UNESP s. port 2006 – Questão 84

Linguagens / Inglês / Text Comprehension / Compare different texts: find similarities and differences
 TEXTO 1: Terrorism
 
The term “terrorism” is controversial and has many definitions, none of which are universally accepted. The Oxford English Dictionary defines terrorism as “a policy intended to strike with terror those against whom it is adopted; the employment of methods of intimidation; the fact of terrorizing or condition of being terrorized”. It is almost always used in a pejorative sense, to describe the violence of an enemy as being immoral or wanton. No known group describes itself as “terrorist”. 
Theories on the causes of terrorism include:
• sociological explanations which focus on the position of the perpetrators in society
• conflict theory which includes their relationship to those in power 
• ideological explanations which focus on the differences in ideology, and the different goals of the ideologies
• media theory explanations which treat terrorist acts as a form of communication 
Some anti-terrorist commentators refuse to consider the causes, since that implies justification. For them, the terrorists are simply evil people. Some theories of the ethics of terrorism also exist, and they too are concerned with moral judgment on terrorism and specific actions. They do not attempt to explain its origins. They often treat terrorism as a form of warfare, and refer to the just war theory, and to war crimes law.
 
(http://en.wikipedia.org/wiki/Terrorism)
 
 
TEXTO 2: 
How do terrorist organizations use the internet?
 
The internet is an increasingly useful tool for terrorists, whose online activities include informationsharing, propaganda, and possibly, cyberterrorism. Over the last ten years, the number of terrorist sites has jumped from less than 100 to as many as 4,000. “This has particularly taken off since the war in Iraq, as many of the insurgency groups there have many sites and message boards to help their network”, says SITE Institute, a Washington DCbased terrorist-tracking group. “The greatest advantage [of the internet] is stealth”, says John Arquilla, professor of defense analysis at the Naval Postgraduate School. “[Terrorists] swim in an ocean of bits and bytes”. But the same anonymity that draws terrorists into the cyber world may also enable law-enforcement officials to spy on them undetected.
(…)
Today, terrorists give orders, plan attacks, and even send funds via online message boards and chat rooms. Terrorist sites also serve as virtual training grounds, offering tutorials on making bombs, firing surface-to-airmissiles, shooting at U.S. soldiers, and sneaking into Iraq from abroad. The internet also provides a venue for terrorists to disseminate their message, experts say. Terrorist sites broadcast propaganda videos designed to boost morale, raise funds, or recruit new members. 
(…)
There is some debate within the counterterrorism community about how to combat terrorist sites. Some experts say monitoring websites can provide valuable information about terrorist activities. “You can see who’s posting what and who’s paying for it”, one expert says. (…) Other experts advocate a more aggressive approach; they say shutting down websites, even temporarily, can disrupt a terrorist group’s
activities. 
The United States have tried to prosecute webmasters who run terrorist websites in the West, but has run into opposition from free speech advocates. “Sites that tell the terrorist side of the story go right up to the brink of civil liberties”, Arquilla says.
 
(http://cfrterrorism.org/home)
A leitura dos dois textos também permite afirmar que:
a) as teorias que procuram esclarecer as causas do terrorismo equacionam completamente a questão, permitindonos concluir que todo ato terrorista tem uma explicação ideológica, exclusivamente.
b) terroristas são pessoas do mal que se utilizam da internet para, entre outras atividades, dar ordens, planejar ataques, enviar bombas e mísseis, além de divulgar mensagens através de salas de bate-papo, exclusivamente.
c) terroristas não são pessoas do mal necessariamente, mas elas se utilizam da internet, apenas, para intimidar, tratar outras pessoas de forma pejorativa e divulgar suas idéias através de mensagens de correio eletrônico.
d) a internet acrescentou mais uma dificuldade conceitual pois, além de carecermos de uma definição mais precisa sobre terrorismo, também precisamos de uma que dê conta do termo ciberterrorismo.
e) como nenhum grupo se autodescreve como terrorista, a internet veio garantir-lhes liberdade incondicional e fornecer os chats para que articulem atos terroristas, sem o menor risco de serem descobertos.
Esta questão recebeu 5 comentários

Veja outras questões semelhantes:

Base dudow 2000 – Questão 70
Why did the man return to the convenience after doing his good action? What did he receive there? a) To get more gas and to receive a prize. b) To meet the young man who would give him back the money. c) Because his card wasn't working and then he received a thanking note from the young guy. d) Because his gas was off, he received some more free. e) He returned there to buy some gums and received some money from the young man.
Base dudow 2000 – Questão 75
Marque a alternativa que contém o uso do Present Perfect: a) I studied English since 1995 b) I have studied English since 1995 c) I don´t study English since 1995 d) I didn´t study English e) Study English!
Base dudow 2000 – Questão 22
Qual das opções abaixo apresenta dois advérbios? a) brightness - display b) instantly - uniformly c) brightness - dimmest d) greater - backlighting e) warm - suit
Base dudow 2000 – Questão 12
I always thought that Michelle were a geek. She never talks with anybody. She’s quite mute. She loves books. Every time I saw her she was reading a big book. While I was eating, she was there, reading big strange books. But today I didn’t see her. She went to the library yesterday, _____? a) couldn’t she b) shouldn’t she c) won’t she d) doesn’t she e) didn’t she
Base dudow 2000 – Questão 10
Complete: She would have talked to the man if she…………. the opportunity.a) hadb) would havec) hasd) will havee) had had