Questões de Concurso Sobre interpretação de texto | reading comprehension em inglês

Foram encontradas 9.532 questões

Q45356 Inglês

This text could best be characterized as
Alternativas
Q43729 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

children's relatives are supposed to judge whether the sites to be visited by their sons and daughters are proper for them to see.
Alternativas
Q43728 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

grown-up people are entitled to decide what choices to make as far as filtering is concerned.
Alternativas
Q43727 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

filtering software is used so as to make sure that improper sites won't be accessed.
Alternativas
Q43726 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

any individuals regardless of their ages can get into contact with valuable materials.
Alternativas
Q43725 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

through the Internet people can get information about wealthy materials.
Alternativas
Q43308 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
The plan is supposed to include the likelihood of failure, its results and the actions to be taken to contain development risk.
Alternativas
Q43307 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
In a lot of projects, it is hoped that the plan should be able to spot specific risky areas.
Alternativas
Q43305 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
Large projects demand patient learning to go through it.
Alternativas
Q43304 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
The reviewers must read and rewrite the material while being present in the meetings.
Alternativas
Q42866 Inglês
Title:_____________
January 26, 2009
By John C. Dvorak

It's no coincidence that the computer industry peaked around the year 2000, went into a serious decline, stabilized at the low point a couple of years ago, and has since collapsed again.
A confluence of reasons is responsible for this, but when it comes to the industry bringing this on itself, one major event may have taken down the entire business.
I'm speaking about the announcement of the Itanium processor. This continues to be one of the great fiascos of the last 50 years, and not because Intel blew too much money on its development or that the chip performed poorly and will never be widely adopted. It was the reaction and subsequent consolidation in the industry that took place once this grandiose chip was preannounced.
We heard that HP, IBM, Dell, and even Sun Microsystems would use these chips and discontinue anything else they were developing. This included Sun making noise about dropping the SPARC chip for this thing - sight unseen. I say "sight unseen" because it would be years before the chip was even prototyped. The entire industry just took Intel at its word that Itanium would work as advertised in a PowerPoint presentation.
Because this chip was supposed to radically change the way computers work and become the driving force behind all systems in the future, one promising project after another was dropped. Why? Because Itanium was the future for all computing. Why bother wasting money on good ideas that didn't include it?
The failure of this chip to do anything more than exist as a niche processor sealed the fate of Intel - and perhaps the entire industry, since from 1997 to 2001 everyone waited for the messiah of chips to take us all to the next level.
It did that all right. It took us to the next level. But we didn't know that the next level was below us, not above.


(Adapted from PCMAG.COM)

No texto, a expressão it would be years before the chip was even prototyped significa que
Alternativas
Q42865 Inglês
Title:_____________
January 26, 2009
By John C. Dvorak

It's no coincidence that the computer industry peaked around the year 2000, went into a serious decline, stabilized at the low point a couple of years ago, and has since collapsed again.
A confluence of reasons is responsible for this, but when it comes to the industry bringing this on itself, one major event may have taken down the entire business.
I'm speaking about the announcement of the Itanium processor. This continues to be one of the great fiascos of the last 50 years, and not because Intel blew too much money on its development or that the chip performed poorly and will never be widely adopted. It was the reaction and subsequent consolidation in the industry that took place once this grandiose chip was preannounced.
We heard that HP, IBM, Dell, and even Sun Microsystems would use these chips and discontinue anything else they were developing. This included Sun making noise about dropping the SPARC chip for this thing - sight unseen. I say "sight unseen" because it would be years before the chip was even prototyped. The entire industry just took Intel at its word that Itanium would work as advertised in a PowerPoint presentation.
Because this chip was supposed to radically change the way computers work and become the driving force behind all systems in the future, one promising project after another was dropped. Why? Because Itanium was the future for all computing. Why bother wasting money on good ideas that didn't include it?
The failure of this chip to do anything more than exist as a niche processor sealed the fate of Intel - and perhaps the entire industry, since from 1997 to 2001 everyone waited for the messiah of chips to take us all to the next level.
It did that all right. It took us to the next level. But we didn't know that the next level was below us, not above.


