Questões de Concurso Comentadas para prefeitura do rio de janeiro - rj

Foram encontradas 2.290 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q379792 Redes de Computadores
A rede de computadores do TCMRJ integra 7 sub-redes, configuradas por meio do esquema de máscara de tamanho fixo. A alternativa que apresenta a faixa total de endereços de host que inclu o IP 143.226.120.195 com uma máscara representativa de 12 bits de sub-rede é:
Alternativas
Q379791 Inglês

Even though it makes lots of sense, implementing encryption in the enterprise has its drawbacks, ranging from performance degradation, a false sense of security to complexity and cost. These potential obstacles in turn, make many businesses balk. They find themselves faced with a serious and complex dilemma. If encryption is used, costs increase, performance suffers, and the network is saddled with numerous complexities, making it very difficult to manage. If encryption is not used, costs are lower; however, the network is extremely vulnerable.

One advantage to encryption is that it separates the security of data from the security of the device where the data resides or the medium through which data is transmitted. When data itself is encrypted, it allows administrators to use unsecured means to store and transport data, since security is encompassed in the encryption. Other key advantages to implementing encryption include the elimination of the pain that co- mes with data breach disclosures, the provision of strong protection for intellectual property, and the fulfillment of myriad regulatory compliance requirements. Nevertheless, just a cursory look at the intricacies behind encryption algorithms and keys is all that is needed to rapidly understand that this is about as close to rocket science.

Take encryption keys. One of the main drawbacks of encryption is the fact that management of encryption keys must be an added administrative task for often overburdened IT staff. In fact, the security of data becomes the security of the encryption key. “Lose that key, and you effectively lose your data”
An adequate title for the three paragraphs above, which would summarize their content, could be:
Alternativas
Q379790 Inglês

Even though it makes lots of sense, implementing encryption in the enterprise has its drawbacks, ranging from performance degradation, a false sense of security to complexity and cost. These potential obstacles in turn, make many businesses balk. They find themselves faced with a serious and complex dilemma. If encryption is used, costs increase, performance suffers, and the network is saddled with numerous complexities, making it very difficult to manage. If encryption is not used, costs are lower; however, the network is extremely vulnerable.

One advantage to encryption is that it separates the security of data from the security of the device where the data resides or the medium through which data is transmitted. When data itself is encrypted, it allows administrators to use unsecured means to store and transport data, since security is encompassed in the encryption. Other key advantages to implementing encryption include the elimination of the pain that co- mes with data breach disclosures, the provision of strong protection for intellectual property, and the fulfillment of myriad regulatory compliance requirements. Nevertheless, just a cursory look at the intricacies behind encryption algorithms and keys is all that is needed to rapidly understand that this is about as close to rocket science.

Take encryption keys. One of the main drawbacks of encryption is the fact that management of encryption keys must be an added administrative task for often overburdened IT staff. In fact, the security of data becomes the security of the encryption key. “Lose that key, and you effectively lose your data”
The implication of the phrase “Lose the key and you effectively lose your data!”, is that the:
Alternativas
Q379789 Inglês

Even though it makes lots of sense, implementing encryption in the enterprise has its drawbacks, ranging from performance degradation, a false sense of security to complexity and cost. These potential obstacles in turn, make many businesses balk. They find themselves faced with a serious and complex dilemma. If encryption is used, costs increase, performance suffers, and the network is saddled with numerous complexities, making it very difficult to manage. If encryption is not used, costs are lower; however, the network is extremely vulnerable.

One advantage to encryption is that it separates the security of data from the security of the device where the data resides or the medium through which data is transmitted. When data itself is encrypted, it allows administrators to use unsecured means to store and transport data, since security is encompassed in the encryption. Other key advantages to implementing encryption include the elimination of the pain that co- mes with data breach disclosures, the provision of strong protection for intellectual property, and the fulfillment of myriad regulatory compliance requirements. Nevertheless, just a cursory look at the intricacies behind encryption algorithms and keys is all that is needed to rapidly understand that this is about as close to rocket science.

Take encryption keys. One of the main drawbacks of encryption is the fact that management of encryption keys must be an added administrative task for often overburdened IT staff. In fact, the security of data becomes the security of the encryption key. “Lose that key, and you effectively lose your data”
The last paragraph claims that encryption “is about as close to rocket science” because the process:
Alternativas
Q379788 Inglês

Even though it makes lots of sense, implementing encryption in the enterprise has its drawbacks, ranging from performance degradation, a false sense of security to complexity and cost. These potential obstacles in turn, make many businesses balk. They find themselves faced with a serious and complex dilemma. If encryption is used, costs increase, performance suffers, and the network is saddled with numerous complexities, making it very difficult to manage. If encryption is not used, costs are lower; however, the network is extremely vulnerable.

