Computer Science Reading Comprehension PDF
Computer Science Reading Comprehension PDF
course designed for students of computer science who are non-native English
speakers. The course is intended to provide students with the language skills
necessary to effectively communicate in the academic and professional contexts
of computer science.
The course will also cover important academic skills, such as critical thinking,
research, and referencing, which are essential for success in university-level
computer science courses. Students will learn how to effectively search for and
evaluate sources, use academic language, and avoid plagiarism.
The field of Computer Science emerged in the 1950s with the development of
programming languages such as Fortran and COBOL. These languages allowed users
to write programs in a more structured and efficient way. In 1956, John McCarthy, an
American computer scientist, coined the term "Artificial Intelligence" (AI) and organized
the Dartmouth Conference, which is considered the birthplace of AI.
In the 1960s, computer networking began to emerge, and the first computer networks
were developed. The development of the internet in the 1980s revolutionized the way
people communicated and shared information. This led to the development of new
applications, such as email and the World Wide Web.
In the past few decades, Computer Science has seen significant advancements in
areas such as Artificial Intelligence, Machine Learning, and Data Science. These
advancements have led to the development of new technologies, such as self-driving
cars and voice-activated assistants like Siri and Alexa.
Computer Science has also had a significant impact on other fields, such as medicine
and finance. The use of computers and algorithms has enabled researchers to analyze
large datasets and develop new treatments for diseases. In finance, computers have
enabled traders to analyze market data and make more informed investment
decisions.
COMPREHENSION QUESTIONS
1. Define the term "computational systems."
2. What was the name of the first computer-like device, and who created it?
3. What was the basis for the development of the first modern computer, the ENIAC?
4. Who coined the term "Artificial Intelligence," and what was the significance of the
Dartmouth Conference?
5. What was the impact of the development of the internet on Computer Science?
6. In what decade did the field of Computer Science emerge?
8. How has Computer Science impacted other fields, such as medicine and finance?
Vocabulary exercises
Match the words with their definitions:
1. Computer Science –
2. Algorithm -
3. Data Science -
4. Artificial Intelligence -
5. Machine Learning -
6. Programming Language -
7. Computer Networking -
8. Self-Driving Cars -
9. Virtual Reality -
10. Augmented Reality -
11. Quantum Computing -
12. Biocomputing –
a. a field that seeks to use biological systems to perform computation and solve
problems
b. the development of computer systems that can perform tasks that would typically
require human intelligence
c. the study of computers and computing technologies
d. a subset of Artificial Intelligence that involves the use of algorithms to learn from data
and improve performance on a specific task
e. the practice of connecting multiple computers together to enable communication and
resource sharing
f. the study of how to extract knowledge and insights from data
g. a set of instructions or steps to accomplish a task or solve a problem
h. a technology that overlays digital information onto the real world
i. vehicles that are capable of driving themselves without human intervention
j. a type of computing that uses quantum-mechanical phenomena to perform
operations on data
k. an artificial environment created with software and presented to the user in a way
that simulates reality
l. a language used to write computer programs
THE FATHER OF COMPUTER SCIENCE
"Charles Babbage was an English mathematician, inventor,
and philosopher who is best known for designing the first
mechanical computer, called the Analytical Engine, in the
early 19th century. Born in 1791 in London, Babbage was
the son of a wealthy banker and attended Cambridge
University, where he became interested in mathematics and
the emerging field of computing.
In 1822, Babbage unveiled his design for the Difference Engine, a machine that could
perform complex calculations using a series of gears and cranks. The machine was designed
to be automated, with input data stored on punched cards, and it was capable of producing
printed results. Despite attracting funding from the British government, the project was
ultimately unsuccessful due to a variety of technical and financial challenges.
Undeterred by this setback, Babbage began designing an even more ambitious machine, the
Analytical Engine. This machine was based on the same principles as the Difference Engine
but was capable of performing more complex calculations using a system of gears, levers, and
punched cards. The Analytical Engine was designed to be programmable, with instructions
stored on punched cards, and it could have been used to solve a wide range of mathematical
problems.
