Questões de Concurso Público SP-URBANISMO 2014 para Analista Administrativo, Tecnologia da Informação / Desenvolvimento
Foram encontradas 60 questões
SELECT IF (3<5, 8, 9)
O resultado da execução desse comando é igual a
É correto afirmar que o valor impresso ao final da execução do algoritmo é igual a
Considerando o algoritmo fornecido, caso a linha de programa
Para i de 1 até x1 faça
seja substituída pela linha
Para i de 1 até x1 passo 2 faça
o número de vezes que as instruções serão executadas dentro do loop Para... é igual a
if (x !== 10) {
document.write("correto");
}
De acordo com o trecho de código, a mensagem correto será impressa se o conteúdo armazenado na variável x for
A multiprocess system (also known as multitasking system) is one that executes many processes concurrently (simultaneously or in interleved fashion). In a uniprocess system, when the lone process executes a wait operation, the processor would sit idle and waste its time until the process comes out of the wait state. The objective of multiprocessing is to have a process running on the processor at all times, doing purposeful work.
(Sibsankar Haldar, Alex Alagarsamy. Operating Systems. Pearson Education India, 2010)
De acordo com o texto, é correto afirmar que
As information technology (IT) has evolved into a central component of business operations, the business has become increasingly vulnerable to IT risk. IT events can no longer be contained without impacting overall business functions. Today, data loss, corruption and inaccessibility, as well as system and infrastructure failures, can severely impact an organization’s productivity.
(http://www-01.ibm.com/common/ssi/cgi-bin/ssialias? infotype=SA&subtype=WH&htmlfid=BUW03025USEN#loaded)
No contexto, o termo data loss tem o significado de
A database is the primary repository and retrieval mechanism for an enterprise’s critical data – so protecting that database is crucial. As more application traffic moves over the web, sensitive data is exposed to new security vulnerabilities and attacks. Standalone technologies that protect against web or database attacks are available, but their disconnection from one another means they lack context. Organizations need an end-to-end web application and database security solution to protect their data, their customers, and ultimately their businesses.
(http://www.f5.com/pdf/white-papers/big-ip-asm-ibm- infosphere-guardium-white-paper.pdf)
Segundo o texto, as organizações necessitam de mecanismos para proteger seus