sexta-feira, 31 de março de 2017

FCC 2009 – TRE/PI – TÉCNICO JUDICIÁRIO – LÍNGUA INGLESA

www.inglesparaconcursos.blog.br

❑ PROVA DE LÍNGUA INGLESA:

• FCC-2009-Tribunal Regional Eleitoral do Piauí-TÉCNICO JUDICIÁRIO-01/07/2009.

❑ ESTRUTURA-PROVA:

 5 MCQs (Multiple Choice Questions) / 5 Options Each Question.
 Texto – | China Orders Patches to Planned Web Filter| The New York Times |


 TEXTOPara responder às questões de números 66 a 70 considere o texto a seguir.

June 16, 2009
China Orders Patches to Planned Web Filter
By EDWARD WONG

BEIJING − A designer of censorship software that the Chinese government requires to be preinstalled on computers sold in China has been ordered to fix potential security breaches in the software, the newspaper China Daily reported Monday. The report was an indication that the government still supports use of the software _[CONNECTOR]_ heated debate over it.

The software, called Green Dam-Youth Escort, has come under attack by many computer users in China for both political and technical reasons.

Critics say that although the Chinese government insists that the software will be used only to block access to pornography Web sites, the software’s actual use will be to block any site with content deemed politically objectionable, like the Tibet issue or the 1989 Tiananmen killings.

The government says all computers sold in China must have the software installed by July 1.

Early reports had indicated that the government might simply require Green Dam to be included on a CD packaged with new computers, so users would have the option to install it. But it became apparent last week that the government was insisting that all computer makers preinstall the software by July 1. Foreign computer makers learned of the directive just three weeks ago and have been asking the Chinese government to reconsider the rules.

Some computer experts who have studied the software said last week that it was so flawed that it could allow hackers to monitor a user’s Internet activity, steal personal data or plant viruses. One expert, J. Alex Halderman, a computer science professor at the University of Michigan, has posted on the Internet a report on Green Dam’s vulnerabilities.

Rather than agreeing to scrap the software altogether, the Chinese government has responded to the technical criticisms by ordering that the potential security breaches be eliminated.

Mr. Halderman said in an interview last week that it had only taken a few hours for him and his students to infiltrate a computer loaded with Green Dam and force it to crash. A skilled hacker could take over the computer to mine personal data or hitch it to other infected machines in a malevolent network known as a botnet, he added.
(Adapted from The New York Times, June 16, 2009)
 TRADUÇÃO-TEXTO:
China Orders Patches to Planned Web Filter
China encomenda patches para filtro da Web planejado
By EDWARD WONG
BEIJING − A designer of censorship software that the Chinese government requires to be preinstalled on computers sold in China has been ordered to fix potential security breaches in the software, the newspaper China Daily reported Monday. PEQUIM - Um designer de software de censura que o governo chinês exige que seja pré-instalado em computadores vendidos na China recebeu ordens para corrigir possíveis falhas de segurança no software, informou o jornal China Daily na segunda-feira.

The report was an indication that the government still supports use of the software _[CONNECTOR]_ heated debate over it. O relatório foi uma indicação de que o governo ainda apoia o uso do software _[CONNECTOR]_ debate acalorado sobre ele.

The software, called Green Dam-Youth Escort, has come under attack by many computer users in China for both political and technical reasons. O software, chamado Green Dam-Youth Escort, tem sido atacado por muitos usuários de computador na China por razões políticas e técnicas.

Critics say that although the Chinese government insists that the software will be used only to block access to pornography Web sites, the software’s actual use will be to block any site with content deemed politically objectionable, like the Tibet issue or the 1989 Tiananmen killings. Os críticos dizem que, embora o governo chinês insista que o software será usado apenas para bloquear o acesso a sites pornográficos, a utilização real do software será bloquear qualquer site com conteúdo considerado politicamente censurável, como a questão do Tibete ou os assassinatos de Tiananmen em 1989.

The government says all computers sold in China must have the software installed by July 1. O governo diz que todos os computadores vendidos na China devem ter o software instalado até 1º de julho.

Early reports had indicated that the government might simply require Green Dam to be included on a CD packaged with new computers, so users would have the option to install it. Os primeiros relatórios indicavam que o governo poderia simplesmente exigir que o Green Dam fosse incluído em um CD que acompanhasse os novos computadores, para que os usuários tivessem a opção de instalá-lo. 

But it became apparent last week that the government was insisting that all computer makers preinstall the software by July 1. Mas tornou-se evidente na semana passada que o governo estava a insistir que todos os fabricantes de computadores pré-instalassem o software até 1 de Julho.

Foreign computer makers learned of the directive just three weeks ago and have been asking the Chinese government to reconsider the rules. Os fabricantes estrangeiros de computadores tomaram conhecimento da diretiva há apenas três semanas e têm pedido ao governo chinês que reconsidere as regras.

Some computer experts who have studied the software said last week that it was so flawed that it could allow hackers to monitor a user’s Internet activity, steal personal data or plant viruses. Alguns especialistas em informática que estudaram o software disseram na semana passada que ele era tão falho que poderia permitir que hackers monitorassem a atividade de um usuário na Internet, roubassem dados pessoais ou plantassem vírus.

