Questões de Inglês para Concurso

Foram encontradas 10.776 questões

Q2906167 Inglês

Considere o texto a seguir:


We should point out here that the focal point of any operating system is its ‘kernel’. Without going into great detail, the kernel is what tells the big chip that controls your computer to do what you want the program that you’re using to do. To use a metaphor, if you go to your favorite Italian restaurant and order ‘Spaghetti alla Bolognese’, this dish is like your operating system. There are a lot of things that go into making that dish like pasta, tomato sauce, meatballs and cheese. Well, the kernel is like the pasta. Without pasta, that dish doesn’t exist. You might as well find some bread and make a sandwich. A plate of just pasta is fairly unappetizing.

Without a kernel, an operating system doesn’t exist. Without programs, a kernel is useless.


(Extraído de: Beginners Level Course: What is Linux? linux.org.

http://www.linux.org/threads/what-is-linux.4076/)

Segundo o texto, pode-se interpretar que

Alternativas
Q2906165 Inglês

O texto a seguir deve ser utilizado para responder às questões de números 21 a 23.


Historically, information security has been called a number of different things such as:

• Data security;

• IT Security;

• Computer security.

But these terms (except possibly data security) ignore the fact that the information that is held on the computers is almost always and most certainly worth many times more than the computers that it runs on. The correct term is ‘information security’ and typically information security comprises three component parts:

• Confidentiality. Assurance that information is shared only among authorised persons or organisations. Breaches of confidentiality can occur when data is not handled in a manner appropriate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc.;

• Integrity. Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term ‘integrity’ is used frequently when considering information security as it represents one of the primary indicators of information security (or lack of it). The integrity of data is not only whether the data is ‘correct’, but whether it can be trusted and relied upon;

• Availability. Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.


(Extraído de: “An Introduction to Information, Network and Internet Security.

What is ‘Information Security’?” The Security Practitioner

http://security.practitioner.com/introduction/infosec_2.htm)

Os sinônimos para o termo “assurance”, dentro do contexto, são:

Alternativas
Q2906164 Inglês

O texto a seguir deve ser utilizado para responder às questões de números 21 a 23.


Historically, information security has been called a number of different things such as:

• Data security;

• IT Security;

• Computer security.

But these terms (except possibly data security) ignore the fact that the information that is held on the computers is almost always and most certainly worth many times more than the computers that it runs on. The correct term is ‘information security’ and typically information security comprises three component parts:

• Confidentiality. Assurance that information is shared only among authorised persons or organisations. Breaches of confidentiality can occur when data is not handled in a manner appropriate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc.;

• Integrity. Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term ‘integrity’ is used frequently when considering information security as it represents one of the primary indicators of information security (or lack of it). The integrity of data is not only whether the data is ‘correct’, but whether it can be trusted and relied upon;

• Availability. Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.


(Extraído de: “An Introduction to Information, Network and Internet Security.

What is ‘Information Security’?” The Security Practitioner

http://security.practitioner.com/introduction/infosec_2.htm)

Segundo o texto, quando os dados não são tratados de forma adequada para salvaguardar a confidencialidade da informação de interesse, pode ocorrer

Alternativas
Q2906161 Inglês

O texto a seguir deve ser utilizado para responder às questões de números 21 a 23.


Historically, information security has been called a number of different things such as:

• Data security;

• IT Security;

• Computer security.

But these terms (except possibly data security) ignore the fact that the information that is held on the computers is almost always and most certainly worth many times more than the computers that it runs on. The correct term is ‘information security’ and typically information security comprises three component parts:

• Confidentiality. Assurance that information is shared only among authorised persons or organisations. Breaches of confidentiality can occur when data is not handled in a manner appropriate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc.;

• Integrity. Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term ‘integrity’ is used frequently when considering information security as it represents one of the primary indicators of information security (or lack of it). The integrity of data is not only whether the data is ‘correct’, but whether it can be trusted and relied upon;

• Availability. Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.


(Extraído de: “An Introduction to Information, Network and Internet Security.

What is ‘Information Security’?” The Security Practitioner

http://security.practitioner.com/introduction/infosec_2.htm)

A melhor tradução, dentro do contexto, para “information security comprises three component parts” é:

Alternativas
Q2800849 Inglês

A revolution in communication

When cell phones first became available in the 1980s, they were considered to be expensive playthings for business people. No one thought that they were going to change the world. People knew that the internet had the power to transform lives, but the expectation was that this would happen through the dissemination of personal computers. However, it is now predicted that by 2020, cell phones will have replaced laptops as the main point of access to the internet worldwide. So, why will more people be using cell phones than laptop computers in the future? One reason is that the price of even a fairly cheap laptop makes it inaccessible for a lot of people in developing countries. Computers rely on a regular power supply, which is a problem in many developing countries where outages are frequent, and internet connections unreliable. Cell phones, on the other hand, are cheap to buy (especially recycled ones), require little electricity for recharging, and have good access to the internet in most parts of the world via cell phone networks. It is therefore cell phones, rather than computers, which are revolutionizing life and communication in many developing countries.


How cell phones are transforming the developing world


NextDrop is an app which is now being used in rural parts of India. In many parts of the country, people rely on weekly or twice weekly deliveries of clean water. The problem is that villagers never know exactly when deliveries will take place, meaning that they waste time waiting by their village well for the water tanker to turn up. NextDrop is a simple app that sends automatic text messages to people notifying them when their next water delivery will be. It’s a simple idea which greatly improves people’s lives.


Transferring money between countries can be tricky, and this causes problems for the thousands of people who work abroad and need to send money to their families back home. A piece of software called Boom allows Mexicans who work in the US to send money back to family members in Mexico through their cell phones. Once the link is established and the software is installed on both phones, money can be transferred using a simple text message.


Cell phones are also bringing health benefits to developing countries. A project called TulaSalud in Guatemala uses cell phone technology to communicate with nurses in remote areas of the country, who are working to reduce the infant mortality rate. The software allows nurses access to their patients’ medical records wherever they are. The service provides free phone numbers that both nurses and patients can call to ask questions about health.


Maria Neander is a nurse who works on the TulaSalud project.


Before we had TulaSalud, patients’ medical records were only available........ the health center. When I went..........into the villages, I couldn’t take the records with me, so I didn’t know if a woman I was visiting had any health problems. Now I have all.........information I need.............my cell phone. It helps me monitor women during pregnancy, giving them a better chance of having a healthy baby. When I’m with a woman who is giving birth, I have phone numbers that I can use if there are any problems, so I can get help and advice about what to do. TulaSalud has definitely saved lives.

Study the following sentences.

1. ‘…they were considered to be expensive playthings for business people.’ The underlined words are being used in the past perfect.

2. The underlined words in the article: ‘they, them and their’ are examples of: a subject pronoun, an object pronoun and a possessive adjective.

3. The words in bold in: ” Cell phones are also bringing health benefits to developing countries.”, are examples of gerund forms.


Choose the alternative which presents the correct ones:

Alternativas
Respostas
21: B
22: A
23: E
24: C
25: E