Questões de Concurso Comentadas para fcc

Foram encontradas 59.772 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q2254264 Inglês
The Internet at Risk

    Some 12,000 people convened last week in Tunisia for a United Nations conference about the Internet. Many delegates want an end to the U.S. Commerce Department's control over the assignment of Web site addresses (for example, http://www.washington-%20post.com/ ) and e-mail accounts (for example, [email protected]). The delegates' argument is that unilateral U.S. control over these domain names reflects no more than the historical accident of the Internet's origins. Why should the United States continue to control the registration of French and Chinese Internet addresses? It doesn't control the registration of French and Chinese cars, whatever Henry Ford's historic role in democratizing travel was.
    The reformers' argument is attractive in theory and dangerous in practice. In an ideal world, unilateralism should be avoided. But in an imperfect world, unilateral solutions that run efficiently can be better than multilateral ones that  ....51....
        The job of assigning domain names offers huge opportunities for abuse. ....52.... controls this function can decide to keep certain types of individuals or organizations offline (dissidents or opposition political groups, for example). Or it can allow them on in exchange for large fees. The striking feature of U.S. oversight of the Internet is that such abuses have not occurred.
        It's possible that a multilateral overseer of the Internet might be just as efficient. But the ponderous International Telecommunication Union, the U.N. body that would be a leading candidate to take over the domain registry, has a record of resisting innovation - including the advent of the Internet. Moreover, a multilateral domain-registering body would be caught between the different visions of its members: on the one side, autocratic regimes such as Saudi Arabia and China that want to restrict access to the Internet; on the other side, open societies that want low barriers to entry. These clashes of vision would probably make multilateral regulation inefficiently political. You may say that this is a fair price to pay to uphold the principle of sovereignty. If a country wants to keep certain users from registering domain names (Nazi groups, child pornographers, criminals), then perhaps it has a right to do so. But the clinching argument is that countries can exercise that sovereignty to a reasonable degree without controlling domain names. They can order Internet users in their territory to take offensive material down. They can order their banks or credit card companies to refuse to process payments to unsavory Web sites based abroad. Indeed, governments' ample ability to regulate the Internet has already been demonstrated by some of the countries pushing for reform, such as authoritarian China. The sovereign nations of the world have no need to wrest control of the Internet from the United States, because they already have it.

(Adapted from Washington Post, November 21, 2005; A14)
No primeiro parágrafo, reflects no more than the historical accident of the Internet's origins significa
Alternativas
Q2254263 Inglês
The Internet at Risk

    Some 12,000 people convened last week in Tunisia for a United Nations conference about the Internet. Many delegates want an end to the U.S. Commerce Department's control over the assignment of Web site addresses (for example, http://www.washington-%20post.com/ ) and e-mail accounts (for example, [email protected]). The delegates' argument is that unilateral U.S. control over these domain names reflects no more than the historical accident of the Internet's origins. Why should the United States continue to control the registration of French and Chinese Internet addresses? It doesn't control the registration of French and Chinese cars, whatever Henry Ford's historic role in democratizing travel was.
    The reformers' argument is attractive in theory and dangerous in practice. In an ideal world, unilateralism should be avoided. But in an imperfect world, unilateral solutions that run efficiently can be better than multilateral ones that  ....51....
        The job of assigning domain names offers huge opportunities for abuse. ....52.... controls this function can decide to keep certain types of individuals or organizations offline (dissidents or opposition political groups, for example). Or it can allow them on in exchange for large fees. The striking feature of U.S. oversight of the Internet is that such abuses have not occurred.
        It's possible that a multilateral overseer of the Internet might be just as efficient. But the ponderous International Telecommunication Union, the U.N. body that would be a leading candidate to take over the domain registry, has a record of resisting innovation - including the advent of the Internet. Moreover, a multilateral domain-registering body would be caught between the different visions of its members: on the one side, autocratic regimes such as Saudi Arabia and China that want to restrict access to the Internet; on the other side, open societies that want low barriers to entry. These clashes of vision would probably make multilateral regulation inefficiently political. You may say that this is a fair price to pay to uphold the principle of sovereignty. If a country wants to keep certain users from registering domain names (Nazi groups, child pornographers, criminals), then perhaps it has a right to do so. But the clinching argument is that countries can exercise that sovereignty to a reasonable degree without controlling domain names. They can order Internet users in their territory to take offensive material down. They can order their banks or credit card companies to refuse to process payments to unsavory Web sites based abroad. Indeed, governments' ample ability to regulate the Internet has already been demonstrated by some of the countries pushing for reform, such as authoritarian China. The sovereign nations of the world have no need to wrest control of the Internet from the United States, because they already have it.

