Professional Documents
Culture Documents
ENGLISH EXAM - Professional English-December 2019 KEY Surnames: Name
ENGLISH EXAM - Professional English-December 2019 KEY Surnames: Name
Surnames: Name:
I. Multiple choice. Choose the correct answer. Only ONE answer is correct. Indicate your
choice (A, B, C or D) in the answer box below. Every four wrong answers deduct one mark
(15 marks)
1. Explainable AI’s artificial intelligence that is programmed to describe its purpose, rationale
and decision-making process in a way that can be understood by the average person.
The ‘s in the context of this sentence means:
A has B is C of D Plural
2. XAI’s often discussed in relation to deep learning and plays an important role in the FAT
ML model (fairness, accountability and transparency in machine learning).
The ‘s in the context of this sentence means:
A is B has C of D Plural
3. XAI provides general information about how an AI program makes a decision by disclosing
the program’s strengths and weaknesses and the level of trust that’s appropriate for
various types of decisions.
The ‘s in the context of this sentence means:
A of/has B is/of C of/of D of/is
5. The pronunciation of the –ed simple past and past participle of the verb “PLAY” is …
6. In disaster recovery, a warm site is a secondary data center that an organization can use to
support business tasks that are non-essential if the primary data center becomes unavailable.
The reduction of the relative clauses is:
A In disaster recovery, a warm site is a secondary data center an organization can use
to support business tasks being non-essential if the primary data center becomes
unavailable.
C In disaster recovery, a warm site is a secondary data center that an organization can
use to support business tasks non-essential if the primary data center becomes
unavailable.
D No reduction is possible
1
7. While the mechanism is very effective, its limitations can cause errors that can be exploited.
“A continually evolving list of cognitive biases has been identified over the last six decades of
research on human judgement and decision-making in cognitive science, social psychology and
behavioural economics..”
“Assuming the worst of a situation that turns out not to be dangerous is much safer than not
expecting danger that turns out to be present.”
“On the provider side, it's critical that businesses balance usage-based pricing balance with
sustainable, recurring revenue.”
11. The interpretation of a noun compound with the following structure is:
C N2+Rel.Cl.+-ed Adj.1+Prep.+N1+Verb+N6+Prep.+N5+Prep.+N4+Prep.+N3+Prep.+
Adj.2
2
“Client-to-server implementations depend on a peer-to-peer relationship between the
clients.”
12. In the passage above, the bold-typed hyphenated noun phrase means:
A implementations from the client to the server
B implementations from the server to the client
C implementations based on the client and on the server
D Neither A nor B nor C
12. In the passage above, the bold-typed hyphenated noun phrase means:
A Enhancing measures of security that are gapped by air
B Enhancing measures of security of gapped air
C Measures of security that are gapped by air and that are enhancing
D Measures of security of gapped air that are enhancing
13. “Unlike on-premises systems, cloud ERP increases accessibility via the Internet.” is the
same as:
A Unlike systems with the premises on, cloud ERP increases accessibility via the
Internet
B Systems that are on the premises of Unlike, cloud ERP increases accessibility via the
Internet
C Unlike systems of premises that are connected, cloud ERP increases accessibility via
the Internet
D Unlike systems that are on the premises, cloud ERP increases accessibility via the
Internet
Vocabulary: rationale: razón; fairness: legitimidad; brand: marca; bias: sesgo; revenue: ingresos; peer:
par, igual; gap: hueco, separación, separar, aislar
3
Answer Box:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A X X X X
B X X X X X
C
D X X X X X X
N/R
Some options for the vendor of planning of resources of the enterprise. These options are
based on the cloud
Other attacks at proof of concept for systems that are gapped by air
4
III. Rewrite the following phrases using suitable noun compounds. (8 marks)
1. The deployment from the client to the gateway is usually based on the analysis of the
needs for the balancing of loads.
The client-to-gateway deployment is usually based on the load-balancing needs analysis
3. Echo is the device that speaks and that is smart and which is enabled by Alexa. The device
belongs to Amazon.
Echo is Amazon’s Alexa-enabled smart speaker
4. Other systems for the identification that is biometric include recognition of the voice,
recognition of the iris, recognition of the texture of the skin, scanning of the fingerprints
and identification of the veins of the fingers.
Other biometric identification systems include voice recognition, iris recognition, skin
texture recognition, fingerprint scanning and finger vein identification
IV. Translate the following technical expressions into English using suitable noun compounds
(8 marks)
4. Un fallo en las aplicaciones que son críticas para una misión perjudica la reputación de una
empresa.
