars, right down to the flow around rolling
tires.
Специалисты по гидродинамике из Университета Райса и Университета Васэда в Токио
усовершенствовали свои методы компьютерного моделирования до такой степени, что
стало возможным точно моделировать движущиеся автомобили, вплоть до обтекания
катящихся шин.
proof theory
Proof Theory Jeremy Avigad October 24, 2017 Abstract Proof theory began in the
1920's as a part of Hilbert's program.
Теория доказательств Джереми Авигад 24 октября 2017 г. Теория доказательств
началась в 1920-х годах как часть программы Гильберта.
concurrent system
Mathematical models to analyse concurrent systems performance and complexity in
the form of Petri nets are published in a critical research paper by Esparza and
Nielsen.
Математические модели для анализа производительности и сложности параллельных
систем в виде сетей Петри опубликованы в критической исследовательской статье
Эспарзы и Нильсена.
Vocaroo: https://voca.ro/18B8Z8MfxWUY
· #763
S.Mykhailiuk (Friday, 20 May 2022 15:44)
To Ivan Siglyanyk(RZ-213) Just 80 points. Pls insert some phrases like “To sum it up, I guess, etc at the end of your comments.
· #762
S.Mykhailiuk (Friday, 20 May 2022 15:40)
To Chabanenko Ksenia RZ-213 Thanks 85 points.
· #761
S.Mykhailiuk (Friday, 20 May 2022 15:37)
To Chernetskiy Nikita.RZ-213. . These’s no conclusion in your comments on the article. Just 70 points.Task is 74 scores as there’s no translation of the phrases.
· #760
S.Mykhailiuk (Friday, 20 May 2022 15:31)
To Gorbatiuk Stanislav RZ-213 Pls sick to the pattern in task4. Just 74 points. Task2 is good.
· #759
S.Mykhailiuk (Friday, 20 May 2022 15:26)
To Kate Syrbu RZ-213 Thanks There grammar mistakes in the sentences (“ which” >who). Just 75 points for all activities. Keep on working hard.
· #758
S.Mykhailiuk (Friday, 20 May 2022 15:20)
To Igor Rudko (RZ-213) Task1 has some grammar mistakes Just 74 points . Task2. Point 3 sentence is incomplete translation. Just 74 points.
· #757
Chernetskiy Nikita.RZ-213. (Vorobyova) (Friday, 20 May 2022 13:48)
Exam topic 12
What is a Hardware Firewall?
A hardware firewall is a physical appliance that is deployed to enforce a
network boundary. All network links crossing this boundary pass through this
firewall, which enables it to perform inspection of both inbound and outbound
network traffic and enforce access controls and other security policies.
These firewalls, which contain both the hardware and software features necessary
to enforce a network boundary, can offer a variety of different networking and
security features, including URL filtering, an intrusion prevention system
(IPS), and even Wi-Fi support.
In my mind, a router may provide the protection you need.
https://voca.ro/1jVOP8E3UgNb
· #756
Petrova E.I. (Friday, 20 May 2022 12:30)
Pour les étudiants qui apprennent le français.
Chers étudiants ! Travaillez régulièrement. J’attends vos devoirs. Laissez vos
commentaires et vos enregistrements ici. Allez-y! Bon travail.
· #755
Vasilev A.O RZ-211 Gvozd O.V. (Friday, 20 May 2022 12:27)
Today I've read an article called"Canada hospitals use drones to carry lungs for
transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by
Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western
Hospital on the city's west side to the roof of the downtown Toronto General
Hospital.The trip at the end of September took less than 10 minutes. It was
automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the
company, but a similar flight in April 2019 delivered a kidney to a hospital in
the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team
that whisked the package inside and successfully transplanted the lungs into a
waiting patient, saving the life of the 63-year-old man who'd been diagnosed
with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human
organs
https://voca.ro/1oNUOF2CvqeB
https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html
Exam topic #12 ( Hardware firewall)
A physical firewall device or firewall hardware is an appliance that sits
in-between the uplink and the client system and filters
what traffic gets through based on pre-configured security policies, user
profiles, and business rules.
The uplink carries incoming traffic from public or private networks, whereas the
client system is a server, an employee desktop, a WFH system, an IoT node,etc.
Firewall solutions are an integral component of enterprise security. A 2020
report by Palo Alto Networks found that firewalls, including hardware
appliances,
were the no.1 security measure enterprises adopt to protect their
infrastructure. The report said that 96.6% of companies have a firewall in
place, with 53.8%
also deploying web application firewalls. In fact, more than 1 in 4
organizations rely solely on firewall hardware instead of software or
cloud-based solutions.
https://vocaroo.com/1hvPxyasfW9D
1)examine more closely
I think I will examine it more closely.
https://voca.ro/1nWP11xB6A47
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
https://voca.ro/1z4BBCa9h3sM
3)distinct
The stems have distinct smelling foliage when young.
https://voca.ro/1m0QSdndPbpo
· #754
Igor Rudko (RZ-213) (S.Mykhailiuk) (Friday, 20 May 2022 12:16)
Article: https://techxplore.com/news/2021-09-issue-hacked-efforts.html
Audio: https://voca.ro/11SNbSdo1SBp
Today I have read the article: "Addressing the issue of using hacked data in
research efforts". The authors suggest that the research community needs to
establish whether using hacked data is ethical, and if so, under what
conditions. By posting something, the data became public, which made it legal
for researchers to use it in their own studies if they wished. Doing so,
however, raises ethical questions because the people represented by the data
have not given their permission for their data to be used for such purposes.
In my opinion, user privacy should be considered but, unfortunately, researchers
make it clear in their papers that user's data was used without consent.
Phrases
Audio: https://voca.ro/122C03m3K08Y
1) proof theory - теорія доказів
Scientists prove a theory about the collision of dwarf galaxies by explaining
dark matter–free galaxies - Вчені доводять теорію про зіткнення карликових
галактик, пояснюючи галактики без темної матерії
2) concurrent system - паралельна система
A concurrent system of controls is over sequence and dispersity in multiblock
copolymers - Одночасна система контролю – це над послідовністю та дисперсністю в
мультиблок-сополімерах
3) computer simulation - комп'ютерне моделювання
Under a project led by the RIKEN Center for Computational Science, researchers
have used computer simulations to show that weather phenomena - У рамках
проекту, очолюваного Центром обчислювальних наук RIKEN, дослідники використали
комп’ютерне моделювання, щоб показати, що погодні явища
· #753
Kate Syrbu RZ-213 (S.Mykhailiuk) (Friday, 20 May 2022 12:16)
1)
proof theory - теорія доказів;
This theorem also has important roles in constructive mathematics and proof
theory.
Ця теорема також грає важливу роль у конструктивній математиці та теорії
доказів.
2) computer simulation - комп'ютерне моделювання;
In this research, computer simulation is the training ground for robot systems
the teams will build.
У цьому дослідженні комп’ютерне моделювання є навчальним полігоном для систем
роботів, які будуть створювати команди.
3) concurrent system - паралельна система;
The principal application of these logics is in writing specifications for
concurrent systems.
Основне застосування цієї логіки полягає в написанні специфікацій для одночасних
систем.
https://voca.ro/13kim4xKhZji
Today i have read the article about research by Tetsuro Kobayashi of City
University of Hong Kong and his colleagues which recruited hundreds of Japanese
adults to participate in experiments focused on misinformation about Zainichi
Koreans—permanent residents of Japan with Korean heritage. Analysis of the
participants' actions and feelings revealed that online search successfully
reduced belief in the misinformation about Zainichi Koreans but some
participants also showed an increase in negative feeling toward Zainichi Koreans
after conducting their searches. In my opinion, further research is needed to
confirm the findings and explore them in other cultural contexts.
https://phys.org/news/2021-09-online-predisposed-belief-misinformation.html
https://voca.ro/1dcMlktZnPhr
· #752
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Friday, 20 May 2022 11:51)
Today I would like to talk about how authentication works in applications on a
wide variety of platforms, from mobile applications to console-based utilities.
Authentication is the process whereby a user authenticates their identity to a
system. The system provides personal data only to its owner.
The authentication mechanism at a basic level is quite simple - you need to
enter your data in the form of a login and password. Check the data for a match,
and if the data match each other - then you are the true owner of the account.
An account is a set of data about the user stored in the system. As a rule, only
one user has access to an account - its owner.
As our data is stored in a database when registering with any service - then the
process of authentication is applied to the basic principles of working with
databases (hereinafter the database) - this is reading, writing, updating and
deleting data. In this case, during each of the actions with the database the
possibility of committing these actions by the user is checked.
https://voca.ro/1e1ueqrWKrMz
1.concurrent system
The principal application of these logics is in writing specifications for
concurrent systems.
2.computer simulation
But a computer simulation is a kind of a model.
3.proof theory
The informal proofs of everyday mathematical practice are unlike the formal
proofs of proof theory.
https://voca.ro/11rJlH3etvrI
· #751
Gorbatiuk Stanislav RZ-213 (S.Mykhailiuk) (Friday, 20 May 2022 11:46)
1.
Proof theory is one of the most discussed topics in the science community these
days. Теорія доказів сьогодні є однією з найбільш обговорюваних тем у науковому
співтоваристві.
2. Concurrent Systems present a modern approach to software systems, ideally
suited to the needs of today's students and programmers. Паралельні системи
представляють сучасний підхід до програмних систем, ідеально відповідний
потребам сучасних студентів і програмістів.
3. Every weather forecast has to be done by using a computer simulation. Кожен
прогноз погоди потрібно робити за допомогою комп’ютерного моделювання.
https://voca.ro/16ZSNnSCZhEV
Today I've read the article, which is titled "New theory suggests collision of
dwarf galaxies could explain dark matter–free galaxies". This article tells us
about how a team of astrophysicists affiliated with multiple institutions in the
U.S., one in Germany and one in Canada, has developed a new theory to explain
the existence of odd, dark matter–free dwarf galaxies. It said that a collision
between two dwarf galaxies could explain the dark matter–free dwarf galaxies
that have been discovered over the past several years. A collision between two
dwarf galaxies could have split the gas within them , resulting in the formation
of new, smaller dwarf galaxies, some with no dark matter. Those without dark
matter, the researchers suggest, could have formed because dark matter does not
interact with itself or regular matter, meaning it could easily have exited the
debris field from the collision, and even continued out into space.
https://phys.org/news/2022-05-theory-collision-dwarf-galaxies-dark.html
https://voca.ro/1nTUaSNSzHxu
· #750
Chernetskiy Nikita.RZ-213. (S.Mykhailiuk) (Friday, 20 May 2022 11:15)
Skoltech researchers and their colleagues from ESPCI Paris, Chiba University,
and Japan Agency for Marine-Earth Science and Technology have used a 3D
simulation to show that small fish swimming in a school can sense the position
and tail beat of their neighbors as water pressure variation on the side of
their bodies. This mechanism is thought to enable fish to maximize swimming
efficiency in a group even in complete darkness, when no visual cues are
available.To keep track of neighbors even in dark or turbid environments, fish
must clearly rely on more than just vision. "In this study, we simulate two
rummy nose tetra fish swimming adjacently in various configurations in calm
waters.Similarly, swarms of robotic fish equipped with pressure sensors might
exploit the hydrodynamic advantages of moving in a group to replace larger
underwater drones that explore historic shipwrecks—such as that of the recently
discovered Ernest Shackleton's Endurance—or observe fish behavior.
Article:https://techxplore.com/news/2022-03-simulation-closer-schools-fishlike-underwater.html
Audio:https://voca.ro/1ncrhTSYPgcq
1.computer simulation
NASA scientists use a computer simulation
Вчені NASA використовують комп’ютерне моделювання
2. concurrent system
CSP helps users to understand concurrent systems, and to decide whether a
program meets its specification
CSP допомагає користувачам зрозуміти одночасні системи та вирішити, чи
відповідає програма її специфікаціям
3.proof theory
Find review ratings for Basic Proof Theory
Знайдіть оцінки за базовою теорією доказів
· #749
Chabanenko Ksenia RZ-213(S.Mykhailiuk) (Friday, 20 May 2022 11:08)
1.proof theory- теорія доказів;
The primitive recursive functionals are important in proof theory and
constructive mathematics.- Примітивні рекурсивні функціонали важливі в теорії
доказів і конструктивній математиці.
2.concurrent system- паралельна система;
Depending on the compiler and the nature of other concurrent system activity,
failures may only occur intermittently.- Залежно від компілятора та характеру
іншої паралельної діяльності системи, збої можуть виникати лише періодично.
3. computer simulation- комп'ютерне моделювання;
The results of computer simulation could be compared with the statistical data.-
Результати комп'ютерного моделювання можна порівняти зі статистичними даними.
https://voca.ro/1m36JBQJZIDn
I want to share my thoughts after reading the article about no-code way to
program websites, mobile apps and games. Nowadays there are many platforms that
allow nonprogrammers create software through drag-and-drop graphical user
interfaces instead of traditional line-by-line coding. For example, a user can
drag a label, drop it to a website and define a workflow. In addition to website
builders, there are no-code platforms for game and mobile app development. These
tools provide a user interface with built-in editors for raster graphics, game
level design, scripting, paths and "shaders" for representing light and shadow.
I agree that such platforms contribute to increasing the number of developers
which is good because of increased demand . Also, I believe that no-code
programming will help in machine learning field as it can make it easier to use
artificial intelligence for many purposes.
https://voca.ro/17mHq00wRayy
https://techxplore.com/news/2022-05-nonprogrammers-world-software-scientist-no-code.html
· #748
Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 20 May 2022 11:07)
Prhases of Day
proof theory: https://voca.ro/1hmlcEFXnB0u
Proof theory can be described as the study of the general structure of
mathematical proofs, and of arguments with demonstrative force as encountered in
logic.
Теорію доказів можна описати як вивчення загальної структури математичних
доказів і аргументів з демонстративною силою, які зустрічаються в логіці.
concurrent system : https://voca.ro/1dYqnPm0KVze
A concurrent system is one where a computation can advance without waiting for
all other computations to complete.
Одночасна система — це система, де обчислення можуть просуватися, не чекаючи
завершення всіх інших обчислень.
computer simulation : https://voca.ro/1fGs7a2WTMI3
So, yes, you may well be a brain in a vat and your experience of the world may
be a computer simulation programmed by an evil genius.
Отже, так, ви цілком можете бути мозком у чані, а ваш досвід світу може бути
комп’ютерним моделюванням, запрограмованим злим генієм.
Article:
https://techxplore.com/news/2020-12-simulation-human-interactive-smart-robots.html
Audio: https://voca.ro/16tpJOmUh0Qe
Today, I have had an opportunity to read the article about the role of the
computer in the development of smart robots.
Lehigh University scientist Jeffrey Trinkle and his team are working on a
project so that the robots can collect things, repair them, lift them off the
floor so that they have real muscles and real movements.
It is noted that the main element of such research will be computer simulation,
which will create a virtual landfill where all the necessary tests will take
place.
They will help to understand faster, better what such robots should be, and how
to improve their productivity.
· #747
Shlapak Dmytro RZ-213 (Mikhailyuk) (Friday, 20 May 2022 11:05)
1.
Your task is to create proof theory the hacking over the past month.
Ваше завдання-створити докази злому за останній місяць.
2. We use a Howitzer mat to protect concurrent systems.
Ми використовуємо гаубичний килимок для захисту паралельних систем.
3. We use computer simulation of hacking a cybersecurity system.
Ми використовуємо комп'ютерне моделювання злому системи кібербезпеки.
https://voca.ro/17WdWl6x2Kah
Today I have read the article "The Northern Lights can be heard even when it is
not visible" Well, as for me, this is a useless discovery, although as they say
"Even the most useless thing can find its application", by application I mean
improving something or making a person progress. Maybe it's fun to hear the
Northern Lights but not see it, but again, who needs it, at least for now.
There's not even much to say. I would like more from this study.
https://phys.org/news/2022-05-aurora-borealis-heard.html
https://voca.ro/1iaueljmK9cj
· #746
Shpychka Olecksandr/ RZ-213 (S.Mykhailiuk) (Friday, 20 May 2022 11:03)
Article:
https://techxplore.com/news/2022-04-team-methods-future-cyberattacks.html
Audio: https://voca.ro/15mNBNSLEOtI
Today i have read the article: "Research team identifies methods to predict
future cyberattacks".
From the article, we learn about a group of researchers who wants to create a
method that will predict future cyberattacks. Currently, the number of
cyberattacks against different companies has increased. Because of what, many
people lost their data, and the damage cost a huge amount. Analyzing all cases
of cyberattacks, scientists develop a method to prevent them.
In my opinion, this method will help protect the data of trusted companies, as
well as reduce the financial harm to these companies.
Phrases of the day:
1)computer simulation
NASA scientists use a computer simulation
(Вчені NASA використовують комп’ютерне моделювання)
2) concurrent system
CSP helps users to understand concurrent systems, and to decide whether a
program meets its specification
(CSP допомагає користувачам зрозуміти одночасні системи та вирішити, чи
відповідає програма її специфікаціям)
3)proof theory
Find review ratings for Basic Proof Theory
(Знайдіть оцінки за базовою теорією доказів)
Audio: https://voca.ro/17lU1MBm2H8b
· #745
Mitriev Vitaliy RZ-213(S.Mykhailiuk) (Friday, 20 May 2022 10:57)
Link to article:
https://phys.org/news/2018-08-smart-urban-solutions-resilient-cities.html
link to voice: https://voca.ro/1GEkCI4i6XdC
Today I have read the article "Smart urban solutions for more resilient cities".
It tells about a new project SMURBS, begun as part of the EU's ERA-PLANET
umbrella project, is working to increase urban resilience and enhance the
quality of life in urban regions.
To achieve this goal, it's focusing on challenges related to air quality, urban
growth, natural and
man-made disasters, health and migration. The project's first step is to
stimulate strategic planning by
connecting with local authorities, urban planners and city-level stakeholders to
map out 'what is already
out there' and 'what the users want'.
In my opinion, SMURBS will help cities with many problems related to sustainable
urban development.
1. The principal application of these logics is in writing specifications for
concurrent systems.
Основне застосування цієї логіки полягає в написанні специфікацій для одночасних
систем.
2. The results of computer simulation are compared with the statistical data of
the bank «Brokbusinessbank».
Результати комп’ютерного моделювання порівнюються зі статистичними даними банку
«Брокбізнесбанк».
3. This theorem also has important roles in constructive mathematics and proof
theory.
Ця теорема також грає важливу роль у конструктивній математиці та теорії
доказів.
· #744
Anna Yakymova/ RZ-213(S.Mykhailiuk) (Friday, 20 May 2022 10:47)
Phrases of the day:
- computer simulation - комп'ютерне моделювання
In this research, computer simulation is the training ground for robot systems
the teams will build.
(У цьому дослідженні комп’ютерне моделювання є навчальним полігоном для систем
роботів, які будуть створювати команди.)
https://techxplore.com/news/2020-12-simulation-human-interactive-smart-robots.html
https://voca.ro/1dum9y4ECKfG
- proof theory - теорія доказів
Proof theory A branch of mathematical logic which deals with the concept of a
proof in mathematics and with the applications of this concept in various
branches of science and technology.
(Теорія доказів Розділ математичної логіки, який займається концепцією доказу в
математиці та застосуванням цього поняття в різних галузях науки і техніки.)
https://encyclopediaofmath.org/wiki/Proof_theory
https://voca.ro/19AO2H5qNSMf
- concurrent system - паралельна система
Concurrent programming encompasses programming languages and algorithms used to
implement concurrent systems.( Паралельне програмування охоплює мови
програмування та алгоритми, що використовуються для реалізації паралельних
систем.)
https://en.wikipedia.org/wiki/Concurrency_(computer_science)
https://voca.ro/1dUbnkTrFlyF
Review:
The article is headlined «A visual database of human plasma compounds». The
article is about creation of a database of metabolites from blood samples by
Japanese scientists. This database is available online for the whole world.
Other countries and regions also cover similar bases. Many people add samples to
jMorp so that the application is useful and scientists can analyze the data. And
scientists update the database every year.
I found the article interesting because such a database is convenient and useful
in the digital age.
https://phys.org/news/2017-12-visual-database-human-plasma-compounds.html
https://voca.ro/12k88qZdhSCH
· #743
Anton Ardelyan RZ-211(Yershova) (Thursday, 19 May 2022 14:26)
Today i have read the article "Mass scale manipulation of Twitter Trends
discovered". A team at Ecole Polytechnique Federale de Lausanne found evidence
of mass-scale manipulation of Twitter trends. They found that almost half of all
the local Twitter trending topics in Turkey were fake. They suggested that many
viral trends are created solely by bots due to a vulnerability in Twitter's
trends algorithm. They further noted that because the algorithm used by Twitter
does not allow for deletions, attackers can push trends until they become
widespread.
Link: https://techxplore.com/news/2021-06-mass-scale-twitter-trends.html
Audio: https://voca.ro/1bkz2RjzxO0W
Phrases:
1) We needed one-screen narrative information management yesterday.
Вчора нам знадобилось управління інформацією на екрані
2)A patent document reads: "The present invention relates to a space vehicle.
У патентному документі написано: "Справжній винахід є космічним апаратом"
3)Last year, they sold the game for $5 above the average price.
В минулому році вони продали гру на 5 доларів дорожче за стандартну ціну
Audio: https://voca.ro/1aGokguUWr2C
· #742
Popovych E. (Thursday, 19 May 2022 13:32)
To
Timophey Sipin RZ-212
Timophey, check, pls., your voice message of the Phrases
https://voca.ro/1hcd8mRko and the exam topic https://voca.ro/1ePaujicksks.
· #741
Popovych E. (Thursday, 19 May 2022 13:02)
To
Khotynskiy O, (RZ-212)
Your exam topic #9 (Functions of firewalls.) and Prases are well done but what
about the comment on the article? Keep on working .
· #740
Popovych E. (Thursday, 19 May 2022 12:59)
To
Povoznikov Artem RZ-212
# 696, 698
Your exam topic #8 (Passwords and their drawbacks), comment, audio are quite
correct as well as sentences with Phrases
· #739
Popovych E. (Thursday, 19 May 2022 12:48)
To
Timophey Sipin RZ-212
#689, 690
Exam Topic #6 is well done.
Thank you for your comment and voice message.
· #738
S.Mykhailiuk (Thursday, 19 May 2022 12:47)
To
Eugene Chervony RT-212 pls indicate the link to the source. Just 75 points for
both exam topics.
As to your comment on the article, you are supposed to formulate your own
sentences but not to copy sentences from the article itself. Just 60 points. Be
productive. The phrases of the day practice is good.
· #737
Popovych E. (Thursday, 19 May 2022 12:46)
To
Kate Kholodova (RZ-212)
Exam topic "Software firewall" is well done.
· #736
Popovych E. (Thursday, 19 May 2022 12:44)
To
Pushkash Maxim (RZ-212)
Exam topic #6 (what is the difference between software and hardware firewall) is
well done.
· #735
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 19 May 2022 12:38)
Exam topic #4(Information protection systems)
Confidentiality, integrity and availability of information are main principles
all information protection systems should support. To build and efficiently use
the system we need to identify requirements specific to the object, use
established practices and methods, organize the regular performance monitoring
and do some other extra tasks. Quality information protection system consists of
separate systems each of which has its own functions. For example, anti-virus
protection system, incident management system and data leak protection system.
Also, security of application and corporate network perimeter are included as
well. There are much more tools actually and all of them are used in providing
information security. So, information protection system is complex object which
is being used due to specific requirements and is guaranteeing confidentiality,
integrity and availability of information.
https://voca.ro/1iV5QNlo2gvH
· #734
Badyuk Eduard RZ-212 (Lebedeva E.V.) (Thursday, 19 May 2022 12:32)
Exam topic #20 (Principles of information protection.)
First, let's find out what Information Protection is. Information protection or
security (sometimes referred to as InfoSec) covers the tools and processes that
organizations use to protect information.
The main components that explain the principles of security are Confidentiality,
Integrity, Availability.
The purpose of Confidentiality is to protect the data from unauthorized access.
It is possible by implementing access restrictions to allow access to authorized
entities only.
Integrity means preserving the accuracy and completeness of data. This element
ensures that data has not been tampered with and can be trusted.
Availability refers to the availability of data when authorized users require
this data. Devices, systems, applications, data are of little value to any
organization if their customers can't access it when they need it.
https://voca.ro/15Bv1U5OZpKp
1) above the average
Both regions witnessed buoyant economic growth significantly above the average
performance of the developed countries and the world economy at large.
В обох регіонах спостерігалося бурхливе економічне зростання, що значно
перевищує середні показники розвинутих країн і світової економіки в цілому.
2) information management
The meeting underscored the critical need for capacity-building, including
training and information management.
Зустріч підкреслила критичну потребу у розвитку потенціалу, включаючи навчання
та управління інформацією.
3) invention relates
The invention relates to the field of producing polymers and copolymers of
olefin oligomers produced by a trimerization reaction of olefin monomers.
Винахід відноситься до галузі отримання полімерів і сополімерів олефінових
олігомерів, отриманих реакцією тримеризації олефінових мономерів.
https://voca.ro/1mU25ft0NOIq
· #733
S.Mykhailiuk (Thursday, 19 May 2022 12:30)
To Tomchishina Polina RT-212 Mind “континентальна частина США». Point 3 is not a sentence. Just 60 points. Task2 has not been revealed in your comment. Just 74 points. Pay attention to the pronunciation and melody in your voice record msg.
· #732
Yershova Y. (Thursday, 19 May 2022 12:30)
Stanislav Popik РТ-212 (Yershova) (Thursday, 19 May 2022 11:37)
Your Exam topic #5 “Early radio development” is well done.
· #731
Yershova Y. (Thursday, 19 May 2022 12:21)
Stanislav Popik РТ-212 (Yershova) (Thursday, 19 May 2022 11:36)
Your comment is thoughtful, thank you. The sentences with phrases are quite
interesting but the 2nd one is from our site examples. Be attentive and continue
working.
· #730
S.Mykhailiuk (Thursday, 19 May 2022 12:20)
To
Tomchishina Polina RT-212
Exam Topic # 6 (Turning the DTV signal.) Unfortunately. the same remarks. You
have to do it again to meet the appropriate requirements.
· #729
Yershova Y. (Thursday, 19 May 2022 12:19)
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 19 May 2022 11:34)
Your exam topics #2,6,3,4 are quite alright but yu have to mention the topics'
names as well.
· #728
Khotynskiy O, (RZ-212, Popovych) (Thursday, 19 May 2022 12:18)
Exam topic #9 (Functions of firewalls.)
First, let's define what a firewall is. A firewall is a network security device
that monitors incoming and outgoing network traffic and permits or blocks data
packets based on a set of security rules.
A firewall doesn't have many features, and to be precise it's main purpose is to
allow non-threatening traffic in and to keep dangerous traffic out.
Firewalls, and especially Next Generation Firewalls, focus on blocking malware
and application-layer attacks, along with an integrated intrusion prevention
system (IPS), these Next Generation Firewalls can react quickly and seamlessly
to detect and react to outside attacks across the whole network.
https://voca.ro/1jjb4eAv6Clf
1) invention relates
The invention relates to devices for producing ozone in an electrical discharge
and can be used for producing ozone generators.
Винахід відноситься до пристроїв для отримання озону в електричному розряді і
може бути використане для виробництва генераторів озону.
2) above the average
This rate is well above the average success rate of current candidates, which in
most cases do not even reach 20 per cent.
Цей показник значно перевищує середній показник успішності нинішніх кандидатів,
який у більшості випадків не досягає навіть 20 відсотків.
3) information management
Better information management and analysis benefits at-risk and affected
populations.
Краще управління інформацією та її аналіз приносить користь групі ризику та
постраждалим групам населення.
https://voca.ro/1Cole3t1iji2
· #727
Lebedeva E. (Thursday, 19 May 2022 12:14)
To Andrey Mashovets RZ-212 The comment is well done, but you should go on practising your pronunciation, you can train your reading with the help of Listen and Pronounce, which is on this page above the Guestbook chat.
· #726
S.Mykhailiuk (Thursday, 19 May 2022 12:14)
To Tomchishina Polina RT-212 Pls read the article in English not in Russian! Also post links to the sources in English into the Guestbook.Pls train your pronunciation and melody. Pls pay attention to the way you narrate your comment. UNACCEPTED.
· #725
Yershova Y. (Thursday, 19 May 2022 12:13)
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 19 May 2022 11:30)
Please, work regularly. Try to choose the topics which are more relevant to your
specialty. In general , not bad, but I can assess the task with the phrases only
with today's phrases.
· #724
Andrey Mashovets RZ-212(Lebedeva E.) (Thursday, 19 May 2022 12:10)
Today I’ve read the article “Patent talk: IBM's traffic signal timing turns
cognitive”.
This article is about the introduction of new traffic lights to be operated by
the AI.
The purpose of this article is to tell about a new invention that will get rid
of perpetual traffic jams thanks to a new traffic light system.
The idea would be that a computer would analyze the real-time flow of traffic
and then figure out the best way to manage the barrage of vehicles that clog up
our highways every single day.
I think this article will be useful for artificial intelligence developers.
https://voca.ro/1oAdjBKKONXo
https://techxplore.com/news/2018-05-patent-ibm-traffic-cognitive.html
1.above the average
The August jobs number was well above the average forecast of 143,000, and
showed a strong 29,000 increase in jobs in the service sector from July, to
185,000.
2.information management
Professor Feng Li, Chair of Information Management at Bayes Business School and
co-author, believes digital transformation is not just the privilege of digital
firms or new business start-ups.
3.invention relates to
The present invention relates generally to the field of traffic control, and
more particularly to controlling a traffic signal through cognitive computing
that incorporates real time data at an intersection.
https://voca.ro/1jUigpLMI16F
· #723
S.Mykhailiuk (Thursday, 19 May 2022 12:02)
To Stanislav Popik РТ-212 exam topic 2 is 73 points. Pls don’t make short sounds long. ( e.g. television, etc) . As to the phrases of the day practice, pls follow the pattern : a phrase itself with Ukrainian translation.Just 70 points. The comment is good. Keep on working hard and be patient.
· #722
Yershova Y. (Thursday, 19 May 2022 11:57)
Arina Omelchenko RE-211 (Yershova) (Thursday, 19 May 2022 11:29)
Your comment is reasonable and clear but rather long, mind that.The task with
the phrases is correct, thanks.
· #721
S.Mykhailiuk (Thursday, 19 May 2022 11:49)
To Revyakin A.(RT-212) Task1 is satisfactory. Pls stick to the pattern. Task2 is good. Try to make a long story short.
· #720
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 19 May 2022 11:46)
To
#707
I'm sorry, I accidentally sent you an exam topic that you've checked before.
Here is my examination topic, which I wanted to send immediately. Sorry again
Exam Topic #7
(The new advancement of color Television.)
Color TV is a television broadcast technology that allows you to transmit color
information so that the TV can display video images in color. The transmission
of color images using mechanical scanners dates back to the 1880s. The advent
and development of electronic scanning and displays have made it possible to use
entirely electronic systems. The first monochrome transmission standards were
developed before World War II, but the development of civil electronics was
halted during the war. The idea of using three monochrome images to create a
color image arose and was experimented with almost immediately after the advent
of black and white television.
https://voca.ro/1nYFF70nhA3M
· #719
S.Mykhailiuk (Thursday, 19 May 2022 11:45)
To Pishtoi Misha (PT-212) pls improve your pronunciation and melody. You’ve got 73 points for your activities. Keep on working hard.
· #718
S.Mykhailiuk (Thursday, 19 May 2022)
To Sergey Kyznyak RT-211 Just good.
· #717
Stanislav Popik РТ-212 (Yershova) (Thursday, 19 May 2022 11:37)
Exam topic #5 “Early radio development.”
The fact that such a phenomenon as electromagnetic waves became known quite by
accident. In 1820, the Danish physicist Hans Christian Oersted discovered the
connection between magnetism and electricity as a result of his experiment.
In 1895, the first apparatus appeared that received radio signals (through Morse
code). Its inventor was the Russian scientist Alexander Popov. But, I must say
that its authorship is in question. The main competitor is considered to be his
Italian entrepreneur and radio engineer Guglielmo Marconi. In 1896, he
discovered an identical apparatus, the operation of which was similar. He also
received the first patent in the radio industry.
https://voca.ro/1n9soGvOWkiC
· #716
Stanislav Popik РТ-212 (Yershova) (Thursday, 19 May 2022 11:36)
Today I have read the article "Researchers manage to generate attosecond pulses
at 100 kHz repetition rate" It's about Attosecond Laser Pulses. Light pulses
with a duration of one hundred attoseconds make it possible to study the
ultrafast dynamics of electrons. Usually, a two-laser pulse is used in the
experiment. The first excites the system, and the second takes a picture. One of
the most beneficial ways to observe system dynamics is REMI. And also one of the
factual studies is that laser pulses that control generation should have a pulse
duration as close as possible to a single light cycle.
I believe that the development of this technology will make it possible to
achieve great success in various fields of science and in everyday life.
https://phys.org/news/2022-03-attosecond-pulses-khz-repetition.html
https://voca.ro/1j7OqWMZtOuf
1)Above the average
The manufacturing sector continued to grow at an above-average rate in November.
2)information management
Lastly, technically the information management and information technology
requirements were compared.
3) the invention relates to
The invention refers to the new inventions of the last month.
https://voca.ro/1oThsxzjOuAY
· #715
Lebedeva E. (Thursday, 19 May 2022 11:35)
To Kolomiets Volodymir RZ 212 Thanks for an informative comment. Keep working.
· #714
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 19 May 2022 11:34)
Topic #2
Analog TV is outdated. Why is this happening? The quality of sound and picture
of analog TV is worse. Satellite TV gives a very high quality picture. HD
quality and stereo sound are the main advantages. In addition, the client can
receive a huge package of channels, including thematic ones. This means that the
viewer has the opportunity to watch their favorite shows and movies without
annoying advertising. In addition, many providers offer nice bonuses for
satellite television, for example, the ability to pause a movie, record the
broadcast or watch the program schedule directly over picture. Finally, thanks
to the variety of offers and tariff plans, you will be able to choose the most
advantageous price.
https://voca.ro/1aSrdQEoZHBp
Topic #6
DTV channels are preferred to watch in all countries due to their availability
and the quality of the transmitted picture. Most of them are broadcasted free,
and anyone can use them for their TV. In order for the TV to receive a signal
with this technology, its receiver must support DTV. Usually an external
receiver is used for this. Modern TV models have such receivers by default. The
transmitted signal is encoded in MPEG digital format and shown as a binary code.
Its advantage is that the weather does not affect the signal. The disadvantage
is that there are few channels and there is no way to choose your favorite
movies
https://voca.ro/1iCGUj9wdn0I
Topic #3
Radio is based on electromagnetic waves. Everyone knows this today. But humanity
guessed this at the end of the seventeenth century. English scientist Michael
Faraday in the late 1830s, announced the discovery of electromagnetic waves.
After that, another scientist from the UK, James Maxwell, completed of theory of
electromagnetic field. In April 1896, at a meeting of the Russian Physical and
Chemical Society, Popov, using a Hertz vibrator and a receiver of his own
design, transmitted a message to a distance of 250 m. This event was the basis
for the development of radio Since 1921, the transmission of music and voice
broadcasting has become possible.
https://voca.ro/1lkvKkNHtRo9
Topic #4
Commercial radio enables companies to offer their products to a huge number of
people. Advertisers can direct their ad to different regions to increase sales.
Also, listeners are researched to create commercials, types of goods offered.
Radio ads are adapted to specific times of the day. In order for it to be heard
by more specific customers to whom the advertisement was directed. The radio
company must also advertise itself in order to have more customers for
advertising and be interesting to listeners, since the number of listeners
determines the rating of the company. The radio station must have a frequency
license and an artist agreement under copyright law.
https://voca.ro/18pzecx1bY9h
· #713
Lebedeva E. (Thursday, 19 May 2022 11:33)
To Kravchenko Kostiantyn (RZ-212) Please, mind that management information systems это информационная система управления.
· #712
Moskalenko Kirill(RТ-212)(Yershova) (Thursday, 19 May 2022 11:30)
Today i have read the article "Students are told not to use Wikipedia for
research, but it's a trustworthy source". Many teachers, during school time,
forbade students to use Wikipedia, they do not trust this source. But, in
Wikipedia there is a policy of neutrality of reliability and knowledge, which
means that all information is accurate, the article on Wikipedia deserves more
attention. Teachers are confused only by the fact that Wikipedia can be edited
by any user, not just experts. But this does not make Wikipedia information
unreliable, because, for example, it is almost impossible to conduct
conspiracies there. I liked this article and I hope that many who doubted this
source will start to trust him.
https://voca.ro/1hVjR9j8AsPn
1) the invention relates to
The invention relates to a method for improving current conductivity
2)above the average
The level of their quality is much above the average
3. Information management
News tagged with information management.
https://voca.ro/12KDvtqeDwFk
Today, I have read the article called "Facebook to shut down face-recognition
system, delete data". This text tells us about Facebook's announcement about the
closure of the facial recognition system and the removal of all biometric data.
Over the past few weeks, there have been global changes at Facebook, which led
to the decision to remove the face identification software function. In many
countries, the police and other municipal services have already begun to
prohibit the use of facial recognition, as this system can be easily tricked. I
believe that removing this function is a very reasonable decision, because the
data of each person should be protected.
https://voca.ro/1f17fPjnfDXl
1) grouped into
The new study was grouped into five parts from one.
2) described above
All the experiments described above were carried out quite recently.
3) identify the areas
More people need to be connected to identify the areas of study.
https://voca.ro/1CVIJdWr3tYX
Today I have read the article. It tells us about tablets are growing as a core
enterprise tool, but they aren't replacing laptops. Enterprises typically use
tablets as single-use devices, running one particular app exclusively, or as a
multifunction tool. Many tablets primarily use wi-fi, which means that network
security and segmentation should be addressed so you know exactly which part of
the network the device is running on. IT leaders need a deep understanding of
the workforce and the kind of work they do before they determine whether to
approach tablets as single-use devices or multifunctional tools. I think this
article will be interesting everybody who want to know something new.
https://voca.ro/1fvj6Eb649pM
1) distinct from
Our new research is distinct from last year research.
2) examine more closely
We were able to obtain new samples to examine more closely these fumes.
3) estimate the effects of
Previously used different emission spectra to estimate the effects of radiation.
https://voca.ro/1drL84PtsKwG
· #711
Lebedeva E. (Thursday, 19 May 2022 11:29)
To Nikitina Anastasia RZ-212 The topic is written correctly, but you forgot to write the translation of the sentences with phrases.
· #710
Arina Omelchenko RE-211 (Yershova) (Thursday, 19 May 2022 11:29)
phrases of the day:
invention relates to
Invention relates to imaging systems and can be used to detect concealed
objects.
Ukraine improved the ranking indicators of standard of living and joined the
group of countries with a development above the average.
information management
It can be integrated seamlessly into other business processes and information
management scenarios.
https://voca.ro/1h8fVK2eVC40
Today I've read the article about the fact that adults, not children, prefer
friendly looking robots. As long as human-robot interactions are becoming more
and more prevalent we need to improve it as much as we can. Howbeit, appearance
plays significant role in human socialization and therefore the level of trust.
Sari Nijssen explored the situations in which both adults and children were
asked whether they'll help and get helped by robots with different appearance or
not. Surprisingly, children didn't care if robot is more alike human. They paid
attention to robots who had more human behavior and shared toys with them
willingly. On the other hand, adults preferred to help friendly looking robots.
However, they found these robots distrustful in a context of getting help. It
shows that the appearance of robots should depend on the area they are used at.
In my opinion, this research can help engineers boost the level of our trust to
robots.
https://phys.org/news/2021-11-adults-children-friendly-robots.html
https://voca.ro/1i4m06betQ3a
· #709
Yershova Y. (Thursday, 19 May 2022 11:24)
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 19 May 2022 11:08)
Read my remarks attentively to avoid making one and the same mistakes: the
article TELLS... The comment is not bad but should be more detailed. In the task
with the phrases the 2nd examplr doesn't meet the requirements.
· #708
S.Mykhailiuk (Thursday, 19 May 2022 11:21)
To Stanislav Popik РТ-212 . Hi, you are the only one who tries to speed me up. Be patient.
· #707
Yershova Y. (Thursday, 19 May 2022 11:18)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 19 May 2022 10:56)
I can't assess your Exam Topic #7 (The new advancement of color Television)
today as you you have already done it before.
· #706
Kravchenko Kostiantyn (RZ-212, Lebedeva E.) (Thursday, 19 May 2022 11:18)
Exam topic #16 (The Essentials of Information Protection)
The essentials of information protection forms a triad-like model. This triad
consists of three main components: confidentiality, integrity and availability.
The principle of confidentiality asserts that the information in question is
secure from any unauthorized access to it, and is kept secret.
Information integrity refers to the certainty that the information is not
tampered or degraded, during and after submission or while working with it.
Availability of information suggests not only that the information is available
to the authorized user when it is needed, but also that it doesn't compromise
any information security in the process of delivering information to the user.
Audio: https://voca.ro/1bDHyDeMn4yx
Phrases:
1) The manufacturing sector continued to grow at an above-average rate in
November.
Виробничий сектор продовжував рости з більш ніж середньою швидкістю в Листопаді
2) The present invention relates generally to the field of traffic control.
Даний винахід відноситься загалом до сфери контролю руху
3) Rick worked with management information systems.
Рік працював із системами інформаційного управління
Audio: https://voca.ro/1d27bdJ64naB
· #705
Yershova Y. (Thursday, 19 May 2022 11:16)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 19 May 2022 10:56)
The sentences with phrases are quite interesting but the 2nd one doesn't meet
the requirements. Your comment on the article is thoughtful, thank you.
· #704
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 19 May 2022 11:14)
Hello, you haven't checked my works #641 #642
· #703
S.Mykhailiuk (Thursday, 19 May 2022 11:09)
To Tomchishina Polina RT-212 Be patient. Do not manage my feedback as you are not the only one student in a group on line!
· #702
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 19 May 2022 11:08)
Today I have read an article that talks about the lack of bluetooth devices.
Researchers have found security flaws in more than 480 Bluetooth devices. In my
opinion, this is very important. Where are the manufacturers looking ?!
They can affect medicine because there are devices that work on bluetooth. Such
as pacemakers, blood glucose monitors, and drug delivery devices.
Many vendors have already developed patches for software development kits.
For better or worse, the threat cannot be launched over the Internet. I really
liked this article. You need to know about the threat in advance
https://voca.ro/12aNQXia2bQe
The August jobs number was well above the average forecast of 143,000
Chair of Information Management at Bayes Business School
The present invention relates generally to the field of traffic control
https://voca.ro/1ngmGnd8Ub8I
· #701
S.Mykhailiuk (Thursday, 19 May 2022 11:07)
To Moskalenko Kirill(РТ-212) Just 72 points for all 4 tasks. Mind a good conclusion that comes out of the contents!
· #700
Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 19 May 2022 11:02)
Hello, please check my comments : #632 #633 #636 #637
· #699
S.Mykhailiuk (Thursday, 19 May 2022 11:01)
To Moskalenko Kirill(РТ-212) just good for both exam topics. Be attentive: “his”> “ITS”.
· #698
Povoznikov Artem RZ-212 (Popovych) (Thursday, 19 May 2022 10:59)
Exam topic #8 (Passwords and their drawbacks)
There are several disadvantages of passwords:
1) Users, due to their own inexperience, often use passwords that can be easily
guessed. The most commonly used password is a derivative of the client ID.
Sometimes it is the identifier itself, which is very predictable. Users take as
a password the name of their dog, the name of their own created website, the
name of the hockey team they support, a phrase that is often used. It is not
difficult for a skilled attacker to crack such a password.
2) The password can be simply intercepted or peeped in the process of entering
it.
3) The password can simply be knocked out of the owner. After all, sometimes
violence can be used to gain access to important information.
The main disadvantage of password authentication is the possibility of
transferring the password to another person, which happens quite often. And if
in personal life the user suffers from such actions, then in corporate networks
this poses a financial, legal and reputational threat to the company itself.
· #697
Yershova Y. (Thursday, 19 May 2022 10:58)
Eugene Chervony RT-212(Yershova) (Thursday, 19 May 2022)
Thank you for your effective work with all tasks, well done. Pay attention to
the pronunciation: data.
· #696
Povoznikov Artem RZ-212 ( Popovych) (Thursday, 19 May 2022 10:57)
Today i have read the article: Impact of big data in predictive analytics toward
technological development in cloud computing.
This article tells about group of scientists who are considering the impact of
big data. They note that one of the biggest problems faced by those who will
work with big data is that although some of them may be well structured, most of
them are only partially structured and huge volumes are completely unstructured.
Storing, managing and analyzing all this data is one of the biggest problems
facing computer technology today. Although cloud computing provides many tools
necessary for distributed use, there is still a long way to go before we can
really fully cope with big data. However, distributed storage and massive
parallel processing of big data in the cloud can become the basis on which the
future of big data and predictive analysis can be built. The team looks at many
of the existing approaches that use historical data and machine learning to
build predictions of future scenario outcomes based on modern big data sources.
"The main goal is to turn the cloud into a scalable data analysis tool, not just
a data warehouse and technology platform,"- team writes.
Text:https://techxplore.com/news/2022-05-impact-big-analytics-technological-cloud.html
Audio: https://voca.ro/16lgOwfUso7b
https://techxplore.com/news/2022-05-impact-big-analytics-technological-cloud.html
1)
Above the average
The manufacturing sector continued to grow at an above-average rate in November.
2)
information management
Lastly, technically the information management and information technology
requirements were compared.
3)
Information management
Lastly, technically the information management and information technology
requirements were compared.
Audio: https://voca.ro/16VLK6z2S8v8
· #695
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 19 May 2022 10:57)
Exam Topic #1 (Cable television)
Саble televisіon systems come in two types. In the system of the first type, the
conversion of the transmitted image into a digital signal and the reverse
conversion of the digital signal into an image are carried out directly in the
converters and signal-light. In all links of the image and sound transmission
path, information is transmitted in digital form. Such systems are still under
development. In cable TV systems of the second type, the analog signal received
from the sensors is converted into a digital form, transmitted, and then again
acquires an analog form in the receiver, in which it is fed to the video
monitor. This uses existing analog TV signal sensors and signal-to-light
converters in television receivers.
https://voca.ro/1od2JoS2p8vy
· #694
S.Mykhailiuk (Thursday, 19 May 2022 10:57)
To Pishtoi Misha (PT-212) I think that experiments are of importance, it’s a drive to prove smth or decline. Just 67 point for your activities. Pls live and learn.
· #693
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 19 May 2022 10:56)
Exam Topic #7 (The new advancement of color Television)
Color television is a television technology that allows you to transmit images
in natural colors. All analogue color television systems intended for
terrestrial broadcasting complied with the principle of compatibility, ie color
television could be received and reproduced by both black and white and color
television receivers. Modern standards for analog color television provide for
the transmission of a brightness signal and two color, still maintaining
compatibility with black and white receivers. The bandwidth occupied by color
signals may be limited by the reduced sensitivity of the human eye to the
clarity of the color image.
https://voca.ro/1kYD8zkUe6zk
· #692
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 19 May 2022 10:56)
1.
Аbove the average
The continental United States experienced the warmest spring on record this
year, with temperatures far above the average over the past century, government
scientists said Thursday.
2. Invention relates
Invention opens the door to safer and less expensive X-ray imaging.
3. Information management
News tagged with information management.
https://voca.ro/1lYERwuFUYsh
Today I have read the article “New algorithm approach paves the way for larger,
more complex metalenses”. Metalens would need to be scaled up significantly
before being used commercially, meaning the number of nanopillars would be in
the billions. This technique will enable new metasurface designs that could
impact virtual or augmented reality, unmanned vehicles, and machine vision for
on-board systems and satellites. To overcome these limitations, the team taught
a computer program the physics of designing metasurfaces. I believe that the
metasurface opens up a new way to change the future of virtual reality.
https://voca.ro/1eZjtENAWFZp
https://phys.org/news/2022-05-algorithm-approach-paves-larger-complex.html
· #691
Kolomiets Volodymir RZ 212 (Lebedeva) (Thursday, 19 May 2022)
Today i have read the article "Researchers determine optimum pressure to improve
the performance of lithium metal batteries". This article is about a new method
how to produce optimal performance. Scientists say that using lithium metal to
replace the graphite for battery anodes is the ultimate goal for part of the
battery R&D field. For example, lithium metal battery-powered electric vehicles
would have twice the range of lithium-ion battery-powered vehicles, for the same
battery weight. But even it is not the best way, because of its short lifespan
and potential safety hazards, specifically short circuits caused by lithium
dendrite growth. But as they said, this inventions would have to be retooled for
this new technique to be applied.
I found this article quite interesting, as there i got new knowledge about
techical process. So, i like this article.
https://techxplore.com/news/2021-10-optimum-pressure-lithium-metal-batteries.html
https://voca.ro/12XXIQuMM7mS
1) above the average
But the average rate of economic expansion will remain considerably above the
average of western Europe
Але середні темпи економічного зростання залишаться значно вищими за середні в
Західній Європі
2) invention relates
The invention relates to educational and recreational shooting complexes
Винахід відноситься до навчально-оздоровчих стрілецьких комплексів
3) information management
Lastly, technically the information management and information technology
requirements were compared
Нарешті, технічно було порівняно вимоги до управління інформацією та
інформаційних технологій
https://voca.ro/1e1uUG2F9Ef4
· #690
Timophey Sipin RZ-212(Popovych) (Thursday, 19 May 2022 10:53)
Today I have read the text titled «Diversity, streaming reshape video games for
a new generation»
In which we are told about video games, or rather about their progress and
impact on people. The text also says that at the beginning of video games helped
us to unify age, gender, etc. But unfortunately, today games have only increased
these problems (or rather the problem of feminism )
In my opinion, video games still occupy a rather significant place in the life
of people today and even help many with some of their personal problems.
Therefore, I am sure that video games will develop and will soon solve problems
at the expense of gender equality.
https://techxplore.com/pdf523856743.pdf
https://voca.ro/120P7l9dFjnX
1) above the average
In new studies, the pressure level sensor shows values above the average.
2) the invention relates to
The invention refers to the new inventions of the last month.
3) information management
Information management is a very important industry in recent times.
https://voca.ro/1hcd8mRko
· #689
Timophey Sipin RZ-212(Popovych) (Thursday, 19 May 2022 10:51)
Exam Topic #6
First history fact of television in Ukrainian SSR was in 1925, when the talented
experimental physicist Boris Grabovsky managed to make the first television
broadcast in the former USSR and throughout the world. In 1939 the first
telecast was made in Kyiv. 1969, color television appeared in Ukraine. The
uniqueness of the design was that it was the first in the world to be all-welded
and unparalleled. At present, the transmission and distribution network consists
of 57 powerful TV stations. This system provides viewers with programs
throughout Ukraine. It's very cool to realize all the way that television has
come a long way in Ukraine.
https://voca.ro/1ePaujicksks
· #688
Eugene Chervony RT-212(Yershova) (Thursday, 19 May 2022 10:47)
Exam Topic #8 (Benefits of Satellite TV)
Streaming television takes data and in homes, particularly in rural areas, too
much streaming can be a strain on your Internet resources. Many rural homes use
satellite Internet as their connectivity type. While great for many functions
including streaming, if there are too many devices streaming at once, you may
experience connectivity issues. Furthermore, in homes with many devices,
streaming can drain your monthly data leading to overages or throttling.
Subscribing to satellite television services gives your home more ways to stay
entertained without putting a strain on your Internet service.
https://voca.ro/1dMRqUbKFz8f
· #687
Eugene Chervony RT-212(Yershova) (Thursday, 19 May 2022 10:47)
Exam Topic #6 (Commercial use of radio)
Commercial radio provides brands with a way to speak to millions of people via a
medium they trust. Radio advertising also stretches beyond the traditional 30
second ad, with longer ads, sponsorship, branded content and innovate digital
solutions increasingly providing advertisers with new and more creative ways to
get their message to potential customers. Advertisers can direct their message
to specific demographics, psychographics, geographic areas, and around events
and genres in a market. Radio advertisements are tailored to particular times of
day to ensure you're reaching your desired audience at precisely the right time.
https://voca.ro/1ex6FhcJos5v
· #686
Eugene Chervony RT-212(Yershova) (Thursday, 19 May 2022 10:46)
Today I have read the article "Accelerating the pace of machine learning". It
says that data is hurled at a mathematical model like grains of sand skittering
across a rocky landscape. Some of those grains simply sail along with little or
no impact. But some of them make their mark: testing, hardening, and ultimately
reshaping the landscape according to inherent patterns and fluctuations that
emerge over time. Problems in distributed optimization appear in various
scenarios that typically rely on wireless communications and privacy are
fundamental challenges. Researchers are working on a new method. Its purpose is
to transmit far fewer pieces of data without degrading the overall impact. I
think it would help the advancement of artificial intelligence.
https://techxplore.com/news/2022-05-pace-machine.html
https://voca.ro/17RgiOjiM687
Phrases:
1) above the average
In new studies, the pressure level sensor shows values above the average.
2) the invention relates to
The invention refers to the new inventions of the last month.
3) information management
Information management is a very important industry in recent times.
https://voca.ro/1hcd8mR559N2
· #685
Pishtoi Misha (PT-212) S.Mykhailiuk (Thursday, 19 May 2022 10:45)
Today I have read an article about signal ranges.
This article is very difficult for me to understand. Before the satellite could
begin its journey, in the first half of the project, equipment had to be
developed and built. It is not clear to me why they are needed if every detail
interferes with the transmission of the Q and W frequencies. There are many
problems in creating a distributor and a receiver. I think a lot of the
experiments that have been done are not worth the cost. I see no point in such
projects.
Vocaroo: https://voca.ro/1bK8Y5052VUq
The August jobs number was well above the average forecast of 143,000
Число рабочих мест в августе значительно превысило средний прогноз в 143 000
Chair of Information Management at Bayes Business School
Кафедра управления информацией в бизнес-школе Bayes
The present invention relates generally to the field of traffic control
Настоящее изобретение в целом относится к области управления дорожным движением
https://voca.ro/1ngmGnd8Ub8I
· #684
Yershova Y. to PT-212, PE-211 (Thursday, 19 May 2022 10:45)
Dear students! The lesson has started, I am waiting for your reviews and audio recordings, exam topics as well. Do not forget about Phrases of the day practice. Good luck!
· #683
Lebedeva E. (Thursday, 19 May 2022 10:45)
To Artem Kotliarov RZ-212 Thanks for your active work.
· #682
Nikitina Anastasia RZ-212(Lebedeva E.) (Thursday, 19 May 2022 10:44)
Exam topic #17 (Password as a general technique of secrecy)
A password is your personal key to a computer system. Passwords help to ensure
that only authorized individuals access computer systems. Passwords also help to
determine accountability for all transactions and other changes made to system
resources, including data. Passwords are a critical part of information and
network security. Passwords serve to protect against unauthorized access, but a
poorly chosen password could put the entire institution at risk. There are few
general recommendations about creating passwords: 1) Passwords should be long
and unique; 2)Old passwords should not be re-used.
https://voca.ro/1kV6VTck6lDd
1.invention relates
The invention relates to subsurface coal gasification.
2.information management
Sound information management is crucial for any policy to work.
3.above the average
His interest in study was somewhat above the average but not wholly unusual.
https://voca.ro/1nWfDCapC7Fn
· #681
Artem Kotliarov RZ-212 (Lebedeva E.) (Thursday, 19 May 2022 10:43)
1)
1. information management
Information management is the entire range of technical, operational, and social
functions of a system that is used to handle information. - Управління
інформацією — це весь спектр технічних, операційних і соціальних функцій
системи, яка використовується для обробки інформації.
2. invention relates
The invention relates to anti-dazzle devices for both polarized and
non-polarized radiation. - Винахід відноситься до пристроїв проти засліплення як
поляризованого, так і неполяризованого випромінювання.
3. above the average
His interest in study was somewhat above the average, but not wholly unusual. -
Його інтерес до навчання був дещо вище середнього, але не зовсім незвичайний.
https://voca.ro/1fQpAlo4PT6R
2) Today I have read the article “Researchers design 'socially aware' robots
that can anticipate and safely avoid people on the move”.
A team of researchers led by University of Toronto Professor Barfoot is using a
new strategy that allows robots to avoid colliding with people. To decide where
to move, the robot makes use of Spatio-temporal Occupancy Grid Maps. These are
3D grid maps maintained in the robot's processor. The robot choses its future
actions by processing these maps through existing trajectory-planning
algorithms.
In my opinion, thanks to this study, processor robots will be able to predict
where people and other objects will go in crowded rooms.
https://techxplore.com/news/2022-05-socially-aware-robots-safely-people.html
https://voca.ro/1jXOEFRdvkoQ
Exam topic #20 (Principles of information protection)
The main legal principles of information protection are the principles of
legality, priority, ownership and economic feasibility. The principle of
legality is expressed in the need for legal regulation of this area of social
relations. From the principle of the priority of international law over domestic
law, it follows that the object of classification cannot be information that a
state makes public or communicates in accordance with conventions or agreements.
The principle of ownership and economic expediency gives the right to
information owners to take measures to protect this information, as well as
evaluate its consumer properties.
https://voca.ro/13DM2HFi3fYn
· #680
Kate Kholodova (RZ-212, Popovych) (Thursday, 19 May 2022 10:41)
Exam topic "Software firewall"
Properly configured software firewalls are a very useful additional layer
of security we can add to the hosts residing on our networks. Such firewalls
generally contain a subset of the features we might find on a large firewall
appliance but are often capable of very similar packet filtering and stateful
packet inspection. We often find the rulesets of such applications expressed
in terms of the particular applications and ports allowed to send and receive
traffic on the various network interfaces that exist on the host. Such softwares
can range from the relatively simple versions that are built into and ship with
common operating systems, such as Windows, to large versions intended for use on
corporate networks that include centralized monitoring and the capability for
considerably
more complex rules and management options.
Audio: https://voca.ro/1h7CRHda8jju
Today I've read the article, which is titled "Astronomers may have discovered
the first planet outside of our galaxy". This article tells us about how Rosanne
Di Stefano of the Center for Astrophysics in Cambridge, Massachusetts and her
colleagues with the help of NASA's Chandra X-ray Observatory, opened up a new
window to search for exoplanets at greater distances than ever before. This new
result was based on transits, events in which the passage of a planet in front
of a star blocks some of the star's light and produces a characteristic dip.
Scientists looked for X-ray transits in three galaxies beyond the Milky Way
galaxy, using both Chandra and the European Space Agency's XMM-Newton and after
looking through 443 different systems in 3 galaxies, they only found 1 single
exoplanet candidate. The authors will search the archives of both Chandra and
XMM-Newton for more exoplanet candidates in other galaxies.
Article: https://phys.org/news/2021-10-astronomers-planet-galaxy.html
Audio: https://voca.ro/12kUeLjRsdzz
1. above the average
But the average rate of economic expansion will remain considerably above the
average of western Europe.
2. invention relates
The invention relates to educational and recreational shooting complexes.
3. information management
Lastly, technically the information management and information technology
requirements were compared.
Audio ph: https://voca.ro/17QloPCh2KNL
· #679
Lebedeva E. (Thursday, 19 May 2022 10:40)
To РЗ-212 The lesson has started and I am waiting for your exam topics and work with phrases of the day.
· #678
Vorobyova E. to Chabanenko from РЗ-213 (Thursday, 19 May 2022 10:22)
It’s good, but don’t omit the articles (AN erosion) and mind - “to consist OF”. Continue working and good luck.
· #677
Moskalenko Kirill(РТ-212)(Mykhailiuk) (Thursday, 19 May 2022 10:16)
Topic # 9
In Ukraine, the first acquaintance with television occurred on February 1, 1939.
The first TV-sets were mechanical, they used the so-called Nipkow discs. They
had only one advantage: his programs, transmitted in the middle wave range,
could be received over a vast territory. However, the quality of the mechanical
television picture was worse. A new page of Ukrainian electronic television was
opened only on November 6, 1951 in Kyiv, on Khreshchatyk Street, a new
television center was officially put into operation, next to it there was a
radio transmission tower. In those days, television, compared with today, was
quite simple. There were only 3 TV channels.
https://voca.ro/1m3xyFezufLg
Topic #1
From a technical point of view, the difference between terrestrial, cable and
satellite television is the way the signal is delivered. Cable TV provides a
better picture that is not interfered with by radio interference. An almost
unlimited number of channels can be transmitted over a cable, especially fiber
optic. Depending on the scale and technical features of networks, cable
television helps to establish different types of communication: between
individuals, between groups of people, between communities. Advertising is much
cheaper than on any broadcast studio. Issues of Ukrainian cable systems are
still common: lack of software, poor technical base, unresolved issues of
organization, financing, copyrights.
https://voca.ro/1ixBhBAlhfmS
· #676
Yershova Y. (Thursday, 19 May 2022 10:15)
Vlasov Vadim RZ-211 (Yershova) (Thursday, 19 May 2022 10:03)
I appreciate your comment, it’s quite informative and clear.
· #675
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 19 May 2022 10:15)
1.above the average-вище середнього;
This rate is well above the average success rate of current candidates, which in
most cases do not even reach 20 per cent.-Цей показник значно перевищує середній
показник успішності нинішніх кандидатів, який у більшості випадків не досягає
навіть 20 відсотків.
2.information management-управління інформацією;
Sound information management is crucial for any policy to work.-Грамотне
управління інформацією має вирішальне значення для функціонування будь-якої
політики.
3.invention relates-винахід відноситься;
The invention relates to near infrared weak optical signals transmitted via
fiber-optic communication lines.-Винахід відноситься до слабких оптичних
сигналів ближнього інфрачервоного випромінювання, що передаються по
волоконно-оптичних лініях зв'язку.
https://voca.ro/13fa1QBoMFyz
Today I've read the article about accelerating the pace of machine learning and
I want to share some interesting thoughts about it.The state of machine learning
was described as erosion in the article cause of the data that are similar to
grains can simply sail with no impact or can make the mark.So , to improve the
situation the goal which consists in hurling far fewer grains of data without
degrading the overall impact should be reached."Gradient Descent method with
Sparsification and Error Correction" was considered as the successful solution.
So, through the use of this method communication requirements are significantly
reduced and the overall perfomance increased.
https://voca.ro/15mBSPGaj4F3
https://techxplore.com/news/2022-05-pace-machine.html
· #674
Moskalenko Kirill(РТ-212)(Mykhailiuk) (Thursday, 19 May 2022 10:14)
I've read an article "New AI method makes self-driving vehicles better drivers".
Basically, the study was focused on combining neural learning with common sense.
This way, the AI can, for example, understand that an object that goes behind
another object does not disappear. This is totally necessary for putting a
self-driving car into the real world traffic. Plus, apparently, before this
people weren't able to understand reasonings for the AI's decisions, which is
also pretty, I guess, alarming. I know almost nothing about how these things
work, but it's great that AIs are getting closer to be able to fit into the real
world.
https://voca.ro/1k3NyyV4vSNk
1) the invention relates to
The invention relates to a method for improving current conductivity
Винахід відноситься до способу підвищення провідності струму
2)above the average
The level of their quality is much above the average
Рівень їх якості значно вище середнього
3. Information management
News tagged with information management.
Новини з тегами керування інформацією.
https://voca.ro/12KDvtqeDwFk
Today I have read the article "Nimble robotic arms that perform delicate surgery
may be one step closer to reality ". This text tells us about research from
Northeastern that has worked to eliminate hard, jerky movements in robotic arms
to make them graceful and nimble enough. If they can reach a high level, then
these discoveries may one day allow doctors to remotely perform operations on a
remote battlefield, or help bomb defusers safely remove an explosive device.
Their project also involves the creation of remote-controlled robotic
manipulators. I think, this article will be interesting to people who like
robots.
https://voca.ro/1m3v9zmR9PMW
1) distinct from
Our new research is distinct from last year research.
Наше нове дослідження відрізняється від минулорічного.
2) examine more closely
We were able to obtain new samples to examine more closely these fumes.
Ми отримали нові зразки для більш ретельного вивчення цих випарів.
3) estimate the effects of
Previously used different emission spectra to estimate the effects of radiation.
Раніше використовувалися різні спектри випромінювання для оцінки впливу
радіації.
https://voca.ro/1drL84PtsKwG
· #673
Lebedeva E. (Thursday, 19 May 2022 10:13)
To Kapeliushnyi Vladyslav (RZ-21) and Dovzhenko Ilya RZ-211 Well done, thank you.
· #672
Arina Omelchenko RE-211 (Myhayliuk S.L.) (Thursday, 19 May 2022 10:13)
phrases of the day:
invention relates to
Invention relates to imaging systems and can be used to detect concealed
objects.
Винахід відноситься до систем формування зображення і може бути використано для
виявлення прихованих предметів.
above the average
Ukraine improved the ranking indicators of standard of living and joined the
group of countries with a development above the average.
Україна поліпшила показники в рейтингу рівня життя і увійшла до групи країн з
розвитком вище середнього.
information management
It can be integrated seamlessly into other business processes and information
management scenarios.
Її можна легко інтегрувати в інші бізнес-процеси та сценарії управління
інформацією.
https://voca.ro/1h8fVK2eVC40
Today I've read the article about the research that shows that people learn to
use brain-computer interfaces the same way as other motor skills. Probs analyze
brain waves and detect certain patterns they were designed to recognize. To
discover the legitimacy between human brain and computer, the research team at
the University of Washington asked seven volunteers who had already had brain
probes implanted for long term study to control the path of a cursor. When they
began to master mind-controlling it, the entire network began to quit as it
happens during the process of learning something that requires motor skills.
Even though, people don't get data coming in from their limbs, I think that this
research can be helpful and promising in studying human brain and developing
devices for people with disabilities.
https://medicalxpress.com/news/2013-06-people-brain-computer-interfaces-motor-skills.html
https://voca.ro/1gyKG4ht6wXV
· #671
Vorobyova E. to Chernetskiy from РЗ-213 (Thursday, 19 May 2022 10:10)
Well done, only mind the articles “a/the” (THE research, AN agricultural machinery…) Keep on working at the exam topics.
· #670
Vorobyova E. to Shpychka from РЗ-213 (Thursday, 19 May 2022 10:04)
As a whole, it’s good. I approve of your regular work. But remember - “IN FUTURE”. Go on working.
· #669
Sergey Kyznyak RT-211, (Myhayliuk S.L.) (Thursday, 19 May 2022 10:03)
Exam Topic #6
First history fact of television in Ukrainian SSR was in 1925, when the talented
experimental physicist Boris Grabovsky managed to make the first television
broadcast in the former USSR and throughout the world. In 1939 the first
telecast was made in Kyiv. 1969, color television appeared in Ukraine. The
uniqueness of the design was that it was the first in the world to be all-welded
and unparalleled. At present, the transmission and distribution network consists
of 57 powerful TV stations. This system provides viewers with programs
throughout Ukraine. It's very cool to realize all the way that television has
come a long way in Ukraine.
https://voca.ro/1ePauGFjicsB
· #668
Vlasov Vadim RZ-211 (Yershova) (Thursday, 19 May 2022 10:03)
Today I've read the article "Storing energy in red bricks". This article tells
about a red brick device. The Brick has been used in walls and buildings for
thousands of years, but rarely has been found fit for any other use. Now,
chemists have developed a method to make or modify "smart bricks" that can store
energy. Really, walls and buildings made of bricks already occupy large amounts
of space, which could be better utilized if given an additional purpose for
electrical storage.
In my opinion this is a very interesting and cool idea for progress in
construction and technology.
https://techxplore.com/news/2020-08-energy-red-bricks.html
https://voca.ro/15aeZ4EDUJrm
above the average
The manufacturing sector continued to grow at an above-average rate in November
information management
Information Management at Bayes Business School and co-author, believes digital
transformation
invention relates
The present invention relates generally to the field of traffic control
https://voca.ro/1hoedCOYobS9
· #667
Pishtoi Misha (PT-212) S.Mykhailiuk (Thursday, 19 May 2022 10:02)
Topic #3
Cable television.
It is probably impossible to imagine human life without television at the
present stage. The most nontrivial ideas, ranging from SMART technologies to
interactive TV, are brought into reality for the convenience of watching TV
programs. Firstly, the main advantage of this kind of broadcasting is that users
have a wide range of functionality, which will make watching favorite programs
pleasant and comfortable. In addition, there is an opportunity to display a
program guide on the TV screen and integration with the most popular social
networks is provided. Secondly, the wide technical potential. The picture
impresses with its quality, especially when HD-channels are broadcast. The
picture is clear, has no glare or other interference. For me, satellite
television simply postponed the death of television.
https://voca.ro/1me7fjVQHNRk
Exam Topic #4 Radio equipment helping to save on bills.
Radio equipment helps to rescue on bills. For example: Radio Frequency
Identification. A technology for the unique identification of physical objects
using radio tags. The radio tag contains a microchip that stores the detection
detector, as well as a way for the antenna to convey information to special
radio receivers. This technology optimizes the development of diseases in a wide
area of the patient, which achieves the installation of labels on a specific
structure and tracking the route of its movement. This allows you to manage
efficient inventory down to a single item. It also allows you to monitor the
cost of electricity and more.
https://voca.ro/19mfsrinZnHf
· #666
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Thursday, 19 May 2022 10:00)
The
article I have read today is "How to meet demand in bacterial 'factories'". The
article raises the problem of the constant lack of bacteria for various needs.
There aren't enough factories to meet demand, and therefore, factories of such
bacteria work almost non-stop. But researchers from the University of Bristol
have found a way to solve this problem. Its simple mathematical model will help
the designers of these synthetic constructs take into account the battle for
resources, leading to designs that reduce the load on bacterial factories.
https://phys.org/news/2016-05-demand-bacterial-factories.html
https://voca.ro/1ofa0rNmqPMb
1) Improvement of information management and sharing methods is an urgent issue.
Удосконалення методів управління інформацією та обміну є актуальною проблемою.
2) The present invention relates to the class of small arms.
Даний винахід відноситься до класу стрілецької зброї.
3) Credit program, mill positions pay hourly wages and salaries above the
average in the region.
Кредитна програма, посади заводів оплачують погодинну оплату праці вище
середньої по області.
https://voca.ro/17oN0NJZF9Z1
· #665
Yershova Y. (Thursday, 19 May 2022 09:58)
Sofia Gilenko РЗ-211 (Yershova) (Thursday, 19 May 2022 09:56)
Your comment is clear and full. I appreciate your opinion.
· #664
Sofia Gilenko РЗ-211 (Yershova) (Thursday, 19 May 2022 09:56)
Today I've read the article "Researchers Train Computers to Predict the Next
Designer Drugs."
UBC researchers have trained computers to predict the next designer drugs before
they hit the market, a technology that could save lives.
Law enforcement agencies seek to identify and regulate new versions of dangerous
psychoactive drugs such as bath salts and synthetic opioids, while clandestine
chemists work to synthesize and distribute new molecules with psychoactive
effects similar to classic drugs.
In my opinion, this article is very important, because this technology will help
law enforcement agencies around the world in the future.
https://techxplore-com.translate.goog/news/2021-11-drugs.html?_x_tr_sl=auto&_x_tr_tl=ru&_x_tr_hl=ru&_x_tr_pto=nui,op
1.invention relates
The invention relates to subsurface coal gasification.
2.information management
Sound information management is crucial for any policy to work.
3.above the average
His interest in study was somewhat above the average but not wholly unusual.
https://voca.ro/1hRcFyzCo0kj
https://voca.ro/1bD1FBxPAPZv
· #663
Chernetskiy Nikita.RZ-213. (Vorobyova) (Thursday, 19 May 2022 09:55)
Today i have read the article "Farm vehicles are now heavier than most
dinosaurs: Why that's a problem". This arctile tells us about research on the
weight of agricultural machinery and its significance on the planet's ecosystem.
This study showed that the pressure of machinery affects the density of the
soil, which in turn leads to chronic soil compaction, which greatly affects
people's lives, because this action can lead to flooding, reduce crop and plant
growth. I believe that this can be equated with global climate change, constant
forest fires and floods, and we need to fight this problem here and now, before
it's too late.
Article:https://phys.org/news/2022-05-farm-vehicles-heavier-dinosaurs-problem.html
Audio:https://voca.ro/1g4C823Tfase
1)A new study
And a new study has just been concluded which will give me the ability to take
no personal responsibility in this decision.
2)off the land
Someone was very keen to have them off the land.
3)urban landscapes
Today it would seem that urban landscapes that stimulate our memory are
disappearing.
· #662
Yershova Y. (Thursday, 19 May 2022 09:54)
Burlak Yevhen (RZ-211. Yershova Y.) (Thursday, 19 May 2022 09:32)
Thanks for your comment. It's informative and interesting. Please, choose the
topics which are more relevant to your specialty. The task with phrases has been
wrongly done, you should check today's phrases.
· #661
Shpychka Olecksandr/ RZ-213 (Vorobyova E. V.) (Thursday, 19 May 2022 09:54)
Article: https://phys.org/news/2011-01-3d-room.html
Audio: https://voca.ro/16SHjMrCr2Rx
Today i have read the article: "Bringing 3D to the operating room".
From the article we learn about the desire of scientists to introduce a 3D
system into the operational process. Many doctors have been performing
operations for many decades and have vast experience in this matter. Scientists
offer safer operations using a 3D image-to-image overlay system. This will help
to better control the actions of the doctor during the operation.
In my opinion, such a system will increase the chance of success in complex and
long operations in the future.
Phrases of the day:
1)Development of new information management tools
2)The invention relates to a microscope
3)That's two degrees above the average of 90 for the day
Audio: https://voca.ro/1eUVq0YbVdlM
· #660
Dovzhenko Ilya RZ-211 (Lebedeva) (Thursday, 19 May 2022 09:50)
Today I have read an article about a new algorithm that can determine a person's
mental state from the photos they post on social networks. This program is very
useful, for example, to psychologists who can help the victim cope with all the
problems at the initial stages. The research team spent two years working on a
deep learning model that identifies five needs, including the use of multimodal
data such as images, text, biography, and geolocation. I believe that this
system will be able to help people in need of help, to solve their problems.
https://techxplore.com/news/2022-05-algorithm-unhappiness-social-networks.html
https://voca.ro/1oPSQ1QGPWz2
1)invention relates
Invention relates to medical working process of visualisation.
Винахід відноситься до медичного робочого процесу візуалізації.
2)above the average
Storage temperature of the fruit should not be above the average room.
Температура зберігання плодів не повинна бути вище середньої кімнатної.
3) information management
It can be integrated seamlessly into other business processes and information
management scenarios.
Її можна легко інтегрувати в інші бізнес-процеси та сценарії управління
інформацією.
https://voca.ro/1ky2QbkD5qzN
· #659
Pushkash Maxim (RZ-212 Popovich) (Thursday, 19 May 2022 09:48)
Exam topic #6 (what is the difference between software and hardware firewall)
The main difference between a hardware firewall and a software firewall is that
A software firewall is a software application placed on a computer, while a
hardware firewall is embedded in physical devices such as routers. Software
firewalls secure the PCs on which they are installed, whereas hardware firewalls
secure the whole network. Hardware firewalls can be set to use proxy services to
filter data packets, but software firewalls do not use proxy services.
Voice: https://voca.ro/19H4h0CR2Fzb
· #658
Vorobyova E. to Yakimova from РЗ-213 (Thursday, 19 May 2022 09:42)
Your exam topic is written correctly. But you should have voiced it. Remember this and next do it obligatory.
· #657
Yakymova Anna / RZ-213 (Vorobyova E. V.) (Thursday, 19 May 2022 09:41)
Exam topic 12
What is a Hardware Firewall?
A hardware firewall is a physical appliance that is deployed to enforce a
network boundary. All network links crossing this boundary pass through this
firewall, which enables it to perform inspection of both inbound and outbound
network traffic and enforce access controls and other security policies.
These firewalls, which contain both the hardware and software features necessary
to enforce a network boundary, can offer a variety of different networking and
security features, including URL filtering, an intrusion prevention system
(IPS), and even Wi-Fi support.
