Questões de Concurso
Sobre interpretação de texto | reading comprehension em inglês
Foram encontradas 9.500 questões
1. The ECOWAS COMMISSION has allocated own funds towards the cost of the Supply, Deployment & Installation of Network Equipment at the ECOWAS Commission Headquarters Data Centre, Abuja.
2. The ECOWAS Commission therefore invites sealed bids for the Supply, Deployment & Installation of Network Equipment at the ECOWAS Commission Headquarters Data Centre, Abuja described above in one lot.
3. The Bidding Document can be obtained at the Procurement Division, Directorate of General Administration, ECOWAS Commission, Plot 101, Yakubu Gowon Crescent, Asokoro District, Abuja, Nigeria, upon submission of a written request and payment of three hundred US Dollars (US$300.00) by Cash or Bank Draft made in favour of ECOWAS Commission, Abuja .
4. For Bidders outside Nigeria, the Bidding Document can be mailed to interested Bidders upon payment (by Transfer) of non-refundable fee of US$300.00 to the Commission (transfer charges born by the bidder). (Account Details available on request.)
5. Interested Bidders may obtain further information at the address below, during office hours: Monday to Friday from 9.00am (8.00am GMT+1) to 4.00pm (3.00pm GMT+1), ECOWAS Commission, Directorate of General Administration, Procurement Division, 1st Floor, Plot 101, Yakubu Gowon Crescent, Asokoro District, PMB 401 Abuja Nigeria.
E-mail: [email protected]
6. Bids shall be valid for a period of 120 (days) after Bid Opening and must be accompanied by a bid security of US$20,000.00 (Bank Guarantee or Insurance Bond).
7. Bids shall be delivered in sealed envelope and deposited in the ECOWAS Tender Box located Office of the Executive Assistant of Commissioner of Administration & Finance, fifth (5th) floor of the ECOWAS Commission Building, 101, Yakubu Gowon Crescent Asokoro District, P. M. B. 401, Abuja, Nigeria on or before November 7, 2013 at 11.30am (10.30am GMT+1) and clearly marked “International Competitive Bidding for the Production of ECOWAS Biometric Laissez Passer and Supply of Equipment” Do Not Open, Except in Presence of the Committee.
8. Bids will be opened in the presence of the bidders who wish to attend on November 7, 2013 at 12.00 noon (11.00am GMT+1), Room 523, Ecowas Commission, Abuja, Nigeria.
(The Economist, September 4th, 2013. Page 86. Adaptado.)
1. The ECOWAS COMMISSION has allocated own funds towards the cost of the Supply, Deployment & Installation of Network Equipment at the ECOWAS Commission Headquarters Data Centre, Abuja.
2. The ECOWAS Commission therefore invites sealed bids for the Supply, Deployment & Installation of Network Equipment at the ECOWAS Commission Headquarters Data Centre, Abuja described above in one lot.
3. The Bidding Document can be obtained at the Procurement Division, Directorate of General Administration, ECOWAS Commission, Plot 101, Yakubu Gowon Crescent, Asokoro District, Abuja, Nigeria, upon submission of a written request and payment of three hundred US Dollars (US$300.00) by Cash or Bank Draft made in favour of ECOWAS Commission, Abuja .
4. For Bidders outside Nigeria, the Bidding Document can be mailed to interested Bidders upon payment (by Transfer) of non-refundable fee of US$300.00 to the Commission (transfer charges born by the bidder). (Account Details available on request.)
5. Interested Bidders may obtain further information at the address below, during office hours: Monday to Friday from 9.00am (8.00am GMT+1) to 4.00pm (3.00pm GMT+1), ECOWAS Commission, Directorate of General Administration, Procurement Division, 1st Floor, Plot 101, Yakubu Gowon Crescent, Asokoro District, PMB 401 Abuja Nigeria.
E-mail: [email protected]
6. Bids shall be valid for a period of 120 (days) after Bid Opening and must be accompanied by a bid security of US$20,000.00 (Bank Guarantee or Insurance Bond).
