Magna Concursos

Foram encontradas 45.388 questões.

3849124 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 2 and answer question
Text 2
The concept of World Englishes highlights the diversification of English into different and locally grounded varieties. Rather than being seen as mere deviations from a single “standard,” forms such as Indian English or Nigerian English show how English adapts to sociolinguistic contexts shaped by multilingualism and postcolonial histories. These localized varieties differ in vocabulary, pronunciation, pragmatics, and even grammar, yet remain systematic and rule-governed. Recognizing this reality questions the idea of a single, uniform English and reframes the language as having multiple centers of influence. For teaching, this means that instead of promoting only one model, English education should engage critically with linguistic diversity and with the social and cultural values attached to different varieties.
Source: Kachru, Braj B., Kachru, Yamuna, Nelson, Cecil L. The Handbook of World Englishes. Australia: Blackwell Publishin. 2006. (Adapted)
In line with the text, the notion of World Englishes primarily challenges:
 

Provas

Questão presente nas seguintes provas
3849123 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
Based on the provided text, which of the following practices is considered a proactive measure for enhancing digital security?
 

Provas

Questão presente nas seguintes provas
3849122 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
What is the difference between “credential stuffing” and how fraudsters exploit “derivations” to gain access?
 

Provas

Questão presente nas seguintes provas
3849121 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
According to the text, what is the CORRECT definition to “ derivation” of a password in the context of a scam?
 

Provas

Questão presente nas seguintes provas
3848305 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
For beginners, the use of TPR (Total Physical Response) is effective because it:
 

Provas

Questão presente nas seguintes provas
3848304 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
According to many researchers in ESL, what are the best reading strategies for beginners?
 

Provas

Questão presente nas seguintes provas
3848296 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
Consider the statements about strategies for teaching beginners in English:

I.The use of visual aids and gestures facilitates comprehension by reducing dependence on verbal code.
II.Teaching complex grammar rules from the beginning is essential to avoid future errors.
III.Promoting pair and small group activities encourages practical language use and oral fluency development.

Which is correct?
 

Provas

Questão presente nas seguintes provas
3848295 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
The term "scaffolding" means:
 

Provas

Questão presente nas seguintes provas
3848293 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
What is the ideal balance between TTT and STT in the classroom?
 

Provas

Questão presente nas seguintes provas
3842794 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: QUADRIX
Orgão: CRM-ES
Provas:

In today’s fast-paced business environment, hardly anything is more vital for growth and survival than innovation. And this is especially the case when it comes to technologies

IT innovation may sound like an area that’s purely the domain of IT companies, but really, it’s something that every business should be working towards. With new IT solutions coming out practically daily, it’s critical to find the ones that are going to boost operations, that are going to help companies to reach and exceed business goals. And it’s important to not just put innovative IT services in place, but to find the ones that are going to add the most value, and to find ways of using IT services in unique and innovative ways to enhance the way businesses are done.

Imagine IT innovation as a breath of fresh air into the sometimes stale corporate world, refreshing and reinvigorating business models, product development processes, and the very fabric of operational efficiency. Innovative IT breakthroughs like artificial intelligence (AI), cloud computing, or the Internet of Things (IoT), are not just buzzwords but actual business growth strategies.

The ways in which businesses can leverage innovative IT solutions are as varied as the businesses themselves. From using AI to offer personalised customer experiences, to using conversational AI as training aids for new team members, to taking advantage of platforms like Microsoft Copilot and enhancing humans’ daily workflows – the potential is limitless.

One of the real-world IT innovation examples that showcases the power of forward-thinking is the adoption of chatbots for customer service. With AI and natural language processing, chatbots can handle simple inquiries, freeing up human staff to tackle more complex issues. More than that, it is possible to feed chatbot information that it can learn from in turn, helping it to provide answers that are unique to a specific business. For example, it could upload responses to the most common questions received, and the chatbot will not only provide this information to potential clients and customers that ask those questions, but will adapt them to the client’s unique situation. This not only improves efficiency but also enhances the customer experience.

IT innovation doesn’t take a single form. Because there are so many different ways to take advantage of innovative technology solutions, the IT innovation types can be broadly broken down into two different categories, but even these aren’t definitive.

Businesses are always looking for ways to enhance the products and services that they offer, and using innovative IT solutions to both pinpoint new product offerings or enhance the services that companies are already specialised in can setting in an increasingly competitive market space. Using IT innovation in product development can involve finding new ways to analyse data to get more meaningful insights, finding ways to incorporate solutions into technologies like apps, smart watches, or IoT devices.

The second category of IT innovation is improving the existing processes within companies. By taking advantage of innovative technologies, they can enhance their internal operations and help the humans behind business to work smarter, not necessarily harder. This will see efficiency at an all-time high, and more being done in less time. Some examples of ways that innovation can improve processes include using machine learning and AI to automate tasks, streamlining workflows, and both simplifying and enhancing data management.

Internet: <www.solidsystems.co.za> (adapted).

The text breaks down IT innovation into two categories that can be summarized as
 

Provas

Questão presente nas seguintes provas