Questões de Concurso
Sobre palavras conectivas | connective words em inglês
Foram encontradas 379 questões
Mining tourism in Ouro Preto
Ouro Preto is surrounded by a rich and varied natural environment with waterfalls, hiking trails and native vegetation partially protected as state parks. Parts of these resources are used for tourism. Paradoxically, this ecosystem contrasts with the human occupation of the region that produced, after centuries, a rich history and a cultural connection to mining, its oldest economic activity which triggered occupation. The region has an unlimited potential for tourism, especially in specific segments such as mining heritage tourism, in association or not with the existing ecotourism market. In fact, in Ouro Preto, tourism, history, geology and mining are often hard to distinguish; such is the inter-relationship between these segments.
For centuries, a major problem of mining has been the reuse of the affected areas. Modern mining projects proposed solutions to this problem right from the initial stages of operation, which did not happen until recently. As a result, most quarries and other old mining areas that do not have an appropriate destination represent serious environmental problems. Mining tourism utilizing exhausted mines is a source of employment and income. Tourism activities may even contribute to the recovery of degraded areas in various ways, such as reforestation for leisure purposes, or their transformation into history museums where aspects of local mining are interpreted.
Minas Gerais, and particularly Ouro Preto, provides the strong and rich cultural and historical content needed for the transformation of mining remnants into attractive tourism products, especially when combined with the existing cultural tourism of the region. Although mining tourism is explored in various parts of the world in extremely different social, economic, cultural and natural contexts, in Brazil it is still not a strategy readily adopted as an alternative for areas affected by mining activities.
(Lohmann, G. M.; Flecha, A. C.; Knupp, M. E. C. G.; Liccardo, A. (2011). Mining tourism in Ouro Preto, Brazil: opportunities and challenges. In: M. V. Conlin; L. Jolliffe (eds).Mining heritage and tourism: a global synthesis. New York: Routledge, pp. 194-202.)
“However" (l.5) can be replaced by nevertheless without it changing the meaning of the text.
Read text II and answer the question:
Read text II and answer the question:
Read text II and answer the question:
A design pattern is often posed as a question: how do we solve some design problem? However a design problem is, by its nature, nonspecific, and rarely has a single straight-forward answer. There might be several ways to solve the same problem, some better than others depending on the specific situation and the specific context of the problem. A design pattern is intended to share not just solutions but a better understanding of both the problem and how it might be solved. Firstly, patterns have a well-defined structure. This consistent layout makes it easy to browse through a collection of patterns to find relevant help and then dive further into the material. The structure encourages the author of the pattern to think carefully about the knowledge they're sharing, whilst making the material more consistently accessible to a reader.
(http://www.cambridgesemantics.com/semantic-university/semantic-web-design-patterns)
Na frase: “However a design problem is, by its nature, nonspecific…”, a palavra sublinhada pode ser substituída sem a perda do significado original da frase por:
Smart Greenhouse
Control the light, watering, temperature, and humidity of your greenhouse – automatically.
Kevin Farnham
Smart Greenhouse, one of three professional category winner in the 2014 IoT Developer Challenge, is an Internet of Things (IoT) device and application that monitors and controls a greenhouse environment. The concept for Smart Greenhouse came into being after the core team – Dzmitry Yasevich, Pavel Vervenko, and Vladimir Redzhepov – attended JavaOne Russia in April 2013. There, the team saw presentations of a smart house, various robots, and other devices, all controlled by Java.
Yasevich notes, “We were impressed by these solutions and had an idea to do something like that. Pavel Vervenko suggested making an automated greenhouse. Everyone liked the idea!”.
First, the team selected the hardware. “We started to use Raspberry Pi as a basis”, Yasevich says. “It is a compact but fullfedged computer with 700 MHz and memory at 512 MB. This system costs around $35”.
However, early on, a safety concern arose. “Current under high voltage passes in the greenhouse, and there is an automatic watering system, so it was necessary to properly consider all the aspects related to insulation”, Yasevich says.
(http://www.oraclejavamagazine-digital.com/8ef38d6e6f63e8971b9487ddb4bd4bdc/558dae0a/pp/javamagazine20150304-1429053481000c51ce41 0c1-pp.pdf?lm=1429053481000)
Internet: <www.scielo.br> (adapted).
The word “throughout"(L.20) means all through.
Internet: <coursel .winona.edu> (adapted).
Judge the following item, according to the text.
The word “thus” (L.18) means in this manner.
Internet: <www.msnbc.msn.com> (adapted).
Judge the following item, according to the text.
The word “ Instead” (L.20) expresses the idea of addition.
Internet: <www.msnbc.msn.com> (adapted).
Judge the following item, according to the text.
The conjunction “but” (L.5) expresses the idea of contrast.
Saint Patrick's Day, also known as The Feast of Saint Patrick, is a traditional holiday celebrated every year on March 17th, the day the patron saint of Ireland, Saint Patrick, died.
Patrick, who was born in the fourth century, lived in the British Isles, a land that had been invaded and conquered first by the Romans and then by Germanic tribes. At the age of 16, Patrick was captured and taken as a slave from the British Isles to what is now Ireland. He lived there for several years herding sheep. He was a religious boy, and he prayed that he would someday return to his homeland.
Legend has it that one night while he was praying, a voice told him to escape from the farm, and find a ship that was waiting for him in a harbor two hundred miles aways. Patrick got to the ship, sailed to Europe, and disembarked in what is now probably France. He ---1--- several of the ship's crew through a dangerous forest, praying all the time. Neither Patrick nor any member of his crew was captured. When some of the men were about to die of starvation, wild animals appeared to them to eat. Events such as these appeared to be miracles and gave rise to later legends surrounding Patrick.
