Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Metodichka_-_Anglysky_yazyk

.pdf
Скачиваний:
4827
Добавлен:
26.03.2016
Размер:
2.04 Mб
Скачать

3.“A Beautiful Mind” was directed by / directed Ron Howard based on the life of Nobel Prize–winner John Nash.

4.This process is often undertaken/ often undertakes by a team of engineers who work together.

5.Additional evidence suggests that fantasy sports are reduced / reduce gender gaps in mathematics achievement.

6.Helicopters are overcome / overcome their weight by applying vertical thrust.

7.While situations like these initially seem impossible, mathematics is provided with / provides interesting and satisfying explanations of these phenomena.

Ex. 18 Rewrite the sentences in the Passive Voice.

1.People associate the Internet with a spider web.

2.The One Laptop Per Child initiative provided a personal computer for each child.

3.They undertook the initiative to give children the opportunity to learn.

4.We compared the access to technology in different countries.

5.They apply the algorithm to different sets of data.

6.We overcame the misunderstanding.

Ex. 19 Use the verbs in brackets in the appropriate form of the Active or Passive voice. Explain your choice.

Data Mining

Advances in technology in the latter half of the twentieth century 1_____ (lead) to the accumulation of massive data sets in government, business, industry, and sciences. Extracting useful information from these large data sets 2______ (require) new mathematical and statistical methods. Data mining 3______ (use) tools from statistics, machine learning, computer science, and mathematics to extract information from large databases. Some basic concepts 4______ (use) in data mining. These concepts 5______

(take) from many mathematical fields such as fuzzy sets or generic

91

algorithms. Large amounts of data 6______ (process), therefore, data mining relies heavily on computers.

The term “data mining” 7______ (use) by statisticians in 1960s as a term to describe exploration of data. It also 8______ (call) “data dredging” or “fishing”. However, in the 1990s, algorithms from the field of machine learning 9______ (apply) to large databases to discover patterns that enable businesses to make better decisions and develop strategies. [12, p. 791]

Ex. 20 Read the sentences. Underline the object of the action. Then rewrite the sentences in the Passive Voice as in the example.

Example: They study the impact of social networks on society. - The impact of social networks on society is studied.

1.This paper explores possible career paths for computer engineers.

2.They process large sets of data.

3.These scholars described numerous concepts from the field.

4.They extracted the necessary data from the available databases.

5.This article outlines possible ways of bridging the digital divide in developing countries.

Ex. 21. Use the table to make sentences in the Passive Voice.

The microwave

 

 

 

 

 

oven

 

 

 

in

China

5000

Graphite

 

 

 

years ago.

 

pencils

 

 

first manufactured

in the first century

Toothbrushes

was

already used

AD.

 

Ice cream

 

were

discovered

in the 18th century.

World

Wide

 

invented

after

a

Web

 

 

 

mathematical

 

Neptune

 

 

 

prediction.

 

X-rays

 

 

 

in

Germany

in

 

 

 

 

1895.

 

 

 

 

 

by

Percy Spencer

 

 

 

 

by accident.

 

 

 

 

 

in the 1980s.

 

 

 

 

 

 

 

 

 

 

 

92

 

 

 

Ex. 22 Put the words in order to make sentences.

1.from largest / the objects / In this set / to smallest / are ordered.

2.were disseminated / during the fifteenth century/ throughout Europe / First maps.

3.the guideline public company method, / Two methods / with the market approach: / are associated /and the comparable transaction method.

4.from a large cohort study. / by epidemiologists / The Quetelet index / working on data / was first formally evaluated

5.on the / is measured / Acidity / pH scale.

6.and applied mathematics / in two general areas: / Often mathematics, / theoretical mathematics / is categorized / as a discipline, .

Exam Practice

Text 2

Ex. 23 Read the text and choose the correct answer (a, b, c or d).

Bar Codes

A bar code is a visual representation of information which (1) ____

by an optical scanner. This scanner is called a bar code reader. The reader illuminates the bar code, and the patterns of light and dark bars (2)_____ by the light sensor. The sequence and width of dark and light bars represents a unique sequence of numbers and letters.

The idea of bar codes is successfully implemented in the retail industry. In 1948, two graduate students at Drexel University overheard a conversation in which the president of a local supermarket chain wished to automate the checkout process. They

(3)______ a patent for an optical device that would read information automatically. The first prototype (4)______ by IBM but was

93

impractical because of both size and the heat generated by the 500watt light bulb used by the bar code scanner. The (5)______ of lasers and integrated circuits in the 1960s allowed the manufacture of small, low energy bar code readers. The Radio Corporation of America (6)______ a modern version of bar codes in 1972, but the code was printed in small stripes that were easily erased (7) ______

employees who had to attach them manually to each item. IBM then produced bar codes according to a standard known as Universal Product Code (UPC) which is still in use today. Now bar codes are used in nearly all retail products worldwide. The applications of bar codes (8) ______ far beyond the retail industry; they are now used in various applications such as patient (9)______ , airline luggage management, and document management. [12, p. 96-97]

1) a. decodes;

b. decoded; c. is decoded;

d. has decoded.

 

2) a. is detected; b. are detected;

c. detected;

d. detection.

 

3) a. obtained;

b. is obtained; c. are obtained;

d. obtain.

 

4) a. was produced;

b. production;

c. have produced;

d.

produced.

 

 

 

 

 

 

5) a. was invented; b. invented;

c. invent;

d. invention.

 

6) a. was developed;

b. developed; c. has developed; d. have

developed.

 

 

 

 

 

 

7) a.-; b. with;

c. for;

d. by.

 

 

 

 

8)a. were also reached; b. also reached; c. have also reached; d. will also reach.

9)a. identification; b. identifying; c. identity; d. identitication.

Listening

Ex. 24 Listen to an audio extract and say how many steps it takes to download a webpage on your computer [13].

Ex. 25 Listen again and fill in the gaps.

94

Step 1. you click on a webpage _____________ or enter a

__________

Step 2. the browser sends the URL to a ___________ server

Step 3. the __________ server finds the necessary IP address in a

_________

Step 4. the IP address is sent back to the ____________

Step 5. the browser sends a request to the Web server

Step 6. the Web server sends the requested ____________ back to the browser computer

Step 7. _____________ arrive at the browser computer, combined to form the webpage and displayed in your ______________

Lesson 2

Text 1

Pre-reading

Ex. 1 Discuss in pairs:

1.How often do you receive spam? What do you feel about it?

2.Do you know how spam filters work? If yes, describe the process.

Ex. 2 Look at the title of Text 1 and predict which of the words below can be used in this text.

inbox message advertising folder application recipient statistics performance

Reading

Ex. 3 Skim the text and check if you were right.

Spam Filters

95

Most people with e-mail addresses regularly receive unsolicited commercial e-mail, also known as spam. Spam is an electronic version of junk mail, and has been around since the introduction of the Internet. The senders of spam usually attempt to sell products or services. Since the cost of sending spam is negligible to spammers, it has been bombarding e-mail services at a tremendous rate. Some estimate that as much as 40% to 50% of all e-mails are spam. The cost to the message recipients and businesses can be tremendous, as productivity is decreased. Fortunately, much of spam does not reach recipients thanks to spam filters. Spam filters are computer programs that screen e-mail messages when they are received. Any e-mail suspected to be spam will be redirected to a junk mail folder so that it does not clutter up a user's inbox.

How does the filter decide which messages are suspect. Spam filters statistically predict the probability that a message is spam according to its characteristics. Primitive filters simply classify a message as spam if it contains a word or phrase that frequently appear in spam messages. However, spammers need to slightly adjust their messages to outsmart the filter, and all legitimate messages containing these words are automatically classified as spam. Modern spam filters are designed using a branch of statistics known as “classification”. The underlying logic for this type of filter is that if a combination of message features occur more or less often in spam than in legitimate messages, then it would be reasonable to suspect a message with these features as being or not being spam. An extensive collection of e-mail messages is used to build a prediction model via data analysis. The data consists of a wide collection of message characteristics, some of which may include the number of special letters in the subject line, the number of special characters (for example, $ or !) in the message, the number of occurrences of the word “free”, the length of the message, and the specific words in the subject line and the body of the message. Each characteristic provides information about the chance the message is spam. The filter will first be developed using the training set, and then its

96

performance will be assessed using the test set. A list of characteristics is upgraded when the filter is at work.

