Questões de Concurso Público TCM-RJ 2011 para Analista de Informação

Foram encontradas 68 questões

Q379781 Português

Leia o texto abaixo e responda, a seguir, a questão proposta:


    Muita gente deu risada, nos últimos dias, com uma pesquisa italiana a respeito do melhor jeito de dar promoções no trabalho. Os três cientistas da Universidade de Catânia concluíram que promover funcionários com base no mérito não é a melhor estratégia. Em vez disso, a empresa que quisesse acumular a maior “quantidade” possível de competência deveria promover os funcionários na louca, aleatoriamente. Num dos cenários do estudo, também seria bom negócio promover sempre os piores funcionários.
    Talvez você esteja pensando “opa, meu trabalho já aplica isso aí…” Pois é, os italianos tocaram num tema interessante no tal estudo. Como eles chegaram a essa conclusão? Eles aplicaram uma piadinha de administração dos anos 60, o “Princípio de Peter”. Segundo esse princípio, o funcionário vai sendo promovido (ou seja, removido) enquanto for competente, até chegar a um nível em que é incompetente (e ali permanece, pelo menos por um tempo, antes de ser demitido). Em outras palavras, a empresa sempre tira as pessoas dos cargos em que elas são boas e as leva para outros, em que elas podem ser péssimas. O autor dessa sacada, o psicólogo canadense Laurence Peter, considerava que as habilidades exigidas numa empresa não se acumulavam e que as habilidades de um nível hierárquico não eram semelhantes às exigidas no nível abaixo. Ou seja, só porque você era o melhor vendedor da empresa, não quer dizer que será um bom coordenador de vendedores - o que faz muito sentido.
    Os pesquisadores italianos Alessandro Pluchino, Andrea Rapisarda e Cesare Garofalo testaram o Princípio de Peter num modelo matemático, para simular uma empresa com 180 funcionários e seis níveis hierárquicos. Eles experimentaram a lógica do senso comum, de que a pessoa leva com ela a maior parte da competência mostrada no cargo anterior, e a lógica do Princípio de Peter, de que mostrar competência no novo cargo não tem nada a ver com o cargo anterior. Para cada lógica, experimentaram três diferentes políticas de promoção dos funcionariozinhos virtuais: promover sempre os melhores, promover sempre os piores e promover aleatoriamente.
    Na média dos seis resultados, a promoção aleatória foi a melhor para acumular competência na empresa. Também foi possível, pela lógica de Peter, ter bom resultado promovendo sempre os piores (já que os melhores continuavam fazendo o que faziam bem) e intercalando promoções dos melhores e dos piores.
    Organizações e equipes de todos os tamanhos deveriam tentar fugir do Princípio de Peter. Até as empresas já têm algumas ideias novas: testar o funcionário com desafios do cargo que ele deve assumir, antes de promovê-lo; permitir que o funcionário que já mostrou competência possa ser testado em mais de uma função; sair da estrutura de pirâmide e tentar jeitos novos de se organizar, com menos hierarquia e mais flexibilidade; ter caminhos variados para o funcionário avançar na carreira.
    O trabalho recebeu em Harvard um prêmio Ig Nobel, dado a pesquisas excêntricas “que fazem pessoas rir antes de pensar”, como é definido pela entidade que o concede, a Improbable Research (“Pesquisa Improvável”).
    E você, acha que o mundo consegue escapar do Princípio de Peter?


(Giffon, Carlosi. A empresa em que os piores funcionários ganham as promoções. In: Época. 2.10.2010)

“O autor dessa sacada, o psicólogo canadense Laurence Peter, considerava que as habilidades exigidas numa empresa não se acumulavam e que as habilidades de um nível hierárquico não eram semelhantes às exigidas no nível abaixo.

” Reescreve-se essa frase do texto em cada alter- nativa abaixo. A nova redação é gramaticalmente inaceitável em:
Alternativas
Q379782 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

In the first paragraph the professor claims that Fixer can:
Alternativas
Q379783 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

The word ‘resilient’ in “making software significantly more resilient against failure or attack” (Paragraph 1) could best be replaced by :
Alternativas
Q379784 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

According to Paragraph 2, Fixer works:
Alternativas
Q379785 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

In Paragraph 2, the phrase “It then comes up with several potential patches...” can be understood as “The Fixer:
Alternativas
Respostas
26: B
27: D
28: C
29: E
30: A