100% found this document useful (1 vote)
256 views5 pages

Reading Comprehension Practice I For Computer Science Students

Uploaded by

salazarsam2007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
256 views5 pages

Reading Comprehension Practice I For Computer Science Students

Uploaded by

salazarsam2007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Universidad de Oriente UDO

Escuela de Ingeniería y Ciencias Aplicadas


Departamento de Informática
Asignatura: Inglés II
Instructor: Dr. Benito Marcano Yamarthe

Reading Comprehension Practice I for Computer Science Students:

Title: The Evolution of Artificial Intelligence: From Turing to Machine Learning

Instructions: Read the following passage carefully, then answer the questions that follow to
check your understanding and engage with the content.

Text:

Artificial Intelligence (AI) has transformed from a theoretical concept to a practical, everyday
tool used across various industries. The journey began with Alan Turing's groundbreaking
work in the 1950s, proposing that machines could mimic human intelligence. Turing's ideas
laid the foundation for the future of AI, introducing the Turing Test to determine a machine's
ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a
human.

In the decades that followed, significant advancements were made. During the 1980s, expert
systems were developed to emulate the decision-making ability of a human expert. These
systems utilized rules and knowledge bases to solve complex problems, demonstrating early
success in specific fields like medical diagnosis and financial planning.

The real game-changer came in the 2000s with the rise of machine learning algorithms. These
algorithms enabled computers to learn from data and improve over time without being
explicitly programmed. Innovations like neural networks and deep learning have further
pushed the boundaries of what AI can achieve, leading to applications in image and speech
recognition, autonomous vehicles, and more.

Key milestones in AI’s evolution include the development of the first neural networks, the
advent of natural language processing (NLP), and the integration of AI in daily technologies
such as smartphones and virtual assistants. Today, AI continues to evolve, promising even
more revolutionary changes in the years to come.

Comprehension Questions:

1. Who was Alan Turing, and what was his contribution to AI?
2. What are expert systems, and in which fields did they show early success?
3. Explain the significance of machine learning algorithms in the development of AI.
4. What are some key applications of AI mentioned in the passage?
5. How do neural networks and deep learning contribute to AI?
6. In your opinion, what might be the future impact of AI based on its current trajectory?
Universidad de Oriente UDO
Escuela de Ingeniería y Ciencias Aplicadas
Departamento de Informática
Asignatura: Inglés II
Instructor: Dr. Benito Marcano Yamarthe

Critical Thinking Exercise:

Reflect on how AI has integrated into our everyday lives and propose a new area where AI
could potentially be applied in the future. Consider the benefits and challenges of its
implementation.

Reading for Main Ideas Practice for Computer Science Students

Title: The Impact of Quantum Computing on Cryptography

Instructions: Read the following passage carefully. Then answer the multiple-choice
questions to test your understanding of the main ideas.

Text:

Quantum computing represents a revolutionary shift in how we process information. Unlike


classical computers, which use bits as the smallest unit of data, quantum computers use
quantum bits or qubits. These qubits can exist in multiple states simultaneously due to the
principles of superposition and entanglement, allowing quantum computers to perform
complex calculations at unprecedented speeds.

One of the most significant implications of quantum computing is its potential impact on
cryptography. Current cryptographic methods, such as RSA and ECC (Elliptic Curve
Cryptography), rely on the difficulty of factoring large numbers or solving discrete
logarithms. Quantum algorithms, like Shor's algorithm, can solve these problems
exponentially faster than classical algorithms, posing a threat to the security of encrypted
data.

Despite the potential risks, quantum computing also offers new opportunities for creating
more secure cryptographic methods. Quantum key distribution (QKD) is a prime example,
leveraging the principles of quantum mechanics to create theoretically unbreakable
encryption. QKD allows two parties to generate a shared, secret key that can be used for
secure communication, with any attempt at eavesdropping detectable by the parties involved.

As quantum computing continues to advance, it is crucial for researchers and industry


professionals to develop strategies for transitioning to quantum-resistant cryptographic
techniques. This involves not only understanding the capabilities of quantum computers but
also anticipating the timeline for their widespread deployment. Collaboration between
academia, industry, and government will be essential in addressing the challenges and
opportunities posed by quantum computing in the field of cryptography.
Universidad de Oriente UDO
Escuela de Ingeniería y Ciencias Aplicadas
Departamento de Informática
Asignatura: Inglés II
Instructor: Dr. Benito Marcano Yamarthe

Multiple-Choice Questions:

1. What makes quantum computing different from classical computing?


a) Quantum computing uses traditional bits.
b) Quantum computing uses quantum bits or qubits.
c) Quantum computing does not involve any form of bits.
d) Quantum computing processes information slower than classical computing.
e) Quantum computing uses electric currents.