In my mind, a router may provide the protection you need.
https://voca.ro/14bND5ye2n1o
· #656
Yakymova Anna / RZ-213 (Vorobyova E. V.) (Thursday, 19 May 2022 09:39)
Exam topic 12
What is a Hardware Firewall?
A hardware firewall is a physical appliance that is deployed to enforce a
network boundary. All network links crossing this boundary pass through this
firewall, which enables it to perform inspection of both inbound and outbound
network traffic and enforce access controls and other security policies.
These firewalls, which contain both the hardware and software features necessary
to enforce a network boundary, can offer a variety of different networking and
security features, including URL filtering, an intrusion prevention system
(IPS), and even Wi-Fi support.
In my mind, a router may provide the protection you need.
· #655
Lebedeva E. (Thursday, 19 May 2022 09:39)
To Kuleshov Konstantin(RZ-211) The comment is not bad, but there are some mispronounced words: oscillator |ˈɒsɪleɪtə|, microscope |ˈmaɪkrəskəʊp| and so on.
· #654
Lebedeva E. (Thursday, 19 May 2022 09:34)
To Ilinchuck Vladislav RZ-211 Pay attention that you don't need definite article 'the' of you use pronoun 'this' - This the article is about... Also, you should pracise your reading more.
· #653
Revyakin A.(RT-212)Mykhailiuk (Thursday, 19 May 2022 09:33)
https://techxplore.com/news/2022-05-nonprogrammers-world-software-scientist-no-code.html
Despite all the fears, the frequencies will still above the average.
Незважаючи на всі побоювання, частоти все одно будуть вище середнього.
The invention relates to high-precision measuring instruments.
Винахід відноситься до високоточних вимірювальних приладів.
Finally, there are no problems in the field of information management.
Нарешті, немає проблем у сфері управління інформацією.
Today I've read the article which tells us about programming without code.
Learning traditional programming languages requires limited skills and a large
amount of knowledge, which in turn
intimidates a large number of novice programmers. And that's why the so-called
way of programming "no-code" was created.
With the growing popularity of this method, he began to occupy a fairly large
niche in programming, because absolutely
anyone who wants to start creating websites can easily do this without knowing
any language. ,,No-code,, based on visual
cues, what you see is what you get.Everything is extremely simple. This method
is especially popular in our time because
the demand for sites is growing every day.
I believe that this way of programming has a huge potential and in the near
future it will be able to occupy many more
areas in programming.
https://voca.ro/13MzlRsjPWYz
· #652
Kuleshov Konstantin(RZ-211)(Lebedeva) (Thursday, 19 May 2022 09:33)
Today I've read the article 'New nanomechanical oscillators with record-low
loss'. Scientists have long studied mechanical resonators. Recently, they found
that a regular polygon suspended at its vertices supports oscillating modes
around the perimeter with almost no loss. So they decided to make resonators in
this form. As a result, a device can measure oscillations of almost the same
force as a modern atomic force microscope.Precision force sensing is an
important application of nanomechanical resonators.The resonators are compact
and not quite large, which will allow them to be used in many places. I think
it's very important because it will help in studying weak forces and quantum
effects.
https://phys.org/news/2022-05-nanomechanical-oscillators-record-low-loss.html
1)Better information management and analysis benefits at-risk and affected
populations.information management
2)His interest in study was somewhat above the average but not wholly
unusual.above the average
3)The invention relates to subsurface coal gasification.
https://voca.ro/18p4SuHjSwz8
· #651
Burlak Yevhen (RZ-211. Yershova Y.) (Thursday, 19 May 2022 09:32)
Today i have read the article "Farm vehicles are now heavier than most
dinosaurs: Why that's a problem". This arctile tells us about research on the
weight of agricultural machinery and its significance on the planet's ecosystem.
This study showed that the pressure of machinery affects the density of the
soil, which in turn leads to chronic soil compaction, which greatly affects
people's lives, because this action can lead to flooding, reduce crop and plant
growth. I believe that this can be equated with global climate change, constant
forest fires and floods, and we need to fight this problem here and now, before
it's too late.
https://phys.org/news/2022-05-farm-vehicles-heavier-dinosaurs-problem.html
https://voca.ro/1hKgsNu0gGR5
1)A new study
And a new study has just been concluded which will give me the ability to take
no personal responsibility in this decision.
2)off the land
Someone was very keen to have them off the land.
3)urban landscapes
Today it would seem that urban landscapes that stimulate our memory are
disappearing.
https://voca.ro/12dwvJBpCvQS
· #650
Vorobyova E. to Mitriev from РЗ-213 (Thursday, 19 May 2022 09:31)
You have already sent this exam topic. It’s correct. Choose another topic for your preparation for the exam. Good luck.
· #649
Lebedeva E. (Thursday, 19 May 2022 09:30)
To Kovalzhi Andrey RZ-211 and Ivan Zaritskiy RZ-211 Well done, thank you.
· #648
Vorobyova E. to Siglyanyk from РЗ-213 (Thursday, 19 May 2022 09:22)
In general, good work. But please, use the articles “a/the” correctly, e.g. “…I have had an opportunity to read THE article about…”. Don’t forget to write your exam topics. It’s obligatory.
· #647
Ilinchuck Vladislav RZ-211 (Lebedeva) (Thursday, 19 May 2022 09:22)
Today I have read the article"Astronauts may one day drink water from ancient
moon volcanoes". This the article is about a new research from CU Boulder
suggests that volcanoes may have left another lasting impact on the lunar
surface: sheets of ice that dot the moon's poles.The new study adds to a growing
body of evidence that suggests that the moon may be awash in a lot more water
than scientists once believed. The researchers drew on computer simulations, or
models, to try to recreate conditions on the moon long before complex life arose
on Earth. They discovered that ancient moon volcanoes spewed out huge amounts of
water vapor.
In my opinion , this article is very interesting for everyone , especially for
people who love deep space and new technologies . I think this technology will
become very useful soon .
1)https://phys.org/news/2022-05-astronauts-day-ancient-moon-volcanoes.html
2)https://voca.ro/16Meri6Baw10
above the average
His interest in study was somewhat above the average but not wholly unusual.
Його інтерес до навчання був дещо вище середнього, але не зовсім незвичайний.
invention relates
The invention relates to educational and recreational shooting complexes.
Винахід відноситься до навчально-оздоровчих стрілецьких комплексів.
information management
Sound information management is crucial for any policy to work.
Грамотне управління інформацією має вирішальне значення для функціонування
будь-якої політики.
3)https://voca.ro/1erJKQhJaSbw
· #646
S.Mykhailiuk (Thursday, 19 May 2022 09:22)
To To students from subgroup RT-211. & RE-212 Welcome back to our today’s activities. Pls focus on specialty’s exam topics and phrases of the Day practice. Pls follow the patterns set: the length, conclusion, links and voice record msgs links to be posted into the Guestbook. Wish you all the best.
· #645
Mitriev Vitaliy RZ 213 (Vorobyova E.V) (Thursday, 19 May 2022 09:22)
Exam topic: Price War A price war describes a series of successive price cuts for goods or services caused by intense market competition. In the short term, price wars are won by consumers who purchase a familiar good or service at a lower price. Often, price wars harm participating companies, as they cause a decrease in marginal profit, which may raise the question of leaving the company from the market. In the event of a competitor leaving the market, the monopoly supplier can again “raise” the price, and even higher than those that were before the start of the price war, which negatively affects customers who are already deprived of the opportunity to go to the competitor who left the market. Link to voice: https://voca.ro/1aV8ZZmPK9WJ
· #644
Ivan Zaritskiy RZ-211 (Lebedeva) (Thursday, 19 May 2022 09:21)
Today I have read the article “New approach allows for faster ransomware
detection”.Researchers have developed a new approach for implementing ransomware
detection techniques, allowing them to detect a broad range of ransomware far
more quickly than using previous systems. Ransomware is a type of malware. When
a system is infiltrated by ransomware, the ransomware encrypts that system's
data—making the data inaccessible to users. The people responsible for the
ransomware then extort the affected system's operators, demanding money from the
users in exchange for granting them access to their own data. In my opinion,
this is a good detection system, that can decrease the number of hacked systems
with ransomware.
https://techxplore.com/news/2022-05-approach-faster-ransomware.html
https://voca.ro/1nBOorkWIWjx
above the average
His standard of living on the farm was above average and he could employ
farmworkers to help him with the improvements.(Його рівень життя на фермі був
вище середнього, і він міг найняти фермерів, щоб допомогти йому з покращенням.)
information management
The consultants stressed the importance of improved information
management.(Консультанти наголосили на важливості вдосконалення управління
інформацією.)
inventions related
They have patented two inventions related to underwater photography.(Вони
запатентували два винаходи, пов’язані з підводною фотографією.)
https://voca.ro/1jaU5wgBRZPP
· #643
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Thursday, 19 May 2022 09:19)
Today I’ve read an article called “How AI is shaping the cybersecurity arms
race”. AI is well suited to finding patterns in big amounts of data. There are
two main ways AI is bolstering cybersecurity. First, AI can help automate many
tasks that a human would handle manually. These include detecting unknown
workstations, servers, code repositories and other hardware and software.
Second, AI can help detect patterns within large quantities of data that human
analysts can’t see. For example, AI could detect the key linguistic patterns of
hackers posting threats in the dark web and alert analysts. Despite the benefits
of AI, we might be worried about how much we can trust automated systems.
In my opinion, researches in using AI in cybersecurity is a big step, which can
improve the protection of data.
https://techilive.in/how-ai-is-shaping-the-cybersecurity-arms-race/
https://voca.ro/1fLDbJrDfOhm
Daily Phrases:
1. information management
Information management is a very important industry in recent times.
В последнее время управление информацией это очень важная индустрия.
2.above the average
The new AI system invented by FKQW scientist team is showing results that are
way above the average.
3.the invention relates to
In addition, the invention relates to a method for producing said composition
and to a treatment method.
Кроме того, изобретение относится к способу получения этого сплава и к способу
лечения.
https://voca.ro/18KnbhskYqXT
· #642
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 19 May 2022 09:19)
Exam topic #2 “Turning the DTV signal.”
Turning the DTV signal - DTV (digital television) means the transmission and
processing of a television signal in digital form. The television signal
includes both video and audio. A digital waveform is an encoding of information
in MPEG format when the entire signal is represented as a sequence of "0" and
"1". Such signal transmission is not observed due to interference, which usually
manifests itself when the signal is exposed to the environment in the form of
snow, dashes and other small interference. This is a modern type of signal that
is actively used everywhere at the moment. The connection speed is faster than
the analog signal, but inferior to the satellite signal. I believe this is an
alternative television signal.
https://voca.ro/17SeVtF5QlAY
· #641
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 19 May 2022 09:17)
Today I have read the article called "Electric gains in battery performance"
This article is about zinc ion batteries. They will allow stationary storage of
energy, which promises to be cheaper, safer and more environmentally friendly
than lithium-ion batteries. Previously, this type of battery drained very
quickly, but now scientists have developed a new combination of electrolyte and
electrode that has improved several aspects of their performance. These
batteries will make it possible to switch to ecological energy sources and move
away from fossil fuels.
Given that the cost of creating this battery is low, and the performance is
higher, I believe that these batteries will replace not only lithium-ion, but
also graphite, which is so much talked about.
https://voca.ro/1np6CtJnykdc
https://techxplore.com/news/2021-08-electric-gains-battery.html
1)invention relates
The invention relates to auxiliary means for shooting
Винахід відноситься до допоміжних засобів для стрільби
2)above the average
And the level of their quality is much above the average
А рівень їх якості значно вище середнього
3) information management
Better information management and analysis benefits at-risk and affected
populations
Краще управління інформацією та її аналіз приносить користь групі ризику та
постраждалим групам населення
https://voca.ro/1oqCLHzeAHWb
· #640
Yershova Y. (Thursday, 19 May 2022 09:15)
Botsaniuk Ivan RZ-211 (Yershova Y.) (Thursday, 19 May 2022 09:09)
The review is quite good but rather long, it must be around 100 words.
· #639
Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 19 May 2022 09:15)
Prhases of Day
1. information management : https://voca.ro/1dfCCI0fPlzY
However, improvement of information management and sharing methods is an urgent
issue.
Проте вдосконалення методів управління інформацією та обміну є актуальною
проблемою.
2. invention relates : https://voca.ro/185VswIgLEVk
The present invention relates generally to the field of traffic control, and
more particularly to controlling a traffic signal through cognitive computing
that incorporates real time data at an intersection.
Даний винахід загалом відноситься до галузі управління трафіком, а більш
конкретно до керування сигналом дорожнього руху за допомогою когнітивних
обчислень, які включають дані в реальному часі на перехресті.
3. above the average : https://voca.ro/14BkM2QeQdTM
Excluding one-time items, earnings per share were 82 cents in the April-June
quarter, well above the average analyst estimate of 77 cents.
Без урахування одноразових статей, прибуток на акцію становив 82 центи в
кварталі квітня-червня, що значно вище середньої оцінки аналітика в 77 центів.
Article: https://techxplore.com/news/2022-05-deepfake-algorithms-success.html
Audio: https://voca.ro/1hqWukbduwj9
Today, i have had an opportunity to read an article about new ways to detect
deepfakes.
Honestly, there is a very big problem in the world of using deep fakes, because
it can usually be used intentionally to manipulate people.
And that`s why scientists have decided to find a new algorithm that will make it
easier to recognize deepfake.
As a result, they have been able to improve detection accuracy by as much as
10%, which is great.
But scientists have noted that the new algorithm works so effectively only with
photos, but they are trying to do everything possible to improve this system.
I believe all these studies are very important nowadays, as there are many
examples of how manipulating people can cause chaos around the world.
· #638
Lebedeva E. (Thursday, 19 May 2022 09:15)
To Mykola Zhmurak RZ-211 Not bad, but let's correct: This article is about A touchscreen which IS built into the table....
· #637
Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 19 May 2022 09:13)
Exam Topic #3 (Early radio development.)
The first radio receiver was patented in 1893 by the Serbian scientist N. Tesla.
In Ukraine, the first civil radio communication was established 110 years ago -
on December 30, 1902, on the line Kherson. Thanks to the radio, the word
"hacker" appeared - the so-called crackers of secret passwords at radio
stations. The Eiffel Tower owes its "life" to the radio itself. It was built
specifically for the World Exhibition of 1889, and after 20 years it was planned
to be dismantled. However, when the radio was opened, it was decided to install
antennas on it for greater range and signal strength. This saved the current
symbol of Paris. As a result, radio has not disappeared even with the advent of
the Internet. The radio has become possible to listen to online without any
receivers.
https://voca.ro/1b38gNkVlGQF
https://radio-repair.ru/istoriya-radiosvyazi-i-razvitiya-raciy/
· #636
Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 19 May 2022 09:12)
Exam Topic # 6 (Turning the DTV signal.)
Digital TV DTV is an audiovisual television transmission using digital coding
signals, unlike the previous analog television technology, which used analog
signals. At the time of its development, it represented the first significant
evolution of television technology since color television in the 1950s. Modern
digital television is transmitted in high definition with higher resolution than
analog deficit television. It usually uses a wide aspect ratio. This allows more
economical use of the deficit of the radio spectrum space. A transition from
analog to digital broadcasting began around 2000. Thus, different digital
broadcasting standards have been adopted in different parts of the world.
https://voca.ro/198PkcixH3Oe
https://cifrovoetv-rf.ru/dtv-what-is-it-on-tv-how-to-set-up-and-use/
· #635
Yershova Y. (Thursday, 19 May 2022 09:12)
Vasilev A.O RZ-211 Yershova Y. (Thursday, 19 May 2022 09:04)
Your comment on the article is not bad, but you have to choose the topics which
are relevant to your specialty. Please, do not insert quotes in your comment.
· #634
Vorobyova E. to Rudko from РЗ-213 (Thursday, 19 May 2022 09:11)
Your comments on the articles are meaningful and informative. They are grammatically correct. Your exam topic about cloud computing is written and voiced correctly too. Thank you and good luck.
· #633
Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 19 May 2022 09:11)
To
comment #231
Hello, have you credited the previous two exam topics to me? Or do I need to
correct them?
· #632
Tomchishina Polina RT-212 (Mykhailiuk S.) (Thursday, 19 May 2022 09:10)
1.
Аbove the average
Вище середнього
The continental United States experienced the warmest spring on record this
year, with temperatures far above the average over the past century, government
scientists said Thursday.
Континентальні Сполучені Штати пережили найтеплішу весну за всю історію цього
року, температура значно вища за середню за минуле століття, повідомили в четвер
урядові вчені.
2. Invention relates
Винахід відноситься
Invention opens the door to safer and less expensive X-ray imaging
Винахід відкриває двері для безпечнішого та менш дорогого рентгенівського
зображення.
3. Information management
Управління інформацією
News tagged with information management.
Новини з тегами керування інформацією.
Today I have read the article entitled “Photonic technology enables real-time
calculation of radio signal correlation”. Researchers have developed a new
analog photonic correlator that can be used to detect an object transmitting a
radio signal. It can be useful for detecting cell phones, signal jammers or
various tracking tags. The device is much simpler than today's analog or digital
correlators and uses standard telecommunications components. The correlator
works like a photonic processor, using fiber optic components to convert two RF
signals into optical ones. I think that in the near future, researchers will do
further work on miniaturization and full integration of the correlator.
https://voca.ro/1kQcrsLfcxPv
https://phys.org/news/2022-03-photonic-technology-enables-real-time-radio.html
· #631
Botsaniuk Ivan RZ-211 (Yershova Y.) (Thursday, 19 May 2022 09:09)
Comment
Today I have read the article “Efficient protocol to secure a user's private
information when algorithms use it to recommend content”. Algorithms that
recommend products work by using personal information like our past purchases
and browsing history to generate tailored recommendations, so the sensitive
nature of such data makes preserving privacy extremely important. Researchers
developed a privacy-preserving protocol that is so efficient it can run on a
smartphone over a very slow network. Their technique safeguards personal data
while ensuring recommendation results are accurate. In addition to user privacy,
their protocol minimizes the unauthorized transfer of information from the
database, known as leakage, even if a malicious agent tries to trick a database
into revealing secret information. So, in my opinion, this protocol would be
useful because it helps to prevent user's data leakage.
https://techxplore.com/news/2022-05-efficient-protocol-user-private-algorithms.html
https://voca.ro/1hEpYGzVIgu4
Phrases of the day
1)above the average
And the level of their quality is much above the average.
2)invention relates
More specifically, the invention relates to an electrical connector for
electrical association with a printed circuit board.
3) information management
Information management is generally an enterprise information system concept,
where an organization produces, owns and manages a suite of information.
https://voca.ro/1kfGHtZqD3ZE
· #630
Mykola Zhmurak RZ-211(Lebedeva) (Thursday, 19 May 2022 09:08)
Today i have read the article titled "Turning the tables into touchscreens".
This article is about touchscreen which built into the table. Scientists used a
synchronized projector and camera to produce a touchscreen-like interface on a
flat surface. This work may lead to portable projection systems that can be used
to create large interactive displays nearly anywhere. Also this invention can be
used to produce a touch display on any flat surface.
Article - https://techxplore.com/news/2021-08-tables-touchscreens.html
Vocaroo - https://voca.ro/1mpZVGtNuVLE
Phrases :
1) information management
Better information management and analysis benefits at-risk and affected
populations.(Краще управління інформацією та її аналіз приносить користь групі
ризику та постраждалим групам населення.)
2) above the average
His interest in study was somewhat above the average but not wholly
unusual.(Його інтерес до навчання був дещо вище середнього, але не зовсім
незвичайний.)
3) invention relates
The invention relates to anti-dazzle devices for both polarized and
non-polarized radiation.(Винахід відноситься до пристроїв проти засліплення як
поляризованого, так і неполяризованого випромінювання.)
Vocaroo - https://voca.ro/1fXP6jgjyilF
· #629
Yershova Y. (Thursday, 19 May 2022 09:07)
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 19 May 2022 09:02)
Your review is interesting and informative, but too long, it must be around 100
words, mind that.
· #628
Igor Rudko (RZ-213) (Vorobyova E. V.) Home-work (Thursday, 19 May 2022 09:05)
Article:
https://techxplore.com/news/2021-06-machine-learned-human-emotions-autonomous-vehicles.html
Audio: https://voca.ro/1iY8kg7AweX9
Today I have read the article: "Invention uses machine-learned human emotions to
'drive' autonomous vehicles". Some scientists developed a new technology for
autonomous systems that is responsive to human emotions based on machine-learned
human moods. By the way, his solution, "Adaptive Mood Control in Semi or Fully
Autonomous Vehicles," has earned a very competitive utility patent from the
United States Patent and Trademark Office for FAU. In my opinion, one of the
major issues with the technology of fully or semi-autonomous vehicles is that
they may not be able to accurately predict the behavior of other self-driving
and human-driving vehicles.
Phrases
Audio: https://voca.ro/1n8XrYehqgv2
1) The scientists tested the energy-saving performance of their invention
related to using simulations of climate data covering all populated parts of the
globe - Вчені перевірили енергозберігаючу ефективність свого винаходу, пов'язану
з використанням моделювання кліматичних даних, що охоплюють усі населені частини
земної кулі
2) Through clustering analysis of users’ past behavior data, the information
management can show the user behavior expectation, which is then used to
evaluate the trust in users’ behavior. - Завдяки кластерному аналізу даних про
минулу поведінку користувачів, управління інформацією може показати очікування
поведінки користувачів, які потім використовуються для оцінки довіри до
поведінки користувачів.
3) Manufacturing is losing its biggest draw for low-wage workers—a stable career
path to above the average wages— at a time when it’s trying to hire more of
those people than previously - Виробництво втрачає найбільшу привабливість для
працівників з низькою заробітною платою — стабільний кар’єрний шлях до зарплати
вище середньої — у той час, коли воно намагається найняти більше цих людей, ніж
раніше.
· #627
Misha Donenko RZ-211 Lebedeva (Thursday, 19 May 2022 09:05)
Today I’ve read the article “Instagram and teens: How to keep your kids safe”
The goal was to protect children's online privacy by requiring websites and
online services to disclose clear privacy policies and obtain parental consent
before collecting personal information about their children. To comply, social
media companies routinely prohibited children under 13 from subscribing to their
services, although it is widely documented that children subscribe anyway, with
or without parental permission. Facebook says it has added many safety measures
and features over the years to improve teens' wellbeing on Instagram, such as
mental health support for people looking for common hashtags related to eating
disorders or self-harm. The company also tested hiding "likes", which means that
when you post something, if you're a young person, you don't have to worry about
how many people will like your post or see it. Parents shouldn't forbid their
child to surf the Internet for a long time. Children love to be aware of all the
events that happen on the Internet, and this gives them a sense of power.
https://techxplore.com/news/2021-10-parent-instagram-teens.html
https://voca.ro/19mEZqBWWXJY
1.above the average
Often, the average food intake of pregnant and lactating mothers was far
below the average intake of the adult male.
Часто середнє споживання їжі вагітними та годуючими матерями було набагато нижче
середнього споживання дорослого чоловіка.
2.invention relates
The invention relates to subsurface coal gasification.
Винахід відноситься до підземної газифікації вугілля.
3.information management
Better information management and analysis benefits at-risk and affected
populations.
Краще управління інформацією та її аналіз приносить користь групі ризику та
постраждалим групам населення.
https://voca.ro/1oVU7VpED2rO
· #626
Vasilev A.O RZ-211 Yershova Y. (Thursday, 19 May 2022 09:04)
Today I've read an article titled, this article about"Traveling fires pose an
underestimated risk to open building spaces"
The article tells about traveling fires which are distributed which big speed.
But researchers are currently trying to correct these mistakes.
Dr. Egle Rackauskaite, who led the work while at Imperial's Department of
Mechanical Engineering, said: "Despite the lack of advanced studies, traveling
fires have been observed in real incidents—for example, in the World Trade
Centre towers after the 11 September 2001 attacks. However, these fires have
rarely been studied on an experimental basis. At the same time, some modern
structures have open-plan spaces between 4 and 50 times larger than the largest
compartment fire experiments conducted to date."
I think it's right that researchers are trying to protect society from the
threat of traveling fires.
https://techxplore.com/news/2021-10-pose-underestimated-spaces.html
https://voca.ro/1991MdQmDC9h
1)invention relates
The invention relates to auxiliary means for shooting
https://voca.ro/1aEEYBmIV7WM
2)above the average
And the level of their quality is much above the average
https://voca.ro/1byJ05O8MYBk
3) information management
Better information management and analysis benefits at-risk and affected
populations
https://voca.ro/1jH0cUU0KzdK
· #625
Igor Rudko (RZ-213)(Vorobyova E. V.) (Thursday, 19 May 2022 09:03)
Article:
https://techxplore.com/news/2022-05-algorithms-historical-accurate-population-demographic.html
Audio: https://voca.ro/158SFtzsMnN0
Today I have read the article: "Algorithms trained on historical data make more
accurate forecasts of population changes than demographic modeling". Machine
learning algorithms can be used to make accurate forecasts about population
changes. In fact, there is work that demonstrates that the best of the available
algorithms trained on historical data works better than conventional demographic
modeling based on periodic census data. Understanding population dynamics and
forecasting how a population might change in years to come is a critical part of
policymaking and planning for healthcare, education, housing, transport, and
infrastructure. In my opinion, ten-year census cycles are useful, but they do
not give a fine-grained account of a changing population.
Phrases
Audio: https://voca.ro/13HSpNtkuI2j
1) The manufacturing sector continued to grow at an above the average rate in
November, as the impact of back-to-back hurricanes over the summer recedes -
Обробний сектор продовжував зростати вищими за середні темпи в листопаді,
оскільки вплив ураганів, що відбувалися влітку, спадає,
2) Information management, and analysis of all of this data is one of the
greatest challenges facing computing today. - Управління інформацією та аналіз
усіх цих даних є однією з найбільших проблем, що стоять перед обчислювальною
технікою сьогодні.
3) HeadFi is an invention related to regular headphones but with a small plug-in
adapter that turns a regular headphone into a sensing device. - HeadFi - це
винахід, пов'язаний зі звичайними навушниками, але з невеликим вставним
адаптером, який перетворює звичайні навушники в сенсорний пристрій.
Exam topic - An isolated virtual machine.
Audio: https://voca.ro/1ev8yqG9Nuw2
The popularity and widespread adoption of cloud computing have resulted in
extensive and intensive use of virtualization technology. By the way, it enables
the consolidation of servers and a multitude of user machines into a very small
set of physical servers, by replacing the physical machines with virtual
machines, running on the same physical servers. In fact, a software layer is
used to enable the sharing of hardware between the different users. In my
opinion, this leads to anxiety about the security of their data and working
environment for the users, as these are situated only one software layer apart
from those belonging to the other users.
· #624
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 19 May 2022 09:02)
1.
Today I have read the article 'A strategy to discern between real and virtual
video conferencing backgrounds'.
Right now, most video-conferencing platforms now also allow users to use virtual
backgrounds, so that they don't need to show their home environments to their
co-workers and to reduce the risk of distractions. While being able to change
the background increases users' privacy, fake backgrounds can also be used with
malicious intent, to give the impression of a false location, for instance
suggesting that a user is at the office when he is actually at home. For this
measure, Researchers at Sabanci University, Florida International University,
and University of Padua have recently developed a tool that could be used to
distinguish between real and virtual backgrounds in video-conferencing
platforms. Their method, introduced in a paper pre-published on arXiv, was found
to successfully discern between real and "artificial backgrounds" in two
distinct and common attack scenarios.
A good method, in my opinion, which allows to uncover those, who use background
method to lazily hide the fact of absence from their workplace.
2. https://techxplore.com/news/2022-05-strategy-discern-real-virtual-video.html
3. https://voca.ro/12Dyw6cmhU3d
4. 1) above the average
The temperature has been above the average recently
2) invention relates
The invention relates to a substitute material for rehabilitating articular
cartilage and a preparation method thereof
3) information management
An information management system allows to manage the distribution of
information
5. https://voca.ro/19N5hH842VeZ
· #623
Daniil Dragin (RZ-211 Lebedeva E.) (Thursday, 19 May 2022 09:00)
1)Today I have read the article ''Algae-powered computing: Scientists create
reliable and renewable biological photovoltaic cell''.This article is about a
new invention in the field of renewable energy. Scientists have been able to
create a mechanism that uses algae as an electricity generator. Algae naturally
collects energy from the sun through photosynthesis. This device naturally
harvests the sun's energy through photosynthesis. The system is made from
common, inexpensive, and largely recyclable materials. The scientists also
expected the system to stop working in just a few weeks, but it kept working.
In my opinion, the development of such technologies is a good prospect for the
electric power industry, because there are already many devices that consume a
small amount of electricity and it is not advisable to power them with
lithium-ion batteries.
2)https://techxplore.com/news/2022-05-algae-powered-scientists-reliable-renewable-biological.html
3)https://voca.ro/13Liujva6PeR
4)
1)information management
Better information management and analysis benefits at-risk and affected
populations.
Краще управління інформацією та її аналіз приносить користь групі ризику та
постраждалим групам населення.
2)invention relates
The invention relates to subsurface coal gasification.
Винахід відноситься до підземної газифікації вугілля.
3)above the average
His growth curve is well above average.
Його крива зростання значно вище середнього.
5)https://voca.ro/15ZvlcK4FhI7
· #622
Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 19 May 2022 08:59)
Exam Topic #2 (Cable television)
Cable television is one of the options for transmitting a signal (both
television and radio signals) over a distance. Both analog and digital format
transmission is possible. For the first time in the world, cable television
appeared in the spring of 1948 in Mahanoy City, Pennsylvania, USA. A modern
cable television network includes a head station, trunk communication channels,
sub-trunk lines and home distribution networks. Cable TV has some advantages
over digital and satellite: higher signal quality, high noise immunity, no
problems with signal transmission in cities with dense multi-storey buildings.
https://voca.ro/1eM5VKkeKIXh
· #621
Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 19 May 2022 08:58)
Exam Topic #1 (First radio speeches)
In 1904, English radio engineer John Fleming invented the first radio tube. By
the early 1920s, the development of radio tubes had reached a level sufficient
for the advent of radio broadcasting. While most experimenters were trying to
create something similar to telephone technology, others were trying to reach a
wider broadcast coverage. The first experimental radio station was created by
Charles Herrold in 1909. Gerrold placed the transmitter and antenna on the roof
of his radio engineering college. Initially, only dots and dashes were
transmitted. But already in 1912, weekly broadcasts of phonographic records
began.
https://voca.ro/187p5zaAwKJt
· #620
Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 19 May 2022 08:58)
Today I have read the article "Engineers show how tungsten oxide can be used as
a catalyst in sustainable chemical conversions". It says that engineers rely on
catalysts for a vast array of applications from food manufacturing to chemical
production, so finding efficient, environmentally friendly catalysts is an
important avenue of research. The project used computational simulations to
understand how tungsten oxide interacts with hydrogen at the molecular level and
the findings were verified through lab experimentation. I think that new
research could lead to the creation of new, sustainable catalysts based on
tungsten oxide and similar compounds.
https://phys.org/news/2022-05-tungsten-oxide-catalyst-sustainable-chemical.html
https://voca.ro/15ZAypxUl6x7
Phrases:
1) above the average
In new studies, the pressure level sensor shows values above the average.
У нових дослідженнях датчик рівня тиску показує значення вище середнього.
2) the invention relates to
The invention refers to the new inventions of the last month.
Винахід відноситься до нових винаходів останнього місяця.
3) information management
Information management is a very important industry in recent times.
Управління інформацією є дуже важливою галуззю останнім часом.
https://voca.ro/1hcd8mR559N2
· #619
Yershova Y. to PЗ-211 (Thursday, 19 May 2022 08:53)
Good morning! The lesson has started, I am waiting for your reviews and audio recordings. Do not forget about Phrases of the day. Good luck!
· #618
Lebedeva E. (Thursday, 19 May 2022 08:52)
To РЗ-211 Good morning! The lesson has started and I am waiting for your comments on the article and phrases of the day. Good luck
· #617
Vorobyova E. to Yakimova from РЗ-213 (Thursday, 19 May 2022 08:47)
There are no mistakes in your commentary on the article. So, your home work is interesting and correct. I am thankful to you.
· #616
Vorobyova E. to РЗ-213 (Thursday, 19 May 2022 08:45)
To
Mitriev and Chabanenko
Your exam topics are well done. Thank you and continue writing them.
· #615
Yakymova Anna/RZ-213(Vorobyova E.V.) (Wednesday, 18 May 2022 21:47)
I'm
going to write a few words about the article I have recently read. The article
is headlined 'Chinese developers expose data belonging to Android gamers' .The
Chinese developers of popular Android games have disclosed information belonging
to users through an unsecured server.The vpnMentor's cybersecurity team revealed
EskyFun as the owner of the server, which has made public on the network.EskyFun
is the developer of Android games.The team says that EskyFun has introduced
alarming tracking and permissions settings. The database was more than needed
for mobile games. The records included various confidential information. For
example, phone numbers, mobile device event logs, email addresses, device
information, etc .
In my view, many cyberattacks have been caused by people not caring about their
privacy.
https://voca.ro/16zA7QPYWJiy
https://www.zdnet.com/article/chinese-developers-expose-data-belonging-to-android-gamers/
· #614
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Wednesday, 18 May 2022 20:36)
Exam topic #2(Various security techniques)
There are many tools and techniques that allow people to provide data security.
Formal protection tools include physical safety equipment like different
mechanical, electric and electronic mechanisms. For example, noise generators,
surge protectors, scanning radio and many other devices can cut off the data
leak. Software is one more tool which is used for solving problems connected to
information security support. DLP-system is the example of comprehensive
solution and its functions include prevention of data leak, reformation of
information and redirection of its flow. Implementation of cryptographic and
steganographic protective methods provides secure network transmission. To sum
up, above-mentioned techniques are formal guards and along with formal ones
including legislative, institutional, moral and ethical provide data security.
https://voca.ro/1kPtma1UscvE
Exam topic #3(Different approaches to secrecy and their defects)
Secrecy is the property of the object entity of which represents a state or
official secret and is hidden from unauthorized persons. Special technical,
administrative and operational measures are used in order to provide integrity
of secrecy. To the degree of secrecy all objects, documents and reports are
divided into three groups. First group includes confidential information and
along with the top secret data which represent the second group are related to
state secret. Third group includes secret reports which are accounted for
official secret. One of the defects is the imbalance between secrecy and
transparency. In some situations there is a need to look at reports to check how
public resources are being wasted, for example. So, one of the important aims of
the country is to find the balance between national security interests and
transparency.
https://voca.ro/14DV6AVejVol
· #613
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Wednesday, 18 May 2022 17:04)
Exam topic #1 (Concept of “Privacy”)
Present-day realities with all possible threats people are facing with lead to
globalizing the concept of “Privacy”. Privacy means the ability of a person to
determine for themselves when, how, and to what extent personal information
about them is shared with or communicated to others. The information can include
one's name, location, contact information, or online or real-world behavior.
Data privacy is very important as it is considered a fundamental human right to
a free society, like the right to free speech. Organizations use data protection
practices to let people trust that their personal data will be safe. So,
everyone has the right to keep personal information private and this is not just
about moral principles but about the law which guards this right.
https://voca.ro/1hUko45CVHvX
· #612
Mitriev Vitaliy RZ-213 (Vorobyova E.V.) (Homework) (Wednesday, 18 May 2022 14:47)
Exam topic: Price War A price war describes a series of successive price cuts for goods or services caused by intense market competition. In the short term, price wars are won by consumers who purchase a familiar good or service at a lower price. Often, price wars harm participating companies, as they cause a decrease in marginal profit, which may raise the question of leaving the company from the market. In the event of a competitor leaving the market, the monopoly supplier can again “raise” the price, and even higher than those that were before the start of the price war, which negatively affects customers who are already deprived of the opportunity to go to the competitor who left the market. Link to voice: https://voca.ro/1aV8ZZmPK9WJ
· #611
Lebedeva E. (Tuesday, 17 May 2022 18:51)
To Kapeliushnyi Vladyslav (RZ-211) The topic is written correctly, but you should practise reading more as there are mistakes in reading such words as characters, rights, unauthorized, access, disadvantages....
· #610
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Tuesday, 17 May 2022 17:44)
Exam topic #8
Password - a secret word or a sequence of characters intended to confirm a
person or his rights. Passwords are used to protect information from
unauthorized access. Passwords have many disadvantages: they are easy to steal,
but difficult to remember, and manage them sometimes exhausting. Many users
believe that the password should be as long and complex as possible, although in
reality it even increases the risk. With a complex password, users usually want
to use it for multiple accounts, making them even more vulnerable.Because the
less you enter the password, the better.
https://voca.ro/1i1fQGA1GKJZ
1) The prevailing view has been that the indigenous population had neither
territory, power nor economic resources.
Переважала думка, що корінне населення не має ні території, ні влади, ні
економічних ресурсів.
2) She devoted attention to practical problems in energy and the environmen.
Вона приділила увагу практичним проблемам в енергетиці та екології.
3) Yale has identified the development of quantum materials as a priority
research area.
Єльський університет визначив розробку квантових матеріалів як пріоритетний
напрямок досліджень.
https://voca.ro/1bymBejq2fqY
· #609
S.Mykhailiuk (Tuesday, 17 May 2022 12:13)
To Biehin Yevhen RF-211 just good . Thanks. Keep on working hard.
· #608
S.Mykhailiuk (Tuesday, 17 May 2022 12:10)
To Maksim Teliga (RF-211) Just good, thank you.
· #607
S.Mykhailiuk (Tuesday, 17 May 2022 12:08)
To Julia Shevchuk (RF-211) . Thanks . Just good.
· #606
S.Mykhailiuk (Tuesday, 17 May 2022 12:04)
To Rosinskiy Kyrylo RF-211 Thanks Just 80 points for both tasks. Keep on working hard.
· #605
S.Mykhailiuk (Tuesday, 17 May 2022 12:01)
To Gridnev Dmytro(RF-211) Exam topic is too long and without conclusion. 2021 was over long ago: mind your narration. Just 74 points.
· #604
S.Mykhailiuk (Tuesday, 17 May 2022 11:55)
To Pontus Natalia(RF-211) Thanks .Just good. Keep on working hard.
· #603
S.Mykhailiuk (Tuesday, 17 May 2022 11:51)
To
Chmel Maksim RF-211 Thanks .
Just good for both activities. Keep on working hard.
· #602
S.Mykhailiuk (Tuesday, 17 May 2022 11:45)
To Mashegirov Eugene (RF-211) Thanks. Two tasked have been perfectly done by you. But you need to pre-train your pronunciation and melody to improve your speaking activities. Just 79 points
· #601
S.Mykhailiuk (Tuesday, 17 May 2022 11:37)
To Shulyak Makar RF-211 Task1 is lengthy just 74 points. Task2 contains a mistake ( let discuss it). Just good. Pls work hard.
· #600
Lebedeva E. (Tuesday, 17 May 2022 11:30)
To Dovzhenko Ilya RZ-211, Kovalzhi Andrey rz-211, Ivan Zaritskiy RZ-211, Misha Donenko RZ-211, Daniil Dragin (RZ-211), Ilinchuck Vladislav RZ-211 Thanks for your active work. Well done.
· #599
Lebedeva E. (Tuesday, 17 May 2022 11:29)
To
Kasatkin Kirill RZ-211 and Mykola Zhmurak RZ-211 The reviews on the articles are
written correctly. Now I am waiting for exam topics. Keep working.
· #598
Lebedeva E. (Tuesday, 17 May 2022 11:27)
To Kapeliushnyi Vladyslav (RZ-211) You submited the Exam topic #3 on 3.05.22. I am waiting for another topic. Keep working.
· #597
Lebedeva E. (Tuesday, 17 May 2022 11:21)
To Kuleshov Konstantin(RZ-211) The exam topic is written correctly, However, you forgot about translation of the sentences with phrases of the day.
· #596
Lebedeva E. (Tuesday, 17 May 2022 11:20)
To Bilokamenskiy Anton (RF-211) The tasks are quite ok, but there is a mistake in the question 2. You forgot about an auxiliary verb.
· #595
Lebedeva E. (Tuesday, 17 May 2022 11:06)
To Denis Zavadsky Levedeva RZ-211 The review on the article is written correctly. Now I am waiting for your exam topic.
· #594
Popovych E. (Tuesday, 17 May 2022 10:46)
To
Stanislav Kryvosheienko RT-211
Thank you for your comment on the article and for your work. It is nice that you
do it regularly.
· #593
Stanislav Kryvosheienko RT-211 (Popovych) (Tuesday, 17 May 2022 10:41)
Today I have read the article "What's the prevailing opinion on social media?"
A University at Buffalo communication researcher has developed a framework for
measuring the slippery concept of social media public opinion.The framework and
the findings from an analysis of social network structure and opinion expression
from over 193,000 Twitter accounts, which followed more than 1.3 million other
accounts, suggest that flock membership can predict opinion and that the
murmuration framework reveals distinct patterns of opinion intensity.The results
further support the echo chamber tendencies prevalent on social media, while
adding important nuance to existing knowledge.
article -
https://phys.org/news/2022-03-prevailing-opinion-social-media-flocks.html
Voice - https://voca.ro/19PEYelQTgLS
Phrases
1)priority research area - This framework should consider priorities regarding
research areas, best practices, and knowledge transfer.Эта структура должна
учитывать приоритеты в отношении областей исследований, передового опыта и
передачи знаний.
2)prevailing view - The prevailing view was that both issues should be dealt
with. Возобладало мнение о том, что следует рассмотреть оба этих вопроса.
3)practical problems - Besides controlling users, HDCP denies their fair-use
rights and causes numerous practical problems. Помимо контроля над
пользователями, HDCP лишает их прав на добросовестное использование и создает
множество практических проблем.
Voice - https://voca.ro/15Y5ZAzH3oke
· #592
Popovych E. (Tuesday, 17 May 2022 10:27)
To
Avdieiev Danil RT-211
Your task is complete, informative and interesting. Well done.
· #591
Popovych E. (Tuesday, 17 May 2022 10:26)
To
Yeulizaveta Barsukova (RT-211)
Exam Topic #8 (The major differences in a monochrome television and a color
television receiver) is well done.
· #590
Avdieiev Danil RT-211 Popovych E. (Tuesday, 17 May 2022 10:24)
Article:
https://techxplore.com/news/2021-10-optimum-pressure-lithium-metal-batteries.html
Today I have the article titled "Researchers determine optimum pressure to
improve the performance of lithium metal batteries". It describes us about a
team of materials scientists and chemists has determined the proper stack
pressure that lithium metal batteries, or LMBs, need to be subjected to during
battery operation in order to produce optimal performance. I find this article
useless, because nowadays we less and less use lithium metal batteries. But
probably this research will change it. We'll see.
vocaroo: https://voca.ro/1GOhJqHlElYj
1) prevailing view
Study challenges prevailing view on how metal organic frameworks store gases.
https://voca.ro/12nvfrgILKPR
Вивчаються проблеми, які переважають у поглядах на те, як металеві органічні
каркаси зберігають гази.
2) practical problems
Yet when these experts bring AI into the real world and use it to solve
practical problems, they have to answer questions such as why the AI made a
specific prediction or decision.
https://voca.ro/1e1iUnPD2TDD
Поки ці експерти впроваджують ІІ в реальний світ і використовують його для
вирішення практичних завдань, їм доводиться відповідати на такі питання, як,
наприклад, чому ІІ зробив той чи інший прогноз чи рішення.
3) priority research area
A new study led by ANU has mapped priority areas around the world to protect
thousands of mammal species.
https://voca.ro/1c7yqNwkuPW0
Нове дослідження проведене ANU, накреслело пріоритетні території по всьому світу
для захисту тисяч видів ссавців.
· #589
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 17 May 2022 10:23)
Exam Topic #8 (The major differences in a monochrome television and a color
television receiver)
I think we all know that the major difference between black and white and color
television is the color of the image itself. Monochrome monitors actually use
two colors, one for the image on the display and the other for the background.
Also, monochrome is known as black and white television. At the same time, color
television is a technology and technique associated with the transmission of
moving images by color TV. The monitors used in this television have three guns
in red, green and blue. Varying these tubes gives us the full range of colors.
Audio:https://voca.ro/1iPVIAnmn6Ch
· #588
Dovzhenko Ilya RZ-211 (Lebedeva) (Tuesday, 17 May 2022 10:16)
Exam topic 3 Different approaches to secrecy and their defects.
To protect your organization from cyber attacks, there are several technologies
to combat it. The most famous of them: data loss prevention, intrusion detection
and prevention system, security incident and event management, firewall,
antivirus.
Let's consider two of the techniques proposed above.
Prevent data loss (verification technology, data sent by the organization for
the content of confidential data)
Intrusion Detection System (IDS) is a technology that monitors all traffic
coming into an organization to make sure it is not harmful.
Therefore, in order to protect the system from any of the security incidents,
the organization must use technology to protect its systems.
https://voca.ro/1bN7WpVGS9Ih
1)practical problems
However, despite positive developments, many practical problems still exist.
Однак, не зважаючи на позитивні зміни, залишилося і багато практичних проблем.
2)prevailing view
The prevailing view that synthetic satin releases toxic substances is not
confirmed by laboratory tests.
Існуюча думка, що синтетичний сатин виділяє токсичні речовини не підтверджено
лабораторними дослідженнями.
3)priority research area
The goal of the competition is to support policy-relevant research projects
under five priority research areas.
Мета конкурсу є підтримка політично значущих проектів науково-дослідних до п'яти
пріоритетних областях.
https://voca.ro/156HltYp1avg
· #587
Gvozd to Vlasov Vadim RZ-211 (Tuesday, 17 May 2022 10:13)
The exam topic is informative and useful. The review is interesting.
· #586
Popovych E. (Tuesday, 17 May 2022 10:12)
To
Artem Verhelis RT-211
The task is not complete. Your Independent practice must contain a review and
audio.
· #585
Artem Verhelis RT-211, Popovych E. (Tuesday, 17 May 2022 10:06)
Today I've read the article "Computers learn to understand humans better by
modelling them" It's about results of study that simply by observing how long it
takes a user to click menu items, an AI can infer a model that reproduces
similar behavior and accurately estimates some characteristics of that user's
visual system, such as fixation duration. The inference method of this model is
based on Approximate Bayesian Computing, a machine learning technique that was
developed to infer very complex models from observations. I think that this
technology will be very useful, for example in detection of symptoms of a
decrease in human cognitive functions.
Audio: https://voca.ro/19XmNPO0E4Pe
Article: https://phys.org/news/2017-05-humans.html
1) prevailing view
Study challenges prevailing view on how metal organic frameworks store gases.
Вивчаються проблеми, які переважають у поглядах на те, як металеві органічні
каркаси зберігають гази.
2) practical problems
Yet when these experts bring AI into the real world and use it to
solve practical problems, they have to answer questions such as why the AI made
a specific prediction or decision.
Поки ці експерти впроваджують ІІ в реальний світ і використовують його для
вирішення практичних завдань, їм доводиться відповідати на такі питання, як,
наприклад, чому ІІ зробив той чи інший прогноз чи рішення.
3) priority research area
A new study led by ANU has mapped priority areas around the world to protect
thousands of mammal species.
Нове дослідження проведене ANU, накреслело пріоритетні території по всьому світу
для захисту тисяч видів ссавців.
Audio: https://voca.ro/18whiXsOhpdW
· #584
Sergey Kyznyak RT-211, Borysenko T. (Tuesday, 17 May 2022 10:02)
Exam Topic #6
First history fact of television in Ukrainian SSR was in 1925, when the talented
experimental physicist Boris Grabovsky managed to make the first television
broadcast in the former USSR and throughout the world. In 1939 the first
telecast was made in Kyiv. 1969, color television appeared in Ukraine. The
uniqueness of the design was that it was the first in the world to be all-welded
and unparalleled. At present, the transmission and distribution network consists
of 57 powerful TV stations. This system provides viewers with programs
throughout Ukraine. It's very cool to realize all the way that television has
come a long way in Ukraine.
https://voca.ro/1ePauGFjicsB
· #583
Sergey Kyznyak RT-211, Borysenko T. (Tuesday, 17 May 2022 10:01)
(Class work)
Today I have read the article 'Combining AI and computational science for
better, faster, energy efficient predictions'.
The article tells about the new technology "intelligent alloys", the main
purpose of which is combining the power of computational science with artificial
intelligence to develop models that complement simulations to predict the
evolution of science's most complex systems. By using this technology, the
researchers demonstrated that they can generate predictions thousands to a
million times faster than it would take to run the simulations with full
resolution or rely on partial or even faulty information through models. I think
this technology has a huge future that is coming right now.
1)"when compared"
This figure is even less significant WHEN COMPARED to the assets such
enterprises control.
2)"muptiple levels"
And the beauty of the book is that it works on MULTIPLE LEVELS.
3)"case studies"
The training will be based on CASE STUDIES, simulations and group
problem-solving exercises.
Vocaroo(sentence): https://voca.ro/1bPATAlHnboW
Vocaroo(article): https://voca.ro/1iVdA1qr4K25
https://techxplore.com/news/2022-04-combining-ai-science-faster-energy.html
· #582
Shulyak Makar RF-211 (S.Mykhailiuk) (Tuesday, 17 May 2022 10:01)
The
operating system is a set of programs that controls the hardware component of
any PC, organizes interaction between users. An operating system is needed to
manage computer devices and computing processes.
Operating system features:
1) Management of computer devices and their distribution. Computer devices RAM,
disks, tools located outside the system unit (printer, mouse, speakers), etc.
2) Management of the computing process. OP - a sequence of actions that are
specified by the program.
3) Establishing the relationship between the user and the device.
OS classification:
Operating system of one or more users;
Single-tasking and multi-tasking operating systems.
The OS manages computing processes and computer resources: disks, memory, mouse,
printer, etc.
The OS is the middle boundary between the PC and the user.
Modern operating systems are characterized by a complex structure, all elements
perform certain functions for managing a computer:
File system management.
command processor.
Graphical interface.
Service programs.
Reference system.
Auido: https://voca.ro/1mc7iWKtuwnp
---------------------------------------
Phrases of Th Day:
1)priority research area-пріоритетний напрямок дослідження
Cybercrime is priority research area for scientists
Кіберзлочинність є пріоритетним напрямком дослідження науковців
2)prevailing view-переважаючий погляд
If that is the prevailing view, let us have discuss it.
Якщо така точка зору переважає, давайте обговоримо її.
3)practical problems-практичні проблеми
This project illustrates the difficulties involved when we bring machine
learning and AI into the real world
Цей проект ілюструє труднощі, пов’язані з впровадженням машинного навчання та
штучного інтелекту в реальний світ.
Audio: https://voca.ro/1hCyRK80YmVF
· #581
Popovych E. (Tuesday, 17 May 2022 10:00)
To
Artem Verhelis RT-211,
Exam topic #7 Turning the DTV signal is well done.
· #580
Popovych E. (Tuesday, 17 May 2022 09:58)
To
Yeulizaveta Barsukova (RT-211)
Thank you for your comment. The review you have sent was written correctly, it
meets all the requirements for such kind of independent student work.
· #579
Artem Verhelis RT-211, Popovych E. (Tuesday, 17 May 2022 09:53)
Exam topic #7
Turning the DTV signal
Digital TV refers to all types of this television broadcasting. DTV signal
belong only to live in a channel TV.
The transmitted DTV signal is encoded in MPEG digital format and represented as
a binary code. The basis of its popularity is that the signal is not affected by
weather conditions as it used to be with analog signal. Even if it is rainy or
windy outside, the TV won't lose a signal. DTV channels are preferred to watch
in all countries due to their availability and the quality of the transmitted
picture.
Audio: https://voca.ro/15ZRr68Wp8lY
· #578
Denis Zavadsky Levedeva RZ-211 (Tuesday, 17 May 2022 09:52)
Researchers have developed an algorithm that can identify the basic needs of
users from the text and images they share on social networks. The experts hope
this tool will help psychologists to diagnose possible mental health problems.
The study suggests that Spanish-speaking users are more likely to mention
relationship problems when feeling depressed than English speakers.
I think this is a good innovation, as it can help solve a whole range of
problems regarding the relationship of people on the network, where so many
violators of someone else's order should be punished.
https://techxplore.com/news/2022-05-algorithm-unhappiness-social-networks.html
The prevailing view was that the text of draft article 32 should be retained as
drafted.
Measures are being agreed to overcome these practical problems.
One of the priority research areas is the use of Ecstasy by young people.
Переважала думка, що текст проекту статті 32 слід зберегти у редакції.
Узгоджуються заходи щодо подолання цих практичних проблем.
Одним із пріоритетних напрямків дослідження є вживання екстазі молоддю.
https://voca.ro/15aHGlqZXF5s
· #577
Mashegirov Eugene (RF-211) (S.Mykhailiuk) (Tuesday, 17 May 2022 09:49)
Article: https://en.m.wikipedia.org/wiki/Device_driver
Device drivers
In computing, a device driver is a computer program that operates or controls a
particular type of device that is attached to a computer or automaton. A driver
provides a software interface to hardware devices, enabling operating systems
and other computer programs to access hardware functions without needing to know
precise details about the hardware being used. A driver communicates with the
device through the computer bus or communications subsystem to which the
hardware connects. When a calling program invokes a routine in the driver, the
driver issues commands to the device (drives it). Once the device sends data
back to the driver, the driver may invoke routines in the original calling
program.
Summing up, we can say that without drivers, the correct operation of computer
functions is impossible and you should always install drivers before fully using
the computer.
Audio: https://voca.ro/1oC9ZZvecpnt
Phrases of the Day:
1. practical problems - практичні проблеми
These experts bring AI into the real world and use it to solve practical
problems - Ці експерти впроваджують ШІ в реальний світ і використовують його для
вирішення практичних проблем.
2. priority research area - пріоритетний напрямок дослідження
A new paper by leading UK scientists sets out key solutions and policy actions
that should be implemented now, as well as priority research areas for the next
decade - У новій роботі провідних британських вчених викладено ключові рішення
та політичні дії, які мають бути реалізовані зараз, а також пріоритетні напрямки
досліджень на наступне десятиліття.
3. prevailing view - переважна точка зору
Study challenges prevailing view of invasive species - Вивчення проблем
переважаючого погляду на інвазивні види.
Audio: https://voca.ro/17h5BZHMcqNu
· #576
Vlasov Vadim RZ-211 (Gvozd O.V) (Tuesday, 17 May 2022 09:47)
Topic 8 Passwords and their drawback
Now everyone knows what a password and login are, but not everyone knows how to
safely store an
use them.
Using one password for all sites is extremely dangerous. Having hacked one
user's page, hackers have easy access to all the others: financial services,
cloud services, e-mail and other user applications. Therefore, unique passwords
are created for each resource.
In order not to worry, you can use password managers - these are specialized
services for secure storage of all codes. They securely encrypt data: passwords,
logins, information about the service where you want to enter passwords and
logins.
https://voca.ro/1amxqiItLYml
Today I've read the article "Storing energy in red bricks". This article tells
about a red brick device. The Brick has been used in walls and buildings for
thousands of years, but rarely has been found fit for any other use. Now,
chemists have developed a method to make or modify "smart bricks" that can store
energy. Really, walls and buildings made of bricks already occupy large amounts
of space, which could be better utilized if given an additional purpose for
electrical storage.
In my opinion this is a very interesting and cool idea for progress in
construction and technology.
https://techxplore.com/news/2020-08-energy-red-bricks.html
https://voca.ro/15aeZ4EDUJrm
priority research
The report notes that the priority research initiatives all require some degree
prevailing view
Study challenges prevailing view of invasive specie
practical problems
this practice causes two important practical problems
https://voca.ro/1eOzhlbuHXae
· #575
Chmel Maksim RF-211 (S.Mykhailiuk) (Tuesday, 17 May 2022 09:47)
Today's operating systems have many generic drivers that allow hardware to work
at a basic level without needing drivers or software. However, if that device
has features unknown to the operating system, it will not work without drivers.
For example, you could plug any keyboard into a computer and expect it to work.
However, if that keyboard has any special keys or features, they will not work
until the drivers are installed.
If the appropriate driver is not installed, the device may not function
properly, if at all. With some devices, the device may work, but all of its
features may not work. For example, a computer mouse usually works without
drivers, but if it has more buttons than the traditional mouse, those extra
buttons will not work until the drivers are installed.
https://voca.ro/1jwLkuq0xQXL
1)The scientists assembled a conference that it is therefore intended to
resemble more a brainstorming and consensus-building meeting than a planning
session to list priority research areas.
Вчені зібрали конференцію, тому вона має нагадувати більше мозковий штурм та
нараду для досягнення консенсусу, ніж сесію планування, щоб перерахувати
пріоритетні напрямки досліджень.
2)Elon Max recently founded his own foundation This project funded research on
technical solutions for practical problems.
Ілон Макс нещодавно заснував власний фонд. Цей проект фінансував дослідження
технічних рішень практичних проблем.
3)The scientists developed a special measure. The prevailing view, however, was
that the draft Guide should not include such recommendations.
Вчені розробили спеціальний захід. Однак переважала думка, що проект керівництва
не повинен включати такі рекомендації.
https://voca.ro/18PW0g45Exlr
· #574
Pontus Natalia(RF-211) (S.Mykhailiuk) (Tuesday, 17 May 2022 09:42)
Phrases of the Day:
1) prevailing view - переважна думка
Depending on this assessment, the prevailing view is changing.
Залежно від цієї оцінки переважна думка змінюється.
2) practical problems - практичні проблеми
Despite the positive developments, many practical problems still exist.
Не зважаючи на позитивні зміни, залишилося і багато практичних проблем.
3) priority research areas – область пріорітетних досліджень
Priority research areas are also information technologies for complex signals,
information safety and telecommunications.
Пріоритетними напрямами досліджень також є інформаційні технології обробки
складних сигналів, інформаційна безпека та телекомунікації.
Audio: https://voca.ro/1evSanc5McyV
Digital security is the collective term that describes the resources employed to
protect user’s online identity, data, and other assets. These tools include web
services, antivirus software etc.
Authentication system helps to protect the data from threats such as hacking and
fishing as it identifies new users, monitors traffic, approves or blocks
unauthorized access.
As for methods, that can help users to maintain their digital safety and
security, updating antivirus systems can be extremely helpful. It also ensures
any website user is visiting has safe and secured connection.
Using these simple digital security resources any user can stay digitally safe.
Audio: https://voca.ro/1g9dqYHjpwGA
· #573
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 17 May 2022 09:41)
Class-work
Today I've read the article 'New nanomechanical oscillators with record-low
loss'. Scientists have long studied mechanical resonators. Recently, they found
that a regular polygon suspended at its vertices supports oscillating modes
around the perimeter with almost no loss. So they decided to make resonators in
this form. As a result, a device can measure oscillations of almost the same
force as a modern atomic force microscope. The resonators are compact and not
quite large, which will allow them to be used in many places. I think it's very
important because it will help in studying weak forces and quantum effects.
Audio1:https://voca.ro/1kQWHrMzozlN
Article:
https://phys.org/news/2022-05-nanomechanical-oscillators-record-low-loss.html
Phrases
1)prevailing view
The prevailing view, however, was that the draft Guide should not include such
recommendations.
Однак переважала думка, що проект керівництва не повинен включати такі
рекомендації.
2)priority research area
It is therefore intended to resemble more a brainstorming and consensus-building
meeting than a planning session to list priority research areas.
Тому за своїм задумом воно швидше нагадує мозкову атаку, пошук консенсусу, ніж
сесію зі складання переліку пріоритетних дослідницьких областей.
3) practical problems
This project funded research on technical solutions for practical problems.
Цей проект фінансував дослідження технічних рішень практичних проблем.
Audio2:https://voca.ro/1gVwzfilsvbv
· #572
Kovalzhi Andrey rz-211(Lebedeva. E.) (Tuesday, 17 May 2022 09:41)
Exam topic #8
Password-based authentication is one of the most popular approaches to
authenticate a user in various enterprise applications. But there are many
drawbacks associated with the password based authentication systems, for
example: easy passwords can be cracked, random passwords are hard to remember,
multiple passwords can't be remembered, problems with passwords that needs to be
continuously changed, security vs. Ease-of-Use for Passwords and shoulder
Surfing Attack. Passwords can be shared, guessed or stolen, which means they
aren’t secure. However most of this problems can be solved by proper storage of
passwords and other confidential information.
https://voca.ro/1cIBTKfYtxJY
Daily phrases:
1) practical problems
To solve a practical problem, you can't just solve the computational piece, you
have to incorporate the human behavioral piece too.
Чтобы решить практическую проблему, недостаточно просто решить вычислительную
часть, нужно также учитывать поведение человека.
2)prevailing view
The prevailing view, however, was that MIT scientists team need to stop the
expirement.
3)priority research area
A newspaper by leading UK scientists proposes key solutions that should be
implemented now, as well as priority research areas for the next decade, if the
UK is willing to reach its targets by 2050.
Газета ведущих британских ученых предлагает ключевые решения которые должны быть
реализованы сейчас, а также приоритетные направления исследований на следующее
десятилетие, если Великобритания хочет достичь своих целей к 2050 году.
https://voca.ro/1mjWfaLY6bVG
· #571
Gridnev Dmytro(RF-211)(S.Mykhailiuk) (Tuesday, 17 May 2022 09:39)
Exam theme:The development of Windows versions.
Windows operating system is one of the most widespread operating systems that is
exercised all over the world which was developed by Microsoft.In the beginning,
we were supposed to use windows only on our computers but succeedingly later
that we observe Windows on our mobile phones too and an up-gradation of the
Windows 10 along with it.
Windows 1
The earliest version of windows MS-DOS was called the Microsoft disk operating
system which was the character-based operating system that was used in many
computers but didn’t get much success.
Windows 2
This was the very first version of the operating system to access Microsoft Word
and Microsoft excel.
Windows 3
Windows 3 covers all the early versions of MS-DOS which came out with the
program manager and soon became the modern windows version.
Windows 95
As Windows 95 was out it became very famous, which took the world of operating
systems at the top. It allows you the feature to place the icon wherever you
like. Several more innovations such as internet explorer, Recycle bin, start
button. All those icons appear to present on your desktop.
Windows 98
Windows 98 wasn't so different from windows 95, it almost worked the same as
Windows 95, Therefore few upgrades happened.
Windows XP
Windows XP was launched in the year 2001. Which became the fastest growing
operating system by windows after the success of window 95.
Windows Vista
It took almost 5 whole years to launch Windows Vista while developing websites
there were so many errors, and it appears after the restoration of such errors,
so the late launch was justified.
Windows 7
Windows 7 uplifted all the errors of Windows Vista and came with the new name
windows 6 view. This was an extremely powerful windows operating system. Several
offices are still using this till now. This was supposed to upgrade windows 7 to
windows 10.
Windows 8 Desktop
Microsoft wasn’t capable of bringing that operating system that used to operate
on both tablet and PC. You have the option to easily upgrade Windows 8 to
Windows 10.
Windows and Windows 8.1
Microsoft implements this characteristic such as computers, tablets, mobile
updates back then in 2014. It possesses some modifications such as the start
menu. Window 8.1 will be refreshed to windows 10.
Windows 10
The latest version of windows is fantastic. The complete variant hadn’t arrived
yet into the business. Although according to the sources Microsoft is planning
to bring the new Windows 10X named “The New Windows”. Which is supposed to be
launched near the end of March or April 2021.
Vocaroo:https://voca.ro/19yqwGRV9KHX
Phrases of the day
1)priority research area-пріоритетний напрямок дослідження
Cybercrime is priority research area for scientists
Кіберзлочинність є пріоритетним напрямком дослідження науковців
2)prevailing view-переважаючий погляд
If that is the prevailing view, let us have discuss it.
Якщо така точка зору переважає, давайте обговоримо її.
3)practical problems-практичні проблеми
This project illustrates the difficulties involved when we bring machine
learning and AI into the real world
Цей проект ілюструє труднощі, пов’язані з впровадженням машинного навчання та
штучного інтелекту в реальний світ
Vocaroo:https://voca.ro/1gl8LCaEzC4n
· #570
Gvozd to Beskrovnyi Vladimir RZ-211 (Tuesday, 17 May 2022 09:38)
I appreciate your task, it is interesting and informative.
· #569
Beskrovnyi Vladimir RZ-211 (Gvozd O.V) (Tuesday, 17 May 2022)
Today I have read the article 'An algorithm trained to detect unhappiness on
social networks'.
Researchers from the Universitat Oberta de Catalunya (UOC) has developed an
algorithm that aims to help psychologists diagnose possible mental health
problems through the content people post on social platforms such as Instagram,
Facebook and Twitter. Drawing on neural networks and databases, the experts
trained an algorithm to identify the content of the images and to categorize
textual content by assigning different labels proposed by psychologists, who
compared the results with a database containing over 30,000 images, captions and
comments.
A very interesting algorithm, in my opinion, which will automatically will give
the psychologists results they need, depending on our mood
2.
https://techxplore.com/news/2022-05-algorithm-unhappiness-social-networks.html
3. https://voca.ro/18lTGNgiCG6z
4. 1) prevailing view
The problem is further exacerbated by the prevailing view as to the nature and
constituents of leadership in schools.
2) priority research area
Progress in this priority research area is a central element of the Lisbon
Agenda.
3) practical problems
There are practical problems with the installation as well.
5. https://voca.ro/1eoXpJbATpko
Exam Topic #13 'Authentication mechanisms'
Authentication mechanisms are modules that authenticate the user with a specific
challenge or authentication technology, such as user name and password and
one-time password. The order on which the authentication mechanisms are run is
controlled by an authentication policy. An authentication policy is an XML
document that you create with the authentication policy editor. The
authentication policy dictates the order of authentication mechanisms to
execute. During an authentication event, the Authentication Service manages the
execution of the authentication policy that is required for the event. Each
authentication mechanism is included on the authentication policy workflow. This
workflow is started by the Authentication Service authentication policy. After
the user successfully authenticates to all of the authentication mechanisms that
are required by the authentication policy, the Authentication Service generates
a user credential.
· #568
Rosinskiy Kyrylo RF-211 (S.Mykhailiuk) (Tuesday, 17 May 2022 09:35)
Exam topic №8 - Device drivers
In computing, a device driver is a computer program that operates or controls a
particular type of device that is attached to a computer or automaton. It
communicates with the device through the computer bus or communications
subsystem to which the hardware connects. A driver provides a software interface
to hardware devices, enabling operating systems and other computer programs to
access hardware functions without needing to know precise details about the
hardware being used.
I think drivers are the most important programs in a regular computer, that
helps communicate OS and software with the hardware, accordingly making our work
easier and faster.
Audio: https://voca.ro/1iLB0QmiO1jj
Phrases of the Day
1. priority research area - пріоритетний напрямок дослідження
ENG: Priority research area of our company was the security of data centers.
UKR: Пріоритетним напрямком досліджень нашої компанії була безпека ЦОД.
2. prevailing view - переважна думка
ENG: Prevailing view of our employees was that we should improve the visual part
of the application.
UKR: У наших співробітників переважала думка, що ми повинні покращити візуальну
частину програми.
3. practical problems - практичні проблеми
ENG: After weeks of coding I have no practical problems.
UKR: Після тижнів кодування я не маю жодних практичних проблем.
Audio: https://voca.ro/1058Wd30cRpD
· #567
Kasatkin Kirill RZ-211 (Lebedeva E. V) (Tuesday, 17 May 2022)
Kasatkin Kirill RZ-211 (Lebedeva E. V)
Today I have read the article "Bringing AI into the real world"
Artificial intelligence (AI) researchers and health experts modeling COVID-19's
spread have warned that for vaccines to be useful in curbing the pandemic, a
significant percentage of the population must be vaccinated to reach herd
immunity.
But professor Misra explained that each person would be best served if all the
others got vaccinated and they themselves did not have to vaccinate—because that
would stop the spread of the virus without their having to take on the possible
risks of side effects.
I think this is an interesting research.
site: https://techxplore.com/news/2021-03-ai-real-world.html
audio: https://voca.ro/188xBiJEblYg
1) practical problems
Yet when these experts bring AI into the real world and use it to solve
practical problems,
they have to answer questions such as why the AI made a specific prediction or
decision, and whether it gives enough confidence for us to act on it.
Але коли ці експерти впроваджують ШІ в реальний світ і використовують його для
вирішення практичних проблем,
вони повинні відповісти на запитання, наприклад, чому ШІ зробив конкретне
передбачення або рішення, і чи дає це достатньо впевненості, щоб ми діяли.
2) prevailing view
Study challenges prevailing view of invasive species
Дослідження проблем переважаючого погляду на інвазивні види
3) priority research areas
as well as priority research areas for the next decade
а також пріоритетні напрямки досліджень на наступне десятиліття
voiceover phrases: https://voca.ro/16kB92am9ejD
· #566
Gvozd to Vasilev A.O RZ-211 (Tuesday, 17 May 2022 09:32)
The review of the article is really interesting and useful. Thank you, well done.
· #565
Ivan Zaritskiy RZ-211 (Lebedeva) (Tuesday, 17 May 2022 09:31)
Principles of information protection.
What are the 3 Principles of Information Security? The basic tenets of
information security are confidentiality, integrity, and availability. Every
element of the information security program must be designed to implement one or
more of these principles. Together they are called the CIA Triad.
Confidentiality: Confidentiality measures are designed to prevent unauthorized
disclosure of information. The purpose of the confidentiality principle is to
keep personal information private and to ensure that it is visible and
accessible only to those individuals who own it or need it to perform their
organizational functions.
Integrity: Consistency includes protection against unauthorized changes
(additions, deletions, alterations, etc.) to data. The principle of integrity
ensures that data is accurate and reliable and is not modified incorrectly,
whether accidentally or maliciously.
Availability: Availability is the protection of a system’s ability to make
software systems and data fully available when a user needs it (or at a
specified time). The purpose of availability is to make the technology
infrastructure, the applications, and the data available when they are needed
for an organizational processor for an organization’s customers.
https://voca.ro/1kK9h0MbDbkq
practical problems
Yet when these experts bring AI into the real world and use it to solve
practical problems, they have to answer questions such as why the AI made a
specific prediction or decision.(Проте, коли ці експерти впроваджують ШІ в
реальний світ і використовують його для вирішення практичних проблем, вони
повинні відповісти на такі запитання, як, чому ШІ зробив конкретне передбачення
або рішення, і чи дає він достатньо впевненості, щоб ми могли діяти.)
priority research area
A new study led by ANU has mapped priority research areas around the world to
protect thousands of mammal species.(Нове дослідження, проведене ANU, накреслило
пріоритетні дослідницькі області в усьому світі для захисту тисяч видів
ссавців.)
prevailing view
Study challenges prevailing view on how metal organic frameworks store gases by
Lynn Yarris, Lawrence Berkeley National Laboratory.(Лінн Ярріс, Національна
лабораторія Лоуренса Берклі, вивчити проблеми, пов'язані з переважаючим поглядом
на те, як металоорганічні каркаси зберігають гази.)
https://voca.ro/1ccBm0GKz4uo
· #564
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Tuesday, 17 May 2022 09:29)
Exam topic #3
Password - a secret word or a sequence of characters intended to confirm a
person or his rights. Passwords are used to protect information from
unauthorized access. Passwords have many disadvantages: they are easy to steal,
but difficult to remember, and manage them sometimes exhausting. Many users
believe that the password should be as long and complex as possible, although in
reality it even increases the risk. With a complex password, users usually want
to use it for multiple accounts, making them even more vulnerable.Because the
less you enter the password, the better.
https://voca.ro/1i1fQGA1GKJZ
1) The prevailing view has been that the indigenous population had neither
territory, power nor economic resources.
Переважала думка, що корінне населення не має ні території, ні влади, ні
економічних ресурсів.
2) She devoted attention to practical problems in energy and the environmen.
Вона приділила увагу практичним проблемам в енергетиці та екології.
3) Yale has identified the development of quantum materials as a priority
research area.
Єльський університет визначив розробку квантових матеріалів як пріоритетний
напрямок досліджень.
https://voca.ro/1bymBejq2fqY
· #563
Botsaniuk Ivan RZ-211 (Gvozd O.V) (Tuesday, 17 May 2022 09:24)
Exam topic #17: “Password as a general technique of secrecy”.
A password is your personal key to a computer system. Passwords help to ensure
that only authorized individuals access computer systems. Passwords also help to
determine accountability for all transactions and other changes made to system
resources, including data. Passwords are a critical part of information and
network security. Passwords serve to protect against unauthorized access, but a
poorly chosen password could put the entire institution at risk. There are few
general recommendations about creating passwords: 1) Passwords should be long
and unique; 2)Old passwords should not be re-used. So, in my opinion, all people
using computer systems should create passwords and make them strong to prevent
being hacked.
https://voca.ro/13ELPvG4zG6J
Comment
Today I have read the article “An algorithm trained to detect unhappiness on
social networks”. Researchers have developed an algorithm that can identify the
basic needs of users from the text and images they share on social networks. The
experts hope this tool will help psychologists to diagnose possible mental
health problems. Drawing on neural networks and databases, the experts trained
an algorithm to identify the content of the images and to categorize textual
content by assigning different labels proposed by psychologists, who compared
the results with a database containing over 30,000 images, captions and
comments.The authors believe that their research can help improve preventive
measures, ranging from identification to improved treatment when a person has
been diagnosed with a mental health disorder.
https://techxplore.com/news/2022-05-algorithm-unhappiness-social-networks.html
https://voca.ro/1t66onostDAM
prevailing view
The prevailing view, however, was the proposal constituted a major and
unnecessary departure from the existing Arbitration Rules. (Однак переважала
думка, що пропозиція є серйозним і непотрібним відхиленням від існуючого
Арбітражного регламенту.)
priority research areas
Following this first exercise of excluding areas not needing further research,
the small groups were given the task to list a maximum of 20 priority research
areas. (Після першої вправи виключення областей, які не потребують подальших
досліджень, невеликі групи отримали завдання перерахувати максимум 20
пріоритетних дослідницьких областей.)
practical problems
Some practical problems in the teaching of ethics to medical students are
described. (Описано деякі практичні проблеми у навчанні студентів-медиків
етики.)
https://voca.ro/11EqJxSnDjhP
· #562
Misha Donenko RZ-211 Lebedeva (Tuesday, 17 May 2022 09:24)
Different protection mechanisms
Information protection - a set of methods and tools that ensure the integrity,
confidentiality and availability of information for the conditions of exposure
to threats of natural or artificial nature, the implementation of which may harm
the owners and users of information. The term lives in Ukraine to describe
comprehensive measures to ensure information security.
Information protection is conducted to maintain such properties of information
as:
Integrity
- inability to modify information by an unauthorized user.
Confidentiality
- information cannot be obtained by an unauthorized user.
Accessibility
- this is exactly what the authorized user can use the information in accordance
with the rules established by their security policy, without specifying longer
than the specified (accepted) time interval.
Information threats
in accordance with the properties of I., there are some threats to its security:
1. threats to integrity:
2. destruction;
3. modification;
4. threats to availability:
5. blocking;
6. destruction;
7. threats to privacy:
8. unauthorized access (NSA);
9. leak;
10.disclosure.
https://voca.ro/1aIawPLYixxI
1)practical problems
This project funded research on technical solutions for practical problems in
the developing world.
Цей проект фінансував дослідження технічних рішень практичних проблем у країнах,
що розвиваються.
2)prevailing view
The prevailing view was that the text of draft article 32 should be retained as
drafted.
Переважала думка, що текст проекту статті 32 слід зберегти у редакції.
3)priority research area
One of the priority research areas is the use of Ecstasy by young people.
Одним із пріоритетних напрямків дослідження є вживання екстазі молоддю.
https://voca.ro/1jw6HhKzja5V
· #561
Julia Shevchuk (RF-211) (S.Mykhailiuk) (Tuesday, 17 May 2022)
Exam Topic #2
The Importance of System Software for Computer Operation
System software is a type of computer program designed to run computer hardware
and application programs. Considering a computer system as a layered model,
system software is the interface between hardware and user applications. The
operating system is the most well-known example of system software. The OS
controls all other programs on the computer. System software is used to manage
the computer itself. It runs in the background, supporting the basic functions
of the computer so that users can run higher-level application software to
perform certain tasks. Essentially, system software provides a platform for
running application software.
