Magna Concursos

Foram encontradas 510 questões.

3849130 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Choose the sentence that CORRECTLY orders the adjectives describing the noun:
 

Provas

Questão presente nas seguintes provas
3849129 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
In the following sentence, what is the CORRECT primary function of the connective word “however”?

“The company had a successful quarter; however, the CEO acknowledged that there were significant challenges ahead.”
 

Provas

Questão presente nas seguintes provas
3849128 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
In the sentence, “Had I known you were coming, I would have baked a cake,” which feature of conditional sentences is being demonstrated?
 

Provas

Questão presente nas seguintes provas
3849127 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Consider the sentence: He looked up the word in a dictionary. Choose the CORRECT option that reveals the nature of phrasal verbs.
 

Provas

Questão presente nas seguintes provas
3849126 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the excerpt below and answer the question that follows.

“Reflective practice is often praised as a cornerstone of teacher development, ___ it may also generate discomfort, since it forces educators to question long-held beliefs about their professional identity.”

Which conjunction best completes the sentence, preserving the intended meaning of contrast and concession within an academic register?
 

Provas

Questão presente nas seguintes provas
3849125 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 2 and answer question
Text 2
The concept of World Englishes highlights the diversification of English into different and locally grounded varieties. Rather than being seen as mere deviations from a single “standard,” forms such as Indian English or Nigerian English show how English adapts to sociolinguistic contexts shaped by multilingualism and postcolonial histories. These localized varieties differ in vocabulary, pronunciation, pragmatics, and even grammar, yet remain systematic and rule-governed. Recognizing this reality questions the idea of a single, uniform English and reframes the language as having multiple centers of influence. For teaching, this means that instead of promoting only one model, English education should engage critically with linguistic diversity and with the social and cultural values attached to different varieties.
Source: Kachru, Braj B., Kachru, Yamuna, Nelson, Cecil L. The Handbook of World Englishes. Australia: Blackwell Publishin. 2006. (Adapted)
Pedagogically, the recognition of English as pluricentric entails that:
 

Provas

Questão presente nas seguintes provas
3849124 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 2 and answer question
Text 2
The concept of World Englishes highlights the diversification of English into different and locally grounded varieties. Rather than being seen as mere deviations from a single “standard,” forms such as Indian English or Nigerian English show how English adapts to sociolinguistic contexts shaped by multilingualism and postcolonial histories. These localized varieties differ in vocabulary, pronunciation, pragmatics, and even grammar, yet remain systematic and rule-governed. Recognizing this reality questions the idea of a single, uniform English and reframes the language as having multiple centers of influence. For teaching, this means that instead of promoting only one model, English education should engage critically with linguistic diversity and with the social and cultural values attached to different varieties.
Source: Kachru, Braj B., Kachru, Yamuna, Nelson, Cecil L. The Handbook of World Englishes. Australia: Blackwell Publishin. 2006. (Adapted)
In line with the text, the notion of World Englishes primarily challenges:
 

Provas

Questão presente nas seguintes provas
3849123 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
Based on the provided text, which of the following practices is considered a proactive measure for enhancing digital security?
 

Provas

Questão presente nas seguintes provas
3849122 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
What is the difference between “credential stuffing” and how fraudsters exploit “derivations” to gain access?
 

Provas

Questão presente nas seguintes provas
3849121 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
According to the text, what is the CORRECT definition to “ derivation” of a password in the context of a scam?
 

Provas

Questão presente nas seguintes provas