Foram encontradas 60 questões.
Nas questões que avaliem conhecimentos de informática, a menos que seja explicitamente informado o contrário, considere que: todos os programas mencionados estejam em configuração-padrão, em português; o mouse esteja configurado para pessoas destras; expressões como clicar, clique simples e clique duplo refiram-se a cliques com o botão esquerdo do mouse; e teclar corresponda à operação de pressionar uma tecla e, rapidamente, liberá-la, acionando-a apenas uma vez. Considere também que não haja restrições de proteção, de funcionamento e de uso em relação aos programas, arquivos, diretórios, recursos e equipamentos mencionados.
O principal objetivo da Lei Geral de Proteção de Dados (LGPD) é
Provas
Assinale a alternativa que apresenta a negação da proposição “Hipnos toca flauta se, e somente se, Tânatos tem coração de ferro”.
Provas
Alexa está criando uma senha de 6 dígitos para seu celular. Por questões de segurança, ela decide que:
• o primeiro e o terceiro dígito devem ser ímpares;
• o segundo, o quarto, o quinto e o sexto dígito devem ser pares; e
• todos os dígitos devem ser distintos.
Com base nessa situação hipotética, o número de senhas distintas que Alexa pode criar nessas condições é
Provas
Sabe-se que Daiane é mais baixa que Jade e que Rebeca é mais alta que Jade.
Com base nessa situação hipotética, assinale a alternativa que apresenta a altura relativa de cada uma delas.
Provas
- Gramática - Língua InglesaAdjetivos | Adjectives
- Gramática - Língua InglesaAdvérbios e conjunções | Adverbs and conjunctions
- Gramática - Língua InglesaVerbos | VerbsPresente perfeito | Present perfect
- Gramática - Língua InglesaVerbos | VerbsFuturo simples | Simple future
Considering the last paragraph of the text, choose the correct alternative that presents the correct grammar association.
Provas
Considering the text, choose the correct alternative about the GDPR.
Provas
The use of personal information must be explained to consumers in a simple and transparent manner to
Provas
- Pronome subjetivo | Subjective pronoun
- Pronome objetivo | Objective pronoun
- Gramática - Língua InglesaVerbos | VerbsPassado progressivo | Past continuous
Text for the questions from 19 to 21.
1 Cybersecurity: Cybersecurity, or information
security, refers to the measures taken to protect a
computer or computer system against unauthorized
4 access from a hacker. A robust cybersecurity policy
protects secure, critical or sensitive data and prevents
it from falling into the hands of malicious third parties.
7 The most common forms of cyber-attacks are phishing,
spear phishing and injecting malware code into a
computer system.
10 Data Privacy: Varonis defines data privacy as a
type of “information security that deals with the proper
handling of data concerning consent, notice, sensitivity,
13 and regulatory concerns.” On its most basic level, data
privacy is a consumer’s understanding of their rights
as to how their personal information is collected, used,
16 stored and shared. The use of personal information must
be explained to consumers in a simple and transparent
manner and in most cases, consumers must give their
19 consent before their personal information is provided.
World Wide Data Privacy and Cyber Laws: The
protection of data privacy has come to the forefront
22 with the launch of the General Data Protection
Regulation (GDPR) by the European Union (EU) in 2018.
The GDPR updated an older data law to reflect today’s
25 ever-changing technology. The GDPR places more
requirements on organizations that process and collect
personal data, emphasizing accountability and evidencing
28 compliance while strengthening the individual’s rights.
The GDPR applies to all data directly or indirectly related
to an identifiable person in the EU that is processed by an
31 individual, company or organization. Any small business
that processes people’s personal data within the EU is
subject to the GDPR, no matter where in the world the
34 business is based. It is important to note that the GDPR
pertains to people within the EU, but not necessarily to
EU citizens. This means that any company using the data
37 of EU subjects, even if this company is stationed outside
the EU, will need to comply with new ways of protecting
data related to identifying information, IP address,
40 cookies, health, genetic or biometric data, racial or ethnic
data and sexual orientation.
Read the sentence and choose the correct alternative. “Data privacy is a consumer’s understanding of their rights as to how their personal information is collected, used, stored and shared.”
