زبان عمومی و تخصصی (انگلیسی)

حل تشریحی سوالات زبان عمومی و تخصصی (انگلیسی) - کنکور ارشد مهندسی فناوری اطلاعات (IT) 1401

سوالات زبان عمومی و تخصصی (انگلیسی)

30 سوال
PART A: Vocabulary Directions: Choose the word or phrase (1), (2), (3), or (4) that best completes each sentence. Then mark the answer on your answer sheet.
1.

Growing older and more decrepit appeared to be an ........................ and necessary part of being human.

1)

intangible

2)

unsentimental

3)

inevitable

4)

unforeseeable

2.

I don't really think I'd have the .................... to finish a marathon!

1)

candor

2)

autonomy

3)

concern

4)

endurance

3.

Her marriage started to improve once her husband finally .......................... he had an anger problem and began to take counseling.

1)

emerged

2)

acknowledged

3)

identified

4)

hesitated

4.

Society is an interdependent system that ...................... widespread cooperation to function.

1)

requires

2)

conveys

3)

proceeds

4)

fascinates

5.

Our blue planet is a ...................... Life depends on water, yet in its natural form, the water in the oceans will not sustain us because we cannot drink salt water.

1)

remedy

2)

vacillation

3)

refuge

4)

paradox

6.

I thought I was buying a٫an .................. native Indian carving, but discovered later that it was machine-made.

1)

definitive

2)

artificial

3)

genuine

4)

secretive

7.

The entrepreneur had a well-deserved reputation for ......................, having accurately anticipated many changes unforeseen by established business leaders.

1)

hindsight

2)

extroversion

3)

modesty

4)

prescience

8.

Studies of longevity among turtles are sometimes ........................ by the fact that the subjects live so long that researchers retire before the studies can be completed.

1)

hampered

2)

verified

3)

stabilized

4)

diversified

9.

Kevlar is a ................................. new material which is used for everything from airplane wings, to bullet-proof vests, to hockey sticks.

1)

versatile

2)

derivative

3)

prescriptive

4)

dormant

10.

If exploitation of the planet's resources continues as at present, then the lifestyle we currently enjoy .......................... the risk of causing significant damage to the world.

1)

puts

2)

runs

3)

proposes

4)

shapes

Directions: Read the following passage and decide which choice (1), (2), (3), or (4) best fits each space. Then mark the correct choice on your answer sheet. Scientists and philosophers have been grappling with the relationship between language and thought for centuries. There have always been (11) picture of the Universe depends on our native tongue. Since the 1960s, however, the ascent of thinkers like Noam Chomsky, and a host of cognitive that linguistic differences don't really matter, (14) language is a universal human trait, and that our ability to talk to one another owes more to our shared genetics (15) But now the pendulum is beginning to swing the other way as psychologists re-examine the question.
11.

Directions: Read the following passage and decide which choice (1), (2), (3), or (4) best fits each space. Then mark the correct choice on your answer sheet.

1)

those who argue

2)

arguing those who

3)

that they argue

4)

an argument by those

12.

Directions: Read the following passage and decide which choice (1), (2), (3), or (4) best fits each space. Then mark the correct choice on your answer sheet.

1)

for

2)

in

3)

whith

4)

by

13.

Directions: Read the following passage and decide which choice (1), (2), (3), or (4) best fits each space. Then mark the correct choice on your answer sheet.

1)

who has the consensus

2)

in the consensus

3)

whose consensus

4)

the consensus has been

14.

Directions: Read the following passage and decide which choice (1), (2), (3), or (4) best fits each space. Then mark the correct choice on your answer sheet.

1)

the

2)

that

3)

a

4)

what

15.

Directions: Read the following passage and decide which choice (1), (2), (3), or (4) best fits each space. Then mark the correct choice on your answer sheet.

