Magna Concursos

Foram encontradas 45.526 questões.

3849126 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the excerpt below and answer the question that follows.

“Reflective practice is often praised as a cornerstone of teacher development, ___ it may also generate discomfort, since it forces educators to question long-held beliefs about their professional identity.”

Which conjunction best completes the sentence, preserving the intended meaning of contrast and concession within an academic register?
 

Provas

Questão presente nas seguintes provas
3849125 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 2 and answer question
Text 2
The concept of World Englishes highlights the diversification of English into different and locally grounded varieties. Rather than being seen as mere deviations from a single “standard,” forms such as Indian English or Nigerian English show how English adapts to sociolinguistic contexts shaped by multilingualism and postcolonial histories. These localized varieties differ in vocabulary, pronunciation, pragmatics, and even grammar, yet remain systematic and rule-governed. Recognizing this reality questions the idea of a single, uniform English and reframes the language as having multiple centers of influence. For teaching, this means that instead of promoting only one model, English education should engage critically with linguistic diversity and with the social and cultural values attached to different varieties.
Source: Kachru, Braj B., Kachru, Yamuna, Nelson, Cecil L. The Handbook of World Englishes. Australia: Blackwell Publishin. 2006. (Adapted)
Pedagogically, the recognition of English as pluricentric entails that:
 

Provas

Questão presente nas seguintes provas
3849124 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 2 and answer question
Text 2
The concept of World Englishes highlights the diversification of English into different and locally grounded varieties. Rather than being seen as mere deviations from a single “standard,” forms such as Indian English or Nigerian English show how English adapts to sociolinguistic contexts shaped by multilingualism and postcolonial histories. These localized varieties differ in vocabulary, pronunciation, pragmatics, and even grammar, yet remain systematic and rule-governed. Recognizing this reality questions the idea of a single, uniform English and reframes the language as having multiple centers of influence. For teaching, this means that instead of promoting only one model, English education should engage critically with linguistic diversity and with the social and cultural values attached to different varieties.
Source: Kachru, Braj B., Kachru, Yamuna, Nelson, Cecil L. The Handbook of World Englishes. Australia: Blackwell Publishin. 2006. (Adapted)
In line with the text, the notion of World Englishes primarily challenges:
 

Provas

Questão presente nas seguintes provas
3849123 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
Based on the provided text, which of the following practices is considered a proactive measure for enhancing digital security?
 

Provas

Questão presente nas seguintes provas
3849122 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
What is the difference between “credential stuffing” and how fraudsters exploit “derivations” to gain access?
 

Provas

Questão presente nas seguintes provas
3849121 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: UEPB
Orgão: Pref. São Francisco-PB
Provas:
Read the text 1 to answer question.
Text 1
How Scammers Exploit Variations of Your Logins
The first you know about it is when a scammer accesses one of your accounts. You've been careful with your details, but you've made a mistake: recycling part of your password. Reusing the same word, even if altered with numbers or symbols, gives criminals an open door.
An ethical “white hat” hacker named Brandyn Murtagh says information obtained through data breaches on sites such as DropBox and Tumblr and through cyber-attacks has been circulating on the internet for some time. Using this info, criminals try to log into other websites using the exact hacked passwords—a practice called credential stuffing. But in some cases they do not just try the exact passwords from the hacked data: as well as credential stuffing, the fraudsters also attempt to access accounts with derivations of the hacked password. For example, if your password was “Guardian,” they might automatically try “Guardian1” or “Guardian!”. According to Virgin Media O2, four out of five people use the same or similar passwords, making this a major vulnerability.
What the scam looks like. The criminals use scripts – automated sets of instructions for the computer – to go through variations of the passwords in an attempt to access other accounts. This can happen on an industrial scale, says Murtagh. “It's very rare that you are targeted as an individual – you are [usually] in a group of thousands of people that are getting targeted. These processes scale just like they would in business,” he says. You might be alerted by messages saying that you have been trying to change your email address or other details connected to an account.
To protect yourself, Murtagh recommends three key steps:
1. Change variations: Immediately change any passwords that use the same root word, starting with your most important accounts: banking, email, work, and mobile.
2. Use password managers: These tools, often built into web browsers, can suggest and save complex, unique passwords.
3. Enable 2FA/MFA: Two- or multi-factor authentication adds a second login step, making it much harder for a scammer to get in.
Source: https://www.theguardian.com/money/2025/sep/14/password1-scammers-logins-two-step-verification-hackers Accessed on: 09.17.2025 (Adapted)
According to the text, what is the CORRECT definition to “ derivation” of a password in the context of a scam?
 

Provas

Questão presente nas seguintes provas
3848305 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
For beginners, the use of TPR (Total Physical Response) is effective because it:
 

Provas

Questão presente nas seguintes provas
3848304 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
According to many researchers in ESL, what are the best reading strategies for beginners?
 

Provas

Questão presente nas seguintes provas
3848296 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
Consider the statements about strategies for teaching beginners in English:

I.The use of visual aids and gestures facilitates comprehension by reducing dependence on verbal code.
II.Teaching complex grammar rules from the beginning is essential to avoid future errors.
III.Promoting pair and small group activities encourages practical language use and oral fluency development.

Which is correct?
 

Provas

Questão presente nas seguintes provas
3848295 Ano: 2025
Disciplina: Inglês (Língua Inglesa)
Banca: FURB
Orgão: FURB
Provas:
The term "scaffolding" means:
 

Provas

Questão presente nas seguintes provas