Magna Concursos

Foram encontradas 86 questões.

857561 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: TCE-PR
Provas:

Text 8A5BBB

The requirements of information security within an organization have undergone two major changes in the last several decades. Before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means. An example of the former is the use of rugged filing cabinets with a combination lock for storing sensitive documents. An example of the latter is personnel screening procedures used during the hiring process.

With the introduction of the computer, the need for automated tools for protecting files and other information stored on the computer became evident. This is especially the case for a shared system, such as a time-sharing system, and the need is even more acute for systems that can be accessed over a public telephone network, data network, or the Internet. The generic name for the collection of tools designed to protect data and to thwart hackers is computer security.

The second major change that affected security is the introduction of distributed systems and the use of networks and communications facilities for carrying data between terminal user and computer and between computer and computer. Network security measures are needed to protect data during their transmission. In fact, the term network security is somewhat misleading, because virtually all business, government, and academic organizations interconnect their data processing equipment with a collection of interconnected networks. Such a collection is often referred to as an internet, and the term internet security is used.

William Stallings. Introduction. In: Cryptography and network security: principles and practice. 3rd ed. New Jersey: Prentice Hall, 2002, p. 2 (adapted).

In text 8A5BBB, the word “former” refers to

 

Provas

Questão presente nas seguintes provas
857560 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: TCE-PR
Provas:

Text 8A5BBB

The requirements of information security within an organization have undergone two major changes in the last several decades. Before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means. An example of the former is the use of rugged filing cabinets with a combination lock for storing sensitive documents. An example of the latter is personnel screening procedures used during the hiring process.

With the introduction of the computer, the need for automated tools for protecting files and other information stored on the computer became evident. This is especially the case for a shared system, such as a time-sharing system, and the need is even more acute for systems that can be accessed over a public telephone network, data network, or the Internet. The generic name for the collection of tools designed to protect data and to thwart hackers is computer security.

The second major change that affected security is the introduction of distributed systems and the use of networks and communications facilities for carrying data between terminal user and computer and between computer and computer. Network security measures are needed to protect data during their transmission. In fact, the term network security is somewhat misleading, because virtually all business, government, and academic organizations interconnect their data processing equipment with a collection of interconnected networks. Such a collection is often referred to as an internet, and the term internet security is used.

William Stallings. Introduction. In: Cryptography and network security: principles and practice. 3rd ed. New Jersey: Prentice Hall, 2002, p. 2 (adapted).

According to text 8A5BBB, a shared system

 

Provas

Questão presente nas seguintes provas
857559 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: TCE-PR
Provas:

Text 8A5BBB

The requirements of information security within an organization have undergone two major changes in the last several decades. Before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means. An example of the former is the use of rugged filing cabinets with a combination lock for storing sensitive documents. An example of the latter is personnel screening procedures used during the hiring process.

With the introduction of the computer, the need for automated tools for protecting files and other information stored on the computer became evident. This is especially the case for a shared system, such as a time-sharing system, and the need is even more acute for systems that can be accessed over a public telephone network, data network, or the Internet. The generic name for the collection of tools designed to protect data and to thwart hackers is computer security.

The second major change that affected security is the introduction of distributed systems and the use of networks and communications facilities for carrying data between terminal user and computer and between computer and computer. Network security measures are needed to protect data during their transmission. In fact, the term network security is somewhat misleading, because virtually all business, government, and academic organizations interconnect their data processing equipment with a collection of interconnected networks. Such a collection is often referred to as an internet, and the term internet security is used.

William Stallings. Introduction. In: Cryptography and network security: principles and practice. 3rd ed. New Jersey: Prentice Hall, 2002, p. 2 (adapted).

Choose the option that presents the statement that best conveys the central idea of text 8A5BBB.

 

Provas

Questão presente nas seguintes provas
857558 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: TCE-PR
Provas:

Text 8A5AAA

Although the basic concepts of cryptography predate the Greeks, the present word cryptography, used to describe the art of secret communication, comes from the Greek meaning “secret writing”. From its rather simple beginnings, cryptography has grown in tandem with technology and its importance has also similarly grown. Just as in its early days, good cryptographic prowess still wins wars.

As we get dragged more and more into the new information society, faceless digital communication regimes are guaranteeing neither information and personal security nor personal privacy. The technological and communications revolution has further resulted in massive global surveillance of millions of individuals by either their governments or private companies; the fight for personal privacy has never been any fiercer, and the integrity and confidentiality of data have become more urgent than ever before. The security and trust of digital transaction systems have become of critical importance as more and more organizations and businesses join the e-commerce train. The very future of global commerce is at stake in this new information society unless the security of e-commerce can be guaranteed.

Cryptography is being increasingly used to fight off this massive invasion of individual privacy and security, to guarantee data integrity and confidentiality, and to bring trust in global e-commerce. Cryptography has become the main tool for providing the needed digital security in the modern digital communication medium that far exceeds the kind of security that was offered by any medium before it.