To sum up, system software is an important part as it is used to manage the
computer itself.
https://voca.ro/1kvMnOPChwf9
priority research area — пріоритетний напрямок дослідження
These research priority areas represent the currently strongest research fields
of University,
Ці пріоритетні дослідницькі напрямки представляють на сьогодні найсильніші
дослідницькі галузі університету
prevailing view — переважаючий погляд
Study challenges prevailing view on how metal organic frameworks store gases
Вивчіть проблеми, які переважають у поглядах на те, як металеві органічні
каркаси зберігають гази
practical problems — практичні проблеми
Aside from the moral objections we might have to routinely paying money to
criminals, this practice causes two important practical problems
Окрім моральних заперечень, які нам, можливо, доведеться регулярно платити гроші
злочинцям, ця практика викликає дві важливі практичні проблеми
https://voca.ro/19OAsiEyuviL
· #560
Maksim Teliga (RF-211)(S.Mykhailiuk) (Tuesday, 17 May 2022 09:20)
Topic #4 - What do we need operating system for?
The fundamental goal of a Operating System is to execute user programs and to
make tasks easier. Various application programs along with hardware systems are
used to perform this work. Operating System is software that manages and
controls the entire set of resources and effectively utilizes every part of a
computer.
The figure shows how OS acts as a medium between hardware units and application
programs.
Article:
https://edu.gcfglobal.org/en/computerbasics/understanding-operating-systems/1/
Vocaroo: https://voca.ro/14Y1GcWHEzI5
1) priority research area - пріоритетний напрямок дослідження
The paper highlights net-zero solutions in eight priority sectors, setting out
actions to take now, research priorities for the next decade, and future
benefits for each sector.
У документі висвітлюються нульові рішення у восьми пріоритетних секторах,
викладаються дії, які необхідно вжити зараз, пріоритети досліджень на наступне
десятиліття та майбутні переваги для кожного сектора.
2) prevailing view - домінуючий погляд
Nationalism is also influencing the prevailing view of vaccines in Turkey.
Націоналізм також впливає на домінуючий погляд на вакцини в Туреччині.
3) practical problems - практичні проблеми
Aside from the moral objections we might have to routinely paying money to
criminals, this practice causes two important practical problems.
Окрім моральних заперечень, які нам, можливо, доведеться регулярно платити гроші
злочинцям, ця практика викликає дві важливі практичні проблеми.
· #559
Biehin Yevhen RF-211 (S.Mykhailiuk) (Tuesday, 17 May 2022 09:20)
A
desktop and a laptop-advantages and disadvantages.
Both desktop and laptop computers have advantages and disadvantages. If you are
trying to determine which option will best suit your needs, take a look at the
advantages and benefits each of them offers.
Advantages of a desktop computer, as compared to a laptop computer:
• Desktop computers have more power and more features.
• Desktop computers are easier, and less expensive, to upgrade.
• Desktop computers are generally less expensive overall and offer a better
overall value.
Advantages of a laptop computer, as compared to a desktop computer:
• Laptop computers are highly portable and allow you to use your computer almost
anywhere.
• If you are an international student, a laptop computer will be much easier to
transport from home to school and back again.
• Laptop computers take up less room on a desk or table and can be put away when
not in use.
Phrases of the day
1) priority research area
The foundation's enormous wealth has even raised fears that it could distort our
priority research area
Величезний багатство фонду навіть викликало побоювання, що це може спотворити
нашу пріоритетну область досліджень
2) prevailing view
The prevailing view is that resistance expressed itself in a wide range of
activities.
Переважає думка, що опір виражається в широкому спектрі діяльності.
3) practical problems
These are serious, practical problems.
Це серйозні практичні проблеми.
Audio: https://voca.ro/1i9rbrljloOp
· #558
S.Mykhailiuk (Tuesday, 17 May 2022 09:14)
To Ivkov Yurii (RF-211) Thanks, very good.
· #557
Vasilev A.O RZ-211 Gvozd O.V. (Tuesday, 17 May 2022 09:13)
Today I've read an article called"Canada hospitals use drones to carry lungs for
transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by
Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western
Hospital on the city's west side to the roof of the downtown Toronto General
Hospital.The trip at the end of September took less than 10 minutes. It was
automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the
company, but a similar flight in April 2019 delivered a kidney to a hospital in
the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team
that whisked the package inside and successfully transplanted the lungs into a
waiting patient, saving the life of the 63-year-old man who'd been diagnosed
with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human
organs
https://voca.ro/1oNUOF2CvqeB
https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html
Exam topic #4 ( Information protection systems)
In order to run a successful, secure organization, IT leaders need
well-documented policies that address potential security issues and explain how
these issues will be managed within the company. These policies are also
fundamental to the IT audit process, as they establish controls that can be
examined and validated.
Examples of security policies
Security policies come in several forms, including the following:
General information security policy. Provides a holistic view of the
organization's need for security and defines activities used within the security
environment.
Access security policy. Addresses how users are granted access to applications,
data, databases and other IT resources. This policy is particularly important
for audits.
Authentication policy. Governs how users are verified to access a system's
resources.
Password policy. Defines how passwords are configured and managed.
Perimeter security policy. Defines how an organization protects its network
perimeter from unauthorized access and the technologies used to minimize
perimeter porosity.
Cybersecurity policy. Defines how an organization prepares and responds to
malware, phishing, viruses, ransomware and other attacks.
https://voca.ro/1k5ntY1VklqI
1)prevailing view
The prevailing view, however, was that the matter merited attention in the
context of the draft Convention.
https://voca.ro/1j30AvAbv9OP
2)priority research areas
The demand for more democratic input, finally, also seeks to influence research
priorities .
https://voca.ro/1jSQGGXljDVx
3)practical problems
Measures are being agreed to overcome these practical problems.
https://voca.ro/12DfiMSDhyku
· #556
S.Mykhailiuk (Tuesday, 17 May 2022 09:12)
To Vlada Gromovaya (RF-211) Thanks. Just 80 points for your activities.Keep on working hard.
· #555
Ivkov Yurii (RF-211)(S.Mykhailiuk) (Tuesday, 17 May 2022 09:12)
Topic №6 - Antivirus programs
Antivirus is a type of software designed to detect and delete viruses and other
malware, prevent essential damage from them, protect your computer from spam,
phishing attacks, scam etc.
Most antiviruses work in the background, thus providing constant protection.
Antiviruses check files and programs on 3 criteria to find virus: if the process
looks and performs like known malware; if there is a noticeable part of malware
in the program's codebase; if there is any suspicious activity which could be an
unknown threat.
There are a lot of antivirus programs available on the Internet and in my
opinion, most of them perform quite well, suitable for all specific demands and
should be used to protect data.
Article: https://www.verizon.com/info/definitions/antivirus
Phrases of the day
priority research area - пріоритетні сфери досліджень
1) Priority research areas are information technologies, artificial intelligence
and information security.
- Пріоритетними сферами дослідження також є інформаційні технології, штучний
інтелект та інформаційна безпека.
prevailing view - точка зору що превалює / переважна думка
2) The prevailing view is that potentially dangerous and complicated features
such as multiple inheritance and operator overloading are better not to use if
possible.
- Переважна точка зору заключається в тому, що потенційно небезпечні та складні
функції такі як множинне успадкування та перевантаження операторів краще не
використовувати, якщо це можливо.
practical problems - практичні проблеми
3) While designing classes of objects, students can face various practical
problems.
- При проектуванні класів об'єктів студенти можуть зіткнутися з різними
практичними проблемами.
Voice: https://vocaroo.com/1e2NNVEaCB7X
· #554
Kuleshov Konstantin(RZ-211)(Lebedeva) (Tuesday, 17 May 2022 09:11)
Topic№2Various security techniques
Network security is a term that describes the security tools, tactics and
security policies designed to monitor, prevent and respond to unauthorized
network intrusion, while also protecting digital assets, including network
traffic. Network security includes hardware and software technologies (including
resources such as savvy security analysts, hunters, and incident responders) and
is designed to respond to the full range of potential threats targeting your
network.Within network security, there are three key focuses that should serve
as a foundation of any network security strategy: protection, detection and
response.Protection entails any security tools or policies designed to prevent
network security intrusion. Detection refers to the resources that allow you to
analyze network traffic and quickly identify problems before they can do harm.
And finally, response is the ability to react to identified network security
threats and resolve them as quickly as possible.
1.The prevailing view was that the text of draft article 32 should be retained
as drafted.prevailing view
2.This project funded research on technical solutions for practical problems in
the developing world.practical problems
3.One of the priority research areas is the use of Ecstasy by young
people.priority research areas
https://voca.ro/1dq7Xkf3kdiz
· #553
Mykola Zhmurak RZ-211(Lebedeva) (Tuesday, 17 May 2022 09:09)
Today i have read the article titled "Using optical beaming to power a portable
5G base station". This article is about sending power through the air to run a
5G base station. The light is captured at the receiving station using a special
type of photovoltaic array and is then converted to electricity. The test system
sent 48 watts over 300 meters. But company Ericcson claims that the system is
capable of sending up to 1,000 watts up to distances of a kilometer. The
invention could be really useful, because the receiving stations can be
portable, the system could be used in a wide variety of applications, including
providing power at concerts and powering submersible drones.
Article -
https://techxplore.com/news/2021-10-optical-power-portable-5g-base.html
Vocaroo - https://voca.ro/140LqrnuJgi5
Phrases :
1) practical problems
Aside from the moral objections we might have to routinely paying money to
criminals, this practice causes two important practical problems.(Крім моральних
заперечень, які нам, можливо, доведеться регулярно платити гроші злочинцям, ця
практика викликає дві важливі практичні проблеми.)
2) priority research area
Infrastructure support for the priority research areas.(Інфраструктурна
підтримка пріоритетних напрямків досліджень.)
3) prevailing view
Study challenges prevailing view of invasive species.(Вивчення проблем
переважаючого погляду на інвазивні види.)
Vocaroo - https://voca.ro/1eiUZWN05UqH
· #552
Vlada Gromovaya (RF-211) (S.Mykhailiuk) (Tuesday, 17 May 2022 09:09)
Exam topic #3 (What do we need the operating system for?)
An operating system is one of the concepts associated with computers, and is the
basic system by which the technology works. It is essentially a package of
different programs which, by interacting, allow the computer to work smoothly
and correctly.
An operating system has three main functions: manage the computer's resources,
such as the central processing unit, memory, disk drives, and printers,
establish a user interface, and execute and provide services for applications
software.If the hardware is not equipped with an operating system, the computer
will not work at all.
Audio: https://voca.ro/1o3xJM3vwlVZ
Phrases of the day
1) priority research area - пріоритетний напрямок дослідження
The paper highlights net-zero solutions in eight priority sectors, setting out
actions to take now, research priorities for the next decade, and future
benefits for each sector.
У документі висвітлюються нульові рішення у восьми пріоритетних секторах,
викладаються дії, які необхідно вжити зараз, пріоритети досліджень на наступне
десятиліття та майбутні переваги для кожного сектора.
2) prevailing view - домінуючий погляд
Nationalism is also influencing the prevailing view of vaccines in Turkey.
Націоналізм також впливає на домінуючий погляд на вакцини в Туреччині.
3) practical problems - практичні проблеми
Aside from the moral objections we might have to routinely paying money to
criminals, this practice causes two important practical problems.
Окрім моральних заперечень, які нам, можливо, доведеться регулярно платити гроші
злочинцям, ця практика викликає дві важливі практичні проблеми.
Audio: https://voca.ro/1abFECOSINfU
· #551
Daniil Dragin (RZ-211 Lebedeva E.) (Tuesday, 17 May 2022 09:03)
Software firewall №10
Software firewall - a generic name for physical devices or software applications
configured to allow, deny, encrypt, pass network traffic between areas of
different network security according to the desired set of security rules.
The firewall can be in the form of a separate device or software installed on a
personal computer or proxy server.
Firewalls are divided into:
-stateless, which do not monitor current connections, but filter the data flow
solely on the basis of static rules;
-stateful, with tracking of current connections and skipping only such packets
that correspond to the logic and algorithms of the relevant protocols and
programs. These types of firewalls allow you to more effectively deal with a
variety of DDoS attacks and vulnerabilities in some network protocols.
https://voca.ro/1kCxDg6i1xgG
1)priority research area
One of the priority research areas is the use of Ecstasy by young people.
Одним із пріоритетних напрямків дослідження є вживання екстазі молоддю.
2)practical problems
Aside from the moral objections we might have to routinely paying money to
criminals, this practice causes two important practical problems.
Крім моральних заперечень, які нам, можливо, доведеться регулярно платити гроші
злочинцям, ця практика викликає дві важливі практичні проблеми.
3)prevailing view
The prevailing view was that the text of draft article 32 should be retained as
drafted.
Переважала думка, що текст проекту статті 32 слід зберегти у редакції.
https://voca.ro/1myKMLkJvJkf
· #550
Popovych E. (Tuesday, 17 May 2022 08:50)
To
Mashovets Andrey (RZ 212)
Thanks for your comments, voice messages and work with the phrases. Keep on
working.
· #549
Popovych E. (Tuesday, 17 May 2022 08:48)
To
Poddubrovskaya Nastya(RZ-212)
Thank you for your comment. The review you have sent was written correctly, it
meets all the requirements for such kind of independent student work.
· #548
Ilinchuck Vladislav RZ-211 (Lebedeva) (Tuesday, 17 May 2022 08:47)
5#Technical basis of information protection in modern computer systems.
As computers become better understood and more economical, every day brings new
applications. Many of these new applications involve both storing information
and simultaneous use by several individuals.
Many examples of systems requiring protection of information are encountered
every day: credit bureau data banks; law enforcement information systems;
time-sharing service bureaus; on-line medical information systems; and
government social service data processing systems. These examples span a wide
range of needs for organizational and personal privacy.
Examples of security techniques sometimes applied to computer systems are the
following:
-labeling files with lists of authorized users,
-verifying the identity of a prospective user by demanding a password,
-shielding the computer to prevent interception and subsequent interpretation of
electromagnetic radiation,
-enciphering information sent over telephone lines,
-using redundant circuits or programmed cross-checks that maintain security in
the face of hardware or software failures,
certifying that the hardware and software are actually implemented as intended.
In many cases, it is not necessary to meet the protection needs of the person
responsible for the information stored in the computer entirely through
computer-aided enforcement. External mechanisms such as contracts, ignorance, or
barbed wire fences may provide some of the required functional capability. This
discussion, however, is focused on the internal mechanisms.
1)https://voca.ro/1ku8Cb2BRLGR
priority research area
This framework should consider priorities regarding research areas, best
practices, and knowledge transfer.
Ця структура повинна враховувати пріоритети щодо напрямків досліджень,
передового досвіду та передачі знань.
practical problems
This project funded research on technical solutions for practical problems in
the developing world.
Цей проект фінансував дослідження технічних рішень практичних проблем у країнах,
що розвиваються.
prevailing view
The prevailing view was that the text of draft article 32 should be retained as
drafted.
Переважала думка, що текст проекту статті 32 слід зберегти у редакції.
2)https://voca.ro/1975yYv8aGKk
· #547
Popovych E. (Tuesday, 17 May 2022 08:47)
To
Kolomiets Volodymir RZ 212
Your comments are well done. Continue working.
· #546
Popovych E. (Tuesday, 17 May 2022 08:46)
To
Nikitina Anastasia RZ-212
#522, 526
Exam topic #16 (The Essentials of Information Protection) is well done.
Thank you for the comments and work with the phrases. I appreciate it. Keep on
working.
· #545
Gvozd O.V. to RZ-211 (Tuesday, 17 May 2022 08:45)
Good day!
The lesson will start soon, so I am waiting for your comments, sentences with
Phrases and audio recordings. Don't forget to write your Independent practice
and add the exam topic. Please, do it in one comment.
· #544
Popovych E. (Tuesday, 17 May 2022 08:43)
To
Kravchenko Kostiantyn (RZ-212)
The comment of the article is written correctly and corresponds to the standards
of independent student work of such kind.
· #543
Khotynskiy O, (RZ-212, Mikhailuk) (Tuesday, 17 May 2022)
Today I have read the article "Video gamers skills enhanced by training 10
minutes a day". It tells how scientists from Lero, the Science Foundation's
Irish Software Research Center and the University of Limerick concluded that
gamers can improve their gaming skills with just 10 minutes of practice a day.
Such training turned out to be the most effective with the additional use of
transcranial Direct Current Stimulation; for this, the participants of the
experiment were put on a special headset. As a result of the study, scientists
came to the conclusion that neurostimulation can significantly accelerate the
improvement of motor activity.
For me, as a gamer, this information seemed very interesting and useful, because
now I also know how I can improve my skill in video games in the shortest
possible time.
https://techxplore.com/news/2021-03-video-gamers-skills-minutes-day.html
https://voca.ro/14fs85pVREfD
1) prevailing view
There's been this prevailing view that the North American monsoon may change,
that things may get drier or wetter because the thermal contrast between the
land and the ocean is changing
Переважає думка, що північноамериканський мусон може змінитися, що все може
стати сухішим або вологим, оскільки змінюється тепловий контраст між сушею та
океаном.
2) practical problems
Measures are being agreed to overcome these practical problems.
Узгоджуються заходи щодо подолання цих практичних проблем.
3) priority research area
A new paper by leading UK scientists sets out key solutions and policy actions
that should be implemented now, as well as priority research areas for the next
decade, if the UK is to reach its net zero target by 2050.
У новій роботі провідних британських вчених викладено ключові рішення та
політичні дії, які мають бути реалізовані зараз, а також пріоритетні напрямки
досліджень на наступне десятиліття, якщо Велика Британія хоче досягти своєї
чистої нульової цілі до 2050 року.
https://voca.ro/1ovOz04Cyp8f
· #542
Lebedeva E. (Tuesday, 17 May 2022 08:42)
To РЗ-211 Good morning! The lesson will start soon, so I am waiting for your exam topics, sentences with Phrases and audio recordings.
· #541
Popovych E. (Tuesday, 17 May 2022 08:41)
To
Artem Kotliarov RZ-212
Thank you for your comment on the article and for your work. It is nice that you
do it regularly.
· #540
Bilokamenskiy Anton (RF-211, Lebedeva E. V.) (Tuesday, 17 May 2022 08:40)
Reading
Exercise 2
1. The most often mentioned defect lies in choice of password--if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2. Because in one recent study of some 300 self-chosen passwords on a typical
time-sharing system, more than 50 percent were found to be short enough to guess
by exhaustion.
3. An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4. They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5. An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control
Speaking
Exercise 1
1. Information Science is a discipline that deals with processes that are
storing or transferring information.
2. Forgery is a process of producing a copy of a document signature, banknote or
work of art
3. Bit is a smallest unit information in computer’s memory
4. Sequence is a particular order in which things happened are arranged
Exercise 2
1. Why do some systems have programs that generate random sequences of letters
for use as passwords?
2. What the "masquerader" does after receiving the password?
3. What happens to a computer that has been cut off from communications?
Writing
Passwords is the basic way to protect our accounts. We always should try to
create the strong password, for our information to be secured. Nowadays a lot of
big services added a double authentication system to our accounts, so even if
our login and password fall into the wrong arms, they cant get access to account
without our mobile phone. This simple method helps to save our account from
being hacked. So, passwords is still the basic protection of the account, but if
we want to fully protect our data, we need to use all the methods.
Audio: https://voca.ro/13av02hLFGoD
· #539
Lebedeva E. (Tuesday, 17 May 2022 08:38)
To Gridnev Dmytro(RF-211) The topic is written correctly, but there are mistakes in the questions.
· #538
Popovych E. (Tuesday, 17 May 2022 08:38)
To
Povoznikov Artem RZ-212
Your task is complete, informative and interesting. Well done.
· #537
Lebedeva E. (Tuesday, 17 May 2022 08:37)
To Ram Nassur Rz 212 You didn't write the name of the article and its author. Also you forgot to give the translation of the sentences with phrases of the day.
· #536
Mashovets Andrey (RZ 212, Popovich) (Tuesday, 17 May 2022 08:35)
Today I’ve read the article “Bringing AI into the real world”.
This article is about use of artificial intelligence in modelling and in real
life.
The purpose of this article is to show how artificial intelligence can be used
in real life.
Thus, explained AI helps to make decisions effective, said Professor Lo, and
established methods and principles of cognitive psychology can be applied to
develop solutions that can make black boxes AI more understandable.
I believe this article will be useful for people interested in artificial
intelligence, as well as the article will be useful for the self-development of
the reader.
https://voca.ro/15wYMfF2ktVI
https://techxplore.com/news/2021-05-exploring-partial-synchronization-networked.html
1.prevailing view
Study challenges prevailing view of invasive species
2.priority research area
A new paper by leading UK scientists sets out key solutions and policy actions
that should be implemented now, as well as priority research areas for the next
decade, if the UK is to reach its net zero target by 2050.
3.practical problems
Yet when these experts bring AI into the real world and use it to solve
practical problems, they have to answer questions such as why the AI made a
specific prediction or decision, and whether it gives enough confidence for us
to act on it.
https://voca.ro/15wYMfF2ktVI
· #535
Lebedeva E. (Tuesday, 17 May 2022 08:33)
To Pontus Natalia(RF-211) Thanks for the work. Mind the word order in the second question.
· #534
Gridnev Dmytro(RF-211)(Lebedeva E.V.) (Tuesday, 17 May 2022 08:33)
Ex
2 Reading
1) The most often mentioned defect lies in choice of password--if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2) Because in one recent study of some 300 self-chosen passwords on a typical
time-sharing system, more than 50 percent were found to be short enough to guess
by exhaustion.
3) An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4) They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5) An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control
Ex 1 Speaking
1) Transferring funds electronically to a bank account.
2) Fingerprint, facial recognition, and digital signature specialists.
3) Computer memory upgrades are needed when your computer operation slows down.
4) Put everything in tiptop order.
Ex 2 Speaking
1) Why half of passwords are easy to guess?
2) What the "masquerader" does after receiving the password?
3) What it means if computer programed to "masquerade"?
Ex2 Writing
Password security is important. If you are guilty of using weak passwords,
reusing or rotating certain words or numbers, you’ll be at risk of getting
hacked. The consequences of a break-in could be catastrophic, with victims
losing data, emails, money, images or even important personal information. If
someone obtains all of this, you could even be at risk of identity theft.
If you want your accounts and data to stay private and secure, you need to know
exactly what constitutes a strong password and what to avoid when looking into
password security.
Why password security is important…
Cyber-security is a major issue these days with the impacts of a successful hack
being potentially massive. Usually, the most common way a hacker will break into
your computer or account will be by guessing your password. Commonly used and
weak passwords allow intruders to easily access and control your device. Some
other ways a hacker may try to ‘break-in’ to your account or device include:
Force
Hackers use an automated software that works through a cycle of guess work. The
software will pair numerous combinations of usernames and passwords until it
finds a match. Therefore, the easier your password is to guess, the more likely
the software will be able to break-in to your account or device.
Dictionary
A hacker dictionary includes a list of the most common password combinations.
They run this dictionary against your passwords, making you vulnerable to
break-ins if your passwords are weak and used across multiple devices or
accounts.
Vocaroo:https://voca.ro/13q4FnvRKKBm
· #533
Ram Nassur Rz 212 Lebedeva E.V (Tuesday, 17 May 2022 08:32)
As
renewable energy is expected to become a much larger share of the global energy
mix, storage solutions are needed.
The article describes the needs for energy storage. As well as opportunities to
understand how technology can help. Become cost-effective and energy-saving
solutions.
Longer life energy storage technologies may include hydraulic pumps; salt melts.
Also, these technologies can provide network-wide storage in the long term;
however, more detailed analysis is needed to motivate industry investment and
determine the full value of the technology to the network.
For more complete results: better temporal representation for production cost
models and capacity planning models; behaovir of storage technologies under
different loads and levels of renewable energy sources; and more informed
technology validation.
Overall, long-term storage technologies can displace carbon-intensive energy
sources, provide sustainability and transfer delay benefits, and become an
economically viable investment.
https://voca.ro/1lsEwqwsikOq
https://techxplore.com/news/2021-05-short-term-energy-storage.html
priority research area
Finally, the Action will recommend priority research areas for future
biosecurity improvement in animal production systems
prevailing view
Nationalism is also influencing the prevailing view of vaccines in Turkey.
practical problems
That was fairly positive: the algorithms work, but we still need to solve a
number of practical problems before we can properly apply them in practice
https://voca.ro/1mMpoNvXamZh
· #532
S.Mykhailiuk (Tuesday, 17 May 2022 08:32)
To Kate Kholodova (РЗ- 212) Task1 has grammar errors with the conclusion unavailable. Just 70 points. Task2 is 77 points, please translate the phrases themselves. Keep on working hard.
· #531
Pontus Natalia(RF-211)(Lebedeva E.V.) (Tuesday, 17 May 2022 08:29)
Ex 1 Speaking
1) Information Science is a discipline that deals with processes that are
storing or transferring information.
2) Forgery is a process of producing a copy of a document signature, banknote or
work of art
3) Bit is a smallest unit information in computer’s memory
4) Sequence is a particular order in which things happened are arranged
Ex 2 Speaking
1) Which was discovered in a recent study of some 300 self-chosen passwords on a
typical time-sharing system?
2) Why the caller may not even suspect that his password has been stolen?
3) What can be done with the computer to steal the user's password?
Ex 2 Reading
1) The most often mentioned defect lies in choice of password--if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2) Because in one recent study of some 300 self-chosen passwords on a typical
time-sharing system, more than 50 percent were found to be short enough to guess
by exhaustion.
3) An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4) They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5) An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control
Ex 2 Writing
Confidentiality is becoming an increasingly rare commodity today. It's important
to know that Passwords provide a line of protection against unauthorized access
to your computer and personal information. The more secure the password, the
more secure your computer is from hackers and malware. That's why you should
maintain strong passwords for all accounts on your computer. Here are some tips
to help you protect your privacy.
Do not use the same password for multiple accounts.
Do not use personal information when creating your password.
Avoid successive keyboard shortcuts.
Always log out if you leave your device for the day.
Avoid entering passwords on computers that you do not control - they may be
equipped with malicious software that intentionally steals your password.
Avoid entering passwords when connecting to unsecured Wi-Fi connections -
hackers can intercept your passwords and data through unsecured connections.
Never share your password with anyone.
We are all responsible for the preservation of our information. These tips will
help you avoid most of the pitfalls you may encounter along the way.
https://voca.ro/1nl6GkRS7thS
· #530
Poddubrovskaya Nastya(RZ-212, Popovych. E) (Tuesday, 17 May 2022 08:27)
Today I have read the article: "A decade of hacking: The most notable
cyber-security events of the 2010s". There were many interesting situations, but
I choose two. Firstly, I would like to tell you about The Target hack. Target
admitted that malware planted on its stores' systems had helped hackers collect
payment card details for roughly 40 million users. Secondly, there was an
accident with stolen data. Company Adobe admitted that hackers had stolen the
data of more than 153 million users. For many years to come, the incident was
used to push for the adoption of strong password hashing functions. In my
opinion, we need to analyze these cases and try to prevent them from happening
in the future.
Article:https://www.zdnet.com/article/employee-safety-is-for-sale/
https://voca.ro/15jajn9y57Rj
priority research area
One of the priority research areas is the use of Ecstasy by young people.
Одной из приоритетных областей этого исследования является вопрос употребления
"экстази" молодыми людьми.
practical problems
This project funded research on technical solutions for practical problems in
the developing world.
В рамках этой программы финансировались исследования по поиску технических
решений практических проблем, с которыми сталкиваются развивающиеся страны.
prevailing view
The prevailing view was that the draft article was important and should remain.
Возобладало мнение о том, что данный проект статьи играет важную роль и что его
следует сохранить.
https://voca.ro/1mKVEla9hase
· #529
Tihonov Ivan (RZ-213 Vorobyova E.V) Debt for 12.05.2022 (Tuesday, 17 May 2022 08:25)
1.
prevailing view
translate: превалирующее мнение
example: The prevailing view was that both issues should be dealt with.
2. practical problems
translate: практические проблемы
example: During the experiment, we encountered a number of practical problems.
3. priority research area
translate: приоритетное исследование областей
example: In order to speed up the experiment, the money was allocated to
priority research areas.
I read an article today about the study of space, specifically the behaviour of
black holes. During the first billion years of our Universe, the winds created
by massive black holes were much stronger than now. The strength of this wind
stopped the growth of black holes. This was shown by research at the Italian
National Institute of Astrophysics in Trieste. The work is based on observations
of 30 quasars using a very large telescope. Quasars are extremely bright point
sources in the nuclei of distant galaxies, their emission comes from the
intensity of a central black hole sucking in the surrounding energy. About half
of the quasars observed in this study exhibit black hole winds, which are much
more frequent and 20 times more powerful than those known in quasars of closer
cosmos when the Universe was about 4 billion years old. This study showed that
cosmic wind energy could stop the growth of black holes. Humanity now knows a
little more about the cosmos.
article: https://phys.org/news/2022-05-black-hole-longer.html
· #528
Kate Kholodova (RZ-212, Mikhailuk) (Tuesday, 17 May 2022 08:24)
Today I've read the article, which is titled "Astronomers may have discovered
the first planet outside of our galaxy". This article tells us about how Rosanne
Di Stefano of the Center for Astrophysics in Cambridge, Massachusetts and her
colleagues with the help of NASA's Chandra X-ray Observatory, opened up a new
window to search for exoplanets at greater distances than ever before. This new
result was based on transits, events in which the passage of a planet in front
of a star blocks some of the star's light and produces a characteristic dip.
Scientists looked for X-ray transits in three galaxies beyond the Milky Way
galaxy, using both Chandra and the European Space Agency's XMM-Newton and after
looking through 443 different systems in 3 galaxies, they only found 1 single
exoplanet candidate. The authors will search the archives of both Chandra and
XMM-Newton for more exoplanet candidates in other galaxies.
Article: https://phys.org/news/2021-10-astronomers-planet-galaxy.html
Audio: https://voca.ro/12kUeLjRsdzz
1. practical problems
This project funded research on technical solutions for practical problems.
Цей проект фінансував дослідження технічних рішень практичних проблем.
2. prevailing view
The prevailing view, however, was that the draft Guide should not include such
recommendations.
Однак переважала думка, що проект посібника не повинен містити таких
рекомендацій.
3. priority research area
It is therefore intended to resemble more a brainstorming and consensus-building
meeting than a planning session to list priority research areas.
Тому він має нагадувати більше мозковий штурм та нараду для досягнення
консенсусу, ніж сесію планування, щоб перерахувати пріоритетні напрямки
дослідження.
Audio ph: https://voca.ro/11N5cHKAXsbx
· #527
Lebedeva E. (Tuesday, 17 May 2022 08:21)
To
Mashegirov Eugene (RF-211),Maksim Teliga (RF-211) Well done, thank you.
Gromovaya Vlada (RF-211) There is a mistake in the question 2. You forgot about
auxiliary verb.
· #526
Nikitina Anastasia RZ-212(Popovych E.) (Tuesday, 17 May 2022 08:16)
Today I have read the article "Computer simulation brings us closer to schools
of fishlike underwater research drones". This article is about using 3D
simulation to show that small fish swimming in a canopy can feel the position
and beating of their neighbors' tails as a change in water pressure in their
body. It is believed that this mechanism allows fish to swim as efficiently as
possible in a group, even in complete darkness, when visual cues are not
available. I believe that knowing how much energy a fish consumes in food by
optimizing its movement in groups is also important for predicting their
migration patterns, which is useful for the fishing industry.
https://voca.ro/13GsDQd0JGw1
https://techxplore.com/news/2022-03-simulation-closer-schools-fishlike-underwater.htm
1.prevailing view
Study challenges prevailing view on how metal organic frameworks store gases by
Lynn Yarris
Лінн Ярріс вивчити проблеми, які переважають у поглядах на те, як металеві
органічні каркаси зберігають гази
2.priority research area
Gender equality has been a key priority in the European Research Area for over a
decade.
Гендерна рівність була ключовим пріоритетом в Європейському дослідницькому зоні
понад десять років.
3. practical problems
Yet when these experts bring AI into the real world and use it to solve
practical problems
Але коли ці експерти впроваджують AI в реальний світ і використовують його для
вирішення практичних проблем
https://voca.ro/1kbxSnI5Y7oc
· #525
Lebedeva E. (Tuesday, 17 May 2022 08:15)
To
Shulyak Makar RF-211,Julia Shevchuk (RF-211) Ivkov Yurii (RF-211) Well done.
Alexander Shibaev and Rosinskiy Kyrylo RF-211 There are mistakes in the
questions.
· #524
Mashegirov Eugene (RF-211) (Lebedeva E.V.) (Tuesday, 17 May 2022 08:15)
Ex.
2 Reading
1) The most often mentioned defect is connected with the choice of password
because if a person chooses his own password it may be too easy for someone to
guess it.
2) Some systems generate random passwords because, as study shows, a lot of
chosen passwords were found to be short enough to guess by exhaustion.
3) An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4) Passwords and unforgeable objects are "one-way" authentication schemes. They
authenticate the user to the computer system, but not vice versa.
5) An easy way for an intruder to penetrate a password system is to intercept
all communications to and from the terminal and direct them to another computer
under the interceptor's control.
Ex. 1 Speaking
1) Information Science is a discipline that deals with processes that are
storing and transferring information.
2) Forgery is a process of producing a copy of a document signature, banknote or
work of art.
3) Bit is the smallest unit of information in a computer's memory.
4) Sequence is a particular order in which things that happened are arranged.
Ex. 2 Speaking
1) What does the recent study of some 300 self-chosen passwords show?
2) What does the "masquerader" do after receiving the password?
3) What happens to a computer that has been cut off from communications?
Ex. 2 Writing
Password as a general technique of secrecy
A password is your personal key to a computer system. Passwords help to ensure
that only authorized individuals access computer systems. Passwords also help to
determine accountability for all transactions and other changes made to system
resources, including data. If you share your password with a colleague or
friend, you may be giving an unauthorized individual access to the system and
may be held responsible for their actions.
Audio: https://voca.ro/13G4x79QLs0w
· #523
Kolomiets Volodymir RZ 212 (Popovych) (Tuesday, 17 May 2022 08:12)
Today i have read the article "Researchers determine optimum pressure to improve
the performance of lithium metal batteries". This article is about a new method
how to produce optimal performance. Scientists say that using lithium metal to
replace the graphite for battery anodes is the ultimate goal for part of the
battery R&D field. For example, lithium metal battery-powered electric vehicles
would have twice the range of lithium-ion battery-powered vehicles, for the same
battery weight. But even it is not the best way, because of its short lifespan
and potential safety hazards, specifically short circuits caused by lithium
dendrite growth. But as they said, this inventions would have to be retooled for
this new technique to be applied.
I found this article quite interesting, as there i got new knowledge about
techical process. So, i like this article.
https://techxplore.com/news/2021-10-optimum-pressure-lithium-metal-batteries.html
https://voca.ro/12XXIQuMM7mS
1) priority research area
Gender equality has been a key priority in the European Research Area for over a
decade
Гендерна рівність була ключовим пріоритетом у Європейському дослідницькому
просторі вже більше десяти років
2) practical problems
Solving practical problems
Розв’язування практичних задач
3) prevailing view
Study challenges prevailing view on how metal organic frameworks store gases
Вивчіть проблеми, які переважають у поглядах на те, як металеві органічні
каркаси зберігають гази
https://voca.ro/15f3zM6HvBij
· #522
Nikitina Anastasia RZ-212(Popovych E.) (Tuesday, 17 May 2022 08:11)
Exam topic #16 (The Essentials of Information Protection)
Information protection is a set of organizational and technical measures and
legal norms to prevent harm to the interests of the owner of the information or
the AU and persons who use the information. Ensuring the security of information
technology is a complex problem, which includes the legal regulation of the use
of IT, technology improvement
their development, development of the certification system, provision of
appropriate organizational and technical conditions of operation.
Means of information protection: Moral and ethical means, Legal means of
protection, Administrative (organizational) means of information protection,
Means of physical (technical) protection of information, Software means of
protection.
https://voca.ro/1jMDHj1mrwts
· #521
Gromovaya Vlada (RF-211) (Lebedeva E. V.) (Tuesday, 17 May 2022 08:10)
Reading Module
Ex. 2
1. The most often mentioned defect lies in choice of password--if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2. Because in one recent study of some 300 self-chosen passwords on a typical
time-sharing system, more than 50 percent were found to be short enough to guess
by exhaustion.
3. An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4. They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5. An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control.
Speaking module
Ex. 1
1. Information Science is a discipline that deals with processes that are
storing or transferring information.
2. Forgery is a process of producing a copy of a document signature, banknote or
work of art.
3. Bit is a smallest unit information in computer’s memory.
4. Sequence is a particular order in which things happened are arranged.
Ex. 2
1. Why do some systems have programs that generate random sequences of letters
for use as passwords?
2. What the "masquerader" does after receiving the password?
3. What happens to a computer that has been cut off from communications?
Writing module
Ex. 2
Password as a general technique of secrecy
A password is a string of characters intended to differentiate an authorized
user (for the purpose of permitting access) from an unauthorized user. Password
is used to prove one's identity, or authorize access to a resource.
Password confidentiality not only keeps the user's data secure, but also helps
prevent the unauthorized use of an individual's credentials to access the
organization's data. The stronger your password, the more protected your
computer will be from hackers and malicious software. You should maintain strong
passwords for all accounts on your computer.
Audio: https://voca.ro/13T3ne1085yS
· #520
Maksim Teliga (RF-211) (Lebedeva E.V.) (Tuesday, 17 May 2022 08:08)
Ex
2 Reading
1) The most often mentioned defect lies in choice of password--if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2) Because in one recent study of some 300 self-chosen passwords on a typical
time-sharing system, more than 50 percent were found to be short enough to guess
by exhaustion.
3) An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4) They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5) An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control
Ex 1 Speaking
1) Information Science is a discipline that deals with processes that are
storing or transferring information.
2) Forgery is a process of producing a copy of a document signature, banknote or
work of art
3) Bit is a smallest unit information in computer’s memory
4) Sequence is a particular order in which things happened are arranged
Ex 2 Speaking
1) What does the recent study of some 300 self-chosen passwords show?
Why do systems have programs that generate random passwords?
2) What does the "masquerader" do after receiving the password?
3) What happens to a computer that has been cut off from communications?
Password as a general technique of secrecy.
Password is a main way, how to protect your information. Passwords help to
ensure that only authorized individuals access computer systems. Nowadays we
have a lot of another methods protecting like faceID, finger scan, and another,
but you must have word password. Your password should not be the same as your
username. Your password should be unique. Do not use the same password across
multiple accounts. Don't use apps that you don't know because hackers can steal
your password.
Audio: https://voca.ro/19QgMnRonrWC
· #519
Shulyak Makar RF-211 (Lebedeva E. V.) (Tuesday, 17 May 2022 08:04)
Ex
2 Reading
1) The most often mentioned defect is connected with the choice of password
because if a person chooses his own password it may be too easy for someone to
guess it.
2) Some systems generate random passwords because, as study shows, a lot of
(more than 50 percent) of chosen passwords were found to be short enough to
guess by exhaustion.
3) An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4) Passwords and unforgeable objects are "one-way" authentication schemes. They
authenticate the user to the computer system, but not vice versa.
5) An easy way for an intruder to penetrate a password system is to intercept
all communications to and from the terminal and direct them to another computer
under the interceptor's control.
Ex 1 Speaking
1) Information Science is a discipline that deals with processes that are
storing and transferring information.
2) Forgery is a process of producing a copy of a document signature, banknote or
work of art.
3) Bit is the smallest unit of information in a computer's memory.
4) Sequence is a particular order in which things that happened are arranged.
Ex 2 Speaking
1) What does the recent study of some 300 self-chosen passwords show?
1.1) Why do systems have programs that generate random passwords?
2) What does the "masquerader" do after receiving the password?
3) What happens to a computer that has been cut off from communications?
Ex 2 Writing
Passwords are one of the most basic ways to protect our personal information
these days. They are used for basic protection of our data and if we do not take
the creation of a password seriously, then problems can arise. But the problem
of easy passwords has already been solved - double authentication. After you
have entered the password, you still need to confirm the login from the mobile
device. This simple procedure helps to save your account in case your password
is not strong. Thats why nowadays a weak password can still save your data.
Audio: https://voca.ro/1pqW8BW49j6v
· #518
Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 17 May 2022 08:01)
Today I've read the article "Using computers to better understand art".
The article covers an interesting topic of our abstract and subjective
understanding of art, as well as how a machine can analyze and detect patterns
in art.
The Workflows for Analysis of Images and Visual Stylometry is a digital tool,
which is capable of analyzing art and identifying specific pieces of it, using a
neural network. The tool is very intuitive in its design, presenting its use
process being as simple as drawing a flowchart.
I think the article is compelling, however I doubt the technology will see
success as a machine that can understand art. Art really comes down to being
subjective, and, until an AI can have a true mind of its own, I remain skeptical
to the idea, that art could be expressed in mathematical expressions.
Article: https://techxplore.com/news/2016-06-art.html
Audio: https://voca.ro/1fvYHgT1Wi7w
Phrases:
1) A new paper by leading UK scientists sets out key solutions and policy
actions that should be implemented now, as well as priority research areas for
the next decade.
Нова публікація від провідних вчених Великої Британії започатковує головні
рішення та зміни в політиці, які потрібно реалізувати зараз, а також пріоритетні
галузі дослідження для наступного десятиліття.
2) The prevailing view has been that the indigenous population had neither
territory, power nor economic resources.
Переважаючим поглядом було те, що корінне населення не мало ні території, ні
влади, ні економічних ресурсів.
3) This practice causes two important practical problems.
Ця практика створює дві важливі практичні проблеми.
Audio: https://voca.ro/16JwW6qE75G4
· #517
Alexander Shibaev (RF-211, Lebedeva E.V.) (Tuesday, 17 May 2022 07:59)
Reading (Ex.2)
1. The most often mentioned defect lies in choice of password--if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2. Because in one recent study of some 300 self-chosen passwords on a typical
time-sharing system, more than 50 percent were found to be short enough to guess
by exhaustion.
3. An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4. They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5. An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control
Speaking (Ex.1)
1. Information Science is a discipline that deals with processes that are
storing or transferring information.
2. Forgery is a process of producing a copy of a document signature, banknote or
work of art
3. Bit is a smallest unit information in computer’s memory
4. Sequence is a particular order in which things happened are arranged
Speaking (Ex.2)
1, Why do some systems have programs that generate random sequences of letters
for use as passwords?
2. What the "masquerader" does after receiving the password?
3. What happens to a computer that has been cut off from communications?
Writing (Ex.2)
Passwords provide the first line of defense against unauthorized access to your
computer and personal information. The stronger your password, the more
protected your computer will be from hackers and malicious software. You should
maintain strong passwords for all accounts on your computer.
In general, a password is an arbitrary string of characters including letters,
digits, or other symbols. If the permissible characters are constrained to be
numeric, the corresponding secret is sometimes called a personal identification
number. The security of a password-protected system depends on several factors.
The overall system must be designed for sound security, with protection against
computer viruses, man-in-the-middle attacks and the like. Physical security
issues are also a concern, from deterring shoulder surfing to more sophisticated
physical threats such as video cameras and keyboard sniffers. Passwords should
be chosen so that they are hard for an attacker to guess and hard for an
attacker to discover using any of the available automatic attack schemes.
Nowadays, it is a common practice for computer systems to hide passwords as they
are typed. The purpose of this measure is to prevent bystanders from reading the
password; however, some argue that this practice may lead to mistakes and
stress, encouraging users to choose weak passwords. As an alternative, users
should have the option to show or hide passwords as they type them.
· #516
Julia Shevchuk (RF-211) (Lebedeva E.V.) (Tuesday, 17 May 2022 07:59)
Ex
2 Reading
1) The most often mentioned defect lies in choice of password--if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2) Some systems generate random passwords because, as study shows, a lot of
(more than 50 percent) of chosen passwords were found to be short enough to
guess by exhaustion.
3) An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4) They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5) An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control
Speaking ex1
Internationalisation deals with the process of designing software so that it can
accommodate changing environments without changes to the code.
Computer memory is the storage space in the computer, where data is to be
processed and instructions required for processing are stored.
We should avoid producing documents that are lengthy and inconclusive
Speaking ex 2
1. why do you need a program to generate a random password?
2 what does the masquerader do after getting the password?
3. What happens when a computer is disconnected from communication
Password as a general technique of secrecy
Passwords provide the first line of defense against unauthorized access to your
computer and personal information. The stronger your password, the more
protected your computer will be from hackers and malicious software. You should
maintain strong passwords for all accounts on your computer. For example you
should use a unique password for each of your important accounts. Do not use the
same password across multiple accounts.Also your password should be at least 8
characters long. Password should consist of lowercase and uppercase letters,
numbers and symbols. A long password will offer more protection than a short
password if it is properly constructed. And of course do not use personal
information such as your name, age, date of birth, child’s name, pet’s name, or
favorite color/song when constructing your password.
https://voca.ro/1hV9mo7e7fRw
· #515
Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 17 May 2022 07:54)
1)
1. priority research area
It is therefore intended to resemble more a brainstorming and consensus-building
meeting than a planning session to list priority research areas. - Тому він має
нагадувати більше мозковий штурм та нараду для досягнення консенсусу, ніж сесію
планування для перерахування пріоритетних дослідницьких сфер.
2. prevailing view
The prevailing view, however, was that the matter merited attention in the
context of the draft Convention. - Проте переважала думка, що це питання
заслуговує уваги в контексті проєкту Конвенції.
3. practical problems
Research institutions should keep collaborating with national laboratories and
industries to solve practical problems in the battery field - Науково-дослідні
установи повинні продовжувати співпрацю з національними лабораторіями та
промисловими підприємствами для розв'язання практичних проблем у сфері
акумуляторів
https://voca.ro/1h56YDSvZ72O
2) Today I have read the article “Super-strong surgical tape detaches on
demand”.
Last year, MIT engineers developed a double-sided adhesive that could quickly
and firmly stick to wet surfaces such as biological tissues. Now they have
further developed the adhesive so that it can be detached from the underlying
tissue without causing any damage. By applying a liquid solution, the new
version can be peeled away like a slippery gel in case it needs to be adjusted
during surgery, for example, or removed once the tissue has healed.
In my opinion, this invention will facilitate the work of the surgeon during the
operation
https://techxplore.com/news/2020-06-super-strong-surgical-tape-detaches-demand.html
https://voca.ro/1bPrdsK8CPXV
· #514
S.Mykhailiuk (Tuesday, 17 May 2022 07:53)
To Vivchar Roman (RF-211) Thanks .Task1- «області»- «галузі» Just good. Task2 is a bit lengthy. Just 79 points. Keep on working hard and invite others belonging to this subgroup to join us during this session.
· #513
Ivkov Yurii (RF-211)(Lebedeva E.V.) (Tuesday, 17 May 2022 07:51)
Ex
2 Reading
1) The most often mentioned defect is connected with the choice of password
because if a person chooses his own password it may be too easy for someone to
guess it.
2) Some systems generate random passwords because, as study shows, a lot of
(more than 50 percent) of chosen passwords were found to be short enough to
guess by exhaustion.
3) An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4) Passwords and unforgeable objects are "one-way" authentication schemes. They
authenticate the user to the computer system, but not vice versa.
5) An easy way for an intruder to penetrate a password system is to intercept
all communications to and from the terminal and direct them to another computer
under the interceptor's control.
Ex 1 Speaking
1) Information Science is a discipline that deals with processes that are
storing and transferring information.
2) Forgery is a process of producing a copy of a document signature, banknote or
work of art.
3) Bit is the smallest unit of information in a computer's memory.
4) Sequence is a particular order in which things that happened are arranged.
Ex 2 Speaking
1) What does the recent study of some 300 self-chosen passwords show?
1.1) Why do systems have programs that generate random passwords?
2) What does the "masquerader" do after receiving the password?
3) What happens to a computer that has been cut off from communications?
Ex 2 Writing
1) Password as a general technique of secrecy.
Password is a combination of characters that most information systems use for
our personal data protection. Passwords provide the first line of defense from
unauthorized access to your computer, account and other personal information.
There is a main problem that if your password is short and easy enough, it can
be guessed, so it is important to make sure that passwords you are using are
strong enough and are different for various platforms and services that use are
registered at.
If you’ve avoided the problem of short and easy passwords, there is still a
defect in this technique, that is if systems where you expose the password are
distant from the computer, the password must be sent through another
communication system, and may be intercepted.
Vocaroo: https://vocaroo.com/16cVByAXQcxs
· #512
Rosinskiy Kyrylo RF-211 (Lebedeva E.) (Tuesday, 17 May 2022 07:51)
The
Reading Module, Ex 2
1. The most often mentioned defect lies in the choice of password – if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2. Because in one recent study of some 300 self-chosen passwords on a typical
time-sharing system, more than 50 percent were found to be short enough to guess
by exhaustion.
3. An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4. They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5. An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control.
The Speaking Module, Ex 1
1. Information Science is a discipline that deals with processes that are
storing or transferring information.
2. Forgery is a process of producing a copy of a document signature, banknote or
work of art.
3. Bit is the smallest unit of information in a computer's memory.
4. Sequence is a particular order in which things happen..
The Speaking Module, Ex 2
1. Why do some systems have programs that generate random sequences of letters
for use as passwords?
2. What does the "masquerader" do after receiving the password?
3. What can a computer that is under the interceptor’s control to penetrate a
password system?
The Writing Module, Ex 2
A password is secret data, typically a string of characters, usually used to
confirm a user's identity. Traditionally, passwords were expected to be
memorized, but the large number of password-protected services that a typical
individual accesses can make memorization of unique passwords for each service
impractical. In general, a password is an arbitrary string of characters
including letters, digits, or other symbols. Passwords should be chosen so that
they are hard for an attacker to guess and to discover using any of the
available automatic attack schemes. The overall system must be designed for
sound security, with protection against computer viruses, man-in-the-middle
attacks and the like. Physical security issues are also a concern, from
deterring shoulder surfing to more sophisticated physical threats such as video
cameras and keyboard sniffers.
In my opinion, a password is the simplest method to secure data, but at the same
time it should not be neglected by making an easy combination of symbols.
Audio: https://voca.ro/1ooqkDPEf2kz
· #511
Vivchar Roman (RF-211) S. Mykhailiuk (Tuesday, 17 May 2022 07:45)
-
Practical problems.
When you run the code, it gives errors of practical problems.
Під час запуску коду видає помилки практичних проблем.
- Prevailing view.
The prevailing view of the group was that mathematics was a boring subject.
Переважна думка групи полягала в тому, що математика є нудним предметом.
- Priority research areas.
Priority research areas are those related to electronics.
Пріоритетними дослідницькими областями є області, пов'язані з електронікою.
> The importance of system software for computer operation.
System programs combine with application programs and resources to control the
computer - CPU, memory, I/O.
These are widespread programs intended for all computer users. System software
is designed to run application programs on a computer.
The operating system acts as a link between the hardware, on the one hand, and
executes programs, as well as the user, on the other hand of the computer.
The operating system is usually stored in the external memory of the computer -
on the disk. When you turn on the computer, it is read from disk memory and
placed in RAM. This process is called booting the operating system.
An operating system can be called a software extension of a computer's control
device. The operating system hides complex unnecessary details of interaction
with the hardware from the user, forming a layer between them. As a result,
people are freed from the very laborious work of organizing interaction with
computer hardware.
In addition, it is the OS that provides the ability to customize the computer:
the OS determines which components the computer on which it is installed is
assembled from, and configures itself to work with these components.
Audio: https://voca.ro/1b68cYUfPeGx
· #510
S.Mykhailiuk (Tuesday, 17 May 2022 07:44)
To
1/3 of students from groups RF-211, РЗ-212
Welcome back to our activities this Monday. I am waiting for your comments,
summaries and audio recordings, please, insert the link to the article in your
comment. Do not forget about Phrases of the day.
· #509
Povoznikov Artem RZ-212 (Popovych) (Tuesday, 17 May 2022 07:44)
Today i have read the article: “How do you know where a drone is flying without
a GPS signal?”This article tells about person Jukko Kinnari who can determine
the location of the drone using sensors and data on the map. Ln decided to find
a way to find the object if we do not have access to satellite communications.
The researcher said that the drone has other sensors in addition to the camera,
such as a compass, pressure and angular velocity. In this way, Djukko combined
the map data and data from the drone camera to know where and when the drone was
flying. After his dessert, he went to work at saab because he was interested in
how research affects the generation of innovation. Doctoral research was able to
show him how the world has developed rapidly in different areas over the past 10
years. I believe that his research has brought many scientific advances. And
with it, we have a lot more machine learning capabilities than ever before.
Text:https://techxplore.com/news/2021-01-drone-gps.html
Audio: https://voca.ro/1fms6MWJMcSV
1)
practical problems
Aside from the moral objections we might have to routinely paying money to
criminals, this practice causes two important practical problems.
2)
Prevailing view
Study challenges prevailing view on how metal organic frameworks store gases.
3)
priority research areas
It is therefore intended to resemble more a brainstorming and consensus-building
meeting than a planning session to list priority research areas.
Audio:https://voca.ro/1b6RtA50LghR
· #508
Lebedeva E. (Tuesday, 17 May 2022 07:34)
To Biehin Yevhen RF-211 Not bad, but you forgot about auxiliary verb in the question 2.
· #507
Biehin Yevhen RF-211 (Lebedeva E.) (Tuesday, 17 May 2022 07:18)
Ex
2 Reading
1) The most often mentioned defect lies in choice of password--if a person
chooses his own password, he may choose something easily guessed by someone else
who knows his habits.
2) Because in one recent study of some 300 self-chosen passwords on a typical
time-sharing system, more than 50 percent were found to be short enough to guess
by exhaustion.
3) An alternative approach to secrecy is unforgeability. The user is given a
key, or magnetically striped plastic card, or some other unique and relatively
difficult-to-fabricate object.
4) They are "one-way" authentication schemes. They authenticate the user to the
computer system, but not vice versa.
5) An easy way for an intruder to penetrate a password system, is to intercept
all communications to and from the terminal and direct them to another
computer--one that is under the interceptor's control
Ex 1 Speaking
1) Information Science is a discipline that deals with processes that are
storing or transferring information.
2) Forgery is a process of producing a copy of a document signature, banknote or
work of art
3) Bit is a smallest unit information in computer’s memory
4) Sequence is a particular order in which things happened are arranged
Ex 2 Speaking
1) Why do some systems have programs that generate random sequences of letters
for use as passwords?
2) What the "masquerader" does after receiving the password?
3) What happens to a computer that has been cut off from communications?
Ex 2 Writing
Password as a general technique of secrecy
Passwords are one of the most basic ways to protect our personal information
these days. They are used for basic protection of our data and if we do not take
the creation of a password seriously, then problems can arise. But the problem
of easy passwords has already been solved - double authentication. After you
have entered the password, you still need to confirm the login from the mobile
device. This simple procedure helps to save your account in case your password
is not strong. Thats why nowadays a weak password can still save your data.
Audio: https://voca.ro/12lrzOaHnR9C
· #506
Popovych E. (Tuesday, 17 May 2022 07:02)
Good morning! The lesson has started, I am waiting for your comments, summaries and audio recordings, please, insert the link to the article in your comment. Do not forget about Phrases of the day. Good luck!
· #505
Lebedeva E. (Tuesday, 17 May 2022 07:00)
To РФ-211 Good morning! The lesson has started and I am waiting for your tasks. Good luck.
· #504
Kate Syrbu RZ-213 (Vorobyova) (Monday, 16 May 2022 13:32)
Exam topic #12
A hardware firewall is a physical appliance that is deployed to enforce a
network boundary. All network links crossing this boundary pass through this
firewall, which enables it to perform inspection of both inbound and outbound
network traffic and enforce access controls and other security policies. A
network security solution, a hardware firewall is designed to protect an
organization’s network boundary by being deployed in inline mode. This means
that the physical network cables over which traffic can cross this boundary are
connected to ports on the “inside” and “outside” of the firewall.
https://voca.ro/1h7TCQ48fXtE
· #503
Kate Syrbu RZ-213 (Vorobyova) (Monday, 16 May 2022 13:10)
Exam topic #11
Firewalls, both hardware and software, protect computers from hackers and other
online threats by blocking dangerous pieces of data from reaching the system.
The main difference between a hardware firewall and a software firewall is that
a software firewall is a software application placed on a computer, while a
hardware firewall is embedded in physical devices such as routers. Software
firewalls secure the PCs on which they are installed, whereas hardware firewalls
secure the whole network. Hardware firewalls can be set to use proxy services to
filter data packets, but software firewalls do not use proxy services.
https://voca.ro/19FNLzhZhRZi
· #502
Kate Syrbu RZ-213 (Vorobyova) (Monday, 16 May 2022 12:58)
Exam topic #10
Software firewall is a firewall that is installed on a computer or server, and
tasked with network security. It works with a wide variety of other technology
security solutions to provide more robust and cohesive security for enterprises
of all sizes. When a software firewall is installed on a server, it opens up
like an umbrella of protection over all other computers connected to the
network. It is able to monitor both incoming and outgoing traffic for potential
risk or suspicious user behaviour, and also makes setting security policies much
easier, faster and more flexible.
https://voca.ro/1nbIgvwQvsix
· #501
Kate Syrbu RZ-213 (Vorobyova) (Monday, 16 May 2022 12:28)
Exam topic #9
Firewall is a computer network security system capable of protecting against
viruses, malware, spam, and other types of attacks. The functions of a firewall
in a network are: controlling and monitoring Data Packet Flow, become a Network
Security Post, log user activity and prevent information leakage. When your
computer has firewall protection, everything entering and leaving the computer
will be monitored. The firewall monitors all information traffic to allow ‘good
data’ to enter, and blocks ‘bad data’ from entering the computer.
https://voca.ro/14jV5fuVhH8w
· #500
Kate Syrbu RZ-213 (Vorobyova) (Sunday, 15 May 2022 18:06)
Exam topic #8
Password-based authentication is one of the most popular approaches to
authenticate a user in various enterprise applications. But there are many
drawbacks associated with the password based authentication systems, for
example: easy passwords can be cracked, random passwords can't be remembered,
remembering Multiple Passwords, problems with passwords that needs to be
continuously changed, security vs. Ease-of-Use for Passwords, shoulder Surfing
Attack. Passwords can be shared, guessed or stolen, which means they aren’t
secure.
https://voca.ro/1bVfkz5iR56W
· #499
Kate Syrbu RZ-213 (Vorobyova) (Sunday, 15 May 2022 17:16)
Exam topic #7
Protection mechanisms are used to enforce layers of trust between security
levels of a system. These protection mechanisms are used to protect processes
and data: layering, abstraction, data hiding and encryption. Layering is
specific to protecting operating system resources and to setting security zones.
Abstraction is the concept of object-oriented programming (OOP) that “shows”
only essential attributes and “hides” unnecessary information. Data hiding is a
method used in OOP to hide information within computer code. Encryption is the
method by which information is converted into secret code that hides the
information's true meaning.
https://voca.ro/1o09ZDCKNRmH
· #498
Kate Syrbu RZ-213 (Vorobyova) (Sunday, 15 May 2022 16:35)
Exam topic #6
A virtual machine (VM) is an isolated environment with access to a subset of
physical resources of the computer system. Each VM appears to be running on the
bare hardware, giving the appearance of multiple instances of the same computer,
though all are supported by a single physical system. There are two types of
VMs, process and system. A process VM is a virtual platform created for an
individual process and destroyed once the process terminates. A system VM
supports an OS together with many user processes. A system VM provides a
complete system and each VM can run its own OS, which in turn can run multiple
applications.
https://voca.ro/1m0grB5h1A37
· #497
Kate Syrbu RZ-213 (Vorobyova) (Sunday, 15 May 2022 13:27)
Exam topic #5
Technical security is a very common type of security used in organizations which
use computers or nearly any type of technology. It deals with detecting
loopholes in a security system and finding adequate solutions to address the
risk of technical failure or hacking. Since most data exists in a non-physical
form, with the shifting of data to cloud drives and handheld gadgets, it is
difficult to ensure a secure session and transfer of information.
Technical security refers to a series of techniques which authenticates the
users login and data such that only verified user applications can read and
access data and applications.
https://voca.ro/119CDi0GMzcN
· #496
Kate Syrbu RZ-213 (S.Mykhailiuk) (Sunday, 15 May 2022 11:51)
Відпрацювання за 13.05.2022
1) in principle - в принципі;
Government indicated acceptance in principle but that pre-election timing was
not appropriate.
Уряд в принципі погодився, але передвиборний час був невідповідним.
2) in other words - іншими словами;
They're not specific against, in other words, the desire of a man for a man.
Іншими словами, вони не суперечать бажанню чоловіка до чоловіка.
3) the digital version - цифрова версія;
What you're going to hear now, and what you've never heard before, is an
enhanced digital version.
Те, що ви почуєте зараз, і те, чого ви ніколи не чули раніше, — це розширена
цифрова версія.
https://voca.ro/1dBBct5xFt3l
Today i have read the article about driver's licenses on iPhones. Apple
announced that Arizona is the first state to offer residents the option to add
their licenses or IDs directly to the Wallet app. The feature is support on the
iPhone 8 and later devices, as well as the Apple Watch 4 and later. Apple says
data presented in the process is encrypted and sent directly between the device
and the digital reader. I think that digital drivers license is convinient
technology because the Wallet ID will be work at various TSA checkpoints just by
tapping an iPhone or Apple Watch to a digital scanner.
https://techxplore.com/news/2022-03-driver-iphones-apple-wallet-feature.html
https://voca.ro/1kMAEB1ZTHZ7
· #495
Petrova E.I. (Friday, 13 May 2022)
Pour les étudiants qui apprennent le français.
Chers étudiants ! Travaillez régulièrement. J’attends vos devoirs. Laissez vos
commentaires et vos enregistrements ici. Allez-y! Bon travail.
· #494
S.Mykhailiuk (Friday, 13 May 2022 12:51)
To
some other students from group РЗ-213.
At least 9 more students have failed to. join our activities today at the
designated timeframe.
To monitor Chabanenko
Pls invite these students to prepare and post the tasks into the Guestbook
today.
· #493
S.Mykhailiuk (Friday, 13 May 2022 12:43)
To Igor Rudko (RZ-213) Task1 is good. Task2 Pls do this task on your own. Phrase 3 with a sentence has been used by one of your students earlier. Try avoid plagiarism! Just 60 points. Be responsible.
· #492
S.Mykhailiuk (Friday, 13 May 2022 12:35)
Correction
To Gorbatiuk Stanislav RZ-213
You didn’t meet all requirements to the phrases of the Day practice. Be
attentive,pls.
· #491
S.Mykhailiuk (Friday, 13 May 2022)
To Gorbatiuk Stanislav RZ-213 Task1. You didn’t all requirements to the phrases of the Day practice.just satisfactory. Task2 is good. Keep on working hard.
· #490
S.Mykhailiuk (Friday, 13 May 2022 12:27)
To Chabanenko Ksenia RZ-213 Thanks . Just good.
· #489
S.Mykhailiuk (Friday, 13 May 2022 12:19)
To Shlapak Dmytro RZ-213 Thanks. Just 83 points. Keep on working hard.
· #488
S.Mykhailiuk (Friday, 13 May 2022 12:16)
To Dasha Semidetnova RZ-213 thanks , just good. Be healthy.
· #487
S.Mykhailiuk (Friday, 13 May 2022 12:09)
To Ivan Siglyanyk(RZ-213) Thanks . Very good.
· #486
S.Mykhailiuk (Friday, 13 May 2022 12:03)
To Yakymova Anna/RZ-213 . thanks, just very good.
· #485
Igor Rudko (RZ-213) (S.Mykhailiuk) (Friday, 13 May 2022)
Audio: https://voca.ro/1cOupBE7GJIF
Article:https://www.zdnet.com/article/employee-safety-is-for-sale/
Today I have read the article: "A decade of hacking: The most notable
cyber-security events of the 2010s". There were many interesting situations, but
I choose two. Firstly, I would like to tell you about The Target hack. Target
admitted that malware planted on its stores' systems had helped hackers collect
payment card details for roughly 40 million users. Secondly, there was an
accident with stolen data. Company Adobe admitted that hackers had stolen the
data of more than 153 million users. For many years to come, the incident was
used to push for the adoption of strong password hashing functions. In my
opinion, we need to analyze these cases and try to prevent them from happening
in the future.
Phrases
Audio: https://voca.ro/195bZSaQovxR
1) in order to avoid - щоб уникнути
Plants in dense tropical forests are able to mask their chemical scents in order
to avoid being detected and eaten by insects. - Рослини в густих тропічних лісах
здатні маскувати свої хімічні запахи, щоб уникнути виявлення та поїдання
комахами.
2) in greater detail - більш детально
We have gone through this stage in greater detail so you can see how companies
naturally progress through this journey in a completely vendor-agnostic way. -
Ми пройшли цей етап більш детально, щоб ви могли побачити, як компанії,
природно, просуваються в цьому шляху, абсолютно не залежно від постачальників.
3) in a somewhat - дещо
The scientists believe this was partially due to the Wyoming mine being located
in a somewhat protected pit. - Вчені вважають, що частково це сталося через те,
що шахта Вайомінга була розташована в дещо захищеній ямі.
· #484
Gorbatiuk Stanislav RZ-213 (S.Mykhailiuk) (Friday, 13 May 2022 11:55)
1.
The Council calls on all the Liberian factions to stop the fighting immediately
and put the peace process back on track in order to avoid further suffering.
Рада закликає всі ліберійські угруповання негайно припинити бої та повернути
мирний процес у русло, щоб уникнути подальших страждань.
2. The draft had been presented in a somewhat unusual form to facilitate
comparison with the earlier version of the text which had been available in all
languages. Проект був представлений у дещо незвичайній формі, щоб полегшити
порівняння з попередньою версією тексту, яка була доступна всіма мовами.
3. Two such frameworks are described in greater detail below. Дві такі
фреймворки більш детально описані нижче.
https://voca.ro/13QsRFhTq5Ad
Today I've read the article, which is titled "Who benefits from praise?
Researcher publishes study on how recognition affects motivation". This article
tells us about how recognition motivates individuals who were not praised rather
than those in the limelight. A recent study done by Nick Zubanov, a professor of
business economics at the University of Konstanz, and Nicky Hoogveld from the
Dutch Ministry of Economic Affairs shows that human behaviour is influenced by
the individual's personal understanding of the norm. This applies for academia
as well as business environments. Student performance is influenced not only by
personal benefits, such as grades or passing an exam, but also by the existing
performance norms.
https://voca.ro/1lIbxzt2e2Ua
https://phys.org/news/2017-02-benefits-publishes-recognition-affects.html
· #483
Chabanenko Ksenia RZ-213(S.Mykhailiuk) (Friday, 13 May 2022 11:47)
1.in greater detail- більш детально;
All risks should be explored in greater detail to improve the data protection
system.-Усі ризики слід детальніше досліджувати для покращення системи захисту
даних.
2.in a somewhat-дещо;
Expert needs to look at the programming code in a somewhat more general
framework.-Експерту потрібно поглянути на програмний код у дещо більш загальних
рамках.
3.in order to avoid-щоб уникнути;
P2P transmission technology is used in order to avoid the data leakage.-Для
уникнення витоку даних використовується технологія передачі P2P.
https://voca.ro/1bFsqyK7DwSv
Today I've read the article about methods of predicting future cyberattacks.
Cyberattacks pose a big threat our modern society is faced with so researchers
are investigating ways to predict these attacks in order to avoid the
damage.Mathematical tools and computer stimulation are being explored as the
implement of the method.Also , analysis of macroscopic levels of abstractions is
the part of the research.The team used Granger causality to determine the nature
of the cyberattack signals which means that signals can be analyzed and
compared.For now, success of the research consists in knowledge of distinctive
nature of the attacks and discovering tools that will help in predicting
.Developing the appropriate defense tools to protect against sophisticated
attacks is expected in the future.
https://voca.ro/1atsrwIfvvyb
https://techxplore.com/news/2022-04-team-methods-future-cyberattacks.html
· #482
Shlapak Dmytro RZ-213 (Mikhailyuk) (Friday, 13 May 2022 11:08)
1.
- We will tell you in greater detail about this attack tomorrow.
- Завтра ми розповімо вам більш детально про цей напад.
2. - We will conduct a more thorough security check of the network every day in
order to avoid repeated attacks.
- Ми будемо проводити більш ретельну перевірку безпеки мережі кожен день, щоб
уникнути повторних атак.
3. - Although in a somewhat generalized form, we have made a project about the
cybersecurity of ships.
- Хоча і в дещо узагальненому вигляді, але ми зробили проект про кібербезпеку
судів.
https://voca.ro/13MGcD0ECYQD
Today I have read the article "Who benefits from praise? The researcher
publishes a study on how recognition affects motivation." As for me, it's not
that straight news and discovery. In principle, everyone has known this for a
long time. It's already clear that when you are praised, you feel more
confident, your mood rises, and so on.. I have experience in this matter and I
can confidently confirm the words of Zubanov and Hugveld. This research can have
a very big impact on the future education of schoolchildren and students.
https://voca.ro/156kQPWp4Iyr
https://phys.org/news/2017-02-benefits-publishes-recognition-affects.html
· #481
Dasha Semidetnova RZ-213 (S.Mykhailiuk) (Friday, 13 May 2022 10:59)
1.
The idea is that hackers compromise an online store, and leave behind malicious
code that logs payment card information.
Ідея полягає в тому, що хакери компрометують інтернет-магазин і залишають за
собою шкідливий код, який реєструє інформацію платіжної картки.
2. This distinction will be discussed in greater detail below.
Докладніше про зазначену відмінність буде сказано далі.
3. The Great Hack is a great documentary to watch if you ever need an insight
look at the whole scandal.
The Great Hack — чудовий документальний фільм, який варто подивитися, якщо вам
коли-небудь знадобиться глибокий погляд на весь скандал.
As the decade of the 2010s draws to a close, ZDNet looks back at the most
important cybersecurity developments of the past decade. Over the past decade,
we have seen it all. We've had data leaks, years of fruitful hacking, a lot of
financially motivated national-level cyber-espionage, and destructive malware
that cripple systems. Between 2010 and 2015, a group of five people hacked
several news services from where they stole press releases that would be
announced shortly. Sounds like a waste of time? No, it definitely wasn't. It was
actually one of the smartest hacks of the decade because the group used the
insider information they got to anticipate stock market moves and make deals
that generated over $100 million in profits. The Capital One hack that was
disclosed in July 2019 impacted more than 100 million Americans and six million
Canadians. Data from the breach is not believed to have been publicly shared
en-masse, so most users who had their data stolen are most likely safe. Yet, the
breach stands out because of the way it happened.
article:
https://www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/
I'm sorry, but my throat hurts and I can't record :(
· #480
Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 13 May 2022 10:51)
Prhases of Day
in order to avoid: https://voca.ro/18spy37Udqwn
In order to avoid the Mediterranean region turning into a desert, expert forest
management is required.
Щоб середземноморський регіон не перетворився на пустелю, необхідне експертне
управління лісами.
in a somewhat : https://voca.ro/1oTihKzYgBNP
My article shows Einstein in a somewhat more human light than what we normally
think of him
Моя стаття показує Ейнштейна в дещо більш людському світлі, ніж те, що ми
зазвичай думаємо про нього
in greater detail :
The CBA has in truth done anything but that, as I will explain in greater detail
in coming days, once I have had the opportunity to give this long and complex
document its due consideration.
По суті, CBA зробив все, що завгодно, крім цього, як я поясню більш детально в
найближчі дні, коли я мав можливість належним чином розглянути цей довгий і
складний документ.
Article:
https://www.zdnet.com/article/hackers-breach-fsb-contractor-expose-tor-deanonymization-project/
Audio: https://voca.ro/1bYgu6ZhU3fw
Today, I have had an opportunity to read an article about hackers who broke the
FSB contractor. To tell the truth it was very interesting and intriguing.
As a result of this hacking, more than 7.5 terabytes of valuable data of the
Russian special services were stolen. Many projects that were developed were
declassified.
It should be remembered that this is the second time that a FSB contractor has
been hacked. In my opinion, this is a very serious blow to Russia's
cybersecurity, because the difference between the hacks is one year.
This shows that their defense system is very weak. I hope that soon we will
learn even more secret information that Russia is hiding
· #479
Yakymova Anna/RZ-213(S.Mykhailiuk) (Friday, 13 May 2022 10:45)
Phrases of the day:
1) in a somewhat - дещо
The scientists believe this was partially due to the Wyoming mine being located
in a somewhat protected pit.(Вчені вважають, що частково це сталося через те, що
шахта Вайомінга була розташована у дещо захищеному шурфі.)
link:https://phys.org/news/2021-03-blast-shook-ionosphere.html
audio recording:https://voca.ro/11R9IiOogjUO
2) in greater detail - більш детально
The photos below show the issue in greater detail. (На наведених нижче
фотографіях проблема показується більш детально.)
link:https://www.zdnet.com/article/tech-csi-what-killed-these-devices/
audio recording:https://voca.ro/1eMOHsTgVkSe
3) in order to avoid - щоб уникнути
In order to avoid the Mediterranean region turning into a desert, expert forest
management is required.(Щоб не перетворення середземноморського регіону на
пустелю, потрібне експертне управління лісами.)
link:https://phys.org/news/2014-07-economic-benefits-sustainable-forestry-mediterranean.html
audio recording:https://voca.ro/11D4PwLh9VTG
Review:
audio recording: https://voca.ro/14mlvv1QXZDw
link:
https://www.zdnet.com/article/the-top-ten-most-common-database-security-vulnerabilities/
I have read an article about the most common database security vulnerabilities.
A lot of money can be made from hacking a businesses' servers and stealing data.
The are the most popular reasons of hacking: deployment failures, broken
databases, data leaks and other. System administrators need to develop a
practice of caring for their databases to stay on top of threats and to fix
vulnerabilities.
In conclusion, the number of worldwide cyber attacks are growing and if this
continues, many of our personal data may be lost and possibly sold, so
protection on corporate networks is very important.
· #478
Dovzhenko Ilya RZ-211 (Lebedeva) (Friday, 13 May 2022 08:55)
Today I have read the article "Smartphone-based solution designed to help people
who need to communicate with eye gestures". It tells us about a new smartphone
app called GazeSpeak that helps people with ALS speak using their eyes. ALS,
which stands for amyotrophic lateral sclerosis, is a neurodegenerative disease
that causes the person to lose motor control. First, the communicating person
faces the smartphone's back camera and looks in a certain direction to select a
letter grouping. Then, the app registers which group of letters was selected,
and the process repeats with individual letters. A study on the eye-tracking
system found that it was faster and and more usable than other commonly-used
low-tech solutions.
https://techxplore.com/news/2017-02-smartphone-based-solution-people-eye-gestures.html
https://voca.ro/1wtz1OV3fyuq
1)in greater detail
They were then asked to specify their favorite fantasy and describe it in
greater detail.
Їх також попросили описати свою улюблену фантазію в деталях.
2)in order to avoid
That is our planet is still doomed, but from people hide this information in
order to avoid panic.
Тобто наша планета однаково приречена, але від людей цю інформацію приховують,
щоб уникнути паніки.
3)in a somewhat
This year we arranged it in a somewhat unusual format - in the form of a
corporate magazine about stars.
Цього року ми оформили його у дещо незвичному форматі - у вигляді корпоративного
журналу про зірок.
https://voca.ro/1bxjdJnzeW7t
· #477
Vorobyova E. to Rudko from РЗ-213 (Thursday, 12 May 2022 17:03)
Well done, I have found no mistakes in all the tasks. Go on working like this.
· #476
Vorobyova E. to Chernetskiy from РЗ-213 (Thursday, 12 May 2022 17:01)
Your home work is written and voiced correctly. Thank you.
· #475
· Popovych E. (Thursday, 12 May 2022 13:24)
To Kate Kholodova (RZ-212)
Exam topic "Password as a general technique of secrecy" is well done.
· #474
Popovych E. (Thursday, 12 May 2022 13:23)
To Timophey Sipin RZ-212
#442,445
Exam topic:Concept of "Privacy” is well done
Thanks for your participation in our discussion.
