Questões de Concurso Público CVM 2010 para Inspetor, prova 1
Foram encontradas 27 questões
Privacy Online” in order to answer questions 17 to
20:
10 Ways to Protect Your Privacy Online
Source: www.newsweek.com (Adapted) Oct, 22nd 2010
Up to a couple of years ago, I used to say that
the average person could protect his or her privacy
on the Web. Even as the founder of an online
reputation-management company, I believed it was
possible – so long as you were willing to commit some
time doing it. Today, I tell people this: the landscape
of personal data mining and exploitation is shifting
faster than ever; trying to protect your online privacy
is like trying to build your own antivirus software –
really, really dif?cult. But whether or not you have the
time (or money) to invest in the pros, there are a few
simple steps we can all take to reduce the risk to our
private data.
1. Do not put your full birth date on your social-
networking pro?les.
Identity thieves use birth dates as cornerstones
of their craft. If you want your friends to know your
birthday, try just the month and day, and leave out
the year.
2. Use multiple usernames and passwords.
Keep your usernames and passwords for social
networks, online banking, e-mail, and online shopping
all separate. Having distinct passwords is not enough
nowadays: if you have the same username across
different Web sites, your entire life can be mapped
and re-created with simple algorithms.
3. Shred.
If you are going to throw away credit-card offers, bank
statements, or anything else that might come in hard
copy to your house, rip them up into tiny bits ?rst.
Quando uma pessoa compra uma ação de uma empresa, torna-se sócia dessa companhia. Significa que ___(1)___ se beneficia de seu sucesso ou sofre as consequências ___(2)___ fracasso. Funciona assim: ao ganhar dinheiro, uma corporação com ações cotadas em bolsa remunera melhor seus acionistas. O inverso também é verdadeiro.
No mercado acionário, é impossível dizer ____(3)____ um investimento dará retorno líquido e certo. Uma série de fatores ____(4)____ levada em conta. Desde ____(5)____ que a empresa pode controlar (lançamento de produtos e projetos de sucesso, boa performance financeira) até aspectos externos (crise global, acidentes), ____(6)____ muitas vezes independem de uma boa administração da companhia.
(Adaptado de ISTOÉ, 15/9/2010)
Assinale a opção que, ao preencher as lacunas do texto provoca erro gramatical.
Baixo em termos internacionais, o salário brasileiro é apontado pelas empresas multinacionais como um dos atrativos para os investimentos no mercado nacional, além da perspectiva de crescimento doméstico acima da média global, ____(a)_____também pelos investimentos, mas principalmente pela alta salarial em massa, responsável por mais de 85% do PIB, o mercado interno em ebulição, segundo os economistas, foi um fator decisivo para o Brasil _____(b)______da crise que eclodiu em setembro de 2008. E os salários mais robustos, por sua vez, _____(c)_____como um colchão para garantir a recuperação acelerada do nível de atividade econômica. Aumentos salariais são importantes porque elevam o consumo e o crescimento econômico. Mas do ponto de vista macroeconômico é importante que _____(d)_____em linha com os ganhos de produtividade. Caso contrário, a tendência é que eventuais excessos _____(e)_____aos preços.
(Adaptado de Carta Capital, 20 de outubro de 2010)
Source: www.newsweek.com (Adapted) Oct, 22nd 2010
Up to a couple of years ago, I used to say that the average person could protect his or her privacy on the Web. Even as the founder of an online reputation-management company, I believed it was possible – so long as you were willing to commit some time doing it. Today, I tell people this: the landscape of personal data mining and exploitation is shifting faster than ever; trying to protect your online privacy is like trying to build your own antivirus software – really, really difficult. But whether or not you have the time (or money) to invest in the pros, there are a few simple steps we can all take to reduce the risk to our private data.
Identity thieves use birth dates as cornerstones of their craft. If you want your friends to know your birthday, try just the month and day, and leave out the year.
2. Use multiple usernames and passwords.
Keep your usernames and passwords for social networks, online banking, e-mail, and online shopping all separate. Having distinct passwords is not enough nowadays: if you have the same username across different Web sites, your entire life can be mapped and re-created with simple algorithms.
3. Shred. If you are going to throw away credit-card offers, bank statements, or anything else that might come in hard copy to your house, rip them up into tiny bits first.