Provas
Text for the questions from 19 to 21.
1 Cybersecurity: Cybersecurity, or information
security, refers to the measures taken to protect a
computer or computer system against unauthorized
4 access from a hacker. A robust cybersecurity policy
protects secure, critical or sensitive data and prevents
it from falling into the hands of malicious third parties.
7 The most common forms of cyber-attacks are phishing,
spear phishing and injecting malware code into a
computer system.
10 Data Privacy: Varonis defines data privacy as a
type of “information security that deals with the proper
handling of data concerning consent, notice, sensitivity,
13 and regulatory concerns.” On its most basic level, data
privacy is a consumer’s understanding of their rights
as to how their personal information is collected, used,
16 stored and shared. The use of personal information must
be explained to consumers in a simple and transparent
manner and in most cases, consumers must give their
19 consent before their personal information is provided.
World Wide Data Privacy and Cyber Laws: The
protection of data privacy has come to the forefront
22 with the launch of the General Data Protection
Regulation (GDPR) by the European Union (EU) in 2018.
The GDPR updated an older data law to reflect today’s
25 ever-changing technology. The GDPR places more
requirements on organizations that process and collect
personal data, emphasizing accountability and evidencing
28 compliance while strengthening the individual’s rights.
The GDPR applies to all data directly or indirectly related
to an identifiable person in the EU that is processed by an
31 individual, company or organization. Any small business
that processes people’s personal data within the EU is
subject to the GDPR, no matter where in the world the
34 business is based. It is important to note that the GDPR
pertains to people within the EU, but not necessarily to
EU citizens. This means that any company using the data
37 of EU subjects, even if this company is stationed outside
the EU, will need to comply with new ways of protecting
data related to identifying information, IP address,
40 cookies, health, genetic or biometric data, racial or ethnic
data and sexual orientation.
According to the text, choose the correct alternative that presents the best describes the purpose of a robust cybersecurity policy.
Provas
- Gramática - Língua InglesaAdjetivos | Adjectives
- Gramática - Língua InglesaPreposições | Prepositions
- Gramática - Língua InglesaVerbos | VerbsPresente simples | Simple present
- Gramática - Língua InglesaPronomes | PronounsPronome possessivo substantivo | Possessive pronoun
Text for the questions from 19 to 21.
1 Cybersecurity: Cybersecurity, or information
security, refers to the measures taken to protect a
computer or computer system against unauthorized
4 access from a hacker. A robust cybersecurity policy
protects secure, critical or sensitive data and prevents
it from falling into the hands of malicious third parties.
7 The most common forms of cyber-attacks are phishing,
spear phishing and injecting malware code into a
computer system.
10 Data Privacy: Varonis defines data privacy as a
type of “information security that deals with the proper
handling of data concerning consent, notice, sensitivity,
13 and regulatory concerns.” On its most basic level, data
privacy is a consumer’s understanding of their rights
as to how their personal information is collected, used,
16 stored and shared. The use of personal information must
be explained to consumers in a simple and transparent
manner and in most cases, consumers must give their
19 consent before their personal information is provided.
World Wide Data Privacy and Cyber Laws: The
protection of data privacy has come to the forefront
22 with the launch of the General Data Protection
Regulation (GDPR) by the European Union (EU) in 2018.
The GDPR updated an older data law to reflect today’s
25 ever-changing technology. The GDPR places more
requirements on organizations that process and collect
personal data, emphasizing accountability and evidencing
28 compliance while strengthening the individual’s rights.
The GDPR applies to all data directly or indirectly related
to an identifiable person in the EU that is processed by an
31 individual, company or organization. Any small business
that processes people’s personal data within the EU is
subject to the GDPR, no matter where in the world the
34 business is based. It is important to note that the GDPR
pertains to people within the EU, but not necessarily to
EU citizens. This means that any company using the data
37 of EU subjects, even if this company is stationed outside
the EU, will need to comply with new ways of protecting
data related to identifying information, IP address,
40 cookies, health, genetic or biometric data, racial or ethnic
data and sexual orientation.
Considering the first paragraph of the text, choose the correct alternative that presents the correct grammar association.
Provas
Caderno Container