Professional Documents
Culture Documents
Exam 2022 3
Exam 2022 3
Exam 2022 3
irarimchuk@gmail.com Змінити обліковий запис
Чернетку збережено
*Обов’язкове поле
Archimedes of
Syracuse
(0) Archimedes of
Syracuse (c. 287 ВС – с. 212 ВС) was a Greek
mathematician, physicist, engineer,
inventor, and astronomer. Although few details of his life are known, he is
regarded to be one of the leading scientists in classical antiquity.
Among his advances in physics are the foundations of hydrostatics, statics and
the explanation of the principle of the lever. Modern experiments have tested
claims that Archimedes designed machines capable of lifting attacking ships out
of the water and setting ships on fire using an array of mirrors.
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 1/23
12/21/22, 10:17 AM Exam 2022 3
26. Archimedes is
generally considered to be the greatest mathematician of antiquity and one of
the greatest of all time. He used the method of exhaustion to calculate the
area under the arc of a parabola with the summation of an infinite series, and
gave a remarkably accurate approximation of pi. He also defined the spiral
bearing his name, formulas for the volumes of surfaces of revolution and an ingenious
system for expressing very large numbers.
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 2/23
12/21/22, 10:17 AM Exam 2022 3
26 * 1 бал
B. A versatile genius.
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 3/23
12/21/22, 10:17 AM Exam 2022 3
27 * 1 бал
B. A versatile genius.
28 * 1 бал
B. A versatile genius.
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 4/23
12/21/22, 10:17 AM Exam 2022 3
29 * 1 бал
B. A versatile genius.
30 * 1 бал
B. A versatile genius.
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 5/23
12/21/22, 10:17 AM Exam 2022 3
Task 4
Read the texts below. Match headings (A–H) to (1–5). There are THREE headings
you do not need to use. Write your answers on the separate answer sheet.
Task 4
Read the texts below. Match headings (A–H) to (1–5). There are THREE headings you do
not need to use. Write your answers
on the separate answer sheet.
For
robots to work with people, they must understand people
31 ______
32 ______
33 ______
Researchers at
the Massachusetts Institute of Technology (MIT) are now pushing a non-verbal
conveyance of intention between Baxter and his human colleagues a step further.
They are giving cobots the ability to read minds—or, more specifically, to read
brain signals. Daniela Rus and her team at MIT have equipped an experimental
version of Baxter with an electroencephalography (EEG) decoding system. This
takes signals from a set of electrodes attached to a human colleague’s scalp
and recognises within them characteristic patterns known as error-related
potentials. These are generated by a brain when it is making a mistake, and
also when it is observing a mistake being made by another. For example, when
Baxter recognises an error-related potential from a human team mate who has
sorted an item into an incorrect bin, he is able to log the error and fix the
mistake, sparing the human the trouble. In the future, Dr Rus hopes, the robot
will also be able to recognise such a signal when it, itself, has been seen by
a human to make a mistake.
34______
Once a channel
of communication has been established, regardless of what it is, it needs to be
used appropriately. It is important—as anyone who has had to deal with the
socially inept will know—that robots understand the right moments to convey
messages, and also how much information to convey. Julie Shah, another
researcher at MIT, has been analysing the costs and benefits of robot over- and
under-communication, and is using that information to design algorithms which
can decide when and what communication is appropriate. When attempting to
convey a message, a robot must estimate its interlocutor’s intentions and what
his response is likely to be. If an algorithm calculates that communication
will be beneficial, it must then convert the concept to be conveyed into
something understandable, whether that be a raised eyebrow or a stream of
synthesised speech. Too much information may result in people ignoring messages
completely. One feature of Dr Shah’s algorithms, therefore, is that they try to
take into account what information a human team mate already possesses.
