UNESP s. port 2006 – Questão 84

Linguagens / Inglês / Text Comprehension / Compare different texts: find similarities and differences
 TEXTO 1: Terrorism
 
The term “terrorism” is controversial and has many definitions, none of which are universally accepted. The Oxford English Dictionary defines terrorism as “a policy intended to strike with terror those against whom it is adopted; the employment of methods of intimidation; the fact of terrorizing or condition of being terrorized”. It is almost always used in a pejorative sense, to describe the violence of an enemy as being immoral or wanton. No known group describes itself as “terrorist”. 
Theories on the causes of terrorism include:
• sociological explanations which focus on the position of the perpetrators in society
• conflict theory which includes their relationship to those in power 
• ideological explanations which focus on the differences in ideology, and the different goals of the ideologies
• media theory explanations which treat terrorist acts as a form of communication 
Some anti-terrorist commentators refuse to consider the causes, since that implies justification. For them, the terrorists are simply evil people. Some theories of the ethics of terrorism also exist, and they too are concerned with moral judgment on terrorism and specific actions. They do not attempt to explain its origins. They often treat terrorism as a form of warfare, and refer to the just war theory, and to war crimes law.
 
(http://en.wikipedia.org/wiki/Terrorism)
 
 
TEXTO 2: 
How do terrorist organizations use the internet?
 
The internet is an increasingly useful tool for terrorists, whose online activities include informationsharing, propaganda, and possibly, cyberterrorism. Over the last ten years, the number of terrorist sites has jumped from less than 100 to as many as 4,000. “This has particularly taken off since the war in Iraq, as many of the insurgency groups there have many sites and message boards to help their network”, says SITE Institute, a Washington DCbased terrorist-tracking group. “The greatest advantage [of the internet] is stealth”, says John Arquilla, professor of defense analysis at the Naval Postgraduate School. “[Terrorists] swim in an ocean of bits and bytes”. But the same anonymity that draws terrorists into the cyber world may also enable law-enforcement officials to spy on them undetected.
(…)
Today, terrorists give orders, plan attacks, and even send funds via online message boards and chat rooms. Terrorist sites also serve as virtual training grounds, offering tutorials on making bombs, firing surface-to-airmissiles, shooting at U.S. soldiers, and sneaking into Iraq from abroad. The internet also provides a venue for terrorists to disseminate their message, experts say. Terrorist sites broadcast propaganda videos designed to boost morale, raise funds, or recruit new members. 
(…)
There is some debate within the counterterrorism community about how to combat terrorist sites. Some experts say monitoring websites can provide valuable information about terrorist activities. “You can see who’s posting what and who’s paying for it”, one expert says. (…) Other experts advocate a more aggressive approach; they say shutting down websites, even temporarily, can disrupt a terrorist group’s
activities. 
The United States have tried to prosecute webmasters who run terrorist websites in the West, but has run into opposition from free speech advocates. “Sites that tell the terrorist side of the story go right up to the brink of civil liberties”, Arquilla says.
 
(http://cfrterrorism.org/home)
A leitura dos dois textos também permite afirmar que:
a) as teorias que procuram esclarecer as causas do terrorismo equacionam completamente a questão, permitindonos concluir que todo ato terrorista tem uma explicação ideológica, exclusivamente.
b) terroristas são pessoas do mal que se utilizam da internet para, entre outras atividades, dar ordens, planejar ataques, enviar bombas e mísseis, além de divulgar mensagens através de salas de bate-papo, exclusivamente.
c) terroristas não são pessoas do mal necessariamente, mas elas se utilizam da internet, apenas, para intimidar, tratar outras pessoas de forma pejorativa e divulgar suas idéias através de mensagens de correio eletrônico.
d) a internet acrescentou mais uma dificuldade conceitual pois, além de carecermos de uma definição mais precisa sobre terrorismo, também precisamos de uma que dê conta do termo ciberterrorismo.
e) como nenhum grupo se autodescreve como terrorista, a internet veio garantir-lhes liberdade incondicional e fornecer os chats para que articulem atos terroristas, sem o menor risco de serem descobertos.
Esta questão recebeu 5 comentários

Veja outras questões semelhantes:

Base dudow 2000 – Questão 47
Choose the correct sentence. a) a white new plastic spatula b) a spatula new white plastic. c) a new white plastic spatula. d) a spatula new plastic white. e) a plastic new white spatula.
Base dudow 2000 – Questão 41
O que Charlie argumentou para escapar da surra?a) Que não era certo usar a violência.b) Que é melhor esperar um pouquinhoc) Que eles poderiam resolver este pequeno problema de outra forma.d) Que as pessoas não se entendem.e) Que ele iria procurar ajuda dos adultos.
UFSM 2012 ps2 - todas menos Fil, Esp - resoluções no final 2012 – Questão 50
No sintagma "a more powerful connection", o termo sublinhado tem a função de qualificar/ caracterizar o núcleo desse sintagma: o substantivo "connection". Assinale a alternativa em que o termo sublinhado exerce essa mesma função. a) "as well as" b) "sensual symbol" c) "are becoming" d) "other corporate networking sites" e) "in the evening just before"
UNESP (julho) 2006 – Questão 73
Os elementos em negrito no primeiro parágrafo – its, their, they, them – referem-se, respectivamente, a a) objetivo, medo, abuso e violência doméstica. b) violência doméstica, agressores, agressores e parceiros. c) objetivo, agressores, agressores e violência doméstica. d) violência doméstica, agressores, parceiros e formas. e) objetivo, agressores, agressores e formas.
Base dudow 2000 – Questão 78
We can complete these gaps with: She ___________ her boyfriend since this morning. (call) She ________ weight since she stopped eating too many sweets. (lose) We ________ together for many years. (work) a) have been calling, have been losing, have being working b) has been calling, has been losing, have been working c) has being calling, has being losing, have being working d) have been calling, have been losing, has been working e) has been call, has been lost, have been work