Questões de Concurso Sobre interpretação de texto | reading comprehension em inglês

Foram encontradas 9.443 questões

Q1876120 Inglês
O texto seguinte servirá de base para responder à questão.


BIG CAT ATTACK


(1º§) Farmer Pedro Vaz Ferreira was out hunting on Saturday with his two sons in the rural area of Portel, Brazil when he was savaged by the big cat.

(2º§) The feline's brutal attack left the 67-year-old in a serious state of health - as he reportedly suffered a partially disfigured face, some broken cheek bones and went blind in one eye.

(3º§) His two sons, Davi, 32, and 25-year-old Josue witnessed as the elderly man and animal even tussled for a few minutes. Davi told the news outlet O Liberal: "The three of us were in the forest, but it just attacked him. "The most serious wound is on his face. It broke the bones in his face, his nose, it blinded him. "He lost his vision instantly. It pierced his eye with its nail." Shortly after the attack, one of Mr Ferreira's sons reportedly killed the jaguar with a machete.

(4º§) Mr Ferreira's relatives took him by speedboat to the Hospital Wilson da Mota Silveira in Portel. He remained there in a serious condition until Monday, when he was transferred to a larger hospital in Ananindeua - 200km away.

(5º§) Jaguar attacks are considered rare in Brazil, as experts have cited them as the least likely of all big cats to kill and eat humans.

(6º§) Recently, another Brazilian was attacked by an alligator - but managed to make a lucky escape with only a bite on his arm. The daredevil had decided to go for a swim in a popular tourist destination, the Lago do Amor in Campo Grande - ignoring warning signs that a lake was infested with the predators.

(7º§) In July, another Brazilian's fate was not so fortunate as he was mauled to death by a shark after walking into the sea to pee. The victim had reportedly been drinking with friends before he entered the water and was fatally bitten by the vicious animal.


https://www.thesun.co.uk/news/16682980/elderly-man-killed-by-jaguar-brazil/
When we say that some animal are mauled (7º§), we are saying that:
Alternativas
Q1876119 Inglês
O texto seguinte servirá de base para responder à questão.


BIG CAT ATTACK


(1º§) Farmer Pedro Vaz Ferreira was out hunting on Saturday with his two sons in the rural area of Portel, Brazil when he was savaged by the big cat.

(2º§) The feline's brutal attack left the 67-year-old in a serious state of health - as he reportedly suffered a partially disfigured face, some broken cheek bones and went blind in one eye.

(3º§) His two sons, Davi, 32, and 25-year-old Josue witnessed as the elderly man and animal even tussled for a few minutes. Davi told the news outlet O Liberal: "The three of us were in the forest, but it just attacked him. "The most serious wound is on his face. It broke the bones in his face, his nose, it blinded him. "He lost his vision instantly. It pierced his eye with its nail." Shortly after the attack, one of Mr Ferreira's sons reportedly killed the jaguar with a machete.

(4º§) Mr Ferreira's relatives took him by speedboat to the Hospital Wilson da Mota Silveira in Portel. He remained there in a serious condition until Monday, when he was transferred to a larger hospital in Ananindeua - 200km away.

(5º§) Jaguar attacks are considered rare in Brazil, as experts have cited them as the least likely of all big cats to kill and eat humans.

(6º§) Recently, another Brazilian was attacked by an alligator - but managed to make a lucky escape with only a bite on his arm. The daredevil had decided to go for a swim in a popular tourist destination, the Lago do Amor in Campo Grande - ignoring warning signs that a lake was infested with the predators.

(7º§) In July, another Brazilian's fate was not so fortunate as he was mauled to death by a shark after walking into the sea to pee. The victim had reportedly been drinking with friends before he entered the water and was fatally bitten by the vicious animal.


https://www.thesun.co.uk/news/16682980/elderly-man-killed-by-jaguar-brazil/
It is possible to conclude that the jaguar:
Alternativas
Q1875463 Inglês

Text 9A3-I


    If you were to judge 2018’s most important legal technology by looking at conference agendas and media coverage, you’d probably say it was the continuing development of artificial intelligence. But if you judge the most important technology by its direct impact on the practice of law, then it would have to be analytics. As I suggested in a recent column, we could be nearing the point where it would be malpractice for a lawyer not to use analytics.


Internet: <lawsitesblog.com> (adapted). 


The author of text 9A3-I mentions conference agendas and media coverage in order to
Alternativas
Q1875461 Inglês

Text 9A3-I


    If you were to judge 2018’s most important legal technology by looking at conference agendas and media coverage, you’d probably say it was the continuing development of artificial intelligence. But if you judge the most important technology by its direct impact on the practice of law, then it would have to be analytics. As I suggested in a recent column, we could be nearing the point where it would be malpractice for a lawyer not to use analytics.


Internet: <lawsitesblog.com> (adapted). 


In the first sentence of text 9A3-I, the word “it” refers to
Alternativas
Q1875460 Inglês

Text 9A3-I


    If you were to judge 2018’s most important legal technology by looking at conference agendas and media coverage, you’d probably say it was the continuing development of artificial intelligence. But if you judge the most important technology by its direct impact on the practice of law, then it would have to be analytics. As I suggested in a recent column, we could be nearing the point where it would be malpractice for a lawyer not to use analytics.