Unfortunately, Babbage was never able to complete the Analytical Engine due to lack of
funding and technical challenges. However, his work laid the foundations for modern
computing, and he is often referred to as the "father of the computer."
Comprehension exercises:
What was the Difference Engine, and how was it supposed to work?
What was the Analytical Engine, and how did it differ from the Difference Engine?
Why was Babbage never able to complete the Analytical Engine?
Vocabulary exercises:
One of the most famous early hackers was Kevin Mitnick. He was a skilled computer
programmer who used his skills to gain access to some of the most secure computer systems
in the world. He was eventually caught and spent several years in prison.
Hackers come in all shapes and sizes. Some are teenagers working out of their bedrooms,
while others are organized crime syndicates with millions of dollars at their disposal. They use
a variety of techniques to gain access to computer systems, including phishing, malware, and
brute force attacks.
Once a hacker gains access to a system, they can do a lot of damage. They can steal
personal information like credit card numbers and passwords, and they can even use your
computer as a part of a larger attack on other systems. In some cases, hackers have been
known to hold computer systems ransom, demanding payment in exchange for access to the
system.
But not all hackers are bad. Some hackers use their skills for good, working to expose
vulnerabilities in computer systems and help companies improve their security. These so-
called "ethical hackers" are often employed by companies to test their security measures and
find weaknesses before the bad guys do.
Despite the efforts of ethical hackers and cybersecurity experts, the threat of hacking remains.
As our world becomes more and more connected, the risk of a cyber-attack grows. It’s up to
each of us to do our part to protect our personal information and prevent hackers from gaining
access to our systems.
Comprehension Exercises:
1. What is a hacker?
2. What are some techniques used by hackers to gain access to computer systems?
3. What damage can hackers do once they gain access to a system?
4. What are ethical hackers?
5. What can we do to protect ourselves from hackers?
Vocabulary Exercises:
Hackers are people who use their skills to _________ into computer systems.
a) break
b) fix
c) create
d) manage
Some hackers are part of __________ with millions of dollars at their disposal.
a) corporations
b) charities
c) universities
d) governments
Hackers use a variety of techniques to gain access to computer systems, including phishing,
malware, and __________ force attacks.
a) blunt
b) brute
c) aggressive
d) violent
Ethical hackers are often employed by companies to test their security measures and find
__________ before the bad guys do.
a) weaknesses b) strengths c) advantages d) opportunities
As our world becomes more and more connected, the risk of a cyber attack __________.
a) falls b) rises c) stays the same d) fluctuates
One of the most well-known parts of the Deep Web is the dark web, which is a network of
websites that can only be accessed using special software. The dark web has gained notoriety
for its association with illegal activities, such as the sale of drugs, weapons, and other illicit
goods. However, not all parts of the Deep Web are associated with criminal activity. Many
academic and research databases, for example, are not indexed by search engines and can
only be accessed through specialized channels.
While the Deep Web can be a valuable resource for researchers and other professionals, it is
important to exercise caution when accessing it. Due to the lack of regulation and oversight,
the Deep Web can be a dangerous place, with hackers, scammers, and other criminals
operating with impunity. As such, it is essential to use strong security measures and to be
mindful of the risks associated with accessing the Deep Web.
Comprehension Questions:
The _________ of the Deep Web can be traced back to the early days of the internet.
a) origin
b) reputation
c) influence
d) proficiency
The dark web has gained notoriety for its association with ________ activities.
a) legal
b) illegal
c) moral
d) ethical
Many academic and research databases are not indexed by search engines and can only be
accessed through __________ channels.
a) traditional
b) specialized
c) superficial
d) exhaustive
Transportation: Self-driving cars are just one example of how AI can transform transportation.
In the future, AI may also be used to optimize traffic patterns and improve public
transportation.
Education: AI can help personalize learning by analyzing student data and creating
customized lesson plans that are tailored to individual students' needs.
Business: AI can help businesses make better decisions by analyzing data and providing
insights that humans may not have noticed. AI can also be used to automate tasks such as
customer service and inventory management. AI can also help businesses save money by
reducing labor costs, as fewer human workers are needed to perform certain tasks.
