Questões de Concurso Sobre interpretação de texto | reading comprehension em inglês

Foram encontradas 9.500 questões

Q487742 Inglês
“Others" (l.7) refers to
Alternativas
Q487741 Inglês
According to the text, it can be said that
Alternativas
Q487740 Inglês
In the text, “prompting” (l.2) means the same as
Alternativas
Q487185 Inglês
Based on the text, judge the following items

Perhaps, in due course of time, women may take over as leaders of large businesses.
Alternativas
Q487184 Inglês
Based on the text, judge the following items

Quite a few female leaders are to be found in business activities.
Alternativas
Q486090 Inglês
The Labour Program as well as The Canada Labour Code
Alternativas
Q486089 Inglês
The word “policy” (line 45), considered in its context, can be translated by
Alternativas
Q486088 Inglês
The Labour Program has recently developed new requirements which, among other things, aim at
Alternativas
Q486087 Inglês
The text introduces the Government of Canada's Labour Program.

In order to achieve its purposes, this Program 

Alternativas
Q486086 Inglês
Why is the Canadian Government so concerned with occupational health and safety?
Alternativas
Q485565 Inglês
The sentence of the text “With so much debt already under their belts, millennials are worried about adding any credit card debt to the pile” (lines 38 – 40) conveys the idea that millenials have
Alternativas
Q485563 Inglês
In the sentence of the text “the Great Recession caused millennials to stray from historic patterns when it comes to purchasing a home and having children” (lines 13 – 15), the word stray can be replaced, with no change in meaning, by
Alternativas
Q485562 Inglês
The main purpose of the text is to
Alternativas
Q484786 Inglês
    Recent corporate collapses, such as EBS International and Société Générale, have brought about renewed scrutiny into corporate governance mechanisms. Given the pervasiveness of Information Technology (IT) in many organizations, the examination of corporate governance mechanisms also includes IT governance mechanisms. IT governance is defined as “a structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes”.
    In light of increased public awareness, professional bodies such as the Information Systems Audit and Control Association (ISACA) have undertaken a number of steps to provide guidance in the implementation of effective IT governance. The approach taken by ISACA appears to be largely based upon two concepts. The first concept relates to increasing the awareness of issues and concepts relating to IT governance in the public domain. The second concept involves the provision of guidelines and the identification of best-practice IT governance mechanisms. Interestingly, the effectiveness of these best-practice mechanisms in improving IT governance is largely based upon conceptual arguments. As such, it becomes important to ascertain if these best-practice mechanisms do impact upon the level of IT governance.
    As IT escalates in terms of importance and pervasiveness in the operations of firms, it is inexorably tied to specific mechanisms that are prescribed for good corporate governance, most notably, a sound system of internal controls. Accordingly, effective IT governance is a critical underpinning for a system of good corporate governance that minimizes agency losses for a firm.
Internet: < http://onlinelibrary.wiley.com > (adapted).

Based on the text above, judge the following item.

In spite of the pervasiveness of IT in many organizations, it is essential for enterprises to balance risks and detect fraud.
Alternativas
Q484785 Inglês
    Recent corporate collapses, such as EBS International and Société Générale, have brought about renewed scrutiny into corporate governance mechanisms. Given the pervasiveness of Information Technology (IT) in many organizations, the examination of corporate governance mechanisms also includes IT governance mechanisms. IT governance is defined as “a structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes”.
    In light of increased public awareness, professional bodies such as the Information Systems Audit and Control Association (ISACA) have undertaken a number of steps to provide guidance in the implementation of effective IT governance. The approach taken by ISACA appears to be largely based upon two concepts. The first concept relates to increasing the awareness of issues and concepts relating to IT governance in the public domain. The second concept involves the provision of guidelines and the identification of best-practice IT governance mechanisms. Interestingly, the effectiveness of these best-practice mechanisms in improving IT governance is largely based upon conceptual arguments. As such, it becomes important to ascertain if these best-practice mechanisms do impact upon the level of IT governance.
    As IT escalates in terms of importance and pervasiveness in the operations of firms, it is inexorably tied to specific mechanisms that are prescribed for good corporate governance, most notably, a sound system of internal controls. Accordingly, effective IT governance is a critical underpinning for a system of good corporate governance that minimizes agency losses for a firm.
Internet: < http://onlinelibrary.wiley.com > (adapted).