Internet: <lawsitesblog.com> (adapted). 


According to the author of text 9A3-I, 2018’s most impactful legal technology was 
Alternativas
Q1875103 Inglês
   The European Environment Agency (EEA) has published a new indicator that tracks findings of pesticides in Europe’s rivers, lakes and groundwaters. The data, collected from EEA member countries across Europe, shows the share of water bodies where excessive levels of pesticides have been recorded from 2013 to 2019. 
  The new EEA indicator shows that levels of pesticides exceeding thresholds were measured in a quarter of all reported monitoring sites in European surface waters in 2019. From 2013 to 2019, this share varied between 13% and 30%. The share for groundwater with exceedances was considerably lower, at between 3% and 7%.  
   In the EU, pesticides are regulated on the basis of high protection goals for human health and the environment, with being authorised only after a comprehensive scientific risk assessment. Nevertheless, pesticide contamination of surface waters and groundwater can still occur and could affect aquatic fauna and flora.  

Internet: <www.eea.europa.eu> (adapted). 
According to the text above, judge the following item.

Contamination by pesticides in European waters is less likely to occur than in other places in the world due to strict control policies. 
Alternativas
Q1875102 Inglês
   The European Environment Agency (EEA) has published a new indicator that tracks findings of pesticides in Europe’s rivers, lakes and groundwaters. The data, collected from EEA member countries across Europe, shows the share of water bodies where excessive levels of pesticides have been recorded from 2013 to 2019. 
  The new EEA indicator shows that levels of pesticides exceeding thresholds were measured in a quarter of all reported monitoring sites in European surface waters in 2019. From 2013 to 2019, this share varied between 13% and 30%. The share for groundwater with exceedances was considerably lower, at between 3% and 7%.  
   In the EU, pesticides are regulated on the basis of high protection goals for human health and the environment, with being authorised only after a comprehensive scientific risk assessment. Nevertheless, pesticide contamination of surface waters and groundwater can still occur and could affect aquatic fauna and flora.  

Internet: <www.eea.europa.eu> (adapted). 
According to the text above, judge the following item.

From 2013 to 2019, the percentage of sites in European surface waters whose levels of pesticides are above the limits more than doubled.
Alternativas
Q1875101 Inglês
    There’s growing evidence that people and the planet are increasingly impacted by extreme events. According to the Fourth National Climate Assessment, published in 2018 by the U.S. Global Change Research Program, “more frequent and intense extreme weather and climate-related events, as well as changes in average climate conditions, are expected to continue to damage infrastructure, ecosystems, and social systems that provide essential benefits to communities.”
      As the impacts of extreme events continue to mount, interest has grown in the scientific community to study whether specific extreme events can be partially attributed to human activities. With the help of climate models, scientists have conducted an impressive array of studies, looking for possible links between human activities and extreme events such as heat waves, rainfall and flooding events, droughts, storms, and wildfires. Increasingly, they’re able to draw robust connections.

Internet: <climate.nasa.gov> (adapted).
Judge the following item according to the text above.

Experts predict an abrupt change in climate conditions due to continually harmful human activities.  
Alternativas
Q1875100 Inglês
    There’s growing evidence that people and the planet are increasingly impacted by extreme events. According to the Fourth National Climate Assessment, published in 2018 by the U.S. Global Change Research Program, “more frequent and intense extreme weather and climate-related events, as well as changes in average climate conditions, are expected to continue to damage infrastructure, ecosystems, and social systems that provide essential benefits to communities.”
      As the impacts of extreme events continue to mount, interest has grown in the scientific community to study whether specific extreme events can be partially attributed to human activities. With the help of climate models, scientists have conducted an impressive array of studies, looking for possible links between human activities and extreme events such as heat waves, rainfall and flooding events, droughts, storms, and wildfires. Increasingly, they’re able to draw robust connections.

Internet: <climate.nasa.gov> (adapted).
Judge the following item according to the text above.

The author points out human contributions as a noteworthy reason for the growing number of extreme events. 
Alternativas
Q1875099 Inglês
    There’s growing evidence that people and the planet are increasingly impacted by extreme events. According to the Fourth National Climate Assessment, published in 2018 by the U.S. Global Change Research Program, “more frequent and intense extreme weather and climate-related events, as well as changes in average climate conditions, are expected to continue to damage infrastructure, ecosystems, and social systems that provide essential benefits to communities.”
      As the impacts of extreme events continue to mount, interest has grown in the scientific community to study whether specific extreme events can be partially attributed to human activities. With the help of climate models, scientists have conducted an impressive array of studies, looking for possible links between human activities and extreme events such as heat waves, rainfall and flooding events, droughts, storms, and wildfires. Increasingly, they’re able to draw robust connections.

Internet: <climate.nasa.gov> (adapted).
Judge the following item according to the text above.