(Adapted from Washington Post, November 21, 2005; A14)
No texto, a palavra que preenche corretamente a lacuna é 
Alternativas
Q2254262 Inglês
The Internet at Risk

    Some 12,000 people convened last week in Tunisia for a United Nations conference about the Internet. Many delegates want an end to the U.S. Commerce Department's control over the assignment of Web site addresses (for example, http://www.washington-%20post.com/ ) and e-mail accounts (for example, [email protected]). The delegates' argument is that unilateral U.S. control over these domain names reflects no more than the historical accident of the Internet's origins. Why should the United States continue to control the registration of French and Chinese Internet addresses? It doesn't control the registration of French and Chinese cars, whatever Henry Ford's historic role in democratizing travel was.
    The reformers' argument is attractive in theory and dangerous in practice. In an ideal world, unilateralism should be avoided. But in an imperfect world, unilateral solutions that run efficiently can be better than multilateral ones that  ....51....
        The job of assigning domain names offers huge opportunities for abuse. ....52.... controls this function can decide to keep certain types of individuals or organizations offline (dissidents or opposition political groups, for example). Or it can allow them on in exchange for large fees. The striking feature of U.S. oversight of the Internet is that such abuses have not occurred.
        It's possible that a multilateral overseer of the Internet might be just as efficient. But the ponderous International Telecommunication Union, the U.N. body that would be a leading candidate to take over the domain registry, has a record of resisting innovation - including the advent of the Internet. Moreover, a multilateral domain-registering body would be caught between the different visions of its members: on the one side, autocratic regimes such as Saudi Arabia and China that want to restrict access to the Internet; on the other side, open societies that want low barriers to entry. These clashes of vision would probably make multilateral regulation inefficiently political. You may say that this is a fair price to pay to uphold the principle of sovereignty. If a country wants to keep certain users from registering domain names (Nazi groups, child pornographers, criminals), then perhaps it has a right to do so. But the clinching argument is that countries can exercise that sovereignty to a reasonable degree without controlling domain names. They can order Internet users in their territory to take offensive material down. They can order their banks or credit card companies to refuse to process payments to unsavory Web sites based abroad. Indeed, governments' ample ability to regulate the Internet has already been demonstrated by some of the countries pushing for reform, such as authoritarian China. The sovereign nations of the world have no need to wrest control of the Internet from the United States, because they already have it.