7. Bids shall be delivered in sealed envelope and deposited in the ECOWAS Tender Box located Office of the Executive Assistant of Commissioner of Administration & Finance, fifth (5th) floor of the ECOWAS Commission Building, 101, Yakubu Gowon Crescent Asokoro District, P. M. B. 401, Abuja, Nigeria on or before November 7, 2013 at 11.30am (10.30am GMT+1) and clearly marked “International Competitive Bidding for the Production of ECOWAS Biometric Laissez Passer and Supply of Equipment” Do Not Open, Except in Presence of the Committee.
8. Bids will be opened in the presence of the bidders who wish to attend on November 7, 2013 at 12.00 noon (11.00am GMT+1), Room 523, Ecowas Commission, Abuja, Nigeria.
(The Economist, September 4th, 2013. Page 86. Adaptado.)
1. The ECOWAS COMMISSION has allocated own funds towards the cost of the Supply, Deployment & Installation of Network Equipment at the ECOWAS Commission Headquarters Data Centre, Abuja.
2. The ECOWAS Commission therefore invites sealed bids for the Supply, Deployment & Installation of Network Equipment at the ECOWAS Commission Headquarters Data Centre, Abuja described above in one lot.
3. The Bidding Document can be obtained at the Procurement Division, Directorate of General Administration, ECOWAS Commission, Plot 101, Yakubu Gowon Crescent, Asokoro District, Abuja, Nigeria, upon submission of a written request and payment of three hundred US Dollars (US$300.00) by Cash or Bank Draft made in favour of ECOWAS Commission, Abuja .
4. For Bidders outside Nigeria, the Bidding Document can be mailed to interested Bidders upon payment (by Transfer) of non-refundable fee of US$300.00 to the Commission (transfer charges born by the bidder). (Account Details available on request.)
5. Interested Bidders may obtain further information at the address below, during office hours: Monday to Friday from 9.00am (8.00am GMT+1) to 4.00pm (3.00pm GMT+1), ECOWAS Commission, Directorate of General Administration, Procurement Division, 1st Floor, Plot 101, Yakubu Gowon Crescent, Asokoro District, PMB 401 Abuja Nigeria.
E-mail: [email protected]
6. Bids shall be valid for a period of 120 (days) after Bid Opening and must be accompanied by a bid security of US$20,000.00 (Bank Guarantee or Insurance Bond).
7. Bids shall be delivered in sealed envelope and deposited in the ECOWAS Tender Box located Office of the Executive Assistant of Commissioner of Administration & Finance, fifth (5th) floor of the ECOWAS Commission Building, 101, Yakubu Gowon Crescent Asokoro District, P. M. B. 401, Abuja, Nigeria on or before November 7, 2013 at 11.30am (10.30am GMT+1) and clearly marked “International Competitive Bidding for the Production of ECOWAS Biometric Laissez Passer and Supply of Equipment” Do Not Open, Except in Presence of the Committee.
8. Bids will be opened in the presence of the bidders who wish to attend on November 7, 2013 at 12.00 noon (11.00am GMT+1), Room 523, Ecowas Commission, Abuja, Nigeria.
(The Economist, September 4th, 2013. Page 86. Adaptado.)
1. The ECOWAS COMMISSION has allocated own funds towards the cost of the Supply, Deployment & Installation of Network Equipment at the ECOWAS Commission Headquarters Data Centre, Abuja.
2. The ECOWAS Commission therefore invites sealed bids for the Supply, Deployment & Installation of Network Equipment at the ECOWAS Commission Headquarters Data Centre, Abuja described above in one lot.
3. The Bidding Document can be obtained at the Procurement Division, Directorate of General Administration, ECOWAS Commission, Plot 101, Yakubu Gowon Crescent, Asokoro District, Abuja, Nigeria, upon submission of a written request and payment of three hundred US Dollars (US$300.00) by Cash or Bank Draft made in favour of ECOWAS Commission, Abuja .