(Adapted from PCMAG.COM)

Segundo o autor do texto, a razão principal do fiasco do processador de Itanium deve-se a fato de
Alternativas
Q42864 Inglês
Title:_____________
January 26, 2009
By John C. Dvorak

It's no coincidence that the computer industry peaked around the year 2000, went into a serious decline, stabilized at the low point a couple of years ago, and has since collapsed again.
A confluence of reasons is responsible for this, but when it comes to the industry bringing this on itself, one major event may have taken down the entire business.
I'm speaking about the announcement of the Itanium processor. This continues to be one of the great fiascos of the last 50 years, and not because Intel blew too much money on its development or that the chip performed poorly and will never be widely adopted. It was the reaction and subsequent consolidation in the industry that took place once this grandiose chip was preannounced.
We heard that HP, IBM, Dell, and even Sun Microsystems would use these chips and discontinue anything else they were developing. This included Sun making noise about dropping the SPARC chip for this thing - sight unseen. I say "sight unseen" because it would be years before the chip was even prototyped. The entire industry just took Intel at its word that Itanium would work as advertised in a PowerPoint presentation.
Because this chip was supposed to radically change the way computers work and become the driving force behind all systems in the future, one promising project after another was dropped. Why? Because Itanium was the future for all computing. Why bother wasting money on good ideas that didn't include it?
The failure of this chip to do anything more than exist as a niche processor sealed the fate of Intel - and perhaps the entire industry, since from 1997 to 2001 everyone waited for the messiah of chips to take us all to the next level.
It did that all right. It took us to the next level. But we didn't know that the next level was below us, not above.


(Adapted from PCMAG.COM)

One could summarize the first paragraph by saying that the computer industry
Alternativas
Q42863 Inglês
Title:_____________
January 26, 2009
By John C. Dvorak

It's no coincidence that the computer industry peaked around the year 2000, went into a serious decline, stabilized at the low point a couple of years ago, and has since collapsed again.
A confluence of reasons is responsible for this, but when it comes to the industry bringing this on itself, one major event may have taken down the entire business.
I'm speaking about the announcement of the Itanium processor. This continues to be one of the great fiascos of the last 50 years, and not because Intel blew too much money on its development or that the chip performed poorly and will never be widely adopted. It was the reaction and subsequent consolidation in the industry that took place once this grandiose chip was preannounced.
We heard that HP, IBM, Dell, and even Sun Microsystems would use these chips and discontinue anything else they were developing. This included Sun making noise about dropping the SPARC chip for this thing - sight unseen. I say "sight unseen" because it would be years before the chip was even prototyped. The entire industry just took Intel at its word that Itanium would work as advertised in a PowerPoint presentation.
Because this chip was supposed to radically change the way computers work and become the driving force behind all systems in the future, one promising project after another was dropped. Why? Because Itanium was the future for all computing. Why bother wasting money on good ideas that didn't include it?
The failure of this chip to do anything more than exist as a niche processor sealed the fate of Intel - and perhaps the entire industry, since from 1997 to 2001 everyone waited for the messiah of chips to take us all to the next level.
It did that all right. It took us to the next level. But we didn't know that the next level was below us, not above.


(Adapted from PCMAG.COM)

Um título adequado para o texto acima seria
Alternativas
Q42862 Inglês
January 23, 2009
Worm Infects Millions of Computers Worldwide
By JOHN MARKOFF

A new digital plague has hit the Internet, infecting millions of personal and usiness computers in what seems to be the first step of a multistage attack. The world's eading computer security experts do not yet know who programmed the infection, or what the next stage will be.
In recent weeks a worm, a malicious software program, has swept through corporate, educational and public computer networks around the world. Known as Conficker or Downandup, it is spread by a recently discovered Microsoft Windows vulnerability, by guessing network passwords and by hand-carried consumer gadgets like USB keys.
Experts say it is the 
infection since the Slammer worm exploded through the Internet in January 2003, and it may have infected as many as nine million personal computers around the world.
Worms like Conficker not only ricochet around the Internet at lightning speed, they harness infected computers into unified systems called botnets, which can then accept programming instructions from their clandestine masters.
Many computer users may not notice that their machines have been infected, and computer security researchers said they were waiting for the instructions to materialize, to determine what impact the botnet will have on PC users. It might operate in the background, using the infected computer to send spam or infect other computers, or it might steal the PC user's personal information.
Microsoft rushed an emergency patch to defend the Windows operating systems against this vulnerability in October, yet the worm has continued to spread even as the level of warnings has grown in recent weeks.
Earlier this week, security researchers at Qualys, a Silicon Valley security firm, estimated that about 30 percent of Windows-based computers attached to the Internet remain vulnerable to infection because they have not been updated with the patch, despite the fact that it was made available in October.
Unraveling the program has been particularly challenging because it comes with encryption mechanisms that hide its internal workings from those seeking to disable it.
The program uses an elaborate shell-game-style technique to permit someone to command it remotely. Each day it generates a new list of 250 domain names. Instructions from any one of these domain names would be obeyed. To control the botnet, an attacker would need only to register a single domain to send instructions to the botnet globally, greatly complicating the task of law enforcement and security companies trying to intervene and block the activation of the botnet.
Several computer security firms said that although Conficker appeared to have been written from scratch, it had parallels to the work of a suspected Eastern European criminal gang that has profited by sending programs known as "scareware" to personal computers that seem to warn users of an infection and ask for credit card numbers to pay for bogus antivirus software that actually further infects their computer.
One intriguing clue left by the malware authors is that the first version of the program checked to see if the computer had a Ukrainian keyboard layout. If it found it had such a keyboard, it would not infect the machine, according to Phillip Porras, a security investigator at SRI International who has disassembled the program to determine how it functioned.