35 ______
Dr Rus’s team are also looking at safety—in their case by creating robots
with softer exteriors. Softer materials not only provide greater dexterity for
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 7/23
12/21/22, 10:17 AM Exam 2022 3
the ’bot when gripping, but also lessen the risk of injury when incidental
contact is made between human and robot. How long, if ever, it will be before
such robots truly match the marketing slogan of the Sirius Cybernetics
Corporation, a fictional firm in Douglas Adams’s creation, “The Hitchhiker’s
Guide to the Galaxy”, remains to be seen. But even if not actually fun to be
with, your plastic pal will become increasingly effective.
31 * 1 бал
B A human face
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 8/23
12/21/22, 10:17 AM Exam 2022 3
32 * 1 бал
B A human face
33 * 1 бал
B A human face
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 9/23
12/21/22, 10:17 AM Exam 2022 3
34 * 1 бал
B A human face
35 * 1 бал
B A human face
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 10/23
12/21/22, 10:17 AM Exam 2022 3
Task 5
Read the text below. For questions (36–40) choose the correct answer (A, B, C or
D). Write your answers on the separate answer sheet.
Can a
computer predict your thoughts?
Researchers
at the University of Helsinki have developed a technique in which a computer
models visual perception by monitoring human brain signals. In a way, it is as
if the computer tries to imagine what a human is thinking about. As a result of
this imagining, the computer is able to produce entirely new information, such
as fictional images that were never before seen.
The
technique is based on a novel brain-computer interface. Previously, similar
brain-computer interfaces have been able to perform one-way communication from
brain to computer, such as spell individual letters or move a cursor.
As far as
is known, the new study is the first where both the computer's presentation of
the information and brain signals were modelled simultaneously using artificial
intelligence methods. Images that matched the visual characteristics that
participants were focusing on were generated through interaction between human
brain responses and a generative neural network.
The
researchers call this method neuroadaptive generative modelling. A total of 31
volunteers participated in a study that evaluated the effectiveness of the
technique. Participants were shown hundreds of AI-generated images of
diverse-looking people while their EEG was recorded.
The
subjects were asked to concentrate on certain features, such as faces that
looked old or were smiling. While looking at a rapidly presented series of face
images, the EEGs of the subjects were fed to a neural network, which inferred
whether any image was detected by the brain as matching what the subjects were
looking for.
Based on
this information, the neural network adapted its estimation as to what kind of
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 11/23
12/21/22, 10:17 AM Exam 2022 3
faces people were thinking of. Finally, the images generated by the computer
were evaluated by the participants and they nearly perfectly matched with the
features the participants were thinking of. The accuracy of the experiment was
83 per cent.
"The
technique combines natural human responses with the computer's ability to
create new information. In the experiment, the participants were only asked to
look at the computer-generated images. The computer, in turn, modelled the
images displayed and the human reaction toward the images by using human brain
responses. From this, the computer can create an entirely new image that
matches the user's intention," says Tuukka Ruotsalo.
Generating
images of the human face is only one example of the technique's potential uses.
One practical benefit of the study may be that computers can augment human
creativity. "If you want to draw or illustrate something but are unable to
do so, the computer may help you to achieve your goal. It could just observe
the focus of attention and predict what you would like to create,"
Ruotsalo says. However, the researchers believe that the technique may be used
to gain understanding of perception and the underlying processes in our mind.
"The
technique does not recognise thoughts but rather responds to the associations
we have with mental categories. Thus, while we are not able to find out the
identity of a specific 'old person' a participant was thinking of, we may gain
an understanding of what they associate with old age. We, therefore, believe it
may provide a new way of gaining insight into social, cognitive and emotional
processes," says Senior Researcher Michiel Spapé. According to Spapé, this
is also interesting from a psychological perspective. "One person's idea
of an elderly person may be very different from another's. We are currently
uncovering whether our technique might expose unconscious associations, for
example by looking if the computer always renders old people as, say, smiling
men."
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 12/23
12/21/22, 10:17 AM Exam 2022 3
A its disadvantages
B its result
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 13/23
12/21/22, 10:17 AM Exam 2022 3
39. What is WRONG about the technique described in the article? * 1 бал
D It is based on AI methods.