One expert, J. Alex Halderman, a computer science professor at the University of Michigan, has posted on the Internet a report on Green Dam’s vulnerabilities. Um especialista, J. Alex Halderman, professor de ciência da computação na Universidade de Michigan, publicou na Internet um relatório sobre as vulnerabilidades da Green Dam.

Rather than agreeing to scrap the software altogether, the Chinese government has responded to the technical criticisms by ordering that the potential security breaches be eliminated. Em vez de concordar em eliminar totalmente o software, o governo chinês respondeu às críticas técnicas ordenando que as potenciais violações de segurança fossem eliminadas.

Mr. Halderman said in an interview last week that it had only taken a few hours for him and his students to infiltrate a computer loaded with Green Dam and force it to crash. Halderman disse em uma entrevista na semana passada que levou apenas algumas horas para ele e seus alunos se infiltrarem em um computador carregado com Green Dam e forçá-lo a travar.

A skilled hacker could take over the computer to mine personal data or hitch it to other infected machines in a malevolent network known as a botnet, he added. Um hacker habilidoso poderia assumir o controle do computador para extrair dados pessoais ou associá-los a outras máquinas infectadas em uma rede malévola conhecida como botnet, acrescentou.

66 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

The correct [CONNECTOR] to fill the blank is

(A) however.
(B) since.
(C) while.
(D) despite.
(E) because.

👍 Comentários e Gabarito  D :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
The correct [CONNECTOR] to fill the blank is
*Alternativa (A): however.(mas)
*Alternativa (B): since.(desde)
*Alternativa (C): while.(enquanto)
*Alternativa (D): despite.(apesar)
*Alternativa (E): because.(porque)
➧IDEIA CONTEXTUAL de contra ponto: DESPITE.
"[...] The report was an indication that the government still supports use of the software _____ heated debate over it."
(O relatório foi uma indicação de que o governo ainda apóia o uso do software, apesar do acalorado debate sobre ele.)

67 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

The meaning of actual in the text is 

(A) further.
(B) present.
(C) real.
(D) up-to-date.
(E) new.

👍 Comentários e Gabarito  C :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
The meaning of actual in the text is 
*Alternativa (A): further.
*Alternativa (B): present.
*Alternativa (C): real.
*Alternativa (D): up-to-date.
*Alternativa (E): new.

68 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

One can infer from the text that

(A) there is consensus in China about the use of Green Dam.
(B) the Chinese government claims that Green Dam will not be used for political purposes.
(C) the Green Dam has been designed to block chiefly Chinese pornographic sites.
(D) foreign computer makers have refused to preinstall Green dam in their machines.
(E) the Chinese government does not expect users to refuse to install Green Dam.

👍 Comentários e Gabarito  B :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
One can infer from the text that
*Alternativa (A): there is consensus in China about the use of Green Dam.
*Alternativa (B): the Chinese government claims that Green Dam will not be used for political purposes.
*Alternativa (C): the Green Dam has been designed to block chiefly Chinese pornographic sites.
*Alternativa (D): foreign computer makers have refused to preinstall Green dam in their machines.
*Alternativa (E): the Chinese government does not expect users to refuse to install Green Dam.
 
69 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

According to the text,

(A) China will have Green Dam’s vulnerabilities fixed instead of scrapping it.
(B) Green Dam allows users to keep track of their Internet accesses.
(C) Green Dam is equipped to detect malicious software.
(D) Green Dam’s vulnerabilities have not all been identified yet.
(E) the Chinese government has ordered all technical criticisms to be taken back.

👍 Comentários e Gabarito  A :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
According to the text,
*Alternativa (A): China will have Green Dam’s vulnerabilities fixed instead of scrapping it.
*Alternativa (B): Green Dam allows users to keep track of their Internet accesses.
*Alternativa (C): Green Dam is equipped to detect malicious software.
*Alternativa (D): Green Dam’s vulnerabilities have not all been identified yet.
*Alternativa (E): the Chinese government has ordered all technical criticisms to be taken back.
 
70 – (FCC/2009-TRE/PI-TÉCNICO JUDICIÁRIO)

Mr.Halderman

(A) has succeeded in eliminating all Green Dam’s security breaches.
(B) has ordered his students to try to create a botnet with a machine loaded with Green Dam.
(C) and his students managed to identify all malicious consequences of using Green Dam.
(D) crashed a machine loaded with Green Dam to prove how skilled his students were.
(E) said that it would be possible to mine a user’s personal data in a computer loaded with Green Dam.