Certain extreme weather and climate-related events are happening more often and becoming more intense. 
Alternativas
Q1873871 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
In the sentence “This site will look familiar, but it will be a spoofed site built to steal data.”, the correct definition for the word spoofed is in which alternative?
Alternativas
Q1873869 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
Read the article and decide if the statements below are true ( T ) or false ( F ).

( ) A phishing attack is to trick someone into giving away sensitive data.
( ) To commit identity fraud is a motive for phishing and it is mentioned in the text.
( ) 2FA can protect users from phishing attacks by having two keys to login.
( ) The domain accounts-google.com is used by attackers to phish.

Choose the alternative which presents the correct sequence, from top to bottom.
Alternativas
Q1873868 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
What is the difference between a phishing and spear phishing attack?
Alternativas
Q1873867 Inglês
Phishing

Imagine that you get an email one morning. It appears to be from your bank. The email warns that someone broke into your account. It says that you need to sign in to check some things. You click the link in the email. It takes you to a site that looks very much like your bank’s. You enter your username and password. You submit the form. You’ve just been phished!

Phishing is a type of attack that happens over the Internet. Users receive an email or text message that seems like it came from a trusted source. These users are being deceived. They are interacting with dangerous hackers. The attackers copy trusted companies. They send users to web pages that look like the ones we use everyday. When users login or provide sensitive information, the attackers steal this data.

Attackers want your data for many reasons. They may use your data to commit identity fraud. This is when they use your identity to buy something with your credit. Then they receive the goods and you receive the bill. Or they may want your password to take over a computer network. They may want access to private emails. They may want customer records. They gain access by tricking people into giving them their login info.

Some phishing attacks are targeted. A targeted phishing attack is called a spear phishing attack. These attacks are dangerous because they are convincing. The attacker may know the target’s name, address, or job title. They may have gathered info from social networks, like the names of friends or family. The attackers may use this personal information to craft a believable email. The target will be tricked into clicking a link. The link will send them to a phony website. This site will look familiar, but it will be a spoofed site built to steal data. Any data that the target submits will go to the hacker.

Phishing attacks are dangerous, but you can spot them if you pay attention. One thing to watch is your address bar in your browser. Attackers use domains that look like the ones that we trust, but they are not the same. For example, in 2016 staffers from Hillary Clinton’s campaign were spear phished. The attackers used the domain accounts-google.com. That domain looks like google.com, but it isn’t the same. When logging into google, you should always do it from google.com. Likewise, when logging into any account, make sure the address matches what you expect. If you are unsure, search for the site and login from the root domain.

An even better way to secure your account against phishing attacks is to use 2FA: two factor authentication. 2FA means that your account is secured with two keys. The first is your password. The second key is a random code that changes every few minutes. This code may be generated by a 2FA app, like Authy. Or it can be sent to your cell phone on request. If you activate 2FA on your accounts, an attacker will not be able to get in even with your password.

Phishing attacks are scary and common. The reason why they are common is that they are effective. Many people accept appearances without suspicion. Browsing the Internet safely requires a healthy amount of suspicion. Not everything is what it appears. Nobody is trying to give you free money. Don’t trust; verify.
Which alternative best describes the main idea of the third paragraph?
Alternativas
Q1869417 Inglês

Consider Text II to answer question.



“I am a bit apprehensive of the temptation of relegating to the background the lofty and creative initiative of Brazil in the sugar cane-based ethanol and other biofuel energy products, the moment the drilling of these huge oil wells in Tupi and its satellite oil wells takes off in earnest, amid challenging circumstances, though. My advice is that while Brazil is joyfully tinkering with the prospect of raking in colossal petro-dollar money, she shouldn’t, by any means, lose sight of the need to consolidate investment in the already standard setting, functional, renewable and clean energy source that is the ethanol. The government should find a perfect mix in due course.”

Enyinnaya wrote
Mar 21st 2009
http://www.economist.com/node/13348824/comments

The author of the comment above expresses concern for the forecast presented in Text II since
Alternativas
Q1869416 Inglês

Consider Text II to answer question.



President Luiz Inácio Lula da Silva is mentioned in the last paragraph because, according to the author,
Alternativas
Q1869414 Inglês

Consider Text II to answer question.



In paragraph 7 (lines 60-76), among the possible changes to the Brazilian concession laws for the exploration of the deepwater blocks in the subsalt region, the author mentions
Alternativas
Q1869412 Inglês

Consider Text II to answer question.



The participation of the private sector in the exploration of Brazil’s new oil finds is considered
Alternativas
Q1869411 Inglês

Consider Text II to answer question.



The only fragment that DOES NOT refer to an aspect that might represent an obstacle for the progress of the exploration of Brazil’s deep water oil reservoirs is
Alternativas
Q1869409 Inglês

Consider Text II to answer question.



Large Brazilian companies are inclined to count on local banks for credit, as explained in paragraph 4 (lines 29-39), due to the
Alternativas
Respostas
3381: A
3382: C
3383: A
3384: D
3385: E
3386: E
3387: E
3388: E
3389: C
3390: C
3391: E
3392: B
3393: C
3394: B
3395: D
3396: A
3397: B
3398: E
3399: C
3400: D