Based on the text above, judge the following item.

Internal control is a central issue on corporate governance.
Alternativas
Q484784 Inglês
    Recent corporate collapses, such as EBS International and Société Générale, have brought about renewed scrutiny into corporate governance mechanisms. Given the pervasiveness of Information Technology (IT) in many organizations, the examination of corporate governance mechanisms also includes IT governance mechanisms. IT governance is defined as “a structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes”.
    In light of increased public awareness, professional bodies such as the Information Systems Audit and Control Association (ISACA) have undertaken a number of steps to provide guidance in the implementation of effective IT governance. The approach taken by ISACA appears to be largely based upon two concepts. The first concept relates to increasing the awareness of issues and concepts relating to IT governance in the public domain. The second concept involves the provision of guidelines and the identification of best-practice IT governance mechanisms. Interestingly, the effectiveness of these best-practice mechanisms in improving IT governance is largely based upon conceptual arguments. As such, it becomes important to ascertain if these best-practice mechanisms do impact upon the level of IT governance.
    As IT escalates in terms of importance and pervasiveness in the operations of firms, it is inexorably tied to specific mechanisms that are prescribed for good corporate governance, most notably, a sound system of internal controls. Accordingly, effective IT governance is a critical underpinning for a system of good corporate governance that minimizes agency losses for a firm.
Internet: < http://onlinelibrary.wiley.com > (adapted).

Based on the text above, judge the following item.

IT governance mechanisms contribute toward an increased level of overall effective IT governance.
Alternativas
Q484783 Inglês
    Recent corporate collapses, such as EBS International and Société Générale, have brought about renewed scrutiny into corporate governance mechanisms. Given the pervasiveness of Information Technology (IT) in many organizations, the examination of corporate governance mechanisms also includes IT governance mechanisms. IT governance is defined as “a structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes”.
    In light of increased public awareness, professional bodies such as the Information Systems Audit and Control Association (ISACA) have undertaken a number of steps to provide guidance in the implementation of effective IT governance. The approach taken by ISACA appears to be largely based upon two concepts. The first concept relates to increasing the awareness of issues and concepts relating to IT governance in the public domain. The second concept involves the provision of guidelines and the identification of best-practice IT governance mechanisms. Interestingly, the effectiveness of these best-practice mechanisms in improving IT governance is largely based upon conceptual arguments. As such, it becomes important to ascertain if these best-practice mechanisms do impact upon the level of IT governance.
    As IT escalates in terms of importance and pervasiveness in the operations of firms, it is inexorably tied to specific mechanisms that are prescribed for good corporate governance, most notably, a sound system of internal controls. Accordingly, effective IT governance is a critical underpinning for a system of good corporate governance that minimizes agency losses for a firm.
Internet: < http://onlinelibrary.wiley.com > (adapted).

Based on the text above, judge the following item.