👍 Comentários e Gabarito  E :
TÓPICO - IDEIA CONTEXTUAL ou INFORMAÇÃO DENTRO DO TEXTO:
Mr.Halderman...
*Alternativa (A): has succeeded in eliminating all Green Dam’s security breaches.(conseguiu eliminar todas as violações de segurança de Green Dam.)
*Alternativa (B): has ordered his students to try to create a botnet with a machine loaded with Green Dam.(ordenou que seus alunos tentassem criar um botnet com uma máquina carregada com Green Dam.)
*Alternativa (C): and his students managed to identify all malicious consequences of using Green Dam.(e seus alunos conseguiram identificar todas as consequências maliciosas do uso de Green Dam.)
*Alternativa (D): crashed a machine loaded with Green Dam to prove how skilled his students were.(quebrou uma máquina carregada com Green Dam para provar o quão habilidosos seus alunos eram.)
*Alternativa (E): said that it would be possible to mine a user’s personal data in a computer loaded with Green Dam.(disse que seria possível minerar os dados pessoais de um usuário em um computador carregado com Green Dam.)

quarta-feira, 29 de março de 2017

CEBRASPE/2016–TCE/PR–ANALISTA–LÍNGUA INGLESA–GABARITO, TEXTO TRADUZIDO & AQUISIÇÃO DE VOCABULÁRIO.

https://www.cebraspe.org.br

  • Texto (1) – | 8A5AAA | Cryptography | Computer network security |
  • Texto (2) – | 8A5BBB | Introduction | Cryptography and network security: principles and practice. |
  • 10 Multiple Choice Questions Five-Option Question |
 TEXTO 1: (8A5AAA)
[1º parágrafo]
Although the basic concepts of cryptography predate the Greeks, the present word cryptography, used to describe the art of secret communication, comes from the Greek meaning “secret writing”.
Embora os conceitos básicos da criptografia sejam anteriores aos gregos, a palavra atual, criptografia, usada para descrever a arte da comunicação secreta, vem do grego e significa "escrita secreta".

From its rather simple beginnings, cryptography has grown in tandem with technology and its importance has also similarly grown.
Desde seus primórdios relativamente simples, a criptografia cresceu em paralelo com a tecnologia, e sua importância também cresceu. 

Assim como em seus primórdios, a boa habilidade criptográfica ainda vence guerras.

[2º parágrafo]
As we get dragged more and more into the new information society, faceless digital communication regimes are guaranteeing neither information and personal security nor personal privacy.
À medida que somos cada vez mais arrastados para a nova sociedade da informação, regimes de comunicação digital sem rosto não garantem nem a informação nem a segurança pessoal, nem a privacidade pessoal.

The technological and communications revolution has further resulted in massive global surveillance of millions of individuals by either their governments or private companies; the fight for personal privacy has never been any fiercer, and the integrity and confidentiality of data have become more urgent than ever before.
A revolução tecnológica e das comunicações resultou ainda mais na vigilância global massiva de milhões de indivíduos por seus governos ou empresas privadas; a luta pela privacidade pessoal nunca foi tão feroz, e a integridade e a confidencialidade dos dados se tornaram mais urgentes do que nunca.

The security and trust of digital transaction systems have become of critical importance as more and more organizations and businesses join the e-commerce train.
A segurança e a confiança dos sistemas de transações digitais tornaram-se de fundamental importância à medida que mais e mais organizações e empresas aderem ao comércio eletrônico.

The very future of global commerce is at stake in this new information society unless the security of e-commerce can be guaranteed.
O futuro do comércio global está em jogo nesta nova sociedade da informação, a menos que a segurança do comércio eletrônico possa ser garantida.

[3º parágrafo]
Cryptography is being increasingly used to fight off this massive invasion of individual privacy and security, to guarantee data integrity and confidentiality, and to bring trust in global e-commerce.
A criptografia está sendo cada vez 'mais usada para combater' essa invasão massiva de privacidade e segurança individual, para garantir a integridade e a confidencialidade dos dados e para trazer confiança ao comércio eletrônico global.

Cryptography has become the main tool for providing the needed digital security in the modern digital communication medium that far exceeds the kind of security that was offered by any medium before it.
A criptografia se tornou a principal ferramenta para fornecer a segurança digital necessária no meio de comunicação digital moderno, que excede em muito o tipo de segurança oferecido por qualquer meio anterior a ela.
  • Joseph Migga Kiza. Cryptography. In: Computer network security. Chattanooga: Springer, 2005, p. 257-8 (adapted).
  • Joseph Migga Kiza. Criptografia. Em: Segurança de redes de computadores. Chattanooga: Springer, 2005, p. 257-8 (adaptado).
93 – Text 8A5AAA shows that cryptography has
(A) provided more safety in digital communication than any other tool.
(B) been widely traded in global e-commerce.
(C) been entirely despised since the ancient Greeks.
(D) become key in face-to-face communication.
(E) been used against the invasion of individual privacy.
•   Gabarito  E  
Text 8A5AAA shows that cryptography has
O texto 8A5AAA mostra que a criptografia tem
(A) provided more safety in digital communication than any other tool.
proporcionado mais segurança na comunicação digital do que qualquer outra ferramenta.
(B) been widely traded in global e-commerce.
sido amplamente comercializada no comércio eletrônico global.
(C) been entirely despised since the ancient Greeks.
 sido totalmente desprezada desde os gregos antigos.
(D) become key in face-to-face communication.
tornou-se essencial na comunicação face a face.
(E) been used against the invasion of individual privacy.
sido usada contra a invasão da privacidade individual.

