Ir para o conteúdo principal

Questões de Concurso – Aprova Concursos

Milhares de questões com o conteúdo atualizado para você praticar e chegar ao dia da prova preparado!


Exibir questões com:
Não exibir questões:
Minhas questões:
Filtros aplicados:

Dica: Caso encontre poucas questões de uma prova específica, filtre pela banca organizadora do concurso que você deseja prestar.

Exibindo questões de 1629 encontradas. Imprimir página Salvar em Meus Filtros
Folha de respostas:

  • 1
    • Certo
    • Errado
  • 2
    • Certo
    • Errado
  • 3
    • a
    • b
    • c
    • d
    • e
  • 4
    • Certo
    • Errado
  • 5
    • Certo
    • Errado
  • 6
    • Certo
    • Errado
  • 7
    • Certo
    • Errado
  • 8
    • Certo
    • Errado
  • 9
    • Certo
    • Errado
  • 10
    • Certo
    • Errado
  • 11
    • Certo
    • Errado
  • 12
    • a
    • b
    • c
    • d
    • e
  • 13
    • a
    • b
    • c
    • d
    • e
  • 14
    • a
    • b
    • c
    • d
    • e
  • 15
    • a
    • b
    • c
    • d
    • e


Judge the next items according to the text presented on cyber-ethics.

Cyber-ethics approaches both ethical standards and present-day laws about technology systems and IT.

According to the previous text, judge the following items.


The word ‘changing’ (l.13) conveys the idea that threats are constantly evolving.

In the sentence of the text “Still, there are plenty of ways

millennials can build a credit history without a credit card"

(lines 52 – 53), the quantifier plenty of can be replaced,

with no change in meaning, by


Based on the text, judge the following items.

The expressions “scrutinised” (l.7), “undertaking” (l.15) and “comply with” (l.21) can be respectively replaced by probed, setting about and conform to without this harming the text’s coherence and meaning

It can be correctly deduced from the text that a court analyst

is the sole responsible for the technical improvement of court activities.

Based on the text, judge the items below

In some cases, it is necessary to have experience in the data processing

Based on the previous text, judge the following items

The new program will be accomplished mainly by the federal public sector, although it has been recognized as outstanding by some technology and educational entities.


Based on the text above, judge the following items

According to the text, the legal world should follow the example given by the business world as to the use of technology.


In reference to the text above, judge the following items.

The expression “looming famines” (l.2) refers to situations of severe lack of food which led to “the green revolution” (l.3).


Judge the following items concerning the ideas and the language

used in the text above.

From the text, one can infer that different festive events take place in a courtroom, such as celebrations and meetings.


Based on the text above, judge the following items.

According to the text, the legal world should follow the example given by the business world as to the use of technology.

De acordo com o texto, os oficiais de polícia em início de carreira usualmente

Leia o texto para responder a questão.

                                      E-mail Spoofing

           E-mail spoofing is the forgery of an e-mail header so that  the message appears to have originated from someone or  somewhere other than the actual source. Distributors of spam  often use spoofing in an attempt to get recipients to open,  and possibly even respond to, their solicitations. Spoofing can  be used legitimately. However, spoofing anyone other than  yourself is illegal in some jurisdictions.
           E-mail spoofing is possible because Simple Mail Transfer  Protocol (SMTP), the main protocol used in sending e-mail,  does not include an authentication mechanism. Although  an SMTP service extension (specified in IETF RFC 2554)  allows an SMTP client to negotiate a security level with a mail
server, this precaution is not often taken. If the precaution is  not taken, anyone with the requisite knowledge can connect  to the server and use it to send messages. To send spoofed  e-mail, senders insert commands in headers that will alter  message information. It is possible to send a message that
appears to be from anyone, anywhere, saying whatever the  sender wants it to say. Thus, someone could send spoofed  e-mail that appears to be from you with a message that you  didn't write.
          Although most spoofed e-mail falls into the “nuisance" category and requires little action other than deletion, the  more malicious varieties can cause serious problems and  security risks. For example, spoofed e-mail may purport  to be from someone in a position of authority, asking for  sensitive data, such as passwords, credit card numbers, or  other personal information – any of which can be used for a  variety of criminal purposes. One type of e-mail spoofing, self- sending spam, involves messages that appear to be both to  and from the recipient.

                                                               
 
E-mail spoofing is frequently used by

The main purpose of Text I is to

The sentence of the text “With so much debt already under

their belts, millennials are worried about adding any credit

card debt to the pile" (lines 38 – 40) conveys the idea that

millenials have