Another advantage of AI is its ability to work around the clock without tiring. This can be
especially beneficial in industries such as manufacturing, where AI can perform repetitive
tasks without getting fatigued.
While the potential benefits of AI are immense, there are also some potential risks and
challenges that must be addressed. One of the biggest concerns is the possibility of bias in AI
algorithms, which could lead to discriminatory outcomes. Additionally, there are concerns
about the potential for job loss and economic instability as AI takes over more tasks that were
previously performed by humans. Additionally, there are concerns about the ethical
implications of AI, such as privacy and security issues.
While there are many advantages to AI, it is important to carefully consider the potential
drawbacks as well. As AI continues to develop and become more prevalent in our lives, it is
important to address these concerns and ensure that AI is being used in a responsible and
ethical manner.
Comprehension Questions:
Vocabulary Exercises:
Artificial Intelligence is the development of computer systems that can perform tasks that
typically require human _________.
a. kindness b. intelligence c. creativity d. strength
Perception
Recognition
Decision-making
Translation
The Moroccan government has recognized the potential of the proptech industry and is taking
steps to support its growth. In 2019, the Ministry of Economy and Finance launched the
“Digital Morocco 2020” strategy, which aims to promote the use of digital technology in all
sectors of the economy, including real estate. The government has also established startup
incubators and accelerators to support proptech entrepreneurs and provide them with the
resources and mentoring they need to succeed.
Overall, the Moroccan proptech industry is a promising and exciting sector that is poised for
significant growth in the coming years. With its innovative solutions and entrepreneurial spirit,
the industry has the potential to transform the way we buy, sell, and manage property in
Morocco and beyond.
Comprehension Questions:
1. What is proptech?
2. What are some factors driving the growth of the proptech industry in Morocco?
3. How are Moroccan proptech companies using technology to address challenges in the real
estate market?
4. What steps is the Moroccan government taking to support the growth of the proptech
industry?
5. What is the potential of the Moroccan proptech industry?
Vocabulary Exercises:
a. the use of technology to facilitate and enhance real estate transactions and property
management processes
b. the ability to introduce new ideas or methods
c. the force or speed of movement
d. the simulation of a three-dimensional environment that can be interacted with
e. the interconnection of devices via the internet, enabling them to send and receive data
f. devices that detect and respond to physical stimuli
g. programs or machines that can perform tasks that normally require human intelligence
h. organizations that provide resources and support"
Natural Language Recognition
Natural language recognition is a subfield of
artificial intelligence that focuses on enabling
machines to understand and interpret human
language. This technology has become
increasingly important as more and more
businesses and organizations seek to leverage
the power of machine learning to automate
tasks and improve decision-making processes.
One key challenge in natural language recognition is dealing with the many different ways that
humans can express the same concept. For example, consider the following three sentences:
In addition to natural language recognition, there are also a number of related fields that focus
on helping machines understand and work with human language. These include natural
language generation (NLG), which involves generating human-like language based on data
inputs, and natural language understanding (NLU), which focuses on understanding the
meaning behind human language.
Overall, the field of natural language recognition is rapidly evolving, and holds great promise
for a wide range of applications, from customer service chatbots to automated language
translation systems.
Vocabulary Exercises:
What is the definition of natural language recognition?
a) The ability for a machine to understand and interpret human language.
b) The ability for a human to understand and interpret machine language.
c) The ability for a machine to generate human-like language based on data inputs.
What are some of the machine learning techniques used in natural language recognition?
a) Deep learning, neural networks, and natural language processing.
b) Decision trees, regression analysis, and clustering.
c) K-nearest neighbors, random forests, and support vector machines.
What is the challenge in dealing with different ways that humans express the same concept?
a) The challenge is to identify which sentence is correct.
b) The challenge is to recognize the common thread that runs through different sentences and
use that understanding to interpret the speaker's intent.
c) The challenge is to identify the keywords used in each sentence.
Comprehension Exercises:
When designing an algorithm, it is important to consider factors such as efficiency, scalability, and
accuracy. An algorithm that is efficient will complete a task in a reasonable amount of time, while a
scalable algorithm will continue to perform well even as the amount of data or complexity of the
task increases. Accuracy is also important, as an algorithm that produces inaccurate results can
have serious consequences in many applications.