94 – Text 8A5AAA states that digital communication regimes in the new information society
(A) are marked by too many secrets.
(B) are aimed to arouse surveillance.
(C) fail in providing personal security.
(D) sneer integrity and confidentiality.
(E) gave birth to cryptography.
•   Gabarito  C  
Text 8A5AAA states that digital communication regimes in the new information society
O texto 8A5AAA afirma que os regimes de comunicação digital na nova sociedade da informação
(A) are marked by too many secrets.
são marcados por muitos segredos.
(B) are aimed to arouse surveillance.
visam despertar vigilância.
(C) fail in providing personal security.
falham em fornecer segurança pessoal.
(D) sneer integrity and confidentiality.
desprezam a integridade e a confidencialidade.
(E) gave birth to cryptography.
deram origem à criptografia.

95 – It can be said from text 8A5AAA that cryptography and technology have
(A) been created by Greeks.
(B) developed together.
(C) grown in irrelevance.
(D) been used to win wars.
(E) had simple beginnings.
•   Gabarito  B  
It can be said from text 8A5AAA that cryptography and technology have
Pode-se dizer, a partir do texto 8A5AAA, que a criptografia e a tecnologia
(A) been created by Greeks.
foram criadas pelos gregos.
(B) developed together.
se desenvolveram juntas.
(C) grown in irrelevance.
tornaram-se irrelevantes.
(D) been used to win wars.
foram usadas para vencer guerras.
(E) had simple beginnings.
tiveram origens simples.

96 – In text 8A5AAA, the word “unless” (R.20) conveys the idea of
(A) addition.
(B) condition.
(C) comparison.
(D) contrast.
(E) purpose.
•   Gabarito  B  
In text 8A5AAA, the word “unless” (R.20) conveys the idea of
(A) addition.
(B) condition.
(C) comparison.
(D) contrast.
(E) purpose.

 TEXTO 2: (8A5BBB)
[1º parágrafo]
The requirements of information security within an organization have undergone two major changes in the last several decades.
Os requisitos de segurança da informação dentro de uma organização passaram por duas grandes mudanças nas últimas décadas.

Before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means.
Antes do uso generalizado de equipamentos de processamento de dados, a segurança das informações consideradas valiosas para uma organização era fornecida principalmente por meios físicos e administrativos.

An example of the former is the use of  rugged filing cabinets with a combination lock for storing sensitive documents.
Um exemplo do primeiro é o uso de armários de arquivo robustos com fechadura de combinação para armazenar documentos confidenciais. 

An example of the latter is personnel screening procedures used during the hiring process.
Um exemplo do segundo são os procedimentos de triagem de pessoal usados ​​durante o processo de contratação.

[2º parágrafo]
With the introduction of the computer, the need for automated tools for protecting files and other information stored on the computer became evident. This is especially the case for a shared system, such as a time-sharing system, and the need is even more acute for systems that can be accessed over a public telephone network, data network, or the Internet. The generic name for the collection of tools designed to protect data and to thwart hackers is computer security.
Com a introdução do computador, tornou-se evidente a necessidade de ferramentas automatizadas para proteger arquivos e outras informações armazenadas no computador. Isso se aplica especialmente a sistemas compartilhados, como sistemas de tempo compartilhado, e a necessidade é ainda mais premente para sistemas que podem ser acessados ​​por meio de uma rede telefônica pública, rede de dados ou internet. O nome genérico para o conjunto de ferramentas projetadas para proteger dados e impedir hackers é segurança de computadores.

[3º parágrafo]
The second major change that affected security is the introduction of distributed systems and the use of networks and communications facilities for carrying data between terminal user and computer and between computer and computer.
A segunda grande mudança que afetou a segurança é a introdução de sistemas distribuídos e o uso de redes e recursos de comunicação para transportar dados entre o usuário do terminal e o computador e entre um computador e outro.

Network security measures are needed to protect data during their transmission.
Medidas de segurança de rede são necessárias para proteger os dados durante sua transmissão.

In fact, the term network security is somewhat misleading, because virtually all business, government, and academic organizations interconnect their data processing equipment with a collection of interconnected networks.
De fato, o termo "segurança de rede" é um tanto enganoso, pois praticamente todas as organizações empresariais, governamentais e acadêmicas interconectam seus equipamentos de processamento de dados a um conjunto de redes interconectadas.

