Questões de Concurso Público SERPRO 2008 para Analista - Redes

Foram encontradas 120 questões

Q43303 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
During the practice sessions the critic's role is to elaborate on the items to be reviewed.
Alternativas
Q43304 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
The reviewers must read and rewrite the material while being present in the meetings.
Alternativas
Q43305 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
Large projects demand patient learning to go through it.
Alternativas
Q43306 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
A system design review can need 150 hours of work.
Alternativas
Q43307 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
In a lot of projects, it is hoped that the plan should be able to spot specific risky areas.
Alternativas
Q43308 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
The plan is supposed to include the likelihood of failure, its results and the actions to be taken to contain development risk.
Alternativas
Q43309 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
At the beginning of the second paragraph, "should" can be correctly replaced by ought to.
Alternativas
Q43725 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

through the Internet people can get information about wealthy materials.
Alternativas
Q43726 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

any individuals regardless of their ages can get into contact with valuable materials.
Alternativas
Q43727 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

filtering software is used so as to make sure that improper sites won't be accessed.
Alternativas
Q43728 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

grown-up people are entitled to decide what choices to make as far as filtering is concerned.
Alternativas
Q43729 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

children's relatives are supposed to judge whether the sites to be visited by their sons and daughters are proper for them to see.
Alternativas
Q43730 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

No ATM, para que seja implementada qualidade de serviço, define quatro classes de tráfego: CBR, geralmente usada para transmissão de voz; VBR-rt, utilizada para stream de vídeo em tempo real; VBR-nrt, empregada na transmissão de imagens paradas; ABR, usada para tráfego de baixa prioridade, como IP, em geral.
Alternativas
Q43731 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

No MPLS, como são adicionados labels aos pacotes IP de acordo com suas características, os roteadores tomam suas decisões de encaminhamento baseados nos labels e não apenas no endereço de destino.
Alternativas
Q43732 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

Segundo o algoritmo de back off exponencial das redes ethernet, pode-se ter um tempo de espera até duas mil vezes maior que o inicialmente esperado para se retransmitir um frame após uma colisão.
Alternativas
Q43733 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

Em uma rede ethernet, após uma colisão, é possível tentar a retransmissão do frame, no máximo, vinte vezes.
Alternativas
Q43734 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

Em uma rede ethernet, uma colisão não ocorre logo depois da transmissão de um frame.
Alternativas
Q43735 Redes de Computadores
Com relação aos protocolos de roteamento, julgue os itens
seguintes.

A convergência dos protocolos link state geralmente é mais lenta que a dos distance vector.
Alternativas
Q43736 Redes de Computadores
Com relação aos protocolos de roteamento, julgue os itens
seguintes.

Os protocolos link state normalmente são mais estáveis que os distance vector.
Alternativas
Q43737 Redes de Computadores
Com relação aos protocolos de roteamento, julgue os itens
seguintes.

Pela técnica de poison reverse, utilizada para se evitarem loops em protocolos distance vector, um roteador anuncia a todos os outros roteadores uma rota inválida como rota que tem distância infinita.
Alternativas
Respostas
21: E
22: E
23: C
24: E
25: E
26: C
27: C
28: E
29: C
30: E
31: C
32: E
33: E
34: C
35: E
36: E
37: E
38: E
39: C
40: E