4. For Bidders outside Nigeria, the Bidding Document can be mailed to interested Bidders upon payment (by Transfer) of non-refundable fee of US$300.00 to the Commission (transfer charges born by the bidder). (Account Details available on request.)
5. Interested Bidders may obtain further information at the address below, during office hours: Monday to Friday from 9.00am (8.00am GMT+1) to 4.00pm (3.00pm GMT+1), ECOWAS Commission, Directorate of General Administration, Procurement Division, 1st Floor, Plot 101, Yakubu Gowon Crescent, Asokoro District, PMB 401 Abuja Nigeria.
E-mail: [email protected]
6. Bids shall be valid for a period of 120 (days) after Bid Opening and must be accompanied by a bid security of US$20,000.00 (Bank Guarantee or Insurance Bond).
7. Bids shall be delivered in sealed envelope and deposited in the ECOWAS Tender Box located Office of the Executive Assistant of Commissioner of Administration & Finance, fifth (5th) floor of the ECOWAS Commission Building, 101, Yakubu Gowon Crescent Asokoro District, P. M. B. 401, Abuja, Nigeria on or before November 7, 2013 at 11.30am (10.30am GMT+1) and clearly marked “International Competitive Bidding for the Production of ECOWAS Biometric Laissez Passer and Supply of Equipment” Do Not Open, Except in Presence of the Committee.
8. Bids will be opened in the presence of the bidders who wish to attend on November 7, 2013 at 12.00 noon (11.00am GMT+1), Room 523, Ecowas Commission, Abuja, Nigeria.
(The Economist, September 4th, 2013. Page 86. Adaptado.)
Acid rain and… the facts
www.acidrain.org.ca / Oxford Children´s Encyclopedia
What causes acid rain?
Acid rain is caused by air pollution. When fossil fuels such as coal and oil are burned, two gases, sulphur dioxide and nitrogen oxide, are released into the atmosphere. These two pollutants eventually react with the moisture in the air. When this polluted mixture falls onto the ground, it is called acid rain.
Rain measuring between 0 and 5 on the pH scale, is acidic therefore called ACID RAIN.
Acid rain is harmful to the environment. It is hardto control because it may be blown by the wind, falling thousands of kilometers from where it was first formed. For example, much of the acid rain in Canada is caused by smoke from factories and power-stations in the USA. The acid rain in Scandinavia may come from Britain.
What are the effects of acid rain?
Acid rain has many different effects. It has killedfish in the lakes of North America, Scandinavia, Scotland, and Wales. Vast areas of forest in northern and central Europeare dying because of it, while in many European cities statues and stone buildings are being eaten away by the acid. Acid rain corrodes metalwork such as steel bridges and railings; it also attacks some types of concrete. Even the water thatwe drink is slowly being polluted by acid rain.
What are the effects on trees and soil?
One of the most serious impacts of acid precipitation is on forests and soils. Great damage is done when sulphuric acid falls onto the earth as rain. Nutrients present in the soils are washed away. Aluminium also present in the soils is freed and this toxic element can be absorbed by the rootsof trees. Thus, the trees starve to death because they have been deprived of their vital nutrients such as calcium and magnesium.
Acid rain is one of the most serious environmental problems of our time. It is a global problems that is gradually affecting our world.
How does acid rain effect lakes?
Lakes that have been acidified cannot support the same variety of life as healthy lakes. As a lake becomes more acidic, various types of fish disappear. Other effects of acidified lakes on fish include: decreased growth, inability to regulate their own body chemistry, reduced egg deposition, deformities in young fish and increased susceptibility to naturally occurring diseases.
Clean rain usually has a pH of 5.6. It is slightly acidic because of carbon dioxide which is naturally present in the atmosphere. Vinegar, by comparison, is very acidic and has a pH of 3.
What is pH?
This is a measure of how acidic or alkaline a substance is. (See a pH scale below).
