Questões de Concurso Sobre inglês

Foram encontradas 17.407 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q1902716 Inglês

    Leaders at tech companies around the world could face up to two years in prison in the United Kingdom if they do not comply with new online safety laws.

    Draft legislation aims to crack down on social media and other online entities to ensure safety and privacy for users, particularly children. The laws were drafted to prevent uploading and spreading of harmful content such as racism, bullying, fraud and sexual abuse.

     While the legislation has been criticized by Parliament members in the past, the new draft has received bipartisan support.

     The bill has to be voted on by British lawmakers.

   The legislation has been updated several times since its inception. Among the changes are hefty fines or blockages if networks fail to remove harmful content after being notified of its existence, as well as the labeling of sending unsolicited nudes as a criminal offense.

    The fines could be up to 10 percent of the affected company’s annual global income. The Office of Communications (Ofcom), the bill’s regulator, has been granted legal grounds to request information from companies they suspect of not following the bill’s rules.

     If Ofcom is able to prove that the companies withheld information or have not responded properly to notifications of inappropriate or illegal content, the executives would be held criminally liable. This part of the law will be enforced two months after the law itself is enacted, meaning companies and websites will have time to crack down on their content before facing legal consequences.

    Some U.K. residents have pushed back against the new version of the bill, including memes from the Open Rights Group. The organization claims that, despite good intentions, the regulations could result in a slippery slope that could end up violating free speech.


Internet: <www.newsweek.com> (adapted)

Considering the text presented above and the vocabulary used in it, judge the following item. 


Lawmakers have always been supportive of the online safety legislation.

Alternativas
Q1902715 Inglês

    Leaders at tech companies around the world could face up to two years in prison in the United Kingdom if they do not comply with new online safety laws.

    Draft legislation aims to crack down on social media and other online entities to ensure safety and privacy for users, particularly children. The laws were drafted to prevent uploading and spreading of harmful content such as racism, bullying, fraud and sexual abuse.

     While the legislation has been criticized by Parliament members in the past, the new draft has received bipartisan support.

     The bill has to be voted on by British lawmakers.

   The legislation has been updated several times since its inception. Among the changes are hefty fines or blockages if networks fail to remove harmful content after being notified of its existence, as well as the labeling of sending unsolicited nudes as a criminal offense.

    The fines could be up to 10 percent of the affected company’s annual global income. The Office of Communications (Ofcom), the bill’s regulator, has been granted legal grounds to request information from companies they suspect of not following the bill’s rules.

     If Ofcom is able to prove that the companies withheld information or have not responded properly to notifications of inappropriate or illegal content, the executives would be held criminally liable. This part of the law will be enforced two months after the law itself is enacted, meaning companies and websites will have time to crack down on their content before facing legal consequences.

    Some U.K. residents have pushed back against the new version of the bill, including memes from the Open Rights Group. The organization claims that, despite good intentions, the regulations could result in a slippery slope that could end up violating free speech.


Internet: <www.newsweek.com> (adapted)

Considering the text presented above and the vocabulary used in it, judge the following item. 


One of the objectives of the new legislation is to cease social media operations. 

Alternativas
Q1902714 Inglês

    Leaders at tech companies around the world could face up to two years in prison in the United Kingdom if they do not comply with new online safety laws.

    Draft legislation aims to crack down on social media and other online entities to ensure safety and privacy for users, particularly children. The laws were drafted to prevent uploading and spreading of harmful content such as racism, bullying, fraud and sexual abuse.

     While the legislation has been criticized by Parliament members in the past, the new draft has received bipartisan support.

     The bill has to be voted on by British lawmakers.

   The legislation has been updated several times since its inception. Among the changes are hefty fines or blockages if networks fail to remove harmful content after being notified of its existence, as well as the labeling of sending unsolicited nudes as a criminal offense.