(Adapted from The New York Times)
Segundo o texto,
Alternativas
Q42861 Inglês
January 23, 2009
Worm Infects Millions of Computers Worldwide
By JOHN MARKOFF

A new digital plague has hit the Internet, infecting millions of personal and usiness computers in what seems to be the first step of a multistage attack. The world's eading computer security experts do not yet know who programmed the infection, or what the next stage will be.
In recent weeks a worm, a malicious software program, has swept through corporate, educational and public computer networks around the world. Known as Conficker or Downandup, it is spread by a recently discovered Microsoft Windows vulnerability, by guessing network passwords and by hand-carried consumer gadgets like USB keys.
Experts say it is the 
infection since the Slammer worm exploded through the Internet in January 2003, and it may have infected as many as nine million personal computers around the world.
Worms like Conficker not only ricochet around the Internet at lightning speed, they harness infected computers into unified systems called botnets, which can then accept programming instructions from their clandestine masters.
Many computer users may not notice that their machines have been infected, and computer security researchers said they were waiting for the instructions to materialize, to determine what impact the botnet will have on PC users. It might operate in the background, using the infected computer to send spam or infect other computers, or it might steal the PC user's personal information.
Microsoft rushed an emergency patch to defend the Windows operating systems against this vulnerability in October, yet the worm has continued to spread even as the level of warnings has grown in recent weeks.
Earlier this week, security researchers at Qualys, a Silicon Valley security firm, estimated that about 30 percent of Windows-based computers attached to the Internet remain vulnerable to infection because they have not been updated with the patch, despite the fact that it was made available in October.
Unraveling the program has been particularly challenging because it comes with encryption mechanisms that hide its internal workings from those seeking to disable it.
The program uses an elaborate shell-game-style technique to permit someone to command it remotely. Each day it generates a new list of 250 domain names. Instructions from any one of these domain names would be obeyed. To control the botnet, an attacker would need only to register a single domain to send instructions to the botnet globally, greatly complicating the task of law enforcement and security companies trying to intervene and block the activation of the botnet.
Several computer security firms said that although Conficker appeared to have been written from scratch, it had parallels to the work of a suspected Eastern European criminal gang that has profited by sending programs known as "scareware" to personal computers that seem to warn users of an infection and ask for credit card numbers to pay for bogus antivirus software that actually further infects their computer.
One intriguing clue left by the malware authors is that the first version of the program checked to see if the computer had a Ukrainian keyboard layout. If it found it had such a keyboard, it would not infect the machine, according to Phillip Porras, a security investigator at SRI International who has disassembled the program to determine how it functioned.


(Adapted from The New York Times)
O Conficker, segundo o texto,
Alternativas
Q42860 Inglês
January 23, 2009
Worm Infects Millions of Computers Worldwide
By JOHN MARKOFF