C Because they create fictional images that were never before seen.
Task 6
Read the texts below. Match choices (A–H) to (41–45). There are THREE choices
you do not need to use.
Computer security
41
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 14/23
12/21/22, 10:17 AM Exam 2022 3
B the ultimate defence against hackers may be just a few atoms thick;
42
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 15/23
12/21/22, 10:17 AM Exam 2022 3
B the ultimate defence against hackers may be just a few atoms thick;
43
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 16/23
12/21/22, 10:17 AM Exam 2022 3
B the ultimate defence against hackers may be just a few atoms thick;
44
Many modern laptops and an increasing number of desktop computers are much
more vulnerable to hacking through common plug-in devices than previously
thought. Attacks can also be carried out by seemingly innocuous peripherals like
chargers and projectors that correctly charge or project video but simultaneously
compromise the host machine. Computer peripherals such as network cards and
graphics processing units have direct memory access (DMA), which allows them to
bypass operating system security policies. DMA attacks abusing this access have
been widely employed to take control of and extract sensitive data from target
machines. Current systems feature input-output memory management units
(IOMMUs) which can protect against DMA attacks by restricting memory access to
peripherals. However, IOMMU protection is frequently turned off in many systems
and the new research shows that, even when the protection is enabled, it can be
compromised.
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 17/23
12/21/22, 10:17 AM Exam 2022 3
B the ultimate defence against hackers may be just a few atoms thick;
45
Insider hacking
A new study shows that communication channels between different parts and
pieces of computer software are prone to security breaches. Over ten computer
security-critical applications are vulnerable to insider attacks. Anyone with access
to a shared computer – co-workers, family members, or guests – can attack or
involuntarily subject it to security breaches. Most of the vulnerabilities were found
in password managers used by millions of people to store their login credentials.
Several other applications were found to be similarly susceptible to attacks and
breaches across the Windows, macOS and Linux operating systems.з назви
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 18/23
12/21/22, 10:17 AM Exam 2022 3
B the ultimate defence against hackers may be just a few atoms thick;
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 19/23
12/21/22, 10:17 AM Exam 2022 3
Task 7
Read the text below. Choose from (A-H) the one which best fits each gap (46-50).
There are THREE choices you do not need to use. Write your answers on the
separate answer sheet.
Sarter deep neural networks
Artificial
intelligence researchers at North Carolina State University have improved the
performance of deep neural networks by combining feature normalization and
feature attention modules into a single module that they call attentive
normalization (AN). The hybrid module improves the accuracy of the system
significantly (46) ______.
"Feature
normalization is a crucial element of training deep neural networks, and
feature attention is equally important (47)
______ which features learned from raw data are the most important for
accomplishing a given task," says Tianfu Wu. "But they have mostly
been treated separately. We found that combining them (48) ______."
To
test their AN module, the researchers plugged it into four of the most widely
used neural network architectures: ResNets, DenseNets, MobileNetsV2 and
AOGNets. They then tested the networks against two industry-standard
benchmarks: the ImageNet-1000 classification benchmark and the MS-COCO 2017
object detection and instance segmentation benchmark.
As a
result, AN improved performance for all four architectures on both benchmarks. Moreover,
it also facilitates (49) ______
between different domains. Scientists have released the source code and hope
their AN will lead (50) _____ of
deep neural networks.
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 20/23
12/21/22, 10:17 AM Exam 2022 3
46 * 1 бал
47 * 1 бал
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 21/23
12/21/22, 10:17 AM Exam 2022 3
48 * 1 бал
49 * 1 бал
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 22/23
12/21/22, 10:17 AM Exam 2022 3
50 * 1 бал
Компанія Google не створювала цей вміст і не підтримує його. Повідомити про порушення - Умови
використання - Політика конфіденційності
Форми
https://docs.google.com/forms/d/e/1FAIpQLSdXT-qjfO0AnMK6z2cP_zbx52aUBdq5h_hZIYSHqf74MV3u4A/formResponse 23/23