Magna Concursos

Foram encontradas 60 questões.

763338 Ano: 2016
Disciplina: Direito Administrativo
Banca: FCC
Orgão: TRT-20
Mateus, servidor público federal, removeu o servidor Pedro para localidade extremamente distante e de difícil acesso, no intuito de castigá-lo. Ocorre que Pedro merecia penalidade administrativa por ter cometido infração funcional mas não remoção. No caso narrado, a remoção, por não ser ato de categoria punitiva, apresenta vício de
 

Provas

Questão presente nas seguintes provas
763284 Ano: 2016
Disciplina: Raciocínio Lógico
Banca: FCC
Orgão: TRT-20
Considere que todo técnico sabe digitar. Alguns desses técnicos sabem atender ao público externo e outros desses técnicos não sabem atender ao público externo. A partir dessas afirmações é correto concluir que
 

Provas

Questão presente nas seguintes provas
763283 Ano: 2016
Disciplina: Raciocínio Lógico
Banca: FCC
Orgão: TRT-20
Juliana consegue arquivar 16 pastas de documentos em uma hora e vinte minutos. Mantendo esse mesmo padrão, em duas horas e quarenta e cinco minutos Juliana conseguirá arquivar um número de pastas de documentos igual a
 

Provas

Questão presente nas seguintes provas
763282 Ano: 2016
Disciplina: Raciocínio Lógico
Banca: FCC
Orgão: TRT-20
Manoel e Dolores precisavam classificar um grande número de processos. Manoel começou antes do que Dolores e ao final do dia havia classificado 3/8 do total de processos. Dolores trabalhou mais rápido do que Manoel e ao final do dia havia classificado 1/3 de processos a mais do que aqueles que Manoel havia classificado. Após esse dia de trabalho de Manoel e Dolores, é cor- reto afirmar que
 

Provas

Questão presente nas seguintes provas
763281 Ano: 2016
Disciplina: Raciocínio Lógico
Banca: FCC
Orgão: TRT-20
Em um dia de atendimento externo, João atendeu 56 pessoas. No dia seguinte, João atendeu 25% a mais do número de pessoas que havia atendido no dia anterior. No terceiro dia, João novamente aumentou o número de atendimentos em 30% do número de atendimentos do dia anterior. O número de atendimentos realizados por João, nesses três dias, foi igual a:
 

Provas

Questão presente nas seguintes provas
763276 Ano: 2016
Disciplina: Raciocínio Lógico
Banca: FCC
Orgão: TRT-20
A sequência de números 1; 13; 1; 2; 13; 1; 2; 3; 13; 1; 2; . . ., foi criada com um padrão e possui vinte termos. A soma dos termos: 20°, 15° e 13° é um número
 

Provas

Questão presente nas seguintes provas
763264 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:

Atenção: Considere o texto para responder à questão.

Does an Email Hacking Software really Exist?

With my experience of over 10 years in the field of ethical hacking and information security, all I can tell you is that there exists no such ready-made software program (as shown and advertised on many websites) that can break into the service provider’s database and hack email passwords. This is just a myth! This may seem a bit disappointing for many, but this is the fact. However, it is still possible to easily hack email passwords using some of the alternative programs and ways as discussed below:

Working Ways to Hack an Email Password:

Even though it is impossible to hack the database and instantly crack the email password, it is still possible to trick the users so that they give away the password by themselves. This can be done using a handful of methods like keylogging, social engineering or phishing. However, the easiest and most effective way is by using keyloggers.

A keylogger is a small program that records each and every keystroke a user types on the keyboard of a specific computer. So when you install a keylogger on the computer from where the target person is likely to access his/her email, it is possible to capture the password. Though keyloggers are not designed to hack email passwords, they can still be used to accomplish the job. Here is a list of some of the interesting facts about keyloggers:

EASY TO USE: A keylogger does not require any special skills. Anyone with basic computer knowledge should be able to use it.

REMAINS UNDETECTED: A keylogger will remain undetected after installation and operates in a total stealth mode. So, you need not worry about being caught or traced back.

REMOTE INSTALLATION: In addition to installation on a location computer, keyloggers also support remote installation. That means you can also install it even on those computers for which you do not have physical access.

(Adapted form: http://www.gohacking.com/email-hacking-software/)

A conjunção Though, conforme empregada no texto, pode ser traduzida como
 

Provas

Questão presente nas seguintes provas
763263 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:

Atenção: Considere o texto para responder à questão.

Does an Email Hacking Software really Exist?