    The fines could be up to 10 percent of the affected company’s annual global income. The Office of Communications (Ofcom), the bill’s regulator, has been granted legal grounds to request information from companies they suspect of not following the bill’s rules.

     If Ofcom is able to prove that the companies withheld information or have not responded properly to notifications of inappropriate or illegal content, the executives would be held criminally liable. This part of the law will be enforced two months after the law itself is enacted, meaning companies and websites will have time to crack down on their content before facing legal consequences.

    Some U.K. residents have pushed back against the new version of the bill, including memes from the Open Rights Group. The organization claims that, despite good intentions, the regulations could result in a slippery slope that could end up violating free speech.


Internet: <www.newsweek.com> (adapted)

Considering the text presented above and the vocabulary used in it, judge the following item. 


New online safety laws in the United Kingdom could send tech company leaders to jail. 

Alternativas
Q1902713 Inglês
    Information technology (IT) serves a critical role in state operations. State agencies and higher education institutions are increasingly reliant on the automated processing of information. It is important that the IT applications that process information have controls to ensure and protect the accuracy, integrity, reliability, and confidentiality of the State’s information.
     Due to the increased reliance on IT applications, a significant portion of the audits the State Auditor’s Office (SAO) performs include an IT component. Auditors select IT controls for testing during an audit based on a risk assessment. The risk assessment considers, among other factors, the objectives and scope of the audit. Therefore, the SAO does not test all IT controls in every audit, with the high-risk and high-impact IT controls being tested more frequently. In addition, to minimize security risks, the SAO does not publicly report sensitive IT audit issues, in accordance with the Texas Government Code, Section 552.139.

Texas state auditor’s office report. Internet: <sao.texas.gov>  (adapted).

Judge the following item considering the text above and the vocabulary used in it.


The word “Therefore” (in the fourth sentence of the second paragraph) could be correctly replaced by Henceforth without any change in the meaning of the text. 

Alternativas
Q1902712 Inglês
    Information technology (IT) serves a critical role in state operations. State agencies and higher education institutions are increasingly reliant on the automated processing of information. It is important that the IT applications that process information have controls to ensure and protect the accuracy, integrity, reliability, and confidentiality of the State’s information.
     Due to the increased reliance on IT applications, a significant portion of the audits the State Auditor’s Office (SAO) performs include an IT component. Auditors select IT controls for testing during an audit based on a risk assessment. The risk assessment considers, among other factors, the objectives and scope of the audit. Therefore, the SAO does not test all IT controls in every audit, with the high-risk and high-impact IT controls being tested more frequently. In addition, to minimize security risks, the SAO does not publicly report sensitive IT audit issues, in accordance with the Texas Government Code, Section 552.139.

Texas state auditor’s office report. Internet: <sao.texas.gov>  (adapted).

Judge the following item considering the text above and the vocabulary used in it.


In the second paragraph, the word “audit” is synonymous with audition.

Alternativas
Q1902711 Inglês
    Information technology (IT) serves a critical role in state operations. State agencies and higher education institutions are increasingly reliant on the automated processing of information. It is important that the IT applications that process information have controls to ensure and protect the accuracy, integrity, reliability, and confidentiality of the State’s information.
     Due to the increased reliance on IT applications, a significant portion of the audits the State Auditor’s Office (SAO) performs include an IT component. Auditors select IT controls for testing during an audit based on a risk assessment. The risk assessment considers, among other factors, the objectives and scope of the audit. Therefore, the SAO does not test all IT controls in every audit, with the high-risk and high-impact IT controls being tested more frequently. In addition, to minimize security risks, the SAO does not publicly report sensitive IT audit issues, in accordance with the Texas Government Code, Section 552.139.

Texas state auditor’s office report. Internet: <sao.texas.gov>  (adapted).

Judge the following item considering the text above and the vocabulary used in it.


The word “reliant” (in the second sentence of the first paragraph) could be correctly replaced by dependent without any change in the meaning of the text.