Spam filters need to be customized for different organizations because spam features may vary from organization to organization. Also, filters should be updated frequently. Spammers are becoming more sophisticated and are creating ways to design messages that will filter through unnoticed. Spam filters must constantly adapt to meet this challenge. [12, p. 395-396]

Ex. 4 Read the text again and choose the correct answer (a, b, or c) to complete each sentence.

1.Spammers bombard us with junk mail because the cost of such kind of advertising is

a. very high. b. very low.

c. considerable.

2.An e-mail will be sent to the junk mail folder if it contains

a.an advertisement.

b.the word “free”.

c.a set of features.

3.The characteristics of an e-mail help a. to understand what it is about.

b. to classify it as legitimate mail. c. to suspect it as spam.

4.To build a database of spam characteristics a. many legitimate e-mails are analysed.

b. many junk e-mails are analysed.

c. both spam and legitimate e-mails are analysed.

5.Spam filters have to be regularly updated because a. spammers find new ways to deceive filters.

97

b.spam can go through unnoticed.

c.spam filters are not perfect.

Ex. 5 Complete the plan of Text 3.

1.Why spam filters are used.

2._____ they function.

3._____ spam filters have to learn.

Vocabulary

Ex. 6 Find in Text 1 English equivalents given in bold for the following Russian words and word combinations.

1.advanced, complicated

2.to foresee the likelihood

3.to get to

4.to try

5.wide

6.to assess, evaluate

7.very quickly

8.to adapt a little

9.to overcome a difficulty

10.legal

Ex. 7 Fill in the gaps with a word or phrase from Ex. 6. You do not need to use all of them.

1.The world is increasingly changing and … created by advancing technology people have to learn as long as they live.

2.Marriage and burial numbers help to … demographic trends over five year intervals.

3.There is … literature on empirical evidence of the adaptive value of pain.

4.China is a nation moving forward … .

98

5.Research indicated that workers that have access to more and … machinery will be able to improve their skills.

6.The government's sole … function is to administer, not to make laws.

7.Both works … to give a reasonable explanation or predict the jury decision making.

Ex. 8 Find in the text the words and give their Russian equivalents.

1.nouns from the verbs: introduce, receive, produce, suspect, predict, occur;

2.adjectives and participles from the verbs: solicit, lie, notice;

3.adverbs from the words: regular, fortune, statistics, frequent, slight, constant;

Ex. 9 Complete the gaps with one of the adverbs from Ex. 8 (3).

1.a … asked question (FAQ)

2.The result is … below the average value.

3.He is … changing his mind.

4.… , we got home before it started to rain.

5.Accidents … happen at this stretch of the road.

6.… significant results come from the analysis of an extensive set of data.

Ex. 10 Find in Text 1 English equivalents for the following Russian words and word combinations.

1.нежелательная почта

2.стоимость пренебрежимо мала

3.достичь адресата

4.путем анализа данных

5.особые знаки

6.обучающая выборка

7.производительность будет оцениваться

99

8.часто обновляться

9.проходить через фильтр незамеченным

Ex. 11 Use some of the phrases from Ex. 10 to paraphrase the sentences below.

1.The letter eventually didn't get to the addressee.

2.The equipment has to be regularly brought to the up-to-date condition.

3.The new estimates have been received through the analysis of statistics.

4.The collection for training can be used, because the price is very low.

5.Unique figures distinguish junk mail.

Ex. 12 Study the table and add more examples from the text.

Noun suffixes

Suffix

 

 

Meaning

 

Examples

adjective + -ness

 

state of being

effectiveness,

 

 

 

 

 

usefulness

adjective + -ity

 

 

quality of

somebody

curiosity, intensity

 

 

 

or something

 

verb + -tion/-sion

 

state of being

invasion, action

verb/adjective

+

-

condition

of

arrangement,

ment

 

 

somebody

or

agreement

 

 

 

something

 

 

verb/adjective

+

-

state or

quality of

preference,

ance/-ence

 

 

somebody

or

maintenance

 

 

 

something

 

 

noun + -ship/ -hood

 

position held

likelihood,

 

 

 

 

 

sponsorship

 

 

 

100