With my experience of over 10 years in the field of ethical hacking and information security, all I can tell you is that there exists no such ready-made software program (as shown and advertised on many websites) that can break into the service provider’s database and hack email passwords. This is just a myth! This may seem a bit disappointing for many, but this is the fact. However, it is still possible to easily hack email passwords using some of the alternative programs and ways as discussed below:

Working Ways to Hack an Email Password:

Even though it is impossible to hack the database and instantly crack the email password, it is still possible to trick the users so that they give away the password by themselves. This can be done using a handful of methods like keylogging, social engineering or phishing. However, the easiest and most effective way is by using keyloggers.

A keylogger is a small program that records each and every keystroke a user types on the keyboard of a specific computer. So when you install a keylogger on the computer from where the target person is likely to access his/her email, it is possible to capture the password. Though keyloggers are not designed to hack email passwords, they can still be used to accomplish the job. Here is a list of some of the interesting facts about keyloggers:

EASY TO USE: A keylogger does not require any special skills. Anyone with basic computer knowledge should be able to use it.

REMAINS UNDETECTED: A keylogger will remain undetected after installation and operates in a total stealth mode. So, you need not worry about being caught or traced back.

REMOTE INSTALLATION: In addition to installation on a location computer, keyloggers also support remote installation. That means you can also install it even on those computers for which you do not have physical access.

(Adapted form: http://www.gohacking.com/email-hacking-software/)

Segundo o texto,
 

Provas

Questão presente nas seguintes provas
763261 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:

Atenção: Considere o texto para responder à questão.

Does an Email Hacking Software really Exist?

With my experience of over 10 years in the field of ethical hacking and information security, all I can tell you is that there exists no such ready-made software program (as shown and advertised on many websites) that can break into the service provider’s database and hack email passwords. This is just a myth! This may seem a bit disappointing for many, but this is the fact. However, it is still possible to easily hack email passwords using some of the alternative programs and ways as discussed below:

Working Ways to Hack an Email Password:

Even though it is impossible to hack the database and instantly crack the email password, it is still possible to trick the users so that they give away the password by themselves. This can be done using a handful of methods like keylogging, social engineering or phishing. However, the easiest and most effective way is by using keyloggers.

A keylogger is a small program that records each and every keystroke a user types on the keyboard of a specific computer. So when you install a keylogger on the computer from where the target person is likely to access his/her email, it is possible to capture the password. Though keyloggers are not designed to hack email passwords, they can still be used to accomplish the job. Here is a list of some of the interesting facts about keyloggers:

EASY TO USE: A keylogger does not require any special skills. Anyone with basic computer knowledge should be able to use it.

REMAINS UNDETECTED: A keylogger will remain undetected after installation and operates in a total stealth mode. So, you need not worry about being caught or traced back.

REMOTE INSTALLATION: In addition to installation on a location computer, keyloggers also support remote installation. That means you can also install it even on those computers for which you do not have physical access.

(Adapted form: http://www.gohacking.com/email-hacking-software/)

A melhor tradução para o trecho from where the target person is likely to access his/her email é
 

Provas

Questão presente nas seguintes provas
763260 Ano: 2016
Disciplina: Inglês (Língua Inglesa)
Banca: FCC
Orgão: TRT-20
Provas:

Atenção: Considere o texto para responder à questão.

Does an Email Hacking Software really Exist?

With my experience of over 10 years in the field of ethical hacking and information security, all I can tell you is that there exists no such ready-made software program (as shown and advertised on many websites) that can break into the service provider’s database and hack email passwords. This is just a myth! This may seem a bit disappointing for many, but this is the fact. However, it is still possible to easily hack email passwords using some of the alternative programs and ways as discussed below:

Working Ways to Hack an Email Password:

Even though it is impossible to hack the database and instantly crack the email password, it is still possible to trick the users so that they give away the password by themselves. This can be done using a handful of methods like keylogging, social engineering or phishing. However, the easiest and most effective way is by using keyloggers.

A keylogger is a small program that records each and every keystroke a user types on the keyboard of a specific computer. So when you install a keylogger on the computer from where the target person is likely to access his/her email, it is possible to capture the password. Though keyloggers are not designed to hack email passwords, they can still be used to accomplish the job. Here is a list of some of the interesting facts about keyloggers:

EASY TO USE: A keylogger does not require any special skills. Anyone with basic computer knowledge should be able to use it.

REMAINS UNDETECTED: A keylogger will remain undetected after installation and operates in a total stealth mode. So, you need not worry about being caught or traced back.

REMOTE INSTALLATION: In addition to installation on a location computer, keyloggers also support remote installation. That means you can also install it even on those computers for which you do not have physical access.

(Adapted form: http://www.gohacking.com/email-hacking-software/)

Um sinônimo para instantly, conforme usado no texto, é
 

Provas

Questão presente nas seguintes provas