1)

than to our varying cultures

2)

as to our varying cultures

3)

and our cultures vary

4)

than our cultures that vary

Directions: Read the following three passages and answer the questions by choosing the best choice (1), (2), (3), or (4). Then mark the correct choice on your answer sheet. PASSAGE 1: Researchers are working on different fronts to make AI more sustainable. For example, as much of the energy usage by Al models occurs during the so-called "training" phase, reducing the need for massive amounts of training data directly translates into energy savings. This is an area that scientists are currently looking into. One approach involves selecting only the most relevant data for training, or efficiently adapting existing models for a new task, which significantly reduces the cost of training a model. In other words, instead of training the AI system on a massive web of information, researchers may choose to use only select articles relevant to what the system is being used for. This can help to reduce defects, design time and downtime for advanced manufacturing and engineering environments. Another area that researchers are looking into under the program relates to edge computing, which refers to computing or data storage that is performed at or near the source of the data. Combining AI into edge devices such as lightweight mobile devices or sensors that generate and record data within the infrastructure - reduces the reliance on cloud services for data processing, allowing such devices to deliver better data security, faster computing and insights, with greater efficiency. Another promising area in AI and computing research is neuromorphic computing, which is inspired by the workings of the brain. The technology uses networks that mimic the workings of the human brain and nervous system. By replicating the flexibility, resilience and energy efficiency of a human brain, neuromorphic architecture aims to overcome the energy-intensive nature of current models of computing and develop better Al.
16.

What is the passage primarily concerned with?

1)

Interpreting massive amounts of training data

2)

Reasons why the training phase of AI should be more sustainable

3)

Different methods of Al research

4)

Approaches that make Al more energy-efficient

17.

The author uses the phrase "in other words" in paragraph 2 in order to

1)

describe other words that are used in the model

2)

illustrate an example

3)

explain what was previously stated in a different way

4)

make an exception to what was said

18.

According to paragraph 2, the cost of training a model can be decreased by

1)

using only relevant data or adjusting the available models

2)

feeding a massive web of information to the model

3)

reducing flaws and downtime for manufacturing and engineering environments

4)

selecting only the most recent articles for the system

19.

Which of the following is an example of edge computing?

1)

Using cloud services for data processing

2)

Carrying lightweight mobile devices while performing research

3)

Using more sources of data

4)

Combining Al into devices that are near the source of data

20.

Neuromorphic computing aims to develop better Al by ................................

1)

implanting a computing device in the human brain

2)

building a system that imitates the human brain

3)

acknowledging that the human nervous system is too complicated to mimic

4)

making the current models more energy-intensive

Given the potential headaches of managing IT, it is tempting to hand the job over to someone else. Indeed, outsourcing once appeared to be a simple solution to management frustrations, and senior management teams negotiated contracts with large service providers to run their entire IT functions. At a minimum, these providers were often able to provide IT capabilities for a lower cost and with fewer hassles than the companies had been able to themselves. But many of these outsourcing arrangements resulted in dissatisfaction, particularly as company's business needs changed. Service providers, with their standard offerings and detailed contracts, provided IT capabilities that were not flexible enough to meet changing requirements, and they often seemed slow to respond to problems. Furthermore, a relationship with a supplier often required substantial investments of money and time, which entrenched that supplier in the company's strategic planning and business processes. The company then became particularly vulnerable if the supplier failed to meet its contractual obligations. Problems arose because senior managers, in choosing to outsource the IT function, were also outsourcing responsibility for one or more of the crucial decisions they should have been making themselves. Companies often hired outside providers because they were dissatisfied with the performance of their own IT departments-but that dissatisfaction was primarily the result of their own lack of involvement. In light of this track record, most larger companies, at least, are deciding to keep their main IT capabilities in-house. But many engage in selective outsourcing. Good candidates for this are commodity services, such as telecommunications, in which there are several competing suppliers and specifications are easy to set, and services involving technologies with which the company lacks expertise. Unlike decisions to outsource the entire IT function, selective outsourcing decisions are usually best left to the IT unit, assuming that senior management has taken responsibility for overall strategy.
21.

It can be understood from paragraph 1 that companies choose to outsource IT because - ...........................