2. Why is quantum computing considered a threat to current cryptographic methods?


a) Quantum computing makes encryption impossible.
b) Quantum computing cannot solve complex problems.
c) Quantum algorithms can solve factoring problems faster than classical algorithms.
d) Quantum computing relies on classical cryptographic methods.
e) Quantum computing cannot handle encrypted data.

3. What is Quantum Key Distribution (QKD)?


a) A method for creating traditional encryption keys.
b) A principle of classical mechanics applied to cryptography.
c) A theoretically unbreakable encryption method using quantum mechanics.
d) An outdated cryptographic technique.
e) A standard computer network protocol.

4. How does QKD contribute to secure communication?


a) It prevents any form of communication interception.
b) It allows two parties to generate a shared, secret key detectable if intercepted.
c) It encrypts data using classical methods.
d) It slows down the communication process.
e) It removes the need for encryption keys.

5. What steps should be taken to prepare for the impact of quantum computing on
cryptography?
a) Abandon all cryptographic research.
b) Continue using current cryptographic methods indefinitely.
c) Develop quantum-resistant cryptographic techniques.
d) Wait until quantum computers are widely available.
e) Focus exclusively on classical computing advancements.
Universidad de Oriente UDO
Escuela de Ingeniería y Ciencias Aplicadas
Departamento de Informática
Asignatura: Inglés II
Instructor: Dr. Benito Marcano Yamarthe

Contexts for Vocabulary Practice for Computer Science Students

Title: The Role of Blockchain in Data Security

Instructions: Read the following passage carefully. Pay attention to the context in which
specific vocabulary is used to understand their meanings and how they relate to the overall
topic.

Text:

Blockchain technology has emerged as a powerful tool for enhancing data security. At its
core, a blockchain is a decentralized ledger that records transactions across multiple
computers. This decentralization ensures that no single entity has control over the entire
network, making it more resilient to attacks and data breaches.

Each transaction on a blockchain is encrypted and linked to the previous transaction, forming
a chain of blocks. This cryptographic linking makes it extremely difficult to alter or tamper
with data, as any change would require altering all subsequent blocks in the chain. As a result,
blockchain technology offers a high level of data integrity and transparency.

In the context of data security, blockchain can be utilized to protect sensitive information,
such as personal data, financial records, and medical histories. By storing data in a
decentralized manner, blockchain reduces the risk of centralized points of failure, which are
often targeted by cybercriminals. Moreover, the use of smart contracts—self-executing
contracts with the terms of the agreement directly written into code—further enhances the
security and efficiency of data transactions.

However, despite its many advantages, blockchain technology is not without challenges. The
scalability of blockchain networks remains a significant issue, as the process of verifying and
adding transactions can be time-consuming and resource-intensive. Additionally, the
regulatory landscape for blockchain and cryptocurrencies is still evolving, which can create
uncertainty for businesses and users alike.

Vocabulary Questions:

1. What does the term "decentralized ledger" refer to in the context of blockchain
technology?
a) A traditional database controlled by a single entity.
b) A centralized system for recording transactions.
c) A distributed system that records transactions across multiple computers.
d) A method for encrypting data.
e) A software for managing financial records.
Universidad de Oriente UDO
Escuela de Ingeniería y Ciencias Aplicadas
Departamento de Informática
Asignatura: Inglés II
Instructor: Dr. Benito Marcano Yamarthe

2. How is the term "cryptographic linking" used in the passage?


a) To describe the process of breaking encryption.
b) To refer to the connection between blocks in a blockchain.
c) To explain the method of data storage in centralized databases.
d) To highlight the encryption of personal data.
e) To illustrate the creation of smart contracts.

3. In what context is "data integrity" mentioned in the passage?


a) As a challenge faced by blockchain technology.
b) As an advantage provided by blockchain due to its immutability.
c) As a drawback of decentralized systems.
d) As a feature of traditional databases.
e) As a potential issue with smart contracts.

4. What does "scalability" refer to in the context of blockchain technology?


a) The ability of blockchain to remain secure.
b) The process of decentralizing data storage.
c) The capacity of blockchain networks to handle a growing number of transactions.
d) The method of linking blocks in the chain.
e) The regulation of blockchain and cryptocurrencies.

5. How are "smart contracts" described in the passage?


a) As traditional legal agreements.
b) As self-executing contracts with terms written into code.
c) As a method for breaking cryptographic links.
d) As a feature of centralized databases.
e) As a challenge in data security.

You might also like