Questões sobre Interpretação de Texto

Lista completa de Questões sobre Interpretação de Texto para resolução totalmente grátis. Selecione os assuntos no filtro de questões e comece a resolver exercícios.

Judge the following items according to text 19A3BBB.

In the second paragraph, the word “subsumed” (l.20) means included.

  • C. Certo
  • E. Errado

De acordo com o texto e no contexto do Brexit (saída do Reino Unido da União Europeia), a grande maioria dos irlandeses deseja permanecer na União Europeia.

De acordo com o texto e no contexto do Brexit (saída do Reino Unido da União Europeia), a grande maioria dos irlandeses deseja permanecer na União Europeia.

  • C. Certo
  • E. Errado

Considering the text, it is possible to say that:

I. Having bad thoughts can be dangerous for people who cannot control themselves.

II. Accepting negative thoughts can help to minimize their effects.

III. Most people who have negative thoughts had a bad experience during childhood.

IV. Seeing a therapist can help people to recover from the effects of negative thoughts.

Which of them are correct?

  • A. Only II.
  • B. Only IV.
  • C. Only I and II.
  • D. Only I, II and III.
  • E. Only II, III and IV.

Which of the following questions can be answered based on the text?

  • A. How long does a person need to get over bad thoughts?
  • B. What can you do to not start thinking about bad things?
  • C. What may be the cause of negative thoughts?
  • D. How many people suffer from negative thoughts in the world?
  • E. If you are a happy person, is it easy to avoid having bad thoughts?

Analyse the statements about some expressions of the text, marking true (T) or false (F).

( ) The word ‘flimsy’ (l.07) could be replaced by ‘strong’ without changing the meaning of the utterance.

( ) The expression ‘jewel-like beauty’ (l.13) means that the covers resemble the beauty of jewellery.

( ) The author uses the expressions “more cloth, more foil, more embossing, page staining, sewn bindings, deckled edges” (l.14-15) to describe the perfect cover in his opinion.

( ) Without considering the context, it is possible to translate the expression ‘lightbulb moment’ (l.37) as ‘momento de inspiração’.

The correct and respective order is:

  • A. F – T – F – T.
  • B. T – F – T – F.
  • C. T – T – F – F.
  • D. F – F – T – T.
  • E. F – F – F – T.

Consider the following statements about the text:

I. Nowadays people pay more attention to how a book looks like than before. This popularity of beautiful covers and books is a characteristic of the last few years.

II. According to the author, the success of book sales is only related to the design of their covers.

III. The author mentions that when there is an effort to design a beautiful cover it indicates that the content of the book may also be important.

Which ones are in agreement with the text?

  • A. Only I.
  • B. Only II.
  • C. Only III.
  • D. Only I and II.
  • E. Only I and III.

The purpose of most backup policies is to create a copy of data so that a particular file or application may be restored after data is lost, corrupted, deleted or a disaster strikes. Thus, backup is not the goal, but rather it is one means to accomplish the goal of protecting data. Testing backups is just as important as backing up and restoring data. Backup applications have long offered several types of backup operations. Two of the most common backup types are described below.

I. This operation will result in copying only the data that has changed since the last backup operation of any type. The modified time stamp on files is typically used and compared to the time stamp of the last backup. Backup applications track and record the date and time that backup operations occur in order to track files modified since these operations. Because this backup will only copy data since the last backup of any type, it may be run as often as desired, with only the most recent changes stored.

II. This type of backup makes a copy of all data to another set of media, which can be tape, disk or a DVD or CD. The primary advantage to performing this backup during every operation is that a complete copy of all data is available with a single set of media. This results in a minimal time to restore data, a metric known as a Recovery Time Objective (RTO).

The backup types I and II are, respectivelly,

  • A. Full backup − Differential backup.
  • B. Mirroring backup − Full backup.
  • C. Incremental backup − Full backup.
  • D. Differential backup − Mirroring backup.
  • E. Reverse backup − Continuous Data Protection backup.

Consider the text below.

Client computers provide an interface to allow a computer user to request services of the server and to display the results the server returns. Servers wait for requests to arrive from clients and then respond to them. Ideally, a server provides a standardized transparent interface to clients so that clients need not be aware of the specifics of the system (i.e., the hardware and software) that is providing the service. Clients are often situated at workstations or on personal computers, while servers are located elsewhere on the network, usually on more powerful machines. This computing model is especially effective when clients and the server each have distinct tasks that they routinely perform.

The text defines

  • A. the mainframe-based model.
  • B. the client-server architecture.
  • C. a private network based on TCP/IP protocols.
  • D. an intranet designed to allow client and server to share information and resources.
  • E. the peer-to-peer network based on client/server model.

Consider the figure below.

The correct way to describe the main concepts showing by the figure is:

  • A. If someone wants to send a private message, he gets the secret key (directly from the receiver in an e-mail) and use it to encrypt the message. For a message back to the sender, the receiver grab his secret key and encrypt with that. So all the encrypting is done with the secret keys, and all the decrypting is done with the corresponding public keys.
  • B. There's one major benefit to doing encryption this way: there is no need to send anything secret over an insecure channel. The public key goes out to the world, but it's not secret and it doesn't need to be. The private key can stay safe on a personal computer, where it was generated.
  • C. The secret key cryptography method, also called asymmetric encryption, employs a secret key for both encryption and decryption. The sender uses the key to encrypt the plain message and sends the encrypted message to the receiver. The receiver applies the same key to decrypt the message and recover the plain message.
  • D. Hash algorithms are typically used to provide a digital fingerprint of a plain message contents, often used to ensure that the message has been altered by an intruder or virus. Using public and secret keys, hash functions, then, provide a measure of the corruption of a message.
  • E. The public key cryptography method, also called symmetric encryption, employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key. One key is used to encrypt the plain message and the other key is used to decrypt the cipher text.

Na tirinha, a expressão “put up with” significa

  • A. decidir.
  • B. tolerar.
  • C. ignorar.
  • D. concentrar.
  • E. abandonar.
Provas e Concursos

O Provas e Concursos é um banco de dados de questões de concursos públicos organizadas por matéria, assunto, ano, banca organizadora, etc

{TITLE}

{CONTENT}

{TITLE}

{CONTENT}
Provas e Concursos
0%
Aguarde, enviando solicitação!

Aguarde, enviando solicitação...