Reading Comprehension Practice I For Computer Science Students
Reading Comprehension Practice I For Computer Science Students
Instructions: Read the following passage carefully, then answer the questions that follow to
check your understanding and engage with the content.
Text:
Artificial Intelligence (AI) has transformed from a theoretical concept to a practical, everyday
tool used across various industries. The journey began with Alan Turing's groundbreaking
work in the 1950s, proposing that machines could mimic human intelligence. Turing's ideas
laid the foundation for the future of AI, introducing the Turing Test to determine a machine's
ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a
human.
In the decades that followed, significant advancements were made. During the 1980s, expert
systems were developed to emulate the decision-making ability of a human expert. These
systems utilized rules and knowledge bases to solve complex problems, demonstrating early
success in specific fields like medical diagnosis and financial planning.
The real game-changer came in the 2000s with the rise of machine learning algorithms. These
algorithms enabled computers to learn from data and improve over time without being
explicitly programmed. Innovations like neural networks and deep learning have further
pushed the boundaries of what AI can achieve, leading to applications in image and speech
recognition, autonomous vehicles, and more.
Key milestones in AI’s evolution include the development of the first neural networks, the
advent of natural language processing (NLP), and the integration of AI in daily technologies
such as smartphones and virtual assistants. Today, AI continues to evolve, promising even
more revolutionary changes in the years to come.
Comprehension Questions:
1. Who was Alan Turing, and what was his contribution to AI?
2. What are expert systems, and in which fields did they show early success?
3. Explain the significance of machine learning algorithms in the development of AI.
4. What are some key applications of AI mentioned in the passage?
5. How do neural networks and deep learning contribute to AI?
6. In your opinion, what might be the future impact of AI based on its current trajectory?
Universidad de Oriente UDO
Escuela de Ingeniería y Ciencias Aplicadas
Departamento de Informática
Asignatura: Inglés II
Instructor: Dr. Benito Marcano Yamarthe
Reflect on how AI has integrated into our everyday lives and propose a new area where AI
could potentially be applied in the future. Consider the benefits and challenges of its
implementation.
Instructions: Read the following passage carefully. Then answer the multiple-choice
questions to test your understanding of the main ideas.
Text:
One of the most significant implications of quantum computing is its potential impact on
cryptography. Current cryptographic methods, such as RSA and ECC (Elliptic Curve
Cryptography), rely on the difficulty of factoring large numbers or solving discrete
logarithms. Quantum algorithms, like Shor's algorithm, can solve these problems
exponentially faster than classical algorithms, posing a threat to the security of encrypted
data.
Despite the potential risks, quantum computing also offers new opportunities for creating
more secure cryptographic methods. Quantum key distribution (QKD) is a prime example,
leveraging the principles of quantum mechanics to create theoretically unbreakable
encryption. QKD allows two parties to generate a shared, secret key that can be used for
secure communication, with any attempt at eavesdropping detectable by the parties involved.
Multiple-Choice Questions:
5. What steps should be taken to prepare for the impact of quantum computing on
cryptography?
a) Abandon all cryptographic research.
b) Continue using current cryptographic methods indefinitely.
c) Develop quantum-resistant cryptographic techniques.
d) Wait until quantum computers are widely available.
e) Focus exclusively on classical computing advancements.
Universidad de Oriente UDO
Escuela de Ingeniería y Ciencias Aplicadas
Departamento de Informática
Asignatura: Inglés II
Instructor: Dr. Benito Marcano Yamarthe
Instructions: Read the following passage carefully. Pay attention to the context in which
specific vocabulary is used to understand their meanings and how they relate to the overall
topic.
Text:
Blockchain technology has emerged as a powerful tool for enhancing data security. At its
core, a blockchain is a decentralized ledger that records transactions across multiple
computers. This decentralization ensures that no single entity has control over the entire
network, making it more resilient to attacks and data breaches.
Each transaction on a blockchain is encrypted and linked to the previous transaction, forming
a chain of blocks. This cryptographic linking makes it extremely difficult to alter or tamper
with data, as any change would require altering all subsequent blocks in the chain. As a result,
blockchain technology offers a high level of data integrity and transparency.
In the context of data security, blockchain can be utilized to protect sensitive information,
such as personal data, financial records, and medical histories. By storing data in a
decentralized manner, blockchain reduces the risk of centralized points of failure, which are
often targeted by cybercriminals. Moreover, the use of smart contracts—self-executing
contracts with the terms of the agreement directly written into code—further enhances the
security and efficiency of data transactions.
However, despite its many advantages, blockchain technology is not without challenges. The
scalability of blockchain networks remains a significant issue, as the process of verifying and
adding transactions can be time-consuming and resource-intensive. Additionally, the
regulatory landscape for blockchain and cryptocurrencies is still evolving, which can create
uncertainty for businesses and users alike.
Vocabulary Questions:
1. What does the term "decentralized ledger" refer to in the context of blockchain
technology?
a) A traditional database controlled by a single entity.
b) A centralized system for recording transactions.
c) A distributed system that records transactions across multiple computers.
d) A method for encrypting data.
e) A software for managing financial records.
Universidad de Oriente UDO
Escuela de Ingeniería y Ciencias Aplicadas
Departamento de Informática
Asignatura: Inglés II
Instructor: Dr. Benito Marcano Yamarthe