Joseph Migga Kiza. Cryptography. In: Computer network security. Chattanooga: Springer, 2005, p. 257-8 (adapted.

In text 8A5AAA, the word “unless” conveys the idea of

 

Provas

Questão presente nas seguintes provas
857557 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: TCE-PR
Provas:

Text 8A5AAA

Although the basic concepts of cryptography predate the Greeks, the present word cryptography, used to describe the art of secret communication, comes from the Greek meaning “secret writing”. From its rather simple beginnings, cryptography has grown in tandem with technology and its importance has also similarly grown. Just as in its early days, good cryptographic prowess still wins wars.

As we get dragged more and more into the new information society, faceless digital communication regimes are guaranteeing neither information and personal security nor personal privacy. The technological and communications revolution has further resulted in massive global surveillance of millions of individuals by either their governments or private companies; the fight for personal privacy has never been any fiercer, and the integrity and confidentiality of data have become more urgent than ever before. The security and trust of digital transaction systems have become of critical importance as more and more organizations and businesses join the e-commerce train. The very future of global commerce is at stake in this new information society unless the security of e-commerce can be guaranteed.

Cryptography is being increasingly used to fight off this massive invasion of individual privacy and security, to guarantee data integrity and confidentiality, and to bring trust in global e-commerce. Cryptography has become the main tool for providing the needed digital security in the modern digital communication medium that far exceeds the kind of security that was offered by any medium before it.

Joseph Migga Kiza. Cryptography. In: Computer network security. Chattanooga: Springer, 2005, p. 257-8 (adapted.

It can be said from text 8A5AAA that cryptography and technology have

 

Provas

Questão presente nas seguintes provas
857556 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: TCE-PR
Provas:

Text 8A5AAA

Although the basic concepts of cryptography predate the Greeks, the present word cryptography, used to describe the art of secret communication, comes from the Greek meaning “secret writing”. From its rather simple beginnings, cryptography has grown in tandem with technology and its importance has also similarly grown. Just as in its early days, good cryptographic prowess still wins wars.

As we get dragged more and more into the new information society, faceless digital communication regimes are guaranteeing neither information and personal security nor personal privacy. The technological and communications revolution has further resulted in massive global surveillance of millions of individuals by either their governments or private companies; the fight for personal privacy has never been any fiercer, and the integrity and confidentiality of data have become more urgent than ever before. The security and trust of digital transaction systems have become of critical importance as more and more organizations and businesses join the e-commerce train. The very future of global commerce is at stake in this new information society unless the security of e-commerce can be guaranteed.

Cryptography is being increasingly used to fight off this massive invasion of individual privacy and security, to guarantee data integrity and confidentiality, and to bring trust in global e-commerce. Cryptography has become the main tool for providing the needed digital security in the modern digital communication medium that far exceeds the kind of security that was offered by any medium before it.

Joseph Migga Kiza. Cryptography. In: Computer network security. Chattanooga: Springer, 2005, p. 257-8 (adapted.

Text 8A5AAA states that digital communication regimes in the new information society

 

Provas

Questão presente nas seguintes provas
857555 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: TCE-PR
Provas:

Text 8A5AAA

Although the basic concepts of cryptography predate the Greeks, the present word cryptography, used to describe the art of secret communication, comes from the Greek meaning “secret writing”. From its rather simple beginnings, cryptography has grown in tandem with technology and its importance has also similarly grown. Just as in its early days, good cryptographic prowess still wins wars.

As we get dragged more and more into the new information society, faceless digital communication regimes are guaranteeing neither information and personal security nor personal privacy. The technological and communications revolution has further resulted in massive global surveillance of millions of individuals by either their governments or private companies; the fight for personal privacy has never been any fiercer, and the integrity and confidentiality of data have become more urgent than ever before. The security and trust of digital transaction systems have become of critical importance as more and more organizations and businesses join the e-commerce train. The very future of global commerce is at stake in this new information society unless the security of e-commerce can be guaranteed.

Cryptography is being increasingly used to fight off this massive invasion of individual privacy and security, to guarantee data integrity and confidentiality, and to bring trust in global e-commerce. Cryptography has become the main tool for providing the needed digital security in the modern digital communication medium that far exceeds the kind of security that was offered by any medium before it.

Joseph Migga Kiza. Cryptography. In: Computer network security. Chattanooga: Springer, 2005, p. 257-8 (adapted).