Alternativas
Q1902710 Inglês
    Information technology (IT) serves a critical role in state operations. State agencies and higher education institutions are increasingly reliant on the automated processing of information. It is important that the IT applications that process information have controls to ensure and protect the accuracy, integrity, reliability, and confidentiality of the State’s information.
     Due to the increased reliance on IT applications, a significant portion of the audits the State Auditor’s Office (SAO) performs include an IT component. Auditors select IT controls for testing during an audit based on a risk assessment. The risk assessment considers, among other factors, the objectives and scope of the audit. Therefore, the SAO does not test all IT controls in every audit, with the high-risk and high-impact IT controls being tested more frequently. In addition, to minimize security risks, the SAO does not publicly report sensitive IT audit issues, in accordance with the Texas Government Code, Section 552.139.

Texas state auditor’s office report. Internet: <sao.texas.gov>  (adapted).

Judge the following item considering the text above and the vocabulary used in it.


The word state has the same meaning in the first and in the second sentences of the first paragraph.

Alternativas
Q1902709 Inglês
    Information technology (IT) serves a critical role in state operations. State agencies and higher education institutions are increasingly reliant on the automated processing of information. It is important that the IT applications that process information have controls to ensure and protect the accuracy, integrity, reliability, and confidentiality of the State’s information.
     Due to the increased reliance on IT applications, a significant portion of the audits the State Auditor’s Office (SAO) performs include an IT component. Auditors select IT controls for testing during an audit based on a risk assessment. The risk assessment considers, among other factors, the objectives and scope of the audit. Therefore, the SAO does not test all IT controls in every audit, with the high-risk and high-impact IT controls being tested more frequently. In addition, to minimize security risks, the SAO does not publicly report sensitive IT audit issues, in accordance with the Texas Government Code, Section 552.139.

Texas state auditor’s office report. Internet: <sao.texas.gov>  (adapted).

Judge the following item considering the text above and the vocabulary used in it.


It can be inferred from the text that the SAO keeps certain issues secret to avoid endangering security. 

Alternativas
Q1901977 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

In the second paragraph of the text, 


the word “disincentivize” could be correctly replaced by deter without any change in the meaning of the sentence.  

Alternativas
Q1901976 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

In the second paragraph of the text, 


the word “quandary” could be correctly replaced by dilemma without any change in the meaning of the sentence. 

Alternativas
Q1901975 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


It can be concluded from the text that the quickest option for hospitals being under attack of ransomware would be to pay more than the amount the attackers demand. 

Alternativas
Q1901974 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


The author of the text claims that the solution to ransomware is to stop paying ransoms. 

Alternativas
Q1901973 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


The text says that, in order to avoid bad press, companies should be required by law to report having paid ransom.

Alternativas
Q1901972 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


It can be inferred from the text that ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. 

Alternativas
Q1900002 Inglês
Can alternative tailings disposal become the norm in mining?

   There is no doubt that the resources extracted from mining are critical to our way of life. Likely, you’re reading this on your computer, smartphone, or tablet. Mining touches all our lives daily (in addition to metals used in electronics, think about that can of soda you are drinking, or the aggregate used to pave your driveway). The industry works hard to make sure the net impact is positive. 
   However, the waste associated with mining, both past and present, is an unavoidable result of conventional mineral processing. In the future it may be possible to extract metals like copper and gold without crushing and grinding the ore down to fine particle size and adding considerable quantities of liquid, resulting in conventional tailings.
    What are the challenges associated with conventional tailings? Well, it is all about water. Managing seepage from the tailings themselves, monitoring pore water pressure within the tailings dams or designing facilities to safely store or pass flood events. Because such a significant quantity of water is added during mineral processing, “conventional” tailings dams store the tailings as a slurry. Water within the tailing material is either evaporated, migrates as seepage or remains entrained within the tailings impoundment. Removing water prior to disposal through various means is considered “alternative” disposal. Mining low grades of ore has resulted in increased water use per unit of production. In some cases, the availability of water is one of the greatest constraints on mine development.