Such a collection is often referred to as an internet, and the term internet security is used.
Esse conjunto é frequentemente chamado de "internet", e o termo "segurança da internet" é usado.
  • William Stallings. Introduction. In: Cryptography and network security: principles and practice. 3rd ed. New Jersey: Prentice Hall, 2002, p. 2 (adapted).
  • William Stallings. Introdução. Em: Criptografia e segurança de redes: princípios e prática. 3ª ed. Nova Jersey: Prentice Hall, 2002, p. 2 (adaptado)
97 –  Choose the option that presents the statement that best conveys the central idea of text 8A5BBB.
(A) Network security used to protect information during its transmission
(B) The computer and its networks as main changes in information security
(C) Security of information provided by physical and administrative means
(D) The need for mechanized tools for protecting files and other information
(E) The tools aimed to thwart hackers and detect and recover from viruses
•   Gabarito  B  
Choose the option that presents the statement that best conveys the central idea of text 8A5BBB.
Escolha a opção que apresenta a afirmação que melhor transmite a ideia central do texto 8A5BBB.
(A) Network security used to protect information during its transmission
Segurança de redes utilizada para proteger informações durante sua transmissão
(B) The computer and its networks as main changes in information security
O computador e suas redes como principais mudanças na segurança da informação
(C) Security of information provided by physical and administrative means
Segurança da informação fornecida por meios físicos e administrativos
(D) The need for mechanized tools for protecting files and other information
A necessidade de ferramentas mecanizadas para proteção de arquivos e outras informações
(E) The tools aimed to thwart hackers and detect and recover from viruses
As ferramentas destinadas a frustrar hackers e detectar e se recuperar de vírus

98 –  According to text 8A5BBB, a shared system
(A) is frequently attacked by hackers more than any other system.
(B) is the most accurate system that can be accessed through internet.
(C) is a collection of tools designed to protect data and thwart hackers.
(D) must be overthrown to avoid failures in information security.
(E) requires computerized tools for file and information safety.
•   Gabarito  E  
According to text 8A5BBB, a shared system
De acordo com o texto 8A5BBB, um sistema compartilhado
(A) is frequently attacked by hackers more than any other system.
é frequentemente atacado por hackers, mais do que qualquer outro sistema.
(B) is the most accurate system that can be accessed through internet.
é o sistema mais preciso que pode ser acessado pela internet.
(C) is a collection of tools designed to protect data and thwart hackers.
é um conjunto de ferramentas projetadas para proteger dados e frustrar hackers.
(D) must be overthrown to avoid failures in information security.
deve ser derrubado para evitar falhas na segurança da informação.
(E) requires computerized tools for file and information safety.
requer ferramentas computadorizadas para segurança de arquivos e informações.

99 – In text 8A5BBB, the word “former” (R.6) refers to
(A) personnel screening procedures during the hiring process.
(B) physical methods used to provide security of information.
(C) major changes of information security in an organization.
(D) administrative methods that provide information security.
(E) valuable automated tools for protecting computer files.
•   Gabarito  B  
In text 8A5BBB, the word “former” (R.6) refers to
No texto 8A5BBB, a palavra “former” (R.6) refere-se a
(A) personnel screening procedures during the hiring process.
procedimentos de triagem de pessoal durante o processo de contratação.
(B) physical methods used to provide security of information.
métodos físicos utilizados para garantir a segurança das informações.
(C) major changes of information security in an organization.
grandes mudanças na segurança da informação em uma organização.
(D) administrative methods that provide information security.
métodos administrativos que garantem a segurança da informação.
(E) valuable automated tools for protecting computer files.
ferramentas automatizadas valiosas para proteger arquivos de computador.


100 –  In text 8A5BBB, the word “often” (R.27) can be correctly replaced by
(A) intermittently.
(B) sometimes.
(C) seldom.
(D) hardly ever.
(E) frequently
•   Gabarito  E  
In text 8A5BBB, the word “often” (R.27) can be correctly replaced by
No texto 8A5BBB, a palavra “frequentemente” (R.27) pode ser substituída corretamente por
(A) intermittently.
intermitentemente.
(B) sometimes.
às vezes.
(C) seldom.
raramente.
(D) hardly ever.
quase nunca.
(E) frequently
 frequentemente

terça-feira, 28 de março de 2017

MACKENZIE 2010 – 1º SEMESTRE - GRUPOS (I - IV - V - VI)

www.inglesparaconcursos.blog.br

❑ PROVA DE LÍNGUA INGLESA:

• MACKENZIE-2010-VESTIBULAR-1º SEMESTRE-Grupos (I - IV - V - VI)-APLICAÇÃO 11/12/2009.

mackenzie.br

❑ ESTRUTURA-PROVA:

 7 MCQs (Multiple Choice Questions) / 5 Options Each Question.
 Texto (1) – | Adventures in sub-consciousness | time.com
 |
 Texto (2) – | Movie News
‘Wolverine’ Online Leak: Howling Mad! | ew.com |
 Texto (3) – | Breadwinner | Reader’s Digest |


 TEXTO 1The following text refers to questions 12 and 13.

Adventures in sub-consciousness
By Sarah Modlock

__( I )__ you fancy a little underwater exploration without the hassle of learning to scuba dive, you’ll love the sub-scooter. It’s a battery-powered moped that propels you through water at a depth of 10 ft. (3 m), __( II )__  compressed air is pumped into a tiny glass cockpit from a boat on the surface — the resulting air pressure keeping water out of the hood. Pelagic treasures can be seen without even getting your hair wet.
         