1)

IT management can be a source of annoyance and difficulty

2)

IT is not a primary concern for them

3)

IT management inside the company usually results in chaos

4)

service providers offer detailed contracts

22.

The word "their" in paragraph 1 refers to ..................... .

1)

management frustrations

2)

contracts

3)

senior management teams

4)

large service providers

23.

All of the following are stated in paragraph 1 about IT service providers EXCEPT that ......................... .

1)

they were often able to decrease IT costs for a company

2)

some companies became too reliant on them

3)

they did not adapt their services to meet the changing needs of companies

4)

they often did not fulfil their contractual obligations

24.

It is suggested in paragraph 2 that senior managers should ......................... .

1)

trust IT service providers with crucial decisions

2)

be involved in strategic IT decisions

3)

not get involved in the decisions of their IT departments

4)

not engage in selective outsourcing

25.

The author mentions "services involving technologies with which the company lacks expertise" in paragraph 2 in order to ....................... .

1)

provide an example of a good candidate for selective outsourcing

2)

illustrate why IT capabilities should be developed inside companies

3)

explain why telecommunications can sometimes be necessary

4)

exemplify a commodity service for which there are several suppliers

The Data Encryption Standard, affectionately known as DES-which rhymes with "fez" and "pez" was developed way back in the 1970s. The design is based on the Lucifer cipher, a Feistel cipher developed by IBM. DES is a surprisingly simple block cipher, but the story of how Lucifer became DES is anything but simple. By the mid-1970, it was clear even to U.S. government byreaucrats that there was a legitimate cooercial need for secure crypto. At the time, the computer revolution was underway, and the ampunt- and sensitivity - of digital data was rapidly increasing. In the mid-1970s, crypto was poorly understood outside of classified military and government circles. The upshot was that businesses had no way to judge the merits of a crypto product and the quality of most such products was very poor. Into environment, the National Bureau of Standards, or NBS (now Known as NIST) issued a request for cipher proposals. The winning submission would become a U.S. government standard and almost certainly a de facto industrial standard. Very few reasonable submissions were received, and it quickly became apparent that IBM's Lucifer cipher was the only serious contender. At this point, NBS had a problem. There was little crypto expertise at NBS, so they turned to the government's crypto experts, the super-secret National Security Agency, or NSA. The NSA designs and builds the crypto that is used by the U.S. military and government for highly sensitive information. The NSA also conducts "signals intelligence," or SIGINT, where it tries to obtain intelligence information. The NSA was apparently reluctant to get involved with DES but eventually agreed to study the Lucifer design and offer an opinion. This all happened in secret, and when the information later came to public light, many were suspicious that NSA had placed a "backdoor" into DES so that it alone could easily break the cipher. Certainly, the SIGINT mission of NSA and a general climate of distrust of government fuelet such fears. But it's worth noting that 30 years of intense cryptanalysis gas revealed no backdoor in DES. Nevertheless, this suspicion tainted DES from its inception.
26.

Why does the author mention "fez" and "pez" in paragraph 1?

1)

To specify some of the components of DES

2)

To compare them to DES

3)

To provide other examples of the inventions in the 1970s

4)

To illustrate how DES is pronounced

27.

According to paragraph 2, which of the following is NOT true about the mid-1970s?

1)

The quality of most crypto products was poor.

2)

Sensitive digital data were on the rise.

3)

Businesses had a better grasp of crypto than government circles.

4)

Businesses felt a need for secure crypto.

28.

The word "contender" in paragraph 2 is closest in meaning to ..................... .

1)

convict

2)

contestant

3)

code

4)

proposal

29.

What problem did NBS have regarding the Lucifer design?

1)

The NSA wanted to be officially involved in DES.

2)

NBS did not have sufficient crypto expertise to assess the cipher by itself.

3)

The NSA asked NBS to let it break the cipher.

4)

The government's crypto experts did not approve the design.

30.

According to paragraph 3, there was a suspicion that DES .................. .

1)

would lead to a climate of distrust of government

2)

was designed by IBM to let it access other company's information

3)

could be easily broken by the NSA

4)

could be broken and let secret information come to public light