A new digital plague has hit the Internet, infecting millions of personal and usiness computers in what seems to be the first step of a multistage attack. The world's eading computer security experts do not yet know who programmed the infection, or what the next stage will be.
In recent weeks a worm, a malicious software program, has swept through corporate, educational and public computer networks around the world. Known as Conficker or Downandup, it is spread by a recently discovered Microsoft Windows vulnerability, by guessing network passwords and by hand-carried consumer gadgets like USB keys.
Experts say it is the 
infection since the Slammer worm exploded through the Internet in January 2003, and it may have infected as many as nine million personal computers around the world.
Worms like Conficker not only ricochet around the Internet at lightning speed, they harness infected computers into unified systems called botnets, which can then accept programming instructions from their clandestine masters.
Many computer users may not notice that their machines have been infected, and computer security researchers said they were waiting for the instructions to materialize, to determine what impact the botnet will have on PC users. It might operate in the background, using the infected computer to send spam or infect other computers, or it might steal the PC user's personal information.
Microsoft rushed an emergency patch to defend the Windows operating systems against this vulnerability in October, yet the worm has continued to spread even as the level of warnings has grown in recent weeks.
Earlier this week, security researchers at Qualys, a Silicon Valley security firm, estimated that about 30 percent of Windows-based computers attached to the Internet remain vulnerable to infection because they have not been updated with the patch, despite the fact that it was made available in October.
Unraveling the program has been particularly challenging because it comes with encryption mechanisms that hide its internal workings from those seeking to disable it.
The program uses an elaborate shell-game-style technique to permit someone to command it remotely. Each day it generates a new list of 250 domain names. Instructions from any one of these domain names would be obeyed. To control the botnet, an attacker would need only to register a single domain to send instructions to the botnet globally, greatly complicating the task of law enforcement and security companies trying to intervene and block the activation of the botnet.
Several computer security firms said that although Conficker appeared to have been written from scratch, it had parallels to the work of a suspected Eastern European criminal gang that has profited by sending programs known as "scareware" to personal computers that seem to warn users of an infection and ask for credit card numbers to pay for bogus antivirus software that actually further infects their computer.
One intriguing clue left by the malware authors is that the first version of the program checked to see if the computer had a Ukrainian keyboard layout. If it found it had such a keyboard, it would not infect the machine, according to Phillip Porras, a security investigator at SRI International who has disassembled the program to determine how it functioned.


(Adapted from The New York Times)
Segundo o texto, sabe-se que o Conficker
Alternativas
Q42858 Inglês
January 23, 2009
Worm Infects Millions of Computers Worldwide
By JOHN MARKOFF

A new digital plague has hit the Internet, infecting millions of personal and usiness computers in what seems to be the first step of a multistage attack. The world's eading computer security experts do not yet know who programmed the infection, or what the next stage will be.
In recent weeks a worm, a malicious software program, has swept through corporate, educational and public computer networks around the world. Known as Conficker or Downandup, it is spread by a recently discovered Microsoft Windows vulnerability, by guessing network passwords and by hand-carried consumer gadgets like USB keys.
Experts say it is the 
infection since the Slammer worm exploded through the Internet in January 2003, and it may have infected as many as nine million personal computers around the world.
Worms like Conficker not only ricochet around the Internet at lightning speed, they harness infected computers into unified systems called botnets, which can then accept programming instructions from their clandestine masters.
Many computer users may not notice that their machines have been infected, and computer security researchers said they were waiting for the instructions to materialize, to determine what impact the botnet will have on PC users. It might operate in the background, using the infected computer to send spam or infect other computers, or it might steal the PC user's personal information.
Microsoft rushed an emergency patch to defend the Windows operating systems against this vulnerability in October, yet the worm has continued to spread even as the level of warnings has grown in recent weeks.
Earlier this week, security researchers at Qualys, a Silicon Valley security firm, estimated that about 30 percent of Windows-based computers attached to the Internet remain vulnerable to infection because they have not been updated with the patch, despite the fact that it was made available in October.
Unraveling the program has been particularly challenging because it comes with encryption mechanisms that hide its internal workings from those seeking to disable it.
The program uses an elaborate shell-game-style technique to permit someone to command it remotely. Each day it generates a new list of 250 domain names. Instructions from any one of these domain names would be obeyed. To control the botnet, an attacker would need only to register a single domain to send instructions to the botnet globally, greatly complicating the task of law enforcement and security companies trying to intervene and block the activation of the botnet.
Several computer security firms said that although Conficker appeared to have been written from scratch, it had parallels to the work of a suspected Eastern European criminal gang that has profited by sending programs known as "scareware" to personal computers that seem to warn users of an infection and ask for credit card numbers to pay for bogus antivirus software that actually further infects their computer.
One intriguing clue left by the malware authors is that the first version of the program checked to see if the computer had a Ukrainian keyboard layout. If it found it had such a keyboard, it would not infect the machine, according to Phillip Porras, a security investigator at SRI International who has disassembled the program to determine how it functioned.


(Adapted from The New York Times)
De acordo com o texto,
Alternativas
Q42040 Inglês
Imagem 009.jpg
Based on the text above, judge the following items.
Cocaine and military explosives remain for a longer time in one's finger tips.
Alternativas
Q42039 Inglês
Imagem 009.jpg
Based on the text above, judge the following items.
Cooks explained that, as cocaine and military explosives are likely to be difficult to be taken off, traces of them can be detected in a file or plastic binder if touched by someone who used them.
Alternativas
Respostas
8921: D
8922: E
8923: C
8924: E
8925: C
8926: E
8927: C
8928: E
8929: C
8930: E
8931: C
8932: A
8933: B
8934: E
8935: D
8936: D
8937: B
8938: A
8939: E
8940: C