The sub-scooter’s downside is that it is only found in Mauritius. But the upside is that you have another excuse — __( III )__  the deep-sea fishing, the beaches and the tranquility — to visit this beautiful island nation in the Indian Ocean.
         
Part of the vessel’s charm is that it offers an underwater encounter with no need for heavy oxygen cylinders or uncomfortable mouthpieces and masks. __( IV )__, the motor is virtually soundless, leaving sea creatures undisturbed and preserving a sense of the exotic. It won’t take you long to get a feel for the acceleration and steering, and you won’t need brakes: the coral is low-lying, and there’s nothing to bump into apart from other sub-scooters ( __( V )__ there’s little chance of that with scuba-diving guides pointing the way). Sure, the sub-scooter is too sedate for James Bond and probably rather restrictive for experienced divers, but it’s still a thrilling experience for visiting water babies. A two-hour excursion, including 30 minutes on a sub-scooter, costs about $160 for two people. Visit www.blue-safari.com for details.
(www.time.com)
12 – (MACKENZIE-2010-VESTIBULAR-GRUPOS (I - IV - V - VI)-1º SEMESTRE)

The text states that

a) nowadays people can explore the bottom of the sea even if they have no diving skills.
b) the underwater scooter can travel at a faster speed than regular motorboats in Mauritius.
c) creatures of the sea bump into divers in an effort to escape the acceleration of the scooters.
d) you can visit the Indian Ocean and look for treasures hidden underwater as long as oxygen cylinders are available.
e) no brakes are required underwater for air is propelled into your cockpit and compressed by a battery-operated machine deep in the ocean.

      Comentários e Gabarito    A  
TÓPICO - 
RELAÇÃO SEMÂNTICA COM TRECHO DO TEXTO
:
O texto afirma que
a) nowadays people can explore the bottom of the sea even if they have no diving skillshoje em dia as pessoas podem explorar o fundo do mar mesmo que não tenham habilidades de mergulho.
b) the underwater scooter can travel at a faster speed than regular motorboats in Mauritius. a scooter subaquática pode viajar a uma velocidade mais rápida do que as lanchas regulares nas Maurícias.
c) creatures of the sea bump into divers in an effort to escape the acceleration of the scooters. criaturas do mar esbarrar em mergulhadores em um esforço para escapar da aceleração das scooters.
d) you can visit the Indian Ocean and look for treasures hidden underwater as long as oxygen cylinders are available. você pode visitar o Oceano Índico e procurar por tesouros escondidos debaixo d'água enquanto os cilindros de oxigênio estiverem disponíveis.
e) no brakes are required underwater for air is propelled into your cockpit and compressed by a battery-operated machine deep in the ocean. 
não são necessários freios debaixo d'água para que o ar seja impulsionado para dentro do seu cockpit e comprimido por uma máquina operada por bateria no fundo do oceano.

13 – (MACKENZIE-2010-VESTIBULAR-GRUPOS (I - IV - V - VI)-1º SEMESTRE)

The connectors that appropriately fill in blanks I, II, III, IV and V, in the text, are

a) As long as, when, however, So and but.
b) When, if, also, Then and therefore.
c) If, while, besides, Better still and although.
d) While, then, consequently, In addition and also.
e) As, as long as, for, Nevertheless and even.

      Comentários e Gabarito    C  
TÓPICO - 
RELAÇÃO SEMÂNTICA COM TRECHO DO TEXTO
:
Os conectores que preenchem adequadamente as lacunas I, II, III, IV e V, no texto, são
a) As long as, when, however, So and but. Enquanto, quando, porém, Assim e mas.
b) When, if, also, Then and therefore. Quando, se, também, então e portanto.
c) If, while, besides, Better still and althoughSe, enquanto, além disso, melhor ainda e embora.
d) While, then, consequently, In addition and also. Enquanto, então, conseqüentemente, Além e também.
e) As, as long as, for, Nevertheless and even. 
Enquanto, enquanto, para, não obstante e até mesmo.

 TEXTO 2The following text refers to questions 14 and 15.
Movie News
‘Wolverine’ Online Leak: Howling Mad!
After the Hugh Jackman blockbuster lands on the web,  Fox scrambles to punish the culprit  –  and protect its own bottom line
By Nicole Sperling

It’s bold to steal a movie. Any movie. But a surefire blockbuster like X-Men Origins: Wolverine, Fox’s make-or-break $130 million summermovie tentpole? That takes nerves of adamantium. And the fact that someone somehow did manage to swipe such an incredibly high-profile project is sending shock waves of Michael Muller 
panic throughout the industry. ‘’This is certainly a lesson for us all,’’ says Fox co-chairman Tom Rothman. ‘’We, like everybody else, thought our system was secure.’’ Yet, on April 1, there it was: an unfinished version of the movie, available online a full month before its release date. (Since then, the file has been accessed 100,000 times, and the blogosphere buzz has been mixed at best.) Fox is working with the FBI to find the culprit — ‘’Somebody’s going to end up in jail for a long time,’’ insists Rothman — but no arrests had been made as of press time. Hollywood bigwigs, who have taken their case for tougher antipiracy laws all the way to Congress, are certainly out for blood. ‘’You have to find the [thief] and you’ve got to give him serious time,’’ says director Tony Scott (The Taking of Pelham 1 2 3). In fact, when he first heard of the theft, ‘’I said, shoot him!’’’ That harsh brand of justice has swept up those even tangentially involved in the scandal: Fox News columnist Roger Friedman was fired for downloading the movie and posting a positive review.
         
When the smoke clears, what impact will any of this have on the movie’s box office haul? Hard to say. When Ang Lee’s Hulk was pirated in 2003, Universal Pictures claimed the theft — of a close-to-finished print — cost it $100 million. (That could have been posturing: The movie was also leveled by brutal reviews. Universal had no comment for this story.) At least one industry insider thinks the exposure may boost ticket sales. ‘’Everyone was talking about Star Trek before this happened,’’ he notes. ‘’Now everyone’s focused on Wolverine.’’
With additional reporting by Chris Nashawaty and Christine Spines
(www.ew.com)
14 – (MACKENZIE-2010-VESTIBULAR-GRUPOS (I - IV - V - VI)-1º SEMESTRE)

The article explains that

a) the criminal responsible for stealing a copy of “X-Men Origins: Wolverine” before its release date is still at large.
b) “Wolverine” has been playing in American movie theaters since April 1, yet unfinished.
c) antipiracy laws in the US only punish people whose files have been accessed 100,000 times or more.
d) director Tony Scott has been accused of threatening columnist Roger Friedman and badmouthing him.
e) according to chairman Tom Rothman, the movie has been reviewed by a Fox News columnist, which made the film available online a month ahead of time.

      Comentários e Gabarito    A  
TÓPICO - 
RELAÇÃO SEMÂNTICA COM TRECHO DO TEXTO
:
O artigo explica que
a) the criminal responsible for stealing a copy of “X-Men Origins: Wolverine” before its release date is still at large. o criminoso responsável por roubar uma cópia de “X-Men Origins: Wolverine” antes de sua data de lançamento ainda está à solta.
b) “Wolverine” has been playing in American movie theaters since April 1, yet unfinished. “Wolverine” toca nos cinemas americanos desde 1º de abril, ainda inacabado.
c) antipiracy laws in the US only punish people whose files have been accessed 100,000 times or more. as leis antipirataria nos EUA apenas punem as pessoas cujos arquivos foram acessados 100.000 vezes ou mais.
d) director Tony Scott has been accused of threatening columnist Roger Friedman and badmouthing him. o diretor Tony Scott foi acusado de ameaçar o colunista Roger Friedman e falar mal dele.
e) according to chairman Tom Rothman, the movie has been reviewed by a Fox News columnist, which made the film available online a month ahead of time. 
de acordo com o presidente Tom Rothman, o filme foi revisado por um colunista da Fox News, que disponibilizou o filme on-line com um mês de antecedência.

15 – (MACKENZIE-2010-VESTIBULAR-GRUPOS (I - IV - V - VI)-1º SEMESTRE)

According to the text, culprit probably means

a) a person in charge of reviewing recently made movies.
b) a person that prints official reports related to movies and TV series.
c) a person that deals with movie tickets sold to the public online.
d) a person who has committed a crime or done something wrong.
e) a movie producer who is also involved with online advertisement.

      Comentários e Gabarito    D  
TÓPICO - 
RELAÇÃO SEMÂNTICA COM TRECHO DO TEXTO
:
De acordo com o texto, CULPRIT (culpado) provavelmente significa
a) a person in charge of reviewing recently made movies. uma pessoa encarregada de revisar filmes recentemente feitos.
b) a person that prints official reports related to movies and TV series. uma pessoa que imprime relatórios oficiais relacionados a filmes e séries de TV.
c) a person that deals with movie tickets sold to the public online. uma pessoa que lida com ingressos de cinema vendidos ao público online.
d) a person who has committed a crime or done something wronguma pessoa que cometeu um crime ou fez algo errado.
e) a movie producer who is also involved with online advertisement. 
um produtor de filmes que também está envolvido com anúncios online.

 TEXTO 3The following text refers to questions 16 to 18.

Breadwinner 

As a single mom, Cordia Harrington just needed to bring home the bacon. She ended up rolling in dough.
By Margaret Heffernan

Cordia Harrington was tired 
__( I )__ standing up all day and smelling like french fries 
 __( II )__night. A property developer, she also owned and operated three McDonald’s franchises in Illinois, but as a divorced mother __( III )__ three boys, she yearned __( IV )__ a business that would provide __( V )__ her children and let her spend more time __(VI) __ them.
          
Her aha moment struck, strangely enough, after she was nominated in 1992 to be on the McDonald’s bun committee. “The other franchisees, all men, thought that was hilarious because of the word bun,” she recalls. “But the joke was on them: They didn’t know the company would be picking me up in a corporate jet to see bakeries around the world. Every time I went to a meeting, I loved it. This was global!” Photographed by Tamara Reynolds Cordelia Harrington enjoys one of her own.
          
The experience opened her eyes to business possibilities. When McDonald’s decided it wanted a new bun supplier, Harrington became determined to win the contract, even though she had no experience running a bakery. “You see a tiny crack in the door, and you have to run through it,” she says. “I really believed I could do this.”
          
Harrington studied the bakery business and made sure she was never off executives’ radar. “If you have a dream, you can’t wait for people to call you,” she says. “So I’d visit a mill and send them photos of myself in a baker’s hat and jacket, holding a sign that said ‘I want to be your baker.’” After four years and 32 interviews, her persistence paid off. Harrington sealed the deal with a handshake, sold her franchises, invested everything she owned, and borrowed $13.5 million. She was ready to build the fastest, most automated bakery in the world.
Reader’s Digest
16 – (MACKENZIE-2010-VESTIBULAR-GRUPOS (I - IV - V - VI)-1º SEMESTRE)

Cordia Harrington

a) was a divorced mother who had looked forward to belonging to McDonald’s bun committee all her life.
b) became the best McDonald’s breadwinner throughout the whole USA.
c) shook hands with Illinois, which was responsible for the bun committee in a corporate jet.
d) considered the opportunity she had the tiny crack in the door that you can’t fail to get into.
e) brought home the bacon when she decided to open her own business and make bread after visiting a mill where franchises were widely offered.

      Comentários e Gabarito    D  
TÓPICO - 
RELAÇÃO SEMÂNTICA COM TRECHO DO TEXTO
:
Cordia Harrington
a) was a divorced mother who had looked forward to belonging to McDonald’s bun committee all her life. era uma mãe divorciada que ansiava por pertencer ao comitê do bolo do McDonald's durante toda a sua vida.
b) became the best McDonald’s breadwinner throughout the whole USA. tornou-se o melhor provedor do McDonald's em todo o país.
c) shook hands with Illinois, which was responsible for the bun committee in a corporate jet. apertou a mão de Illinois, que foi responsável pelo comitê de coque em um jato corporativo.
d) considered the opportunity she had the tiny crack in the door that you can’t fail to get intoconsiderou a oportunidade que ela teve, uma pequena rachadura na porta que você não pode deixar de aproveitar.
e) brought home the bacon when she decided to open her own business and make bread after visiting a mill where franchises were widely offered. 
trouxe para casa o bacon quando ela decidiu abrir seu próprio negócio e fazer pão depois de visitar uma fábrica onde as franquias eram amplamente oferecidas.

17 – (MACKENZIE-2010-VESTIBULAR-GRUPOS (I - IV - V - VI)-1º SEMESTRE)

“her aha moment” refers to

a) the moment she yearned for a profitable business.
b) the moment she got pregnant.
c) the time when she decided to be a bun supplier.
d) the moment she was off executives’ radar.
e) one time in her life when she reached triumph, recognition or satisfaction.

      Comentários e Gabarito    E  
TÓPICO - 
EXPRESSÃO REFERENCIADA
:
“her aha moment” refere-se a

a) the moment she yearned for a profitable business. no momento em que ansiava por um negócio lucrativo.
b) the moment she got pregnant. o momento em que ela engravidou.
c) the time when she decided to be a bun supplier. o momento em que ela decidiu ser uma fornecedora de pães.
d) the moment she was off executives’ radar. no momento em que ela estava fora do radar dos executivos.
e) one time in her life when she reached triumph, recognition or satisfaction
uma vez em sua vida, quando alcançou o triunfo, reconhecimento ou satisfação.

18 – (MACKENZIE-2010-VESTIBULAR-GRUPOS (I - IV - V - VI)-1º SEMESTRE)

The prepositions that appropriately fill in blanks I, II, III, IV, V and VI, in the text, are

a) off, at, of, for, with and on.
b) of, at, of, for, for and with.
c) in, at, of, at, with and on.
d) at, in, for, at, for and with.
e) of, in, with, for, with and on.

      Comentários e Gabarito    B  
TÓPICO - 
PREPOSITIONS
:
• Cordia Harrington was tired of standing up all day Cordia Harrington estava cansada de ficar em pé o dia todo (TIRED OF - cansado de fazer alguma coisa, você não quer mais fazer porque isso começou a te incomodar ou aborrecer.)
www.ldoceonline.com
• and smelling like french fries at night. e de cheirar a batatas fritas à noite(AT NIGHT - À NOITE)

• A property developer, she also owned and operated three McDonald’s franchises in Illinois, but as a divorced mother of three boys, Desenvolvedora imobiliária, ela também possuía e administrava três franquias do McDonald's em Illinois, mas como mãe divorciada de três meninos(MOTHER OF - MÃE DE)

• she yearned for a business ela ansiava por um negócio (YEARN FOR - ANSEAR POR)

• that would provide for her children que iria sustentar seus filhos (PROVIDE FOR - SUATENTAR, MANTER)

 and let her spend more time with them. e deixe-la passar mais tempo com eles. (WITH THEM - COM ELES)