The Information Systems Audit and Control Association have advised against a number of steps concerning the implementation of effective IT governance.
Alternativas
Q484782 Inglês
    Recent corporate collapses, such as EBS International and Société Générale, have brought about renewed scrutiny into corporate governance mechanisms. Given the pervasiveness of Information Technology (IT) in many organizations, the examination of corporate governance mechanisms also includes IT governance mechanisms. IT governance is defined as “a structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes”.
    In light of increased public awareness, professional bodies such as the Information Systems Audit and Control Association (ISACA) have undertaken a number of steps to provide guidance in the implementation of effective IT governance. The approach taken by ISACA appears to be largely based upon two concepts. The first concept relates to increasing the awareness of issues and concepts relating to IT governance in the public domain. The second concept involves the provision of guidelines and the identification of best-practice IT governance mechanisms. Interestingly, the effectiveness of these best-practice mechanisms in improving IT governance is largely based upon conceptual arguments. As such, it becomes important to ascertain if these best-practice mechanisms do impact upon the level of IT governance.
    As IT escalates in terms of importance and pervasiveness in the operations of firms, it is inexorably tied to specific mechanisms that are prescribed for good corporate governance, most notably, a sound system of internal controls. Accordingly, effective IT governance is a critical underpinning for a system of good corporate governance that minimizes agency losses for a firm.
Internet: < http://onlinelibrary.wiley.com > (adapted).

Based on the text above, judge the following item.

Although considerable research has been devoted to IT governance, rather less attention has been paid to corporate governance mechanisms.
Alternativas
Q483830 Inglês
                        Gravity, review: “heartachingly tender”

            Starring Sandra Bullock and George Clooney as astronauts adrift in
                  space, Alfonso Cuarón’s astonishing thriller is one of the films of
                                           the year, says Robbie Collin


      Watch an astronaut drifting through space for long enough and eventually you notice how much they look like a newborn baby. The oxygen helmet makes their head bigger, rounder and cuter; their hands grasp eagerly at whatever happens to be passing; their limbs are made fat and their movements simple by the spacesuit’s cuddly bulk. They tumble head-over-heels like tripping toddlers or simply bob there in amniotic suspension. Even the lifeline that keeps them tethered to their ship has a pulsing, umbilical aspect.
      Gravity, the new Alfonso Cuarón picture, is a heart- achingly tender film about the miracle of motherhood, and the billion-to-one odds against any of us being here, astronauts or not. It’s also a totally absorbing, often overpowering spectacle - a $100 million 3D action movie in which Sandra Bullock and George Clooney play two Hollywood-handsome spacefarers, fighting for their lives 375 miles above the Earth’s crust.
      A series of captions over the opening titles reminds us that this is a dead zone: no oxygen or air pressure, and nothing to carry sound. “Life in space is impossible,” the final message tells us, as the cinema shakes with Steven Price’s resonant score, and then suddenly falls quiet.
      For Dr. Ryan Stone (Bullock), a mission specialist in orbit for the first time, the lack of noise is welcome. She’s a medical engineer called up by NASA to install new software on to the Hubble Telescope, but also a mother in mourning for her four- year-old daughter, whom she lost in a senseless accident, and the silence enfolds her like a comfort blanket.

                                                            Available in: http://www.telegraph.co.uk


Read the sentence taken from the text.

It’s also a totally absorbing, often overpowering spectacle – a $100 million 3D action movie in which Sandra Bullock and George Clooney play two Hollywood-handsome spacefarers, fighting for their lives 375 miles above the Earth’s crust.”

According to the context and considering the text, it is correct to affirm that the underlined word refers to
Alternativas
Ano: 2015 Banca: SRH Órgão: UERJ Prova: SRH - 2015 - UERJ - Analista de Sistemas |
Q483304 Inglês
                        Virtual network appliances: Benefits and drawbacks

There's lots of talk about network virtualization benefits, but are virtual network appliances all they're cracked up to be? Only in some scenarios.
Network virtualization benefits can be plentiful, but only in certain scenarios. Learn where virtual network appliances can work -- and where they can't.
If virtualization enables servers to be spun up and down on demand for cost efficiency and agility, wouldn't it make sense to implement virtual network components too? After all, virtual servers need to communicate inbound and outbound and still be firewall-protected and load balanced. That would seem to be best addressed by virtual network appliances that can be spun-up on demand, right? Only in some scenarios.
Many networking vendors have already begun to minimize development cost by using Intel-based platforms and commodity hardware. Examples of this range from the Cisco ASA firewall to F5 load balancers and Vyatta routers. The obvious next step for some of these vendors has been to offer their products in virtual appliance packaging. F5 took a small step forward with the Local Traffic Manager - Virtual Edition (LTM VE), while Vyatta claims to offer a full range of virtual appliance solutions. VMware was somewhat late to the game, but it also offers virtualized firewalls (vShield Zones and vShield App) and routers/load balancers (vShield Edge).