To create an algorithm, a programmer will typically use a programming language and write code
that describes the specific steps that the machine should follow. Once the code is written, it must
be tested and optimized to ensure that it is efficient, accurate, and scalable.
Algorithms can be classified into different categories based on their characteristics and
applications. One common classification is based on the type of problem they solve. For example,
sorting algorithms are used to arrange data in a specific order, while searching algorithms are used
to find a specific item within a dataset.
Another way to classify algorithms is based on their complexity. Some algorithms are simple and
can be executed quickly, while others are complex and may take a long time to complete. One way
to measure the complexity of an algorithm is to calculate its time complexity, which is the amount
of time it takes to complete as the size of the input data increases.
Algorithms can also be classified based on their approach to problem-solving. For example, brute-
force algorithms solve problems by trying every possible solution, while divide-and-conquer
algorithms break a problem down into smaller sub-problems that are easier to solve.
Machine learning algorithms are a specific type of algorithm that use statistical models to identify
patterns in data and make predictions based on those patterns. They are commonly used in
applications such as image and speech recognition, natural language processing, and
recommendation systems.
In recent years, there has been growing interest in developing algorithms that are more ethical and
fair. This has led to the emergence of a new field called "algorithmic fairness," which aims to
develop algorithms that do not discriminate against individuals based on factors such as race,
gender, or socio-economic status.
Comprehension questions:
Vocabulary questions:
Quantum gates are the basic operations that are used to manipulate the quantum
state of qubits. There are many different types of quantum gates, each with its own
specific purpose. Quantum algorithms are designed to take advantage of these gates
and the properties of qubits to solve complex problems, such as optimization and
cryptography.
Quantum computing has the potential to revolutionize fields such as medicine, finance,
and energy, and is already being used to develop new drugs and materials. However,
building and maintaining quantum computers is still a significant challenge, and many
fundamental questions about the nature of quantum computing remain unanswered.
Comprehension Questions:
Vocabulary:
1. Quantum computing
2. Qubit -
3. Superposition states at once
4. Decoherence
5. Entanglement
6. Quantum gate
7. Error correction
8. Quantum algorithm -
9. Optimization
10. Cryptography
1. What is blockchain?
2. How does blockchain work?
3. What is cryptocurrency?
4. What are some potential applications of blockchain and cryptocurrency?
5. What advantage do blockchain and cryptocurrency offer in financial transactions?
Vocabulary exercise:
Choose the best definition for the following words:
In addition to phishing scams, there are many other types of cyber threats
that can compromise our online security. Malware, for example, is a type of
software that is designed to cause harm to a computer system or network.
This can include viruses, worms, Trojans, and ransomware. Malware can be
spread through malicious email attachments, infected websites, or even
social media messages.
To protect ourselves from these and other cyber threats, there are several
basic security measures that we can take. First and foremost, we should use
strong passwords that are unique for each account and enable two-factor
authentication whenever possible. We should also keep our software and
operating systems up-to-date with the latest security patches and avoid
clicking on suspicious links or downloading files from unknown sources.
Finally, it is important to use antivirus software and to back up important
data regularly to minimize the impact of any successful cyber-attacks.
Vocabulary exercises:
1. What is phishing?
a. A type of cyber-attack that involves an attacker flooding a website or
network with traffic from multiple sources
b. A type of cyber-attack that involves an attacker sending fraudulent
messages in an attempt to trick the recipient into revealing sensitive
information
c. A type of encryption used to protect sensitive information
2. What is malware?
a. A type of software that is designed to cause harm to a computer system or
network
b. A type of encryption used to protect sensitive information
c. A type of firewall that blocks malicious traffic
3. What is a DDoS attack?
a. A type of cyber-attack in which the attacker sends a fraudulent message to
trick the victim into revealing sensitive information
b. A type of cyber-attack in which the attacker floods a website or network
with traffic from multiple sources, causing it to crash or become unavailable
to legitimate users
c. A type of cyber-attack in which the attacker gains access to a computer
system or network without authorization
Comprehension exercise: