sexta-feira, 31 de março de 2017

FCC/2009 – TRE/PI – TÉCNICO JUDICIÁRIO – LÍNGUA INGLESA – CONCURSO PÚBLICO – PROVA COM GABARITO

www.inglesparaconcursos.blog.br

❑ PROVA DE LÍNGUA INGLESA:

• FCC-2009-Tribunal Regional Eleitoral do Piauí-TÉCNICO JUDICIÁRIO-01/07/2009.

❑ ESTRUTURA-PROVA:

 5 MCQs (Multiple Choice Questions) / 5 Options Each Question.
 Texto – | China Orders Patches to Planned Web Filter| The New York Times |


 TEXTOPara responder às questões de números 66 a 70 considere o texto a seguir.

June 16, 2009
China Orders Patches to Planned Web Filter
By EDWARD WONG

BEIJING − A designer of censorship software that the Chinese government requires to be preinstalled on computers sold in China has been ordered to fix potential security breaches in the software, the newspaper China Daily reported Monday. The report was an indication that the government still supports use of the software _[CONNECTOR]_ heated debate over it.

The software, called Green Dam-Youth Escort, has come under attack by many computer users in China for both political and technical reasons.

Critics say that although the Chinese government insists that the software will be used only to block access to pornography Web sites, the software’s actual use will be to block any site with content deemed politically objectionable, like the Tibet issue or the 1989 Tiananmen killings.

The government says all computers sold in China must have the software installed by July 1.

Early reports had indicated that the government might simply require Green Dam to be included on a CD packaged with new computers, so users would have the option to install it. But it became apparent last week that the government was insisting that all computer makers preinstall the software by July 1. Foreign computer makers learned of the directive just three weeks ago and have been asking the Chinese government to reconsider the rules.

Some computer experts who have studied the software said last week that it was so flawed that it could allow hackers to monitor a user’s Internet activity, steal personal data or plant viruses. One expert, J. Alex Halderman, a computer science professor at the University of Michigan, has posted on the Internet a report on Green Dam’s vulnerabilities.

Rather than agreeing to scrap the software altogether, the Chinese government has responded to the technical criticisms by ordering that the potential security breaches be eliminated.

Mr. Halderman said in an interview last week that it had only taken a few hours for him and his students to infiltrate a computer loaded with Green Dam and force it to crash. A skilled hacker could take over the computer to mine personal data or hitch it to other infected machines in a malevolent network known as a botnet, he added.
(Adapted from The New York Times, June 16, 2009)
 TRADUÇÃO-TEXTO:
China Orders Patches to Planned Web Filter
China encomenda patches para filtro da Web planejado
By EDWARD WONG
BEIJING − A designer of censorship software that the Chinese government requires to be preinstalled on computers sold in China has been ordered to fix potential security breaches in the software, the newspaper China Daily reported Monday. PEQUIM - Um designer de software de censura que o governo chinês exige que seja pré-instalado em computadores vendidos na China recebeu ordens para corrigir possíveis falhas de segurança no software, informou o jornal China Daily na segunda-feira.

The report was an indication that the government still supports use of the software _[CONNECTOR]_ heated debate over it. O relatório foi uma indicação de que o governo ainda apoia o uso do software _[CONNECTOR]_ debate acalorado sobre ele.

The software, called Green Dam-Youth Escort, has come under attack by many computer users in China for both political and technical reasons. O software, chamado Green Dam-Youth Escort, tem sido atacado por muitos usuários de computador na China por razões políticas e técnicas.

Critics say that although the Chinese government insists that the software will be used only to block access to pornography Web sites, the software’s actual use will be to block any site with content deemed politically objectionable, like the Tibet issue or the 1989 Tiananmen killings. Os críticos dizem que, embora o governo chinês insista que o software será usado apenas para bloquear o acesso a sites pornográficos, a utilização real do software será bloquear qualquer site com conteúdo considerado politicamente censurável, como a questão do Tibete ou os assassinatos de Tiananmen em 1989.

The government says all computers sold in China must have the software installed by July 1. O governo diz que todos os computadores vendidos na China devem ter o software instalado até 1º de julho.

Early reports had indicated that the government might simply require Green Dam to be included on a CD packaged with new computers, so users would have the option to install it. Os primeiros relatórios indicavam que o governo poderia simplesmente exigir que o Green Dam fosse incluído em um CD que acompanhasse os novos computadores, para que os usuários tivessem a opção de instalá-lo. 

But it became apparent last week that the government was insisting that all computer makers preinstall the software by July 1. Mas tornou-se evidente na semana passada que o governo estava a insistir que todos os fabricantes de computadores pré-instalassem o software até 1 de Julho.

Foreign computer makers learned of the directive just three weeks ago and have been asking the Chinese government to reconsider the rules. Os fabricantes estrangeiros de computadores tomaram conhecimento da diretiva há apenas três semanas e têm pedido ao governo chinês que reconsidere as regras.

Some computer experts who have studied the software said last week that it was so flawed that it could allow hackers to monitor a user’s Internet activity, steal personal data or plant viruses. Alguns especialistas em informática que estudaram o software disseram na semana passada que ele era tão falho que poderia permitir que hackers monitorassem a atividade de um usuário na Internet, roubassem dados pessoais ou plantassem vírus.

