Magna Concursos

Foram encontradas 60 questões.

636573 Ano: 2011
Disciplina: TI - Organização e Arquitetura dos Computadores
Banca: FCC
Orgão: TRE-RN
Provas:
A busca antecipada de instruções é uma técnica utilizada nos processadores dos microcomputadores atuais, de forma a acelerar a execução de um programa. As instruções são pré-carregadas da memória
 

Provas

Questão presente nas seguintes provas
A redação de documentos oficiais deve pautar-se por impessoalidade, clareza, concisão e pelo uso correto da norma culta. Todas essas qualidades são respeitadas no seguinte trecho:
 

Provas

Questão presente nas seguintes provas
636208 Ano: 2011
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRE-RN
Provas:
Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
enunciado 636208-1 of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
enunciado 636208-2 of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)
Segundo o texto,
 

Provas

Questão presente nas seguintes provas
636206 Ano: 2011
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRE-RN
Provas:
Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
enunciado 636206-1 of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
enunciado 636206-2 of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)
A alternativa que preenche corretamente a lacuna enunciado 636206-3 é
 

Provas

Questão presente nas seguintes provas
636205 Ano: 2011
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRE-RN
Provas:
Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
enunciado 636205-1 of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
enunciado 636205-2 of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)
Em qual das alternativas abaixo like tem o mesmo significado que tem no texto? (2º parágrafo)
 

Provas

Questão presente nas seguintes provas
636204 Ano: 2011
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRE-RN
Provas:
Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
enunciado 636204-1 of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
enunciado 636204-2 of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)
A alternativa que preenche corretamente a lacuna enunciado 636204-3 é
 

Provas

Questão presente nas seguintes provas
636202 Ano: 2011
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRE-RN
Provas:
Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
enunciado 636202-1 of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
enunciado 636202-2 of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)
De acordo com o texto,
 

Provas

Questão presente nas seguintes provas
Os ecos da Revolução do Porto haviam chegado
ao Brasil e bastaram algumas semanas para inflamar os
ânimos dos brasileiros e portugueses que cercavam a
corte. Na manhã de 26 de fevereiro, uma multidão exigia
a presença do rei no centro do Rio de Janeiro e a
assinatura da Constituição liberal. Ao ouvir as notícias, a alguns
quilômetros dali, D. João mandou fechar todas as janelas
do palácio São Cristóvão, como fazia em noites de trovoadas.
Pouco depois chegou o Príncipe D. Pedro, que
passara a madrugada em conversas com os rebeldes.
Vinha buscar o rei. D. João estava apavorado com a
lembrança da ainda recente Revolução Francesa. Apesar do
medo, D. João embarcou na carruagem que o aguardava
e seguiu para o centro da cidade. A caminho, no entanto,
percebeu que, em lugar de ofensas e gritos de protestos,
a multidão aclamava seu nome. Ao contrário do odiado
Luís XVI, o rei do Brasil era amado e querido pelo povo
carioca.



(Adaptado de Laurentino Gomes, 1808. São Paulo:
Planeta, 2007)
Graças ...... resistência de portugueses e espanhóis, a Inglaterra furou o bloqueio imposto por Napoleão e deu início ...... campanha vitoriosa que causaria ...... queda do imperador francês.

Preenchem as lacunas da frase acima, na ordem dada,
 

Provas

Questão presente nas seguintes provas
Atenção: As questões de números 13 a 15 referem-se ao texto abaixo.
João e Maria
Agora eu era o herói
E o meu cavalo só falava inglês
A noiva do cowboy
Era você
Além das outras três
Eu enfrentava os batalhões
Os alemães e seus canhões
Guardava o meu bodoque
E ensaiava um rock
Para as matinês
(...)
Não, não fuja não
Finja que agora eu era o seu brinquedo
Eu era o seu pião
O seu bicho preferido
Sim, me dê a mão
A gente agora já não tinha medo
No tempo da maldade
Acho que a gente nem tinha nascido

Chico Buarque e Sivuca
I. Nos versos Agora eu era o herói e A gente agora já não tinha medo, o uso do advérbio agora mostra-se inadequado, pois os verbos conjugados no pretérito imperfeito designam fatos transcorridos no tempo passado.
II. Em Finja que agora eu era o seu brinquedo e Sim, me a mão, os verbos grifados estão flexionados no mesmo modo.
III. Substituindo-se a expressão a gente pelo pronome nós nos versos A gente agora já não tinha medo e Acho que a gente nem tinha nascido, a forma verbal resultante, sem alterar o contexto, será teríamos.

Está correto o que se afirma em
 

Provas

Questão presente nas seguintes provas
Atenção: As questões de números 13 a 15 referem-se ao texto abaixo.
João e Maria
Agora eu era o herói
E o meu cavalo só falava inglês
A noiva do cowboy
Era você
Além das outras três
Eu enfrentava os batalhões
Os alemães e seus canhões
Guardava o meu bodoque
E ensaiava um rock
Para as matinês
(...)
Não, não fuja não
Finja que agora eu era o seu brinquedo
Eu era o seu pião
O seu bicho preferido
Sim, me dê a mão
A gente agora já não tinha medo
No tempo da maldade
Acho que a gente nem tinha nascido

Chico Buarque e Sivuca
É comum que, durante suas brincadeiras, as crianças se ...... para um universo mágico e ...... a identidade de uma personagem admirada, ...... um super-herói ou uma figura da realeza.

Preenche corretamente as lacunas da frase acima, na ordem dada, o que está em:
 

Provas

Questão presente nas seguintes provas