                        Virtual network appliances: What's the catch?

The problem is that unlike servers, networking appliances commonly perform I/O-intensive tasks, moving large amounts of data between network interfaces with minimal additional processing, relying heavily on dedicated hardware. All high-speed routing and packet forwarding, as well as encryption (both IPsec and SSL) and load balancing, rely on dedicated silicon. When a networking appliance is repackaged into a virtual machine format, the dedicated hardware is gone, and all these tasks must now be performed by the general- purpose CPU, sometimes resulting in extreme reduction in performance.

Implementing routers, switches or firewalls in a virtual appliance would just burn the CPU cycles that could be better used elsewhere -- unless, of course, you’ve over-provisioned your servers and have plenty of idle CPU cycles, in which case something has gone seriously wrong with your planning.

To make matters worse, the hypervisor software used in server virtualization solutions also virtualizes the network interfaces. That means that every I/O access path to virtualized hardware from the networking appliance results in a context switch to higher privilege software (the hypervisor), which uses numerous CPU cycles to decode what needs to be done and emulate the desired action. Also, data passed between virtual machines must be copied between their address spaces, adding further latency to the process.

There is some help in that the VMware hypervisor has the DVFilter API, which allows a loadable kernel module to inspect and modify network traffic either within the hypervisor (vNetwork Data Path Agent) or in combination with a virtual machine (vNetwork Control Path Agent). The loadable kernel module significantly reduces the VM context switching overhead.


                        Where virtual network appliances can work?

There are some use cases in which virtual network appliances make perfect sense. For instance, you could virtualize an appliance that performs lots of CPU-intensive processing with no reliance on dedicated hardware. Web application firewalls (WAFs) and complex load balancers are perfect examples (no wonder they’re commonly implemented as loadable modules in Apache Web servers or as Squid reverse proxy servers).
Also, if you’re planning to roll out multi-tenant cloud, the flexibility gained by treating networking appliances as click-to-deploy Lego bricks might more than justify the subpar performance. This is especially so if you charge your users by their actual VM/CPU usage, in which case you don’t really care how much CPU they’re using.
Virtualized networking also makes sense when firewall and routing functions are implemented as part of the virtual switch in each hypervisor. This could result in optimal traffic flow between virtual machines (regardless of whether they belong to the same IP subnet or not) and solve the problem of traffic trombones. Unfortunately, it seems that Cisco is still the only vendor that extends the VMware hypervisor switch using the Virtual Ethernet Module (VEM) functionality. While numerous security solutions already deploy the VMsafe APIs, the networking appliances I’ve seen so far (including the vShield Edge from VMware) rely on virtual machines to forward traffic between virtual (or physical) LANs.
Obviously the networking vendors have a very long way to go before reaching the true potential of virtualized networking.

                          Disponível em: http://searchnetworking.techtarget.com/tip/Virtual-network-appliances-Benefits-and- drawbacks
                                                                              Search Networking - Tech Target - Texto de Ivan Pepelnjak (Março de 2011)


O texto II faz um comentário sobre o uso de appliances de rede virtuais em “multi-tenant cloud”. Com base nesse comentário, é possível concluir que:
Alternativas
Respostas
6941: D
6942: A
6943: A
6944: C
6945: E
6946: D
6947: D
6948: B
6949: E
6950: A
6951: D
6952: E
6953: C
6954: E
6955: C
6956: C
6957: E
6958: E
6959: D
6960: A