(Adapted from Washington Post, November 21, 2005; A14)
No texto, o verbo que preenche corretamente a lacuna é 
Alternativas
Q2254261 Banco de Dados
O SQL Server 2000 implementa três tipos de funções definidas pelo usuário (UDF):
I. scalar valued, que retorna um único valor em resposta a cada uma das chamadas à função; II. inline table valued, cuja cláusula RETURNS especifica uma tabela com suas colunas e tipos de dados; III. multi-statement table valued, cuja cláusula RETURNS é seguida da palavra TABLE sem uma lista de colunas.
Está correto o tipo de UDF descrito em
Alternativas
Q2254260 Banco de Dados
 Informações úteis para o DBA diagnosticar problemas no DB2 são geradas pelo utilitário 
Alternativas
Q2254259 Banco de Dados
Uma transação envolvendo um banco de dados atingirá seu término planejado com a execução de uma operação
Alternativas
Q2254258 Banco de Dados
A transferência de produtos entre as lojas da empresa será melhor representada em um Modelo E/R por meio de
Alternativas
Q2254257 Banco de Dados
NÃO é um princípio fundamental dos bancos de dados distribuídos:
Alternativas
Q2254256 Banco de Dados
Um processo que tem comandos SELECT, INSERT, UPDATE ou DELETE, para o controle de concorrência, requer, respectivamente, locks
Alternativas
Q2254255 Banco de Dados
Sobre definição e manipulação de visão, analise:
I. Na criação de uma VIEW pode-se utilizar UNION e ORDER BY. II. Uma VIEW provê mais segurança, pois permite esconder parte dos dados da tabela real. III. Os dados que compõem a VIEW são armazenados separadamente da tabela real. IV. Uma linha inserida na VIEW, com todas as colunas, será inserida na tabela real. V. Se contiver as cláusulas JOIN e GROUP BY, uma VIEW só poderá ser usada para SELECT.
É correto o que consta APENAS em
Alternativas
Q2254254 Banco de Dados
Os usuários finais e os programadores de aplicações interagem com um banco de dados por meio de uma
Alternativas
Q2254253 Banco de Dados
A arquitetura de sistemas de bancos de dados ANSI/SPARC se divide em 3 níveis, na qual o nível interno
Alternativas
Q2254252 Banco de Dados
O endereço de um registro colocado no banco de dados, cujo valor é calculado em função de algum campo do próprio registro, caracteriza
Alternativas
Q2254251 Segurança da Informação
Analise:
I. Os sniffers são programas usados pelos administradores de redes para proteger os computadores sobre o que entra e sai pela rede.
II. Os sniffers são programas usados por pessoas mal intencionadas para tentar descobrir e roubar informações da rede.
III. Para utilizar um sniffer é dispensável que esteja no mesmo segmento de rede que os dados que se pretende capturar.
IV. O Ethereal é um poderoso sniffer.
É correto o que consta em
Alternativas
Q2254250 Redes de Computadores
Os serviços da categoria estação, ou intracélula, do padrão de redes sem fio 802.11, são usados depois que ocorre o serviço
Alternativas
Q2254249 Redes de Computadores
Para que os terminais de VoIP negociem o algoritmo de compactação de voz, é utilizado, da pilha de protocolos H.323, o protocolo
Alternativas
Q2254248 Telecomunicações
O canal básico da SONET, STS-1 (Synchronous Transport Signal-1), é um bloco de 9 linhas de altura e 90 colunas de largura, das quais 3 são reservadas para informações de gerenciamento. Se 8000 blocos são transmitidos por segundo, a taxa de dados bruta resultante é
Alternativas
Q2254247 Redes de Computadores
O cabeçalho de um modo de construção de rotas genérico, padronizado sob o nome MPLS (MultiProtocol Label Switching), NÃO contém o campo
Alternativas
Q2254246 Redes de Computadores
 Analise as características de protocolos de correio eletrônico:
I. A porta TCP usada no POP3 é a 143 e no IMAP a porta 110. II. O controle do usuário sobre o download de mensagem é maior no IMAP que no POP3. III. As cópias das caixas postais com o IMAP ficam no servidor do ISP. IV. As mensagens do correio eletrônico são lidas de forma on-line com o POP3 e off-line com o IMAP.
É correto o que consta em
Alternativas
Q2254245 Redes de Computadores
Em uma estrutura básica de interface de transporte orientada a conexões, um cliente executa uma primitiva receive para
Alternativas
Respostas
2601: B
2602: E
2603: A
2604: B
2605: E
2606: D
2607: C
2608: A
2609: E
2610: B
2611: A
2612: D
2613: C
2614: D
2615: E
2616: C
2617: A
2618: B
2619: A
2620: D