Ir para o conteúdo principal

Questões de Concurso – Aprova Concursos

Milhares de questões com o conteúdo atualizado para você praticar e chegar ao dia da prova preparado!


Exibir questões com:
Não exibir questões:
Minhas questões:
Filtros aplicados:

Dica: Caso encontre poucas questões de uma prova específica, filtre pela banca organizadora do concurso que você deseja prestar.

Exibindo questões de 4370 encontradas. Imprimir página Salvar em Meus Filtros
Folha de respostas:

  • 1
    • a
    • b
    • c
    • d
    • e
  • 2
    • a
    • b
    • c
    • d
    • e
  • 3
    • a
    • b
    • c
    • d
    • e
  • 4
    • a
    • b
    • c
    • d
    • e
  • 5
    • a
    • b
    • c
    • d
    • e
  • 6
    • Certo
    • Errado
  • 7
    • a
    • b
    • c
    • d
    • e
  • 8
    • a
    • b
    • c
    • d
  • 9
    • Certo
    • Errado
  • 10
    • a
    • b
    • c
    • d
    • e
  • 11
    • a
    • b
    • c
    • d
    • e
  • 12
    • a
    • b
    • c
    • d
    • e
  • 13
    • a
    • b
    • c
    • d
    • e
  • 14
    • a
    • b
    • c
    • d
    • e
  • 15
    • a
    • b
    • c
    • d
    • e

What is the first step to calculate the price of your final product or service?

According to Text II, the expression Big Shift Change in its title is primarily related to the idea that the companies

Ao longo da carreira, o oficial de polícia

Leia o texto para responder a questão.

                                      E-mail Spoofing

           E-mail spoofing is the forgery of an e-mail header so that  the message appears to have originated from someone or  somewhere other than the actual source. Distributors of spam  often use spoofing in an attempt to get recipients to open,  and possibly even respond to, their solicitations. Spoofing can  be used legitimately. However, spoofing anyone other than  yourself is illegal in some jurisdictions.
           E-mail spoofing is possible because Simple Mail Transfer  Protocol (SMTP), the main protocol used in sending e-mail,  does not include an authentication mechanism. Although  an SMTP service extension (specified in IETF RFC 2554)  allows an SMTP client to negotiate a security level with a mail
server, this precaution is not often taken. If the precaution is  not taken, anyone with the requisite knowledge can connect  to the server and use it to send messages. To send spoofed  e-mail, senders insert commands in headers that will alter  message information. It is possible to send a message that
appears to be from anyone, anywhere, saying whatever the  sender wants it to say. Thus, someone could send spoofed  e-mail that appears to be from you with a message that you  didn't write.
          Although most spoofed e-mail falls into the “nuisance" category and requires little action other than deletion, the  more malicious varieties can cause serious problems and  security risks. For example, spoofed e-mail may purport  to be from someone in a position of authority, asking for  sensitive data, such as passwords, credit card numbers, or  other personal information – any of which can be used for a  variety of criminal purposes. One type of e-mail spoofing, self- sending spam, involves messages that appear to be both to  and from the recipient.

                                                               
According to the text, in order to avoid spoofing, one should

Leia o texto para responder a questão.

                                      E-mail Spoofing

           E-mail spoofing is the forgery of an e-mail header so that  the message appears to have originated from someone or  somewhere other than the actual source. Distributors of spam  often use spoofing in an attempt to get recipients to open,  and possibly even respond to, their solicitations. Spoofing can  be used legitimately. However, spoofing anyone other than  yourself is illegal in some jurisdictions.
           E-mail spoofing is possible because Simple Mail Transfer  Protocol (SMTP), the main protocol used in sending e-mail,  does not include an authentication mechanism. Although  an SMTP service extension (specified in IETF RFC 2554)  allows an SMTP client to negotiate a security level with a mail
server, this precaution is not often taken. If the precaution is  not taken, anyone with the requisite knowledge can connect  to the server and use it to send messages. To send spoofed  e-mail, senders insert commands in headers that will alter  message information. It is possible to send a message that
appears to be from anyone, anywhere, saying whatever the  sender wants it to say. Thus, someone could send spoofed  e-mail that appears to be from you with a message that you  didn't write.
          Although most spoofed e-mail falls into the “nuisance" category and requires little action other than deletion, the  more malicious varieties can cause serious problems and  security risks. For example, spoofed e-mail may purport  to be from someone in a position of authority, asking for  sensitive data, such as passwords, credit card numbers, or  other personal information – any of which can be used for a  variety of criminal purposes. One type of e-mail spoofing, self- sending spam, involves messages that appear to be both to  and from the recipient.

                                                               
 
An example of sensitive data mentioned in the last paragraph is

El Niño (The boy) is mostly likely to continue during the summer of 2015, according to new estimates for the Northern Hemisphere from the National Weather Service Climate Prediction Center. What can you expect in El Niño conditions? Warmer sea-surfaces that could send floods to South America, potentially impacting farmers and confounding food production, among other things.

Internet: (adapted).

According to the text,

the effects of El Niño phenomena are sure to reach South America before they have impact on the Northern Hemisphere.

The main purpose of the text is to

In “... the scale of the site has left many baffled.”, the verb tense used is a

Based on the previous text, judge the following items

Helping to avoid housing inequity, the program recently adopted by the American government has been inspired by the final great legislative achievement in the civil rights era in the United States, which tried to prevent housing discrimination.

Questions 21 through 35 address existing theories of English teaching.

Read them and mark the correct alternative.

The conceptual difference between “method” and “approach” is an interesting point to start discussing English language teaching.
According to Richards and Rogers (2001), in “Approaches and Methods in Language Teaching”, “method” and “approach” can be translated into the two following phrases, respectively:

Questions 21 through 35 address existing theories of English teaching.

Read them and mark the correct alternative.

In language teaching studies, some attempts of modeling the reading process have been made. The approach to reading that is generally accepted today is:

Questions 21 through 35 address existing theories of English teaching.

Read them and mark the correct alternative.

“Scaffolding” (Nuttall, 1996, p.36) is a process that “focus on enabling students to develop”. In “Teaching Reading Skills in a Foreign Language”, Nuttall suggests some steps to promote this process. The alternative that presents one of these steps is:

According to the text, the only reason that fails to justify teachers leaving the toughest schools is that they:

This text shows several examples of multiple parallel clausal structures. One example particularly shows the repetition of subordinate clauses to describe the preceding noun phrase, producing a certain dramatic effect. The example is:

Questions 46 through 50 present some problems English learners

usually have. Mark the correct alternative for each question.

Consider the following noun phrase: ‘the only navigable river’.
Suppose a student asks you if there is a difference in meaning if ‘navigable’ is placed after ‘river’. The alternative with the correct answer and comment is: