Magna Concursos

Foram encontradas 590 questões.

763268 Ano: 2016
Disciplina: Direito Financeiro
Banca: FCC
Orgão: TRT-20
De acordo com a Lei de Responsabilidade Fiscal − Lei Complementar nº 101/2000, a escrituração das contas públicas, além de obedecer às demais normas de contabilidade pública deverá também observar as seguintes normas:
 

Provas

Questão presente nas seguintes provas
763267 Ano: 2016
Disciplina: Direito Financeiro
Banca: FCC
Orgão: TRT-20
Atenção: Para responder a questão a seguir, considere as seguintes informações:
Na elaboração da proposta orçamentária para o exercício de 2017 de determinado ente da federação, foi definido que seriam previstas e fixadas, respectivamente, as seguintes receitas e despesas orçamentárias.
enunciado 763267-1
A proposta orçamentária apresenta
 

Provas

Questão presente nas seguintes provas
763266 Ano: 2016
Disciplina: Administração Financeira e Orçamentária
Banca: FCC
Orgão: TRT-20
Atenção: Para responder a questão a seguir, considere as seguintes informações:
Na elaboração da proposta orçamentária para o exercício de 2017 de determinado ente da federação, foi definido que seriam previstas e fixadas, respectivamente, as seguintes receitas e despesas orçamentárias.
enunciado 763266-1
As receitas patrimoniais totalizam
 

Provas

Questão presente nas seguintes provas
763265 Ano: 2016
Disciplina: Direito Financeiro
Banca: FCC
Orgão: TRT-20
As despesas com serviços realizadas nos meses de novembro e dezembro de 2015 com a manutenção dos elevadores instalados no prédio central de determinado órgão público, embora o orçamento respectivo consignasse crédito próprio, com saldo suficiente para atendê-las, não foram empenhadas no respectivo exercício. Na execução orçamentária do exercício de 2016, segundo a Lei Federal nº 4.320/1964, as despesas serão empenhadas no elemento de despesa denominado de
 

Provas

Questão presente nas seguintes provas
763264 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:

Atenção: Considere o texto para responder à questão.

Does an Email Hacking Software really Exist?

With my experience of over 10 years in the field of ethical hacking and information security, all I can tell you is that there exists no such ready-made software program (as shown and advertised on many websites) that can break into the service provider’s database and hack email passwords. This is just a myth! This may seem a bit disappointing for many, but this is the fact. However, it is still possible to easily hack email passwords using some of the alternative programs and ways as discussed below:

Working Ways to Hack an Email Password:

Even though it is impossible to hack the database and instantly crack the email password, it is still possible to trick the users so that they give away the password by themselves. This can be done using a handful of methods like keylogging, social engineering or phishing. However, the easiest and most effective way is by using keyloggers.

A keylogger is a small program that records each and every keystroke a user types on the keyboard of a specific computer. So when you install a keylogger on the computer from where the target person is likely to access his/her email, it is possible to capture the password. Though keyloggers are not designed to hack email passwords, they can still be used to accomplish the job. Here is a list of some of the interesting facts about keyloggers:

EASY TO USE: A keylogger does not require any special skills. Anyone with basic computer knowledge should be able to use it.

REMAINS UNDETECTED: A keylogger will remain undetected after installation and operates in a total stealth mode. So, you need not worry about being caught or traced back.

REMOTE INSTALLATION: In addition to installation on a location computer, keyloggers also support remote installation. That means you can also install it even on those computers for which you do not have physical access.

(Adapted form: http://www.gohacking.com/email-hacking-software/)

A conjunção Though, conforme empregada no texto, pode ser traduzida como
 

Provas

Questão presente nas seguintes provas
763263 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:

Atenção: Considere o texto para responder à questão.

Does an Email Hacking Software really Exist?

With my experience of over 10 years in the field of ethical hacking and information security, all I can tell you is that there exists no such ready-made software program (as shown and advertised on many websites) that can break into the service provider’s database and hack email passwords. This is just a myth! This may seem a bit disappointing for many, but this is the fact. However, it is still possible to easily hack email passwords using some of the alternative programs and ways as discussed below:

Working Ways to Hack an Email Password:

Even though it is impossible to hack the database and instantly crack the email password, it is still possible to trick the users so that they give away the password by themselves. This can be done using a handful of methods like keylogging, social engineering or phishing. However, the easiest and most effective way is by using keyloggers.

A keylogger is a small program that records each and every keystroke a user types on the keyboard of a specific computer. So when you install a keylogger on the computer from where the target person is likely to access his/her email, it is possible to capture the password. Though keyloggers are not designed to hack email passwords, they can still be used to accomplish the job. Here is a list of some of the interesting facts about keyloggers:

EASY TO USE: A keylogger does not require any special skills. Anyone with basic computer knowledge should be able to use it.

REMAINS UNDETECTED: A keylogger will remain undetected after installation and operates in a total stealth mode. So, you need not worry about being caught or traced back.

REMOTE INSTALLATION: In addition to installation on a location computer, keyloggers also support remote installation. That means you can also install it even on those computers for which you do not have physical access.

(Adapted form: http://www.gohacking.com/email-hacking-software/)

Segundo o texto,
 

Provas

Questão presente nas seguintes provas
763261 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:

Atenção: Considere o texto para responder à questão.

Does an Email Hacking Software really Exist?