Text 8A5AAA shows that cryptography has

 

Provas

Questão presente nas seguintes provas
Texto CB1A1AAA
O processo de investigação e combate à corrupção que o Brasil experimenta hoje tem sido acompanhado da circulação de toda sorte de discursos sobre o tema, elaborados por diversos agentes sociais que disputam a atenção e o convencimento dos participantes da esfera pública. A maior parte desses discursos não está preocupada em refletir sobre as causas e as consequências da corrupção, mas sim em apresentar uma série de afirmações fortes sobre seu combate.
O nosso debate público parece marcado por um excesso de certezas e muito poucas dúvidas sobre a corrupção, exatamente o oposto da situação imperante no campo dos estudos acadêmicos sobre esse assunto. Dizem especialistas em corrupção que a pesquisa sobre o tema é muito recente e ainda não produziu resultados conclusivos. Não há receitas prontas para combater a corrupção nos diversos países; tampouco há uma definição clara sobre que tipo de ação se deve considerar corrupção.
Para ficar apenas em um exemplo, o conceito de corrupção como abuso da função pública para obter fins privados tem sido questionado, com a proposta de que o termo “corrupção” passe a incluir práticas que não se refiram ao Estado e não envolvam funcionários públicos — por exemplo, práticas consideradas lícitas que buscam influenciar o mercado, como o lobby, e o financiamento de campanha. Alguns autores questionam se a legalização dessas práticas não produziu uma situação na qual interesses econômicos terminam simplesmente reconhecidos pelas leis, em uma verdadeira legalização de práticas antes consideradas corruptas por permitirem a influência privada sobre os agentes públicos.
Além disso, o suposto sucesso de receitas de boa governança contra a corrupção, hoje indicadas por organizações internacionais como o Banco Mundial, tem sido relativizado por análises qualitativas que apontam para a necessidade de se conhecer cada contexto social antes de se pensar nas medidas anticorrupção e estratégias destinadas a implementá-las.
José Rodrigo Rodriguez. Contra o fanatismo textualista: corrupção,
jeitinho brasileiro e estado de direito. In: Novos Estudos CEBRAP,
edição 104, mar./2016, p. 61-2 (com adaptações).
Em cada uma das opções a seguir é apresentada uma proposta de reescrita para o seguinte período do texto CB1A1AAA: “Não há receitas prontas para combater a corrupção nos diversos países; tampouco há uma definição clara sobre que tipo de ação se deve considerar corrupção.” Assinale a opção em que a reescrita apresentada mantém a correção gramatical e o sentido original do período.
 

Provas

Questão presente nas seguintes provas
Texto CB1A1AAA
O processo de investigação e combate à corrupção que o Brasil experimenta hoje tem sido acompanhado da circulação de toda sorte de discursos sobre o tema, elaborados por diversos agentes sociais que disputam a atenção e o convencimento dos participantes da esfera pública. A maior parte desses discursos não está preocupada em refletir sobre as causas e as consequências da corrupção, mas sim em apresentar uma série de afirmações fortes sobre seu combate.
O nosso debate público parece marcado por um excesso de certezas e muito poucas dúvidas sobre a corrupção, exatamente o oposto da situação imperante no campo dos estudos acadêmicos sobre esse assunto. Dizem especialistas em corrupção que a pesquisa sobre o tema é muito recente e ainda não produziu resultados conclusivos. Não há receitas prontas para combater a corrupção nos diversos países; tampouco há uma definição clara sobre que tipo de ação se deve considerar corrupção.
Para ficar apenas em um exemplo, o conceito de corrupção como abuso da função pública para obter fins privados tem sido questionado, com a proposta de que o termo “corrupção” passe a incluir práticas que não se refiram ao Estado e não envolvam funcionários públicos — por exemplo, práticas consideradas lícitas que buscam influenciar o mercado, como o lobby, e o financiamento de campanha. Alguns autores questionam se a legalização dessas práticas não produziu uma situação na qual interesses econômicos terminam simplesmente reconhecidos pelas leis, em uma verdadeira legalização de práticas antes consideradas corruptas por permitirem a influência privada sobre os agentes públicos.
Além disso, o suposto sucesso de receitas de boa governança contra a corrupção, hoje indicadas por organizações internacionais como o Banco Mundial, tem sido relativizado por análises qualitativas que apontam para a necessidade de se conhecer cada contexto social antes de se pensar nas medidas anticorrupção e estratégias destinadas a implementá-las.
José Rodrigo Rodriguez. Contra o fanatismo textualista: corrupção,
jeitinho brasileiro e estado de direito. In: Novos Estudos CEBRAP,
edição 104, mar./2016, p. 61-2 (com adaptações).
No que se refere às ideias expressas no texto CB1A1AAA, assinale a opção correta.
 

Provas

Questão presente nas seguintes provas
Carla, que planeja viajar daqui a seis meses, realizará, a partir de hoje, seis depósitos mensais de R$ 2.000 em uma conta que rende 1% de juros líquidos ao mês, para custear as despesas da viagem programada para durar seis meses. Durante a viagem, ela pretende realizar seis saques mensais e iguais da conta em questão. A viagem ocorrerá no mês seguinte ao último depósito, ocasião em que fará o primeiro saque.
Nessa situação hipotética, considerando-se 1,0615 como valor aproximado para (1,01)6 , o valor do saque mensal que esgotará o saldo da conta após o sexto saque é igual a
 

Provas

Questão presente nas seguintes provas