Well done. I appreciate your opinion. Go on working
· #473
Popovych E. (Thursday, 12 May 2022 13:21)
To Povoznikov Artem RZ-212
# 437,443
Exam topic #19 (Potential security violations.) is well done
Thanks for your article review. I see you have understood the main idea and made
the right conclusion.
Keep on working.
· #472
Popovych E. (Thursday, 12 May 2022 13:19)
To Pushkash Maxim (RZ-212)
# 413, 424
Exam topic #5 (Potential security violations) is well done
Thank you for the comments.
They're clear and well done.
· #471
Popovych E. (Thursday, 12 May 2022 13:07)
To Khotynskiy Oleg (RZ-212)
#448,452
Exam topic #2 ("Various security techniques.")
You
don't need to write one topic twice!
· #470
Lebedeva E. (Thursday, 12 May 2022 12:32)
To 212 Ram Nassur Rz 212 When you write review of the article, you must give the name of the article and basic information. Also, there are some mistakes in your reading.
· #469
Lebedeva E. (Thursday, 12 May 2022 12:30)
To Andrey Mashovets RZ-212 The review of the article is written correctly. Now I am waiting for your exam topic.
· #468
Lebedeva E. (Thursday, 12 May 2022 12:28)
To Kravchenko Kostiantyn, Nikitina Anastasia , Kolomiets Volodymir, Badyuk Eduard RZ-212 Thanks for your active work. Well done.
· #467
Bogdan Gorbatiy РЗ-211 (Yershova) (Thursday, 12 May 2022 12:27)
Today I've read the article "UrbanDenoiser: An AI application that filters out
city noise to allow for clearer seismic sensor data". Scientists have created
seismometers as possibility to detect earthquakes - a natural phenomenon that
brings a lot of destruction and leads to death. But human activities in cities,
such as vehicles and trains, produce a lot of seismic noise, which interferes
with the seismometer's ability to detect earthquakes. So this article is about
new work, where researchers developed a deep learning application that
determines which seismic data is natural and artificial and filters out the
unnatural one.
https://voca.ro/11f905VdptUE
https://techxplore.com/news/2022-04-urbandenoiser-ai-application-filters-city.html
1.identify areas
The Secretariat would seek to identify areas for cost-cutting.
2.described above
She met with X who recounted the events described above.
3.grouped into
The most critical risks identified can be grouped into three categories.
https://voca.ro/1i903ZFlmknd
· #466
Yershova Y. (Thursday, 12 May 2022 12:25)
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 12 May 2022 11:46)
Your comment on the article is rather good, but I'd like to know more about your
attitude towards the issue presented. The examples with phrases are quite
interesting but the 2nd one isn't informative enough.
· #465
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Thursday, 12 May 2022)
issues of confidential information protection are relevant for every modern
enterprise. Confidential company data must be protected from leakage, loss,
other fraudulent actions, as this can lead to critical consequences for the
business. It is important to understand what data needs to be protected, to
determine the ways and methods of organizing information security.
The information, which is extremely important to the business, must have limited
access to the company, and its use is subject to strict regulation. The data,
which needs to be carefully protected, includes:
trade secrets, production documentation of a secret nature, company know-how,
customer base, personal data of employees,
other data that the company deems necessary to protect from leakage.
Information confidentiality is often violated as a result of fraudulent actions
of employees, implementation of malicious software, fraudulent operations of
external intruders.
To detect, store, identify sources, recipients, and methods of information
leakage different IT-technologies are used, among which DLP and SIEM-systems,
working in an integrated and comprehensive way, should be mentioned.
https://voca.ro/1lZVBCp2JpyN
1)estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
2)examine more closely
To understand the technique, I will examine the instructions more closely.
3)distinct from
Such people often live in politically marginalized groups distinct from the
dominant culture.
https://voca.ro/14KampYs1qOD
· #464
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 12 May 2022 11:46)
Today I have read the article about new batteries which cut electric car costs
and increase range. A future breakthrough in battery chemistry will increase the
mileage of electric vehicles on a single charge to 450 miles and reduce the
price of electric vehicles. Most well-known car companies have announced plans
to produce electric cars and their components. These events are due to
government pollution regulations tighten worldwide. General Motors also wants to
oust Tesla as the world leader in electric vehicles. The new batteries will be
able to hold twice as much energy and will cost 60% cheaper than current
batteries. Electric cars are increasingly spreading around the world. The future
is near.
https://techxplore.com/news/2020-11-gm-batteries-electric-car-range.html
https://voca.ro/15hhIgmnr6yG
Every method described above has its own pros and cons
Europe and Oceania, to identify the areas of investment and research necessary
to develop
it emerges such that systems can be grouped into clusters
https://voca.ro/1ffITV8NlPao
· #463
Kravchenko Kostiantyn (RZ-212, Lebedeva E.) (Thursday, 12 May 2022 11:40)
Exam topic #14 (Authority check)
Amongst the security design principles, the principle of complete mediation
stands out: every access to every object must be checked for authority. This
principle, when systematically applied, is the primary underpinning of the
protection system. It implies that a foolproof method of identifying the source
of every request must be put in effect. It also requires that an authority check
is to be examined skeptically: If a change in authority occurs, such results
must be systematically updated. An authority can be validated by many forms,
most commonly encountered would be a password, or its variations, hardly
replicable objects, and biometrics.
Audio: https://voca.ro/18W3TNMdODE2
Phrases:
1) Such systems can be grouped into clusters such that synchrony is only
observed in each cluster.
Ці
системи можуть бути розбиті на такі групи, що синхронність наблюдається лише в
кожній групі.
2) The results could help identify suitable areas for protection.
Результати могли б допомогти визначити підходимі зони для захисту.
3) The forecasters from this project participated in a replication of the second
study described above.
Синоптики з цього проекту взяли участь в реплікації другого дослідження,
описаного вище.
Audio: https://voca.ro/122wKeOkLsia
· #462
Nikitina Anastasia (RZ-212, Lebedeva E.) (Thursday, 12 May 2022 11:31)
Exam topic #16 (The Essentials of Information Protection)
Information protection is a set of organizational and technical measures and
legal norms to prevent harm to the interests of the owner of the information or
the AU and persons who use the information. Ensuring the security of information
technology is a complex problem, which includes the legal regulation of the use
of IT, technology improvement
their development, development of the certification system, provision of
appropriate organizational and technical conditions of operation.
Means of information protection: Moral and ethical means, Legal means of
protection, Administrative (organizational) means of information protection,
Means of physical (technical) protection of information, Software means of
protection.
https://voca.ro/1jMDHj1mrwts
1.grouped into
In developing brains, synapses can be grouped into functional synapses and
silent synapses.
Під
час розвитку мозку синапси можуть бути згруповані у функціональні синапси та
тихі синапси.
2.identify the areas
The team used special radar technology and analysis tools to detect changes in
the land and identify the exact areas where land subsidence —a common effect of
sinkholes—is occurring.
Командавикористовуваласпеціальнірадіолокаційнітехнологіїтаінструментианалізу,
щобвиявитизмінивземлітавизначититочнітериторіїдевідбуваєтьсяпросіданняземлі
—
поширенийефектпровалів.
3.described above
All the alternatives described above are technically feasible and have been used
in commercial applications.
Усі
альтернативи описані вище технічно здійсненні та використовувалися в комерційних
додатках.
https://voca.ro/1hL7I8OrLjqg
· #461
Yershova Y. (Thursday, 12 May 2022 11:24)
Stanislav Popik
РТ-212
(Yershova) (Thursday, 12 May 2022)
Your tasks are quite correct, thank you.
· #460
Kolomiets Volodymir RZ 212 (Lebedeva) (Thursday, 12 May 2022 11:18)
Exam topic #20 (Principles of information protection)
The three core principles of information security are confidentiality, integrity
and availability. The purpose of confidentiality is to protect the data from
unauthorised access. It is possible by implementing access restrictions to allow
access to authorised entities only. Integrity means preserving the accuracy and
completeness of data. This element ensures that data has not been tampered with
and can be trusted. This refers to the availability of data when authorized
users require this data. Devices, systems, applications, data are of little
value to any organization if their customers can’t access it when they need it.
https://voca.ro/12XeUTT9wykT
1) identify the areas
The group attempted to identify the areas where dynamic modelling should be used
to support the medium-term objectives.
Група спробувала визначити сфери, де динамічне моделювання має використовуватися
для підтримки середньострокових цілей.
2) grouped into
By taking advantage of blockchain technology, digital assets are broadly grouped
into fungible and non-fungible tokens (NFT)
Використовуючи переваги технології блокчейн, цифрові активи широко групуються на
взаємозамінні та незмінні токени (NFT).
3) described above
All the alternatives described above are technically feasible and have been used
in commercial applications.
Всі
альтернативи, описані вище, є технічно здійсненними і використовувалися в
комерційних застосуваннях.
https://voca.ro/12EPToa7FWVp
· #459
Yershova Y. (Thursday, 12 May 2022 11:16)
Chervony Eugene RT-212(Yershova) (Thursday, 12 May 2022)
Unfortunatelly, I can't assess your work with exam topics #7, 8 as there are no
audio files. Don't forget they must be 100 words each and you have to record
voice messages.
· #458
Badyuk Eduard RZ-212 (Lebedeva E.V.) (Thursday, 12 May 2022 11:16)
Exam topic #16 ("The Essentials of Information Protection.")
In all the years of the existence of mankind, information has been the most
important resource that helped civilizations develop, fight and survive. Nothing
has changed in our time, and therefore people have come up with certain methods
of protecting information.
The basic tenets of information security are confidentiality, integrity and
availability. Every element of the information security program must be designed
to implement one or more of these principles. Together they are called the CIA
Triad.
Confidentiality measures are designed to prevent unauthorized disclosure of
information.
Consistency includes protection against unauthorized changes (additions,
deletions, alterations, etc.) to data.
Availability is the protection of a system’s ability to make software systems
and data fully available when a user needs it (or at a specified time).
1) grouped into
The Presidency's functions may be grouped into three main areas: administrative,
judicial and external relations.
Функції Президентства можна згрупувати у три основні сфери: адміністративні,
судові та зовнішні зв’язки.
2) described above
The orders provided for under the Bill are designed to protect persons in the
circumstances described above.
Розпорядження, передбачені законопроектом, призначені для захисту осіб, які
перебувають у зазначених вище обставинах.
3) identify the areas
The workshop will help policymakers identify the areas where men and women have
different needs in their countries.
Семінар допоможе політикам визначити сфери, де чоловіки та жінки мають різні
потреби у своїх країнах.
https://voca.ro/1dZ5qm0SLUYW
· #457
Andrey Mashovets RZ-212(Lebedeva E.) (Thursday, 12 May 2022 11:13)
Today I’ve read the article “Exploring partial synchronization in networked
systems”.
This article is about partial synchronization in the network, as well as about
the concept of synchronization and how it manifests around us.
The purpose of this article is to tell about partial synchronization in network
systems.
Synchronization is all around us: from thousands of fireflies congregating near
trees and lighting up simultaneously to an excited audience taking part in
"Mexican waves" during a football match, and the list goes on.
This article can be useful for people who are interested in technology and also
want to understand their surroundings .
https://voca.ro/14UXNqDQ7y3W
https://techxplore.com/news/2021-05-exploring-partial-synchronization-networked.html
1.identify the areas
Our study innovated by combining these two datasets in an approach that enabled
us to identify the areas that are theoretically most suitable and compare them
with the areas in which the species actually lives now
2.described above
The researchers tested out the idea on an unpiloted aerial vehicle (UAV) in a
scenario like the one described above.
3.grouped into
Referred to as partial synchronization, it emerges such that systems can be
grouped into clusters such that synchrony is only observed in each cluster.
https://voca.ro/15YMeXey08h4
· #456
Yershova Y. (Thursday, 12 May 2022 11:12)
Eugene Chervony RT-212(Yershova) (Thursday, 12 May 2022 11:04)
Your comment is clear and good as well as the task with the Phrases, thank you.
· #455
Stanislav Popik РТ-212 (Yershova) (Thursday, 12 May 2022 11:11)
Exam topic #3 «Radio equipment helping to save on bills.»
Radio equipment helps to save on bills. For example: Radio Frequency
Identification (RFID) A technology for the unique identification of physical
objects using radio tags. The radio tag contains a microchip that stores the
detection detector, as well as a way for the antenna to transmit information to
special radio receivers. This technology optimizes the development of diseases
in a wide area of the patient, which achieves the installation of labels on a
specific structure and tracking the route of its movement. This allows you to
manage efficient inventory down to a single item. It also allows you to monitor
the cost of electricity and more.
https://voca.ro/1mBTW6ZMmhl2
· #454
Stanislav Popik РТ-212 (Yershova) (Thursday, 12 May 2022 11:10)
Today I have read the article called"Improving the conductivity of metal
nanoelectrodes achieved via plasmon-enhanced laser nanosoldering" This
technology has the unique advantages of high resolution, true 3D and
flexibility. Unlike traditional heating annealing, the heating part of this
method is localized only near the hot spot, which does not cause thermal damage
to the substrate. The technology of laser nanosoldering increases the
conductivity of the electrode and facilitates further work. During this method,
there is a certain accumulation effect that increases conductivity and
efficiency.
I believe that such soldering is the future and we should switch to more
efficient and budget methods.
https://phys.org/news/2022-01-metal-nanoelectrodes-plasmon-enhanced-laser-nanosoldering.html
https://voca.ro/1lh5q5SoKbVu
1)identify the areas
The results could help identify suitable areas for protection, according to the
researchers.
2) described above
All the alternatives described above are technically feasible and have been used
in commercial application.
3)grouped into
In developing brains, synapses can be grouped into functional synapses and
silent synapses.
https://voca.ro/14Bc81gPl06Y
· #453
Ram Nassur Rz 212 Lebedeva E.V (Thursday, 12 May 2022 11:09)
Using blockchain technologies, it can be divided into fungible and non-fungible
NFT tokens.
The researchers proposed a tiered patent structure based on NFTs.
Tokenization patents will provide greater transparency and traceability.
NFT-based patents provide a reliable exchange of information between offices
around the world.
Using hashing, IP holders can record claims, such as hashes or encrypted claims,
on the blockchain network. The IP owner can prove his ownership with the
original document and its hash or private key without the involvement of third
parties.
This would give them the ability to "tokenize" their patents. Since each
transaction will be recorded on the blockchain, it will be much easier to track
changes in patent ownership.
https://techxplore.com/news/2022-02-layered-nft-based-patent-framework.html
https://voca.ro/1gTnMoigQbun
identify the areas
identify the areas where these birds would be more sensitive to onshore wind
turbine or power line development.
grouped into
By taking advantage of blockchain technology, digital assets are broadly grouped
into fungible and non-fungible tokens.
https://voca.ro/1n3S1ooy2joD
· #452
Khotynskiy Oleg (RZ-212, Popovych) (Thursday, 12 May 2022 11:09)
Exam topic #2 ("Various security techniques.")
Network security is a term that describes the security tools, tactics and
security policies designed to monitor, prevent and respond to unauthorized
network intrusion, while also protecting digital assets, including network
traffic. Every year, hackers come up with more and more methods with which you
can hack into networks, but cybersecurity experts also do not stand still and at
the moment they have invented these 14 methods to protect networks:
Access control
Anti-malware software
Anomaly detection
application security
Data loss prevent (DLP)
Email security
Endpoint security
Firewall
Intrusion prevention systems
Network segmentation
Security information and event management (SIEM)
Virtual private network (VPN)
Web security
Wireless security
These methods allow you to most effectively protect networks and prevent
unauthorized access to them.
1) grouped into
Green growth and green economy-related indicators identified to date can be
grouped into three main categories.
Показники зеленого зростання та зеленої економіки, визначені на сьогодні, можна
згрупувати в три основні категорії.
2) described above
The actions described above will find reflection, in due course, in the
structure and content of the regular budget of the Organization.
Описані вище дії знайдуть своє відображення в структурі та змісті регулярного
бюджету Організації.
3) identify the areas
They can help identify the areas where human rights education and training are
most needed for the population at large.
Вони можуть допомогти визначити сфери, де освіта та навчання з прав людини
найбільше потребують населення в цілому.
https://voca.ro/18eUpEeA65f6
· #451
S.Mykhailiuk (Thursday, 12 May 2022 11:07)
To students ,Acheev,Vergemis, Glugan, Ergul,, Ermolenko,Krivosheenko, Mikhailov,
from group RT-211.
You haven’t joined our activities on on-line at the designated timeframe today.
Pls participate regularly to improve your language skills in ESP English.
· #450
Chervony Eugene RT-212(Yershova) (Thursday, 12 May 2022 11:06)
Exam Topic #8 (Benefits of Satellite TV)
Streaming television takes data and in homes, particularly in rural areas, too
much streaming can be a strain on your Internet resources. Many rural homes use
satellite Internet as their connectivity type. While great for many functions
including streaming, if there are too many devices streaming at once, you may
experience connectivity issues. Furthermore, in homes with many devices,
streaming can drain your monthly data leading to overages or throttling.
Subscribing to satellite television services gives your home more ways to stay
entertained without putting a strain on your Internet service.
· #449
Chervony Eugene RT-212(Yershova) (Thursday, 12 May 2022 11:05)
Exam Topic #7 (The major differences in a monochrome television and a color
television receiver)
The biggest difference is the number of electron guns in the picture tube. A
monochrome tv has only one gun as it can only show black, white, or shades of
grey in between. Color TVs have 3 guns: red, green, and blue. Varying these
tubes give you the full spectrum of color. Beyond that there are differences in
the reciever, which has to decode the data for 3 guns instead of one, and in the
drivers for the guns.
· #448
Khotynskiy Oleg (RZ-212, Popovych) (Thursday, 12 May 2022 11:04)
Exam topic #2 ("Various security techniques.")
Network security is a term that describes the security tools, tactics and
security policies designed to monitor, prevent and respond to unauthorized
network intrusion, while also protecting digital assets, including network
traffic. Every year, hackers come up with more and more methods with which you
can hack into networks, but cybersecurity experts also do not stand still and at
the moment they have invented these 14 methods to protect networks:
Access control
Anti-malware software
Anomaly detection
application security
Data loss prevent (DLP)
Email security
Endpoint security
Firewall
Intrusion prevention systems
Network segmentation
Security information and event management (SIEM)
Virtual private network (VPN)
Web security
Wireless security
These methods allow you to most effectively protect networks and prevent
unauthorized access to them.
· #447
Eugene Chervony RT-212(Yershova) (Thursday, 12 May 2022 11:04)
Today I have read the article "As much pressure as Uranus' core: The first
materials synthesis research and study in the terapascal range". It says that a
research team has pushed the boundaries of high-pressure and high-temperature
research into cosmic dimensions. For the first time, they have succeeded in
generating and simultaneously analyzing materials under compression pressures of
more than one terapascal. Such extremely high pressures prevail, for example, at
the center of the planet Uranus; they are more than three times higher than the
pressure at the center of the Earth. I think that the doors are now wide open
for creative materials research that generates and visualizes unexpected
structures under extreme pressures.
https://phys.org/news/2022-05-pressure-uranus-core-materials-synthesis.html
https://voca.ro/1fF42fWTY4C6
Phrases:
1) grouped into
The new study was grouped into five parts from one.
2) described above
All the experiments described above were carried out quite recently.
3) identify the areas
More people need to be connected to identify the areas of study.
https://voca.ro/19nDqXSEkkgS
· #446
Kate Kholodova (RZ-212, Popovych) (Thursday, 12 May 2022 11:02)
Exam topic "Password as a general technique of secrecy"
In now days world we must talk about modern problems in sphere of saving and
defending information. It's actual theme because we live in such time when every
person or even big company use computer to keep and save information. Like facts
evidence number of cyber-crimes and crimes connected with stealing information
are growing every year, so companies and people must solve this problem. Using
any passwords is one of the most powerful systems of protection information and
on the other hand one of the easiest to break. People must learn some rules, how
to use and correctly make password. For example, making it without using any
dates, names, cities or something else, connected with person, without repeating
some numerals or key words, like “password”, “love” or something in this area.
So using password is one of the most common and important things in sphere of
saving information.
Audio: https://voca.ro/15qk54v7n5fn
Today I have read the article "Crossing the line: How robots can rule the
roads". It tells about artificial intelligence in transport, designed to
optimize traffic. While many argue, trusting a computer to control the road with
other people can be dangerous - scientists are doing research on road behavior
in order to create their own "robots" as safely as possible. This system will
help to optimize traffic, making it more unloaded, and in addition to relieve
humanity from the need for transportation, for example, and other activities
where you need to constantly move around the city by car. Scientists are
convinced that this technology is really necessary.
In my opinion, the main disadvantage is that it reduces the value of human
labor, therefore it leaves people without work. But I think if they will teach
robots they will do a perfect job.
Article: https://techxplore.com/news/2021-10-line-robots-roads.html
Audio: https://voca.ro/17D5AxeHCLbj
1) identify the areas
The group attempted to identify the areas where dynamic modelling should be used
to support the medium-term objectives.
2) grouped into
These paragraphs can be grouped into five sets of provisions.
3) described above
All the alternatives described above are technically feasible and have been used
in commercial applications.
Audio ph: https://voca.ro/16KgccANmCLk
· #445
Timophey Sipin RZ-212(Popovych) (Thursday, 12 May 2022 10:57)
Today I've read the article about the signs that tell us that the phone probably
have a virus.A virus can limit your phone's functionality, send your personal
information to hackers, send your contacts spam messages linking to malware, and
even allow the virus's operator to "spy" on you by capturing your screen and
keyboard inputs, and tracking your geographical location.To avoid an unfortunate
outcome we should pay attention on some perfomance indicators of the phone as
poor perfomance, excessive battery drain and increased mobile data
consumption.Also, the user can get unexplained billing charges, unusual pop-ups
and an unexpected overheating device.So to prevent further damage user should
use a reliable antivirus app , clean the phone's storage and cash and delete any
suspicious or unfamiliar apps.Unfortunately, the situation when the phone gets a
virus is common but applying security measures described above we can reduce the
risk .
https://voca.ro/1j3vMFhjuH
https://techxplore.com/news/2022-04-mobile-virus-youll-carefully.html
1. Grouped into
In developing brains, synapses can be grouped into functional synapses and
silent synapses.
2. Identify the areas
The results could help identify suitable areas for protection, according to the
researchers.
3. Described above
The forecasters from this project participated in a replication of the second
study described above.
https://voca.ro/1cXH2kw
· #444
S.Mykhailiuk (Thursday, 12 May 2022 10:54)
To Sasha Movsum-Zade RT-211 Just good but pls make a conclusion on the speciality exam topic. Keep on working hard and on time.
· #443
Povoznikov Artem RZ-212 ( Popovych) (Thursday, 12 May 2022 10:53)
Exam topic #19 (Potential security violations.)
Information (computer) security threats are various actions that can lead to a
violation of the state of information protection. In other words, these are
possible events, processes or actions that can lead to serious consequences in
the field of informatization and a computer system.
Information security threats can be divided into two types: natural and
artificial. Consideration includes natural phenomena that do not develop from
man, such as hurricanes, floods, fires, etc. Artificially expected consequences
from a person can be intentional and unintended. Unintentional occurrences due
to negligence, inattention and ignorance. An example of such a threat can be the
installation of programs that are not included in the normal mode of operation
and further disrupt the system, which leads to the loss of information.
Deliberate attacks, unlike the previous ones, attacks on purpose. They can be
attacked both from outside and from within the company. The result of the
implementation of this type of threat is the alienation of funds and
intellectual property of the organization.
· #442
Timophey Sipin RZ-212(Popovych) (Thursday, 12 May 2022 10:53)
Exam topic:Concept of "Privacy”
Privacy is a value so complex, so entangled in competing and contradictory
dimensions, so engorged with various and distinct meanings, that I sometimes
despair whether it can be usefully addressed at all. But as to capturing the
core concept of privacy itself, I find myself cautious and reserved. In this
brief Review Essay, I shall isolate and review three different and in some
respects incompatible concepts of privacy that are each mentioned in the
Prologue to The Unwanted Gaze. The first connects privacy to the creation of
knowledge; the second connects privacy to dignity; and the third connects
privacy to freedom. I shall argue that the first concept should not be
understood as a question of privacy; that the second is a helpful way of
apprehending privacy, but that it should focus our attention primarily upon
forms of social structure; and that the third is best conceived as an argument
for liberal limitations on government regulation.
Audio:https://voca.ro/16jqy8ef
· #441
Yershova Y. (Thursday, 12 May 2022 10:51)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 12 May 2022)
All your tasks are well done.
I
appreciate your effective work, thank you.
· #440
S.Mykhailiuk (Thursday, 12 May 2022 10:48)
To Avdieiev Danil (RT-211) Are you all right? Unfortunately , this is not your specialty exam topic . Are you a student from historical department? UNACCEPTED!
· #439
Igor Rudko (RZ-213) (Vorobyova E. V.) Home-work and Exam topic (Thursday, 12 May 2022 10:47)
Audio: https://voca.ro/1kkn3j2bFAhW
Article: https://techxplore.com/news/2021-03-nfts-million.html
Today I have read the article: "A guide to NFTs: What are they, and why did
someone spend $69 million for one?" It's short for non-fungible tokens. By the
way, fungible items are easily interchangeable. Take money as an example. If we
each have a $20 bill, we could swap them without any change to their value. In
the case of a non-fungible token, each one is unique and cannot be directly
exchanged for another. In my opinion, the NFTs and blockchain technology is
going to become the way that people store records digitally because of the
security associated with it
Phrases:
Audio: https://voca.ro/1m6PktV1wgtX
1)Referred to as partial synchronization, it emerges such that systems can be
grouped into clusters such that synchrony is only observed in each cluster -
Згадуєтьсяякчастковасинхронізація,
вонавиникаєтак,
щосистемиможназгрупувативкластеритакимчином,
щосинхронністьспостерігаєтьсялишевкожномукластері
2) Average on-road vehicle fuel economy based on vehicle registrations and
household income to identify the areas with the highest energy burden for
transportation fuel. -
Середняекономіяпаливадлядорожньоготранспортногозасобунаосновіреєстраційтранспортнихзасобівтадоходудомогосподарствадлявизначеннярайонівзнайбільшименергетичнимнавантаженнямнатранспортнепаливо.
3) The researchers tested out the idea of an unpiloted aerial vehicle (UAV) in a
scenario like the one described above. -
Дослідникиперевірилиідеюнепілотованоголітальногоапарату
(БПЛА)
засценарієм,
подібнимдоописаноговище.
Translation for phrases in past work
1)Novel method identifies areas most suitable for conservation of black lion
tamarin -
Новийметодвизначаєділянки,
найбільшпридатнідлязбереженнятамаринучорноголева
2)By taking advantage of blockchain technology, digital assets are broadly
grouped into fungible and non-fungible tokens (NFT). -
Використовуючиперевагитехнологіїблокчейн,
цифровіактивиширокогрупуютьсянавзаємозаміннітанезміннітокени
(NFT).
3)Grouping students into ability-based sets holds back less able pupils -
Групуванняучнівунаборинаосновіздібностейстримуєменшздібнихучнів
Exam topic Software firewall
Audio: https://voca.ro/1dzzwO8xbrSw
A software firewall is a firewall that is installed on a computer or server and
tasked with network security. It works with a wide variety of other technical
security solutions to provide more security for enterprises of all sizes. When a
software firewall is installed on a server, it opens up like an umbrella of
protection over all other computers connected to the network. In my opinion, a
software firewall is better than a hardware firewall because It is able to
monitor both incoming and outgoing traffic for potential risk or suspicious user
behavior, and also makes setting security policies much easier, faster, and more
flexible.
· #438
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 12 May 2022 10:46)
Exam Topic #10
(The major differences in a monochrome television and a color television
receiver.)
Monochrome television only transmits brightness information, and the relative
luminance of the images must at least roughly match the brightness of the
subject. Significant tone distortion is quite acceptable. The reproduction of
brightness becomes very important only if detail disappears in some tones. A
full color television signal is much more complex in structure than a black and
white television signal and carries much more information. But the general
characteristics of color television are almost the same as those of black and
white television. Modern television is based on the transmission of color images
using flat screens on plasma and liquid crystal panels.
https://voca.ro/1J8V4OYeBxSD
· #437
Povoznikov Artem RZ-212 (Popovych) (Thursday, 12 May 2022 10:45)
Today i have read the article “Researchers use advanced light to reveal how
different biofuels behave”.
This
article tells about a team of scientists who decided to find out which fuel is
of the highest quality. They selected DIB fuel as the test subject and conducted
many different scientific experiments. They compared both their price and the
particle molecules that were in it using a powerful accelerator: Advenced Light
Source. They also compared the properties of fuel combustion. In the end, they
found out that the chemistry of fuel for vehicles is complex due to the design
and considerations of engines, auxiliary infrastructure and Fuel Engineers must
ensure that the fuel sold fits in octane standard envelopes. By knowing the
combustion properties of specific fuel components, mixtures can be made with
less empirical testing.
Text:https://techxplore.com/news/2021-01-advanced-reveal-biofuels.html
Audio:https://voca.ro/18YpmgOCmwg4
1)identify the areas
The results could help identify suitable areas for protection, according to the
researchers.
2) described above
All the alternatives described above are technically feasible and have been used
in commercial applications.
3)grouped into
In developing brains, synapses can be grouped into functional synapses and
silent synapses.
Audio: https://voca.ro/1e4vpmG5uCFj
· #436
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 12 May 2022 10:44)
Exam Topic #9 (Development of television in your home country.)
The history of television in Ukraine began in 1925, when the talented
experimental physicist Boris Grabovsky managed to make the first television
broadcast in the former USSR and throughout the world. Then the invention of our
countryman, unfortunately, could not play a decisive role. In 1939 the first
telecast was made in Kyiv. In 1949, the construction of a new television center
began at 26 Khreshchatyk Street. 1969, color television appeared in Ukraine. The
uniqueness of the design was that it was the first in the world to be all-welded
and unparalleled. At present, the transmission and distribution network consists
of 57 powerful TV stations. This system provides viewers with programs
throughout Ukraine.
https://voca.ro/1aD6NS1S0FzH
· #435
S.Mykhailiuk (Thursday, 12 May 2022 10:43)
To Artem Verhelis RT-211, Task1 is 74 points , you are supposed to reveal the
contents of the article and the conclusion should start with a word like:”To sum
it up, I think, I believe, in conclusion, in my opinion,etc.
“Do
you know about it?
Task2 is good.
· #434
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 12 May 2022 10:43)
1. Grouped into
In developing brains, synapses can be grouped into functional synapses and
silent synapses.
2. Identify the areas
The results could help identify suitable areas for protection, according to the
researchers.
3. Described above
The forecasters from this project participated in a replication of the second
study described above.
https://voca.ro/1cXH2kwkBI4s
Today I have read the article «Live online TV, once a bargain, is getting more
expensive». Cable managers ridiculed online TV packages as unrealistically
cheap, but their popularity grew. Online TV providers attracted users with
digital "thin packets" that were cheaper than cable TV. Many are now raising
prices, often as packages become more and more reminiscent of traditional
television packages. In my opinion, the problem with television services is that
the cost of programs is rising, there will eventually be a sharp drop in demand
from users, and then entertainment companies may eventually feel the bite.
https://voca.ro/1j0Gt2mNxwcP
https://phys.org/news/2019-04-online-tv-bargain-expensive.html
· #433
Yershova Y. to PT-212, PE-211 (Thursday, 12 May 2022 10:40)
Dear students! The lesson has started, I am waiting for your reviews and audio recordings, exam topics as well. Do not forget about Phrases of the day practice. Good luck!
· #432
Chernetskiy Nikita.RZ-213. (Vorobyova) (Thursday, 12 May 2022 10:38)
Today I have read the article 'AI predicts infant age, gender based on
temperament'.
It's hard to tell the difference between a newborn boy and girl based solely on
temperament characteristics such as the baby's propensity to display fear, smile
or laugh. For this case, a new study in PLOS ONE used machine learning to
analyze temperament data on 4,438 babies in an attempt to classify the infants
by gender and age. The results indicate it is far easier for computer algorithms
to determine the age of a baby than it is for them to decipher a baby's gender
based off temperament data during the infant's first 48 weeks of life.
A very interesting, in my opinion, techonology, so I would definently love to
see it's getting a wide use.
Article: https://techxplore.com/news/2022-05-ai-infant-age-gender-based.html
Audio: https://voca.ro/1hno01mp4ogw
4. 1) grouped into
The fact sheets are grouped into seven sections
2) described above
The acetic acid process described above is an example
3) identify the areas
This arrangement would facilitate indication of flow and could be used to
identify the areas in which sprinkler heads were in operation.
· #431
Lebedeva E. (Thursday, 12 May 2022 10:37)
To РЗ-212 Good morning! The lesson will start in a few minutes and I am waiting for your exam topics and work with phrases of the day. Good luck
· #430
S.Mykhailiuk (Thursday, 12 May 2022 10:36)
To Sergey Kyznyak RT-211, Task 5 and 6 are 74 points. Pls make conclusions . A piece of advice : Don’t state anything you are not certain of.
· #429
Vorobyova E. to Rudko from РЗ-213 (Thursday, 12 May 2022 10:35)
Mind your grammar mistakes at the end of the commentary on the article: “I guess that THE scientists ARE doing a great job by…”. Your sentences with new phrases are written correctly. Continue working.
· #428
Artem Kotliarov RZ-212 (Lebedeva E.) (Thursday, 12 May 2022 10:35)
1) 1. described above
The actions described above will find reflection, in due course, in the
structure and content of the regular budget of the Organization. -
ОписанівищедіїзнайдутьсвоєвідображеннявструктурітазмістірегулярногобюджетуОрганізації.
2. identify the areas
We must therefore intensify efforts to identify areas where cooperation between
the OAS and the United Nations can be strengthened. -
Томумиповинніактивізуватизусиллядлявизначеннясфер,
деможназміцнитиспівпрацюміжОАГтаОрганізацієюОб’єднанихНацій.
3. grouped into
Green growth and green economy-related indicators identified to date can be
grouped into three main categories -
Показникизеленогозростаннятазеленоїекономіки,
визначенінасьогодні,
можназгрупувативтриосновнікатегорії
https://voca.ro/1gREqJWxokNg
2) Today I have read the article “Developing an ultra-scalable artificial
synapse”.
A research team led by Associate Professor Desmond of the University of
Technology and Design in Singapore has developed a new type of artificial
synapse based on two-dimensional materials for high-scale computing processes
that inspire the brain. In addition, this artificial synapse demonstrates for
the first time that it can be implemented using the same device that operates
both functional and silent synapses.
In my opinion, this development can dramatically reduce equipment costs by
replacing functional and silent synapses that have been based on complex digital
circuits with a single device.
https://techxplore.com/news/2021-12-ultra-scalable-artificial-synapse.html
https://voca.ro/11opbRLbTLIQ
Exam topic #17 (Password as a general technique of secrecy.)
Passwords have been the staple of secrecy and access restriction since ancient
times. Even the Roman military used passwords for their guards to securely
identify each other In modern times passwords have become the most common form
of securing secrecy, as they are generally used by governments, militaries,
hospitals, banks or even just the common citizen to prevent unauthorized access
to their accounts and information. With developments in biometrics, single
sign-ins and multifactor authentication, passwords as the general security tool
may soon be facing competitors after millennia, however, due to their cost,
immediacy and convenience, passwords can still be expected to remain the best
option for decades.
https://voca.ro/1jnGuNuavm5H
· #427
Vorobyova E. to Syrbu from РЗ-213 (Thursday, 12 May 2022 10:31)
Mind your incorrect sentence at the beginning of your commentary on the article: “…about THE Chinese research team THAT has proposed…”. Your sentences with new phrases are quite good. Go on working and don’t forget about your exam topics.
· #426
S.Mykhailiuk (Thursday, 12 May 2022 10:27)
To Avdieiev Danil (RT-211) pls find speciality topic. Task1 is 70 points. Pls avoid writing “ this article is useful”.Task2 is good, Pls read my task set to the group at the beginning of our lesson .
· #425
Vorobyova E. to Mitriev from РЗ-213 (Thursday, 12 May 2022 10:27)
Not bad, but don’t forget about the correct use of the articles “a/the”: “…A very interesting article about THE methods that…”. Continue working.
· #424
Pushkash Maxim (RZ-212 Popovich) (Thursday, 12 May 2022 10:27)
A research team led by Prof. QU Qiang from the Shenzhen Institute of Advanced
Technology proposed a layered, conceptual, NFT-based patent framework. Applying
for a patent and trademark is time-consuming and costly. With the help of unique
features of NFT technology, it is possible to accelerate this process. In fact,
tokenizing patents would provide more transparency, traceability, and
cost-efficiency of commercialization. NFT-based patents may facilitate reliable
information sharing among offices and patentees around the world, reducing the
burden on examiners and perhaps even accelerating harmonization efforts. It
would give them the ability to 'tokenize' their patents. Because every
transaction would be logged on a blockchain, it will be much easier to trace
patent ownership changes.
Voice: https://voca.ro/1bEbIh1lD56O
1) described above
The researchers tested out the idea on an unpiloted aerial vehicle (UAV) in a
scenario like the one described above.
2) identify the areas
Our study innovated by combining these two datasets in an approach that enabled
us to identify the areas that are theoretically most suitable.
3)grouped into
By taking advantage of blockchain technology, digital assets are broadly grouped
into fungible and non-fungible tokens (NFT).
Voice: https://voca.ro/1eb9hievDzB7
· #423
Vorobyova E. to Semidentova from РЗ-213 (Thursday, 12 May 2022 10:25)
Well done, I appreciate your opinion on the article and your sentences are written correctly.
· #422
Igor Rudko (RZ-213) (Vorobyova E. V.) (Thursday, 12 May 2022 10:25)
Audio: https://voca.ro/16YsFlsx7jOm
Article:
https://phys.org/news/2022-05-citizen-science-vast-amount-microplastics.html
Today I have read the article: "Citizen science study detects the vast amount of
microplastics in Catalan bathing areas". The presence of microplastics in the
oceans is documented and reported by oceanographic research, but data on the
pollution in the nearshore regions are hard to find due to access difficulties
faced by scientific boats. Some groups of scientists, with help of volunteers,
collected 25,000 microplastics with special nets towed from rowing boats. In
fact, they reveal that coastal areas feature a vast amount of plastic debris,
the presence of which is under a great temporal variability. I guess that
scientists doing a great job by clearing the water pollution
Phrases:
Audio: https://voca.ro/1osgHvpwLI2A
1)Novel method identifies areas most suitable for conservation of black lion
tamarin
2)By taking advantage of blockchain technology, digital assets are broadly
grouped into fungible and non-fungible tokens (NFT).
3)Grouping students into ability-based sets holds back less able pupils
· #421
Yershova Y. (Thursday, 12 May 2022 10:25)
Vlasov Vadim RZ-211 (Yershova) (Thursday, 12 May 2022 09:50)
In general, your review is quite good, but it could be more detailed, don't
forget about 100 words. The examples with phrases are not bad but the 2nd one is
not informaive enough, it must be a full sentence.
· #420
S.Mykhailiuk (Thursday, 12 May 2022 10:20)
Sergey Kyznyak RT-211, Task1 is with no conclusion. Just 63 points. Task2 has been wrongly done. Pls do it again and stick to the pattern:( a phrase with a translation) and a sentence with the Ukrainian translation).
· #419
Kate Syrbu RZ-213 (Vorobyova) (Thursday, 12 May 2022 10:19)
1) identify the areas -
визначитиобласті;
They also help identify areas for improvement.
Вонитакождопомагаютьвизначитисферидляпокращення.
2) grouped into -
згрупованів;
These paragraphs can be grouped into five sets of provisions.
Ціпараграфиможнаоб’єднативп’ятьположень.
3) described above -
описанівище;
The obstacles described above undermine efforts to combat impunity.
Описанівищеперешкодипідриваютьзусилляпоборотьбізбезкарністю.
https://voca.ro/1g9tVFCWbPJd
Today i have read the article about a chinese research team has proposed a
layered, conceptual, NFT-based patent framework. NFT-based patents may
facilitate reliable information sharing among offices and patentees around the
world, reducing the burden on examiners and perhaps even accelerating
harmonization efforts. The IP owner can prove his/her property right using the
original document and its hash or private key without third-party involvement. I
think that tokenizing patents would provide more transparency, traceability, and
cost-efficiency of commercialization.
https://techxplore.com/news/2022-02-layered-nft-based-patent-framework.html
https://voca.ro/1lyfTpVZXopI
· #418
Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (Thursday, 12 May 2022 10:18)
Link to articlehttps://phys.org/news/2021-10-corrosion-materials-durability.html
Link to voice: https://voca.ro/1mrgeE4XRGxX
Today I've read interesting article about methods that would help engineers
delay structural failure.
In tests by removing atoms from the tip of the crack, modeling showed that
researchers could prevent
crack propagation by dramatically improving the mechanical properties of the
material. The article discusses the effects of the
environment on the material, including dissolution, oxide formation,
re-deposition of the material, and hydrogen embrittlement.
In my opinion, keeping structures safe means keeping the lives of the people who
work for them safe. And such research can solve a dangerous problem!
1)identify the areas
The group attempted to identify the areas where dynamic modelling should be used
to support the medium-term objectives.
Група спробувала визначити сфери, де динамічне моделювання має використовуватися
для підтримки середньострокових цілей.
2)grouped into
These paragraphs can be grouped into five sets of provisions.
Ціпараграфиможнаоб’єднативп’ятьположень.
3) described above
All the alternatives described above are technically feasible and have been used
in commercial applications.
Всі
альтернативи, описані вище, є технічно здійсненними і використовувалися в
комерційних застосуваннях.
· #417
Dasha Semidetnova RZ-213 (Vorobyova) (Thursday, 12 May 2022 10:15)
1. Our research was aimed at solving one of the main problems in football.
Наше дослідження було спрямоване на вирішення однієї з головних проблем у
футболі.
2. These paragraphs can be grouped into five sets of provisions.
Ціпараграфиможнаоб’єднативп’ятьположень.
3. All the alternatives described above are technically feasible and have been
used in commercial applications.
Всі
альтернативи, описані вище, є технічно здійсненними і використовувалися в
комерційних застосуваннях.
Robots are gradually infiltrating various areas and settings, including sports
competitions. Robotic football is an innovative version of football that
replaces human players with robots. Robotic soccer competitions have been going
on for decades. First introduced in the 90s, they are now grouped into a single
initiative, marked by regular tournaments and leagues, dubbed RoboCup. The
humanoid robots participating in RoboCup are getting better and better over
time, making the games more fun and dynamic. To perform well in these
competitions, robots should ideally have a wide range of capabilities, including
good locomotion, path planning, localization and interaction skills. A heuristic
search algorithm developed by the researchers calculates the trajectories that
would allow the ball to pass from a given location on the football field to the
goal of the opposing robot team. The method used takes into account all
available information about the state of the game. This approach allows robots
to plan not just one strike, but the entire attack. The researchers evaluated
its performance by comparing it to several basic methods in a series of
simulation tests. So far, the researchers have only tested their algorithm in
simulations, but it could eventually be applied to real humanoid robots to
further explore its potential under specific conditions.
article:
https://techxplore.com/news/2020-08-heuristic-algorithm-robotic-football.html
I'm sorry, but my throat hurts and I can't record :(
· #416
Vorobyova E. to Chabanenko from РЗ-213 (Thursday, 12 May 2022 10:14)
Well done. There are no grammar and phonetic mistakes in your review on the article and sentences. Thank you and don’t forget about your exam topics. It’s a mandatory requirement.
· #415
Sasha Movsum-Zade RT-211 (Myhayliuk S.L.) (Thursday, 12 May 2022 10:10)
Exam (television receiver)
a television receiver is a device that receives a digital television signal,
decodes it and converts it into an analog signal for output via RCA or SCART
connectors, or converts it into a digital signal for output via an HDMI
connector, and transmits it further to a TV. There is also IPTV receiver
technology: in In this case, the receiver is connected to the networks of the
digital television / Internet operator using ADSL, Ethernet or Wi-Fi, and
television broadcasting is carried out using a local network or the Internet.
https://voca.ro/137FKRHIdtIM
· #414
S.Mykhailiuk (Thursday, 12 May 2022 10:04)
Yeulizaveta Barsukova (RT-211) Task1 and Task2 are good but there are grammar mistakes. Pls do not find excuses for the failure to join our designated activities. Be attentive and keep on working hard .
· #413
Pushkash Maxim (RZ-212 Popovich) (Thursday, 12 May 2022 10:04)
Exam topic #5 (Potential security violations)
Any security violation and breach certainly includes illicit access to some
resources, being systems, data, or operations. In this context, the evolution of
security policies has brought access control at the core of security, but also
privacy protection. Therefore, beyond legacy access control models, a variety of
systems have been proposed, introducing a manifold of additional features. Most
of the prominent approaches typically propose enhancements to RBAC. The
motivation, application domain, and usage patterns followed by the studied
approaches vary significantly.
Voice: https://voca.ro/155CeD22rHro
· #412
Avdieiev Danil (RT-211) S.Mykhailiuk (Thursday, 12 May 2022 10:04)
Exam topic
On June 22, 1941, Germany attacked the Soviet Union. As soon as this became
known, the Politburo of the Central Committee of the All-Union Communist Party
of Bolsheviks immediately gathered to take urgent measures to repel the attack.
Along with urgent measures of a military nature, it was decided to address the
population on the radio in connection with the outbreak of war. The Politburo
considered it logical that I.V. Stalin, the head of the Communist Party and the
Soviet government, should address the people. Stalin, citing political reasons
for his refusal, proposed to entrust the speech to the People's Commissar for
Foreign Affairs, V. M. Molotov. Members of the Politburo actively objected to
this, believing that the people would not understand such a substitution, when
such a responsible and important statement is made not by the generally
recognized leader of the state, but by another person, moreover, it is the
leader of the country who should call on the people to rise to defend the
Motherland. Nevertheless, Stalin continued to insist on his own, explaining his
position by the fact that the general political situation was not yet completely
clear, that he would speak later, when the situation on the fronts cleared up
and it would be possible to make a more balanced and definite statement. In
connection with Stalin's stubborn refusal to speak, the Politburo entrusted this
speech to Molotov, although a number of members of the Politburo continued to
consider such a step erroneous.
https://voca.ro/1oQMkIdFtAQd
· #411
S.Mykhailiuk (Thursday, 12 May 2022 09:59)
To Sasha Movsum-Zade RT-211 Task1 is 68 points: no conclusion, no pre-training the comments before recording it. Task2 is better but with no translation of the phrases themselves. Just 78 points.
· #410
Artem Verhelis RT-211, Mykhailiuk S. (Thursday, 12 May 2022 09:53)
Today I've read the article "UrbanDenoiser: An AI application that filters out
city noise to allow for clearer seismic sensor data". Scientists have created
seismometers as possibility to detect earthquakes - a natural phenomenon that
brings a lot of destruction and leads to death. But human activities in cities,
such as vehicles and trains, produce a lot of seismic noise, which interferes
with the seismometer's ability to detect earthquakes. So this article is about
new work, where researchers developed a deep learning application that
determines which seismic data is natural and artificial and filters out the
unnatural one.
Audio: https://voca.ro/11VF0xLT2Rpr
Article:
https://techxplore.com/news/2022-04-urbandenoiser-ai-application-filters-city.html
1) identify the areas
To identify the priority areas, the authors—leading marine biologists, climate
experts, and economists—analyzed the world's unprotected ocean waters
Длявизначенняпріоритетнихсфер, автори —
провідніморськібіологи,
експертизкліматутаекономісти,
проаналізувалинезахищеніводисвітовогоокеану.
2) grouped into
When a transaction is completed, it is recorded and grouped into a block, with
information such as time stamps and amounts.
Після завершення транзакції, це записується та групується в блок із такою
інформацією, як позначки часу та суми.
3) described above
All the alternatives described above are technically feasible and have been used
in commercial applications.
Усі
альтернативи описані вище варіанти є технічно можливими і мають місце у
промисловості.
Audio: https://voca.ro/1fJzkeljA1j5
· #409
Sergey Kyznyak RT-211, Myhayliuk S.L. (Thursday, 12 May 2022 09:51)
I sent it last week, but there was no class with you and I decided to send it
again
Exam Topic #5
Commercial use of radio is primarily based on the practice of airing radio
advertisements and television advertisements for profit. In 1920, Westinghouse,
one of the leading radio manufacturers, had an idea for selling more radios: It
would offer programming. Radio began as a one-to-one method of communication, so
this was a novel idea. Well, on November 2, 1920, station KDKA made the nation's
first commercial broadcast. They chose that date because it was election day,
and the power of radio was proven when people could hear the results of the
Harding-Cox presidential race before they read about it in the newspaper. It was
a breakthrough in the commercial use of radio and marked the beginning of the
golden age of radio.
Vocaroo: https://voca.ro/175nwaFJMeUg
http://www.pbs.org/wgbh/aso/databank/entries/dt20ra.html
· #408
Sergey Kyznyak RT-211, Myhayliuk S.L. (Thursday, 12 May 2022 09:51)
Exam #6
It is generally recognized that the first radio transmission was made from a
temporary station set up by Guglielmo Marconi in 1895 on the Isle of Wight. This
followed on from pioneering work in the field by a number of people. Radio
transmission of music and talk must have begun around 1905–1906, and
commercially around 1920–1923. VHF stations (very high frequencies) were
launched 30–35 years later. By the 1950s, virtually every country had a
broadcasting system, usually owned and operated by the government. A dramatic
change came in the 1960s with the advent of small, inexpensive, portable
transistor radios, which increased the possibilities of ownership and use. It's
very exciting to learn how radio went through its journey to its peak of
communication work
· #407
Avdieiev Danil (RT-211) S.Mykhailiuk (Thursday, 12 May 2022 09:50)
Article:
https://techxplore.com/news/2019-04-ai-agent-rationales-everyday-language.html
Today I have read the article titled "AI agent offers rationales using everyday
language to explain its actions". It describes about an artificially intelligent
(AI) agent that can automatically generate natural language explanations in
real-time to convey the motivations behind its actions. The work is designed to
give humans engaging with AI agents or robots confidence that the agent is
performing the task correctly and can explain a mistake or errant behavior. I
find this article usefull but this research usefull for the whole planet,
because work with robots will become faster.
vocaroo: https://voca.ro/1c8DXUBeJfq0
1)for its own sake
It was underlined that transparency isn’t an end in itself, nor is it to be
pursued for its own sake.
Булопідкреслено,
щопрозорістьнеєсамоціллю,
інеслідпрагнутизарадинеїсамої.
https://voca.ro/1j5En2EfIUHk
2)general agreement on
It must, however, be acknowledged that there had also been no general agreement
on those proposals in the informal consultations.
Однакслідвизнати,
щовходінеофіційнихконсультаційтакожнебулозагальноїзгодищодоцихпропозицій.
https://voca.ro/1kpjVa7uVXbE
3)from this perspective
No other international forum has yet addressed these issues from this
perspective.
Жоден інший міжнародний форум ще не розглядав ці питання з цієї точки зору.
https://voca.ro/1cIeBR52guzM
· #406
Vlasov Vadim RZ-211 (Yershova) (Thursday, 12 May 2022 09:50)
Today i have read the article: "The biggest data breaches, hacks of 2021"
From the article we learn about the problem of data leakage in our time.
Nowadays, most people neglect their online security, which is why they often
suffer from malware.
In 2021, a type of ransomware spread, due to which a lot of people lost their
data. And also many popular sites were hacked and leaked user data.
In my opinion, such hacks most often occur due to the weak protection that users
choose, or because of its absence.
https://www.zdnet.com/article/the-biggest-data-breaches-of-2021/
https://voca.ro/1jzB6B7aKHec
identify the areas
Novel method identifies areas most suitable for conservation of black lion
tamarin
described above
abandonment of the vessels described above in pursuit of a better life.
grouped into
In developing brains, synapses can be grouped into functional synapses and
silent synapses
https://voca.ro/1bEo0ZjeaPRE
· #405
Yeulizaveta Barsukova (RT-211) S.Mykhailiuk (Thursday, 12 May 2022 09:48)
Hello. I'm sorry but I send my Exam topic to another teacher on Tuesday.
· #404
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 12 May 2022 09:48)
1.described above-описанівище;
The obstacles described above undermine efforts to combat impunity.-Описанівищеперешкодипідриваютьзусилляпоборотьбізбезкарністю.
2.identify the areas-визначитиобласті;
They can help identify the areas where human rights education and training are
most needed for the population at large.-Вониможутьдопомогтивизначитисфери,
деосвітатанавчаннязправлюдининайбільшепотребуютьнаселеннявцілому.
3.grouped into-згрупованів
;
The Presidency's functions may be grouped into three main areas: administrative,
judicial and external relations.-ФункціїПрезидентстваможназгрупуватиутриосновнісфери:
адміністративні,
судовітазовнішнізв’язки.
https://voca.ro/18X5ECGTy65Q
Today I've read the article about the signs that tell us that the phone probably
have a virus.A virus can limit your phone's functionality, send your personal
information to hackers, send your contacts spam messages linking to malware, and
even allow the virus's operator to "spy" on you by capturing your screen and
keyboard inputs, and tracking your geographical location.To avoid an unfortunate
outcome we should pay attention on some perfomance indicators of the phone as
poor perfomance, excessive battery drain and increased mobile data
consumption.Also, the user can get unexplained billing charges, unusual pop-ups
and an unexpected overheating device.So to prevent further damage user should
use a reliable antivirus app , clean the phone's storage and cash and delete any
suspicious or unfamiliar apps.Unfortunately, the situation when the phone gets a
virus is common but applying security measures described above we can reduce the
risk .
https://voca.ro/1j3vMLGaPi5x
https://techxplore.com/news/2022-04-mobile-virus-youll-carefully.html
· #403
Sergey Kyznyak RT-211, Myhayliuk S.L. (Thursday, 12 May 2022 09:47)
(CLASS WORK)
Today I've read the article “US offers $10 mn bounty for DarkSide hackers”. This
article is about a US government that offers 10 million dollars for finding a
leader of the high-profile ransomware gang DarkSide. Washington blamed the
Russia-based group for the online assault that forced the shutdown of the
largest oil pipeline in the eastern United States in May. Cybercrimes have been
booming, with new data out in October showing $590 (five hundred nineteen)
million in ransomware-related payments were reported to US authorities in the
first half of 2021 alone. As for me, the fight against hackers is a very
difficult confrontation.
1)This figure is even less significant WHEN COMPARED to the assets such
enterprises control.
2)And the beauty of the book is that it works on MULTIPLE LEVELS.
3)The training will be based on CASE STUDIES, simulations and group
problem-solving exercises.
Vocaroo(sentence): https://voca.ro/1bPATAlHnboW
Vocaroo(aritcle): https://voca.ro/1k3bM50kGonB
https://techxplore.com/news/2021-11-mn-bounty-darkside-hackers.html
https://techcrunch.com/2021/11/05/state-department-darkside-bounty/
· #402
Yeulizaveta Barsukova (RT-211) S.Mykhailiuk (Thursday, 12 May 2022 09:43)
Class-work
Today I've read the article 'Chinese scientists develop highly robust
stretchable electrode for E-skin applications'.A stretchable electrode has
recently been developed. It's developed by on-site assembly of electrospin
elastic nanofiber frames and liquid metal nanoparticles applied by
electrospraying. The basis of this method of creation is the interaction of
fishing nets with water. Liquid metal provides the strength of the structure
when heated, exposed to various chemicals. Also,the electrical resistance of the
metal is insensitive to a high degree of mechanical tension and remains stable
for a long time. I think it can be used for monitoring of human health.
Audio1:https://voca.ro/1f9p0YBfbMNh
Article:https://techxplore.com/news/2022-04-chinese-scientists-highly-robust-stretchable.html
Phrases
1)identify the areas
The group attempted to identify the areas where dynamic modelling should be used
to support the medium-term objectives.
Група спробувала визначити сфери, де динамічне моделювання має використовуватися
для підтримки середньострокових цілей.
2)grouped into
These paragraphs can be grouped into five sets of provisions.
Ціпараграфиможнаоб’єднативп’ятьположень.
3) described above
All the alternatives described above are technically feasible and have been used
in commercial applications.
Всі
альтернативи, описані вище, є технічно здійсненними і використовувалися в
комерційних застосуваннях.
Audio2:https://voca.ro/1a72KC9NIXcn
· #401
Vorobyova E. to Simchuk from РЗ-313 (Thursday, 12 May 2022 09:40)
There are too many quotes in your response and because of that, your commentary is too long, it should contain no more than 100 words. Bear in mind this requirement. Besides, your grammar mistakes are the following: “Today I HAVE read…”; “THE researchers at Hong Kong University…”; “IN FUTURE”. Start working at your exam topics. It’s obligatory. Good luck.
· #400
Lebedeva E. (Thursday, 12 May 2022 09:40)
To Ilinchuk Vladislav RZ-211 Well done, thank you.
· #399
Sasha Movsum-Zade RT-211 (Myhayliuk S.L.) (Thursday, 12 May 2022 09:40)
Today I have read the article titled "Laser bursts drive fastest-ever logic
gates". This article explains that the longstanding quest of science and
technology has been to develop electronics and information processing that
operate on the fastest time scales allowed by the laws of nature. A promising
way to achieve this goal involves using laser light to control the movement of
electrons in matter, and then using that control to design electronic circuit
elements, a concept known as light wave electronics.
Article: https://phys.org/news/2022-05-laser-fastest-ever-logic-gates.html
Vocaroo: https://voca.ro/12Ccaf76ZcnF
for its own sake
It was underlined that transparency isn’t an end in itself, nor is it to be
pursued for its own sake.
Булопідкреслено,
щопрозорістьнеєсамоціллю,
інеслідпрагнутизарадинеїсамої.
https://voca.ro/1dr1Z2xghSUn
general agreement on
It must, however, be acknowledged that there had also been no general agreement
on those proposals in the informal consultations.
Однакслідвизнати,
щовходінеофіційнихконсультаційтакожнебулозагальноїзгодищодоцихпропозицій.
https://voca.ro/19qmptFqvkuw
from this perspective
No other international forum has yet addressed these issues from this
perspective.
Жоден інший міжнародний форум ще не розглядав ці питання з цієї точки зору.
https://voca.ro/1gB6aGf7fEN7
· #398
Lebedeva E. (Thursday, 12 May 2022 09:39)
To Ivan Zaritskiy RZ-211 Thanks for an informative comment.
· #397
Vorobyova E. to Shlapak from РЗ-213 (Thursday, 12 May 2022 09:31)
Your commentary on the article is interesting and informative. There are no mistakes in it. Your sentences from Phrases of the Day Practice are quite all right too. Continue working this way.
· #396
Ilinchuk Vladislav RZ-211(Lebedeva) (Thursday, 12 May 2022 09:30)
Today I have read the article "Newly discovered lake may hold secret to
Antarctic ice sheet's rise and fall".This article is about the new open lake
Snow Eagle,lies a few hundred miles inland, under the same ice sheet. Scientists
investigating the underside of the world's largest ice sheet in East Antarctica
have discovered a city-size lake whose sediments might contain a history of the
ice sheet . This lake is likely to have a record of the entire history of the
East Antarctic Ice Sheet, its initiation over 34 million years ago, as well as
its growth and evolution across glacial cycles since then.
In my opinion , this article is very interesting for everyone , especially for
people who love new information and new technologies . I think this will become
very useful soon .
1)https://phys.org/news/2022-05-newly-lake-secret-antarctic-ice.html
2)https://voca.ro/11YGd9gdfCw3
described above
The obstacles described above undermine efforts to combat impunity.
Описанівищеперешкодипідриваютьзусилляпоборотьбізбезкарністю.
grouped into
The most critical risks identified can be grouped into three categories:
Найкритичнішівиявленіризикиможназгрупувативтрикатегорії:
identify the areas
Equally, it will be necessary to identify the areas in which the forum would not
be given authority to act.
Крім того, необхідно буде визначити сфери, у яких форум не мав би повноважень
діяти.
3)https://voca.ro/14Es3b0uo808
· #395
Vorobyova E. to Siglyanyk from РЗ-213 (Thursday, 12 May 2022 09:29)
You have coped with the tasks. Thank you and go on working like this.
· #394
Ivan Zaritskiy RZ-211 (Lebedeva) (Thursday, 12 May 2022 09:27)
Today I have read the article “AI traffic light system could make traffic jams a
distant memory”. This article is about a possibility of not stucking in a
traffic jams. The system—the first of its kind—reads live camera footage and
adapts the lights to compensate, keeping the traffic flowing and reducing
congestions. The system uses deep reinforcement learning, where a program
understands when it is not doing well and tries a different course of action—or
continues to improve when it makes progress. In my opinion, this can decrease
the amount of car accidents on road.
https://techxplore.com/news/2022-05-ai-traffic-distant-memory.html
https://voca.ro/14Q1OkFCFwmw
· #393
Ivan Zaritskiy RZ-211 (Thursday, 12 May 2022 09:26)
Today I have read the article “AI traffic light system could make traffic jams a
distant memory”. This article is about a possibility of not stucking in a
traffic jams. The system—the first of its kind—reads live camera footage and
adapts the lights to compensate, keeping the traffic flowing and reducing
congestions. The system uses deep reinforcement learning, where a program
understands when it is not doing well and tries a different course of action—or
continues to improve when it makes progress. In my opinion, this can decrease
amount of car accidents on road.
https://techxplore.com/news/2022-05-ai-traffic-distant-memory.html
https://voca.ro/14Q1OkFCFwmw
· #392
Yershova Y. (Thursday, 12 May 2022 09:25)
Vasilev A.O RZ-211 Yershova Y. (Thursday, 12 May 2022 09:12)
Thanks for your comment.
It's informative and interesting, but too long.
· #391
Simchuk Alexey (Vorobyova RZ-213) (Thursday, 12 May 2022 09:23)
Today I read an interesting scientific article called "A thin sensor for
computer vision based on a micro lens array (MLA)".Recent technological advances
have enabled the creation of increasingly sophisticated sensors that can track
movements and changes in real-world environments with remarkable levels of
precision. Many engineers are now working to make these sensors thinner so that
they can be embedded in a variety of devices, including robotic limbs and
wearable devices. Researchers at Hong Kong University of Science and Technology
have recently developed a thin sensor for computer vision applications, which is
based on a micro lens array (MLA). MLAs are 1D or 2D arrays comprising several
small lenses, which are generally arranged in either squared or hexagonal
patterns.
"In this study, we combined an old technology, a micro lens array, with
vision-based tactile sensors," Xia Chen, one of the researchers who carried out
the study, told TechXplore. "This work builds on the work using the pinhole
arrays to capture the image. We wanted to achieve a thin-format vision-based
tactile sensor, as few studies so far focused on changing the imaging system of
vison-based tactile sensor."
To create their sensor, which is 5 millimeters thin, Chen and his colleagues
placed multiple micro lenses over the full surface of an elastic layer. To
ensure that the surface of the lenses was uniformly spherical and smooth, they
used two techniques known as thermal reflow and soft lithography, which are
often used to reshape structures at a micro- and nano- scale.
"We capture the image in multiple vision units, like many insects do, and once
the touching events happens, we process the images to provide feedback, such as
force mapping," Chen explained. "The unique advantage of our sensor is that by
re-designing the imaging system, we achieved a thin-format size. Now the
thickness of sensor is around 5 millimeters, while this parameter for other
vision-based tactile sensors is at least 18 millimeters."
So far, Chen and his colleagues evaluated their sensor in a series of
preliminary tests, achieving very promising results. They found that their
device could capture clear tactile images with a high spatial resolution and
could also map displacements in surfaces and force distributions with high
levels of accuracy.
In the future, the thin, MLA-based sensor developed by this team of researchers
could be integrated into a variety of electronic and robotic systems, to enhance
their ability to detect the tactile properties of surrounding environments or
collect valuable tactile data. Meanwhile, Chen and his colleagues would like to
develop their sensor further, while also integrating it and testing it in
various real-world devices.
"By improving or re-creating the hardware of vision-based tactile sensors, we
believe that our sensor could assist many computer vision tools, such as object
recognition and tracking tools," the team of researchers told TechXplore. "We
believe there is more potential in multiple vision units, so we may build a
three-dimensional position based on this sensor in the future. In addition, we
would like to combine the sensor with a robotic arm to execute more tasks."
Article:https://techxplore.com/news/2022-05-thin-sensor-vision-based-micro.html
1.identify the areas
My boss told me to define areas of work.
2.described above
We were asked to read what is described above.
3.grouped into
We are grouped into one big group for scientific development
· #390
Shlapak Dmytro RZ-213 (Vorobyova) (Thursday, 12 May 2022 09:22)
1. We need to identify the areas of attack on us.
2. The cyber attack protection proposals described above are not relevant today.
3. We use new methods of protection against cyber attacks, which are grouped
into many subsystems.
Today I have read the article "Driving in old age". It may sound unpleasant for
someone, but as I have noticed, many countries are not up to pleasing elderly
people in driving right now. And car manufacturing companies are more focused on
improving driving conditions for the younger generation. And it is definitely
not in the near future that an automatic transmission will be available to an
ordinary person, and many old people do not go to retrain and get used to
automation. Although based on the experience of my friends, automation is very
convenient.
https://techxplore.com/news/2019-10-age.html
https://voca.ro/1mnsFIVvYy8g
· #389
Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 12 May 2022 09:22)
Prhases of Day
1. described above : https://voca.ro/1fNuKOJurKTB
The Cracow physicists, funded by the Polish National Science Centre, decided to
solve the problem described above in the following way.
Краківські фізики, фінансовані Польським національним центром науки, вирішили
вирішити описану вище проблему таким чином.
2. identify the areas : https://voca.ro/1a4tNX9zx09k
Everyone - from the local population to volunteers on the other side of the
world - was able to share information in order to map out the situation and
identify the areas that were hardest hit.
Усі
– від місцевого населення до волонтерів на іншому кінці світу – змогли
поділитися інформацією, щоб скласти карту ситуації та визначити райони, які
найбільше постраждали.
3. grouped into : https://voca.ro/1jcJTE2Ni9Oo
They did not know the rationales were grouped into the two categories.
Вони не знали, що обґрунтування були згруповані в дві категорії.
Article:
https://techxplore.com/news/2020-12-ai-twitter-users-disinformation.html
Audio: https://voca.ro/13KXcU7DHgqy
Today, a very interesting article was read by me. Scientists have developed a
certain algorithm using AI, which can prevent the spread of misinformation.
The team, led by Dr. Nikos Aletras, analyzed more than 6,000 different users and
their Twitter messages. Using this information, they try to see if people will
continue to use unreliable sources
In the study, scientists divided users into two groups, the first - uses only
official data and sources, the other unreliable resources. Using this
information, they taught AI to predict which user might continue to spread
inaccurate information.
All these studies are very important in our time, when with the help of
information it is possible to manipulate and use people for their own benefit.
· #388
S.Mykhailiuk (Thursday, 12 May 2022 09:21)
To students Avdeev,Acheev,Barsukova, Vergemis, Glugan,El-Kadi Zaharia, Ergul,,
Ermolenko,Krivosheenko, Kysnyak, Mikhailov, Monsun-Zade fro group RT-211.
It’s high time to join today’s on-line activities with exam topics and sentences
with the phrases of the Day with the links posted into the Guestbook. Pls do not
waste your time and work within the timeframe of your session.
Submit your tasks right now, pls.
· #387
Lebedeva E. (Thursday, 12 May 2022 09:19)
To Mykola Zhmurak RZ-211 Thanks for a detailed comment on the article.
· #386
Lebedeva E. (Thursday, 12 May 2022 09:17)
To Ivan Zaritskiy RZ-211 You wrote exam topic 7 on 10.05, so today you must write review on the article. The work with phrases is done correctly. Keep working.
· #385
Mykola Zhmurak RZ-211(Lebedeva) (Thursday, 12 May 2022 09:16)
Today i have read the article titled "3D-printed objects that sense how a user
is interacting with them". This article is about a new method to 3D print
mechanisms that detect how force is being applied to an object. To perform this,
the researchers integrated electrodes into structures made from metamaterials,
which are materials divided into a grid of repeating cells. Metamaterials can
support different mechanical functionalities. This invention is really useful.
Designers could use this method to 3D print "interactive input devices," like a
joystick, switch or handheld controller. It's will make their work easier.
Article - https://techxplore.com/news/2021-09-3d-printed-user-interacting.html
Vocaroo - https://voca.ro/16da98Zvk79B
Phrases :
1) described above
The researchers tested out the idea on an unpiloted aerial vehicle (UAV) in a
scenario like the one described above.(Дослідникиперевірилиідеюнабезпілотномулітальномуапараті
(БПЛА)
засценарієм,
подібнимдоописаноговище.)
2) identify the areas
Our study innovated by combining these two datasets in an approach that enabled
us to identify the areas that are theoretically most suitable. (Нашедослідженнябулоінноваційнимшляхомоб’єднанняцихдвохнаборівданихупідході,
якийдозволивнамвизначитиобласті,
якітеоретичнонайбільшпідходять.)
3) By taking advantage of blockchain technology, digital assets are broadly
grouped into fungible and non-fungible tokens (NFT).(Використовуючиперевагитехнологіїблокчейн,
цифровіактивиширокогрупуютьсянавзаємозаміннітанезміннітокени
(NFT).)
Vocaroo - https://voca.ro/13PmDUiqIx7G
· #384
Lebedeva E. (Thursday, 12 May 2022 09:15)
To Kovalzhi Andrey rz-211 Well done, thank you.
· #383
Yershova Y. (Thursday, 12 May 2022 09:14)
Botsaniuk Ivan RZ-211 (Yershova Y.A) (Thursday, 12 May 2022 09:04)
Your review is rather good, very informative, but too long, mind that.
· #382
Vasilev A.O RZ-211 Yershova Y. (Thursday, 12 May 2022 09:12)
Today I've read an article called"Canada hospitals use drones to carry lungs for
transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by
Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western
Hospital on the city's west side to the roof of the downtown Toronto General
Hospital.The trip at the end of September took less than 10 minutes. It was
automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the
company, but a similar flight in April 2019 delivered a kidney to a hospital in
the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team
that whisked the package inside and successfully transplanted the lungs into a
waiting patient, saving the life of the 63-year-old man who'd been diagnosed
with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human
organs
https://voca.ro/1oNUOF2CvqeB
https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html
1) identify the areas
The Secretariat would seek to identify areas for cost-cutting.
https://voca.ro/1o8xTyH9kfhQ
2) described above
She met with mr Bob who recounted the events described above.
https://voca.ro/17CrgqOjC4dD
3)grouped into
These kinds of skills can be grouped into three categories.
https://voca.ro/1e2SlN0qzrc5
· #381
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Thursday, 12 May 2022 09:12)
The article I have read today is "Shedding new light on supernova mystery". The
author of the article says that physicists have a new theory about the
mysterious mechanism that causes the explosion of massive, or heart, stars. The
main star collapses when it runs out of nuclear fuel, on which it depends, and
builds up in less than a second under its own enormous weight. This process
releases a huge amount of gravitational energy, causing an explosion. In my
opinion, the study of new processes in space is necessary for us time and quite
interesting.
https://voca.ro/1kWhLj18Emcr
1) In developing brains, synapses can be grouped into functional synapses and
silent synapses.
У
мозку, що розвивається, синапси можна згрупувати у функціональні синапси та
безшумні синапси.
2) Novel method identifies areas most suitable for conservation of black lion
tamarin.
Новий метод визначає ділянки, найбільш придатні для збереження тамарину чорного
лева.
3)They attribute this divergence from the aggregated conclusions described above
to a significantly larger data set.
Вони пов’язують це розходження з агрегованими висновками, описаними вище, до
значно більшого набору даних.
https://voca.ro/1guKnulw2iI1
· #380
Ivan Zaritskiy RZ-211 (Lebedeva) (Thursday, 12 May 2022 09:10)
Different protection mechanisms.
Protection mechanisms are used to enforce layers of trust between security
levels of a system. These protection mechanisms are used to protect processes
and data and are discussed in the following sections:
Layering
Abstraction
Data Hiding
Encryption
Layering
Most systems use a form of layering as a way to protect system resources. A
traditional kernel-based operating system, such as Unix, uses a two-layer
approach in which the system resources are managed in a protected kernel and
everything else runs in an outer layer known as the user's space.
Abstraction
Abstraction is a common term in the world of object-oriented design. It is when
data is managed as a collection called an object. Objects are usually defined as
classes that define the data and the methods that can be used to access the
object. Methods provide a predictable way to access the object's data, which
allows the entire data within the class to be managed as a unit that can enforce
access controls and integrity of the data.
Data Hiding
Sometimes access to data should not be provided—for example, data values within
an application module that are used for internal calculations. In this case, no
access methods are provided as an interface to this data. This is called data
hiding because the data is hidden and inaccessible from the other layers.
Encryption
Cryptography is the science of creating algorithms used to encrypt data for the
storage or transmission of data. Encryption uses those algorithms to convert
data into an unintelligible form. In basic terms, encryption uses a secret key,
a private value, to perform a mathematical function on the data to make it
unusable by the casual observer.
https://voca.ro/14wsW7OraiKL
identify the areas
The study also identified areas in the world with the greatest diversity in
landraces of these 25 crops, which included parts of Bangladesh, Ethiopia,
India, Nepal, and Pakistan.(Дослідженнятакожвизначилорайонисвітузнайбільшоюрізноманітністюмісцевихсортівцих
25
культур,
яківключаличастиниБангладеш,
Ефіопії,
Індії,
НепалутаПакистану.)
grouped into
Referred to as partial synchronization, it emerges such that systems can be
grouped into clusters such that synchrony is only observed in each cluster.(Згадуєтьсяякчастковасинхронізація,
вінвиникаєтакимчином,
щосистемиможутьбутизгрупованівкластеритакимчином,
щосинхронністьспостерігаєтьсялишевкожномукластері.)
describe above
In addition to the common Skype interview I describe above, some interesting
twists are now seen in the marketplace.(Надодатокдозвичайногоінтерв’юв
Skype,
якеяописаввище,
заразнаринкуможнапобачитидеякіцікавіповороти.)
https://voca.ro/19cYlcW37g6T
· #379
Kovalzhi Andrey rz-211 (Lebedeva E.) (Thursday, 12 May 2022 09:10)
Today i have read the article "Research shows how statistics can aid in the
fight against misinformation". This text is about a professor of mathematics
who, with his team, invented a way to find misinformation using statistical data
and remove "black boxes" from a machine learning system. With the use of
algorithms and computer models, machine learning is increasingly playing a role
in helping to stop the spread of misinformation, but a main challenge for
scientists is the black box of unknowability, where researchers don't understand
how the machine arrives at the same decision as human trainers.
In my opinion, this study is a great way to avoid new mistakes from machine
learning and destroy fakes.
https://techxplore.com/news/2021-12-statistics-aid-misinformation.html
https://voca.ro/1lyLdSweSCTX
Daily phrases:
1. grouped into
Participants of the experiment were grouped into 3 small groups.
Участникиэкспериментабылиподеленына
3
небольшиегруппы.
2. identify the areas
New method identifies areas most suitable for conservation of tamarin.
Новыйметодопределяетрайоны,
наиболееподходящеедлясохраненияродатамаринов
3. described above
Scientists conducted multiple experimnets to prove the equation described above.
Ученые провели множественные эксперименты чтобы доказать уравнение описанное
выше
https://voca.ro/1lk6IssmRR3u
· #378
Vorobyova E. to Yakimova from РЗ-213 (Thursday, 12 May 2022 09:09)
Mind your grammar mistakes at the beginning of your commentary on the article: “The article DEALS with THE…” Your sentences from Phrases of the Day Practice are done thoroughly. But your exam topics are too long, they should contain no more than 100 words. Pay attention to this and go on working. Good luck.
· #377
Vorobyova E. to Mitriev from РЗ-213 (Thursday, 12 May 2022 09:05)
Thank you for the preparation for your exam. Your essay is written correctly. Continue working like this.