Internet: <www.stantec.com> (adapted). 
Considering the ideas stated in the text and the vocabulary used in it, judge the following item.

Nowadays, it is already possible to extract minerals without generating any waste at all.
Alternativas
Q1900001 Inglês
Can alternative tailings disposal become the norm in mining?

   There is no doubt that the resources extracted from mining are critical to our way of life. Likely, you’re reading this on your computer, smartphone, or tablet. Mining touches all our lives daily (in addition to metals used in electronics, think about that can of soda you are drinking, or the aggregate used to pave your driveway). The industry works hard to make sure the net impact is positive. 
   However, the waste associated with mining, both past and present, is an unavoidable result of conventional mineral processing. In the future it may be possible to extract metals like copper and gold without crushing and grinding the ore down to fine particle size and adding considerable quantities of liquid, resulting in conventional tailings.
    What are the challenges associated with conventional tailings? Well, it is all about water. Managing seepage from the tailings themselves, monitoring pore water pressure within the tailings dams or designing facilities to safely store or pass flood events. Because such a significant quantity of water is added during mineral processing, “conventional” tailings dams store the tailings as a slurry. Water within the tailing material is either evaporated, migrates as seepage or remains entrained within the tailings impoundment. Removing water prior to disposal through various means is considered “alternative” disposal. Mining low grades of ore has resulted in increased water use per unit of production. In some cases, the availability of water is one of the greatest constraints on mine development.

Internet: <www.stantec.com> (adapted). 
Considering the ideas stated in the text and the vocabulary used in it, judge the following item.

An alternative disposal method mentioned in the text could be removing water from waste before its disposal. 
Alternativas
Q1900000 Inglês
Can alternative tailings disposal become the norm in mining?

   There is no doubt that the resources extracted from mining are critical to our way of life. Likely, you’re reading this on your computer, smartphone, or tablet. Mining touches all our lives daily (in addition to metals used in electronics, think about that can of soda you are drinking, or the aggregate used to pave your driveway). The industry works hard to make sure the net impact is positive. 
   However, the waste associated with mining, both past and present, is an unavoidable result of conventional mineral processing. In the future it may be possible to extract metals like copper and gold without crushing and grinding the ore down to fine particle size and adding considerable quantities of liquid, resulting in conventional tailings.
    What are the challenges associated with conventional tailings? Well, it is all about water. Managing seepage from the tailings themselves, monitoring pore water pressure within the tailings dams or designing facilities to safely store or pass flood events. Because such a significant quantity of water is added during mineral processing, “conventional” tailings dams store the tailings as a slurry. Water within the tailing material is either evaporated, migrates as seepage or remains entrained within the tailings impoundment. Removing water prior to disposal through various means is considered “alternative” disposal. Mining low grades of ore has resulted in increased water use per unit of production. In some cases, the availability of water is one of the greatest constraints on mine development.

Internet: <www.stantec.com> (adapted). 
Considering the ideas stated in the text and the vocabulary used in it, judge the following item.

Up to a certain extent, mining is present in our everyday lives.  
Alternativas
Q1899999 Inglês
Can alternative tailings disposal become the norm in mining?

   There is no doubt that the resources extracted from mining are critical to our way of life. Likely, you’re reading this on your computer, smartphone, or tablet. Mining touches all our lives daily (in addition to metals used in electronics, think about that can of soda you are drinking, or the aggregate used to pave your driveway). The industry works hard to make sure the net impact is positive. 
   However, the waste associated with mining, both past and present, is an unavoidable result of conventional mineral processing. In the future it may be possible to extract metals like copper and gold without crushing and grinding the ore down to fine particle size and adding considerable quantities of liquid, resulting in conventional tailings.
    What are the challenges associated with conventional tailings? Well, it is all about water. Managing seepage from the tailings themselves, monitoring pore water pressure within the tailings dams or designing facilities to safely store or pass flood events. Because such a significant quantity of water is added during mineral processing, “conventional” tailings dams store the tailings as a slurry. Water within the tailing material is either evaporated, migrates as seepage or remains entrained within the tailings impoundment. Removing water prior to disposal through various means is considered “alternative” disposal. Mining low grades of ore has resulted in increased water use per unit of production. In some cases, the availability of water is one of the greatest constraints on mine development.