With my experience of over 10 years in the field of ethical hacking and information security, all I can tell you is that there exists no such ready-made software program (as shown and advertised on many websites) that can break into the service provider’s database and hack email passwords. This is just a myth! This may seem a bit disappointing for many, but this is the fact. However, it is still possible to easily hack email passwords using some of the alternative programs and ways as discussed below:

Working Ways to Hack an Email Password:

Even though it is impossible to hack the database and instantly crack the email password, it is still possible to trick the users so that they give away the password by themselves. This can be done using a handful of methods like keylogging, social engineering or phishing. However, the easiest and most effective way is by using keyloggers.

A keylogger is a small program that records each and every keystroke a user types on the keyboard of a specific computer. So when you install a keylogger on the computer from where the target person is likely to access his/her email, it is possible to capture the password. Though keyloggers are not designed to hack email passwords, they can still be used to accomplish the job. Here is a list of some of the interesting facts about keyloggers:

EASY TO USE: A keylogger does not require any special skills. Anyone with basic computer knowledge should be able to use it.

REMAINS UNDETECTED: A keylogger will remain undetected after installation and operates in a total stealth mode. So, you need not worry about being caught or traced back.

REMOTE INSTALLATION: In addition to installation on a location computer, keyloggers also support remote installation. That means you can also install it even on those computers for which you do not have physical access.

(Adapted form: http://www.gohacking.com/email-hacking-software/)

A melhor tradução para o trecho from where the target person is likely to access his/her email é
 

Provas

Questão presente nas seguintes provas
763260 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:

Atenção: Considere o texto para responder à questão.

Does an Email Hacking Software really Exist?

With my experience of over 10 years in the field of ethical hacking and information security, all I can tell you is that there exists no such ready-made software program (as shown and advertised on many websites) that can break into the service provider’s database and hack email passwords. This is just a myth! This may seem a bit disappointing for many, but this is the fact. However, it is still possible to easily hack email passwords using some of the alternative programs and ways as discussed below:

Working Ways to Hack an Email Password:

Even though it is impossible to hack the database and instantly crack the email password, it is still possible to trick the users so that they give away the password by themselves. This can be done using a handful of methods like keylogging, social engineering or phishing. However, the easiest and most effective way is by using keyloggers.

A keylogger is a small program that records each and every keystroke a user types on the keyboard of a specific computer. So when you install a keylogger on the computer from where the target person is likely to access his/her email, it is possible to capture the password. Though keyloggers are not designed to hack email passwords, they can still be used to accomplish the job. Here is a list of some of the interesting facts about keyloggers:

EASY TO USE: A keylogger does not require any special skills. Anyone with basic computer knowledge should be able to use it.

REMAINS UNDETECTED: A keylogger will remain undetected after installation and operates in a total stealth mode. So, you need not worry about being caught or traced back.

REMOTE INSTALLATION: In addition to installation on a location computer, keyloggers also support remote installation. That means you can also install it even on those computers for which you do not have physical access.

(Adapted form: http://www.gohacking.com/email-hacking-software/)

Um sinônimo para instantly, conforme usado no texto, é
 

Provas

Questão presente nas seguintes provas
763259 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:
Jumpstarting your data mining journey can be a difficult battle if you didn’t study data science in school. Not to worry! Few of today’s brightest data scientists did. So, for those of us who may need a little refresher on data mining or are starting from scratch, here are some great resources to learn data mining concepts and techniques.
W3Schools − Fantastic set of interactive tutorials for learning different languages. Their SQL tutorial is second to none. You’ll learn how to manipulate data in MySQL, SQL Server, Access, Oracle, Sybase, DB2 and other database systems.
Treasure Data − The best way to learn is to work towards a goal. That’s what this helpful blog series is all about. You’ll learn SQL from scratch by following along with a simple, but common, data analysis scenario.
10 Queries This course is recommended for the intermediate SQL-er who wants to brush up on his/her skills. It’s a series of 10 challenges coupled with forums and external videos to help you improve your SQL knowledge and understanding of the underlying principles.
Segundo o texto,
 

Provas

Questão presente nas seguintes provas

Atenção: Leia os versos abaixo para responder à questão.

O Gênio da Humanidade

Sou eu quem assiste às lutas,

Que dentro d'alma se dão,

Quem sonda todas as grutas

Profundas do coração:

Quis ver dos céus o segredo;

Rebelde, sobre um rochedo

Cravado, fui Prometeu;

Tive sede do infinito,

Gênio, feliz ou maldito,

A Humanidade sou eu.

Ergo o braço, aceno aos ares,

E o céu se azulando vai;

Estendo a mão sobre os mares,

E os mares dizem: passai!...

Satisfazendo ao anelo

Do bom, do grande e do belo,

Todas as formas tomei:

Com Homero fui poeta,

Com Isaías profeta,

Com Alexandre fui rei.

(...)

(BARRETO, Tobias. Disponível em: www.escritas.org)

Considere as seguintes afirmações a respeito dos versos:

I. O poema destaca, num tom grandiloquente, a forma totalizante como o homem expandiu seus domínios.

II. Ênfase é dada ao espírito materialista do homem, cuja ambição desmedida é a causa da destruição da natureza.

III. A citação de Homero, Isaías e Alexandre se dá em uma gradação que vai do menos ao mais importante, reproduzindo textualmente a evolução das habilidades humanas.

Está correto o que se afirma APENAS em

 

Provas

Questão presente nas seguintes provas