· #376
Botsaniuk Ivan RZ-211 (Yershova Y.A) (Thursday, 12 May 2022 09:04)
Today I have read the article “A model that can help inexperienced users
identify phishing emails”. Phishing attacks are attacks through which criminals
trick users into sending them money and sensitive information, or installing
malware on their computer, by sending them deceptive emails or messages.
Researchers have recently developed a machine learning-based approach that could
help users to identify phishing emails, so that they don't inadvertently install
malware or send sensitive data to cyber-criminals. The model introduced by the
researchers combines a variety of state-of-the-art phishing detection methods
into a single, concise "informational package." In contrast with other
previously proposed approaches, therefore, it presents users with probabilities,
instead of "hard truths," preventing errors that might result in the loss of
important messages. So, in my opinion, this model would be useful because there
will be less chance that user get a phishing email.
https://techxplore.com/news/2022-04-inexperienced-users-phishing-emails.html
https://voca.ro/1gnyUDg5z9JU
identify the areas
I expect with collective efforts, the outcome of this webinar will be utilised
to identify the areas of steel usage.
described above
Do the same accountability and control procedures described above apply to
Federal property?
grouped into
There are 12 towns grouped into four zones with three towns per zone.
https://voca.ro/1o1qH87VJlCC
· #375
Vorobyova E. to Chernetskiy from РЗ-213 (Thursday, 12 May 2022 09:02)
Your exam topic is quite good. There are no mistakes in it. Thanks for your active work.
· #374
Yershova Y. (Thursday, 12 May 2022 09:02)
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 12 May 2022)
Thanks for your interesting, clear comment, it's good but mind the pronunciation
"read" 3rd form [red]
· #373
Lebedeva E. (Thursday, 12 May 2022 09:01)
To Daniil Dragin (RZ-211) and Misha Donenko RZ-211 Well done, thank you.
· #372
Yakymova Anna/RZ-213(Vorobyova E.V.) (Thursday, 12 May 2022 08:58)
Phrases of the day:
-grouped into -згрупованів
Referred to as partial synchronization, it emerges such that systems can be
grouped into clusters such that synchrony is only observed in each cluster.(Згадуєтьсяякчастковасинхронізація,
вінвиникаєтакимчином,
щосистемиможутьбутизгрупованівкластеритакимчином,
щосинхронністьспостерігаєтьсялишевкожномукластері.)
link:https://techxplore.com/news/2021-05-exploring-partial-synchronization-networked.html
audio recording:https://voca.ro/1m3xK2z355ZN
- described above -
описанівище
Emergency situations like the fire scenario described above are just one
example.(Надзвичайніситуації,
такіяксценарійпожежі,
описанийвище,
єлишеоднимізприкладів.)
link:https://techxplore.com/news/2018-10-lab-technology.html
audio recording:https://voca.ro/1hBpY0xkjzon
-identify the areas - identify the areas
The results could help identify suitable areas for protection, according to the
researchers.(Надумкудослідників,
результатиможутьдопомогтивизначитивідповіднізонидлязахисту.)
link:https://phys.org/news/2022-03-biodiversity-requires-large-strictly-areas.html
audio recording:https://voca.ro/194TcJbBcRjz
Review:
link:https://phys.org/news/2021-07-application-high-q-resonance-all-dielectric-metasurfaces.html
audio recording:https://voca.ro/1n8vTQNlmEOA
The article is deal with generation and application of the high-Q resonance in
all-dielectric metasurfaces. Metamaterials are electromagnetic structures
сontaining
of subwavelength units, which can control of the electromagnetic waves.
All-dielectric metasurfaces have attracted everyone's attention due to their
high efficiency and low loss. Metasurfaces based on traditional optical
materials can only support relatively low Q resonances. The concept of BIC
provides a new solution to overcome this problem and firstly appears in quantum
mechanics. It is reported that this study paves the way for new opportunities,
the development of high-quality photonic applications and innovations in optical
technologies.
· #371
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 12 May 2022)
1. Today I have read the article 'AI predicts infant age, gender based on
temperament'.
It's hard to tell the difference between a newborn boy and girl based solely on
temperament characteristics such as the baby's propensity to display fear, smile
or laugh.
For this case, a new study in PLOS ONE used machine learning to analyze
temperament data on 4,438 babies in an attempt to classify the infants by gender
and age. The results indicate it is far easier for computer algorithms to
determine the age of a baby than it is for them to decipher a baby's gender
based off temperament data during the infant's first 48 weeks of life.
A very interesting, in my opinion, techonology, so I would definently love to
see it's getting a wide use.
2. https://techxplore.com/news/2022-05-ai-infant-age-gender-based.html
3. https://voca.ro/16KuSeTSxIWH
4. 1) grouped into
The fact sheets are grouped into seven sections
2) described above
The acetic acid process described above is an example
3) identify the areas
This arrangement would facilitate indication of flow and could be used to
identify the areas in which sprinkler heads were in operation.
5.
https://voca.ro/1oARQyKd9aUY
· #370
S.Mykhailiuk (Thursday, 12 May 2022 08:54)
To students from group RT-211 .
Welcome back to our activities.
Prepare one of the exam topics and phrases of the Day practice with appropriate
links to the source and voice record msgs links and post them into the Guestbook
without delay.
I
wish you all the best.
· #369
Lebedeva E (Thursday, 12 May 2022 08:52)
To РЗ-211 The lesson has started and I am waiting for your comments and work with phrases.
· #368
Daniil Dragin (RZ-211 Lebedeva E) (Thursday, 12 May 2022 08:50)
1)Today I have read the article ''Next-generation solar cells reach 24%
efficiency''.This article is about a new development in solar panel
manufacturing. Scientists from the research team of Prof. Dr. Thomas Riedl from
the University of Wuppertal have developed a special solar cell with an
efficiency of 24%, this improvement should pay off in the near future. It is
also interesting that the improvement is made on the principle of replacing old
semiconductors with organic semiconductors, again we are convinced that the
tandem of the latest technologies and nature is the key to our future.
In
my opinion, the development of technologies in the field of renewable energy is
our way out of an energy catastrophe that can happen, because energy sources are
not endless and their number is decreasing faster and faster every year.
2)https://techxplore.com/news/2022-04-next-generation-solar-cells-efficiency.html
3)https://voca.ro/1mREPLaY0LGM
4)
1)grouped into
The reasons for the increases can be grouped into two broad categories.
Причини підвищення можна згрупувати у дві великі категорії.
2)identify the areas
They also help identify areas for improvement.
Вони також допомагають визначити сфери для покращення.
3)described above
She met with X who recounted the events described above.
Вона зустрілася з X, який розповів про події, описані вище.
5)https://voca.ro/1273iGias5rP
· #367
Misha Donenko RZ-211 Lebedeva (Thursday, 12 May 2022 08:29)
Today I’ve read the article “New discovery opens the way for brain-like
computers”. Research has long strived to develop computers to work as energy
efficiently as our brains. The discovery opens the way for more efficient
technologies, everything from mobile phones to self-driving cars. In recent
years, computers have been able to tackle advanced cognitive tasks, like
language and image recognition or displaying superhuman chess skills. According
to Johan Åkerman, the discovery will enable faster, easier to use and less
energy consuming technologies in many areas. More energy-efficient calculations
could lead to new functionality in mobile phones. The more energy-efficiently
that cognitive calculations can be performed, the more applications become
possible.
https://techxplore.com/news/2021-11-discovery-brain-like.html
https://voca.ro/1ctrsKdMfqCm
1.identify the areas
They can help identify the areas where human rights education and training are
most needed for the population at large.
Вони можуть допомогти визначити сфери, де освіта та навчання в галузі прав
людини найбільше потребують населення в цілому.
2.grouped into
Green growth and green economy-related indicators identified to date can
be grouped into three main categories.
Показники зеленого зростання та зеленої економіки, визначені на сьогодні, можна
згрупувати в три основні категорії.
3.described above
She met with X who recounted the events described above.
Вона зустрілася з X, який розповів про події, описані вище.
https://voca.ro/1gKUB6PRy0xu
· #366
S.Mykhailiuk (Thursday, 12 May 2022 07:43)
To students Avdeev,Acheev,Barsukova, Vergemis, Glugan,El-Kadi Zaharia, Ergul,,
Ermolenko,Krivosheenko, Kysnyak, Mikhailov, Monsun-Zade fro group RT-211.
It’s high time to join today’s on-line activities with exam topics and sentences
with the phrases of the Day with the links posted into the Guestbook.
Pls do not waste your time and work within the timeframe of your session.
· #365
Yershova Y. to PЗ-211 (Thursday, 12 May 2022 07:29)
Good morning! The lesson has started, I am waiting for your reviews and audio recordings. Do not forget about Phrases of the day. Good luck!
· #364
S.Mykhailiuk (Thursday, 12 May 2022 06:50)
To students from group RT-211 .
Welcome back to our activities.
Prepare one of the exam topics and phrases of the Day practice with appropriate
links to the source and voice record msgs links and post them into the Guestbook
without delay.
I
wish you all the best.
· #363
Yakymova Anna / RZ-213 (Vorobyova E. V.) (Wednesday, 11 May 2022 22:27)
Exam topic 8
Passwords and their drawbacks
The most basic form of user authentication, particularly on the Web, is the
password authentication protocol. This method of authentication forces you to
remember username/password combinations to access accounts or special sections
of a website. While effective and in some ways fundamentally a part of online
security, password authentication protocols fail when you don't address them
seriously. So the main disadvantage is that it can be simply guessed.
You
typically can't guess a password unless you know something about the user of
that password, and then only if the password represents something knowable about
that user.
Computer programs, however, can launch brute force attacks on password systems.
This means that a program literally reads through a provided dictionary of
terms, trying each word until the correct combination of characters breaks the
password. Typically, protecting yourself from these attacks requires you to
create complex passwords that include numbers, letters, and special symbols,
which can be hard to remember.
Also, don't forget about the danger for the password in public places.
First, someone physically near you may look over your shoulder and read your
password, or look at your keyboard and note your key strokes.
Second, someone connected to the network might try to intercept your password
information as you log in using network programs that monitor the local Wi-Fi
hot spot.
Your password is the last point of defense between you and criminals who'd like
to access your personal data.
Therefore, you should always follow the rules for creating and using a password
so that it has minimal drawbacks.
https://voca.ro/18ycx76rRTZu
· #362
Yakymova Anna / RZ-213 (Vorobyova E. V.) (Wednesday, 11 May 2022 22:24)
Exam topic 1
Concept if "Privacy"
What does privacy mean?
Well, it depends on who you ask.
Broadly speaking, privacy is the right to be let alone, or freedom from
interference or intrusion. Information privacy is the right to have some control
over how your personal information is collected and used.
Ask
most people these days what they think of when it comes to privacy and you’re
likely to have a conversation about massive data breaches, wearable tech, social
networking, targeted advertising miscues.
With speed-of-light technological innovation, information privacy is becoming
more complex by the minute as more data is being collected and exchanged.
As the technology gets more sophisticated (indeed, invasive), so do the uses of
data. And that leaves organizations facing an incredibly complex risk matrix for
ensuring that personal information is protected.
As
a result, privacy has fast-emerged as perhaps the most significant consumer
protection issue—if not citizen protection issue—in the global information
economy.
Privacy of information is what cybersecurity specialists are currently working
on.
There are many ways to protect privacy as it's one of the objects of information
protection in general. Information privacy and personal privacy are closely
related, so the protection of privacy is very important for the protection of
human rights.
https://voca.ro/1ardZhegi0Nd
· #361
Yakymova Anna / RZ-213 (Vorobyova E. V.) (Wednesday, 11 May 2022 22:21)
Exam topic 4
Information protection systems
More and more sectors of human activity are becoming so much imbued with these
new information technologies. But providing huge opportunities, information
technology, however, carry a greater risk and creating an entirely new,
little-studied area for possible threats, which implementation can lead to
unpredictable and even catastrophic consequences. An increasing number of
computer crimes that may lead ultimately to the decreasing of the economy.
Failure of information technology used in the management of nuclear power plants
or chemical plants can cause ecological disasters. And so it should be clear
that the information is a resource that must be protected.
Systems of information security are the same thing as the information protection
systems and they protect sensitive information from unauthorized activities,
including inspection, modification, recording, and any disruption or
destruction.
The goal is to ensure the safety and privacy of critical data such as customer
account details, financial data or intellectual property.
There are such types of systems like :
Personal data protection systems, data access control systems, intrusion
detection and prevention systems and many others.
They are all very important for cyber security.
https://voca.ro/12hgAYQBaSZu
· #360
Yakymova Anna / RZ-213 (Vorobyova E. V.) (Wednesday, 11 May 2022 22:18)
HW
I'm going to write a few words about the article I have recently read. The
article is headlined 'Chinese developers expose data belonging to Android
gamers' .The Chinese developers of popular Android games have disclosed
information belonging to users through an unsecured server.The vpnMentor's
cybersecurity team revealed EskyFun as the owner of the server, which has made
public on the network.EskyFun is the developer of Android games.The team says
that EskyFun has introduced alarming tracking and permissions settings. The
database was more than needed for mobile games. The records included various
confidential information. For example, phone numbers, mobile device event logs,
email addresses, device information, etc .
In
my view, many cyberattacks have been caused by people not caring about their
privacy.
https://voca.ro/16zA7QPYWJiy
https://www.zdnet.com/article/chinese-developers-expose-data-belonging-to-android-gamers/
· #359
Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (HomeWork) (Wednesday, 11 May 2022 15:10)
Exam topic #9 (Functions of firewalls)
Firewalls are important because they have had a huge influence on modern
security techniques
and are still widely used. They first emerged in the early days of the internet,
when networks
needed new security methods that could handle increasing complexity. Firewalls
have since become
the foundation of network security in the client-server model – the central
architecture of modern
computing. Most devices use firewalls – or closely related tools – to inspect
traffic and mitigate
threats. In my opinion, not even programmers must use firewalls, everyone should
to learn how to update
his Internet privace.
https://voca.ro/1mYMiMQvTQSU
· #358
Petrova E.I. (Wednesday, 11 May 2022 12:24)
Pour les étudiants qui apprennent le français.
Chers étudiants !
Travaillez régulièrement. J’attends vos devoirs. Laissez vos commentaires et vos
enregistrements ici.
Allez-y! Bon travail.
· #357
Chernetskiy Nikita.RZ-213. (Vorobyova) (Wednesday, 11 May 2022 11:00)
Privacy is a value so complex, so entangled in competing and contradictory
dimensions, so engorged with various and distinct meanings, that I sometimes
despair whether it can be usefully addressed at all. But as to capturing the
core concept of privacy itself, I find myself cautious and reserved. In this
brief Review Essay, I shall isolate and review three different and in some
respects incompatible concepts of privacy that are each mentioned in the
Prologue to The Unwanted Gaze. The first connects privacy to the creation of
knowledge; the second connects privacy to dignity; and the third connects
privacy to freedom. I shall argue that the first concept should not be
understood as a question of privacy; that the second is a helpful way of
apprehending privacy, but that it should focus our attention primarily upon
forms of social structure; and that the third is best conceived as an argument
for liberal limitations on government regulation.
Audio:https://voca.ro/16jqy8efs7MA
Concept of "Privacy"
· #356
S.Mykhailiuk (Wednesday, 11 May 2022 09:41)
To group RT-211 Welcome back to our activities. Prepare one of the exam topics and phrases of the Day practice with appropriate links to the source and voice record msgs links and post them into the Guestbook without delay.
· #355
Popovych E. (Tuesday, 10 May 2022 20:04)
To Neblienko V. / RZ-212 /
Thanks for your comment.
In
general it's good.
· #354
Popovych E. (Tuesday, 10 May 2022 20:02)
To Stanislav Kryvosheienko RT-211
Thanks for your active work.
It's quite all right.
· #353
Popovych E. (Tuesday, 10 May 2022 20:01)
To Stanislav Kryvosheienko RT-211
Thanks for your article review. I see you have understood the main idea and made
the right conclusion.
Keep on working.
· #352
Popovych E. (Tuesday, 10 May 2022 19:59)
To Artem Verhelis RT-211
Thank you for the comments. They're clear and well done.
· #351
Popovych E. (Tuesday, 10 May 2022 19:58)
To Sergey Kyznyak RT-211,
#320, 321
Exam topic #6 is well done.
The
abstract demonstrates that you have understood the main idea of the article and
expressed your understanding in a correct way.
· #350
Popovych E. (Tuesday, 10 May 2022 19:56)
To Artem Verhelis RT-211
Exam topic #6 The new advancement of color Television is well done.
· #349
Popovych E. (Tuesday, 10 May 2022 19:54)
To Sasha Movsum-Zade RT-211
The review you have sent was written correctly, it meets all the requirements
for such kind of independent student work.
· #348
Popovych E. (Tuesday, 10 May 2022 19:52)
To Yeulizaveta Barsukova (RT-211)
#314, 334
Exam Topic #7 (Turning the DTV signal) is well done.
Thank you for your participation in the discussion.
I appreciate your active work). Your comments are quite interesting.
I
am waiting for your new answers.
· #347
Popovych E. (Tuesday, 10 May 2022 19:49)
To Timophey Sipin RZ-212
Thank you, your comment, audio are correctas well as the sentences with Phrases
.
· #346
Popovych E. (Tuesday, 10 May 2022 19:46)
To Timophey Sipin RZ-212
Thank you for your comment on the article, audio recording.
Well done.
· #345
Popovych E. (Tuesday, 10 May 2022 19:44)
To Badyuk Eduard RZ-212
The comment of the article is written correctly and corresponds to the standards
of independent student work of such kind.
· #344
Popovych E. (Tuesday, 10 May 2022 19:43)
To Mashovets Andrey (RZ 212)
Thank you for your comment on the article and for your work.
It
is nice that you do it regularly.
· #343
S.Mykhailiuk (Tuesday, 10 May 2022 12:51)
To Ruslan Siropulo, RF-211. Task1 is 87 points. Task2 is very long (100-word story is a must). Pls do not quote. Try to make conclusion. And pls choose the article associated with your speciality. Just 63 points.
· #342
S.Mykhailiuk (Tuesday, 10 May 2022 12:46)
To students from subgroups RF-211,РЗ-211
Yakubovska, Kulaksiz.
Fudulaki,Huzhnyak haven’t been participated in today’s session. Pls do your
tasks and post them into the Guestbook
· #341
Anton Ardelyan RZ-211(Gvozd O.V.) (Tuesday, 10 May 2022 12:40)
We live in the digital age: we study, improove, relax and work.
And
if we do this without using the Internet just on pc, then we are often protected
by antiviruses such as kaspersky or eset32
But what to do when surfing the internet? How to protect yourself from Internet
hacking?
This is where the firewall comes to the rescue.
A firewall is designed to filter network traffic passing through it.
Formation of regulations for the order of access to services; Registration and
accounting of access attempts to the device from the outside and from internal
network objects; Interfering with obtaining information about a device or
network; Broadcasting false data about the protected network
Audio: https://voca.ro/1aksURvcpZVl
· #340
Lebedeva E. (Tuesday, 10 May 2022 12:23)
To Denis Zavadsky RZ-211 I got your audio recording. Please? don't hurry while reading the text!
· #339
S.Mykhailiuk (Tuesday, 10 May 2022 12:01)
To Khotynskiy Oleg (РЗ- 212). Task1 is lengthy (100 words is a must). Pls stop selecting the topics on different speciality you have nothing to do with. There are also some grammar mistakes. Just 67 points. Task 2 is better.
· #338
Denis Zavadsky Lebedeva RZ-211 (Tuesday, 10 May 2022 11:45)
https://voca.ro/1gqdbAZinAUN
· #337
Gvozd to Anton Ardelyan RZ-211 (Tuesday, 10 May 2022 11:35)
The tasks are complete and informative. Try to post them in time.
· #336
Neblienko V. / RZ-212 / Popovych (Tuesday, 10 May 2022 11:30)
(Im sorry for being late)
Today i have read the article titled: "First use of microscopic sound waves to
study cell abnormalities". This article tells about A University of Nottingham
academic has won a prestigious five-year fellowship to explore the use of
harmless sound waves to view deep inside living cells to aid early diagnose in
diseases such as cancer.
Royal Academy of Engineering Fellow, Dr. Fernando Perez-Cota, from the Faculty
of Engineering, is building a unique imaging instrument that uses
sub-optical-wavelength sound (or phonons).
Phonons are typically used in the semiconductor and consumer electronics
industries, however their use in scientific imaging is something new.
In
my opinion, this research advances medicine to an unprecedented level!
Article: https://phys.org/news/2018-09-microscopic-cell-abnormalities.html
Vocaroo: https://voca.ro/1NwrnbqYIAo3
Phrases
First use of
First use of microscopic sound waves to study cell abnormalities
Первое использование микроскопических звуковых волн для изучения клеточных
аномалий
Focused primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation.
В первую очередь они сосредоточились на программе SolSmart, VEP, которая
побуждает местные органы власти внедрять передовой опыт для продвижения
солнечных установок.
for a number of reasons
The technology is novel for a number of reasons, one being that it has the
potential to provide new insight into the environmental factors that have
significant impacts on air pollution levels.
Эта технология является новой по ряду причин, одна из которых заключается в том,
что она может дать новое представление о факторах окружающей среды, которые
оказывают значительное влияние на уровни загрязнения воздуха.
Vocaroo: https://voca.ro/1iidWIR9lwQA
· #335
Anton Ardelyan RZ-211(Gvozd O.V.) (Tuesday, 10 May 2022 11:28)
Today i have read the article "A deep learning technique to solve Rubik's cube
and other problems step-by-step" This article give us companation about an
associate professor at the University of Nottingham, developed a deep-learning
technique that could learn a so-called "fitness function" from a set of sample
solutions to a problem. It could be used to solve a Rubik's cube and other
problems step by step. In speaking with TechXplore, Johnson noted that the
Rubik's cube is a complex puzzle, but any of its huge number of combinations are
at most 20 steps from a solution.
Audio: https://voca.ro/17nctx1XixHH
Link:
https://techxplore.com/news/2021-02-deep-technique-rubik-cube-problems.html
Phrases:
1)It was his first use of a digital camera.
Це було перше використання цифрової камери
2)Facebook triumphed for a number of reasons.
Facebook був нагороджений через ряд причин
3)A change that many analysts, focused primarily on politics rather than
culture, are failing to notice.
Зміни, які не помічають багато аналітиків, зосереджених насамперед на політиці,
а не на культурі.
Audio: https://voca.ro/11newgmy6hgs
· #334
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 10 May 2022 10:45)
Exam Topic #7 (Turning the DTV signal)
The transition to digital television, as well as the official digital switch, is
a process in which old analogue television broadcasting technologies are being
transformed into digital television and replaced by it. The transition may also
include the conversion of analog cable to digital cable or Internet-based
television, as well as from analog to digital satellite television. This process
was started by some countries around 2000. This is an interesting process
because existing viewer-owned analog TVs cannot receive digital broadcasting. So
they had to buy new equipment. The government usually helped them financially to
do so by a certain deadline.
Audio:https://voca.ro/1mGAN2Qr6RwB
· #333
Lebedeva E. (Tuesday, 10 May 2022 10:29)
To Ilinchuk Vladislav RZ-211 Well done, thank you.
· #332
Lebedeva E. (Tuesday, 10 May 2022 10:28)
To Ivan Zaritskiy RZ-211 (Lebedeva) (Tuesday, 10 May 2022 10:18) The exam topic ' Different protection mechanisms.' is written correctly. But I don't see your audio file, so I can't accept this work.
· #331
Ilinchuk Vladislav RZ-211(Lebedeva) (Tuesday, 10 May 2022 10:22)
№2
Various security techniques.
Your network faces threats of all shapes and sizes, and thus should be prepared
to defend, identify and respond to a full range of attacks.
But the reality is that the biggest danger to most companies are not
fly-by-night threat actors, but rather attackers that are well-funded and are
targeting specific organizations for specific reasons. For that reason, your
network security strategy needs to be able to address the various methods these
actors might employ.
Network security protects your network and data from breaches, intrusions, and
other threats.
Here are the network security basics to secure business networks.
Here are different network security tools and techniques designed to help you do
just that:
Access control
Access control allows you to increase your network security by limiting user
access and resources to only the parts of the network that directly apply to
individual users’ responsibilities.
Anti-malware software
Anti-malware tools are a kind of network security software designed to identify
dangerous programs and prevent them from spreading.
Anomaly detection
Network anomaly detection engines (ADE) allow you to analyze your network, so
that when breaches occur, you’ll be alerted to them quickly enough to be able to
respond.
1)https://voca.ro/1n7lnsh2ilLa
for a number of reasons
The preparation of this report has been quite a challenge for a number of
reasons.
Підготовка цього звіту була досить складною з ряду причин.
first use of
It also adhered to the principle of no first use of armed force.
Він також дотримувався принципу невикористання збройної сили вперше.
focused primarily on
Many reports focused primarily on practical measures implementing article 5.
Багато доповідей були зосереджені насамперед на практичних заходах щодо
виконання статті 5.
2)https://voca.ro/1bHNrFPx0Q34
· #330
Ivan Zaritskiy RZ-211 (Lebedeva) (Tuesday, 10 May 2022 10:18)
Different protection mechanisms.
Protection mechanisms are used to enforce layers of trust between security
levels of a system.
These protection mechanisms are used to protect processes and data and are
discussed in the following sections:
Layering
Abstraction
Data Hiding
Encryption
Layering
Most systems use a form of layering as a way to protect system resources. A
traditional kernel-based operating system, such as Unix, uses a two-layer
approach in which the system resources are managed in a protected kernel and
everything else runs in an outer layer known as the user's space.
Abstraction
Abstraction is a common term in the world of object-oriented design.
It is when data is managed as a collection called an object. Objects are usually
defined as classes that define the data and the methods that can be used to
access the object. Methods provide a predictable way to access the object's
data, which allows the entire data within the class to be managed as a unit that
can enforce access controls and integrity of the data.
Data Hiding
Sometimes access to data should not be provided—for example, data values within
an application module that are used for internal calculations.
In this case, no access methods are provided as an interface to this data. This
is called data hiding because the data is hidden and inaccessible from the other
layers.
Encryption
Cryptography is the science of creating algorithms used to encrypt data for the
storage or transmission of data.
Encryption uses those algorithms to convert data into an unintelligible form. In
basic terms, encryption uses a secret key, a private value, to perform a
mathematical function on the data to make it unusable by the casual observer.
· #329
Stanislav Kryvosheienko RT-211 (Popovych) (Tuesday, 10 May 2022 10:16)
Today I've read the article "In first, SpaceX launches recycled rocket and
spaceship (Update)". This article is about SpaceX has launched a rocket and a
cargo ship for the first time, a step forward in the company's goal of reducing
the cost of space travel. After the launch, the California-based company headed
by Internet tycoon Elon Musk landed its rocket booster upright on solid ground
at Cape Canaveral, Florida. The gleaming white Dragon spacecraft and Falcon 9
rocket soared into the blue sky over Florida at 10:36 am. The Dragon capsule was
flown to the ISS in 2015. The mission is SpaceX's 13th of 20 under a $1.6
billion contract with NASA.
Voice - https://voca.ro/1pwc1TqUQOSa
Article -
https://phys.org/news/2017-12-spacex-poised-recycled-rocket-spaceship.html
Phrases
1)first use of - It also adhered to the principle of no first use of armed
force.
Он также придерживался принципа неприменения вооруженной силы первым.
2)for a number of reasons - These problems have developed for a number of
reasons.
Эти проблемы возникли по ряду причин.
3)focused primarily on - It's a little bored but I focused primarily on content.
Это немного скучно, но я сосредоточился в первую очередь на содержании.
Voice - https://voca.ro/13a5eynDxgWv
· #328
Lebedeva E. (Tuesday, 10 May 2022 10:13)
To Dima Kozhushko RZ-211 The topic is written correctly, but pay attention to the pronunciation of the words " technique, characters". Keep on working.
· #327
Dima Kozhushko RZ-211(Lebedeva) (Tuesday, 10 May 2022)
Password as a general technique of secrecy
Today we can install password everywhere. On your smartphone, on social network
page, on bank account. Password reliably protects your information, but only if
you made it hard and unusual. If your password is too easy, hackers will easily
guess it using special password recovery software.
Password must be long, with different numbers, with small and capital letters
and other characters, the harder the better.
Also you must have different passwords for different needs. if you follow these
rules, your information will be under protection and your information will not
be stolen by hackers and online thieves.
Audio: https://voca.ro/19t5dh5BoYPW
Phrases:
1)first use of
Researchers document the first use of maize in Mesoamerica.
Дослідники задокументували перше використання кукурудзи в Мезоамериці.
2)for a number of reasons
The technology is novel for a number of reasons, one being that it has the
potential to provide new insight into the environmental factors
Ця технологія є новою з ряду причин, одна з яких полягає в тому, що вона може
надати нове уявлення про фактори навколишнього середовища.
3)focused primarily on
They focused primarily on the SolSmart Program, that encourages local
governments to adopt best practices to promote solar installation.
Вони зосередилися насамперед на програмі SolSmart, яка заохочує місцеві органи
влади впроваджувати передовий досвід для просування сонячних установок.
Audio: https://voca.ro/18qpecYGbpBF
· #326
Lebedeva E. (Tuesday, 10 May 2022 10:06)
To Dovzhenko Ilya RZ-211 Well done, thank you.
· #325
Artem Verhelis RT-211, Popovych E. (Tuesday, 10 May 2022 10:06)
Today I've read the article "US tech titans look to ditch passwords". It's about
decision of a few big companies to replace standard passwords with a more secure
way to access accounts or devices. The main reason why they want to do this is
the fact that a lot of people make overly simple passwords or using the same one
to make it easier to manage many accounts, so it makes easier for hackers to
stole personal data.
For
example, people already can
unlock their mobile phones with fingerprint or face recognition.
Support for password-free log-ins will be introduced into Android and Chrome
software over the course of the coming year, said Google product manager.
Audio: https://voca.ro/18fjHSwRYYYt
Article: https://techxplore.com/news/2022-05-tech-titans-ditch-passwords.html
1) first use of
Researchers document the first use of maize in Mesoamerica.
Дослідники задокументували перше використання кукурудзи в Мезоамериці.
2) focused primarily on
To date, research into the subject has focused primarily on women who already
have children.
На сьогоднішній день дослідження з цієї теми зосереджені в основному на жінках,
які вже мають дітей.
3) for a number of reasons
These cost disparities likely arise for a number of reasons, the study authors
said.
Розбіжності у витратах, ймовірно, виникають із кількох причин, кажуть автори
дослідження.
Audio: https://voca.ro/13Mcc6fnMraS
· #324
Lebedeva E. (Tuesday, 10 May 2022 10:05)
To Denis Zavadskik The topic "Principles of information protection" is written correctly, but there is no audio recording. Keep on working.
· #323
Lebedeva E. (Tuesday, 10 May 2022 10:02)
To Mykola Zhmurak RZ-211 The topic is written correctly. Unfortunately there are some mispronounced words in your voice recording
· #322
Gvozd to RZ-211 (Tuesday, 10 May 2022 10:02)
Beskrovnyi Vladimir RZ-211
Botasniuk Ivan RZ-211
Thank you, all your tasks are well done.
I
appreciate them.
· #321
Sergey Kyznyak RT-211, Popovych E. (Tuesday, 10 May 2022 09:55)
Exam #6
It is generally recognized that the first radio transmission was made from a
temporary station set up by Guglielmo Marconi in 1895 on the Isle of Wight. This
followed on from pioneering work in the field by a number of people. Radio
transmission of music and talk must have begun around 1905–1906, and
commercially around 1920–1923. VHF stations (very high frequencies) were
launched 30–35 years later. By the 1950s, virtually every country had a
broadcasting system, usually owned and operated by the government. A dramatic
change came in the 1960s with the advent of small, inexpensive, portable
transistor radios, which increased the possibilities of ownership and use. It's
very exciting to learn how radio went through its journey to its peak of
communication work
· #320
Sergey Kyznyak RT-211, Popovych E. (Tuesday, 10 May 2022 09:53)
(Article)
Today I have read the article 'Combining AI and computational science for
better, faster, energy efficient predictions'.
The
article tells about the new technology "intelligent alloys", the main purpose of
which is combining the power of computational science with artificial
intelligence to develop models that complement simulations to predict the
evolution of science's most complex systems.
By using this technology, the researchers demonstrated that they can generate
predictions thousands to a million times faster than it would take to run the
simulations with full resolution or rely on partial or even faulty information
through models. I think this technology has a huge future that is coming right
now.
1)expected value
Either the present value or a future expected value should be used.
Следует использовать либо нынешнее значение, либо будущие ожидаемые значения.
2)technology capability
At least the exponential growth of information technology capability will
continue unabated.
По крайней мере, возможности информационных технологий будут расти, не
ослабевая, с экспоненциальной скоростью.
3)work schedule
Consequently, the Court may wish not to overstretch its work schedule in the
field at any given time.
Соответственно, Суд, возможно, пожелает сделать более напряженным свой график
работы на местах в любой заданный период времени.
Vocaroo(article): https://voca.ro/1iVdA1qr4K25
Vocaroo(sentences): https://voca.ro/130pnPRxsJji
https://techxplore.com/news/2022-04-combining-ai-science-faster-energy.html
· #319
Artem Verhelis RT-211, Popovych E. (Tuesday, 10 May 2022 09:48)
Exam topic #6
The new advancement of color Television.
Attempts to transmit a color image began at the same time with the advent of
mechanical television.
The world's first color television broadcast was in July 3, 1928 in Glasgow, and
was carried out by one of the founders of mechanical television, John Baird.
A revolution in the development of color television happened after the end of
World War II. In May 1969, during the flight of Apollo 10, astronauts Tom
Stafford, John Young and Eugene Cernan used a special television camera in space
for the first time and for the first time conducted a color television broadcast
from space.
Audio: https://voca.ro/15S3QztN2h5r
· #318
Sasha Movsum-Zade RT-211 (Popovych E.) (Tuesday, 10 May 2022 09:42)
Today I have read the article titled "If your phone, car or home alarm relies on
3G, you need to prepare for a shutdown". This article explains that mobile phone
companies' 5G networks bring more speed and innovation to consumers, but there
is at least one trade-off: to open up the air to 5G, companies shut down old
networks that many devices and services still use. It also describes how these
old 3G networks were hailed as a revolutionary achievement in bandwidth and
connectivity when they debuted in the United States in 2002. phones and many
other devices.
https://techxplore.com/news/2022-02-car-home-alarm-3g-shutdown.html
https://voca.ro/1biZeAzp83z1
bear in mind
These are important considerations which we should always bear in mind.
Це важливі міркування, які ми завжди повинні мати на увазі.
examined in detail
We believe that all issues within the Working Group's mandate should be examined
in detail.
Ми вважаємо, що всі питання, що входять до мандата Робочої групи, мають бути
детально розглянуті.
expanded upon
The workshop topics are expanded upon in the discussion guide, which is to
supplement the present annotations.
Теми семінару розширені в посібнику для обговорення, який має доповнити наявні
анотації.
https://voca.ro/1dXHiuXsYu5y
· #317
Mykola Zhmurak RZ-211(Lebedeva) (Tuesday, 10 May 2022 09:42)
Hardware firewall
Hardware firewalls rely on hardware to perform packet filtering. The major
advantages of a hardware firewall are increased bandwidth and reduced latency.
Note that bandwidth is the number of packets a firewall can process per unit of
time, and latency is the amount of time require to process a packet. Hardware
firewalls can operate at faster bandwidths, which translates to more packets per
second (10 Gbps is easily achieved). In addition, hardware firewalls can operate
faster since processing is performed in dedicated hardware. The firewall
operates almost at wireline speeds; therefore, very little delay is added to
accepted packets. This is important since more applications, such as multimedia,
need QoS for their operation. The disadvantage is that upgrading the firewall
may require replacement of hardware, which can be more expensive.
Vocaroo - https://voca.ro/14rR1RhyJavN
Phrases:
1) first use of
First use of microscopic sound waves to study cell abnormalities.(Перше
використання мікроскопічних звукових хвиль для вивчення аномалій клітин.)
2) focused primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation.(Вони
зосередилися насамперед на програмі SolSmart, VEP, яка заохочує місцеві органи
влади впроваджувати найкращі практики для просування сонячних установок.)
3) for a number of reasons
"MDS is more efficient than traditional separation techniques for a number of
reasons".(«MDS є більш ефективним, ніж традиційні методи поділу з ряду причин».)
Vocaroo - https://voca.ro/14HZ9SVWaSxY
· #316
Botasniuk Ivan RZ-211 (Gvozd O.V) (Tuesday, 10 May 2022 09:42)
Exam topic #13. Authentication mechanisms
Authentication mechanisms are modules that authenticate the user with a specific
challenge or authentication technology, such as user name and password and
one-time password. There are five most popular authentication mechanisms:
1)Passwords. A password is a shared secret known by the user and presented to
the server to authenticate the user.
2)Hard Tokens. These are small hardware devices that the owner carries to
authorize access to a network service. The device may be in the form of a smart
card, or it may be embedded in an easily-carried object such as a key fob or USB
drive.
3)Soft tokens. These software-based security token applications typically run on
a smartphone and generate an OTP for signing on.
4)Biometric Authentication. Biometric authentication methods include retina,
iris, fingerprint and finger vein scans, facial and voice recognition, and hand
or even earlobe geometry.
5)Device Identification. A specific noteworthy example of contextual
authentication is for the authentication server to be able to recognize a
particular device over repeated interactions.
https://voca.ro/1aafigVD9z0H
Comment
Today I have read the article “Framework to describe individual machine-learning
model decisions”. Modern machine-learning models are so complex that even the
researchers who design them can't fully understand how they make predictions.
So, researchers created a mathematical framework to formally quantify and
evaluate the understandability of explanations for machine-learning models. This
can help pinpoint insights about model behavior that might be missed if the
researcher is only evaluating a handful of individual explanations to try to
understand the entire model. In my opinion, this will help researchers work with
artificial intelligence easier and more productively.
https://techxplore.com/news/2022-05-framework-individual-machine-learning-decisions.html
https://voca.ro/1fGEYEbahPNK
focused primarily on
Operations management is focused primarily on the application of technology in
manufacturing. (Операційний менеджмент орієнтований насамперед на застосування
технологій у виробництві.)
first use of
The first use of paper was in China in the 2nd Century BC, and it wasn't widely
used by Europeans until centuries later. (Перше використання паперу було в Китаї
у 2 столітті до нашої ери, а європейці широко почали використовувати його лише
кілька століть по тому.)
for a number of reasons
These problems have developed for a number of reasons. (Ці проблеми виникли з
ряду причин.)
https://voca.ro/1mYRNcjQgGve
· #315
Beskrovnyi Vladimir RZ-211 (Gvozd O.V) (Tuesday, 10 May 2022 09:42)
1.
Today I have read the article 'US tech titans look to ditch passwords'.
Present tech and IT titans, such as Apple, Google and Microsoft, are currently
working for a way to get rid of passwords and replace them with a more secure
way to access accounts or devices. Reliance on passwords alone is decried as a
major security flaw on the internet, with people keeping them overly simple or
using the same one repeatedly to make it easier to manage many accounts. Because
of this, eliminating passwords was billed as more secure than two-factor
authentication that involves getting one-time passcodes texted or emailed as
secondary confirmation when logging into sites or services.
I think this is a very good and right decision, as the old-fashioned way of
security becoming less and less effective nowadays.
2. https://techxplore.com/news/2022-05-tech-titans-ditch-passwords.html
3. https://voca.ro/155cP45IBdJf
4. 1) focused primarily on
Government health experts also focused primarily on partner reduction
2) first use of
The first use of harebrained dates to 1548
3) for a number of reasons
The explanation of the difference is important for a number of reasons.
5. https://voca.ro/1efHWHc4jBlt
Exam topic #4: Information protection systems
Information security protects sensitive information from unauthorized
activities, including inspection, modification, recording, and any disruption or
destruction. The goal is to ensure the safety and privacy of critical data such
as customer account details, financial data or intellectual property.
Organizations must allocate funds for security and ensure that they are ready to
detect, respond to, and proactively prevent, attacks such as phishing, malware,
viruses, malicious insiders, and ransomware.
· #314
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 10 May 2022 09:40)
Class-work
Today I've read the article 'Developing a better ionic skin'. Artificial leather
has recently been created from biocompatible hydrogels. Hydrogel sensors contain
salts with positive and negative ions of different sizes and when pressure is
applied to the sensor, the ions begin to move at different speeds and this
creates an electrical signal. As a result, this skin responds to the stimulus
almost as well as ours. Hydrogels also have elasticity and softness of genuine
leather. I think this is a very important development because using it in the
manufacture of prostheses will make them more comfortable to wear.
Audio1:https://voca.ro/1O9h0E1Fks3z
Article:https://techxplore.com/news/2022-04-ionic-skin.html
Phrases
1) first use of
The album marked the band's first use of guitar synthesizers.
На цьому альбомі гурт вперше застосував гітарні синтезатори.
2) focused primarily on
The evaluation focused primarily on issues of relevance and effectiveness and
also addressed issues of efficiency and sustainability.
Оцінка була зосереджена насамперед на питаннях актуальності та ефективності, а
також розглядалися питання ефективності та сталості.
3) for a number of reasons
The preparation of this report has been quite a challenge for a number of
reasons.
Підготовка цього звіту була досить складною з ряду причин.
Audio2:https://voca.ro/18CefBgbNgXs
· #313
Denis Zavadskik Lebedeva RZ-211 (Tuesday, 10 May 2022 09:40)
Principles of information protection.
Information in our time is more expensive than any resources, since it can lead
to them, which is why there is a huge demand for information on any occasion.
Where there is demand, there are thieves, and therefore information must be
protected. You can protect it with a fairly large variation of methods, the main
one being encryption. It also has a lot of possibilities of application and
reproduction methods, because it was created back in very ancient times, for
example, the texts of the authors were written looking in the mirror, and
perhaps on an inverted notebook, so that it was impossible to just take and read
the contents. Now there are more modern ways to classify information in this
way.
· #312
Dovzhenko Ilya RZ-211 (Lebedeva) (Tuesday, 10 May 2022 09:40)
Exam topic #8 "Passwords and their drawbacks."
Password is the main method of protecting the account, but it has disadvantages.
I'll tell you about some of them.
To try and make passwords more secure, consumers are asked to make them more
complex, by using numbers, uppercase letters, lowercase letters and special
characters. This makes them hard to remember. And if people can’t remember them,
they write them down or use the same password on multiple websites…which makes
them less secure.
Passwords can be shared, guessed or stolen, which means they aren’t secure. Over
50% of young people admit that they share their log-in details with friends, and
59% of respondents admitted to reusing the same passwords across multiple sites.
https://voca.ro/17BErs6wFLai
1)first use of
Many legends have been documented surrounding the first use of coffee.
Існує багато легенд навколо першого використання кави.
2)for a number of reasons
The player could not fully Express themselves in the German League for a number
of reasons.
Футболіст не зміг повноцінно проявити себе в німецькому чемпіонаті з ряду
причин.
3)focused primarily on
Its platform was focused primarily on copyright reform and freedom from Internet
censorship.
Його платформа була орієнтована в першу чергу на реформи авторського права і
свободу від цензури в Інтернеті.
https://voca.ro/12f8dE2EoYek
· #311
Lebedeva E. (Tuesday, 10 May 2022 09:30)
To Mykola Zhmurak RZ-211, Kuleshov Konstantin(RZ-211), Ilinchuk Vladislav RZ-211, Ivan Zaritskiy RZ-211 , Kapeliushnyi Vladyslav (RZ-211), Daniil Dragin (RZ-211 ) Thank you for your comments and exam topics. In general, they are good.
· #310
Vasilev A.O RZ-211 Gvozd O.V. (Tuesday, 10 May 2022 09:29)
Today I've read an article called 'NASA shows upper-level westerly winds
affecting Tropical Storm Fred'.The article is about changes in weather. Much
attention is given to the effect of upper-level winds on a tropical storm.
NASA's aqua satellite imagery showed the highest thunderstorms southeast of the
storm's center. AIRS data also showed some of the highest, coldest, strongest
thunderstorms with the temperature of the top of the clouds over storm Fred.
Then this cyclone is encountering strong upper-level winds, so weakening is
forecast.
In my opinion this information is useful because it is especially difficult to
predict weather changes. And everyone wants to know what the weather will be
like tomorrow.
https://voca.ro/1cMgHws54pwi
https://phys.org/news/2015-09-nasa-upper-level-westerly-affecting-tropical.html
Exam topic #20 ( Principles of information protection)
The three core principles of information security are called the CIA triad. Data
protection risks are calculated based on likelihood and impacts on each of these
three core IT security principles.
The main components of data security are:
Confidentiality
Integrity
Availability
The purpose of Confidentiality is to protect the data from unauthorised access.
It is possible by implementing access restrictions to allow access to authorised
entities only.
Integrity means preserving the accuracy and completeness of data. This element
ensures that data has not been tampered with and can be trusted. Data security
is sometimes confused with data integrity. It deals with the protection of data,
whereas data integrity deals with trustworthiness.
This refers to the availability of data when authorized users require this data.
Devices, systems, applications, data are of little value to any organization if
their customers can’t access it when they need it. Denial of Service attacks
prevention is an example of ensuring data availability.
https://voca.ro/1nYJ4E9FLnfg
1) for a number of reasons
Funds are often available but not accessible for a number of reasons
2)first use of
It also adhered to the principle of no first use of armed force
3)focused primarily on
It's a little amber but I focused primarily on content
https://voca.ro/1kmroQGoSX69
· #309
Timophey Sipin RZ-212(Popovych) (Tuesday, 10 May 2022 09:28)
Today l have read the article titled «Viewpoint -- Give Yourself Some "Wiggle
Room" to Drive Innovation and Change».Text tells us about the nessesary for
people to change and improve themselves (talking about improvements in
technology),but at the same time people are not ready to make changes in their
lives. The article explains to us away out of this situation,the so-called
golden mean, in which we will have practically no risks and we will be able to
observe the success and progress in technology. In my opinion, this article
helps us to correctly assess risks and motivates us to innovate and progress.
https://voca.ro/1f7tDhl2LXQ6
https://www.industryweek.com/leadership/companies-executives/article/21952121/viewpoint-give-yourself-some-wiggle-room-to-drive-innovation-and-change
1.for a number of reasons
I chose it for a number of reasons, Stephen.
Я вибрав його з кількох причин, Стівене.
2.first use of
This problem is solved by diligent re-treatment of the head a week after the
first use of the drug.
Цю проблему вирішує старанна повторна обробка голови через тиждень після першого
застосування препарату.
3.focused primarily on
It's a little amber but I focused primarily on content.
Це трохи бурштиновий, але я зосередився насамперед на змісті.
https://voca.ro/1hsqPLC
· #308
Misha Donenko RZ-211 Lebedeva (Tuesday, 10 May 2022 09:26)
An
isolated virtual machine
Nowadays, there are many sites and blogs that detail everything about virtual
machines, and some of them have even been tested, and clearly described how to
configure them. A virtual machine is a separate virtual machine on which you can
install operating systems, programs, drivers, and more. We have already learned
about some ways to use a virtual machine from its definition. Thanks to a
virtual machine on your real computer, you can run several more virtual
computers with the same or a different operating system. At the same time, you
can easily exchange data between your real and virtual computer. We also note
that the virtual machine is primarily a platform for testing programs. Among
which, as you know, can be harmful. Another virtual machine is used by hackers
to test their own and other people's Trojans, rat programs and other miracle
files.
At the same time, virtual machines are used for various purposes and tasks:
- Common installation on the computer of several operating systems;
- Software testing;
- Safe launch of suspicious programs;
- Emulation of a computer network;
- Launch applications that cannot be run from your operating system.
https://voca.ro/1iJ3jrrmkHYZ
1.for a number of reasons
I chose it for a number of reasons, Stephen.
Я вибрав його з кількох причин, Стівене.
2.first use of
This problem is solved by diligent re-treatment of the head a week after
the first use of the drug.
Цю проблему вирішує старанна повторна обробка голови через тиждень після першого
застосування препарату.
3.focused primarily on
It's a little amber but I focused primarily on content.
Це трохи бурштиновий, але я зосередився насамперед на змісті.
https://voca.ro/1hsqPLCHxC5A
· #307
Mykola Zhmurak RZ-211(Lebedeva) (Tuesday, 10 May 2022 09:23)
Today i have read the article titled "What the metaverse is and how it will
work". This article is about a "virtual environment". Think of it as the
internet brought to life, or at least rendered in 3D. Essentially, it's a world
of endless, interconnected virtual communities where people can meet, work and
play, using virtual reality headsets, augmented reality glasses, smartphone apps
or other devices. This is really valuable invention, it's the next evolution of
connectivity where all of those things start to come together in a seamless,
doppelganger universe.
Article - https://techxplore.com/news/2021-10-metaverse.html
Vocaroo - https://voca.ro/1efcqrUeIe6T
Phrases :
1) first use of
First use of microscopic sound waves to study cell abnormalities.(Перше
використання мікроскопічних звукових хвиль для вивчення аномалій клітин.)
2) focused primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation.(Вони
зосередилися насамперед на програмі SolSmart, VEP, яка заохочує місцеві органи
влади впроваджувати найкращі практики для просування сонячних установок.)
3) for a number of reasons
"MDS is more efficient than traditional separation techniques for a number of
reasons".(«MDS є більш ефективним, ніж традиційні методи поділу з ряду причин».)
Vocaroo - https://voca.ro/14HZ9SVWaSxY
· #306
Gvozd to Vlasov Vadim RZ-211 (Tuesday, 10 May 2022 09:20)
Thank you, your task is not bad, keep on working.
· #305
Kuleshov Konstantin(RZ-211)(Lebedeva) (Tuesday, 10 May 2022 09:18)
Principles of information protection№20
Information security (sometimes referred to as InfoSec) covers the tools and
processes that organizations use to protect information. This includes policy
settings that prevent unauthorized people from accessing business or personal
information. InfoSec is a growing and evolving field that covers a wide range of
fields, from network and infrastructure security to testing and
auditing.Information security protects sensitive information from unauthorized
activities, including inspection, modification, recording, and any disruption or
destruction.
3 Principles of Information Security:
1.Confidentiality
2.Integrity
3.Availability
An Information Security Policy (ISP) is a set of rules that guide individuals
when using IT assets. Companies can create information security policies to
ensure that employees and other users follow security protocols and procedures.
Security policies are intended to ensure that only authorized users can access
sensitive systems and information.
1.The "Alpha" version was an experiment that focused primarily on the
French-speaking blogosphere.
2.These problems have developed for a number of reasons.
3.It also adhered to the principle of no first use of armed force
https://voca.ro/145hJohSOROa
· #304
Ilinchuk Vladislav RZ-211(Lebedeva) (Tuesday, 10 May 2022 09:17)
Today I have read the article "Newly discovered lake may hold secret to
Antarctic ice sheet's rise and fall".This article is about the new open lake
Snow Eagle,lies a few hundred miles inland, under the same ice sheet. Scientists
investigating the underside of the world's largest ice sheet in East Antarctica
have discovered a city-size lake whose sediments might contain a history of the
ice sheet . This lake is likely to have a record of the entire history of the
East Antarctic Ice Sheet, its initiation over 34 million years ago, as well as
its growth and evolution across glacial cycles since then.
In my opinion , this article is very interesting for everyone , especially for
people who love new information and new technologies . I think this will become
very useful soon .
1)https://phys.org/news/2022-05-newly-lake-secret-antarctic-ice.html
2)https://voca.ro/11YGd9gdfCw3
for a number of reasons
The preparation of this report has been quite a challenge for a number of
reasons.
Підготовка цього звіту була досить складною з ряду причин.
first use of
It also adhered to the principle of no first use of armed force.
Він також дотримувався принципу невикористання збройної сили вперше.
focused primarily on
Many reports focused primarily on practical measures implementing article 5.
Багато доповідей були зосереджені насамперед на практичних заходах щодо
виконання статті 5.
3)https://voca.ro/1bHNrFPx0Q34
· #303
Vlasov Vadim RZ-211 (Gvozd O.V) (Tuesday, 10 May 2022 09:16)
Today i have read the article: "The biggest data breaches, hacks of 2021"
From the article we learn about the problem of data leakage in our time.
Nowadays, most people neglect their online security, which is why they often
suffer from malware.
In 2021, a type of ransomware spread, due to which a lot of people lost their
data. And also many popular sites were hacked and leaked user data.
In my opinion, such hacks most often occur due to the weak protection that users
choose, or because of its absence.
https://www.zdnet.com/article/the-biggest-data-breaches-of-2021/
https://voca.ro/1jzB6B7aKHec
first use of
First use of microscopic sound waves to study cell abnormalities
Перше використання мікроскопічних звукових хвиль для вивчення аномалій клітин
focused primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation
Вони зосередилися насамперед на програмі SolSmart, VEP, яка заохочує місцеві
органи влади впроваджувати найкращі практики для просування сонячних установок.
for a number of reasons.
The technology is novel for a number of reasons
Технологія нова з кількох причин
https://voca.ro/1jDdFafpblQu
Exam topic #14 ("Authority check”)
Nowadays authority check is everywhere. Sites use this way of protection to
avoid situations when someone is pretending someone else. There are a lot of way
to identify the person and save the data. The most common are password,
fingerprint, face id or even personal documents. By protecting your authority a
hundred of villains cant hack you, steal important information, change something
on your profile etc. This is very important and effective way to protect
everything and its even impossible to avoid it in routine life.
https://voca.ro/1dsNDMrsOiwX
· #302
Roman Gavrilenko RZ-211 (Vorobyova) (Tuesday, 10 May 2022 09:15)
1)"The vaccine is not spreading as quickly as any of us expected, and new
international travel restrictions requiring customers to test negative for
Covid-19 have reduced demand."
Said in a letter from CEO Doug Parker and President Robert Isom
American no longer expects to reach full capacity this summer, they said.
The Americans laid off 19,000 workers in October after the expiration of the
previous round of federal support, but brought back the workers.
In a letter to employees, the airline said the airline expects to fly at least
45% less in the first quarter, extending the industry's downturn as travel
recovery expectations are delayed due to the slow rollout of coronavirus
vaccines.
Due to the coronavirus, flights have been reduced so as not to spread the virus
to other countries and the planet itself. In order to avoid this, the management
of the airport issued a decree that at least 45% of flights would operate. They
will also maintain the stability of the reception of passengers, when the
vaccine is released, they will resume all flights.
2) https://techxplore.com/news/2021-02-american-airlines-layoffs.html
3) https://voca.ro/11RLFm8Qjprc
4) first quarter
In the first quarter of 2020, the Ministry of Education and Science issued a
decree to close all enterprises for quarantine.
worker
During this period, any worker must stay at home.
early retirement
In some countries, older people were forced into early retirement.
5) https://voca.ro/19VCZ36Fm1RW
· #301
Ivan Zaritskiy RZ-211 (Lebedeva) (Tuesday, 10 May 2022 09:05)
Today I read the article “Researchers now able to predict battery lifetimes with
machine learning”. This article is about a new method of predicting battery
lifetime. Researchers at the U.S. Department of Energy's (DOE) Argonne National
Laboratory have turned to the power of machine learning to predict the lifetimes
of a wide range of different battery chemistries. By using experimental data
gathered at Argonne from a set of 300 batteries representing six different
battery chemistries, the scientists can accurately determine just how long
different batteries will continue to cycle. In my opinion, that’s a piece of
great news, because now developers of batteries for different sorts of items can
increase or decrease the lifetime of their product and reduce the price tags of
it.
https://techxplore.com/news/2022-05-battery-lifetimes-machine.html
https://voca.ro/1id983hx86KG
focused primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation. (Вони
зосередилися насамперед на програмі SolSmart, програмі VEP, яка заохочує місцеві
органи влади впроваджувати найкращі практики для просування сонячних установок.)
for a number of reasons
The technology is novel for a number of reasons, one being that it has the
potential to provide new insight into the environmental factors that have
significant impacts on air pollution levels.(Ця технологія є новою з ряду
причин, одна з яких полягає в тому, що вона може дати нове уявлення про фактори
навколишнього середовища, які мають значний вплив на рівень забруднення
повітря.)
first use of
Researchers document the first use of maize in Mesoamerica.(Дослідники
задокументували перше використання кукурудзи в Мезоамериці.)
https://voca.ro/1hUpnGETEgQR
· #300
S.Mykhailiuk (Tuesday, 10 May 2022 08:58)
To Chmel Maksim RF-211 Task1 is lengthy. Just 74 points and Task2 has to be done according to the pattern : a phrase itself with the translation and then a sentence either the phrase usage. Just 74 points.
· #299
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Tuesday, 10 May 2022)
Exam topic #5
Information protection is a set of methods and means that ensure the integrity,
confidentiality and accessibility of information under the influence of threats
of a natural or artificial nature.
The basics of information protection include:
Technical protection - provides restriction of access to the message carrier by
hardware and technical means.
Engineering protection - prevents the destruction of the media due to
intentional actions or natural influences by engineering and technical means.
Cryptographic protection - prevents access by mathematical transformations of
the message.
Organizational protection - prevention of access to the object of information
activities of third parties through organizational measures.
https://voca.ro/14ZahMqZ4dlY
1) Canada has focused primarily on increasing the bandwidth of an optical
quantum memory.
Канада зосередилася в основному на збільшенні пропускної здатності оптичної
квантової пам'яті.
2) Researchers document the first use of maize in Mesoamerica.
Дослідники задокументували перше використання кукурудзи в Мезоамериці.
3) It could be used for a number of analysis, criminal investigations or
employment screening.
Його можна використовувати для ряду аналізів, кримінальних розслідувань або
перевірки зайнятості.
https://voca.ro/12wtMoV6eKB6
· #298
Badyuk Eduard RZ-212 (Popovych.E) (Tuesday, 10 May 2022 08:53)
Today I have read the article "Accumulated heat in the upper ocean is at record
levels again". At the moment, the world's oceans are hotter than ever and have
been breaking temperature records for the 6th year in a row. Kevin Trenbert, an
eminent scientist at the National Center for Atmospheric Research in Colorado,
said that the world's oceans are getting warmer every year, which is the main
indicator of anthropogenic climate change.
The researchers also found that in 2020, the top 2,000 meters of all oceans
absorbed 145 times more energy than humanity produced in 2020. Simply put, every
year the carelessness of man and his indifference towards nature, due to its
benefits, worsens the state of the world around us more and more, and the first
and most noticeable doom bringer is the ocean.
I believe that humanity needs to start taking some significant measures as soon
as possible in order to start correcting the situation, because at such a pace,
global warming, which we hear about more and more every year, will come much
faster than we think and then humanity will feel the full wrath of nature.
https://phys.org/news/2022-01-accumulated-upper-ocean.html
https://voca.ro/17YsSwZR1RzH
1) focused primarily on
Clearance was focused primarily on Battle Area Clearance.
Очистка була зосереджена насамперед на очищенні зони бою.
2) first use of
This problem is solved by diligent re-treatment of the head a week after the
first use of the drug.
Цю проблему вирішує старанна повторна обробка голови через тиждень після першого
застосування препарату.
3) for a number of reasons
Funds are often available but not accessible for a number of reasons.
Кошти часто доступні, але недоступні з ряду причин.
https://voca.ro/1hdm2EYLjIRW
· #297
Daniil Dragin (RZ-211 Lebedeva E) (Tuesday, 10 May 2022 08:52)
The
Essentials of Information Protection №16
Information protection is a set of methods and means that ensure the integrity,
confidentiality and accessibility of information under the influence of threats
of natural or artificial nature, the implementation of which may harm the owners
and users of information. Information protection is conducted to maintain such
properties of information as:
-integrity;
-privacy;
-accessibility;
Types of information protection:
Technical - provides restriction of access to the message carrier by hardware
and technical means:
-prevention of leakage through technical channels;
-blocking prevention;
Engineering - prevents the destruction of the media due to intentional actions
or natural influences by engineering and technical means.
Cryptographic - prevents access by means of mathematical transformations of the
message (SP):
prevention of unauthorized modification;
emergency warning disclosure.
Organizational - prevention of access to the object of information activities of
third parties through organizational measures
https://voca.ro/1d9FebJn1d5f
1)first use of
Researchers document the first use of maize in Mesoamerica
Дослідники задокументували перше використання кукурудзи в Мезоамериці
2)for a number of reasons
People in many industries treat 3d printing as a key topic of interest both in
techniques and printing materials for a number of reasons
Люди в багатьох галузях розглядають 3D-друк як ключову тему, яка цікавить як
техніки, так і друкарських матеріалів з ряду причин.
3)focused primarily on
To date, research into the subject has focused primarily on women who already
have children.
На сьогоднішній день дослідження з цієї теми зосереджені переважно на жінках,
які вже мають дітей.
https://voca.ro/12zka4Xr2hID
· #296
Lebedeva E. (Tuesday, 10 May 2022 08:50)
To RZ-211 Good morning! The lesson has started and I am waiting for your exam topics and work with phrases of the day.
· #295
Khotynskiy Oleg (RZ-212, S.Mykhailiuk) (Tuesday, 10 May 2022 08:49)
I'm sorry, the last message was addressed to S. Mykhailuk
· #294
Khotynskiy Oleg RZ-212 (Popovych E.) (Tuesday, 10 May 2022 08:48)
Today I have read the article "Why the electric vehicle revolution will bring
problems of its own". As we know, in recent years, more and more people have
begun to protest against the use and production of ordinary cars that can only
be driven by using gasoline. Many environmental activists are urging people to
switch to electric vehicles, but few people know that the mass use of electric
vehicles can also lead to problems.
First, the cells used in the production of batteries are finite and their number
is limited. Also, the appearance of electric vehicles will not be able to solve
the problem of sedentary population, and with an increase in the number of
electric vehicles on the roads, traffic jams will become even more frequent and
unbearable.
As for me, the main advantage of electric vehicles - the rejection of the use of
internal combustion engines will cover all these minor disadvantages.
https://phys.org/news/2018-04-electric-vehicle-revolution-problems.html
https://voca.ro/1l13BXodgHjH
1) first use of
First use of microscopic sound waves to study cell abnormalities
Перше використання мікроскопічних звукових хвиль для вивчення аномалій клітин
2) focused primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation.
Вони зосередилися насамперед на програмі SolSmart, VEP, яка заохочує місцеві
органи влади впроваджувати найкращі практики для просування сонячних установок.
3) for a number of reasons
The technology is novel for a number of reasons, one being that it has the
potential to provide new insight into the environmental factors that have
significant impacts on air pollution levels.
Ця технологія є новою з ряду причин, одна з яких полягає в тому, що вона може
дати нове уявлення про фактори навколишнього середовища, які мають значний вплив
на рівень забруднення повітря.
https://voca.ro/1kI9xs9GWnwQ
· #293
Gvozd O.V. to RZ-211 (Tuesday, 10 May 2022 08:41)
Good day!
The lesson will start soon, so I am waiting for your comments, sentences with
Phrases and audio recordings. Don't forget to write your Independent practice
and add the exam topic. Please, do it in one comment.
· #292
Mashovets Andrey (RZ 212, Popovich) (Tuesday, 10 May 2022 08:35)
Today I’ve read the article “Study finds local voluntary programs are effective
in promoting green energy'”.
This article is about the introduction of new programmes by the State that
encourage the voluntary use of solar panels .
The purpose of this article is to tell about the new program of encouragement
for the use of solar panels by citizens.
Programs encouraging voluntary solar energy use at the local level are effective
in spurring the adoption of solar power, a Florida State University researcher
has found.
I believe that this article will be useful for overall development and for those
who live in the country where these programs are created.
https://voca.ro/17vYSAdKbiRG
https://techxplore.com/news/2022-04-chinese-hackers-reportedly-india-power.html
1.first use of
First use of microscopic sound waves to study cell abnormalities
2.for a number of reasons
The technology is novel for a number of reasons, one being that it has the
potential to provide new insight into the environmental factors that have
significant impacts on air pollution levels.
3.focused primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation.
https://voca.ro/1i4Nx6qVVtW7
· #291
Lebedeva E. (Tuesday, 10 May 2022 08:28)
To Gromovaya Vlada (RF-211) and Maksim Teliga (RF-211) Well done, thank you.
· #290
Lebedeva E. (Tuesday, 10 May 2022 08:26)
To Rosinskiy Kyrylo RF-211, Mashegirov Eugene (RF-211), Gridnev Dmytro RF-211, Your exam topics are quite good as well as the work with phrases.
· #289
Chmel Maksim RF-211( S. Mykhailiuk) (Tuesday, 10 May 2022 08:25)
Today I have read an article about OC.
The operating system provides interaction between the user, programs, and
computer hardware.
The operating system communicates with the hardware using device drivers. A
driver is a piece of software, usually written by a hardware manufacturer, that
allows the operating system to communicate with the device.
For the user, the OS provides a user interface. In DOS, the entire interface was
on the command line. In Windows, the concept of an interface is much broader -
it includes a graphical shell, and standard dialogs, for example, open or save a
file, and a number of other things that are sometimes not quite obvious to the
user.
For programs, the OS provides user interface elements. In addition, if we are
talking about a multitasking system, then its competence includes the
distribution of computer resources between programs. In this case, resources
should be understood primarily as processor time - the OS must ensure that none
of the programs monopolizes all resources and does not conflict with other
running applications.
Also in charge of any operating system is the maintenance of the file system. By
the way, in the days of DOS, this was its main task, which was reflected in the
name.
In addition, the OS includes various auxiliary programs for setting up and
maintaining a PC - system utilities. In particular, these are programs for
fixing disk errors.
https://voca.ro/1oDwhBdRfBMR
1)The album marked the band's first use of guitar synthesizers.
На цьому альбомі гурт вперше застосував гітарні синтезатори.
2)The preparation of this report has been quite a challenge for a number of
reasons.
Підготовка цієї доповіді була складним завданням з низки причин.
3)The evaluation focused primarily on issues of relevance and effectiveness and
also addressed issues of efficiency and sustainability.
У ході оцінки основна увага приділялася питанням актуальності та ефективності, а
також дієвості та стійкості.
https://voca.ro/1icrJ3M2Bv0e
· #288
Gromovaya Vlada (RF-211) (Lebedeva E.V.) (Tuesday, 10 May 2022 08:23)
Exam topic #15 (What is the difference between CLI ands GUI?)
The notable difference is that GUI users depend on graphical elements such as
icons, menus, and windows to interact with the operating system. CLI relies more
on text inputs to perform the operating system functions. GUI stands out being a
user-friendly option, while CLI is more powerful and advanced.
The main difference between the Graphical User Interface (GUI) and the Command
Line Interface (CLI) is visualization. Visualization is the use of images,
animations, or diagrams, to aid interaction between systems or represent
information. With the CLI, you are only able to interact with the computer
through text-based commands. But with the GUI, almost all visuals are clickable
and easy to interact with.
Audio: https://voca.ro/1fer2g1BKnuB
Phrases of the day:
1) To date, research into the subject has focused primarily on women who already
have children.
1) На сьогоднішній день дослідження з цієї теми зосереджені переважно на жінках,
які вже мають дітей.
2) There are a number of other technical reasons why shortwave radio can be very
useful in crisis situations.
2) Існує ряд інших технічних причин, чому короткохвильове радіо може бути дуже
корисним у кризових ситуаціях.
3) It is believed to be the first use of ion implantation to improve the
performance of an intercalation pseudocapacitor.
3) Вважається, що це перше використання іонної імплантації для покращення
продуктивності інтеркаляційного псевдоконденсатора.
Audio: https://voca.ro/1apm7kPc5T2k
· #287
Maksim Teliga (RF-211) (Lebedeva.E) (Tuesday, 10 May 2022 08:22)
Trusted operating system
Trusted Operating System (TOS) generally refers to an operating system that
provides sufficient support for multilevel security and evidence of correctness
to meet a particular set of government requirements.
The most common set of criteria for trusted operating system design is the
Common Criteria combined with the Security Functional Requirements (SFRs) for
Labeled Security Protection Profile (LSPP) and mandatory access control (MAC).
The Common Criteria is the result of a multi-year effort by the governments of
the U.S., Canada, United Kingdom, France, Germany, the Netherlands and other
countries[1] to develop a harmonized security criteria for IT products.
Audio: https://voca.ro/1hl4ZJcnKWjv
Article: https://csrc.nist.gov/glossary/term/trusted_operating_system
Phrases of the day:
1) for a number of reasons
But there are a number of reasons why someone would need a "high-tech" car.
Але є ряд причин, чому комусь знадобиться «високотехнологічний» автомобіль.
2) first use of
The first use of electric lamps was in the 19th century
Вперше електричні лампи почали використовувати в 19 столітті
3) focused primarily on
Development focused "primarily on creating the overall system design."
Розробка була зосереджена «в першу чергу на створенні загального дизайну
системи».
· #286
Popovych E. (Tuesday, 10 May 2022 08:16)
To
Kolomiets Volodymir RZ 212
Thank you for your comment on the article and for your work. It is nice that you
do it regularly.
· #285
Kolomiets Volodymir RZ 212 (Popovych) (Tuesday, 10 May 2022 08:14)
Today i have read the article "Plant-based, probiotics and vitamins: What new
diets mean for farmed fish health". This article is about how fish change
depending on their nutrition. People consume a lot of fish therefore their
reproduction is very important. scientists even tried to make some of the
predatory species vegetarian, but according to them, how to do this remains a
mystery. they experimented with creating foods that had vitamins or bacteria
that would increase the size of the fish and it really worked. some food even
changed their stomach
As for me, the article is really interesting, because i got a lot of new
imformation. And now i even want to know much more about it.
https://phys.org/news/2021-05-plant-based-probiotics-vitamins-diets-farmed.html
https://voca.ro/174FfpAlw7O0
1) for a number of reasons
The preparation of this report has been quite a challenge for a number of
reasons
Підготовка цього звіту була досить складною з ряду причин
2) first use of
The album marked the band's first use of guitar synthesizers.
Цей альбом став першим використанням гітарних синтезаторів
3) focused primarily on
The evaluation focused primarily on issues of relevance and effectiveness and
also addressed issues of efficiency and sustainability.
Оцінка була зосереджена насамперед на питаннях актуальності та ефективності, а
також розглядалися питання ефективності та сталості.
https://voca.ro/1bhcVybT6H6T
· #284
Popovych E. (Tuesday, 10 May 2022 08:13)
To
Nikitina Anastasia RZ-212
Exam topic #12 (Hardware firewall) is well done.
· #283
Rosinskiy Kyrylo RF-211 (Lebedeva E.) (Tuesday, 10 May 2022 08:12)
Quality and Reliability of Software
Software quality is divided into functional and structural quality. Software
functional quality reflects how well it complies with or conforms to a given
design, based on functional requirements or specifications. Software structural
quality refers to how it meets non-functional requirements that support the
delivery of the functional requirements. Software reliability is defined as the
probability that a software system fulfills its assigned task in a given
environment, assuming that the hardware and the input are free of error. It’s an
essential connection of software quality, composed with functionality,
usability, performance, serviceability, capability, installability,
maintainability, and documentation. Software Quality and Reliability is hard to
achieve because the complexity of software turns out to be high. System
developers tend to push complexity into the software layer, with the speedy
growth of system size and ease of doing so by upgrading the software.
I think quality and reliability are two important things that should be always
discussed on the development stage of software.
Audio: https://voca.ro/12ZXVtpwpifR
Phrases of the day:
1. focused primarily on - зосереджена насамперед на
ENG: The evaluation focused primarily on issues of relevance and effectiveness
and also addressed issues of efficiency and sustainability.
UKR: Оцінка була зосереджена насамперед на питаннях актуальності та
ефективності, а також розглядалися питання ефективності та сталості.
2. first use of - перше використання
ENG: The album marked the band's first use of guitar synthesizers.
UKR: Альбом став першим використанням гітарних синтезаторів.
3. for a number of reasons - з ряду причин
ENG: The preparation of this report has been quite a challenge for a number of
reasons.
UKR: Підготовка цього звіту була досить складною з ряду причин.
Audio: https://voca.ro/1hi5YiVa31qI
· #282
S.Mykhailiuk (Tuesday, 10 May 2022 08:12)
To Ruslan Siropulo, RF-211, Task1 is very good. Task2 is too long. Pls make it shorter and post again to ge a mark. Do exam topic pls. Read my initial msg addressed to all students.
· #281
Popovych E. (Tuesday, 10 May 2022 08:11)
To
Nikitina Anastasia RZ-212
Your task is complete, informative and interesting. Well done.
· #280
Nikitina Anastasia RZ-212(Popovych E.) (Tuesday, 10 May 2022 08:11)
Exam topic #12 (Hardware firewall)
Firewalls are special security computer programs that constantly scan, receive,
and send data to the Internet. Figuratively speaking, these are virtual walls
that protect your computer from the dangers of the Internet: viruses, rootkits,
spyware, and so on. However, it is worth noting that a firewall is not the only
or most reliable source of protection for your computer. Typically, for maximum
security, a firewall always works with antivirus and antispyware software.
In most cases, the firewall is installed directly on the work machine (PC), but
sometimes, as in the case of different offices, where there are many computers,
the firewall is placed as a physical device
https://voca.ro/1ar3Qcn6oCdd
· #279
Nikitina Anastasia RZ-212(Popovych E.) (Tuesday, 10 May 2022 08:08)
Today I have read the article " Higher levels of organic pollutants found in
homes located near natural gas wells, study finds". This article states that a
study by the University of Toronto found that those who live near natural gas
wells are exposed to higher levels of certain organic pollutants in their homes.
The study looked at the levels of volatile organic compounds (VOCs) in the air
and drinking water in the homes of pregnant women living in northeastern British
Columbia. I find this article useful because there is very little research on
indoor air quality in regions with a lot of unconventional use of natural gas.
https://phys.org/news/2021-09-higher-pollutants-homes-natural-gas.html
https://voca.ro/1hW1bFZmMr5A
1.focused primarily on
To date, research into the subject has focused primarily on women who already
have children
На сьогоднішній день дослідження з цієї теми зосереджені в основному на жінках,
які вже мають дітей.
2. first use of
Researchers document the first use of maize in Mesoamerica.
Дослідники задокументували перше використання кукурудзи в Мезоамериці.
3.for a number of reasons
There are a number of other technical reasons why shortwave radio can be very
useful in crisis situations.
Існує ряд інших технічних причин, за якими короткохвильове радіо може бути дуже
корисним у кризових ситуаціях.
https://voca.ro/13kYK3KhrB2W
· #278
S.Mykhailiuk (Tuesday, 10 May 2022 08:07)
To
Vivchar Roman (RF-211) Task1 :one item has been wrongly done. Pls translate the
phrases themselves. Avoid using political issues.Just 60 points.
Task2 is lengthy. Pls indicate the exam topic number. Just 70 points . Be
careful and attentive.
· #277
Ruslan Siropulo, RF-211, S. Mykhailiuk (Tuesday, 10 May 2022 08:07)
1)Phrases of the day:
1) first use of – перше використання
The first use of corn may have been for an early form of liquor. - Перше
використання кукурудзи, можливо, було для ранньої форми лікеру.
2) focused primarily on – зосереджений насамперед на
Popular TV shows have focused primarily on the middle class. - Популярні телешоу
орієнтовані в першу чергу на середній клас.
3) for a number of reasons – з ряду причин
This is more effective than traditional separation methods for a number of
reasons. - Це ефективніше традиційних методів поділу з ряду причин.
2)Article
Today i have read the article:Study finds local voluntary programs are effective
in promoting green energy. Programs encouraging voluntary solar energy use at
the local level are effective in spurring the adoption of solar power, a Florida
State University researcher has found.
Tian Tang, an assistant professor in the Askew School of Public Administration
and Policy, studied the effectiveness of voluntary environmental programs (VEPs)
that encourage local governments to promote solar-friendly practices.
"We found that these VEPs are really effective in promoting these local
sustainability actions," Tang said. "This helps show that solar adoption is
heavily influenced by the local regulatory and policy environment."
Doctoral students Hunter Hill and Morgan Higman worked with Tang on the study,
published in the Proceedings of the National Academy of Sciences. They focused
primarily on the SolSmart Program, a VEP that encourages local governments to
adopt best practices to promote solar installation.