One expert, J. Alex Halderman, a computer science professor at the University of Michigan, has posted on the Internet a report on Green Dam’s vulnerabilities. Um especialista, J. Alex Halderman, professor de ciência da computação na Universidade de Michigan, publicou na Internet um relatório sobre as vulnerabilidades da Green Dam.

Rather than agreeing to scrap the software altogether, the Chinese government has responded to the technical criticisms by ordering that the potential security breaches be eliminated. Em vez de concordar em eliminar totalmente o software, o governo chinês respondeu às críticas técnicas ordenando que as potenciais violações de segurança fossem eliminadas.

Mr. Halderman said in an interview last week that it had only taken a few hours for him and his students to infiltrate a computer loaded with Green Dam and force it to crash. Halderman disse em uma entrevista na semana passada que levou apenas algumas horas para ele e seus alunos se infiltrarem em um computador carregado com Green Dam e forçá-lo a travar.

A skilled hacker could take over the computer to mine personal data or hitch it to other infected machines in a malevolent network known as a botnet, he added. Um hacker habilidoso poderia assumir o controle do computador para extrair dados pessoais ou associá-los a outras máquinas infectadas em uma rede malévola conhecida como botnet, acrescentou.

66 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

The correct [CONNECTOR] to fill the blank is

(A) however.
(B) since.
(C) while.
(D) despite.
(E) because.

👍 Comentários e Gabarito  D :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
The correct [CONNECTOR] to fill the blank is
*Alternativa (A): however.(mas)
*Alternativa (B): since.(desde)
*Alternativa (C): while.(enquanto)
*Alternativa (D): despite.(apesar)
*Alternativa (E): because.(porque)
➧IDEIA CONTEXTUAL de contra ponto: DESPITE.
"[...] The report was an indication that the government still supports use of the software _____ heated debate over it."
(O relatório foi uma indicação de que o governo ainda apóia o uso do software, apesar do acalorado debate sobre ele.)

67 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

The meaning of actual in the text is 

(A) further.
(B) present.
(C) real.
(D) up-to-date.
(E) new.

👍 Comentários e Gabarito  C :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
The meaning of actual in the text is 
*Alternativa (A): further.
*Alternativa (B): present.
*Alternativa (C): real.
*Alternativa (D): up-to-date.
*Alternativa (E): new.

68 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

One can infer from the text that

(A) there is consensus in China about the use of Green Dam.
(B) the Chinese government claims that Green Dam will not be used for political purposes.
(C) the Green Dam has been designed to block chiefly Chinese pornographic sites.
(D) foreign computer makers have refused to preinstall Green dam in their machines.
(E) the Chinese government does not expect users to refuse to install Green Dam.

👍 Comentários e Gabarito  B :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
One can infer from the text that
*Alternativa (A): there is consensus in China about the use of Green Dam.
*Alternativa (B): the Chinese government claims that Green Dam will not be used for political purposes.
*Alternativa (C): the Green Dam has been designed to block chiefly Chinese pornographic sites.
*Alternativa (D): foreign computer makers have refused to preinstall Green dam in their machines.
*Alternativa (E): the Chinese government does not expect users to refuse to install Green Dam.
 
69 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

According to the text,

(A) China will have Green Dam’s vulnerabilities fixed instead of scrapping it.
(B) Green Dam allows users to keep track of their Internet accesses.
(C) Green Dam is equipped to detect malicious software.
(D) Green Dam’s vulnerabilities have not all been identified yet.
(E) the Chinese government has ordered all technical criticisms to be taken back.

👍 Comentários e Gabarito  A :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
According to the text,
*Alternativa (A): China will have Green Dam’s vulnerabilities fixed instead of scrapping it.
*Alternativa (B): Green Dam allows users to keep track of their Internet accesses.
*Alternativa (C): Green Dam is equipped to detect malicious software.
*Alternativa (D): Green Dam’s vulnerabilities have not all been identified yet.
*Alternativa (E): the Chinese government has ordered all technical criticisms to be taken back.
 
70 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

Mr.Halderman

(A) has succeeded in eliminating all Green Dam’s security breaches.
(B) has ordered his students to try to create a botnet with a machine loaded with Green Dam.
(C) and his students managed to identify all malicious consequences of using Green Dam.
(D) crashed a machine loaded with Green Dam to prove how skilled his students were.
(E) said that it would be possible to mine a user’s personal data in a computer loaded with Green Dam.

👍 Comentários e Gabarito  E :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
Mr.Halderman...
*Alternativa (A): has succeeded in eliminating all Green Dam’s security breaches.(conseguiu eliminar todas as violações de segurança de Green Dam.)
*Alternativa (B): has ordered his students to try to create a botnet with a machine loaded with Green Dam.(ordenou que seus alunos tentassem criar um botnet com uma máquina carregada com Green Dam.)
*Alternativa (C): and his students managed to identify all malicious consequences of using Green Dam.(e seus alunos conseguiram identificar todas as consequências maliciosas do uso de Green Dam.)
*Alternativa (D): crashed a machine loaded with Green Dam to prove how skilled his students were.(quebrou uma máquina carregada com Green Dam para provar o quão habilidosos seus alunos eram.)
*Alternativa (E): said that it would be possible to mine a user’s personal data in a computer loaded with Green Dam.(disse que seria possível minerar os dados pessoais de um usuário em um computador carregado com Green Dam.)

Nenhum comentário:

Postar um comentário