diff --git a/compositional_skills/grounded/linguistics/inclusion/attribution.txt b/compositional_skills/grounded/linguistics/inclusion/attribution.txt new file mode 100644 index 000000000..39d183669 --- /dev/null +++ b/compositional_skills/grounded/linguistics/inclusion/attribution.txt @@ -0,0 +1,15 @@ +Title of work: Master-slave(technology) +Link to work: https://en.wikipedia.org/wiki/Master%E2%80%93slave_(technology) +License of the work: CC-BY-SA-4.0 +Creator names: Wikipedia Authors + +Title of work: Whitelist +Link to work: https://en.wikipedia.org/wiki/Whitelist +License of the work: CC-BY-SA-4.0 +Creator names: Wikipedia Authors + + +Title of work: Blacklist (computing) +Link to work: https://en.wikipedia.org/wiki/Blacklist_(computing) +License of the work: CC-BY-SA-4.0 +Creator names: Wikipedia Authors \ No newline at end of file diff --git a/compositional_skills/grounded/linguistics/inclusion/qna.yaml b/compositional_skills/grounded/linguistics/inclusion/qna.yaml new file mode 100644 index 000000000..6479ce09f --- /dev/null +++ b/compositional_skills/grounded/linguistics/inclusion/qna.yaml @@ -0,0 +1,54 @@ +--- +version: 3 +task_description: This skill helps the writer use more inclusive IT terminology. +created_by: imstilllearning +seed_examples: + - context: > + In database replication, the master database is regarded as the + authoritative source, and the slave databases are synchronized to it. + question: How would you rewrite this sentence to use more inclusive IT terminology? + answer: > + In database replication, the primary database is regarded as the + authoritative source, and the secondary databases are syncrhonized to it. + - context: > + Blacklisting is the action of a group or authority compiling a + blacklist of people, countries, or other entites to be avoided or + distrusted as being deemed unacceptable to those making the list. + question: Show me how to use inclusive IT terminology to replace non-inclusive + IT terminology. + answer: > + Denylisting is the action of a group or authority compiling a denylist + of people, countries, or other entites to be avoided or distrusted as + being deemed unacceptable to those making the list. + - context: > + In database replication, the master database is regarded as the + authoritative source, and the slave databases are synchronized to it. + question: How would you revise this sentence to use Inclusive IT terminology? + answer: > + In database replication, the parent database is regarded as the + authoritative source, and the child databases are synchronized to it. + - context: > + A use for whitelists is in local area network (LAN) security. Many + network admins set up MAC address whitelists, or a MAC address filter, to + control who is allowed on their networks. + question: How would you revise this sentence to use inclusive IT terminology? + answer: > + A use for allowlists is in local area network (LAN) security. Many + network admins set up MAC address allowlists, or a MAC address filter, to + control who is allowed on their networks. + - context: > + A master clock that provides time signals used to synchronize one or + more slave clocks as a part of a clock network. + question: How would you improve this sentence to use inclusive IT language? + answer: > + A primary clock that provides time signals used to synchronize one or + more secondary clocks as a part of a clock network. + - context: > + As a verb, blacklist can mean to put an individual or entity on such a + list. A blacklist is synonymous with a list of banned persons or + organizations and is the opposite of a whitelist. + question: How would you adjust the word choice to use Inclusive IT terminology? + answer: > + As a verb, denylist can mean to put an individual or entity on such a + list. A denylist is synonymous with a list of banned persons or + organizations and is the opposite of an allowlist.