SolSmart's incentives include national recognition and no-cost assistance to
help local governments develop and adopt solar-friendly best practices and
achieve gold, silver and bronze designations.
"The recognition as a 'SolSmart Community' is effective, and a lot of local
governments and communities like this image and being able to brand themselves
this way," Tang said. "It's a marketing tool to say, 'Our community is
sustainable' and another way to attract people and businesses into these
communities."
Tang said those incentives are working, as the study showed local government
participation in SolSmart is associated with an increased solar installed
capacity of 18% to 19% per month.
The voluntary aspect of VEPs factors strongly in their success, Tang said.
"The mandatory approach to clean energy and environmental issues may not be
welcome in a lot of places and may not be passed in a lot of places," she said.
"That's why providing a voluntary program that local governments can opt in
according to their needs makes sense."
Tang added: "Flexibility for the implementation is another key factor and allows
basic actions which help local governments and communities to start small with
basic things, to pursue them and then to pursue a higher designation."
As for me, it is more efficient to use energy on fuel, since it gives more
energy, but at the same time it pollutes the atmosphere, which makes it less
safe, and the solar panel does not have such a problem, because it remains the
best choice.
Article:
https://phys.org/news/2022-04-local-voluntary-effective-green-energy.html
Voice: https://voca.ro/1dhV1LS4dJe0
· #276
Mashegirov Eugene (RF-211) (Lebedeva E.V.) (Tuesday, 10 May 2022 08:07)
What is the diffence between CLI and GUI?
The operating system enables the interaction between the user and the device. It
does this by providing two user interfaces: a command-line interface (CLI) and a
graphical user interface (GUI).
A graphical user interface (GUI) is a visual representation of communication
that makes it easy for users to interact with electronic devices. GUI combines
many graphical representations, including graphic icons such as menus, cursors,
tabs, mouse, windows, and scroll bars.
Command-line interface (CLI) is a command-line program that relies on text
inputs to perform operating system functions. CLI was the standard way of
interacting with computing devices in the early days of computing. But this has
changed since the invention of GUI, which is seen as a more user-friendly
alternative.
This article has successfully explained how GUI differs from CLI.
Audio: https://voca.ro/1bWyCxa6DSPr
Phrases
1. first use of - перше використання
First use of microscopic sound waves to study cell abnormalities - Перше
використання мікроскопічних звукових хвиль для вивчення аномалій клітин.
2. focused primarily on - зосереджено насамперед на
They focused primarily on the SolSmart Program - Вони зосередилися насамперед на
програмі SolSmart.
3. for a number of reasons - з ряду причин
The technology is novel for a number of reasons - Ця технологія є новою з ряду
причин.
Audio: https://voca.ro/1fldvU6piJMQ
· #275
Gridnev Dmytro RF-211(Lebedeva E.V) (Tuesday, 10 May 2022 08:04)
Exam topic:The evolution of the Operating System
When we say Operating System, we think about MacOS, Windows, Linux etc. Early
generations of Operating System didn’t look like that. There are four
generations of Operating System.
The first generation (1940s – 1950s)
1940 is the year when the first electronic computer was developed. This computer
was created without any operating system. In that time, program was written for
each task in absolute machine language. It was used for solving only simple
mathematical calculations and this calculations didn’t require an operating
system.
The second generation (1955 – 1965)
The second generation represent the first operating system known as GMOS. This
operating system was developed for the IBM computer. GMOS was based on single
stream batch processing system, because it collects all similar jobs in groups
or batches and then submits the jobs to the operating system using a punch card
to complete all jobs in a machine. Operating system is cleaned after completing
one job and then continues to read and initiates the next job in punch card. In
that time, machines were very big and not everyone could use them, but only
professional operators.
The third generation (1965 – 1980)
New operating system that could perform multiple tasks in a single computer
program was success for this generation and this capability is called
multiprogramming. Another progress which leads to developing of personal
computers in fourth generation is a new development of minicomputers with DEC
PDP-1.
The fourth generation (1980 – Present day)
Development of personal computer represent the fourth generation. The cost of
personal computer was high back then. Microsoft and the Windows operating system
were related to creating personal computers. Some of the popular operating
systems are Microsoft Windows, Mac OS, Linux. Linux operating system was created
in early 1990s. The first Windows operating system was created by Microsoft in
1975. Windows realised operating systems such as Windows 95, Windows 98, Windows
XP. Most Windows users use the Windows 10 operating system. Apple realised
another popular operating system developed in the 1980s which is named as
Macintosh OS or Mac OS.
Which operating system is the best for programming depends on the career domain
of the programmer, because every OS has advantages and limitations.
Vocaroo:https://voca.ro/1az4dDyHPuU8
Phrases of the day:
1) for a number of reasons
But there are a number of reasons why someone would need a "high-tech" car.
Але є ряд причин, чому комусь знадобиться «високотехнологічний» автомобіль.
2) first use of
The first use of electric lamps was in the 19th century
Вперше електричні лампи почали використовувати в 19 столітті
3) focused primarily on
Development focused "primarily on creating the overall system design."
Розробка була зосереджена «в першу чергу на створенні загального дизайну
системи».
Vocaroo:https://voca.ro/1az4dDyHPuU8
· #274
Lebedeva E. (Tuesday, 10 May 2022 08:02)
To Julia Shevchuk (RF-211), Shulyak Makar RF-211 Your exam topics are quite good and correctly presented without grammatical mistakes. Good work.
· #273
Popovych E. (Tuesday, 10 May 2022 08:02)
To
Kravchenko Kostiantyn (RZ-212)
Thank you for your active work, well done.
· #272
S.Mykhailiuk (Tuesday, 10 May 2022 08:01)
To Kate Kholodova (RZ-212) Thanks. Task1 has a minor mistake ( the article SAYS, pls remember). Just 80 points. Task2 :there’s no translation of the phrases. Just 74 points. Keep on working hard. Have you read my today’s task set to all subgroups?
· #271
Popovych E. (Tuesday, 10 May 2022 08:00)
To
Povoznikov Artem RZ-112
I have read your tasks, they are quite correct and informative.
· #270
Lebedeva E. (Tuesday, 10 May 2022 07:59)
To Ivkov Yurii (RF-211), Denis Zavadsky, Biehin Yevhen RF-211, Pontus Natalia(RF-211) Thanks for your active work. Well done.
· #269
Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 10 May 2022 07:53)
Today I've read the article "Exploring the use of artificial intelligence in
architecture"
The article covers the recent research of artificial intelligence usage in
architecture.
Matias del Campo, one of the researchers for this project, said that he and his
partner were obsessed with this idea for decades. During their journey they have
experimented on two-dimensional to three-dimensional style transfer tasks, as
well as performed an attempt to evaluate the ability of an artificial
intelligence to create 'imagined' designs.
I think the article is interesting, although it does make me feel uncertain
about the job market influence that artificial intelligence will have in the
future, as an architect could easily have his job taken by an AI.
Article:
https://techxplore.com/news/2020-11-exploring-artificial-intelligence-architecture.html
Audio: https://voca.ro/1mUazYWcYPIX
Phrases:
1) First use of microscopic sound waves to study cell abnormalities
Перше використання мікроскопічних звукових хвиль для дослідження аномалій клітин
2) The technology is novel for a number of reasons
Ця технологія незвичайна через ряд причин
3) We were focused primarily on locations we have modern data for
Ми були сфокусовані в першу чергу на місцях для яких ми маємо сучасну інформацію
Audio: https://voca.ro/13WAx3oPyAW4
· #268
Julia Shevchuk (RF-211) (Lebedeva E.V) (Tuesday, 10 May 2022)
12.
history of computer software
Software is a component of a computer system that allows you to perform various
functions that support the computer system. The history of software and its
development dates back to the early nineteenth century. All computer systems use
the "stored program concept" first developed by Charles Babbage in the 1850s.
The concept was lost until the advent of modern computers in the 1940s. Today,
due to the complexity and solving of tasks that a computer system can perform,
there is a differentiation of software types. There is software designed to run
specific business applications. There is software that draws attention to the
operation of a computer system. And there is software designed to perform
specialized tasks. Regardless of the types, software is the original component
of any computer system. Without it, all you have is a collection of circuits,
transistors, and silicon chips.
https://voca.ro/19MvJlIky3k9
1) first use of
The first use of corn may have been for an early form of liquor.
Перше використання кукурудзи, можливо, було для ранньої форми лікеру.
2)focused primarily on
To date, research into the subject has focused primarily on women who already
have children.
На сьогоднішній день дослідження з цієї теми зосереджені переважно на жінках,
які вже мають
3) for a number of reasons
The preparation of this report has been quite a challenge for a number of
reasons.
Підготовка цього звіту була досить складною з ряду причин.
https://voca.ro/1hHT8hpScOPW
· #267
Shulyak Makar RF-211 (Lebedeva E.V.) (Tuesday, 10 May 2022 07:49)
Device driver.
In computing, a device driver is a computer program that operates or controls a
particular type of device that is attached to a computer or automaton.A driver
provides a software interface to hardware devices, enabling operating systems
and other computer programs to access hardware functions without needing to know
precise details about the hardware being used.
A driver communicates with the device through the computer bus or communications
subsystem to which the hardware connects. When a calling program invokes a
routine in the driver, the driver issues commands to the device (drives it).
Once the device sends data back to the driver, the driver may invoke routines in
the original calling program.
Drivers are hardware dependent and operating-system-specific. They usually
provide the interrupt handling required for any necessary asynchronous
time-dependent hardware interface.
Audio: https://voca.ro/1fzqlSKHNOco
-------------------------------------------------
Phrases of The Day:
1)The State of Qatar has therefore focused primarily on the areas of education
and the elimination of illiteracy. - Тому держава Катар зосередилася насамперед
на сферах освіти та ліквідації неписьменності.
2)This problem is solved by diligent re-treatment of the head a week after the
first use of the drug. - Цю проблему вирішує старанна повторна обробка голови
через тиждень після першого застосування препарату.
3)I chose it for a number of reasons, Stephen. - Я вибрав його з кількох причин,
Стівене.
Audio: https://voca.ro/1eslhMXSnWqd
· #266
Vivchar Roman (RF-211) S. Mykhailiuk (Tuesday, 10 May 2022 07:46)
-
For a number of reasons.
For a number of reasons, I was unable to attend mathematics.
З ряду причин я не зміг бути присутнім на математиці.
- First use of.
The chef first use of this recipe to his dish.
Кухар уперше застосував цей рецепт до своєї страви.
- Focused primarily on.
On May 9, the focused primarily on veterans.
9 травня основна увага приділялася ветеранам.
Device drivers.
A driver is computer software by which other software accesses the device's
hardware selection. Usually, drivers are supplied with the operating sources to
use the hardware kit, you will not be able to find the system. However, some
vendors use special drivers, standard cooking devices. In general, a driver
should not interact with hardware services, it can only simulate them, use
software services that are not related to control, or do nothing.
The operating system manages some "virtual device" that understands a standard
set of commands. The driver translates these commands into commands that the
device itself understands. This ideology is called "hardware abstraction". For
the first time in domestic computer technology, such an approach appeared in the
EC series of computers, and this kind of control software was called channel
software.
A driver consists of several functions that handle specific operating system
events. Usually these are 7 main events:
Driver download;
Unloading;
Opening the driver;
Start of the main work;
Read/Write;
closure;
management.
With the development of systems that combine on one board not only the central
elements of a computer, but most of the computer devices as a whole, the
question arose of the convenience of supporting such systems, which were called
"hardware platform", or simply "platform".
Audio: https://voca.ro/1fhfNEGYEW5z
· #265
Povoznikov Artem RZ-112 (Popovych) (Tuesday, 10 May 2022 07:44)
Today i have read the article: Devastating skin disease covering up to 70% of a
dolphin's body tied to climate change
This article tells about Scientists who discovered a new type of skin disease in
dolphins. This is due to climate change and water salinity. Due to frequent
rains and ugaranas, the salinity in the water began to decrease and becomes
fresh. Since dolphins are not used to such conditions, they have a skin disease
that in some cases is fatal. Because of this disaster, scientists have created a
document, the content of which should mitigate the factors that lead to such a
disease, and this is perhaps the first steps towards the elimination of this
deadly disease. I think the solution to this problem is to start with the people
themselves. Since it was because of us that the problems with climate change and
the development of this disease in dolphins began.
Text: https://phys.org/news/2020-12-devastating-skin-disease-dolphin-body.html
Audio: https://voca.ro/1fvhiNnTL8ul
1. number of reasons
The technology is novel for a number of reasons, one being that it has the
potential to provide new insight into the environmental factors that have
significant impacts on air pollution levels.
2.focus primarily on
They focused primarily on the SolSmart Program, a VEP that encourages local
governments to adopt best practices to promote solar installation.
3.First use of
Researchers document the first use of maize in Mesoamerica.
Audio: https://voca.ro/19IDNRAN6c0V
· #264
Ivkov Yurii (RF-211)(Lebedeva E.V.) (Tuesday, 10 May 2022 07:39)
18
What is Word processing?
Word processing is about creating, editing, saving and printing documents. To
perform word processing a particular software called Word Processor is required.
These programs allow users to create different documents such as reports, notes,
articles, newsletters etc, but basically they are not limited to specific types.
In addition to the text word processors can add and operate with pictures,
tables, diagrams and some decorative elements.
When editing the document Word Processors are capable of changing text’s
properties in different ways, also most of them support check of spelling system
so the program will show grammatical and punctuation mistakes if there are any,
or even offer their corrections.
Phrases of the day
1) for a number of reasons
This algorithm is unsuitable in this task for a number of reasons.
- Цей алгоритм непридатний для цієї задачі з ряду причин.
2) focused primarily on
Most reports focused primarily on the system's security problems.
– Більшість звітів зосереджені на проблемах безпеки системи.
3) first use of
It is hard to implement some method if you’ve never worked with this framework.
- Важко реалізувати якийсь метод, якщо ви ніколи не працювали з цим фреймворком.
Vocaroo: https://vocaroo.com/1mQVacYjU2sG
· #263
Denis Zavadsky Lebedeva RZ-211 (Tuesday, 10 May 2022)
In
a new study, researchers at the U.S. Department of Energy's (DOE) Argonne
National Laboratory have turned to the power of machine learning to predict the
lifetimes of a wide range of different battery chemistries. By using
experimental data gathered at Argonne from a set of 300 batteries representing
six different battery chemistries, the scientists can accurately determine just
how long different batteries will continue to cycle.
I consider this a significant contribution to human research because it can help
automation and logistics in terms of time-cost in so many industries.
For example, manufactor production of any hardwork instruments.
https://techxplore.com/news/2022-05-battery-lifetimes-machine.html
Clearance was focused primarily on Battle Area Clearance.
Funds are often available but not accessible for a number of reasons.
This problem is solved by diligent re-treatment of the head a week after the
first use of the drug.
Очистка була зосереджена насамперед на очищенні зони бою.
Кошти часто доступні, але недоступні з ряду причин.
Цю проблему вирішує старанна повторна обробка голови через тиждень після першого
застосування препарату.
https://voca.ro/1nYSwYzuku3K
· #262
Popovych E. (Tuesday, 10 May 2022 07:26)
To
Artem Kotliarov RZ-212
I have got your independent, class practice and the exam topic. Well done.
Thanks.
· #261
Biehin Yevhen RF-211 (Lebdeva E.) (Tuesday, 10 May 2022 07:19)
Trusted Operating Systems
Trusted Operating System (TOS) generally refers to an operating system that
provides sufficient support for multilevel security and evidence of correctness
to meet a particular set of government requirements.
An OS is trusted if it can provide:
Memory Protection : Each user’s program must run in a portion of memory
protected against unauthorized accesses. The protection will certainly prevent
outsiders’ accesses, and it may also control a user’s own access to restricted
parts of the program space. Differential security, such as read, write, and
execute, may be applied to parts of a user’s memory space
General object access control : Users need general objects, such as constructs
to permit concurrency and allow synchronization. However, access to these
objects must be controlled so that one user does not have a negative effect on
other users
User Authentication : must identify each user who requests access and must
ascertain that the user is actually who he or she purports to be. The most
common authentication mechanism is password comparison.
Phrases
1) for a number of reasons
It's frustrating for a number of reasons.
Це засмучує з ряду причин.
2) first use of
The first use of hand writing appeared almost 5,500 years ago.
Перше використання рукописного письма з’явилося майже 5500 років тому
3) focused primarily on
He seems primarily focused on economic issues.
Він, здається, в першу чергу зосереджений на економічних питаннях
Audio: https://voca.ro/1aQ41hbE7HNu
· #260
Kate Kholodova (RZ-212, Mikhailuk) (Tuesday, 10 May 2022 07:13)
Today I have read the article "Crossing the line: How robots can rule the
roads". It tells about artificial intelligence in transport, designed to
optimize traffic. While many argue, trusting a computer to control the road with
other people can be dangerous - scientists are doing research on road behavior
in order to create their own "robots" as safely as possible. This system will
help to optimize traffic, making it more unloaded, and in addition to relieve
humanity from the need for transportation, for example, and other activities
where you need to constantly move around the city by car. Scientists are
convinced that this technology is really necessary.
In my opinion, the main disadvantage is that it reduces the value of human
labor, therefore it leaves people without work. But I think if they will teach
robots they will do a perfect job.
Article: https://techxplore.com/news/2021-10-line-robots-roads.html
Audio: https://voca.ro/17D5AxeHCLbj
1) focused primarily on
The evaluation focused primarily on issues of relevance and effectiveness and
also addressed issues of efficiency and sustainability.
Оцінка зосереджена насамперед на проблемах актуальності та ефективності, а також
розглядалися питання ефективності та стійкості.
2) for a number of reasons
The preparation of this report has been quite a challenge for a number of
reasons.
Підготовка цього звіту була досить складною з ряду причин.
3) first use of
The album marked the band's first use of guitar synthesizers.
Альбом став першим використанням гітарних синтезаторів.
Audio ph: https://voca.ro/1cwLWThs5hdZ
· #259
Pontus Natalia(RF-211)(Lebedeva E.V.) (Tuesday, 10 May 2022 07:10)
Software industry
Software plays a critical role in today's global information economy:
individuals and businesses rely on operating systems and applications to carry
out daily tasks. Software runs the computers, networks and devices that enable
countless products and services from vast enterprise and communications systems
to small 'apps' that run on digital phones. The software industry consists of
the development, distribution, and maintenance of software. It can be broadly
divided into application software, system infrastructure software,
software-as-a-service (SaaS), operating systems, database and analytics
software. Fundamental forces have shaped the evolution of the industry, starting
with the emergence of personal computers, the development of computer networking
and client/server software, and the introduction and widespread adoption of the
Internet, and it continues to grow today.
https://voca.ro/19ZmQrD9sZ5D
Phrases of the day:
1) first use of – перше використання
The first use of corn may have been for an early form of liquor.
Перше використання кукурудзи, можливо, було для ранньої форми лікеру.
2) focused primarily on – зосереджений насамперед на
Popular TV shows have focused primarily on the middle class.
Популярні телешоу орієнтовані в першу чергу на середній клас.
3) for a number of reasons – з ряду причин
This is more effective than traditional separation methods for a number of
reasons.
Це ефективніше традиційних методів поділу з ряду причин.
https://voca.ro/1au27MoFnl5K
· #258
S.Mykhailiuk (Tuesday, 10 May 2022 07:08)
To
subgroups RF-211,РЗ-212
Hi everybody. The lesson has already started and I am waiting for your exam
topics and work with phrases to be fulfilled according to the patterns. Let’s
get started, students.
· #257
Popovych E. (Tuesday, 10 May 2022 07:03)
Good morning!
The lesson will start soon, so I am waiting for your comments and audio
recordings. Don't forget to write the sentences with Phrases and record them.
Please, do it in one postt!
· #256
Lebedeva E. (Tuesday, 10 May 2022 07:02)
To RF-211 Good morning! The lesson has started and I am waiting for your exam topics and work with phrases.
· #255
Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 10 May 2022 04:58)
1)
1. for a number of reasons
These cost disparities likely arise for a number of reasons, the study authors
said. - За словами авторів дослідження, ці відмінності у витратах, ймовірно,
виникають з кількох причин.
2. focused primarily on
To date, research into the subject has focused primarily on women who already
have children. - На сьогоднішній день дослідження з цієї теми зосереджені
переважно на жінках, які вже мають дітей.
3. first use of
It is believed to be the first use of ion implantation to improve the
performance of an intercalation pseudocapacitor - Вважається, що це перше
використання іонної імплантації для покращення продуктивності інтеркаляційного
псевдоконденсатора.
https://voca.ro/18s3AqfoN5WT
2) Today I have read the article ''Robotic telekinesis: Allowing humans to
remotely operate and train robotic hands''.
This article is about robotic telekinesis, which allows the user to remotely
control a robotic arm by simply demonstrating movements in front of the camera.
Only 1 RGB camera is required to control this system, which in the future allows
you to make the system mass-produced and really helps in solving real problems.
In my opinion, this technology will be in great demand in everyday conditions,
but the biggest plus is that the system can be controlled from anywhere in the
world.
https://techxplore.com/news/2022-03-robotic-telekinesis-humans-remotely.html
https://voca.ro/1fTZUFRRzUBt
3) Exam topic #4 (Information protection systems)
Information security, sometimes shortened to InfoSec, is the practice of
protecting information by mitigating information risks. It is part of
information risk management. It typically involves preventing or reducing the
probability of unauthorized/inappropriate access to data, or the unlawful use,
disclosure, disruption, deletion, corruption, modification, inspection,
recording, or devaluation of information.
Methods of information protection:
1. Obstruction of the alleged abductor by physical and software means;
2. Managing or influencing the elements of the protected system;
3. Disguise or convert data, usually by cryptographic means;
4. Coercion, or the creation of conditions under which the user will have to
comply with the rules of data handling;
https://voca.ro/15P1Bp4l33Nr
· #254
Popovych E. (Monday, 09 May 2022 18:42)
To
Yeulizaveta Barsukova (RT-211)
Exam Topic #6 (First radio speeches) is good but write, pls., on time.
· #253
S.Mykhailiuk (Friday, 06 May 2022 13:08)
To
Dasha Semidetnova RZ-213
I can hardly fine terms in your task. Pls stick to the pattern (phrase itself
and its translation, then the way you’ve done it- usage in the sentences). Just
60 points this time. Task2 should not start like this. I hope you know it.
First, indicate the title of the article and a link to the source ( unavailable)
These is no conclusion at the end and a mistake in sentence structure (“
Neural-Fly equipped autonomous quadcopters are so have learned to respond to
high winds ) Just 60 points. Pls work on time .
· #252
S.Mykhailiuk (Friday, 06 May 2022 12:52)
To Chabanenko Ksenia RZ-213 Thanks Task 1 is 85 points. Task 2 has some grammar mistakes, (sentence structure mistakes). Just good. Keep on working hard and ON TIME.
· #251
S.Mykhailiuk (Friday, 06 May 2022 12:45)
To Igor Rudko (RZ-213) Pls select the speciality topics Just 60 points. Task2 pls be attentive or check what Google translator suggested to you. (тому зловмисники, які можуть націлити на експлойт?, цей недолік). “A breakthrough in droplet manipulation. - Прорив у маніпуляціях з краплями.” -is that a complete sentence ? What do you think? Just 60 points. Keep on working hard.
· #250
S.Mykhailiuk (Friday, 06 May 2022 12:33)
To Shpychka Olecksandr/ RZ-213 Task1 is good due separate mistakes. Task2 has been wrongly done by you.Pls try to understand the task . Make up sentences with the phrases on speciality. I’ve explained it to your monitor many times before. What you’ve done can hardly be considered to be sentences . I hope you know what a sentence stands for. UNACCEPTED!
· #249
Yeulizaveta Barsukova (RT-211) Popovych E. (Friday, 06 May 2022 12:27)
Exam Topic #6 (First radio speeches)
The first radio appearances were given by Roosevelt in the USA. It was a series
of evening radio speeches. He spoke about the recovery after the Great
Depression, the declaration of a state of emergency and the course of World War
II. On the radio, he could suppress rumors, oppose conservative-dominated
newspapers, and explain his policies directly to the American people. The
introduction of such speeches was later described as a "revolutionary experiment
with the nascent media platform." The series of chats were among the first 50
recordings made part of the National Recording Registry of the Library of
Congress.
Audio:https://voca.ro/1ckHtpv2rlIL
· #248
S.Mykhailiuk (Friday, 06 May 2022 12:25)
To Shlapak Dmytro RZ-213 Sentence 3 contains a grammar mistake (The devices we have are able to...). Just good. Task 2 has sentence structure mistakes whose contents has not been revealed clearly. You’ve used the abbreviations “AI” very often. The contents should be closer to your speciality . So keep on working hard on your tasks.
· #247
Dasha Semidetnova RZ-213 (S.Mykhailiuk) (Friday, 06 May 2022 12:19)
1.
To be truly useful, drones—that is, autonomous flying vehicles—will need to
learn to navigate real-world weather and wind conditions.
Щоб бути по-справжньому корисними, дрони, тобто автономні літаючі апарати,
повинні навчитися орієнтуватися в реальних погодних і вітрових умовах.
2. And along the way they created a breakthrough in computer visualization.
І попутно зробили прорив у комп’ютерній візуалізації.
3. Effectiveness is the ability to achieve stated goals or objectives, measured
in terms of both output and impact.
Ефективність — це здатність досягати поставлених цілей або завдань, що
вимірюється як результатом, так і впливом.
https://voca.ro/12W2V8Dyw5JV
To be useful, drones must learn to navigate real weather and wind conditions.
Currently, drones either fly in controlled conditions, without wind, or are
controlled by people using remote controls. However, in order for drones to
autonomously perform essential but mundane tasks, drones must be able to adapt
to wind conditions in real time. To solve this problem, a team of engineers at
Caltech has developed a deep learning method that can help drones cope with new
and unknown wind conditions in real time by simply updating a few key
parameters.The researchers say that Neural-Fly solves these problems by using a
so-called split strategy, with which only a few parameters of the neural network
need to be updated in real time. After receiving just 12 minutes of flight data,
Neural-Fly equipped autonomous quadcopters are so have learned to respond to
high winds that their performance has greatly improved. In addition, flight data
collected by an individual drone can be shared with another drone, creating a
knowledge pool for autonomous.
https://voca.ro/1m7hhy2MxpW3
· #246
Chabanenko Ksenia RZ-213(S.Mykhailiuk) (Friday, 06 May 2022 12:18)
1.a
breakthrough in -прорив у;
New methods of cryptography were a breakthrough in data protection area.-Нові
методи криптографії стали проривом у сфері захисту даних.
2.ability to achieve-здатність досягти;
Two factor authentication gives users ability to achieve secure use of social
media.-Двофакторна аутентифікація дає користувачам можливість безпечно
використовувати соціальні мережі.
3.able to target- спроможний досягти/влучити;
Artificial intelligence is able to target complex tasks and soon it'll be able
to achieve even more.-Штучний інтелект здатний вирішувати складні завдання, і
незабаром він зможе досягти ще більше.
https://voca.ro/1kOePzTAAH5W
I want to share my opinion after reading news about ditching passwords by
replacing them with other ways of protecting acounts.The drawback of passwords
is that people repeat one combination to different accounts so it is easier to
manage many accounts but also easier to hack .What is more, these reusable
passwords can be very simple so the level of protection is low.To solve the
problem tech titans as Apple and Microsoft are looking forward unlocking mobile
phones with fingerprint or face recognition.It is not an innovation but as it is
not very common to use so the new breakthrough in this area is expected.New
standarts will let websites and device makers build secure, passwordless options
into their offerings.It means that using secure keys instaed of passwords would
stymy phishing scams that trick people into disclosing log-in credentials and
hackers that steal such data.I agree that we need new methods to secure our data
as there are a lot of threats so protection innovations should cope with them.
https://voca.ro/15EJdG4wu5kT
https://techxplore.com/news/2022-05-tech-titans-ditch-passwords.html
· #245
S.Mykhailiuk (Friday, 06 May 2022 12:13)
To
Ivan Siglyanyk(RZ-213
Pls stop using examples associated with so called “propaganda “ , focus on your
speciality. By the way, are you an expert in the environment?Task1 is 70 points.
Task2 is 70 points . Use active form instead a passive form ( A very interesting
article was read by me). The conclusion should contain a standard phrases not a
slang or colloquial words. Take this into account! Work hard. As to your voice
msg , it leaves much to be desired: pls learn how to pronounce separate words
and the words you definitely know (read- [red], Participle II) Improve you
melody. So you have to make a lot of tremendous efforts to achieve better
results!
· #244
Igor Rudko (RZ-213) (S.Mykhailiuk) (Friday, 06 May 2022 11:56)
Audio: https://voca.ro/16BTmvJd4ni7
Article:
https://phys.org/news/2022-04-breakthrough-fossil-fuel-carbon-dioxide.html
Today I have read the article: "Breakthrough in estimating fossil fuel carbon
dioxide emissions". The researchers are able to detect changes in emissions with
higher frequency, such as daily estimates, and can clearly see two periods of
reductions. By the way, they trained the machine learning model on pre-pandemic
data, to estimate the fossil fuel CO2 they would have expected to observe at
Weybourne if the pandemic had never occurred. Moreover, they then compared this
estimate to the fossil fuel CO2 that was actually observed during 2020-2021,
which revealed the relative reduction in CO2 emissions. In my opinion, it is
really great that scientific society is focused on this problem and trying to
fix it.
Phrases
Audio: https://voca.ro/1aQIhmLuTXIp
1)A breakthrough in - Прорив у
A breakthrough in droplet manipulation. - Прорив у маніпуляціях з краплями.
2) able to target - здатний націлювати
Security products must run with high privilege levels, and so attackers able to
target the exploit this flaw could potentially disable security solutions. -
Продукти безпеки повинні працювати з високими рівнями привілеїв, і тому
зловмисники, які можуть націлити на експлойт, цей недолік, потенційно можуть
вимкнути рішення безпеки.
3) ability to achieve - здатність досягати
Just try and get a robot to have the ability to achieve a similar degree of
nuance. - Просто спробуйте отримати робота, щоб він мав можливість досягти
подібного ступеня нюансів.
· #243
Shpychka Olecksandr/ RZ-213 (S.Mykhailiuk) (Friday, 06 May 2022 11:36)
Article: https://www.zdnet.com/article/the-biggest-data-breaches-of-2021/
Audio: https://voca.ro/1iu7qDzTuvxf
Today i have read the article: "The biggest data breaches, hacks of 2021"
From the article we learn about the problem of data leakage in our time.
Nowadays, most people neglect their online security, which is why they often
suffer from malware.
In 2021, a type of ransomware spread, due to which a lot of people lost their
data. And also many popular sites were hacked and leaked user data.
In my opinion, such hacks most often occur due to the weak protection that users
choose, or because of its absence.
Phrases of the day:
1)ability to achieve
The ability to achieve major organizational transitions.
Здатність досягати великих організаційних змін.
2)able to target
The company will be able to target
(Компанія зможе орієнтуватися)
3) a breakthrough in
Capture a breakthrough in medical research
(Зробити прорив у медичних дослідженнях)
Audio: https://voca.ro/1cHRs9Ccs8WA
· #242
Shlapak Dmytro RZ-213 (S.Mikhailyuk) (Friday, 06 May 2022 10:48)
1.
The creation of this program will give us the ability to achieve the highest
possible results of repelling cyber attacks.
Створення цієї програми дасть нам можливість домогтися максимально можливих
результатів відображення кібератак.
2. We have made a breakthrough in detecting viral AI.
Ми зробили прорив у виявленні вірусного штучного інтелекту.
3. The devices we have able to target an alarm signal to the main cyber defense
building.
Пристрої, які у нас є, здатні направляти сигнал тривоги на головну будівлю
кіберзахисту.
https://voca.ro/13TNHrFGXyAt
Today I have read article about "How the study of neuroscience can affect the
development of improved AI systems." In part, I agree with Shimon Ulman when AI
is learning based on thousands of examples of people, as for me it's even
difficult to call AI. But on the other hand, maybe AI analyzes such a number of
plus or minus identical situations in order to create its most productive and
effective version of these situations. But the fact that we still don't know
everything about our brain is true and this is a problem that needs to be
solved.
https://techxplore.com/news/2019-02-neuroscience-ai.html
https://voca.ro/13qVG4kkwlp9
· #241
Ivan Siglyanyk(RZ-213)(S.Mykhailiuk) (Friday, 06 May 2022 10:43)
Prhases of Day
able to target: https://voca.ro/1gs1ygn10oNS
Two documents outlined how the U.S. spy agency is able to target non-U.S.
residents, while the other outlined how it can minimize data collection from
U.S. residents.
У двох документах описано, як американське шпигунське агентство може
націлюватися на нерезидентів США, а в іншому — як воно може мінімізувати збір
даних від жителів США.
ability to achieve : https://voca.ro/1oLA1OJvNKc0
Finally, evolution's most impressive feat remains too poorly understood to be
replicated by computer, namely the ability to achieve major organizational
transitions.
Нарешті, найбільш вражаючий подвиг еволюції залишається занадто погано вивченим,
щоб його відтворити комп’ютером, а саме здатність досягати значних
організаційних змін.
a breakthrough in: https://voca.ro/167eOghm8noA
A breakthrough in creating invisibility cloaks, stealth technology.
Прорив у створенні плащів-невидимок, технології стелс.
Article:
https://techxplore.com/news/2021-11-electric-vehicles-powered-hydrogen-harvested.html
Audio: https://voca.ro/1mjTDbuYZ1Ya
Today, A very interesting article was read by me.The main idea is to solve the
problem of wastewater pollution.
It is noted that the issue of cleaning is very important for our environment,
but unfortunately it is very energy consuming.
And that's why scientists from Warwick University tried to find ways to solve
this problem, fortunately they succeeded and overfulfilled the task. After
performing certain tests, they were able not only to purify water, but also to
obtain hydrogen
This is very important for us, because the possibility of obtaining hydrogen is
already very valuable. It can be used in various industries, or electric
vehicles.
I think it's very cool. Every year there are new ways to overcome certain
problems such as environmental pollution, etc.
· #240
Petrova E.I. (Friday, 06 May 2022 09:30)
Pour les étudiants qui apprennent le français.
Chers étudiants ! Travaillez régulièrement. J’attends vos devoirs. Laissez vos
commentaires et vos enregistrements ici. Allez-y! Bon travail.
· #239
Lebedeva E. (Friday, 06 May 2022 08:28)
To Dovzhenko Ilya RZ-211 Well done, thank you.
· #238
Dovzhenko Ilya RZ-211 (Lebedeva) (Friday, 06 May 2022)
Today, I have read the article ”Caught on camera: Using AI to combat street
crime”, which I find very informative. This article describes the new solution
to reduce street crimes. Researchers at Monash University Malaysia's School of
Information Technology are developing cameras with an artificial intelligence
system that can detect crime on the streets. This system allows police to be
alerted to potential danger to someone's life.In my opinion, this new invention
is very useful, because it can make our world safer.
https://techxplore.com/news/2021-11-caught-camera-ai-combat-street.html
https://voca.ro/1gfejEQe0IVa
1)ability to achieve
How has it limited your ability to achieve a personal goal?
Як це обмежило вашу здатність досягати особистої мети?
2) able to target
The authorities would be able to target each of us - just like Tesco does, only
much better.
Влада зможе націлитися на кожного з нас - так само, як це робить Tesco, тільки
набагато краще.
3) a breakthrough in
That will require a breakthrough in software that mimics perception.
Це вимагатиме прориву в програмному забезпеченні, яке імітує сприйняття.
· #237
S.Mykhailiuk (Thursday, 05 May 2022 16:14)
Eugene Chervony RT-212 Just good for both tasks. Thank you. Keep on working hard.
· #236
S.Mykhailiuk (Thursday, 05 May 2022 16:09)
To Revyakin A.(RT-212) There minor lexis mistakes. Just 73 points. Task2: pls follow the pattern: the phrase of the day with translation. and then it’s usage in a sentence. And what is important is making up sentences relating to your speciality. You’ve earned 6o points. Be attentive and keep on working hard.
· #235
S.Mykhailiuk (Thursday, 05 May 2022 16:01)
To Stanislav Popik РТ-212 There are some mistakes in your pronunciation ( aspects -`æspekt], etc. Just 65 points. Task2 is incomplete and therefore. UNACCEPTED ( translation of phrases and sentences is unavailable!). Be attentive and keep on working hard.
· #234
S.Mykhailiuk (Thursday, 05 May 2022 15:48)
To Tomchishina Polina RT-212 Thanks Just good for both activities.
· #233
S.M. (Thursday, 05 May 2022 15:41)
To Tomchishina Polina RT-212 Pls indicate the link to the source and make a conclusion. Just 74 points.
· #232
S.Mykhailiuk (Thursday, 05 May 2022 15:38)
To Vivchar Roman (RF-211) Pls do not use quotes! The English is a must in the Guestbook! Your comment is lengthy. Just 72 points Pls try to participate in our on-line activities on line.
· #231
S.Mykhailiuk (Thursday, 05 May 2022 15:30)
To Tomchishina Polina RT-212 Thanks . Good, pls make a conclusion in exam topics too and link to the source.
· #230
S.Mykhailiuk (Thursday, 05 May 2022 15:25)
To Stepanenko Vladislav (RT-212) just good. Thanks.
· #229
S.Mykhailiuk (Thursday, 05 May 2022 15:23)
To Stepanenko Vladislav (RT-212. Thanks. Just good. Try to make a conclusion.
· #228
S.Mykhailiuk (Thursday, 05 May 2022 15:20)
To Arina Omelchenko RE-211 Thanks . Just 80 points for both tasks. Pls translate the phrases themselves into Ukrainian.
· #227
S.Mykhailiuk (Thursday, 05 May 2022 15:17)
To Pishtoi Misha (PT-212) Task1 is 73 points. Task2 is incomplete: pls translate into Ukrainian. Be attentive and keep on working hard.
· #226
S.Mykhailiuk (Thursday, 05 May 2022 15:12)
To Stanislav Popik РТ-212 Thanks. Just 78 points for two tasks. Try to translate the phrases themselves.
· #225
S.Mykhailiuk (Thursday, 05 May 2022 15:08)
To Arina Omelchenko RE-211 Thanks . Pls make a conclusion.. Just 74 points
· #224
Popovych E. (Thursday, 05 May 2022 14:12)
To
Povoznikov Artem RZ-212
#208, 214
Examine topic #5 (Technical basis of information protection in modern computer
systems) is well done.
Thank you for your comment and voice message.
· #223
Popovych E. (Thursday, 05 May 2022 14:10)
To
Kate Kholodova (RZ-212)
Thank you, you have successfully completed the task.
· #222
Popovych E. (Thursday, 05 May 2022 14:09)
To
Timophey Sipin RZ-212
#191,192
Topic 8 Passwords and their drawback is well done.
Your comment has clear layout and quite correct as well as the task with the
phrases, thank you.
· #221
Lebedeva E. (Thursday, 05 May 2022 12:16)
To
Kolomiets Vova RZ-212
Thank you, the exam topic is informative and clear.
· #220
Yershova Y. (Thursday, 05 May 2022 11:47)
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 05 May 2022 11:33)
Your topic #4 Commercial use of radio is good , but mind the pronunciation:
profitable mainly regional advertising since.
· #219
Kolomiets Vova RZ-212 (Lebedeva E.) (Thursday, 05 May 2022 11:38)
Exam topic #14 ("Authority check”)
Nowadays authority check is everywhere. Sites use this way of protection to
avoid situations when someone is pretending someone else. There are a lot of way
to identify the person and save the data. The most common are password,
fingerprint, face id or even personal documents. By protecting your authority a
hundred of villains cant hack you, steal important information, change something
on your profile etc. This is very important and effective way to protect
everything and its even impossible to avoid it in routine life.
https://voca.ro/1kD4wZ5eDmdt
1) estimate the effects of
The American Sociological Review study is the first to estimate the effects of
early-20th-century housing policies on subsequent segregation patterns.
Дослідження американського соціологічного огляду є першим, що оцінило вплив
житлової політики початку 20-го століття на наступні моделі сегрегації.
2) examine more closely
We also examine the computer science discipline and degree levels more closely.
Ми також уважніше вивчаємо дисципліну з інформатики та рівні ступеню.
3) distinct from
It is distinct from electrical science and technology, which deal with the flow
of electrons and other charge carriers through metal conductors such as copper
Він відрізняється від електротехніки та техніки, які мають справу з потоком
електронів та інших носіїв заряду через металеві провідники, такі як мідь.
https://voca.ro/1cifIeqy859e
· #218
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 05 May 2022 11:33)
topic Commercial use of radio.
https://voca.ro/16Knh0A2nQYU
Radio is not one of the highly profitable sectors of the media industry. It is
mainly used for advertising In most cases local and regional radio stations are
used as advertising media, because the coverage of each station depends on the
power of the radio transmitter and on the capacity of the radio network. I think
Radio in the usual sense is already outdated and the Internet is completely
replacing radio. It has been used since the war for encrypted and secure
communication in some commercial industries to try to abandon this outdated
technology. In this era, radio has long been obsolete.
· #217
Pishtoi Misha (PT-212) Yershova Y. (Thursday, 05 May 2022 11:32)
Thank you, I will try
· #216
Lebedeva E. (Thursday, 05 May 2022 11:31)
To
Kravchenko Kostiantyn (RZ-212)
Your review is really interesting and urgent, the exam topic is informative.
Well done, thank you.
· #215
Yershova Y. (Thursday, 05 May 2022 11:29)
Chervony Eugene RT-212(Yershova) (Thursday, 05 May 2022 11:24)
You posted Exam Topic #1 last week, be attentive.
· #214
Povoznikov Artem RZ-212 (Popovych) (Thursday, 05 May 2022 11:29)
Examine topic #5 (Technical basis of information protection in modern computer
systems)
Technical protection includes a whole range of works: from premises to detection
of detection, data detection, detection of detection of funds and detection of
detection of detection to detection of detection of funds and detection of
detection.
Technical protection is aimed at improving the safety of technological data,
know-how, information from patents, the possibility of developing or acquiring
technologies, licenses. Cases and cases of technical protection against the
collection of information on financial transactions in relation to financial
institutions, loans, counterparties, data providers (DPIs), employees, customers
and enterprises were also identified. The objects of the system of technical
protection of information are:
1.databases (DB) with information about partners, clients (customers), suppliers
(services, goods, resources);
2.documentation in electronic form (including in electronic document management
systems, EDI) and on paper;
3.any information constituting a commercial secret (usually financial data:
assets and liabilities of the enterprise, loans and receivables, salaries of key
employees, etc.);
4.technological, technical and production information - the specifics of
production processes, know-how, the composition of equipment and the topology of
technological chains.
Audio:
· #213
Yershova Y. (Thursday, 05 May 2022 11:27)
Stanislav Popik РТ-212 (Yershova) (Thursday, 05 May 2022 11:19)
You have successfully completed the tasks, thanks.
· #212
Kravchenko Kostiantyn (RZ-212, Lebedeva E.) (Thursday, 05 May 2022 11:25)
Today I've read the article "Stop blaming people for choosing bad passwords.
It's time websites did more to help"
The article covers the fact that many websites fail to effectively encourage
their users to create stronger passwords for their accounts.
The article states that, although it is accurate that users themselves willingly
make weak passwords, websites themselves also neglect enforcing specific
guidelines or restrictions on password creation.
I find the article interesting: it's well written, however I find its message
hard to agree with. Forcing users to make complex passwords in public systems
won't teach them the importance of it - it will only show them how to do it. I
believe only through first-hand experience the user can learn the importance of
a strong password.
Article:
https://techxplore.com/news/2022-01-blaming-people-bad-passwords-websites.html
Audio: https://voca.ro/1bdWYCX17yVs
Phrases:
1) The tool can also estimate the effects of felling existing woodland.
Інструмент також може оцінювати наслідки вирубки існуючих лісів
2) Let's examine each of the three choices a bit more closely.
Розглянемо кожний з трьох виборів поближче
3) Healthcare is distinct from other sectors in that the manipulation of
critical infrastructure has the potential to directly impact human life.
Охорона здоров'я відрізняється від інших секторів, так як маніпуляція над
критичною інфраструктурою може прямо впливати на життя людини
Audio: https://voca.ro/1gBFGFrbCPVC
Exam topic #15 (The authentication of a user's claimed identity)
A user needs to verify that he is in communication with the expected computer
system, and that he is granted the permit to utilize it.
In most systems, the authentication is done through the process of claiming an
identity and verifying the validity of this claim, such as using a username and
a password.
This combination is most common and simplistic, however has plenty of room for
improvements and derivations, like limited-use passwords.
An alternative approach to authentication is considered to be unforgeability,
such as a physical key or a magnetic plastic card, which can prove to be
challenging to fabricate.
Audio: https://voca.ro/1dgZU8VzBSRI
· #211
Chervony Eugene RT-212(Yershova) (Thursday, 05 May 2022 11:25)
Exam Topic #2 (Commercial use of radio)
Commercial radio provides brands with a way to speak to millions of people via a
medium they trust. Radio advertising also stretches beyond the traditional 30
second ad, with longer ads, sponsorship, branded content and innovate digital
solutions increasingly providing advertisers with new and more creative ways to
get their message to potential customers. Advertisers can direct their message
to specific demographics, psychographics, geographic areas, and around events
and genres in a market. Radio advertisements are tailored to particular times of
day to ensure you're reaching your desired audience at precisely the right time.
· #210
Chervony Eugene RT-212(Yershova) (Thursday, 05 May 2022 11:24)
Exam Topic #1 (Development of television in your home country)
According to the historical chronicle, the opening of television broadcasting in
Kyiv took place on February 1, 1939. In addition, in the mid-30s, TV experiments
were carried out in Odessa. However, the television that was tried to be
introduced in Ukraine in the 1930s was not quite the electronic television that
we have now, but mechanical. Mechanical television had only one plus compared to
electronic: its programs, transmitted in the medium wave range, could be
received over a vast territory. A new page of Ukrainian television - already
electronic - was opened already in 1951.
· #209
Yershova Y. (Thursday, 05 May 2022 11:24)
Pishtoi Misha (PT-212) Yershova (Thursday, 05 May 2022 11:12)
I am glad you find that article interesting, but your review should be more
detailed and contain the title of the article and more facts about the subject
discussed. Mind: the article TELLS.. Go on practising your fluent reading.
· #208
Povoznikov Artem RZ-212 (Popovych) (Thursday, 05 May 2022 11:23)
Today i have read the article: Study shows laboratory-developed protein spikes
consistent with COVID-19 virus. This article tels about researchers who
conducted experiments on artificial protein spines. They were crafted with
precision like the thorns that are located on the Covid-19 virus. Many copies
were developed in different scientific laboratories and each was similar to each
other. Using these thorns, scientists began to better investigate the virus,
which in turn helps to develop a vaccine and produce antibody tests.In April
2020, Professor Crispin and his team took samples of each type of thorns and was
able to find out that all the different batches of the spike protein mimic key
features. Glycosylation of inactivated virions. They also managed to find out
that bilok has a great effect on the structure of glycans. This information can
help in the fight against new types of viruses.
I
think this is a great approach and with its help we can get closer to victory in
the Coronavirus.
Text:
https://phys.org/news/2021-07-laboratory-developed-protein-spikes-covid-virus.html
Audio:
https://voca.ro/1acE5zJaaJrU
1)
Distinct from
Therefore it's unlikely many people will find, let alone read it. For
transparency, the policy should be easy to find, clearly labelled and presented
as distinct from HealthEngine's regular policies.
2)
Estimate the effects of
The tool can also estimate the effects of felling existing woodland by
calculating the health costs attributable to the PM2.5 that would no longer be
removed from the air by those trees.
3)
Examine more closely
We also examine the computer science discipline and degree levels more closely.
Audio:https://voca.ro/1bkHQBvFqxDR
· #207
Stanislav Popik РТ-212 (Yershova) (Thursday, 05 May 2022 11:21)
Exam topic #1“Cable television”
Cable TV in the modern world is already less popular than 5 years ago. Now
satellite and Internet television are popular. These are faster ways to receive
a signal than cable. It's also cheaper and better quality. Cable TV has
significant signal loss and the cost of running wires is higher. A couple of
years ago, cable television left Ukraine, analog signals no longer come to our
TVs, and we stepped forward in this area. I believe that progress can`t be
stopped and this is the right decision, we must improve and develop the types of
signal transmission and our television vision.
https://voca.ro/115prOs5YziK
· #206
Stanislav Popik РТ-212 (Yershova) (Thursday, 05 May 2022 11:19)
Today i have read the article called"A highly performing transistor based on an
inorganic metal halide perovskite" which tells us about transistors. Transistors
are electronic components that amplify and control the flow of electricity
within most electronic devices in existence. The principle behind the operation
of the new transistors is similar to the principle underlying the operation of
conventional enhancement-mode silicon transistors. computers, TVs and
smartphones. At present, the developed tin-based transistor shows high
performance, but its stability in air is low.
I believe that even such well-established technologies need to be improved.
https://techxplore.com/news/2022-03-highly-transistor-based-inorganic-metal.html
https://voca.ro/1fWGshGyQXo4
1)estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
2)examine more closely
To understand the technique, I will examine the instructions more closely.
3)distinct from
Such people often live in politically marginalized groups distinct from the
dominant culture.
https://voca.ro/1bKtSRGdxGR4
· #205
Kate Kholodova (RZ-212, Popovych) (Thursday, 05 May 2022 11:17)
Today I have read the article "Crossing the line: How robots can rule the
roads". It tells about artificial intelligence in transport, designed to
optimize traffic. While many argue, trusting a computer to control the road with
other people can be dangerous - scientists are doing research on road behavior
in order to create their own "robots" as safely as possible. This system will
help to optimize traffic, making it more unloaded, and in addition to relieve
humanity from the need for transportation, for example, and other activities
where you need to constantly move around the city by car. Scientists are
convinced that this technology is really necessary.
In my opinion, the main disadvantage is that it reduces the value of human
labor, therefore it leaves people without work. But I think if they will teach
robots they will do a perfect job.
Article: https://techxplore.com/news/2021-10-line-robots-roads.html
Audio: https://voca.ro/17D5AxeHCLbj
1) distinct from
Those procedures were distinct from the regular monitoring procedure based on
periodic reports.
2) examine more closely
There are compelling reasons to examine more closely the feasibility of
irrigating trees and forests plantations with wastewater.
3) estimate the effects of
If based on reliable data, they could be used to estimate the effects
of reducing atmospheric concentrations of SO2 and other air pollutants.
Audio ph: https://voca.ro/19mTsdAv6guI
Exam topic: Passwords and their drawbacks
These common password requirements for computer systems are designed to prevent
unauthorized access to personal and often confidential information. Secure
passwords are usually composed of upper and lower case letters combined with
numbers and special characters and are at least six characters long. The biggest
problem is remembering long and complex passwords. The complex characteristics
of secure passwords pose an annoying problem for password users. That is, while
such passwords are difficult for attackers to guess, they are generally much
more difficult for authorized users to remember.
Audio: https://voca.ro/15tn8J0ZS66T
· #204
Yershova Y. (Thursday, 05 May 2022 11:17)
Arina Omelchenko RE-211 (Yershova) (Thursday, 05 May 2022 11:08)
I appreciate your comment, it’s quite informative, but rather long. Please,
mention the article's name as well.
· #203
Yershova Y. (Thursday, 05 May 2022 11:14)
Tomchishina Polina RT-212(Thursday, 05 May 2022 )
Your exam topics #8, #2 are well done, thanks.
· #202
Tihonov Ivan (RZ-213 Vorobyova E.V) (Thursday, 05 May 2022 11:12)
1.
distinct from
translate: отличаются от
example: This is how a windows system distinct from a linux system.
2. estimate the effects of
translate: оценивать воздействие
example: Page three describes the casualties estimates As well as secondary
effects.
3. examine more closely
translate: для более тщательного изучения
example: We assure you that the issue will be more thoroughly investigated this
Saturday
I read an article today about Chinese hackers attacking the power grid in India.
The attack was reportedly carried out over a long period of time by an American
group of hackers sponsored by China. The group mainly used the ShadowPad Trojan,
which was developed by Chinese cybersecurity experts. Zhao Lijian, a spokesman
for China's foreign ministry, reported that China does not support any kind of
virus attacks, and is fighting them. He also said that if information companies
care about their security, they should be more vigilant about the actions of
hackers from the U.S. and China. After a brief lull after its first report,
Recorded Future reported that the Insikt Group had once again begun monitoring
hacking attempts at network organisations in India. The attempted attacks
targeted "government load control centres" near the disputed border in Ladakh,
where 24 people were killed in a June 2020 clash between Chinese and Indian
troops. This conflict has been going on for a very long time, the Chinese have
been at war with the Indians for a very long time.
article:
https://techxplore.com/news/2022-04-chinese-hackers-reportedly-india-power.html
voice: https://voca.ro/1dvnhyJC8rfN
· #201
Pishtoi Misha (PT-212) Yershova (Thursday, 05 May 2022 11:12)
Today I have read an article that talks about the lack of bluetooth devices.
Researchers have found security flaws in more than 480 Bluetooth devices. In my
opinion, this is very important. Where are the manufacturers looking ?!
They can affect medicine because there are devices that work on bluetooth. Such
as pacemakers, blood glucose monitors, and drug delivery devices.
Many vendors have already developed patches for software development kits.
For better or worse, the threat cannot be launched over the Internet. I really
liked this article. You need to know about the threat in advance
https://techxplore.com/news/2020-02-sweyntooth-vulnerabilities-bluetooth-devices.html
https://voca.ro/12aNQXia2bQe
it is distinct from electrical science and technology
The tool can also estimate the effects of felling existing woodland by
calculating
I thought it would be refreshing to examine more closely some of the more
strategic
https://voca.ro/1lwazWtbzc6L
· #200
Arina Omelchenko RE-211 (Myhayliuk S.L.) (Thursday, 05 May 2022 11:12)
Examine topic #15 (Lithography tools)
Lithography equipment includes different methods of creating a printed image
scheme, such as photolytography using a mask or template and nanolitography that
uses an electron beam image to obtain a template. Another type of lithography
process is used to create three -dimensional prototypes. Stereolithography
creates three -dimensional object drawings by tracking the laser beam on the
surface of the polymeric material of the container. The laser beam strengthens
the layer, which is then built into the polymer and the other layer hardens.
This process continues until the three -dimensional prototype is completed.
There are four types of lithography equipment: mask aligners steppers, direct
writing tools and wafer inspection tools.
https://voca.ro/1huh17ceZShV
· #199
Yershova Y. (Thursday, 05 May 2022 11:11)
Eugene Chervony RT-212(Yershova) (Thursday, 05 May 2022 11:00)
Good work, thorough and clear, thank you.
· #198
Arina Omelchenko RE-211 (Yershova) (Thursday, 05 May 2022 11:08)
phrases of the day:
examine more closely
We also examine the computer science discipline and degree levels more closely.
estimate the effects
To estimate the effects of police militarization on crime and officer safety, he
returned to the nationwide panel he had built.
distinct from
Healthcare is distinct from other sectors in that the manipulation of critical
infrastructure has the potential to directly impact human life.
https://voca.ro/1lP70a8e9FNN
Today I’ve read the article about the electrolyte design strategy for making
divalent metal batteries. Such metals as calcium and magnum are much more
affordable and accessible than usual lithium. However, the main impediments of
these metals are low working voltages, poor metal migration into the cathode and
less than desired cycling performance caused by the absence of an electrolyte
that does not cover the anode. A group of researchers from the University of
Maryland has designed a strategy for making magnum an appropriate material for
batteries. Their strategy involved the chelating agents interactions with
cations to improve the reversibility of the battery and its charge-transfer
kinetics. In my opinion, this research has led us to the opportunity to get rid
of the toxic and expensive lithium and replace it with more appropriate metal
such as magnum.
article:
https://phys.org/news/2021-10-electrolyte-strategy-divalent-metal-batteries.html
audio: https://voca.ro/1ktjdTG6ykj6
· #197
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 05 May 2022 11:08)
Exam Topic #2 (Benefits of Satellite TV)
Cable TV often cannot give a good and clear picture, which always upsets the
viewer. In this case, you can purchase a satellite dish that provides a
high-quality digital image. Of the main advantages of a satellite dish, the
following can be distinguished: digital sound and image quality, a large
selection of channels, more profitable cost, broadcasting channels in foreign
languages. Many pay-per-view satellite TV channels give viewers the opportunity
to watch a show/series several weeks in advance. Of course, there are downsides
to satellite TV. The first is its sensitivity. During heavy rain, snow or
storms, image quality deteriorates, but experts say that this is only a matter
of correct and accurate installation.
https://voca.ro/11Tlco2DYqUd
· #196
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 05 May 2022 11:06)
Exam Topic #8 (Radio equipment helping to save on bills)
At the time, many experts in America said that radio would kill the record
industry. It allowed the public to listen to music for free, for which they
paid. While some companies saw radio as a new means of promotion, others feared
it would cut into profits from record sales and live performances. Many record
companies did not license their recordings for radio play, and their main stars
signed agreements that they would not perform on radio broadcasts. Indeed, the
recording industry plummeted in profits after the advent of radio. The number of
transmitters grew, and record sales fell.
https://voca.ro/1OuOeCGL7d14
· #195
Yershova Y. (Thursday, 05 May 2022 11:06)
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 05 May 2022 10:56)
Your comment is clear as well as the task with the phrases. Check the
pronunciation: read (3rd form) extremely key. Don't forget about the exam topic.
· #194
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 05 May 2022 11:04)
Today I have read the article called "Electric gains in battery performance"
This article is about zinc ion batteries. They will allow stationary storage of
energy, which promises to be cheaper, safer and more environmentally friendly
than lithium-ion batteries. Previously, this type of battery drained very
quickly, but now scientists have developed a new combination of electrolyte and
electrode that has improved several aspects of their performance. These
batteries will make it possible to switch to ecological energy sources and move
away from fossil fuels.
Given that the cost of creating this battery is low, and the performance is
higher, I believe that these batteries will replace not only lithium-ion, but
also graphite, which is so much talked about.
https://voca.ro/1np6CtJnykdc
https://techxplore.com/news/2021-08-electric-gains-battery.html
1) examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
Доречно більш уважно вивчити зобов’язання держав за МПЕСКП «вжити заходів».
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
Він зміг оцінити вплив викидів на здоров’я людини та біорізноманіття.
3) distinct from
Engineering and technology are disciplines distinct from one another and from
science.
Інженерія та технологія – це дисципліни, відмінні одна від одної та від науки.
https://voca.ro/1e4aCG8AWHx3
· #193
Eugene Chervony RT-212(Yershova) (Thursday, 05 May 2022 11:00)
Today I have read the article "Engineered crystals could help computers run on
less power". It says that computers may be growing smaller and more powerful,
but they require a great deal of energy to operate. In a study engineers
describe a major breakthrough in the design of a component of transistors, that
could significantly reduce their energy consumption without sacrificing speed,
size or performance. The new study shows how negative capacitance can be
achieved in an engineered crystal composed of a layered stack of hafnium oxide
and zirconium oxide. To sum up, their goal is to reduce the energy needs of this
basic building block of computing, because that brings down the energy needs for
the entire system.
https://techxplore.com/news/2022-04-crystals-power.html
https://voca.ro/11It38c5ww9z
Phrases:
1) distinct from
Our new research is distinct from last year research.
2) examine more closely
We were able to obtain new samples to examine more closely these fumes.
3) estimate the effects of
Previously used different emission spectra to estimate the effects of radiation.
https://voca.ro/1jU82ZExNzQr
· #192
Timophey Sipin RZ-212(Popovych) (Thursday, 05 May 2022 10:59)
Today l have read the article titled «Viewpoint -- Give Yourself Some "Wiggle
Room" to Drive Innovation and Change».Text tells us about the nessesary for
people to change and improve themselves (talking about improvements in
technology),but at the same time people are not ready to make changes in their
lives. The article explains to us away out of this situation,the so-called
golden mean, in which we will have practically no risks and we will be able to
observe the success and progress in technology. In my opinion, this article
helps us to correctly assess risks and motivates us to innovate and progress.
https://voca.ro/1f7tDhl2LXQ6
https://www.industryweek.com/leadership/companies-executives/article/21952121/viewpoint-give-yourself-some-wiggle-room-to-drive-innovation-and-change
1.estimate the effects
Very few studies have attempted to estimate the effects of past climate change
on air quality and health.
2.examine more closely
However, it might be worthwhile to examine more closely the differences between
the Secretariat and its counterparts in New York, namely, UNICEF and UNDP.
3.distinct from
It is distinct from electrical science and technology, which deal with the flow
of electrons and other charge carriers through metal conductors such as copper.
https://voca.ro/1gUi2YXLfd
· #191
Timophey Sipin RZ-212(Popovych) (Thursday, 05 May 2022 10:57)
Topic 8 Passwords and their drawback
Now everyone knows what a password and login are, but not everyone knows how to
safely store an
use them.
Using one password for all sites is extremely dangerous. Having hacked one
user's page, hackers have easy access to all the others: financial services,
cloud services, e-mail and other user applications. Therefore, unique passwords
are created for each resource.
In order not to worry, you can use password managers - these are specialized
services for secure storage of all codes. They securely encrypt data: passwords,
logins, information about the service where you want to enter passwords and
logins.
https://voca.ro/1amxqirg
· #190
Lebedeva E. (Thursday, 05 May 2022 10:57)
Andrey Mashovets RZ-212
Nikitina Anastasia RZ-212
Your reviews are rather interesting, keep on working.
· #189
Tomchishina Polina RT-212 (Yershova Y.A.) (Thursday, 05 May 2022 10:56)
1.
Distinct from
It is distinct from electrical science and technology, which deal with the flow
of electrons and other charge carriers through metal conductors such as copper.
2. Examine more closely
We also examine the computer science discipline and degree levels more closely.
3. Estimate the effects of
Rather than using complex computer models to estimate the effects of
greenhouse-gas emissions, Lovejoy examines historical data to assess the
competing hypothesis.
https://voca.ro/1jnsrnnIqSuW
Today I have read the article « Establishing the boundaries of quantum secure
communications». This article is about the breakthrough in quantum secure
communication. Today's classic means of communication are potentially vulnerable
to interceptors. Conventional data encryption is based on the factorization of
large integers that are easily solved on a quantum computer. Both parties can
distribute secret keys in a two-point connection. Therefore, the establishment
of these restrictions is extremely important for both theorists and
experimenters. I believe this is a groundbreaking result because it sets a
marginal performance that no two-point quantum key distribution protocol can
surpass.
https://voca.ro/13gTtRng40XO
https://phys.org/news/2017-04-boundaries-quantum.html
· #188
Lebedeva E. (Thursday, 05 May 2022 10:55)
To
Artem Kotliarov RZ-212
Your task is absolutely complete and informative. Thank you.
· #187
Andrey Mashovets RZ-212(Lebedeva E.) (Thursday, 05 May 2022 10:53)
Today I’ve read the article “Chinese hackers reportedly target India's power
grid'”.
This article is about India’s Energy Sector has been targeted by hackers in an
operation believed to have been carried out by a state-sponsored Chinese group,
the American private cybersecurity company.
The purpose of this article is to understand the situation of the attack of
Chinese hackers.
"The objective for intrusions may include gaining an increased understanding
into these complex systems in order to facilitate capability development for
future use or gaining sufficient access across the system in preparation for
future contingency operations,"
I believe this article will be interesting for people working and interested in
cybersecurity.
https://voca.ro/1lVKt8Ppq61G
https://techxplore.com/news/2022-04-chinese-hackers-reportedly-india-power.html
1.estimate the effects
Very few studies have attempted to estimate the effects of past climate change
on air quality and health.
2.examine more closely
However, it might be worthwhile to examine more closely the differences between
the Secretariat and its counterparts in New York, namely, UNICEF and UNDP.
3.distinct from
It is distinct from electrical science and technology, which deal with the flow
of electrons and other charge carriers through metal conductors such as copper.
https://voca.ro/1gUi2YXL0vln
· #186
Yershova Y. to PT-212, PE-211 (Thursday, 05 May 2022 10:45)
Dear students! The lesson has started, I am waiting for your reviews and audio recordings, exam topics as well. Do not forget about Phrases of the day practice. Good luck!
· #185
Dasha Semidetnova RZ-213 (Vorobyova) (Thursday, 05 May 2022 10:43)
1.
These procedures differed from the normal monitoring procedure based on periodic
reports.
Ці процедури відрізнялися від звичайної процедури моніторингу на основі
періодичних звітів.
2. There are good reasons for a more thorough study of the feasibility of
irrigating trees and forests with wastewater.
Існують вагомі підстави для більш ретельного вивчення доцільності зрошення дерев
та лісових насаджень стічними водами.
3. We are very optimistic about the whole trend of wearable electronics,
especially regarding the integration of these energy storage devices with energy
storage devices.
Ми дуже оптимістично ставимося до всієї тенденції носимої електроніки, особливо
щодо інтеграції цих пристроїв накопичення енергії з накопичувачами енергії.
Designed by Jacobs School of Engineering scientists, the long-sleeved shirt can
store and store energy while the wearer is moving or exercising. The school's
nanoengineers expect that the prototype will someday be improved to the point
where electronic devices such as mobile phones won't depend on the electrical
grid for power, but will be able to run on items of clothing people wear every
day. The shirt collects energy from the human body, which can be stored and then
used to power small electronics such as LCD wristwatches. Biofuel cells, which
are powered by sweat generated by the wearer, are located inside the shirt on
the chest. They are lightweight, flexible, and won't bend, fold, or wrinkle. The
shirt can be washed in water if no detergent is used. The energy generated by
waving the user's arms while running or walking works on the same principle as
static electricity. We are definitely moving towards the next generation of
electronics.
https://voca.ro/1k4IXK0EtyMf
· #184
Artem Kotliarov RZ-212 (Lebedeva E.) (Thursday, 05 May 2022 10:34)
1)
1. estimate the effects
To estimate the effects of police militarization on crime and officer safety, he
returned to the nationwide panel he had built. - Щоб оцінити вплив мілітаризації
поліції на злочинність і безпеку офіцерів, він повернувся до створеної ним
загальнонаціональної панелі.
2. distinct from
It is distinct from electrical science and technology, which deal with the flow
of electrons and other charge carriers through metal conductors such as copper.
- Він відрізняється від електричної науки та техніки, які мають справу з потоком
електронів та інших носіїв заряду через металеві провідники, такі як мідь.
3. examine more closely
If they took the time to more closely examine the environment, they usually find
that the processor is not the bottleneck that believe it to be. - Якщо вони
знайшли час, щоб уважніше вивчити навколишнє середовище, вони зазвичай
виявляють, що процесор не є вузьким місцем, як вважають.
https://voca.ro/163QAxjIDoUj
2) Today, І have read thе аrtісlе «Chinese hackers reportedly target India's
power grid»
Over the past few months, the Massachusetts-based Insikt Group said it had
gathered evidence that hackers had attacked seven Indian government centres
responsible for monitoring the power grid near the border area. The group mainly
used the ShadowPad Trojan, which is believed to have been developed by
contractors for China's Ministry of State Security.
In my opinion the purpose of intrusions may include a deeper understanding of
these complex systems to facilitate the development of opportunities for future
use or to gain sufficient access to the entire system in preparation for future
emergency operations.
https://techxplore.com/news/2022-04-chinese-hackers-reportedly-india-power.html
https://voca.ro/1kNvVUkh8H3W
3) Exam topic #11 ("The differences between a software and hardware firewall.")
It would seem that software firewall and hardware firewall perform the same
function - they protect the computer from unauthorized access, but they use
completely different methods and work in completely different conditions. The
main difference between a hardware firewall and a software firewall is that the
hardware firewall runs on its own physical device, while a software firewall is
installed on another machine. A common example of a software firewall is the
firewall built into most operating systems like Windows and macOS. These OS
firewalls are bundled with the operating system and can run on any compatible
hardware.
https://voca.ro/1cCjcWMQh3Pk
· #183
Vorobyova E. to Rudko from РЗ-213 (Thursday, 05 May 2022 10:33)
I accept your class and home work. There are no mistakes in them. Thank you.
· #182
Vorobyova E. to Mitriev from РЗ-213 (Thursday, 05 May 2022 10:30)
As
for your home work: please, don’t omit the articles where necessary, e.g. “Today
I have read AN interesting article about THE methods…”
As for your exam topic, it’s well done, full of details and your point of view
is meaningful. I share it. Thank you and continue working. Don’t forget about
the commentary on the article. It’s obligatory. Good luck.
· #181
Nikitina Anastasia RZ-212(Lebedeva E.) (Thursday, 05 May 2022 10:28)
Exam topic #12 (Hardware firewall)
Firewalls are special security computer programs that constantly scan, receive,
and send data to the Internet. Figuratively speaking, these are virtual walls
that protect your computer from the dangers of the Internet: viruses, rootkits,
spyware, and so on. However, it is worth noting that a firewall is not the only
or most reliable source of protection for your computer. Typically, for maximum
security, a firewall always works with antivirus and antispyware software.
In most cases, the firewall is installed directly on the work machine (PC), but
sometimes, as in the case of different offices, where there are many computers,
the firewall is placed as a physical device
https://voca.ro/1ar3Qcn6oCdd
1.examine more closely
We also examine the computer science discipline and degree levels more closely
Ми також вивчаємо дисципліну з інформатики та рівні дипломніше
2.estimate the effects of
To estimate the effects of police militarization on crime and officer safety
Щоб оцінити вплив мілітаризації поліції на злочинність та безпеку офіцерів
3.distinct from
It is distinct from electrical science and technology
Він відрізняється від електротехніки
https://voca.ro/1jBwM9GR8JWI
· #180
Pishtoi Misha (PT-212) S.Mykhailiuk (Thursday, 05 May 2022 10:27)
Today I have read the article called "Study: Expanding teleworking would reduce
pollution by up to 10%". According to research, air NO2 level dropped during
Barcelona quarantine. NO2 is one of the elements of traffic emissions. It is
easy to understand the connection between these two statements. This study
looked at introducing teleworking a few days a week to reduce overall air
pollution. And it shows that the more people work remotely, the cleaner the air
will be. Of course, not all professions allow you to work at home. I have
already read many articles and noticed how much the pandemic has affected our
lives, a lot of research has been done. I think this article is really relevant.
https://phys.org/news/2021-09-teleworking-pollution.html
речення
it is distinct from electrical science and technology
(это отличается от электротехнической науки и техники)
The tool can also estimate the effects of felling existing woodland by
calculating
(Инструмент также может оценить последствия вырубки существующих лесных массивов
путем расчета)
I thought it would be refreshing to examine more closely some of the more
strategic
(Я подумал, что было бы полезно более подробно изучить некоторые из наиболее
стратегических)
https://voca.ro/1hJ7MjWOCFRH
· #179
Igor Rudko (RZ-213) (Vorobyova E. V.) Home-work (Thursday, 05 May 2022 10:26)
Audio: https://voca.ro/1gsRxtdPzTS0
Article:
https://phys.org/news/2013-07-million-deaths-annually-air-pollution.html
Today I have read the article: "Researchers estimate over two million deaths
annually from air pollution". Over two million deaths occur each year as a
direct result of human-caused outdoor air pollution, a new study has found. In
addition, while it has been suggested that a changing climate can impact the
effects of air pollution and increase death rates, the study shows that this has
a minimal effect and only accounts for a small proportion of current deaths
related to air pollution. In my opinion, it is a total disaster, that this
problem is in our society, so we need to reduce air pollution and save our
ecology for our lives
Phrases
Audio: https://voca.ro/1168iaghDtCH
1) We also examine the computer science discipline and degree levels more
closely - Ми також уважніше вивчаємо дисципліну з інформатики та рівні ступеню
2) Scientists use complex computer models to estimate the effects of
greenhouse-gas emissions - Вчені використовують складні комп’ютерні моделі для
оцінки впливу викидів парникових газів
3) The policy should be easy to find, clearly labeled, and presented as distinct
from HealthEngine's regular policies - Політику слід легко знайти, чітко
позначити та представити на відміну від звичайних правил HealthEngine
· #178
Lebedeva E. (Thursday, 05 May 2022 10:26)
To
RZ-212
Dear students.
The lesson will start soon, I am waiting for your reviews, exam topics and
sentences with phrases.
· #177
Vorobyova E. to Chabanenko from РЗ-213 (Thursday, 05 May 2022 10:24)
Your sentences with new phrases are performed correctly. Your exam topic is well done too. I am waiting for your commentary on the article. Good luck.
· #176
Arina Omelchenko RE-211 (Myhayliuk S.L.) (Thursday, 05 May 2022 10:22)
phrases of the day:
We also examine the computer science discipline and degree levels more closely.
Ми також уважніше вивчаємо комп'ютерні дисципліни та наукові степені.
To estimate the effects of police militarization on crime and officer safety, he
returned to the nationwide panel he had built.
Щоб оцінити вплив мілітаризації поліції на злочинність та безпеку офіцерів, він
повернувся до загальнонаціональної панелі, яку він створив.
Healthcare is distinct from other sectors in that the manipulation of critical
infrastructure has the potential to directly impact human life.
Охорона здоров’я відрізняється від інших секторів тим, що маніпулювання
критичною інфраструктурою може безпосередньо вплинути на життя людей.
https://voca.ro/1lP70a8e9FNN
Today I’ve read the article about a new material for the battery of the future.
Renewable sources of energy are not steady. One day they produce too much
energy, another day - not enough. We need to store green energy as we plan to
move away from fossil fuels. Li-ion batteries are the best option for this goal
right now. However, there are some flaws in this technology such as high
flammability. The main reason of Li-ion batteries catching on fire is liquid
organic electrolytes. In the meantime, solid electrolytes are less mobile and
efficient. A group of researchers from UCLouvain have disclosed a new material,
LiTi2(PS4)3, or LTPS. The level of diffusion coefficient in LTPS is the highest
of all solids. But there's still a need for further researches to enable its
commercialization in future. In my opinion, this research might be very
perspective as it paves the way for the search for new materials with similar
diffusion mechanisms.
https://voca.ro/1cfRh1sxe0lO
https://phys.org/news/2019-07-material-battery-future.html
· #175
Vorobyova E. to Shpychka from РЗ-213 (Thursday, 05 May 2022 10:22)
Your commentary on the article is written correctly as well as your Phrases of the Day Practice and exam topic. Thank you.
· #174
Lebedeva E. (Thursday, 05 May 2022 10:21)
To
Denis Zavadsky RZ-211
Well done, keep on working.
· #173
Stepanenko Vladislav (RT-212) (S.Mykhailiuk) (Thursday, 05 May 2022 10:14)
Benefits of Satellite TV.
The time when satellite television was an expensive pleasure has long passed and
has decreased in price many times since its inception. Analog TV is gradually
fading into the background, giving way to satellite TV. One of the main
advantages of satellite TV is the picture and sound quality. Many channels are
already broadcasting in high definition (HD) format and using stereo sound,
which will allow you to fully enjoy your favorite movie or sports broadcast.
Also, the ability to connect a huge selection of TV channel packages for every
taste and create individual channel lists, the ability to record TV shows and
movies and watch them at a convenient time for you. In my opinion, analog TV
loses to satellite in everything, except that the signal on satellite depends on
the weather and sometimes needs to be reconfigured.
https://voca.ro/1dlKjgGhhJYz
· #172
Igor Rudko (RZ-213) (Vorobyova E. V.) (Thursday, 05 May 2022 10:13)
Audio: https://voca.ro/1eyaMtbzJZWh
Article: https://phys.org/news/2019-07-online-trees-air-quality-health.html
Today I have read the article: "Online calculator shows how trees can improve
air quality and cut health costs". A new interactive online tool is set to
encourage tree planting across the UK. In fact, it calculates how much pollution
would be removed by planting trees in local areas, as well as the corresponding
public health cost savings. By the way, the tool can also estimate the effects
of felling existing woodland by calculating the health costs attributable to the
PM2.5 that would no longer be removed from the air by those trees. In my
opinion, trees make urban areas more attractive and improve local air quality,
thereby boosting people's health. As our ongoing research has shown, this in
turn can have significant positive economic benefits.