The initials pH stand for Potential of Hydrogen. Acids have pH values under 7, and alkalis have pHvalues over 7. If a substance has a pH value of 7. It is neutral-neither acidic or alkaline.
Because the pH scale is logarithmic, a difference of one pH unit represents a tenfold, or ten times change. For example, the acidity of a sample with a pH of 5 is ten timesgreater than that of a sample with a pH of 6. A difference of 2 units, from 6 to 4, would mean that the acidity in one hundred times greater, and so on.
(Reinildes Dias. Reading Critically in English, 3 rd ed. UFMG 2002. Adaptado.)
In 1998, Dr. Philip A. Starr started putting electrodes in people’s brains. A neurosurgeon at the University of California, San Francisco, Dr. Starr was treating people with Parkinson’s disease, which slowly destroys essential bits of brain tissue, robbing people of control of their bodies. At first, drugs had given his patients some relief, but now they needed more help. After the surgery, Dr. Starr closed up his patients’ skulls and switched on the electrodes, releasing a steady buzz of electric pulses in their brains. For many patients, the effect was immediate. “We have people who, when they’re not taking their meds, can be frozen,” said Dr. Starr. “When we turn on the stimulator, they start walking.” First developed in the early 1990s, deep brain stimulation, or D.B.S., was approved by the Food and Drug Administration for treating Parkinson’s disease in 2002. Since its invention, about 100,000 people have received implants. While D.B.S. doesn’t halt Parkinson’s, it can turn back the clock a few years for many patients. Yet despite its clear effectiveness, scientists like Dr. Starr have struggled to understand what D.B.S. actually does to the brain. “We do D.B.S. because it works,” said Dr. Starr, “but we don’t really know how.” In a recent experiment, Dr. Starr and his colleagues believe they found a clue. D.B.S. may counter Parkinson’s disease by liberating the brain from a devastating electrical lock-step.
http://www.nytimes.com/2015/04/16/science/ (adapted)
In 1998, Dr. Philip A. Starr started putting electrodes in people’s brains. A neurosurgeon at the University of California, San Francisco, Dr. Starr was treating people with Parkinson’s disease, which slowly destroys essential bits of brain tissue, robbing people of control of their bodies. At first, drugs had given his patients some relief, but now they needed more help. After the surgery, Dr. Starr closed up his patients’ skulls and switched on the electrodes, releasing a steady buzz of electric pulses in their brains. For many patients, the effect was immediate. “We have people who, when they’re not taking their meds, can be frozen,” said Dr. Starr. “When we turn on the stimulator, they start walking.” First developed in the early 1990s, deep brain stimulation, or D.B.S., was approved by the Food and Drug Administration for treating Parkinson’s disease in 2002. Since its invention, about 100,000 people have received implants. While D.B.S. doesn’t halt Parkinson’s, it can turn back the clock a few years for many patients. Yet despite its clear effectiveness, scientists like Dr. Starr have struggled to understand what D.B.S. actually does to the brain. “We do D.B.S. because it works,” said Dr. Starr, “but we don’t really know how.” In a recent experiment, Dr. Starr and his colleagues believe they found a clue. D.B.S. may counter Parkinson’s disease by liberating the brain from a devastating electrical lock-step.
http://www.nytimes.com/2015/04/16/science/ (adapted)
According to the strip:
Self-repairing software tackles malware
University of Utah computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer
again.
A3 is a software suite that works with a virtual machine - a virtual computer that emulates the operations of a computer without dedicated hardware. The A3 software is designed to watch over the virtual machine's operating system and applications, says Eric Eide, University of Utah research assistant professor of computer science leading the university's A3 team with U computer science associate professor John Regehr. A3 is designed to protect servers or similar business-grade computers that run on the Linux operating system. It also has been demonstrated to protect military applications.
The new software called A3, or Advanced Adaptive Applications, was co-developed by Massachusetts-based defense contractor, Raytheon BBN. The four-year project was completed in late September.