A mission-critical app’s failure damages a business’ reputation
5
V. Turn the following sentences into Technical Style (8 marks):
1. The people who administer often tier their plans for recovery of disasters to prioritize the
restoration of applications that are critical to a mission and sometimes choose not to update
applications that are critical to a mission as frequently as applications of priority that is lower
in order to reduce changes that cause problems.
The administrators often tier their disaster recovery plans to prioritize the
restoration of mission-critical applications and sometimes choose not to update
mission-critical applications as frequently as lower-priority applications in order to
reduce problem-causing changes.
2. The program for purchasing that is based on value of the hospital rewards hospitals of care
that is acute with payments of incentives for the quality of care they provide to patients of
Medicare. This program is designed to improve the experience of the patient during stays in
the hospital.
The hospital value-based purchasing program rewards acute-care hospitals with
incentive payments for the care quality they provide to Medicare patients. This
program is designed to improve the patient experience during hospital stays.
6
VI. Read carefully the following passage from Word of the Day (WhatIs.com)
A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of
phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive
information from a company, as those that hold higher positions within the company typically have
complete access to sensitive data. In many whaling phishing attacks, the attacker's goal is to manipulate
the victim into authorizing high-value wire transfers to the attacker. The term whaling stems from the
size of the attacks, and the whales are thought to be picked based on their authority within the
company. Due to their highly targeted nature, whaling attacks are often more difficult to detect than
standard phishing attacks. In the enterprise, security administrators can help reduce the effectiveness of
whaling attacks by encouraging the corporate management staff to undergo information security
awareness training.
The goal of a whaling attack is to trick an individual into disclosing personal or corporate information
through social engineering, email spoofing and content spoofing efforts. For example, the attackers may
send the victim an email that appears to be from a trusted source; some whaling campaigns include a
customized malicious website that has been created especially for the attack.
Whaling attack emails and websites are highly customized and personalized, and they often incorporate
the target's name, job title or other relevant information gleaned from a variety of sources. This level of
personalization makes it difficult to detect a whaling attack.
Whaling attacks often depend on social engineering techniques, as attackers will send hyperlinks or
attachments to infect their victims with malware or to solicit sensitive information. By targeting high-
value victims, especially CEOs and other corporate officers, attackers may also induce them to approve
fraudulent wire transfers using business email compromise techniques. In some cases, the attacker
impersonates the CEO or other corporate officers to convince employees to carry out financial transfers.
These attacks can fool victims because attackers are willing to spend more time and effort constructing
them due to their potentially high returns. Attackers will often use social media, such as Facebook,
Twitter and LinkedIn, to gather personal information about their victim to make the whaling
phishing attack more plausible. (…)
Vocabulary: phishing: fraude electrónico; spoof: estafa, fraude, estafar, defraudar; stem from: venir
de; wire transfer: transferencia bancaria; glean: recopilar; fool: engañar
7
A. Translate into Catalan or Spanish the first paragraph, from “A whaling attack, ….” to
“… awareness training.” (8 marks):
6. What does the bold underlined “them” refers to? It refers to “high-value victims”
(CEOs and other corporate officers)
7. What does the bold underlined “their” refers to? It refers to “these attacks”
8
VII. List the stories that were told in class by the teacher and comment on the morals that
they convey as it refers to business and commercial strategies as well as others (10 marks):
Story 1: The husband, the wife and the neighbour, who borrowed money from him and had to give it
back.
Moral: The importance of sharing information, all the information with your partner (also at work)
Story 2: The nun and the priest, and the psalm 129.
Moral: The importance of having all the information related to your business or work.
Story 3: The raffle of the donkey, with an old man from a village and a young man from the city.
Moral: How to react when things come the wrong way. Turn a negative fact into positive winning
business
Story 4: The convicted prisoner, the man and the woman who were in a country house.
Moral: Do not make preconceived assumptions until having the right information
Story 5: Scrum meeting and the anecdote with the pig and the chicken.
Moral: Employers want to have committed staff, like the pig, and not only involved staff, like the
chicken
Story 6: The teacher and the student, the pig and the bird.
Moral: about the importance of quick and wise reply. Be critical, question people and things, even
though they are your teachers
Story 7: The engineer and the blonde girl travelling from Los Angeles to New York.
Moral: Do not look down a blond girl because you are an engineer. About breaking stereotypes.
Story 8: The economic crisis: Money circulates in the tourist village when the Russian tycoon arrives.
Moral: if money circulates, crisis can be overcome and people become happier.
Moral: You’ll always be demanded more and more and your work may not be appreciated enough by
your unfair boss.
Story 10: The man who applied for the position of sweeper at Microsoft and he didn’t have an email
account.
Moral: Internet does not solve all your problems. If you work hard you can achieve your goals and
build an empire.