Finally finding his way home, Patrick felt that he was called by God to perform an important mission. He believed it was his duty to go back to Ireland and convert the Celtic people to the Christian Religion.
Patrick arrived in England and became a missionary, traveling from village to village and talking about his faith. Once, several members of a tribe approached Patrick and told him that they found it difficult to understand and believe in the Holy Trinity. Patrick thought a moment, then stooped down and picked one of the plentiful shamrocks growing wild around Ireland. “Here are three leaves", he said, “yet it is one plant. Imagine the Father, Son and the Holy Spirit as each of these leaves. Here they are, yet they are one plant." The tribesmen understood, because Patrick had used a familiar object to explain. From that time on, the shamrock has been a revered symbol of Ireland.
There are lots of stories about Patrick. One of them is about him forcing snakes out of the entire country of Ireland. Even though there are many different stories about how he accomplished such a task, it is probably not true. Patrick died on March 17th, and the Irish people set aside the day to mourn. He became the patron saint of Ireland. Mourning turned to commemorating him and celebrating his life.
Because of Saint Patrick, lots of cities around the world with a large population of Irish have parades. Green is one of the national colors of Ireland. Green stripes are painted on the streets where the parade will travel. People wear green shirts, ties, hair ribbons, and hats. There are even pubs which serve green beer on that day.
Saint Patrick's Day was made an official Christian holiday in the early seventeenth century. It is now observed by the Catholic Church, the Anglican Communion, the Eastern Orthodox Church and Lutheran Church. The day commemorates Saint Patrick and the arrival of Christianity in Ireland. Not only that, but it also celebrates the heritage and culture of the Irish in general.
Source: adapted from http://www.inglesnapontadalingua.com.br/2014/03
Consider the suggestions of word replacement in the text:
I. ‘Yet’ (l.05) could be replaced by ‘Nevertheless’.
II. ‘even though’ (l.25) could be replaced by ‘besides’.
III. ‘Also’ (l.40) could be replaced by ‘Furthermore’.
Which ones DO NOT cause difference in meaning?
Self-repairing software tackles malware
University of Utah computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer
again.
A3 is a software suite that works with a virtual machine - a virtual computer that emulates the operations of a computer without dedicated hardware. The A3 software is designed to watch over the virtual machine's operating system and applications, says Eric Eide, University of Utah research assistant professor of computer science leading the university's A3 team with U computer science associate professor John Regehr. A3 is designed to protect servers or similar business-grade computers that run on the Linux operating system. It also has been demonstrated to protect military applications.
The new software called A3, or Advanced Adaptive Applications, was co-developed by Massachusetts-based defense contractor, Raytheon BBN. The four-year project was completed in late September.
There are no plans to adapt A3 for home computers or laptops, but Eide says this could be possible in the future.
"A3 technologies could find their way into consumer products someday, which would help consumer devices protect themselves against fast-spreading malware or internal corruption of software components. But we haven't tried those experiments yet," he says.
Unlike a normal virus scanner on consumer PCs that compares a catalog of known viruses to something that has infected the computer, A3 can detect new, unknown viruses or malware automatically by sensing that something is occurring in the computer's operation that is not correct. It then can stop the virus, approximate a repair for the damaged software code, and then learn to never let that bug enter the machine gain.
While the military has an interest in A3 to enhance cybersecurity for its mission-critical systems, A3 also potentially could be used in the consumer space, such as in web services like Amazon. If a virus or attack stops the service, A3 could repair it in minutes without having to take the servers down.
Source: http://www.sciencedaily.com
"[...]computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them".
The words underlined express a meaning of:
“Dear Robert,
I can’t believe I have found your email address, because I thought I’d lost it! It’s been so long we haven’t talked, I feel I have so much to tell you. Do you remember Alex from our high school class? We got married! And we’ve been married for about six years. We have two kids, Lily and Oliver. They’re so lovely! Lily is five and Oliver is two. We moved from Florida right after we had Lily for Alex got a nice job as a chief engineer of a car factory in Chicago and we’ve been living here since then. Chicago is an incredible city. There are many shopping centers, parks, libraries and the nightlife is pretty fun. Of course, after having two kids, Alex and I don’t have plenty of time to go out at night, but we do catch a movie every once in a while, we just have to find a babysitter! I’m still working as a teacher in a primary school very close to our neighborhood. I work in the afternoons and it gives me the opportunity to see the kids in the morning and at night. Alex usually works all day, yet he gets home before I do, so that when I arrive the kids have already taken their showers and are finishing their supper. It’s very rewarding to be a mom, even though I may get worn out at times. So, I heard you run a taco place in central Florida, is that right? Me and my husband love Mexican food and we’re planning on visiting our parents in the city on Thanksgiving. Maybe we could stop by your business and grab a taco! Well, Oliver has just woken up from his afternoon nap and is calling for me! I’m looking forward to hearing from you soon!
Love,
Lucy”
De acordo com o texto acima, as expressões destacadas for, every once in a while e yet podem ser substituídas, sem prejuízo de sentido, respectivamente, por
E-mail Spoofing
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. However, spoofing anyone other than yourself is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail
server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that
appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Although most spoofed e-mail falls into the “nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information – any of which can be used for a variety of criminal purposes. One type of e-mail spoofing, self- sending spam, involves messages that appear to be both to and from the recipient.
(http://searchsecurity.techtarget.com/definition/em.... Adaptado)