There are no plans to adapt A3 for home computers or laptops, but Eide says this could be possible in the future.
"A3 technologies could find their way into consumer products someday, which would help consumer devices protect themselves against fast-spreading malware or internal corruption of software components. But we haven't tried those experiments yet," he says.
Unlike a normal virus scanner on consumer PCs that compares a catalog of known viruses to something that has infected the computer, A3 can detect new, unknown viruses or malware automatically by sensing that something is occurring in the computer's operation that is not correct. It then can stop the virus, approximate a repair for the damaged software code, and then learn to never let that bug enter the machine gain.
While the military has an interest in A3 to enhance cybersecurity for its mission-critical systems, A3 also potentially could be used in the consumer space, such as in web services like Amazon. If a virus or attack stops the service, A3 could repair it in minutes without having to take the servers down.
Source: http://www.sciencedaily.com
I. A3 works exactly the same way as a normal virus scanner on consumer PCs.
II. The A3 software already found their way into consumer products and cloud-computing.
III. The software is designed to protect military servers that run on the Linux operating system.
IV. A3 only stops the virus and repairs the damaged software code.
According to the text:
Self-repairing software tackles malware
University of Utah computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer
again.
A3 is a software suite that works with a virtual machine - a virtual computer that emulates the operations of a computer without dedicated hardware. The A3 software is designed to watch over the virtual machine's operating system and applications, says Eric Eide, University of Utah research assistant professor of computer science leading the university's A3 team with U computer science associate professor John Regehr. A3 is designed to protect servers or similar business-grade computers that run on the Linux operating system. It also has been demonstrated to protect military applications.
The new software called A3, or Advanced Adaptive Applications, was co-developed by Massachusetts-based defense contractor, Raytheon BBN. The four-year project was completed in late September.
There are no plans to adapt A3 for home computers or laptops, but Eide says this could be possible in the future.
"A3 technologies could find their way into consumer products someday, which would help consumer devices protect themselves against fast-spreading malware or internal corruption of software components. But we haven't tried those experiments yet," he says.
Unlike a normal virus scanner on consumer PCs that compares a catalog of known viruses to something that has infected the computer, A3 can detect new, unknown viruses or malware automatically by sensing that something is occurring in the computer's operation that is not correct. It then can stop the virus, approximate a repair for the damaged software code, and then learn to never let that bug enter the machine gain.
While the military has an interest in A3 to enhance cybersecurity for its mission-critical systems, A3 also potentially could be used in the consumer space, such as in web services like Amazon. If a virus or attack stops the service, A3 could repair it in minutes without having to take the servers down.
Source: http://www.sciencedaily.com
A garota Patty aceita deixar a brincadeira se o menino lhe pagar os 15 dólares gastos com sua fantasia.
Nessa história em quadrinhos, o garoto, dirigindo a carroça, argumenta com Patty que ela foi baleada e
que, portanto, está eliminada da brincadeira.
Nos dois últimos versos da canção – “And I swear that I don’t have a gun / No I don’t have a gun”–, o
autor lamenta o fato de não possuir uma arma.
O autor dessa canção dirige-se às pessoas em geral, enfatizando que elas se apresentem e sejam
aceitas como realmente são, sem quaisquer restrições.
Há, atualmente, mais de trinta mil residentes de Los Angeles que usam o Twitter para o rastreamento de
crimes na cidade.
Repórteres profissionais da área criminal, após os relatos dos moradores, começaram a fazer o
rastreamento de crimes através da escuta de conversas de rádio entre os policiais.
Um número cada vez maior de moradores de Los Angeles sintonizam conversas de rádio entre policiais
e usam o Twitter para divulgar o que ouvem.
O casal de chineses sabe que, no futuro, terá de arcar com a compra de um apartamento para o filho, a
fim de que ele possa conseguir uma esposa.
Liu Jinghu e sua esposa costumam divertir-se apenas nos fins de semana, quando seu único filho,
Xiaojing, fica aos cuidados de amigos.