Internet: <www.stantec.com> (adapted). 
Considering the ideas stated in the text and the vocabulary used in it, judge the following item. 

In the second sentence of the first paragraph, the word “Likely” means the same as Probably.
Alternativas
Q1899998 Inglês
After two collapses, a third dam at ‘imminent risk of rupture’

  A dam holding back mining waste from a Brazilian miner is at risk of collapsing, a government audit says. The same company was responsible for two tailings dam collapses since 2015 that unleashed millions of gallons of toxic sludge and killed hundreds of people in Brazil’s southeastern state of Minas Gerais, which has been known worldwide as the Brumadinho Dam Collapse.
   The retired Xingu dam at Alegria iron ore mine in Mariana — the same municipality where a tailings dam collapsed in November 2015 in what’s considered Brazil’s worst environmental disaster to date — is at “serious and imminent risk of rupture by liquefaction,” according to an audit report from a local state organ. The report says the Xingu dam “does not present stability conditions.” “It is, therefore, an extremely serious situation that puts at risk workers who perform activities, access or remain on the crest, on the downstream slopes, in the flood area and in the area on the tailings upstream of the dam,” the document says.
  The ANM (National Mining Agency) rated the Xingu dam’s safety at level 2 in a September 2020 assessment, after requesting the company to improve the structure. The miner has fulfilled part of the request, but has sought a deadline extension for other repair works, without major changes in the structure. In its most recent inspection, ANM identified structural problems where no corrective measures had been implemented. 

Internet: <news.mongabay.com> (adapted).
Based on the text above, judge the following item.

We can infer from the text that the dam which is at serious risk of collapsing is still working and may put its workers at risk too. 
Alternativas
Q1899997 Inglês
After two collapses, a third dam at ‘imminent risk of rupture’

  A dam holding back mining waste from a Brazilian miner is at risk of collapsing, a government audit says. The same company was responsible for two tailings dam collapses since 2015 that unleashed millions of gallons of toxic sludge and killed hundreds of people in Brazil’s southeastern state of Minas Gerais, which has been known worldwide as the Brumadinho Dam Collapse.
   The retired Xingu dam at Alegria iron ore mine in Mariana — the same municipality where a tailings dam collapsed in November 2015 in what’s considered Brazil’s worst environmental disaster to date — is at “serious and imminent risk of rupture by liquefaction,” according to an audit report from a local state organ. The report says the Xingu dam “does not present stability conditions.” “It is, therefore, an extremely serious situation that puts at risk workers who perform activities, access or remain on the crest, on the downstream slopes, in the flood area and in the area on the tailings upstream of the dam,” the document says.
  The ANM (National Mining Agency) rated the Xingu dam’s safety at level 2 in a September 2020 assessment, after requesting the company to improve the structure. The miner has fulfilled part of the request, but has sought a deadline extension for other repair works, without major changes in the structure. In its most recent inspection, ANM identified structural problems where no corrective measures had been implemented. 

Internet: <news.mongabay.com> (adapted).
Based on the text above, judge the following item.

It can be concluded from the text that the tailings dams which collapsed and killed many people were both located in the same state in Brazil. 
Alternativas
Respostas
6901: E
6902: E
6903: C
6904: E
6905: E
6906: C
6907: C
6908: C
6909: C
6910: C
6911: E
6912: E
6913: E
6914: C
6915: E
6916: C
6917: C
6918: C
6919: E
6920: C