Phrases
Audio: https://voca.ro/1n98opw403L3
1) Consequently, I thought it would be refreshing to examine more closely some
of the more strategic success stories. - Отже, я подумав, що було б цікаво
детальніше вивчити деякі з найбільш стратегічних історій успіху.
2) The tool can also estimate the effects of felling existing woodland. -
Інструмент також може оцінити наслідки вирубки існуючого лісу.
3) It is distinct from electrical science and technology, which deal with the
flow of electrons and other charge carriers through metal conductors such as
copper. - Він відрізняється від електричної науки та техніки, які мають справу з
потоком електронів та інших носіїв заряду через металеві провідники, такі як
мідь.
Exam topic: Different protection Mechanism
Audio: https://voca.ro/1eesErp1E9YD
Protection mechanisms are used to enforce layers of trust between security
levels of a system. Layering is specific to protecting operating system
resources and setting security zones. Sometimes access to data should not be
provided—for example, data values within an application module that are used for
internal calculations. In this case, no access methods are provided as an
interface to this data. Encryption uses a secret key, a private value, to
perform a mathematical function on the data. In my opinion, without a protection
mechanism, it would be impossible to prevent individual users from having full
access to the system.
· #171
Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (Thursday, 05 May 2022 10:07)
Exam topic #9 (Functions of firewalls)
(yesterday i send you homework, could you check it. Thank you!)
Firewalls are important because they have had a huge influence on modern
security techniques
and are still widely used. They first emerged in the early days of the internet,
when networks
needed new security methods that could handle increasing complexity. Firewalls
have since become
the foundation of network security in the client-server model – the central
architecture of modern
computing. Most devices use firewalls – or closely related tools – to inspect
traffic and mitigate
threats. In my opinion, not even programmers must use firewalls, everyone should
to learn how to update
his Internet privace.
· #170
Yershova Y. (Thursday, 05 May 2022 10:01)
Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 05 May 2022 09:52)
Your comment on the article is quite good and very useful, but don't forget abut
100 words. Thank you for your effective work with the phrases.
· #169
Chabanenko Ksenia RZ-213(Vorobyova E.V) (Thursday, 05 May 2022 09:59)
1.examine more closely- уважніше дослідити /вивчити;
Rather than bemoaning a new age of anxiety , we need to examine more closely the
anxieties of our age.-Замість того, щоб оплакувати нову епоху тривоги, нам
потрібно уважніше вивчити тривоги нашого віку.
2.distinct from- відрізняється від;
However,evidence indicates it was distinct from his fingerprints.-Однак докази
показують, що це відрізнялося від його відбитків пальців.
3.-estimate the effects of-оцінити вплив/наслідки;
Summary of approaches is used to estimate the effects of measures.-Резюме
підходів використовується для оцінки наслідків заходів.
https://voca.ro/1infa5kVMtEI
Exam topic #20(Principles of information protection)
Information security covers the tools and processes like policy settings that
prevent unauthorized people from accessing business or personal information. Its
aim is to protect sensitive information from unauthorized activities, including
inspection, modification, recording, and any disruption or destruction.
Information protection is based on the CIA Triad concept which consists of three
main principles: confidentiality, integrity and availability.Confidentiality
principle means the necessity of keeping personal information private and
ensuring that it is visible and accessible only to those individuals who own it
or need it to perform their organizational functions.The principle of integrity
ensures that data is accurate and reliable and is not modified incorrectly,
whether accidentally or
maliciously.Availability is the protection of a system’s ability to make
software systems and data fully available when a user needs it (or at a
specified time). So these three principles are main in data security and
observance of each can satisfy the need of basic protection.
https://voca.ro/1fcaqGgp2Hmf
· #168
Denis Zavadsky RZ-211 Lebedeva (Thursday, 05 May 2022 09:59)
A
robot "chef" has been trained to taste food at different stages of the chewing
process to assess whether it's sufficiently seasoned.
Working in collaboration with domestic appliances manufacturer Beko, researchers
from the University of Cambridge trained their robot chef to assess the
saltiness of a dish at different stages of the chewing process, imitating a
similar process in humans.
I consider this a good achievement, because it can prevent many cases of
poisoning among people by the wrong food.
There are compelling reasons to examine more closely the feasibility of
irrigating trees and forests plantations with wastewater.
It was able to estimate the effects of emissions on human health and
biodiversity.
This role was distinct from law enforcement but complementary.
Існують вагомі причини для більш ретельного вивчення доцільності зрошення дерев
та лісових насаджень стічними водами.
Він зміг оцінити вплив викидів на здоров’я людини та біорізноманіття.
Ця роль відрізнялася від правоохоронної, але доповнювала.
https://techxplore.com/news/2022-05-future-robot-chef.html
https://voca.ro/1dOWDqeNGavV
· #167
Yershova Y. (Thursday, 05 May 2022 09:57)
Bogdan Gorbatiy РЗ-211 (Yershova) (Thursday, 05 May 2022 09:44)
Your comment is thoughtful, thank you, but rather long, it must be around 100
words. Go on practising your reading.
· #166
Botsaniuk Ivan RZ-211 (Yershova) (Thursday, 05 May 2022 09:52)
Today I have read the article ”Can your mobile phone get a virus? Yes, and
you'll have to look carefully to see the signs”. Last year, cyber security
company Kaspersky detected nearly 3.5 million malicious attacks on mobile phone
users. The spam messages we get on our phones via text message or email will
often contain links to viruses, which are a type of malicious software.
According to a global report commissioned by private company Zimperium, more
than one-fifth of mobile devices have encountered malware. So, in my opinion
people should watch the signs as: poor performance, such as apps taking longer
than usual to open, or crashing randomly; excessive battery drain; increased
mobile data consumption; unexplained billing charges; unusual pop-ups, and the
device overheating unexpectedly. And on top of that users must install
antiviruses on their devices.
https://techxplore.com/news/2022-04-mobile-virus-youll-carefully.html
https://voca.ro/1csjMriUVerH
distinct from
The structure of the neuron is absolutely distinct from all other cells in the
human body.
estimate the effects of
The economic studies that estimate the effects of counteradvertising
consistently find that counteradvertising is an effective method of reducing
consumption.
examine more closely
Let us now examine more closely the structure of this system , whose essential
details have been merely outlined in Part I of this paper .
https://voca.ro/1bv2MOZ0YQyy
· #165
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 05 May 2022 09:51)
Today i have read the article called"Theoretical Physics: Dark matter and dark
energy are different aspects of a single unknown force"which tells us about
scientific model proposed by Scherrer that can unify dark matter and dark energy
using a second-generation scalar field,which is known as k-essence.The problem
is that dark matter and dark energy behave differently.Dark matter have mass,but
dark energy has quite opposite properties.The k-essence model can change its
behavior over time.For example it looks like dark matter for a while and then it
looks like dark energy.I think this model avoids many previous
obstacles,nevertheless it has some drawbacks.
article:
https://phys.org/news/2004-07-theoretical-physics-dark-energy-aspects.html
audio: https://voca.ro/17Pd5aTHrfLN
1) examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
Доречно більш уважно вивчити зобов’язання держав за МПЕСКП «вжити заходів».
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
Він зміг оцінити вплив викидів на здоров’я людини та біорізноманіття.
3) distinct from
Engineering and technology are disciplines distinct from one another and from
science.
Інженерія та технологія – це дисципліни, відмінні одна від одної та від науки.
https://voca.ro/1e4aCG8AWHx3
· #164
Lebedeva E. (Thursday, 05 May 2022 09:50)
To
Mykola Zhmurak RZ-211
Thank you for your participation in discussion of the article.
· #163
Stepanenko Vladislav (RT-212) (S.Mykhailiuk) (Thursday, 05 May 2022 09:46)
The
new advancement of color Television.
Color television is a television technology that transmits a moving image in
natural colors. All analog color television systems intended for terrestrial
broadcasting followed the principle of compatibility, that is, a color
television broadcast could be received and reproduced by both black and white
and color television receivers. At the same time, black-and-white receivers used
only the luminance signal, which is no different from the usual black-and-white
video signal. Color information was transmitted using an additional signal used
only by color televisions.This decision made it possible to carry out color
broadcasting on the already existing fleet of black-and-white TVs and continue
to produce them as an inexpensive alternative to color receivers. In my opinion,
Television continues to evolve to this day, but the transition to color was one
of the most important steps in its development.
https://voca.ro/1mzlAF0Ci2Xm
· #162
Bogdan Gorbatiy РЗ-211 (Yershova) (Thursday, 05 May 2022 09:44)
Today i have read the article "A soft magnetic pixel robot that can be
programmed to take different shapes". new kind of robots - magnetic robots.
Magnetic soft robots are systems that can change shape or perform various
actions when a magnetic field is applied to them. They have many useful features
including wireless drive, high flexibility and endless endurance. In the future,
micro-scale soft magnetic robots can be implemented in a variety of conditions;
for example, helping people to monitor the environment or perform biomedical
procedures remotely, even if at the moment they can only perform primitive
functions. Although the danger of total government control through the use of
cameras in a magnetic robot increases, I think this invention is quite useful,
with its help we will be able to explore the most unexplored corners of our
planet
https://techxplore.com/news/2021-11-soft-magnetic-pixel-robot.html
https://voca.ro/186LyT6fZmGE
estimate the effects of
1)A few Parties were able to estimate the effect of particular measures.
distinct from
2)This role was distinct from law enforcement but complementary.
examine more closely
3)Executions by guerrilla forces were a controversial issue that he hoped to
examine more closely.
https://voca.ro/12WUVqt0EyL9
· #161
Shpychka Olecksandr/ RZ-213 (Vorobyova E. V.) (Thursday, 05 May 2022 09:44)
Exam topic #8 Passwords and their drawbacks
Many people in today's world are still using passwords like "12345" while this
password guessing has reached a new level where anything can be cracked. Some of
the disadvantages of passwords are the ease of interception or spying on them
and the ability to deceive using different similar websites on which the
password was used.
Now there is two-factor authentication, in which it is very difficult to hack a
person, but even it does not always help.
In my opinion, everyone needs to take a closer look at creating a password in
order to save their data.
· #160
Yershova Y. (Thursday, 05 May 2022 09:43)
Vasilev A.O RZ-211 Yershova Y. (Thursday, 05 May 2022 09:34)
I appreciate your comment, it’s quite informative, but too long, mind that. Go
on working on your reading.
· #159
Shpychka Olecksandr/ RZ-213 (Vorobyova E. V.) (Thursday, 05 May 2022 09:42)
Article: https://techxplore.com/news/2022-04-algorithm-opinions.html
Audio: https://voca.ro/1o2tL6MujpdT
Today i have read the article: "This algorithm has opinions about your face".
From the article, we learn about a new discovery by researchers from the Stevens
Institute. The discovery lies in an algorithm that can evaluate a person's face
by the stereotyped opinions of other people. When meeting, people evaluate the
appearance of a person and build their first opinion on this. It is on this that
the program is built so that people themselves find out what they might think
about them.
In my opinion, this program will help people adapt to new meetings.
Phrases of the day:
1)They then used computer models to estimate the effects on the climate.
2)Those matters must be examined more closely.
3)It is distinct from morbidity rate
Audio: https://voca.ro/11CFMh0wE26y
· #158
Vorobyova E. to Siglyanyk from РЗ-213 (Thursday, 05 May 2022 09:41)
Mind the correct use of the articles: “Today I have had THE opportunity to read THE article about…” Your sentences with new phrases are written, voiced and translated correctly. Thank you.
· #157
Yershova Y. (Thursday, 05 May 2022 09:39)
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 05 May 2022 09:23)
Your comment on the article is very interesting and informative, thank you, but
pay attention to the pronunciation: read (3rd form), artificial. Your work with
Phrases of the Day is good and complete.
· #156
Tomchishina Polina RT-212 ( S. Mykhailiuk ) (Thursday, 05 May 2022 09:38)
Exam Topic #1 (Cable television)
Cable television systems come in two types. In the system of the first type, the
conversion of the transmitted image into a digital signal and the reverse
conversion of the digital signal into an image are carried out directly in the
converters and signal-light. In all links of the image and sound transmission
path, information is transmitted in digital form. Such systems are still under
development. In cable TV systems of the second type, the analog signal received
from the sensors is converted into a digital form, transmitted, and then again
acquires an analog form in the receiver, in which it is fed to the video
monitor. This uses existing analog TV signal sensors and signal-to-light
converters in television receivers.
https://voca.ro/1od2JoS2p8vy
· #155
Vivchar Roman (RF-211) S. Mykhailiuk (Thursday, 05 May 2022 09:36)
Борг за 03.05, вибачте, але я не зміг відправити роботу вчора.
1.
- De facto.
This table is based on de facto information.
Ця таблиця ґрунтується на фактичній інформації.
- Deserves special attention.
Resource monitoring deserves special attention.
Моніторинг ресурсів заслуговує особливої уваги.
- Derived from.
Information derived from resource monitoring will help protect your computer.
Інформація, отримана з моніторингу ресурсів, допоможе зберегти ваш комп'ютер.
2.
Today i have read an article "Chinese hackers reportedly target India's power
grid". This article is about how China unleashed a flurry of cyber attacks on
India and its industry. India's energy sector has been targeted by hackers in a
lengthy operation believed to be carried out by a state-sponsored Chinese group,
an American private cybersecurity company detailed in a new report. Insikt
Group, the threat intelligence arm of Massachusetts-based Recorded Future, said
it had gathered evidence that the hackers targeted seven Indian government
centers responsible for power dispatch and network management near the border
zone disputed by the two parties.
Chinese Foreign Ministry spokesman Zhao Lijian said on Thursday that the report
was "noted" by Beijing, but that China "strongly opposes and combats any form of
cyber attacks, and will not encourage, support or condone any cyber attacks."
“I would like to advise the company concerned that if they truly care about
global cyber security, they should pay more attention to US government cyber
attacks on China and other countries and do more to promote dialogue and
cooperation between countries. use the problem of cyberattacks to create
problems and slander China,” he told reporters.
Indian Foreign Ministry spokesman Arindam Bagchi said India has not discussed
the issue with China.
“We have seen the reports. There is a mechanism in place to protect our critical
infrastructure to keep it resilient. We have not raised this issue with China,”
he said.
The Insikt Group has already discovered and reported on the alleged
Chinese-sponsored hack of 10 Indian energy sector organizations in February 2021
by a group known as RedEcho. A more recent hack "displays consistency in purpose
and capability" with RedEcho, but there are also "noticeable differences"
between the two, so the group was given the working title Threat Activity Group
38, or TAG-38, as more information was gathered. "The goal of intrusions may be
to better understand these complex systems to facilitate development of
capabilities for future use or gain sufficient access to the system to prepare
for future operations in contingencies," Recorded Future said in a statement.
Article:
https://techxplore.com/news/2022-04-chinese-hackers-reportedly-india-power.html
Audio: https://voca.ro/16Waxrszfdjl
· #154
Tomchishina Polina RT-212 (S. Mykhailiuk) (Thursday, 05 May 2022 09:36)
Exam Topic #7 (The new advancement of color Television)
Color television is a television technology that allows you to transmit images
in natural colors. All analogue color television systems intended for
terrestrial broadcasting complied with the principle of compatibility, ie color
television could be received and reproduced by both black and white and color
television receivers. Modern standards for analog color television provide for
the transmission of a brightness signal and two color, still maintaining
compatibility with black and white receivers. The bandwidth occupied by color
signals may be limited by the reduced sensitivity of the human eye to the
clarity of the color image.
https://voca.ro/1kYD8zkUe6zk
· #153
Vasilev A.O RZ-211 Yershova Y. (Thursday, 05 May 2022 09:34)
Today I've read an article called"Canada hospitals use drones to carry lungs for
transplant"
The article tells about unmanned electric drone that deelivers important organs.
The 15-kilogram carbon fibre unmanned electric drone purpose-built by
Quebec-based Unither Bioelectronics flew just 1 kilometers from Toronto Western
Hospital on the city's west side to the roof of the downtown Toronto General
Hospital.The trip at the end of September took less than 10 minutes. It was
automated but kept under the watchful eye of engineers and doctors.
The drone delivery of transplant lungs marked a global first, according to the
company, but a similar flight in April 2019 delivered a kidney to a hospital in
the US state of Maryland.
On the Toronto General Hospital's rooftop, the drone was met by a surgical team
that whisked the package inside and successfully transplanted the lungs into a
waiting patient, saving the life of the 63-year-old man who'd been diagnosed
with pulmonary fibrosis.
In my opinion, this is an excellent and fast method for the delivery of human
organs
https://voca.ro/1oNUOF2CvqeB
https://techxplore.com/news/2021-10-canada-hospitals-drones-lungs-transplant.html
1)examine more closely
I think I will examine it more closely.
https://voca.ro/1nWP11xB6A47
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
https://voca.ro/1z4BBCa9h3sM
3)distinct
The stems have distinct smelling foliage when young.
https://voca.ro/1m0QSdndPbpo
· #152
Mykola Zhmurak RZ-211(Lebedeva) (Thursday, 05 May 2022 09:34)
Today i have read the article titled "A technique that allows robots to detect
when humans need help". This article is about computational tools that could
enhance the performance of socially assistive robots, by allowing them to
process social cues given by humans and respond accordingly. The key objective
of the recent study carried out by Wilson, Aung and Boucher was to allow robots
to automatically process eye-gaze-related cues in useful ways. This invention
will help people with everyday tasks, such as cooking dinner, learning math, or
assembling furniture.
Article - https://techxplore.com/news/2021-11-technique-robots-humans.html
Vocaroo - https://voca.ro/1lEDONpu7IfA
Phrases :
1) estimate the effects of
Very few studies have attempted to estimate the effects of past climate change
on air quality and health.(Дуже мало досліджень намагалися оцінити вплив минулих
змін клімату на якість повітря та здоров’я. )
2) examine more closely
I thought it would be refreshing to examine more closely some of the more
strategic and intriguing success stories that I've been able to discover in the
last 24 months.(Я подумав, що було б приємно детальніше вивчити деякі з більш
стратегічних та інтригуючих історій успіху, які мені вдалося відкрити за останні
24 місяці.)
3) distinct from
However, the coordinated effort to target Indian power grid assets in recent
years is notably distinct from our perspective.(Однак скоординовані зусилля,
спрямовані на індійські енергосистеми в останні роки, помітно відрізняються від
нашої точки зору.)
Vocaroo - https://voca.ro/1Vi1MgPKrOc8
· #151
Tomchishina Polina RT-212 (S. Mykhailiuk) (Thursday, 05 May 2022 09:33)
1)
Distinct from
Відрізняється від
It is distinct from electrical science and technology, which deal with the flow
of electrons and other charge carriers through metal conductors such as copper.
Він відрізняється від електричної науки та техніки, які мають справу з потоком
електронів та інших носіїв заряду через металеві провідники, такі як мідь.
2) Examine more closely
Більш ретельне вивчення
We also examine the computer science discipline and degree levels more closely.
Ми також уважніше вивчаємо дисципліни інформатики та рівні ступенів.
3) Estimate the effects of
Оцінка впливу
Rather than using complex computer models to estimate the effects of
greenhouse-gas emissions, Lovejoy examines historical data to assess the
competing hypothesis.
Замість використання складних комп'ютерних моделей для оцінки впливу викидів
парникових газів, Лавджой вивчає історичні дані, щоб оцінити конкуруючу
гіпотезу.
Today I have read the article entitled «Live online TV, once a bargain, is
getting more expensive». Cable managers ridiculed online TV packages as
unrealistically cheap, but their popularity grew. Online TV providers attracted
users with digital "thin packets" that were cheaper than cable TV. Many are now
raising prices, often as packages become more and more reminiscent of
traditional television packages. In my opinion, the problem with television
services is that the cost of programs is rising, there will eventually be a
sharp drop in demand from users, and then entertainment companies may eventually
feel the bite.
https://voca.ro/1j0Gt2mNxwcP
https://phys.org/news/2019-04-online-tv-bargain-expensive.html
· #150
Ivan Siglyanyk(RZ-213)(Vorobyova E. V.) (Thursday, 05 May 2022 09:33)
Prhases of Day
1. distinct from : https://voca.ro/1RjFSOX1aHMG
Games are distinct from work, which is usually carried out for remuneration, and
from art, which is more concerned with the expression of ideas.
Ігри відрізняються від роботи, яка зазвичай виконується за винагороду, і від
мистецтва, яке більше займається вираженням ідей.
2. estimate the effects of : https://voca.ro/1mDxcHVfGaFP
To estimate the effects of police militarization on crime and officer safety, he
returned to the nationwide panel he had built.
Щоб оцінити вплив мілітаризації поліції на злочинність і безпеку офіцерів, він
повернувся до створеної ним загальнонаціональної панелі.
3. examine more closely : https://voca.ro/1N8yxNLZ07HJ
Search to examine more closely and thousands of other words in English
definition and synonym dictionary from Reverso.
Знайдіть, щоб детальніше вивчити тисячі інших слів у англійському словнику
визначення та синонімів від Reverso.
Article:
https://techxplore.com/news/2022-02-scientists-electrolyte-solid-state-lithium-ion-batteries.html
Audio: https://voca.ro/11jaroNObRJS
Today I have had an opportunity to read an article about invention of a new
electrolyte.To tell the truth the topic of electrolytes is new to me, but the
article is very interesting
Because these studies have an impact on our lives. Electrolytes are a major part
of all our batteries.Scientists have set a goal to create the perfect battery
that can store a lot of energy and do it safely.
That is why they have recently found a possible way to achieve the goal.
According to research, a new type of electrolyte has several advantages.
Unfortunately, the research is slow, as it is very difficult to create the
necessary requirements for testing.
I hope that someday we will be able to create the perfect battery.
· #149
Yershova Y. (Thursday, 05 May 2022 09:33)
Vlasov Vadim RZ-211 (Yershova) (Thursday, 05 May 2022 09:19)
Your review is meaningful, thank you, but mind the pronunciation. You have to
work harder on your reading. The sentences with phrases are quite interesting
but the example 2 is not informative enough. .
· #148
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 05 May 2022 09:32)
Hello. The past message is text from the past month that you didn't notice and wasn't checked.
· #147
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 05 May 2022 09:31)
[
Photo ]
Stanislav Popik РТ-212 (S. Mykhailiuk) (Thursday, 21 April 2022 09:17)
Today i have read the article called"Theoretical Physics: Dark matter and dark
energy are different aspects of a single unknown force"which tells us about
scientific model proposed by Scherrer that can unify dark matter and dark energy
using a second-generation scalar field,which is known as k-essence.The problem
is that dark matter and dark energy behave differently.Dark matter have mass,but
dark energy has quite opposite properties.The k-essence model can change its
behavior over time.For example it looks like dark matter for a while and then it
looks like dark energy.I think this model avoids many previous
obstacles,nevertheless it has some drawbacks.
https://phys.org/news/2004-07-theoretical-physics-dark-energy-aspects.html
https://voca.ro/1kHVSbGqhm00
1)estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
2)examine more closely
To understand the technique, I will examine the instructions more closely.
3)distinct from
Such people often live in politically marginalized groups distinct from the
dominant culture.
https://voca.ro/1bKtSRGdxGR4
· #146
Revyakin A.(RT-212)Mykhailiuk (Thursday, 05 May 2022 09:31)
https://voca.ro/18UswsNuKzsw
https://techxplore.com/news/2022-04-chinese-hackers-reportedly-india-power.html
These communication schemes are distinct from modern ones.
Ці комунікаційні схеми відрізняються від сучасних.
This security system requires to examine more closely.
Ця система безпеки потребує більш ретельного вивчення.
If the development is already fully completed, then an estimate the effects of
can already be done.
Якщо розробка вже повністю завершена, то оцінку наслідків вже можна зробити.
Today I've read the article which tells us about Chinese cyber attacks on India.
In a short period of time, about 10 cyber attacks by Chinese hacker groups on
the energy sector of India were carried out. It is noteworthy that all cyber
attacks were carried out on the territory of enterprises located in the
territory where about a year ago there was an armed conflict between India and
China. Chinese Foreign Ministry spokesman Zhao Lijian completely denies the
government's attitude towards cyberattacks and against any type of cybercrime.
The Minister of Energy of India, in turn, says that there are no serious
consequences and their security system is ready for anything.
In my opinion, any cyber attacks are crimes whether they are related to the
government or not. And the criminals must be punished anyway.
· #145
Vorobyova E. to Shlapak from РЗ-213 (Thursday, 05 May 2022 09:30)
Please, read my remarks attentively and don’t make the same grammar mistakes: “Today I HAVE READ THE article about…” Mind it and continue working. Thank you for your understanding of the article. Your point of view is interesting.
· #144
Shlapak Dmytro RZ-213 (Vorobyova) (Thursday, 05 May 2022 09:29)
Good afternoon, I have completed more than half of the exam topics and forgot which ones I have completed, could you somehow tell me which ones are left to do. P.S. If all of them have to be completed, then I will do it, but as I understood, it is possible not to do everything because you said "... PREFERABLY do everything before the exam...".
· #143
Eugene Chervony RT-212(S.Mykhailiuk) (Thursday, 05 May 2022 09:29)
Today I have read the article "Building a better quantum bit: New qubit
breakthrough could transform quantum computing". It says that digital device
basic unit of information is the bit, either 0 or 1. Scientists worldwide are
racing to develop a new kind of computer based on the use of quantum bits, or
qubits, which can simultaneously be 0 and 1 and could one day solve complex
problems beyond any classical supercomputers. The team created its qubit by
freezing neon gas into a solid at very low temperatures, spraying electrons from
a light bulb onto the solid and trapping a single electron there. Neon is one of
only six inert elements, meaning it does not react with other elements. It seems
to me that the era of quantum computers will come very soon.
https://phys.org/news/2022-05-quantum-bit-qubit-breakthrough.html
https://voca.ro/15upDgk3RCTT
Phrases:
1) distinct from
Our new research is distinct from last year research.
Наше нове дослідження відрізняється від минулорічного.
2) examine more closely
We were able to obtain new samples to examine more closely these fumes.
Ми отримали нові зразки для більш ретельного вивчення цих випарів.
3) estimate the effects of
Previously used different emission spectra to estimate the effects of radiation.
Раніше використовувалися різні спектри випромінювання для оцінки впливу
радіації.
https://voca.ro/1jU82ZExNzQr
· #142
Lebedeva E. (Thursday, 05 May 2022 09:25)
Kapeliushnyi Vladyslav (RZ-211)
Ram Nassur Rz 212 Lebedeva E.V
Ivan Zaritskiy RZ-211
Your tasks are complete and informative. Continue working.
· #141
Lebedeva E. (Thursday, 05 May 2022 09:24)
Misha Donenko RZ-211
Ilinchuk Vladislav RZ-211
Thank you, I appreciate your tasks.
· #140
Beskrovnyi Vladimir RZ-211 (Yershova Y.A.) (Thursday, 05 May 2022 09:23)
1.
Today I have read the article 'Machine-learning model can identify the action in
a video clip and label it, without the help of humans'.
When a machine "sees" a photo, it must encode that photo into data it can use to
perform a task like image classification. This process becomes more complicated
when inputs come in multiple formats, like videos, audio clips, and images.
That's why, Alexander Liu and his collaborators developed an artificial
intelligence technique that learns to represent data in a way that captures
concepts which are shared between visual and audio modalities. Using this
knowledge, their machine-learning model can identify where a certain action is
taking place in a video and label it.
I think this is a good idea, which will make the progress towards creating good,
understandable AI even more smooth and easier.
2. https://techxplore.com/news/2022-05-machine-learning-action-video-humans.html
3. https://voca.ro/13IndagHW7HC
4. 1) examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
2) estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
3) distinct from
Engineering and technology are disciplines distinct from one another and from
science.
5. https://voca.ro/17ZCSz18zIMR
· #139
Daniil Dragin (RZ-211 Lebedeva E) (Thursday, 05 May 2022 09:20)
1)Today I have read the article ''From seawater to drinking water, with the push
of a button''.This article is about a portable desalination plant weighing less
than 10 kg that can remove particles and salts to produce drinking water. This
device consumes a small amount of electricity, which further increases its
mobility, since a small solar panel is enough to power this installation. This
installation is already operating in remote areas with extremely limited
resources (communities on small islands or on board marine cargo ships) and
provides them with water.
In my opinion, the problem of drinking water is already a cornerstone for many,
let alone our future (considering our consumption of drinking water) in which
drinking water will be worth its weight in gold, and the development of these
technologies can become a life jacket for humanity.
2)https://techxplore.com/news/2022-04-seawater-button.html
3)https://voca.ro/1gMeUalSiwKG
4)
1)distinct from
For transparency, the policy should be easy to find, clearly labelled and
presented as distinct from HealthEngine's regular policies.
Для прозорості політику має бути легко знайти, чітко позначено та представлено
на відміну від звичайних правил HealthEngine.
2)estimate the effects
To estimate the effects of police militarization on crime and officer safety, he
returned to the nationwide panel he had built.
Щоб оцінити вплив мілітаризації поліції на злочинність і безпеку офіцерів, він
повернувся до загальнонаціональної панелі, яку він створив.
3)examine more closely
It is relevant to examine more closely the obligation on States under ICESCR to
"take steps".
Доречно більш уважно вивчити зобов’язання держав за МПЕСКП «вжити заходів».
5)https://vocaroo.com/1gyltDGCt5Hf
· #138
Vlasov Vadim RZ-211 (Yershova) (Thursday, 05 May 2022 09:19)
Today i have read the article "Google Cloud unveils Healthcare Data Engine for a
holistic view of health data"
this article is about the new development of google in the field of medicine.
According to them, this invention helps to work faster with patient data. thanks
to this, you can find out everything about the client, from his simple illnesses
to clinical.
doctors say that for them a quick search for information about patients is a
priority, as this will speed up their work. in addition, many companies have
supported this idea and cooperate with hospitals.
This article really impressed me. I think this development is very important and
useful today and i like that medicine is upgrading.
https://www.zdnet.com/article/google-cloud-unveils-healthcare-data-engine-for-a-holistic-view-of-health-data/
https://voca.ro/1leCZVUWV7lu
distinct from
It is distinct from electrical science and technology, which deal with the flow
of electrons
estimate the effects of
Rather than using complex computer models to estimate the effects of
greenhouse-gas emissions
examine more closely
I wanted to examine the product more closely
https://voca.ro/1cHIachXIveJ
· #137
Shlapak Dmytro RZ-213 (Vorobyova) (Thursday, 05 May 2022 09:18)
1.
The basic principles of protection against various cyber attacks distinct
from....
2. This problem requires examine more closely.
3. We use them estimate the effects of on the object.
Today I read an article "The new Facebook logo arrives as its "family" grows."
Perhaps this will be something important for Facebook, but for an ordinary user
it's just an updated inscription, someone will like it, someone will not. And
the fact that this inscription, as I understand it, reflects all the products of
Facebook, is not very important for users and they will not even know about it
until they see or hear this news. Although I understand that the update of the
view is not made for users, but because Facebook is under the scrutiny of
regulators around the world about how it monitors content on its platforms.
https://techxplore.com/news/2019-11-facebook-logo-family.html
https://voca.ro/1de1CpkYts9y
· #136
Ilinchuk Vladislav RZ-211(Lebedeva) (Thursday, 05 May 2022 09:18)
Today I have read the article " Experiments measure freezing point of
extraterrestrial oceans to aid search for life". This article is about a
researchers from the University of Washington and the University of California,
Berkeley have conducted experiments that measured the physical limits for the
existence of liquid water in icy extraterrestrial worlds. This blend of
geoscience and engineering was done to aid in the search for extraterrestrial
life and the upcoming robotic exploration of oceans on moons of other
planets.The study focused on eutectics, or the lowest temperature that a salty
solution can remain liquid before entirely freezing. In my opinion , this
article is very interesting for everyone , especially for people who love deep
space and new technologies . I think this new technology will become very useful
soon .
1)https://phys.org/news/2022-05-extraterrestrial-oceans-aid-life.html
2)https://voca.ro/1m5NoGqwVigi
examine more closely
Executions by guerrilla forces were a controversial issue that he hoped to
examine more closely.
Страти партизанськими загонами були спірним питанням, яке він сподівався
розглянути більш уважно.
distinct from
This role was distinct from law enforcement but complementary.
Ця роль відрізнялася від правоохоронної, але доповнювала.
estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
Він зміг оцінити вплив викидів на здоров’я людини та біорізноманіття.
3)https://voca.ro/1jKLmmF3CIqa
· #135
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Thursday, 05 May 2022 09:18)
The
article I read today is "Study sheds new light on the origin of civilization".
The author of the article claims that the transition to agriculture has led to
the development of complex hierarchical societies. The authors suggest that this
is because the nature of the grain requires that it be harvested and stored in
accessible places, making it easier to appropriate as a tax than root crops that
remain in the ground and are less stored. It can be concluded that it was thanks
to grain crops that civilized societies emerged.
https://voca.ro/1hrKdkijSPkm
1) It is possible estimate the effects of felling forests by calculating the
health costs attributable.
Можна оцінити наслідки вирубки лісів, обчислюючи витрати на оздоровлення.
2) It is distinct from electrical science and technology, which deal with the
flow of electrons.
Він відрізняється від електротехніки та техніки, які мають справу з потоком
електронів.
3) Scientists need to examine more closely human impact on the environment in
more detail.
Науковцям необхідно більш детально вивчити вплив людини на навколишнє
середовище.
https://voca.ro/151zM02PKPBL
· #134
Ram Nassur Rz 212 Lebedeva E.V (Thursday, 05 May 2022 09:14)
Facebook has unveiled a new logo representing the Silicon Valley company. The
move aims to highlight the "brand" of Facebook, which operates a range of apps
and services.
The new branding, basically the company's name in clear letters, will be
imprinted on its "family" of offerings, including WhatsApp, Messenger,
Instagram, Oculus, Workplace, Portal and Calibra. "Today, we're updating our
company branding to better reflect Facebook products."
The move comes as Facebook is under scrutiny from regulators around the world
regarding how it controls content on its platforms.
Facebook created Calibra as a digital wallet for use with the proposed Libra
cryptocurrency, which has been criticized by regulators and legislators in
various countries.
https://techxplore.com/news/2019-11-facebook-logo-family.html
https://voca.ro/18bKGSr9GETa
estimate the effects of
Their study (which is the first to directly estimate the effects of water right
retirement
distinct from
For transparency, the policy should be easy to find, clearly labelled and
presented as distinct from HealthEngine's regular policies.
examine more closely
Along with the Enterprise 2.0 Conference last week, the details and trends of
which I'll examine more closely in my next post
https://voca.ro/1blYUrT1Fgn2
· #133
Vorobyova E. to РЗ-213 (Thursday, 05 May 2022 09:05)
Good morning, students! Our English lesson has already started and I am waiting for your comments, sentences with phrases and exam topics. Good luck.
· #132
Ivan Zaritskiy RZ-211 (Lebedeva) (Thursday, 05 May 2022 09:01)
Today I read the article “New method detects deepfake videos with up to 99%
accuracy”. This article is about the experience of detecting deepfake videos.
Computer scientists at UC Riverside can detect manipulated facial expressions in
deepfake videos with higher accuracy than current state-of-the-art methods. The
method also works as well as current methods in cases where the facial identity,
but not the expression, has been swapped, leading to a generalized approach to
detect any kind of facial manipulation. The achievement brings researchers a
step closer to developing automated tools for detecting manipulated videos that
contain propaganda or misinformation. In my opinion, it’s great, because now it
will be harder for propaganda makers to do deepfake videos of senior government
officials.
https://techxplore.com/news/2022-05-method-deepfake-videos-accuracy.html
https://voca.ro/16tY1tQMBqwJ
distinct from
It is distinct from electrical science and technology, which deal with the flow
of electrons and other charge carriers through metal conductors such as
copper.(Він відрізняється від електричної науки та техніки, які мають справу з
потоком електронів та інших носіїв заряду через металеві провідники, такі як
мідь.)
examine more closely
If they took the time to more closely examine the environment, they usually find
that the processor is not the bottleneck that believe it to be.(Якщо вони
знайшли час, щоб більш уважно вивчити навколишнє середовище, вони зазвичай
виявляють, що процесор не є вузьким місцем, яким він вважає.)
estimate the effects
The tool can also estimate the effects of felling existing woodland by
calculating the health costs attributable to the PM2.5 that would no longer be
removed from the air by those trees.(Інструмент також може оцінити наслідки
вирубки існуючого лісу, обчислюючи витрати на охорону здоров’я, пов’язані з
PM2,5, які більше не будуть видалятися з повітря цими деревами.)
https://voca.ro/1nsSTlcye5F6
· #131
Misha Donenko RZ-211 Lebedeva (Thursday, 05 May 2022 08:52)
Today I’ve read the article “New chip hides wireless messages in plain sight”.
Emerging 5G wireless systems are designed to support high-bandwidth and
low-latency networks connecting everything from autonomous robots to
self-driving cars. For networks that support latency-critical systems such as
self-driving cars, robots and other cyber-physical systems, minimizing
time-to-action is critical. Now we are in a new era of wireless—the networks of
the future are going to be increasingly complex while serving a large set of
different applications that demand very different features. I think it is a good
idea that it would be possible to use encryption along with the new system for
additional security.
New chip hides wireless messages in plain sight (techxplore.com)
https://voca.ro/18NqO1vXqOzy
1.distinct from
This role was distinct from law enforcement but complementary.
Ця роль відрізнялася від правоохоронної, але доповнювала.
2.examine more closely
The international community, including the Security Council, should also examine
more closely the anticipated long-term requirements after the Tribunals had
completed their mandates.
Міжнародне співтовариство, у тому числі Рада Безпеки, має також уважніше вивчити
очікувані довгострокові потреби після того, як трибунали виконають свої мандати.
3.estimate the effects of
It was able to estimate the effects of emissions on human health and
biodiversity.
Він зміг оцінити вплив викидів на здоров’я людини та біорізноманіття.
https://voca.ro/1dPyOuTFLTeo
· #130
Yershova Y. to PЗ-211 (Thursday, 05 May 2022 08:50)
Good morning! The lesson has started, I am waiting for your reviews and audio recordings. Do not forget about Phrases of the day. Good luck!
· #129
Lebedeva E. (Thursday, 05 May 2022 08:48)
To
RZ-211
I am waiting for your exam topics and sentences with phrases.
· #128
S.Mykhailiuk (Wednesday, 04 May 2022 21:28)
To Ruslan Siropulo, RF-211 Thanks . Task 1 .Pls translate the phrases first and then translate the whole sentence Just good. Task 2 is a bit lengthy but interesting in its contents.There is a minor mistake. Just 83 points.
· #127
Ruslan Siropulo, RF-211, S. Mykhailiuk (Wednesday, 04 May 2022 19:32)
1)Phrases of the Day:
1. Table based on de facto population. - Таблиця на основі фактичного населення.
2. It is not only financial, but also technical and technological, and deserves
special attention in terms of monitoring and assessment. - Вона не тільки
фінансова, але й техніко-технологічна, і заслуговує на особливу увагу з точки
зору моніторингу та оцінки.
3. Biofuels - fuels derived from biomass - might offer a promising supplement. -
Біопаливо - паливо, отримане з біомаси - може бути багатообіцяючим доповненням.
2)Article:
Today i have read article about "Hackers Claim to Target Russian Institutions in
Barrage of Cyberattacks and Leaks". This article about Hackers claim to have
broken into dozens of Russian institutions over the past two months, including
the Kremlin’s internet censor and one of its primary intelligence services,
leaking emails and internal documents to the public in an apparent hack-and-leak
campaign that is remarkable in its scope. The hacking operation comes as the
Ukrainian government appears to have begun a parallel effort to punish Russia by
publishing the names of supposed Russian soldiers who operated in Bucha, the
site of a massacre of civilians, and agents of the F.S.B., a major Russian
intelligence agency, along with identifying information like dates of birth and
passport numbers. It is unclear how the Ukrainian government obtained those
names or whether they were part of the hacks. Much of the data released by the
hackers and the Ukrainian government is by its nature impossible to verify. As
an intelligence agency, the F.S.B. would never confirm a list of its officers.
Even the groups distributing the data have warned that the files swiped from
Russian institutions could contain malware, manipulated or faked information,
and other tripwires. Some of the data may also be recycled from previous leaks
and presented as new, researchers have said, in an attempt to artificially
increase the hackers’ credibility. Or some of it could be manufactured —
something that has happened before in the ongoing cyberconflict between Russia
and Ukraine, which dates back more than a decade.But the hacking effort appears
to be part of a campaign by those opposing the Kremlin to help in the war effort
by making it extremely difficult for Russian spies to operate abroad and by
planting a seed of fear in the minds of soldiers that they could be held to
account for human rights abuses. Dmitri Alperovitch, a founder of the Silverado
Policy Accelerator, a Washington think tank, and the former chief technology
officer at the cybersecurity firm CrowdStrike, said there was reason to maintain
a healthy skepticism about the reliability of some of the leaks. What can I say
after reading this article, I hope that all this information is reliable and I
hope that the Russians will suffer, we all know what kind of country this is,
therefore this article makes sense to be.
Article:
https://www.nytimes.com/2022/04/22/us/politics/hackers-russia-cyberattacks.html
Vocaroo: https://voca.ro/12UBWE1nkdaH
· #126
Mitriev Vitaliy (RZ-213 Vorobyova E.V.) (HomeWork) (Wednesday, 04 May 2022 16:43)
Link to articlehttps://phys.org/news/2021-10-corrosion-materials-durability.html
Link to voice: https://voca.ro/1mrgeE4XRGxX
Today I've read interesting article about methods that would help engineers
delay structural failure.
In tests by removing atoms from the tip of the crack, modeling showed that
researchers could prevent
crack propagation by dramatically improving the mechanical properties of the
material. The article discusses the effects of the
environment on the material, including dissolution, oxide formation,
re-deposition of the material, and hydrogen embrittlement.
In my opinion, keeping structures safe means keeping the lives of the people who
work for them safe. And such research can solve a dangerous problem!
1. De facto, the number of animals in the zoo is much less than they say
Фактична кількість тварин у зоопарку набагато менша, ніж про це говорять
2. Investment funds pay off as the profit derived from the firm goes up
Інвестиційні кошти окупаються так як прибуток, що отримується з фірми, йде вгору
3. The work of Tom Cooper deserves special attention in terms of helping the
army of Ukraine
Робота Тома Купера заслуговує на окрему увагу в плані допомоги армії України
· #125
Petrova E.I. (Wednesday, 04 May 2022 12:55)
Pour les étudiants qui apprennent le français.
Chers étudiants ! Travaillez régulièrement. J’attends vos devoirs. Laissez vos
commentaires et vos enregistrements ici. Allez-y! Bon travail.
· #124
Popovych E. (Tuesday, 03 May 2022 17:03)
To
Nikitina Anastasia RZ-212
Exam topic #9 (Functions of firewalls) is well done.
· #123
Petrova E.I. (Tuesday, 03 May 2022 15:36)
Pour les étudiants qui apprennent le français.
Chers étudiants ! Travaillez régulièrement. J’attends vos devoirs. Laissez vos
commentaires et vos enregistrements ici. Allez-y! Bon travail.
· #122
S. Mykhailiuk (Tuesday, 03 May 2022)
Correction:
To students Chmel, Colomiets. Pls participate in our activities.
· #121
S.Mykhailiuk (Tuesday, 03 May 2022)
To
students Camel, Vivchar, Yakubovska, Kulaksis, Siropulo from Group RF-211.
To students Fudulaki, Huzhnyak, Yushin and Koloniets
You didn’t work on line today. Pls report the reasons for outage to your monitor
Vlada Gromovaya today and she will let me know about it. Pls try to participate
on the designated timeframe of the on-line lesson.
· #120
Bogdan Gorbatiy RZ-211 (Gvozd O.V) (Tuesday, 03 May 2022 14:10)
In
today's world, data security has become the number one issue. Every day network
administrators are at war with virus developers and hackers to protect their
systems.
A hardware firewall is the first line of defense, as they are mostly configured
on network boxes containing configured hardware and software. It monitors every
packet that reaches your network by checking its source, destination address and
header if it can be trusted.
Hardware firewalls are good for small and medium-sized business owners with a
small network of computers with 5 or more PCs. They become cost effective
because if you choose to purchase software licenses for each machine, say 20 to
30 copies per annual subscription fee, it will cost you a lot of money.The
hardware firewall has built-in IPS / IPDS, which used to be used as a separate
device. But now they are included, offering us more protection.
https://voca.ro/12W1eLpr5blS
1)There was considerable disagreement regarding the definition of terrorism.
2)CSSW is negotiating to have some funds through WHO to conduct research and
field studies on health.
3)A good example is the potentially controversial question of prevention.
https://voca.ro/14mK8QfCw6gP
· #119
S.Mykhailiuk (Tuesday, 03 May 2022 14:07)
To Biehin Yevhen RF-211 Thanks your scores are 74 and 75 points. Keep on working hard.
· #118
S.Mykhailiuk (Tuesday, 03 May 2022 14:05)
To Vlada Gromovaya (RF-211) Thanks but pay attention to the pronunciation and melody.Pls avoid using synonyms in one sentence (take a picture. ....)Just 78 points. Task2 is 82 points. Keep on working hard. As you see, not students participated in today’s activities and posted at the predicted time ( closer to the end of a class).
· #117
S.Mykhailiuk (Tuesday, 03 May 2022 13:31)
To Julia Shevchuk (RF-211) pls mind each sentence contains the word”misinformation”. Pls train your melody . Mind the word ‘ nuances’. Just 70 points. You’ve earned 78 points for task 2.
· #116
S.Mykhailiuk (Tuesday, 03 May 2022 13:22)
To Shulyak Makar RF-211 Pls make a conclusion at the end. Pls avoid using quotes. Train your pronunciation. Just 67 points . Task2 is 76 points. Keep on working hard.
· #115
S.Mykhailiuk (Tuesday, 03 May 2022 13:14)
To Rosinskiy Kyrylo RF-211 Thanks for your attempts. There are some minor mistakes in sentence structure especially in your conclusion. Pls train before you record your speech. Just 78 points . Task2 is 82 points.Krep on working hard to improve your results.
· #114
S.Mykhailiuk (Tuesday, 03 May 2022)
To Mashegirov Eugene (RF-211) just 75 points for both tasks. But I advise you should make a comment using 100 words only. Also improve your pronunciation and speaking level otherwise I’ll have to give you lower mark. Try to work hard.
· #113
S.Mykhailiuk (Tuesday, 03 May 2022 12:48)
To Gridnev Dmytro(RF-211) Your comments are very lengthy . Try to avoid using quotes. Just 73 points. Task2 is 75 points but try to post sentences relating to your speciality.
· #112
S.Mykhailiuk (Tuesday, 03 May 2022 12:25)
To Alexander Shibaev (RF-211) Thanks . But try to be precise and make a long story short without quotes. Just 74 points. Task 2 is good. Try to make up sentences with phrases in a proper way: translate the phrases first and avoid using ‘it’ . It’s better to use noun.
· #111
S.Mykhailiuk (Tuesday, 03 May 2022 11:20)
To. Pontus Natalia(RF-211) There’s no reference to the source .There are repetition of verbs in one sentence with no conclusion. Just 67 points. Task2 contains the first phrase with the same sentence you can come across in the Guestbook where other students posted it.Be creative. Just 67 points.
· #110
Nikitina Anastasia RZ-212(Popovych E.) (Tuesday, 03 May 2022 10:43)
Exam topic #9 (Functions of firewalls)
The first-generation firewall works as a packet filter, comparing basic
information, such as the original source, packet destination, port, or protocol
used, to a specific set of rules.
The second generation of the firewall contains another parameter
for filter settings - connection status. Based on this information, the
technology can track connection start and current connection data.
Third-generation firewalls are built to filter information using all levels of
the OSI model.
including the application level. They recognize programs
and some common protocols such as FTP and HTTP.
Based on this information, the firewall can detect attacks
who are trying to bypass it through the allowed port
or unauthorized use of the protocol.
https://voca.ro/1cW6rJ8RS6l5
· #109
Popovych E. (Tuesday, 03 May 2022 10:35)
To
Nazariy Glugan (RT-211)
Artem Verhelis RT-211
Avdeev Danil RT-211
Your comments are good. Thanks for your work. Good luck.
· #108
Popovych E. (Tuesday, 03 May 2022 10:32)
To
Stanislav Kryvosheienko RT-211
Yeulizaveta Barsukova (RT-211)
Thank you, you have successfully completed the task.
· #107
Popovych E. (Tuesday, 03 May 2022 10:30)
To
Artem Verhelis RT-211
Exam topic #5 is well done
· #106
Popovych E. (Tuesday, 03 May 2022 10:29)
To
El-kadi RT-211
Read my remarks attentively, pls.. You are making the same mistakes.I hope I'll
hear your voice record one day. Don't forget about thr links to the article and
the audio description of the article and Phrases.Keep on working
· #105
Popovych E. (Tuesday, 03 May 2022 10:28)
To
Sasha Movsum-Zade RT-211
Timur Ergul RT-211
Timophey Sipin RZ-212
Your tasks are done thoroughly and correctly. I liked your work. Go on working.
· #104
Popovych E. (Tuesday, 03 May 2022 10:25)
To
Sergey Kyznyak RT-211,
#50, 52
Exam Topic #5 is well done
Everything is clear from your review on the article. It’s interesting and
written and voiced correctly. Thank you for your understanding of the tasks.
· #103
Popovych E. (Tuesday, 03 May 2022 10:23)
To
Mashovets Andrey (RZ 212)
Thank you for your comment and voice message.
· #102
Pontus Natalia(RF-211) (S.Mykhailiuk) (Tuesday, 03 May 2022 10:22)
Software industry
Software plays a critical role in today's global information economy:
individuals and businesses rely on operating systems and applications to carry
out daily tasks. Software runs the computers, networks and devices that enable
countless products and services from vast enterprise and communications systems
to small 'apps' that run on digital phones. The software industry consists of
the development, distribution, and maintenance of software. It can be broadly
divided into application software, system infrastructure software,
software-as-a-service (SaaS), operating systems, database and analytics
software. Fundamental forces have shaped the evolution of the industry, starting
with the emergence of personal computers, the development of computer networking
and client/server software, and the introduction and widespread adoption of the
Internet, and it continues to grow today.
https://voca.ro/19ZmQrD9sZ5D
Phrases of the day:
1) considerable disagreement - значні розбіжності
There was considerable disagreement regarding the definition of terrorism.
Існували значні розбіжності щодо визначення тероризму.
2) conduct research - провести дослідження
Smartphone developers continue to conduct research into new features.
Розробники смартфонів продовжують дослідження нових функцій.
3) controversial question - спірне питання
A good example is the potentially controversial question of prevention.
Хорошим прикладом є потенційно спірне питання профілактики.
https://voca.ro/16HWKId1GDVQ
· #101
Popovych E. (Tuesday, 03 May 2022 10:21)
To
Pushkash Maxim (RZ-212)
Exam topic #5 (software firewall) is well done
· #100
Alexander Shibaev (RF-211, S.Mykhailiuk) (Tuesday, 03 May 2022 10:21)
Today i've read the article "NYPD body cameras decrease citizen complaints and
arrests". The author is Benjamin Kessler from George Mason University.
This article tells us about how police body worn cameras have become a
controversial element in the larger debate about policing and the relationship
between police and citizens in the United States. Thanks to a court-mandated
department-wide rollout of these cameras involving 35,000 New York Police
Department officers, starting in 2018, a large volume of publicly available data
has been made available to study their effects, detailing the universe of NYPD
stops from January 2017 to December 2019. The cameras are not a cure-all.
Citizen complaints alleging improper use of force, for example, remained flat.
And smaller police departments with more modest budgets face legitimate resource
constraints, ranging from difficulty in paying for cameras, challenges when
training officers to use them properly, and infrastructure issues in preserving
the vast archives of video evidence. Data-driven analysis of Brad Greenwood, an
associate professor of information systems and operations management at the
George Mason University's School of Business, may help these smaller
municipalities weigh the costs and benefits of adopting the technology.
In this article Brad Greenwood wrote "We have reached a point in society,
regrettably in my opinion, where people are taking positions on what will be
good or bad before the word 'go." It is only going to be through careful and
rigorous study of what is happening on the ground that we are going to be able
to give actionable information to decision makers so they can make thoughtful
determinations about how to capture the benefits of emerging technologies and
avoid the potential problems." In my opinion, that idea is very suitable not
only for the United States, but for all other countries where there are problems
with "abuse of power", abuse or intimidation.
Article: https://phys.org/news/2021-11-nypd-body-cameras-decrease-citizen.html
Audio: https://voca.ro/1oWyNrJOPeym
PHRASES OF THE DAY
1. Police body worn cameras have become a controversial element in the larger
debate about policing and the relationship between police and citizens in the
United States. - Поліцейські камери на тілі стали суперечливим елементом у
широкій дискусії про поліцейську діяльність та відносини між поліцією та
громадянами в Сполучених Штатах.
2. Their behaviour is so different from the other s-block elements that there is
considerable disagreement over where these two elements should be placed in the
periodic table. - Їхня поведінка настільки відрізняється від інших елементів
s-блоку, що існують значні розбіжності щодо того, де ці два елементи повинні
бути розміщені в періодичній таблиці.
3. They shipped it here to conduct research. - Вони відправили його сюди для
проведення досліджень.
Audio: https://voca.ro/1a2MSwq5znrr
· #99
Avdeev Danil RT-211 (Popovych E.) (Tuesday, 03 May 2022 10:20)
Article: https://phys.org/news/2021-06-survey-whites-blacks-views-american.html
Today I have read the article titled "Survey measures whites', Blacks' views on
American identity, guns, political violence". It describes us about survey from
University of Illinois Chicago researchers found strong consensus both across
and within white and black populations in the U.S., and transcending political
party lines, when freedom of speech, voting rights, respect for institutions,
and peaceful resolution of political conflict were considered as key dimensions
of what it means to be American. I find this article interesting, because
nowadays discrimination problem is one of the most famous problem, but more and
more people are becoming tolerant of others.
vocaroo: https://voca.ro/18eRQ22Yf3gQ
1)conduct research
Health psychologists apply this knowledge to conduct research on a variety of
questions.
https://voca.ro/18htji1foqJP
Психологи в галузі охорони здоров’я застосовують ці знання для проведення
досліджень з різних питань.
2) controversial question
Her work has provided new insights into the controversial question of whether
the languages we speak shape the way we think.
https://voca.ro/1d9gTeCigVo0
Її робота дала нове розуміння суперечливого питання про те, чи мови, якими ми
розмовляємо, формують наш спосіб мислення.
3) considerable disagreement
Their behaviour is so different from the other s-block elements that there is
considerable disagreement over where these two elements should be placed in the
periodic table.
https://voca.ro/1lhECOddqnLr
Їхня поведінка настільки відрізняється від інших елементів s-блоку, що існують
значні розбіжності щодо того, де ці два елементи повинні бути розміщені в
періодичній таблиці.
· #98
Popovych E. (Tuesday, 03 May 2022 10:20)
To
Pushkash Maxim (RZ-212 )
Thank you for your essay, but mind that your comment should include up to 100
words. Use Word Count Tool to check it. Go on working.
· #97
Popovych E. (Tuesday, 03 May 2022 10:17)
To
Badyuk Eduard RZ-212
Kolomiets Vova РЗ-212
Nikitina Anastasia RZ-212
Neblienko V. / RZ-212 /
Thank you for your comments on the article, audio recordings.
· #96
Gridnev Dmytro(RF-211)(S.Mykhailiuk) (Tuesday, 03 May 2022 10:14)
The
article is headlined "The new tattoo: Drawing electronics on skin".Author's name
is Zheng Yan.
According to the text:One day, people could monitor their own health conditions
by simply picking up a pencil and drawing a bioelectronic device on their skin.
In a new study, University of Missouri engineers demonstrated that the simple
combination of pencils and paper could be used to create devices that might be
used to monitor personal health.
Since its invention, pencils—made of lead including various levels of graphite,
clay and wax—have often been used for writing and drawing. In the study, the
researchers discovered that pencils containing more than 90% graphite are able
to conduct a high amount of energy created from the friction between paper and
pencil caused by drawing or writing. Specifically, the researchers found pencils
with 93% graphite were the best for creating a variety of on-skin bioelectronic
devices drawn on commercial office copy paper. Yan said a biocompatible spray-on
adhesive could also be applied to the paper to help it stick better to a
person's skin.
Next step would be to further develop and test the use of the biomedical
components, including electrophysiological, temperature and biochemical
sensors."For example, if a person has a sleep issue, we could draw a biomedical
device that could help monitor that person's sleep levels".
I think the article is very important for out future life because this invention
could have broad future applications in home-based, personalized health care,
education and remote scientific research such as during the COVID-19 pandemic.
Vocaroo:https://voca.ro/13f1hOMcw2L5
Phrases of the Day:
1)considerable disagreement - considerable disagreement.
As a result, there is considerable disagreement about how best to write a code.
В результаті виникають значні розбіжності щодо того, як найкраще написати код.
2)controversial question- суперечливе питання.
Whether fishes are sentient beings remains an unresolved and controversial
question.
Чи є риби розумними істотами, залишається невирішеним і суперечливим питанням.
3)conduct research-провести дослідження;
Smartphone developers continue to conduct research into new features.
Розробники смартфонів продовжують дослідження нових функцій.
Vocaroo:https://voca.ro/1df4ESUxzqJZ
· #95
Popovych E. (Tuesday, 03 May 2022 10:13)
To
Kravchenko Kostiantyn (RZ-212)
Your task is complete, informative and interesting. Well done.
· #94
Artem Verhelis RT-211, Popovych E. (Tuesday, 03 May 2022 10:09)
Today I've read the article "A wheeled car, quadruped and humanoid robot:
Swiss-Mile Robot from ETH Zurich".
This article is about four-legged robot with wheels created by ETH Zurich
company. This is modified model of ANYmal robot known as Swiss-Mile, called the
same as team that created it. It has two modes of movement. The first one is
rolling on wheels, with the ability to overcome stairs, ledges or bumps. The
second mode is walking on four legs like a dog or on two like a human. It can
bring its benefits as by delivering pleasure to its owners as can be used as a
package or parcel deliverer.
Audio: https://voca.ro/1I12ZcGEaYgm
Article:
https://techxplore.com/news/2021-12-wheeled-car-quadruped-humanoid-robot.html
1) considerable disagreement
When researchers discuss the forces that shaped human history, there
is considerable disagreement as to whether our behavior is primarily determined
by culture or by the environment.
Коли дослідники обговорюють сили, які сформували історію людства,
існують значні розбіжності щодо того, чи наша поведінка визначається культурою
чи середовищем.
2) controversial question
New light on the controversial question of species abundance and population
density.
Нове світло на спірне питання чисельності видів та щільності популяції.
3) conduct research
It has also been very interesting to conduct research at three different
universities.
Це також було дуже цікаво проводити дослідження у трьох різних університетах.
Audio: https://voca.ro/1flYAkefTVzF
· #93
Nazariy Glugan (RT-211) Popovych E. (Tuesday, 03 May 2022 10:09)
Today i have read the article "A soft magnetic pixel robot that can be
programmed to take different shapes". new kind of robots - magnetic robots.
Magnetic soft robots are systems that can change shape or perform various
actions when a magnetic field is applied to them. They have many useful features
including wireless drive, high flexibility and endless endurance. In the future,
micro-scale soft magnetic robots can be implemented in a variety of conditions;
for example, helping people to monitor the environment or perform biomedical
procedures remotely, even if at the moment they can only perform primitive
functions. Although the danger of total government control through the use of
cameras in a magnetic robot increases, I think this invention is quite useful,
with its help we will be able to explore the most unexplored corners of our
planet
https://techxplore.com/news/2021-11-soft-magnetic-pixel-robot.html
https://voca.ro/1l6iZuiVDxFA
1)
conduct research
Health psychologists apply this knowledge to conduct research on a variety of
questions.
2) considerable disagreement
Their behaviour is so different from the other s-block elements that there is
considerable disagreement over where these two elements should be placed in the
periodic table.
3) controversial question
Her work has provided new insights into the controversial question of whether
the languages we speak shape the way we think (Linguistic relativity).
https://voca.ro/14K4TEV6NoJe
· #92
Gvozd to Beskrovnyi Vladimir RZ-211 (Tuesday, 03 May 2022 10:01)
Your task is well done and informative.
· #91
Beskrovnyi Vladimir RZ-211 (Gvozd O.V) (Tuesday, 03 May 2022 09:56)
1.
Today I have read the article 'Researchers think soot can help with the energy
transition'.
It tells about the group of researchers from the University of Houston and
Mexico's Universidad Intercultural Indígena de Michoacán, who found how to make
a reality a method of turning environmental pollutants into renewable solar
energy while reducing carbon emissions. The scientists demonstrated how soot,
the byproduct of burned organic materials like biomass, carbon and hydrocarbons,
can convert solar energy into heat. The biomass extracted from burned wood in
the Mexican state of Michoacán was found to be the most effective, according to
the findings published in the journal Carbon. Ultimately, the researchers used
the soot to produce a paste-like coating with high solar-to-heat-conversion
efficiency.
I think this is somehow an interesting method of using burned wood to make
absorption of solar energy easier, proving that even damaged biologicall
surfaces, such as wood, can still make a good use of obstaining 'green' energy.
2. https://techxplore.com/news/2022-04-soot-energy-transition.html
3. https://voca.ro/1j1urYPbbqfe
4. 1) conduct research
Researchers rarely conduct research with a finished model of the causal process
they want to test in mind
2) considerable disagreement
There is considerable disagreement over the safety of the treatment
3) controversial question
The decision to use the bomb remains the most controversial question of the
Second World War.
5. https://voca.ro/1b22jeqCiZDB
6. Exam topic №9: Functions of Firewalls
A firewall is a security device in the form of computer hardware or software. It
can help protect your network by acting as an intermediary between your internal
network and outside traffic. It monitors attempts to gain access to your
operating system and blocks unwanted incoming traffic and unrecognized sources.
A firewall acts as a barrier or gatekeeper between your computer and another
network like the internet. She can help protect your computer and data by
managing your network traffic. It does this by blocking unsolicited and unwanted
incoming network traffic. A firewall validates access by assessing this incoming
traffic for anything malicious like hackers and malware that could infect your
computer.
· #90
Gvozd to Vasilev A.O RZ-211 (Tuesday, 03 May 2022 09:55)
Thank you for your task. Mind definite article in the first sentence: I have read THE article...
· #89
Lebedeva E. (Tuesday, 03 May 2022 09:52)
To Misha Donenko RZ-211 Well done, thank you
· #88
Lebedeva E. (Tuesday, 03 May 2022 09:49)
To Denis Zavadsky Thanks for sharing your opinion on the article here.
· #87
Mashegirov Eugene (RF-211) (S.Mykhailiuk) (Tuesday, 03 May 2022 09:47)
Article: https://techxplore.com/news/2020-10-internet-oxygen.html
Audio(Article + Phrases): https://voca.ro/11hdi4vLRp1v
Today i have read an article titled "Internet connectivity is oxygen for
research and development work" by University of Illinois at Urbana-Champaign.
The text says that technological limitations can become stumbling blocks to
efficient communication and cause significant disadvantages. Pete Goldsmith,
director of the Soybean Innovation Lab at University of Illinois, noticed that
his African colleagues were often dealing with technological problems that made
communication very challenging. Goldsmith, Hixson, and Smith conducted an
in-depth case study of information communication technology (ICT). Based on this
study, the research team developed the ICT Health Checkup, an assessment
procedure for IT administrators to methodically assess the current state of
their system, identify gaps affecting performance, and document steps for
remediation. ICT Health Checkup measures the current conditions and can be used
as a benchmarking tool to measure improvements.
I think we need to constantly improve the Internet, especially for such an
important area as science. Better Internet allows you to complete some research
sooner and be able to store data somewhere.
Phrases of the Day
1. controversial question - спірне питання
Police body worn cameras have become a controversial element in the larger
debate about policing and the relationship between police and citizens in the
United States - Поліцейські камери на тілі стали суперечливим елементом у
широкій дискусії про поліцейську діяльність та відносини між поліцією та
громадянами в Сполучених Штатах.
2. considerable disagreement - значні розбіжності
"When researchers discuss the forces that shaped human history, there is
considerable disagreement as to whether our behavior is primarily determined by
culture or by the environment," says primary author Carlos Botero, a researcher
at the Initiative for Biological Complexity at North Carolina State University -
«Коли дослідники обговорюють сили, які сформували історію людства, виникають
значні розбіжності щодо того, чи наша поведінка визначається насамперед
культурою чи навколишнім середовищем», — говорить основний автор Карлос Ботеро,
дослідник Ініціативи з біологічної складності в Університеті штату Північна
Кароліна.
3. conduct research - провести дослідження
But lack of connectivity severely hinders an organization's ability to perform
simple functions, conduct research, and compete for grants - Але відсутність
зв’язку серйозно заважає організації виконувати прості функції, проводити
дослідження та змагатися за гранти.
· #86
Rosinskiy Kyrylo RF-211 (S.Mykhailiuk) (Tuesday, 03 May 2022 09:44)
Addition to comment #82
Article:
https://theconversation.com/how-ai-is-shaping-the-cybersecurity-arms-race-167017
· #85
Yeulizaveta Barsukova (RT-211) Popovych E. (Tuesday, 03 May 2022 09:44)
Class-work
Today I've read the article 'Recycled glass waste used as sand replacement in 3D
printing'. Researchers have developed the ability to use recycled glass in 3D
printing. As we know, glass is made of sand, so it can be completely recycled.
Nevertheless, it is the least recycled types of waste. A concrete formula was
invented consisting of recycled glass, cement, water and additives for 3D
printing. In laboratory tests, the 3D-printed design showed excellent
construction ability. Printed concrete didn't deform or break down before it
hardened. I think it'll help us reduce waste and buildings won't collapse for
long time.
Audio1:https://voca.ro/125GWPXDN4H2
Article:https://techxplore.com/news/2022-04-recycled-glass-sand-3d.html
Phrases
1)conduct research
Health psychologists apply this knowledge to conduct research on a variety of
questions.
Психологи в галузі охорони здоров’я застосовують ці знання для проведення
досліджень з різних питань.
2) controversial question
Her work has provided new insights into the controversial question of whether
the languages we speak shape the way we think.
Її робота дала нове розуміння суперечливого питання про те, чи мови, якими ми
розмовляємо, формують наш спосіб мислення.
3) considerable disagreement
Their behaviour is so different from the other s-block elements that there is
considerable disagreement over where these two elements should be placed in the
periodic table.
Їхня поведінка настільки відрізняється від інших елементів s-блоку, що існують
значні розбіжності щодо того, де ці два елементи повинні бути розміщені в
періодичній таблиці.
Audio2:https://voca.ro/18SJdqeAB0M7
· #84
Stanislav Kryvosheienko RT-211 (Popovych) (Tuesday, 03 May 2022 09:44)
Today I have read the article "Tenfold increase in hurricane frequency this
century, research predicts" This aticle is about research that has shown that
there was an increasing tendency for storm hurricane surges when the climate was
warmer. But nobody knows how much worse will it get as temperatures rise in the
future. New research from the Niels Bohr Institute show that there will be a
tenfold increase in frequency if the climate becomes two degrees Celcius warmer.
voicle - https://voca.ro/1eRJpgKkgtSZ
article - https://phys.org/news/2013-03-tenfold-hurricane-frequency-century.html
Phrases
1)Considerable disagreement - Considerable disagreement exists, however, on how
to interpret that research. Однако существуют значительные разногласия по поводу
того, как интерпретировать это исследование.
2)Controversial question - A good example is the potentially controversial
question of prevention. Хорошим примером является потенциально спорный вопрос о
профилактике.
3)Conduct research - They shipped it here to conduct research. Они обосновались
здесь чтобы проводить исследования.
Voice - https://voca.ro/147JIAoBBDKz
· #83
Lebedeva E. (Tuesday, 03 May 2022 09:43)
To Dovzhenko Ilya RZ-211 Well done, thank you.
· #82
Rosinskiy Kyrylo RF-211 (S.Mykhailiuk) (Tuesday, 03 May 2022 09:43)
Today I’ve read an article called “How AI is shaping the cybersecurity arms
race”. Artificial intelligence is particularly well suited to finding patterns
in huge amounts of data. There are two main ways AI is bolstering cybersecurity.
First, AI can help automate many tasks that a human analyst would often handle
manually. These include automatically detecting unknown workstations, servers,
code repositories and other hardware and software on a network. Second, AI can
help detect patterns within large quantities of data that human analysts can’t
see. For example, AI could detect the key linguistic patterns of hackers posting
emerging threats in the dark web and alert analysts. Despite the significant
benefits of AI for cybersecurity, we might be worried about how much they can
trust automated systems. AI is also useful for malicious hackers, who are using
methods like reinforcement learning and generative adversarial networks.
In my opinion, researches in using AI in cybersecurity is a big step, which can
improve the protection of data, servers and workstations.
Audio: https://voca.ro/19NcnNxzSCm2
Phrases of the day:
1. controversial question - суперечливе питання
ENG: Her work has provided new insights into the controversial question of
whether the languages we speak shape the way we think (Linguistic relativity).
UKR: Її робота дала нове розуміння суперечливого питання про те, чи мови, якими
ми розмовляємо, формують наш спосіб мислення (Лінгвістична відносність).
2. considerable disagreement - значні розбіжності
ENG: Their behaviour is so different from the other s-block elements that there
is considerable disagreement over where these two elements should be placed in
the periodic table.
UKR: Їхня поведінка настільки відрізняється від інших елементів s-блоку, що
існують значні розбіжності щодо того, де ці два елементи повинні бути розміщені
в періодичній таблиці.
3. conduct research - проведення досліджень
ENG: Health psychologists apply this knowledge to conduct research on a variety
of questions.
UKR: Психологи в галузі охорони здоров’я застосовують ці знання для проведення
досліджень з різних питань.
Audio: https://voca.ro/16T94ysqDskA
· #81
Lebedeva Denis Zavadsky RZ-211 (Tuesday, 03 May 2022 09:41)
On
27 April on the straight of the Space Shuttle airstrip at NASA's Kennedy Space
Center in Cape Canaveral, the car created by the Politecnico di Milano-PoliMOVE
broke the world speed record for a fully autonomous car on a straight (the
previous record held by Roborace was 175.49 mph/282.42 kph). The Politecnico
Team had already achieved the record on 26 April but decided to raise the bar
and improve its performance. On 27 April, PoliMOVE's car beat its own record to
reach an incredible speed of 192.2 mph/309.3 kph, smashing through the "wall" of
186.4 mph/300 kph.
I consider this a minor discovery, since a self-propelled vehicle needs to be
safer due to the lack of direct control over it.
https://techxplore.com/news/2022-04-world-self-driving-car.html
https://voca.ro/1iUbtJKZ5xiS
There was considerable disagreement regarding the definition of terrorism.
Існували значні розбіжності щодо визначення тероризму.
They shipped it here to conduct research.
Вони відправили його сюди, щоб провести дослідження.
A good example is the potentially controversial question of prevention.
Хорошим прикладом є потенційно спірне питання профілактики.
· #80
Misha Donenko RZ-211 Lebedeva (Tuesday, 03 May 2022 09:41)
Computer protection tips
1. Use Windows Firewall built-in and automatic
firewall enabled.
2. Software update
Be sure to turn on Automatic Updates in Windows Update to keep Windows,
Microsoft Office, and other Microsoft programs up to date. You should also
enable automatic updates for third-party software, especially browsers, Adobe
Acrobat Reader, and other programs you use regularly.
3. Use of anti-virus software and its current version
If you run Windows Device Security in Windows or Windows Defender, you already
have Security Center installed.
4. Make sure your passwords are well-chosen and secure.
For information on how to do this, see in the article Password protection.
5. Do not open suspicious attachments and do not follow unusual links in
messages.
They can appear in emails, tweets, posts, online advertising, messages or
attachments, and sometimes pretend to be well-known and reliable sources.
6. Safe web browsing
Do not visit sites that offer potentially illegal content. Many of these sites
instantly install malicious software or offer downloads that contain malicious
software. Use a modern browser, such as Microsoft Edge, to block malicious
websites and prevent malicious code from running on your computer.
7. Stay away from pirated materials
Avoid streaming and downloading movies, music, books, or programs that do not
come from trusted sources. They may contain malware.
8. Do not use USBs or other external devices unless you own them
To avoid getting infected with malware and viruses, make sure all external
devices belong to you or come from a trusted source.
https://voca.ro/13THIASoD9JI
1.controversial question
A good example is the potentially controversial question of prevention.
Хорошим прикладом є потенційно спірне питання профілактики.
2.conduct research
They shipped it here to conduct research.
Вони відправили його сюди для проведення досліджень.
3. considerable disagreement
There was considerable disagreement regarding the definition of terrorism.
Існували значні розбіжності щодо визначення тероризму.
https://voca.ro/13HS3qINMANg
· #79
Vasilev A.O RZ-211 Gvozd O.V. (Tuesday, 03 May 2022 09:40)
Today I've read an article called 'NASA shows upper-level westerly winds
affecting Tropical Storm Fred'.The article is about changes in weather. Much
attention is given to the effect of upper-level winds on a tropical storm.
NASA's aqua satellite imagery showed the highest thunderstorms southeast of the
storm's center. AIRS data also showed some of the highest, coldest, strongest
thunderstorms with the temperature of the top of the clouds over storm Fred.
Then this cyclone is encountering strong upper-level winds, so weakening is
forecast.
In my opinion this information is useful because it is especially difficult to
predict weather changes. And everyone wants to know what the weather will be
like tomorrow.
https://voca.ro/1cMgHws54pwi
https://phys.org/news/2015-09-nasa-upper-level-westerly-affecting-tropical.html
Exam topic #7 ( Different protection mechanisms)
In psychoanalytic theory, a defence mechanism , is an unconscious psychological
operation that functions to protect a person from anxiety-producing thoughts and
feelings related to internal conflicts and outer stressors.
Defence mechanisms may result in healthy or unhealthy consequences depending on
the circumstances and frequency with which the mechanism is used. Defence
mechanisms are psychological strategies brought into play by the unconscious
mind to manipulate, deny, or distort reality in order to defend against feelings
of anxiety and unacceptable impulses . These processes that manipulate, deny, or
distort reality may include the following: repression, or the burying of a
painful feeling or thought from one's awareness even though it may resurface in
a symbolic form; identification, incorporating an object or thought into
oneself; and rationalization, the justification of one's behaviour and
motivations by substituting "good" acceptable reasons for the actual
motivations.
https://voca.ro/15eL394ZEb8Y
1)considerable disagreement
There was considerable disagreement regarding the definition of terrorism
https://voca.ro/14QY52oJlmiS
2)conduct research
They shipped it here to conduct research
https://voca.ro/19kcRVkezVSX
3)controversial question
A good example is the potentially controversial question of prevention
https://voca.ro/1i4cX7Rt0Xsh
· #78
Lebedeva E. (Tuesday, 03 May 2022 09:38)
To Mykola Zhmurak RZ-211 The topic The differences between a software and hardware firewall is written correctly.
· #77
Dovzhenko Ilya RZ-211 (Lebedeva) (Tuesday, 03 May 2022 09:36)
Exam topic #6 "An isolated virtual machine"
Virtual Machine is a completely separate individual operating system
installation on your usual operating system. It is implemented by software
emulation and hardware virtualization.
Virtual machine is a software implementation of a physical machine – computer –
that works and executes analogically to it. Virtual machines are divided in two
categories based on their use and correspondence to real machine: system virtual
machines and process virtual machines. First category provides a complete system
platform that executes complete operating system, second one will run a single
program.
Virtual machine has advantages and disadvantages.
On the one hand the user could install two or more os. On the other hand
this utilitty needs powerful system.
https://voca.ro/1fpYwVcCPxPZ
1)controversial question
It's a surprisingly controversial question, given the number of asked people.
Це дивовижно суперечливе питання, враховуючи кількість запитаних людей.
2)conduct research
They pay professors to teach, not conduct research.
Вони платять професорам викладати, а не проводити дослідження.
3)considerable disagreement
This caused considerable disagreement among the believers and nearly led to a
church split.
Це викликало значну незгоду серед віруючих і майже призвело до церковного
розколу.
https://voca.ro/1nHnh8Mpx1Ky
· #76
Shulyak Makar RF-211 (S. Mykhailyuk) (Tuesday, 03 May 2022 09:36)
Today I have read the article: "Making smartphone data anonymous no longer
enough: study".
Privacy measures that are meant to preserve the anonymity of smartphone users
are no longer suitable for the digital age, a study suggested on Tuesday.
Vast quantities of data are scooped up from smartphone apps by firms looking to
develop products, conduct research or target consumers with adverts.
In Europe and many other jurisdictions, companies are legally bound to make this
data anonymous, often doing so by removing telltale details like names or phone
numbers.
But the study in the Nature Communications journal says this is no longer enough
to keep identities private.
The researchers say people can now be identified with just a few details of how
they communicate with an app like WhatsApp.
One of the paper's authors, Yves-Alexandre de Montjoye of Imperial College
London, told AFP it was time to "reinvent what anonymisation means".
Audio: https://voca.ro/17DZFF5x0zE9
----------------------------------------
Phrases of the Day:
1)considerable disagreement - значні розбіжності.
There is considerable disagreement over the relationship between evolution and
culture. - Існують значні розбіжності щодо співвідношення між еволюцією та
культурою.
2)controversial question - спірне питання.
A good example is the potentially controversial question of prevention. -
Хорошим прикладом є потенційно спірне питання профілактики.
3)conduct research - провести дослідження.
They shipped it here to conduct research. - Вони відправили його сюди для
проведення досліджень.
Auido: https://voca.ro/1n8OCWm2iqvM
· #75
Gvozd to Botsaniuk Ivan RZ-211 (Tuesday, 03 May 2022 09:34)
The review is interesting, the task is complete.
· #74
Lebedeva E. (Tuesday, 03 May 2022 09:32)
To Pontus Natalia(RF-211) The tasks are done correctly, but there are some mistakes in reading..
· #73
Botsaniuk Ivan RZ-211 (Gvozd O. V) (Tuesday, 03 May 2022 09:30)
Today I have read the article ”Scientific advance leads to a new tool in the
fight against hackers”. Using the laws of quantum physics, the researchers
developed a new security protocol that uses a person's geographical location to
guarantee that they are communicating with the right person that is secure
against even the most advanced cyber attacks. The researchers' recipe for
securing a person's location combines the information in a single quantum bit -
a qubit - followed by classical bits, consisting of the ones and zeroes that we
are familiar with from ordinary computers. Both types of bits are needed to send
a message that is impossible for cybercriminals to read, hack or manipulate, and
which can confirm whether a person is in your bank's office or in some far-off
country.
https://techxplore.com/news/2022-04-scientific-advance-tool-hackers.html
https://voca.ro/1i17dioaRq3i
Exam topic #20. Principles of information protection.
There are three main principles of information protection: 1) Confidentiality:
The purpose of Confidentiality is to protect the data from unauthorised access.
It is possible by implementing access restrictions to allow access to authorised
entities only. Examples of data confidentiality compromise would be unauthorised
disclosure, password theft or sensitive data theft; 2) Availability: This refers
to the availability of data when authorized users require this data. Devices,
systems, applications, data are of little value to any organization if their
customers can’t access it when they need it. Denial of Service attacks
prevention is an example of ensuring data availability; 3) Integrity: Integrity
means preserving the accuracy and completeness of data. This element ensures
that data has not been tampered with and can be trusted.
https://voca.ro/1hZqV3Y9ec5K
controversial question
Her work has provided new insights into the controversial question of whether
the languages we speak shape the way we think - Її робота дала нове розуміння
суперечливого питання про те, чи мови, якими ми говоримо, формують те, як ми
думаємо.
Considerable diagreement
There has been considerable disagreement on how best to deal with the crisis -
Виникли значні розбіжності думок щодо того, як краще впоратися з кризою.
Conduct research
The standard applies to all faculty, staff, graduate and undergraduate students
of the University who design and conduct research - Стандарт поширюється на всіх
викладачів, співробітників, аспірантів та студентів університету, які
розробляють та проводять дослідження.
https://voca.ro/11d4QiUDXNru
· #72
Julia Shevchuk (RF-211) (S. Mykhailyuk) (Tuesday, 03 May 2022 09:29)
Today I read an article called "Research shows how statistics can aid in the
fight against misinformation." An American University professor and his team
have created a statistical model that can be used to find misinformation in
social posts. Using a set of COVID-19 misinformation tweets, Zois Bukuvalas
shows how statistical models can find social media misinformation during events
such as a pandemic or natural disaster. The researchers carefully labeled the
tweets as misinformation or the truth and used a set of predetermined rules
about the language used in the disinformation to determine their choice. They
also looked at the nuances of human language and the linguistic features
associated with disinformation. The statistical model will need to learn how
different elements in social posts interact to create misinformation. In its
current form, the model is best used by sociologists or others who are
researching ways to detect misinformation.
To sum up, the statistical machine is a great step into the future as it helps
to identify disinformation
https://voca.ro/17TYH08VqKzE
conduct research — провести дослідження
Smartphone developers continue to conduct research into new features
Розробники смартфонів продовжують дослідження нових функцій.
controversial question — спірне питання
New light on the controversial question of species abundance and population
density
Нове світло на спірне питання чисельності видів та щільності популяції
considerable disagreement — значні розбіжності
Even in a small organization, there is likely to be considerable disagreement on
each of these aspects of strategy
Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо
кожного з цих аспектів стратегії
https://voca.ro/1ngOd8Nv52lE
· #71
Artem Verhelis RT-211, Popovych E. (Tuesday, 03 May 2022 09:27)
Exam topic #5
Development of television in your home country.
Television in Ukrainian SSR was introduced in 1951. In 1949s, radio amateurs
built the country's first amateur television center in Kharkov, and in May 7,
six months before the Kyiv television center went on the air, broadcasting began
from the first amateur television center.
Since 1954, there were only three official television centers in the USSR: in
Moscow, Leningrad and Kyiv, and the audience of television viewers wasn't too
large. In August 18, 2011, was held competition, according to the results of
which channels must be selected for digital television.
Nowdays, television in Ukraine is divided into state and commercial.
Audio: https://voca.ro/17u24x6qtm2x
· #70
Mykola Zhmurak RZ-211(Lebedeva) (Tuesday, 03 May 2022 09:27)
The
differences between a software and hardware firewall.
Software firewall is a special type of computer software runs on a
computer/server. It’s main purpose is to protect your computer/server from
outside attempts to control or gain access and depending on your choice of
software firewall. Software firewall can also be configured for checking any
suspicious outgoing requests. Hardware firewall It is physical piece of
equipment planned to perform firewall duties. A hardware firewall can be a
computer or a dedicated piece of equipment which serve as a firewall. Hardware
firewall are incorporated into the router that is situated between the computer
and the internet gateway.
Vocaroo - https://voca.ro/181SI5odPSHf
Phrases :
1) conduct research
But lack of connectivity severely hinders an organization's ability to perform
simple functions, conduct research, and compete for grants.(Але відсутність
зв’язку серйозно заважає організації виконувати прості функції, проводити
дослідження та змагатися за гранти.)
2) considerable disagreement
There is considerable disagreement among researchers about which is best.(Серед
дослідників існують значні розбіжності щодо того, що краще.)
3) controversial question
New light on the controversial question of species abundance and population
density.(Нове світло на спірне питання чисельності видів та щільності
популяції.)
Vocaroo - https://voca.ro/1eY7vwgQntQw
· #69
El-kadi RT-211 (Popovych) (Tuesday, 03 May 2022 09:24)
I
read an article about "Security Holes." And there was one interesting security
hole, namely "corrupted UI (User Interface)". Despite the fact that in this case
the user data is not compromised, a corrupted UI can lead to huge losses for the
business. How much can a large marketplace lose if the site cannot be used for
at least a couple of hours. By "Unusable" I don't mean a poorly designed UI, but
its vulnerability. Taking advantage of this, a hacker can make the button
confirm payment for the goods when prompted will "run away" from the user.
1) controversial question
If you have a controversial question, we will listen to you and give you some
variants of the problem solution.
Якщо у вас виникло навіть дуже спірне питання, будьте певні, що вас обов'язково
вислухають і запропонують варіанти його рішення.
2) considerable disagreement
As several prominent politicians, researchers, and scholars have made clear in
the public discourse, there is considerable disagreement about feminism in
contemporary Western society.
Як зазначають багато відомих політиків, дослідників та вчених, у сучасному
західному суспільстві існують чималі розбіжності щодо визначення фемінізму.
3) conduct research
Candidates often have the opportunity to conduct research internationally.
Кандидати часто мають можливість проводити дослідження на міжнародному рівні.
· #68
Kovalzhi Andrey RZ-211 (Lebedeva E.) (Tuesday, 03 May 2022 09:23)
Exam topic #5 (software firewall)
Software firewall is a firewall that is installed on a computer or server, and
tasked with network security. It works with a wide variety of other technology
security solutions to provide more robust security for enterprises of all sizes.
When a software firewall is installed on a server, it opens up like an umbrella
of protection over all other computers connected to the network. It is able to
monitor both incoming and outgoing traffic for potential risk or suspicious user
behaviour, and also makes setting security policies much easier, faster and more
flexible. This type of firewall is fast becoming in the solution of choice for
many reasons. Enterprises love the lower initial cost with few restrictions on
the number of devices to be protected. This type of firewall is also critical as
it requires very little space, and can be installed remotely on any number of
devices.
https://voca.ro/1aJ5zbyZKNBs
Daily Phrases:
1. conduct research
In 2018, NIMS and Softbank co-founded the Advanced Technologies Development
Center to conduct research with the goal of putting lithium-air batteries into
practical use in mobile phones, the Internet of Things (IoT), and other
technologies
В 2018 NIMS и Softband вместе основали Центр по развитию продвинутых технологий
чтобы проводить исследования, целью которых было внедрение литий-воздушных
батарей в телефоны, интернет вещей и в прочие технологии.
2. considerable disagreement
When researchers discuss the forces that shaped human history, there is
considerable disagreement as to whether our behavior is primarily determined by
culture or by the environment
Когда исследователи обсуждают силы, которые сформировали историю человечества,
возникают значительные разногласия касательно того, что в первую очередь влияет
на наше поведение: культура или окружение?
3.Tiny particles called nanobacteria were discovery 20 years ago, but the most
controversial question is whether or not they are alive.
Крошечные частицы называемые нанобактериями были открыты 20 лет назад, но самый
спорный вопрос заключается в том, живы они или неь?
https://voca.ro/1bpBuIfxkW6p
· #67
Timophey Sipin RZ-212(Popovych) (Tuesday, 03 May 2022 09:23)
Today l have read the article titled «I selfie, therefore I am': Instagram 10
years on».In this text, we are told about the changes in Instagram over 10
years, as well as the pros and cons of this app. For example, we are told about
a significant improvement in the service , from the usual photo processing 10
years ago, to an element without which now is difficult to imagine our life.
Instagram (based on information from the text) helped many companies, brands and
ordinary people to make life easier.
In my opinion, we need Instagram today, but as the psychologist correctly noted
in the text, teenagers do not need to strive for the ideal life that they see in
the Internet application.
https://techxplore.com/news/2020-10-selfie-instagram-years.html
https://voca.ro/1fg9FoYZ6wS
1) considerable disagreement
Considerable disagreements often arise between me and my friends about the role
of the United States in the geopolitical arena.
Між мною та моїми друзями часто виникають значні розбіжності щодо ролі
Сполучених Штатів на геополітичній арені.
2) controversial question
Aid to third-world countries has always been a very controversial question.
Допомога країнам третього світу завжди була дуже спірним питанням.
3) conduct research
They shipped it here to conduct research.
Вони відправили його сюди для проведення досліджень.
Audio: https://voca.ro/1nJ7SHdxq
· #66
Timur Ergul RT-211 (Popovych) (Tuesday, 03 May 2022 09:22)
classwork
https://techxplore.com/news/2022-01-intel-stacked-forksheet-transistor-patent.html
Today I've read the article "Intel applies for stacked forksheet transistor
patent". It tells us about a new type of transistors. Intel has applied for a
patent application, for a type of stacked transistor that might allow the
company to produce chips with 18 Angstrom transistors on them. Intel has shown
interest in this technology, so with small steps per month, we can expect them
in the future. Imec claimed on their statement that their design would result in
a critical 10% speed gain value or a 24% reduction in power. In my humble
opinion, the real results we will see in the future.
https://voca.ro/14fCKMgPSEUG
1)Their behaviour is so different from the other s-block elements that there is
considerable disagreement over where these two elements should be placed in the
periodic table.
Их химические свойства так сильно отличаются от других s-элементов, что порой
возникают значительные разногласия относительно положения элементов в
периодической системе.
2)Health psychologists apply this knowledge to conduct research on a variety of
questions.
Психологи применяют эти знания для проведения исследований по различным
вопросам.
3)Her work has provided new insights into the controversial question of whether
the languages we speak shape the way we think (Linguistic relativity).
Её исследования позволили по-новому взглянуть на спорный вопрос, влияет ли язык,
на котором мы говорим, на наше мышление (теория лингвистической
относительности).
https://voca.ro/11UzAXKjzoCB
· #65
Pontus Natalia(RF-211)(Lebedeva E.V.) (Tuesday, 03 May 2022 09:22)
Reading:
Ex. 2
1) The protection schemes are divided according to their functional properties.
2) There are unprotected systems, all-or-nothing systems, controlled sharing,
and user-programmed sharing controls.
3) Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Examples include the Dartmouth Time-Sharing System and
IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4) A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data
5) By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates.
Ex1. Speaking
1) Information Science is a discipline that deals with processes of storing and
transferring information.
2) Subsystem is a self-contained system within a larger system.
3) Data are the facts and statistics collected to reference and analyze.
4) File is a set to related data.
Ex2. Speaking
1) What has been implemented for protecting information in computer systems?
2) What is the reason for differences among protection schemes?
3) Why do users need to construct a protected subsystem?
Digital security is the collective term that describes the resources employed to
protect user’s online identity, data, and other assets. These tools include web
services, antivirus software etc.
Authentication system helps to protect the data from threats such as hacking and
fishing as it identifies new users, monitors traffic, approves or blocks
unauthorized access.
As for methods, that can help users to maintain their digital safety and
security, updating antivirus systems can be extremely helpful. It also ensures
any website user is visiting has safe and secured connection.
Using these simple digital security resources any user can stay digitally safe.
Audio: https://voca.ro/13ajNHC1o3p3
· #64
Lebedeva (Tuesday, 03 May 2022 09:19)
To Ivan Zaritskiy RZ-211 Thanks for the work
· #63
S.Mykhailiuk (Tuesday, 03 May 2022 09:15)
To Bilokamenskiy Anton (RF-211) Task1 contains grammar mistakes. Task2 should contain phrases with translation first . Just 68 points this time . Pls focus on exam topics next time.Keep on working hard.
· #62
Sasha Movsum-Zade RT-211 (Popovych E.) (Tuesday, 03 May 2022 09:14)
Today I have read the article titled "Ultrafast optical-magnetic memory device".
This article describes how magnetic random-access memory (MRAM) technology
offers significant potential for a versatile next-generation memory
architecture. However, modern MRAMs are still mostly limited to a sub-nanosecond
rate limit, which remains a longstanding scientific challenge in spintronics
R&D. The article also describes that in this two PhD project, Luding Wang
experimentally demonstrated a fully functional picosecond opto-MRAM building
device by integrating ultrafast photonics with spintronics. In the end, based on
what I've read before, I can say that this technology is still under development
and is imperfect.
https://phys.org/news/2022-04-ultrafast-optical-magnetic-memory-device.html
https://voca.ro/16tJnoMIzzfg
1)controversial question
New light on the controversial question of species abundance and population
density
Нове світло на спірне питання чисельності видів та щільності популяції
2)considerable disagreement
Even in a small organization, there is likely to be considerable disagreement on
each of these aspects of strategy.
Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо
кожного з цих аспектів стратегії.
3)conduct research
But lack of connectivity severely hinders an organization's ability to perform
simple functions, conduct research, and compete for grants."
Але відсутність зв’язку серйозно заважає організації виконувати прості функції,
проводити дослідження та змагатися за гранти».
https://voca.ro/14iQFzy4dWez
· #61
Ivan Zaritskiy RZ-211 (Lebedeva) (Tuesday, 03 May 2022 09:11)
Concept of “Privacy”
Privacy is a valuable aspect of personality. Sociologists and psychologists
agree that a person has a fundamental need for privacy. A person’s right to
privacy entails that such a person should have control over his or her personal
information and should be able to conduct his or her personal affairs relatively
free from unwanted intrusions. Privacy is also at the core of our democratic
values. An individual has an interest in the protection of his or her privacy as
preserving privacy encourages dignity, self-determination, individual autonomy
and ultimately promotes a more robust and participatory citizenry.
https://voca.ro/133YP6ldHpF1
considerable disagreement
When researchers discuss the forces that shaped human history, there is
considerable disagreement as to whether our behavior is primarily determined by
culture or by the environment(Коли дослідники обговорюють сили, які сформували
історію людства, виникають значні розбіжності щодо того, чи наша поведінка
визначається насамперед культурою чи навколишнім середовищем.)
controversial question
New light on the controversial question of species abundance and population
density.(Нове світло на спірне питання чисельності видів та щільності
популяції.)
conduct research
Smartphone developers continue to conduct research into new features.(Розробники
смартфонів продовжують дослідження нових функцій.)
https://voca.ro/1cTYD1Nppw7e
· #60
Vlada Gromovaya (RF-211) (S. Mykhailyuk) (Tuesday, 03 May 2022 09:10)
Today I have read the article "A small, wide-field-of-view camera built based on
fish eyes" by Bob Yirka. A group of researchers from several institutes wanted
to develop a wide-field-of-view camera in a smartphone. Researchers looked at
the eyes of most fish and noticed that they have a single lens and a curved
retina, and are known to have wide-angle capabilities.Combining a monocentric
lens, a hemispherical silicon nanorod photodiode, and adding an aperture in a
special case resulted in a very small device for imaging with a wide field of
view. The researchers photographed with the camera, taking pictures from a wide
angle at different distances.
In my opinion, this development is an important step toward creating cameras
with a wide field of view suitable for portable devices and drones.
Article:
https://techxplore.com/news/2020-07-small-wide-field-of-view-camera-built-based.html
Audio:https://voca.ro/16UiJzV1wEV5
Phrases of the day
1) considerable disagreement - значні розбіжності
Even in a small organization, there is likely to be considerable disagreement on
each of these aspects of strategy.
Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо
кожного з цих аспектів стратегії.
2) conduct research - провести дослідження
Smartphone developers continue to conduct research into new features. Розробники
смартфонів продовжують дослідження нових функцій.
3) controversial question - спірне питання
New light on the controversial question of species abundance and population
density.
Нове світло на спірне питання чисельності видів та щільності популяції.
Audio: https://voca.ro/1dyGNN72WiuS
· #59
Ivkov Yurii (RF-211)(S.Mykhailiuk) (Tuesday, 03 May 2022 09:09)
Today I’ve read an article about how algorithms can help the clothing industry.
It is about a student's project directed to use AI and big data to improve the
industry’s value chains. Sheenam Jain developed two models for companies to use.
First one classifies clothing and is based on a machine learning algorithm
"random forest" that can be integrated with a recommendation system.
Second is a system created to help companies make a decision on which fabric is
better for the current user.
I think Jain did a great research, and thanks to this thesis the clothing
industry now has a model on how to use big data, thus providing customers better
service.
Article: https://techxplore.com/news/2020-10-algorithms-industry.html
Phrases of the day
controversial question
- спірне питання
Creators of xenobots were faced with a controversial question if xenobots are
animals or robots.
- Перед творцями ксеноботів постало спірне питання чи є ксеноботи тваринами, чи
роботами.
conduct research
- проводити дослідження
When conducting research on image matrix it is important to be sure if the init
photo is genuine.
- При проведенні дослідження матриці зображення важливо бути впевненим, що
початкова фотографія є справжньою.
considerable disagreement
- суттєві розбіжності
There is always a considerable disagreement of how all should be done on the
step of implementing the idea into a working program or game among the whole
team.
- Серед усієї команди часто виникають значні розбіжності щодо того, як усе
робити на етапі втілення ідеї в робочу програму чи гру.
Audio for article and phrases: https://vocaroo.com/1inkXYdWMRaT
· #58
Biehin Yevhen RF-211 (S.Mykhailiuk) (Tuesday, 03 May 2022 09:09)
Today I have read an article titled "The ethics of artificial intelligence".
This article tells us about what AI is, what its being used for and what is an
ethical AI.
AI means computers doing intelligent things—performing cognitive tasks such as
thinking, reasoning, and predicting—that were once thought to be the sole
province of humans. It's not a single technology or function.
Generally, AI involves algorithms, machine learning, and natural language
processing.
AI is used in countless areas.
In healthcare, AI is used to detect tumors in MRI scans, to diagnose illness,
and to prescribe treatment. In education, AI can evaluate teacher performance.
In transportation, it's used in autonomous vehicles, drones, and logistics. In
banking, it's determining who gets a mortgage. In finance, it's used to detect
fraud. Law enforcement uses AI for facial recognition. Governments use AI for
benefits determination. In law, AI can be used to examine briefs parties have
written and look for missing case citations.
Article: https://techxplore.com/news/2021-10-ethics-artificial-intelligence.html
Phrases of the day
1) Conduct research
He continues to conduct research and publish scientific books and articles
Він продовжує вести дослідження та публікувати наукові книги та статті
2) Controversial question
"They told me it was a controversial question".
«Мені сказали, що це спірне питання».
3) Considerable disagreement
There is considerable disagreement over the relationship between evolution and
culture.
Існують значні розбіжності щодо співвідношення між еволюцією та культурою.
Vocaroo: https://voca.ro/11GSglJXpAvT
· #57
Lebedeva E (Tuesday, 03 May 2022 09:08)
To
Maksim Teliga (RF-211) Let's correct: Information systems security does not just
deal with computer information, but also protect data...
To Ilinchuk Vladislav RZ-211 Thanks for a detailed comment.
· #56
Vlasov Vadim RZ-211 (Vorobyova E.V) (Tuesday, 03 May 2022 09:07)
Topic 8 Passwords and their drawback
Now everyone knows what a password and login are, but not everyone knows how to
safely store an
use them.
Using one password for all sites is extremely dangerous. Having hacked one
user's page, hackers have easy access to all the others: financial services,
cloud services, e-mail and other user applications. Therefore, unique passwords
are created for each resource.
In order not to worry, you can use password managers - these are specialized
services for secure storage of all codes. They securely encrypt data: passwords,
logins, information about the service where you want to enter passwords and
logins.
https://voca.ro/1amxqiItLYml
considerable disagreement
Even in a small organization, there is likely to be considerable disagreement on
each of these aspects of strategy.
Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо
кожного з цих аспектів стратегії.
controversial question
New light on the controversial question of species abundance and population
density.
Нове світло на спірне питання чисельності видів та щільності популяції.
conduct research
Smartphone developers continue to conduct research into new features
Розробники смартфонів продовжують дослідження нових функцій
https://voca.ro/16IOyq7GLyaB
· #55
S.Mykhailiuk (Tuesday, 03 May 2022 09:07)
To Khotynskiy Oleg (RZ-212) Pls select topics that have something to do with your speciality. Just 72 points this time . Task2 should be based on your speciality. Just 72 points. Prepare exam topics next week, pls.
· #54
Ilinchuk Vladislav RZ-211(Lebedeva) (Tuesday, 03 May 2022 09:04)
Today I have read the article "Earthquake modelers unite to compare and improve
code".This the article is about a new development of computational physics based
models that simulate earthquake sequences and non-earthquake motions.In a new
study, Jiang et al report on international community–driven efforts to compare
and verify the different numerical codes underlying simulations of fault zone
processes These simulations could help uncover new insights into earthquakes,
including factors that affect their timing, location, duration, and magnitude.
In my opinion, this article is very interesting to read for everyone especially
for people who love new technologies and dream about the future.
1)https://phys.org/news/2022-05-earthquake-code.html
2)https://voca.ro/1kJ6Ye3fuire
controversial question
A good example is the potentially controversial question of prevention.
Хорошим прикладом є потенційно спірне питання профілактики.
considerable disagreement
Three months ago, I said that there was considerable disagreement about these
issues, but that two things were certain.
Три місяці тому я сказав, що є значні розбіжності щодо цих питань, але дві речі
безсумнівні.
conduct research
They shipped it here to conduct research.
Вони відправили його сюди для проведення досліджень.
3)https://voca.ro/1lwtQ9lJRD8M
· #53
Lebedeva E (Tuesday, 03 May 2022 09:04)
To Kapeliushnyi Vladyslav (RZ-211) Exam topic #3 is written correctly.
· #52
Sergey Kyznyak RT-211, Popovych E. (Tuesday, 03 May 2022 09:04)
Exam Topic #5
Commercial use of radio is primarily based on the practice of airing radio
advertisements and television advertisements for profit. In 1920, Westinghouse,
one of the leading radio manufacturers, had an idea for selling more radios: It
would offer programming. Radio began as a one-to-one method of communication, so
this was a novel idea. Well, on November 2, 1920, station KDKA made the nation's
first commercial broadcast. They chose that date because it was election day,
and the power of radio was proven when people could hear the results of the
Harding-Cox presidential race before they read about it in the newspaper. It was
a breakthrough in the commercial use of radio and marked the beginning of the
golden age of radio.
Vocaroo: https://voca.ro/175nwaFJMeUg
http://www.pbs.org/wgbh/aso/databank/entries/dt20ra.html
· #51
Lebedeva E (Tuesday, 03 May 2022 09:03)
To Daniil Dragin (RZ-211 ) Thanks for a detailed information on Authentication mechanisms.
· #50
Sergey Kyznyak RT-211, Popovych E. (Tuesday, 03 May 2022 09:02)
(Article)
Today I have read the article 'Combining AI and computational science for
better, faster, energy efficient predictions'.
The article tells about the new technology "intelligent alloys", the main
purpose of which is combining the power of computational science with artificial
intelligence to develop models that complement simulations to predict the
evolution of science's most complex systems. By using this technology, the
researchers demonstrated that they can generate predictions thousands to a
million times faster than it would take to run the simulations with full
resolution or rely on partial or even faulty information through models. I think
this technology has a huge future that is coming right now.
1)expected value
Either the present value or a future expected value should be used.
Следует использовать либо нынешнее значение, либо будущие ожидаемые значения.
2)technology capability
At least the exponential growth of information technology capability will
continue unabated.
По крайней мере, возможности информационных технологий будут расти, не
ослабевая, с экспоненциальной скоростью.
3)work schedule
Consequently, the Court may wish not to overstretch its work schedule in the
field at any given time.
Соответственно, Суд, возможно, пожелает сделать более напряженным свой график
работы на местах в любой заданный период времени.
Vocaroo(article): https://voca.ro/1iVdA1qr4K25
Vocaroo(sentences): https://voca.ro/130pnPRxsJji
https://techxplore.com/news/2022-04-combining-ai-science-faster-energy.html
· #49
Lebedeva E (Tuesday, 03 May 2022 09:01)
To ilokamenskyi Anton, Rosinskiy Kyrylo Not bad, but there are mistakes in the questions.
· #48
S.Mykhailiuk (Tuesday, 03 May 2022 09:00)
To Kate Kholodova (RZ-212) Pls select topics relating to your speciality. The comment contains some grammar mistakes Just 65 points Task2 should contain examples based on your speciality. Just 74 points. Keep working hard.Net week pls focus on exam topics left for you to do.
· #47
Lebedeva E (Tuesday, 03 May 2022 08:59)
To Mashegirov Eugene (RF-211) and Gridnev Dmytro(RF-211) Well done, thank you.
· #46
Daniil Dragin (RZ-211 Lebedeva E) (Tuesday, 03 May 2022 08:58)
Authentication mechanisms №13
The authentication mechanism is one of the administrative tools. It allows you
to determine which of the users listed in the list of system users is currently
connected to the application solution and goes through three stages:
identification (user definition), authentication (user verification),
authorization (gaining access). There are several authentication methods:
-use of electronic signature
- by passwords (reusable or one-time)
- via SMS
- user information (used for two-step authentication)
-user data (based on geodata about the user's location using GPS)
- biometric authentication (fingerprint, face scan, iris pattern)
Depending on the number of methods used, one-factor and multi-factor
authentication are distinguished. To prevent intruders from gaining access to
data and authentication information, cryptographic authentication protocols are
used to protect against unauthorized access to information.
https://voca.ro/1mT2wu4bk3eB
1)controversial question
New light on the controversial question of species abundance and population
density
Нове світло на спірне питання чисельності видів та щільності популяції
2)considerable disagreement
Even in a small organization, there is likely to be considerable disagreement on
each of these aspects of strategy.
Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо
кожного з цих аспектів стратегії.
3)conduct research
But lack of connectivity severely hinders an organization's ability to perform
simple functions, conduct research, and compete for grants."
Але відсутність зв’язку серйозно заважає організації виконувати прості функції,
проводити дослідження та змагатися за гранти».
https://voca.ro/1fx0HBzam2TO
· #45
S.Mykhailiuk (Tuesday, 03 May 2022 08:53)
To Maksim Teliga (RF-211) just good for Task1 and very good for task 2.
· #44
Kapeliushnyi Vladyslav (RZ-211. Lebedeva E.V.) (Tuesday, 03 May 2022 08:52)
Exam topic #3
To protect your organization from cyber attacks, there are several technologies
to combat it. The most famous of them: data loss prevention, intrusion detection
and prevention system, security incident and event management, firewall,
antivirus.
Let's consider two of the techniques proposed above.
Prevent data loss (verification technology, data sent by the organization for
the content of confidential data)
Intrusion Detection System (IDS) is a technology that monitors all traffic
coming into an organization to make sure it is not harmful.
Therefore, in order to protect the system from any of the security incidents,
the organization must use technology to protect its systems.
https://voca.ro/1cIQaRHJmHxC
1) It provides insights on the controversial question of where hoofed animals
evolved.
Він дає розуміння суперечливого питання про те, де еволюціонували копитні.
2)Even in a small organization, there is likely to be considerable disagreement
on each of aspects of strategy.
Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо
кожного з аспектів стратегії.
3)It has also been very interesting to conduct research at three different
universities.
Також було дуже цікаво проводити дослідження в трьох різних університетах.
https://voca.ro/19QTNZ5qMAOR
· #43
Bilokamenskiy Anton (RF-211) (S.Mykhailiuk) (Tuesday, 03 May 2022 08:43)
Today i have read an article titled "Research shows how statistics can aid in
the fight against misinformation" by Rebecca Basu, American University. It talks
about a statistical model, which can determine misinformation posts on Twitter.
By using math and statistic, machine is learning by itself and already can
determine fake information in 112 tweets with 90% accuracy. For example, two of
the tweets in the dataset contain "bat soup" and "COVID" together. The tweets
were labeled misinformation by the researchers, and the model identified them as
such. They`ll continue to modify model, to upgrade user interface and more tools
to use, like determening tweets with some kind of a multimedia. I hope that this
will start new era of information on web, without fakes and disinformation, for
people to be sure what they see.
Article: https://techxplore.com/news/2021-12-statistics-aid-misinformation.html
Audio: https://voca.ro/1cCO8An2wUpx
Phrases of the day
1. There was considerable disagreement regarding the definition of terrorism.
Існували значні розбіжності щодо визначення тероризму.
2. It also has the authority to conduct research and studies and to carry out
construction projects.
Він також має повноваження проводити дослідження та виконувати будівельні
проекти.
3. Another controversial question within the Liability Convention relates to the
provisions on the applicable law.
Інше спірне питання в рамках Конвенції про відповідальність стосується положень
про застосовне законодавство.
Audio: https://voca.ro/1kK5gtZnPj3l
· #42
Maksim Teliga (RF-211) (Lebedeva E.V.) (Tuesday, 03 May 2022 08:41)
Ex
2 Reading
1) It is convenient to divide protection schemes according to their functional
properties. A rough categorization is the following.
2) Unprotected systems, All-or-nothing systems, Controlled sharing,
User-programmed sharing controls
3) Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Examples include the Dartmouth Time-Sharing System and
IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4) A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data (that is,
the protected objects).
5) By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates.
Ex 1 Speaking
1) Information Science is a discipline that deals with processes of storing and
transferring information
2) Subsystem is a self-contained system within a larger system
3) Data are the facts and statistics collected together to reference and analyze
4) File is a set to related data
Ex 2 Speaking
1) What has been implemented for protecting information in computer systems?
2) What is the reason for differences among protection schemes
3) Why users need to construct a protected subsystem
Information systems security does not just deal with computer information, but
also protecting data and information in all of its forms, such as telephone
conversations.
Risk assessments must be performed to determine what information poses the
biggest risk. For example, one system may have the most important information on
it and therefore will need more security measures to maintain security. Business
continuity planning and disaster recovery planning are other facets of an
information systems security professional. This professional will plan for what
could happen if a major business disruption occurs, but still allow business to
continue as usual.
Audio:https://voca.ro/15zlb3eUxkds
· #41
Lebedeva E. (Tuesday, 03 May 2022 08:41)
To Gromovaya Vlada (RF-211) There is a mistake in the third question. Use auxiliary verb in the question.
· #40
Gvozd O.V. to RZ-211 (Tuesday, 03 May 2022 08:40)
Good day!
The lesson will start soon, so I am waiting for your comments, sentences with
Phrases and audio recordings. Don't forget to write your Independent practice
and add the exam topic. Please, do it in one comment.
· #39
Mashovets Andrey (RZ 212, Popovich) (Tuesday, 03 May 2022 08:39)
Today I’ve read the article “Life as we know it most likely arose via 'long,
slow dance'”.
This article is about speculation about eukaryotic origins as slow growth of
intimacy - the result of a long, slow dance between the kingdoms, rather than a
quick attempt, as depicted in the textbooks.
The purpose of this article is to provide a new theory on eukaryotic origin.
Eukaryotic cells of plants, animals and protists are markedly different from
cells of their single-celled, prokaryotic relatives, archaea and bacteria.
Eukaryotic cells are much larger and have much greater internal complexity,
including many internal membrane-bound compartments.
I think this article will be useful for people interested in biology.
https://voca.ro/1226QKtyaHZI
https://phys.org/news/2016-06-life-arose.html
1.conduct research
Several UF/IFAS scientists conduct research for DSSAT.
2.controversial question
New light on the controversial question of species abundance and population
density
3.considerable disagreement
Although scientists generally agree that eukaryotes can trace their ancestry to
a merger between archaea and bacteria, there's been considerable disagreement
about what the first eukaryote and its immediate ancestors must have looked
like.
https://voca.ro/1Zhf79c0sR7H
· #38
Pushkash Maxim (RZ-212 Popovich) (Tuesday, 03 May 2022 08:37)
Exam topic #5 (software firewall)
Software firewall is a firewall that is installed on a computer or server, and
tasked with network security. It works with a wide variety of other technology
security solutions to provide more robust and cohesive security for enterprises
of all sizes. When a software firewall is installed on a server, it opens up
like an umbrella of protection over all other computers connected to the
network. It is able to monitor both incoming and outgoing traffic for potential
risk or suspicious user behaviour, and also makes setting security policies much
easier, faster and more flexible. This type of firewall is fast becoming in the
solution of choice for many reasons. Enterprises love the lower initial cost
with few restrictions on the number of devices to be protected. This type of
firewall is also critical as it requires very little space, and can be installed
remotely on any number of devices.
Voice: https://voca.ro/15RQm2EvYmYb
· #37
Khotynskiy Oleg (RZ-212, S.Mykhailiuk) (Tuesday, 03 May 2022 08:37)
Today I have read the article "Why the electric vehicle revolution will bring
problems of its own". As we know, in recent years, more and more people have
begun to protest against the use and production of ordinary cars that can only
be driven by using gasoline. Many environmental activists are urging people to
switch to electric vehicles, but few people know that the mass use of electric
vehicles can also lead to problems.
First, the cells used in the production of batteries are finite and their number
is limited. Also, the appearance of electric vehicles will not be able to solve
the problem of sedentary population, and with an increase in the number of
electric vehicles on the roads, traffic jams will become even more frequent and
unbearable.
As for me, the main advantage of electric vehicles - the rejection of the use of
internal combustion engines will cover all these minor disadvantages.
Article: https://phys.org/news/2018-04-electric-vehicle-revolution-problems.html
Audio: https://voca.ro/1l13BXodgHjH
1) considerable disagreement
Considerable disagreements often arise between me and my friends about the role
of the United States in the geopolitical arena.
Між мною та моїми друзями часто виникають значні розбіжності щодо ролі
Сполучених Штатів на геополітичній арені.
2) controversial question
Aid to third-world countries has always been a very controversial question.
Допомога країнам третього світу завжди була дуже спірним питанням.
3) conduct research
They shipped it here to conduct research.
Вони відправили його сюди для проведення досліджень.
Audio: https://voca.ro/1nJ7SHdxqP5G
· #36
Lebedeva E (Tuesday, 03 May 2022 08:29)
To Mashegirov Eugene (RF-211) and Gridnev Dmytro(RF-211) Well done, thank you.
· #35
Kate Kholodova (RZ-212, Mikhailuk) (Tuesday, 03 May 2022 08:29)
Today I have read the article "Smart urban solutions for more resilient cities".
It tells about a new project SMURBS, begun as part of the EU's ERA-PLANET
umbrella project, is working to increase urban resilience and raise the quality
of life in urban regions. To achieve this goal, it's focusing on challenges
related to air quality, urban growth, natural and man-made disasters, health and
migration. The project's first step is to stimulate strategic planning by
connecting with local authorities, urban planners and city-level stakeholders to
map out 'what is already out there' and 'what the users want'.
In my opinion, SMURBS will help cities with many problems related to sustainable
urban development.
article -
https://phys.org/news/2018-08-smart-urban-solutions-resilient-cities.html
audio - https://voca.ro/1bKJ15HnRaAx
1) conduct research
Health psychologists apply this knowledge to conduct research on a variety of
questions.
Психологи в галузі охорони здоров’я застосовують ці знання, щоб проводити
дослідження з різноманітних питань.
2)considerable disagreement
Their behaviour is so different from the other s-block elements that there
is considerable disagreement over where these two elements should be placed in
the periodic table.
Їхня поведінка настільки відрізняється від інших елементів s-блоку, що є значні
розбіжності з приводу того, де ці два елементи мають бути розміщені в
періодичній таблиці.
3)controversial question
Her work has provided new insights into the controversial question of whether
the languages we speak shape the way we think (Linguistic relativity).
Її робота дала нове розуміння спірного питання про те, чи мови, якими ми
розмовляємо, формують наш спосіб мислення (лінгвістична відносність).
Audio ph: https://voca.ro/1lQVcoIPbXDI
· #34
Gromovaya Vlada (RF-211) (Lebedeva E.V.) (Tuesday, 03 May 2022 08:28)
Reading:
Ex. 2
1) Protection schemes are divided according to their functionality.
2) There are unprotected systems, all-or-nothing systems, controlled sharing,
and user-programmed sharing controls.
3) Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Examples include the Dartmouth Time-Sharing System and
IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4) A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data (that is,
the protected objects).
5) Subsystem programs protect and control operations performed on the data.
Speaking module:
Ex. 1
1) Information Science is a discipline that deals with processes of storing and
transferring information.
2) Subsystem is a self-contained system within a larger system.
3) Data are the facts and statistics collected together to reference and
analyze.
4) File is a set to related data.
Ex. 2
1) What has been implemented for protecting information in computer systems?
2) What is the reason for differences among protection schemes?
3) Why users need to construct a protected subsystem?
Writing module:
Information protection systems
The information protection system is a set of technical and organizational
measures that are aimed at ensuring the information security of an organization.
The main object of protection is the data processed in the automated control
system and involved in the implementation of work processes.
The information protection system must be comprehensive, i.e. apply not only
technical, but also legal and administrative means of protection. The protection
system is characterized not only by flexibility but also by adaptation to
rapidly changing environmental conditions. Administrative measures (e.g. regular
change of passwords, strict order of their storage, as well as proper allocation
of user permissions and analysis of system logs) play a major role.
Audio: https://voca.ro/17qqIp22HO5X
Phrases of the day:
1) Even in a small organization, there is likely to be considerable disagreement
on each of these aspects of strategy.
1) Навіть у невеликій організації, ймовірно, виникнуть значні розбіжності щодо
кожного з цих аспектів стратегії.
2) Smartphone developers continue to conduct research into new features.
2) Розробники смартфонів продовжують дослідження нових функцій.
3) New light on the controversial question of species abundance and population
density.
3) Нове світло на спірне питання чисельності видів та щільності популяції.
Audio: https://voca.ro/1c0gjXgn00wa
· #33
Lebedeva E (Tuesday, 03 May 2022 08:27)
To Alexander Shibaev (RF-211) Use auxiliary verb Do in the third question.
· #32
Maksim Teliga (RF-211) (S. Mykhailyuk) (Tuesday, 03 May 2022 08:24)
Today I have read the article about the new operating system. An international
team of researchers has developed a computer system that can analyze a sample of
chemical waste and create the routes to synthesize new, useful chemicals. They
point out that even a waste sample with a small number of molecules can generate
millions of routes toward the creation of a new product. In this new effort, the
researchers used a computer system designed to understand the intricacies of
complicated entities based on single samples. On my mind it is very interesting
and useful way how to research new element that in future can help us in
medicine, engineering and more else...
Article:
https://voca.ro/1hbqdFQtIIR5https://phys.org/news/2022-04-chemical-ways-products.html
Audio:
1) conduct research - провести дослідження
Health psychologists apply this knowledge to conduct research on a variety of
questions.
Психологи в галузі охорони здоров’я застосовують ці знання для проведення
досліджень з різних питань.
2) considerable disagreement - значні розбіжності.
Their behaviour is so different from the other s-block elements that there is
considerable disagreement over where these two elements should be placed in the
periodic table.
Їхня поведінка настільки відрізняється від інших елементів s-блоку, що існують
значні розбіжності щодо того, де ці два елементи повинні бути розміщені в
періодичній таблиці.
3) controversial questions - спірні питання.
Her work has provided new insights into the controversial question of whether
the languages we speak shape the way we think (Linguistic relativity).
Її робота дала нове розуміння суперечливого питання про те, чи мови, якими ми
розмовляємо, формують наш спосіб мислення (Лінгвістична відносність).
· #31
Alexander Shibaev (RF-211, Lebedeva E.V.) (Tuesday, 03 May 2022 08:23)
Ex.2 (Reading)
1. The protection schemes are divided according to their functional properties.
2. There are unprotected systems, all-or-nothing systems, controlled sharing and
user-programmed sharing controls.
3. Unprotected systems: Disk Operating System for the IBM System 370.
All-or-nothing systems: Dartmouth Time-Sharing System and IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX.
4. A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data.
5. The programs of the subsystem completely control the operations performed on
the data.
Ex.1 (Speaking)
1. Information Science is a discipline that deals with processes of storing and
transferring information.
2. Subsystem is a self-contained system within a larger system.
3. Data is the facts and statistics collected together to reference and analyze.
4. File is a set of related data.
Ex.2 (Speaking)
1. What has been implemented for protecting information in computer systems?
2. What is the reason for differences among protection schemes?
3. Why users need to construct a protected subsystem?
Information Security Systems
Information security, also known as infosec is the process of securing data and
information secure from any kind of violations in the form of theft, abuse, or
loss. Information security aims to protect data at different stages- whether it
is while storing it, transferring it or using it. For practical reasons, it is
also referred to as data security as it involves protecting all kinds of print
or electronic data.
Information security has evolved as one of the main requirements of businesses
worldwide today. Since data is our main asset in the digital economy, it becomes
of paramount importance to protect that data. Companies of all scales, from big
corporate giants to self-funded startups have all started to invest in
information security, creating a huge demand for experts in the domain.
· #30
Neblienko V. / RZ-212 / Popovych (Tuesday, 03 May 2022 08:21)
Today i have read the article titled: "Research shows how statistics can aid in
the fight against misinformation". This text is about a professor of mathematics
who, with his team, invented a way to find misinformation using statistical data
and remove "black boxes" from a machine learning system. With the use of
algorithms and computer models, machine learning is increasingly playing a role
in helping to stop the spread of misinformation, but a main challenge for
scientists is the black box of unknowability, where researchers don't understand
how the machine arrives at the same decision as human trainers.
In my opinion, this study is a great way to avoid new mistakes from machine
learning and destroy fakes.
Article: https://techxplore.com/news/2021-12-statistics-aid-misinformation.html
Vocaroo: https://voca.ro/11FvhupKoeq1
Phrases
conduct research
But lack of connectivity severely hinders an organization's ability to perform
simple functions, conduct research, and compete for grants.
Но отсутствие связи серьезно мешает организации выполнять простые функции,
проводить исследования и конкурировать за гранты.
controversial question
New light on the controversial question of species abundance and population
density
Новый взгляд на спорный вопрос об обилии видов и плотности популяций
considerable disagreement
The 2020 presidential election and Donald Trump's legacy, reveals considerable
disagreement on the use of violence in certain settings.
Президентские выборы 2020 года и наследие Дональда Трампа выявляют значительные
разногласия по поводу применения насилия в определенных условиях.
Vocaroo: https://voca.ro/1gB4pLbYJmdK
· #29
Mashegirov Eugene (RF-211) (Lebedeva E.V.) (Tuesday, 03 May 2022 08:21)
Ex.
2 Reading
1) Protection schemes are divided according to their functional properties.
2) There are unprotected systems, all-or-nothing systems, controlled sharing,
user-programmed sharing controls.
3) Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Dartmouth Time-Sharing System and IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4) A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data.
5) By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates, thus protecting different
data.
Ex. 1 Speaking
1) Information Science is a discipline that deals with processes of storing and
transferring information.
2) Subsystem is a self-contained system within a larger system.
3) Data is the facts and statistics collected together to reference and analyze.
4) File is a set of related data.
Ex. 2 Speaking
1) What has been implemented for protecting information in computer systems?
2) What is the reason for differences among protection schemes?
3) Why do users need to construct a protected subsystem?
Information protection system
Information protection system (sometimes referred to as Information Security)
covers the tools and processes that organizations use to protect information.
This includes policy settings that prevent unauthorized people from accessing
business or personal information. InfoSec is a growing and evolving field that
covers a wide range of fields, from network and infrastructure security to
testing and auditing. Information security protects sensitive information from
unauthorized activities, including inspection, modification, recording, and any
disruption or destruction. The goal is to ensure the safety and privacy of
critical data such as customer account details, financial data or intellectual
property. The consequences of security incidents include theft of private
information, data tampering, and data deletion. Attacks can disrupt work
processes and damage a company’s reputation, and also have a tangible cost.
Organizations must allocate funds for security and ensure that they are ready to
detect, respond to, and proactively prevent, attacks such as phishing, malware,
viruses, malicious insiders, and ransomware.
https://voca.ro/1kNTkGSYUeMp
· #28
Nikitina Anastasia RZ-212(Popovych E.) (Tuesday, 03 May 2022 08:20)
Today I have read the article " This AI tool lets you visualize how climate
change could affect your home". This article says that the new tool with
advanced AI image recognition allows you to visualize the future effects of
climate change anywhere in the world, including your own home. I think this
project is a good idea, because the project called "This Climate Doesn't Exist
"allows you to enter the address of your current home or your favorite place to
travel and see what it might look like years later, when climate change has
taken its toll.
https://techxplore.com/news/2021-11-ai-tool-visualize-climate-affect.html
https://voca.ro/1EzvvAWfqir2
1.controversial question
New light on the controversial question of species abundance and population
density
Нове світло на спірне питання чисельності видів та щільності популяції
2.conduct research
Smartphone developers continue to conduct research into new features.
Розробники смартфонів продовжують досліджувати нові функції.
3.considerable disagreement
There's been considerable disagreement among lawmakers and the space community
on how best to accomplish this.
Між законодавцями та космічним співтовариством виникли значні розбіжності щодо
того, як найкраще цього досягти
https://voca.ro/1odC4W4MCWqo
· #27
Pushkash Maxim (RZ-212 Popovich) (Tuesday, 03 May 2022 08:20)
A
team of researchers affiliated with multiple institutions in South Korea and one
from the U.S. has built a small, wide-field-of-view camera based on the
structure of fish eyes. In their paper published in the journal Nature
Electronics, the group describes their study of aquatic eyes in their search for
a way to make smaller and lighter wide-field-of-view cameras and the development
of the camera they made based on their findings. Smartphone developers continue
to conduct research into new features. One such feature may be
wide-field-of-view cameras. Currently, such cameras require the use of several
bulky lenses and are too heavy for use in small devices. To address these
problems, the researchers turned their attention to aquatic eyes, specifically
those in most fish. Inspired by their findings, the researchers set out to
create a camera based on the structure of the fish eyes they had been studying.
They built a core-shell type monocentric lens that had separate refractive
indices for the shell and core. Testing showed it to have optical
characteristics that were comparable to current cameras with protruding
lenses—it also had a 120-degree field of view and depth of field between 20
centimeters and infinity. The researchers took pictures with the camera,
capturing images from wide angles at various distances. They suggest their work
is a major step toward the development of wide-field-of-view cameras suitable
for use in portable devices and drones.
Voice: https://voca.ro/1dLsajioMQQe
1. controversial question
It provides insights on the controversial question of where these hoofed animals
evolved, concluding that they arose in or near present day India.
2. conduct research
It has also been very interesting to conduct research at three different
universities.
3. considerable disagreement
The edition's co-authors convened about two years ago to explore all sides of
this controversial question
Voice: https://voca.ro/1jDCAAPOjOvp
· #26
Kolomiets Vova РЗ-212 (Popovych) (Tuesday, 03 May 2022 08:17)
Today I have read the article “AI automatic tuning delivers step forward in
quantum computing”. This article about a machine learning algorithm. It
interacts with a quantum device and "tunes" it faster without any human
intervention. Classical computers are made up of billions of transistors, which
together can perform complex calculations. The standard way to correct these
deficiencies is to adjust the input voltages to correct them. Determining the
correct combination of voltage regulation is time consuming, even for a single
quantum device. Scientists' machine learning algorithm takes a similar approach
to the Minecraft player. I hope that soon we can use our approach to fully
customize a small-sized quantum computer. "
https://voca.ro/1jHKpESL5ILn
https://techxplore.com/news/2020-08-ai-automatic-tuning-quantum.html
1) conduct research
Health psychologists apply this knowledge to conduct research on a variety of
questions.
Психологи в галузі охорони здоров’я застосовують ці знання для проведення
досліджень з різних питань
2)considerable disagreement
Their behaviour is so different from the other s-block elements that there is
considerable disagreement over where these two elements should be placed in the
periodic table.
Їхня поведінка настільки відрізняється від інших елементів s-блоку, що існують
значні розбіжності щодо того, де ці два елементи повинні бути розміщені в
періодичній таблиці.
3)controversial question
Her work has provided new insights into the controversial question of whether
the languages we speak shape the way we think (Linguistic relativity).
Її робота дала нове розуміння суперечливого питання про те, чи мови, якими ми
розмовляємо, формують наш спосіб мислення (Лінгвістична відносність)
https://voca.ro/19zw36bF6E1T
· #25
Badyuk Eduard RZ-212 (Popovych.E) (Tuesday, 03 May 2022 08:17)
Today I have read the article "Scientists sequence genome of high-value grape,
seek secrets of wine's aroma". It tells how scientists from Uruguay and their
European colleagues sequenced the genome of the valuable grape variety Tannat.
Wines made from Tannat are considered the healthiest of red wines, as they help
lower blood pressure, lower cholesterol, and promote healthy blood clotting.
According to the largest wine producers, now winemaking has become not only an
art, but also a whole science!
I think this is great news, because now drinking wine while having a pleasant
conversation with friends is not only a method of having a good time, but also a
real healing ritual!
https://phys.org/news/2013-09-scientists-sequence-genome-high-value-grape.html
https://voca.ro/1bWtQl1QlSeN
1) considerable disagreement
There was considerable disagreement regarding the definition of terrorism.
Існували значні розбіжності щодо визначення тероризму.
2) controversial question
Another controversial question within the Liability Convention relates to the
provisions on the applicable law.
Інше спірне питання в рамках Конвенції про відповідальність стосується положень
про застосовне законодавство.
3) conduct research
The aim was to conduct research and establish a dialogue on reforming the
international financial system with a view to reducing financial volatility.
Метою було провести дослідження та налагодити діалог щодо реформування
міжнародної фінансової системи з метою зменшення фінансової нестабільності.
https://voca.ro/1oQGwJxpb0Pt
· #24
Gridnev Dmytro(RF-211)(Lebedeva E.V.) (Tuesday, 03 May 2022 08:14)
Ex
2 Reading
1) It is convenient to divide protection schemes according to their functional
properties. A rough categorization is the following.
2) Systems of information:Unprotected systems, All-or-nothing systems,
Controlled sharing, User-programmed sharing controls
3) Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Examples include the Dartmouth Time-Sharing System and
IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4) A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data (that is,
the protected objects).
5) By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates.
Ex 1 Speaking
1) Design seen as information processing leads to a concern with accuracy of
information transfer.
2) The whole distribution system broke down.
3) Further analysis of the data is needed.
4) This method offers the option of using results from the base calculation to
calculate the coefficients for the larger data set.
Ex 2 Speaking
1) What has been implemented for protecting information in computer systems?
2) What is the reason for differences among protection schemes?
3) What user can develop by by constructing a protected subsystem?
Information security systems
Information security systems includes the information protection measures such
as marking, storage, proper transmission, and destruction of information. It
also contain information technology security to protect the automated
information systems, the hardware, the software, and the data being stored,
processed, or transmitted through them as well as the protection of intellectual
property rights. The threats to information and intangible assets may be
intentional, natural, and inadvertent. The methods that comprise the threat to
information assets cover the gamut from old, the time-tested techniques to new,
and the innovative collection measures such as data mining, electronic
eavesdropping, theft of hardcopy information, and theft of softcopy
information/media. Technology, which is moving and advancing at an amazing pace,
results in wonderful opportunities for information sharing, productivity, and
accomplishment; however, it also represents a new policy for security risks.
Following a thorough risk assessment, an orchestrated suite of security, legal,
and management solutions are applied to the identified organizational risks. The
protection officers play a key role in the protection of information , influence
the reputation of an organization and acknowledge the nature of the assets that
they are responsible for protecting.
Vocaroo:https://voca.ro/18VedYHxnQWf;
· #23
Kravchenko Kostiantyn (RZ-212, Popovych E.) (Tuesday, 03 May 2022 08:11)
Today I've read the article: "A framework to automatically identify wildlife in
collaboration with humans"
The article covers University of California's recently developed wildlife
identification framework.
This newly presented approach initially started out as exploration of an idea,
that AI technology is capable of classifying and studying wildlife images
captured by movement-triggered camera traps.
The effective use of this framework could significantly aid ecologists in their
work, by simplifying the process of generating species distribution maps in
specific locations.
In my opinion the article does happen to be quite intriguing. Artificial
Intelligence in general I find to be an interesting topic, and seeing it be
utilized in various ways makes an interesting article to read.
Article:
https://techxplore.com/news/2021-11-framework-automatically-wildlife-collaboration-humans.html
Audio: https://voca.ro/1goQfmNwAJOS
Phrases:
1) It provides insights on the controversial question of where these hoofed
animals evolved.
Воно дає уявлення про суперечливе питання, де ці копитні звірі еволюціонували.
2) Even in a small organization, there is likely to be considerable disagreement
on each of these aspects of strategy.
Навіть у малій організації ймовірно будуть значні незгоди на кожні аспекти
стратегії.
3) They shipped it here to conduct research.
Вони відправили його сюди для проведення досліджень.
Audio: https://voca.ro/1l4W7z9p2SCS
· #22
Shulyak Makar RF-211 (Lebedeva E.V.) (Tuesday, 03 May 2022 08:08)
The
Reading Module, Ex 2
1. It is convenient to divide protection schemes according to their functional
properties. A rough categorization is the following.
2. Unprotected systems, All-or-nothing systems, Controlled sharing,
User-programmed sharing controls
3. Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Examples include the Dartmouth Time-Sharing System and
IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4. A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data (that is,
the protected objects).
5. By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates.
The Speaking Module, Ex 1
1. Information Science is a discipline that deals with processes of storing and
transferring information.
2. Subsystem is a self-contained system within a larger system.
3. Data is the facts and statistics collected together to reference and analyze.
4. File is a set of related data.
The Speaking Module, Ex 2
1) What designs have been proposed and mechanisms implemented for?
2) What is the reason for differences among protection schemes?
3) What user can develop by constructing a protected subsystem?
Information Security Systems (ISS)
The information security system should be comprehensive, that is, apply not only
technical, but also legal and administrative means of protection. The protection
system is not only flexible, but also adaptable to rapidly changing
environmental conditions. In this case, administrative measures play the main
role. An information security system is a set of technical and organizational
measures that are aimed at ensuring the information security of an organization.
Examples of typical information security systems:
-Typical system against threats of unauthorized access.
-Generic Malicious Code Threat Protection System.
-Standard system of firewalling and protection of communication channels.
-Typical Security Analysis System.
-Typical Intrusion Detection System.
-----------------------------------
Audio: https://voca.ro/1mfZamAUY0zH
· #21
Bilokamenskyi Anton (RF-211) (Lebedeva E.V.) (Tuesday, 03 May 2022 08:06)
Reading
Ex. 2
1. It is convenient to divide protection schemes according to their functional
properties. A rough categorization is the following.
2. Unprotected systems, All-or-nothing systems, Controlled sharing,
User-programmed sharing controls
3. Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Examples include the Dartmouth Time-Sharing System and
IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4. A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data (that is,
the protected objects).
5. By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates.
Speaking
Ex. 1
1. Information Science is a discipline that deals with processes of storing and
transferring information
2. Subsystem is a self-contained system within a larger system
3. Data are the facts and statistics collected together to reference and analyze
4. File is a set to related data
Ex. 2
1. What has been implemented for protecting information in computer systems?
2. What is the reason for differences among protection schemes
3. Why users need to construct a protected subsystem
Information Security Systems
Implementing security controls always can help an organization reduce risk to
safe levels. There are three types of control: logical, administrative,
physical.
Logical controls are based on the protection of access to information systems,
software, passwords, firewalls, monitoring information and access control to
information systems, when physical is a control of the workplace enviroment such
as alarms, cameras, locks.
The administrative type of control consists of approved procedures, standards
and principles. It forms the framework for doing business and managing people,
for example laws and regulations created by state bodies. Other examples of
administrative controls include corporate security policies, passwords,
recruitment, and disciplinary actions.
Audio: https://voca.ro/11TqHLi3W8lX
· #20
S.Mykhailiuk (Tuesday, 03 May 2022 08:05)
To
students from RF -211 and РЗ-212
I’m waiting for your comments and audio recordings. Don't forget to write the
sentences with Phrases and record them. Please, do it in one postt!
· #19
Ram Nassur Rz 212 Lebedeva E.V (Tuesday, 03 May 2022 07:59)
The researchers built a small camera with a wide field of view based on the
structure of the fish eye.
Smartphone makers continue to explore new features. One such feature could be
cameras with a wide field of view. To solve this, the researchers turned their
attention to the eyes of aquatic organisms, especially in most fish. They noted
that the fish eye has a single lens and a curved retina.
The scientists decided to build a camera based on the fish eye structure they
were studying. They built a lens that had separate refractive indices for the
shell and core.
Testing has shown that its performance is similar to current protruding lens
cameras - it also has a 120-degree field of view.
They suggest that their work is an important step towards the development of
cameras with a wide field of view.
https://voca.ro/1imeNoVvb2xs
https://techxplore.com/news/2020-07-small-wide-field-of-view-camera-built-based.html
controversial question
Skoltech's research gives a decisive answer to this controversial question.
conduct research
Smartphone developers continue to conduct research into new features.
considerable disagreement
Even in a small organization, there is likely to be considerable disagreement on
each of these aspects of strategy.
https://voca.ro/1gN2fC8o7V4O
· #18
Rosinskiy Kyrylo RF-211 (Lebedeva E.) (Tuesday, 03 May 2022 07:57)
The
Reading Module, Ex 2
1. It is convenient to divide protection schemes according to their functional
properties. A rough categorization is the following.
2. Unprotected systems, All-or-nothing systems, Controlled sharing,
User-programmed sharing controls
3. Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Examples include the Dartmouth Time-Sharing System and
IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4. A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data (that is,
the protected objects).
5. By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates.
The Speaking Module, Ex 1
1. Information Science is a discipline that deals with processes of storing and
transferring information.
2. Subsystem is a self-contained system within a larger system.
3. Data is the facts and statistics collected together to reference and analyze.
4. File is a set of related data.
The Speaking Module, Ex 2
1) What designs have been proposed and mechanisms implemented for?
2) What is the reason for differences among protection schemes?
3) What user can develop by constructing a protected subsystem?
The Writing Module
Protection schemes
A lot of different designs have been proposed and mechanisms implemented for
protecting information in computer systems, and therefore protection schemes
were divided according to their functional properties. Unprotected systems: Some
systems have no provision for preventing a determined user from having access to
every piece of information stored in the system. All-or-nothing systems: These
are systems that provide isolation of users, sometimes moderated by total
sharing of some pieces of information. Controlled sharing: Significantly more
complex machinery is required to control explicitly who may access each data
item stored in the system. User-programmed sharing controls: A user may want to
restrict access to a file in a way not provided in the standard facilities for
controlling sharing. For such cases, and a myriad of others, a general escape is
to provide for user-defined protected objects and subsystems. All of these
protection schemes made computer systems and its data more safe against
unauthorized users.
Audio: https://voca.ro/1o9tiPAvey4c
· #17
Shevchuk Julia (RF-211) ( Lebedeva E.V.) (Tuesday, 03 May 2022 07:55)
Reading ex 2
1. It is convenient to divide protection schemes according to their functional
properties. A rough categorization is the following.
2. Unprotected systems, All-or-nothing systems, Controlled sharing,
User-programmed sharing controls
3. Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing
systems: Examples include the Dartmouth Time-Sharing System and IBM's VM/370
system.
Controlled
sharing: Digital Equipment Corporation's, System Development Corporation's
Advanced Development Prototype System, and Bolt, Beranek, and Newman's TENET
4. A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data (that is,
the protected objects).
5. By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates.
speaking Ex1
Internationalisation deals with the process of designing software so that it can
accommodate changing environments without changes to the code.
Education for matrimony and parenthood is a self-contained system of upbringing
and education of pupils and it is therefore understood as an integral part of
the education process.
Investigation, consultations and analysis related to the foregoing issues
involved a number of other considerations that were factored into CSG
deliberations.
speaking ex 2
1. What has been proposed to protect information in computer systems?
2. what is the reason for the differences between protection schemes?
3. what can a user do after building a protected subsystem?
information security systems
An information security system is a set of technical and organizational measures
that are aimed at ensuring the information security of an organization. The
information security system should be comprehensive, that is, apply not only
technical, but also legal and administrative means of protection. The protection
system is characterized not only by flexibility, but also by adaptation to
rapidly changing environmental conditions. In this case, the main role is played
by administrative measures (for example, regular password changes, strict order
of their storage, as well as the correct distribution of user rights and
analysis of event logs in the system)
The information security system, which has been formed to date, includes the
following general methodological principles: Adequacy to the requirements;
Conceptual unit HCTBO; Adaptation to changing conditions; Functional
independence; Ease of use; Minimization of rights; adequate response; Full
control and economy. The completeness of control implies that all information
security procedures should be fully controlled by the security system, and the
key results of the control are recorded in special logs.
https://voca.ro/13vRrtpZyvIH
· #16
Lebedeva E (Tuesday, 03 May 2022 07:53)
To Ivkov Yurii (RF-211) Well done, thank you.
· #15
Ivkov Yurii (RF-211)(Lebedeva E.V.) (Tuesday, 03 May 2022 07:46)
Ex
2 Reading
1) Protection schemes are divided according to their functional properties.
2) There are unprotected systems, all-or-nothing systems, controlled sharing,
user-programmed sharing controls.
3) Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Dartmouth Time-Sharing System and IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4) A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data.
5) By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates, thus protecting different
data.
Ex 1 Speaking
1) Information Science is a discipline that deals with processes of storing and
transferring information.
2) Subsystem is a self-contained system within a larger system.
3) Data is the facts and statistics collected together to reference and analyze.
4) File is a set of related data.
Ex 2 Speaking
1) What has been implemented for protecting information in computer systems?
2) What is the reason for differences among protection schemes?
3) Why do users need to construct a protected subsystem?
Protection schemes
Protection refers to a mechanism which controls the access of programs,
processes etc. Protection schemes are divided according to their functions.
Unprotected systems that can’t prevent user’s access to data, so basically they
provide no security.
All-or-nothing systems provide isolation of users, and sometimes allow them to
share some data. If the user is isolated, from the perspective of security he is
somewhat using his private computer. Such systems also may have public
libraries, to which users have equal access.
Controlled-sharing systems give access only to authorized users, thus they are
way more complex, because they require control over who may access each data in
the system.
Systems with user-programmed sharing controls: such systems allow users to
restrict access to a file in some nonstandard way. For example, the file is
available only at daytime, or can be redacted only if the author agrees.
Vocaroo: https://vocaroo.com/12m3SAlQBSOj
· #14
Popovych E. (Tuesday, 03 May 2022 07:46)
To
Povoznikov Artem RZ-212
The comment of the article is written correctly and corresponds to the standards
of independent student work of such kind.
· #13
Povoznikov Artem RZ-212 (Popovych) (Tuesday, 03 May 2022 07:40)
Today i have read the article: Should you worry about Boeing 737s? Only if you
run an airline.
This article tells about breakdown found in a Boeing part. A component called a
cucumber fork that helps to strengthen the connection between the wing and the
body of the aircraft has a crack. Related to component fatigue. The crack itself
does not harm the aircraft's performance, but may cause mistrust among the
customers of this company. Because of this, 33 aircraft were sent for repairs.
This is due to the fact that there were cases when aircraft fell apart
immediately after takeoff and this led to a large number of victims. Any design
can suffer from component fatigue but it is difficult to predict when this will
happen. Regular checks on aircraft to find cracks in the early stages became a
solution to this problem. At a critical stage, this part will be replaced with a
new one.
Text:https://techxplore.com/news/2019-11-boeing-737s-airline.html
Audio: https://voca.ro/15RdXeJ2aFlj
1)
Considerable disagreement
When researchers discuss the forces that shaped human history, there is
considerable disagreement as to whether our behavior is primarily determined by
culture or by the environment.
2)
Conduct research
But lack of connectivity severely hinders an organization's ability to perform
simple functions, conduct research, and compete for grants.
3)
Controversial question
New light on the controversial question of species abundance and population
density.
Audio: https://voca.ro/15tUJvXJ2pBv
· #12
Biehin Yevhen RF-211 (Lebdeva E.) (Tuesday, 03 May 2022)
Ex
2 Reading
1) It is convenient to divide protection schemes according to their functional
properties. A rough categorization is the following.
2) Unprotected systems, All-or-nothing systems, Controlled sharing,
User-programmed sharing controls
3) Unprotected systems: Disk Operating System for the IBM System 370
All-or-nothing systems: Examples include the Dartmouth Time-Sharing System and
IBM's VM/370 system.
Controlled sharing: Digital Equipment Corporation's, System Development
Corporation's Advanced Development Prototype System, and Bolt, Beranek, and
Newman's TENEX
4) A protected subsystem is a collection of programs and data with the property
that only the programs of the subsystem have direct access to the data (that is,
the protected objects).
5) By constructing a protected subsystem, a user can develop any programmable
form of access control to the objects he creates.
Ex 1 Speaking
1) Information Science is a discipline that deals with processes of storing and
transferring information
2) Subsystem is a self-contained system within a larger system
3) Data are the facts and statistics collected together to reference and analyze
4) File is a set to related data
Ex 2 Speaking
1) What has been implemented for protecting information in computer systems?
2) What is the reason for differences among protection schemes
3) Why users need to construct a protected subsystem
Information Security Systems
Selecting and implementing appropriate security controls will help an
organization reduce risk to acceptable levels. There are the following types of
control:
Administrative. The administrative type of control consists of approved
procedures, standards and principles. It forms the framework for doing business
and managing people. Laws and regulations created by state bodies are also one
of the types of administrative control. Other examples of administrative
controls include corporate security policies, passwords, recruitment, and
disciplinary actions.
Logical. Logical controls (also called technical controls) are based on the
protection of access to information systems, software, passwords, firewalls,
monitoring information and access control to information systems.
Physical. This is the control of the workplace environment and computing
facilities (heating and air conditioning, smoke and fire alarms, fire protection
systems, cameras, barricades, fences, locks, doors, etc.).
Vocaroo: https://voca.ro/1nI0jd3isdZj
· #11
Popovych E. (Tuesday, 03 May 2022 07:17)
To
Artem Kotliarov RZ-212
Thank you for your comment on the article and for your work. It is nice that you
do it regularly.
· #10
Popovych E. (Tuesday, 03 May 2022 07:12)
To
Poddubrovskaya Nastya(RZ-212)
Your task is complete, informative and interesting. Well done.
· #9
Artem Kotliarov RZ-212 (Popovych E.) (Tuesday, 03 May 2022 07:08)
1)
1. controversial question
It provides insights on the controversial question of where these hoofed animals
evolved, concluding that they arose in or near present day India. - Він дає
уявлення про суперечливе питання про те, де еволюціонували ці копитні, і
робиться висновок, що вони виникли в сучасній Індії або поблизу неї.
2. conduct research
It has also been very interesting to conduct research at three different
universities. - Також було дуже цікаво проводити дослідження в трьох різних
університетах.
3. considerable disagreement
The edition's co-authors convened about two years ago to explore all sides of
this controversial question - Співавтори видання зібралися близько двох років
тому, щоб вивчити всі сторони цього спірного питання
https://voca.ro/18R9RgLo2P7P
2) Today, І have read thе аrtісlе «Massive twin star discovered snuggling close
to its stellar sibling in its cradle»
Astronomers have discovered a binary star system with the nearest young massive
stellar objects ever measured. An international team led by the University of
Leeds has determined that the distance between the massive young star PDS and
its orbital satellite is only 30 astronomical units, making them the closest
stellar satellites. Massive stars have a significant impact on their space
environment.
In my opinion, the discovery of massive young binary stars is a crucial step
forward in answering many of the questions we still have about these stellar
objects.
https://phys.org/news/2019-03-massive-twin-star-snuggling-stellar.html
https://voca.ro/1XBz0V3UQ9h9
· #8
Poddubrovskaya Nastya(RZ-212, Popovych.E) (Tuesday, 03 May 2022 07:06)
Today I’ve read the article "New model recognizes emotions in deaf individuals
by analyzing EEG signals".Researchers at Tianjin University of Technology in
China have recently developed a new brain network-based framework for
recognizing the emotions of deaf individuals.The study provided valuable insight
about the differences between the brain activity of deaf and hearing individuals
in different emotional states. This is an interesting experiment. People with
disabilities have slightly different perceptions of emotion than we do, which
can lead to psychological abnormalities in everyday life. This model is provided
free of charge and I hope that this experiment will continue and this model will
be improved.
https://techxplore.com/news/2021-09-emotions-deaf-individuals-eeg.html
Audio:https://voca.ro/177ubBO5M3Xs
considerable disagreement
There was considerable disagreement regarding the definition of terrorism.
По поводу определения терроризма существуют серьезные разногласия.
controversial question
The age at which religious instruction was begun was also very important and was
a very controversial question.
Большое значение имеет также возраст, с которого начинается религиозное
воспитание, и это весьма спорный вопрос.
conduct research
They shipped it here to conduct research.
Они обосновались здесь чтобы проводить исследования.
https://voca.ro/1oyjjvyVHQzM
· #7
Lebedeva E (Tuesday, 03 May 2022 07:00)
To РФ-211 Good morning! The lesson has started and I am waiting for your works.
· #6
Popovych E. (Tuesday, 03 May 2022 06:59)
To
RZ-212
Good morning!
The lesson will start soon, so I am waiting for your comments and audio
recordings. Don't forget to write the sentences with Phrases and record them.
Please, do it in one postt!
· #5
Koval Vlad (rz 213) (Vorobyova E.) debt (Sunday, 01 May 2022 12:45)
Today I've read an article : "New Techniques for Improving the Security of
Two-Factor Authentication Systems". The article tells us about more secure
two-factor authentication passwords. Everyone who uses the Internet has an
account on different platforms. The account may provide confidential
information, and this information is not subject to declassification. Therefore,
for greater security, it is necessary to use 2-fa authentication. The 2-fa
authentication solution is that you either have to answer the question or do
something. The most popular method is using SMS or push notifications when you
use a highly effective code that you enter on the authentication page.
https://techxplore.com/news/2022-04-methods-two-factor-authentication.html
https://voca.ro/1yfYcCJq6U22
· #4
Koval Vlad (rz 213) (Vorobyova E.) debt (Sunday, 01 May 2022 12:41)
Today I've read an article : "Shaping improvements in the ability of robots to
broadcast objects to people." This article tells us about a method that allows
bots to safely select objects near people who also give them away. Scientists
with NVIDIA recently embraced the dimensions that could be used to increase the
capabilities of robots, as well as studying objects from recently evolved human
scouts. Their learning aspect of the bot decides during this, in order to first
apply elementary modeling techniques, but then find the best option to support
STORM. This form of teaching is very effective. That the need arose in
connection with robots in the near future, and also for this reason well, what
is now revealed functioning must be obtained earlier by now.
. https://techxplore.com/news/2022-04-robots-ability-humans.html
https://voca.ro/1k9YiKFQK61N
https://voca.ro/13w7wygczDtc
· #3
Koval Vlad (rz 213) (Vorobyova E.) debt (Sunday, 01 May 2022 12:38)
Today i've read an article : "The most powerful supercomputer in society has
also been launched." This article tells about the most powerful supercomputer
abandoned in the Land of the Rising Sun. It is called Fugaku, someone
specialized for the purpose of executing questions with long-term and
large-scale forecasting, but in addition, it is able to boast 100 times the
performance of the add-ons than its ancestor, the K supercomputer. With its
support, scientists have every chance to start using it in different plans, from
mitigating the effects of atmospheric climate change to drug research. The Tokyo
Institute of Medicine also found that the supercomputer enables them to examine
the coffin allele in less than a period, but not in months. In my opinion, given
a huge boost in the studies as well as the study of medicine.
https://www.zdnet.com/article/the-worlds-most-powerful-supercomputer-is-now-up-and-running/
https://voca.ro/1miO6aXfRpew
· #2
Koval Vlad (rz 213) (Vorobyova E.) debt (Sunday, 01 May 2022 12:25)
Today I've read an article: «Season of death of domestic horses deposited in a
ritual complex from Bronze Age Mongolia». The article tells us about the horse,
as a domestic animal, had a strong impact on the organization of ancient
societies of the eastern steppes of Eurasia. Horses deposited in a Late Bronze
Age monument died at different time periods during winter. They also demonstrate
that winter slaughtering of horses was probably constrained by a combination of
economic and practical decisions regarding meat preservation. In my opinion this
article is interesting in context of the modern Mongolia and the practice of the
antiquity
https://www.sciencedirect.com/science/article/abs/pii/S2352409X20301784
https://voca.ro/18rfSADdMKtw
· #1
Koval Vlad (rz 213) (Vorobyova E.) debt (Sunday, 01 May 2022 12:06)
Tоday I've read an artcle : “Machine Training, Encountering Somatic Feelings: As
well as helping to monitor human health.” This note is about testing projects
that contribute to the emergence of sensory feelings in robots. Experiencing the
detection of diseases in cars. However, including in terms of issues that they
exceed, but without exception with-because of this, then that one's mind is
quite difficult. However, it is expected that there will be improvements in data,
technological processes, which can be very useful in absolutely all cases. For
example, in medicine, in simple household processes, in construction, and in a
significant other way. Read this note, we are aware that people have a chance to
get many chances for the future.
https://techxplore.com/news/2020-08-machine-human-emotions-mental-state.html
https://voca.ro/1o4pQHrXaXj4