One advantage to encryption is that it separates the security of data from the security of the device where the data resides or the medium through which data is transmitted. When data itself is encrypted, it allows administrators to use unsecured means to store and transport data, since security is encompassed in the encryption. Other key advantages to implementing encryption include the elimination of the pain that co- mes with data breach disclosures, the provision of strong protection for intellectual property, and the fulfillment of myriad regulatory compliance requirements. Nevertheless, just a cursory look at the intricacies behind encryption algorithms and keys is all that is needed to rapidly understand that this is about as close to rocket science.

Take encryption keys. One of the main drawbacks of encryption is the fact that management of encryption keys must be an added administrative task for often overburdened IT staff. In fact, the security of data becomes the security of the encryption key. “Lose that key, and you effectively lose your data”
The expression ‘data breach disclosures’ as used in Paragraph 2 means a/an:
Alternativas
Q379787 Inglês

Even though it makes lots of sense, implementing encryption in the enterprise has its drawbacks, ranging from performance degradation, a false sense of security to complexity and cost. These potential obstacles in turn, make many businesses balk. They find themselves faced with a serious and complex dilemma. If encryption is used, costs increase, performance suffers, and the network is saddled with numerous complexities, making it very difficult to manage. If encryption is not used, costs are lower; however, the network is extremely vulnerable.

One advantage to encryption is that it separates the security of data from the security of the device where the data resides or the medium through which data is transmitted. When data itself is encrypted, it allows administrators to use unsecured means to store and transport data, since security is encompassed in the encryption. Other key advantages to implementing encryption include the elimination of the pain that co- mes with data breach disclosures, the provision of strong protection for intellectual property, and the fulfillment of myriad regulatory compliance requirements. Nevertheless, just a cursory look at the intricacies behind encryption algorithms and keys is all that is needed to rapidly understand that this is about as close to rocket science.

Take encryption keys. One of the main drawbacks of encryption is the fact that management of encryption keys must be an added administrative task for often overburdened IT staff. In fact, the security of data becomes the security of the encryption key. “Lose that key, and you effectively lose your data”
The dilemma referred to in the Paragraph 1 involves at least a choice between:
Alternativas
Q379786 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

Paragraph 4 suggests that a possible hiccup inherent to Fixer’s is that its:
Alternativas
Q379785 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

In Paragraph 2, the phrase “It then comes up with several potential patches...” can be understood as “The Fixer:
Alternativas
Q379784 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

According to Paragraph 2, Fixer works:
Alternativas
Q379783 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

The word ‘resilient’ in “making software significantly more resilient against failure or attack” (Paragraph 1) could best be replaced by :
Alternativas
Q379782 Inglês
Text 1: Software That Fixes Itself

A professor of computer science at the Massachusetts Institute of Technology (MIT) has claimed to have developed software that can find and fix certain types of software bugs within a matter of minutes. Normally when a potentially harmful vulnerability is discovered in a piece of software, it usually takes nearly a month on average for human engineers to come up with a fix and to push the fix out to affected systems. The professor, however, hopes that the new software, called Fixer, will speed this process up, making software significantly more resilient against failure or attack.

Fixer works without assistance from humans and without access to a program’s underlying source code. Instead, the system monitors the behavior of a binary. By observing a program’s normal behavior and assigning a set of rules, Fixer detects certain types of errors, particularly those caused when an attacker injects malicious input into a program. When something goes wrong, Fixer throws up the anomaly and identifies the rules that have been violated. It then comes up with several potential patches designed to push the software into following the violated rules. (The patches are applied directly to the binary, bypassing the source code.) Fixer analyzes these possibilities to decide which are most likely to work, then installs the top candidates and tests their effectiveness. If additional rules are violated, or if a patch causes the system to crash, Fixer rejects it and tries another.

Fixer is particularly effective when installed on a group of machines running the same software. In that case, what Fixer learns from errors on one machine, is used to fix all the others. Because it doesn’t require access to source code, Fixer could be used to fix programs without requiring the cooperation of the company that made the software, or to repair programs that are no longer being maintained.

But Fixer’s approach could result in some hiccups for the user. For example, if a Web browser had a bug that made it unable to handle URLs past a certain length, Fixer’s patch might protect the system by clipping off the ends of URLs that were too long. By preventing the program from failing, it would also put a check on it working full throttle.

In the first paragraph the professor claims that Fixer can:
Alternativas
Q379757 Raciocínio Lógico
A negação da afirmação “se beber, então não dirija” é:
Alternativas
Q379756 Raciocínio Lógico
Tião e Tiago são dois irmãos muito estranhos. Tião mente às quartas, quintas e sextas-feiras, dizendo a verdade no resto da semana. Tiago mente aos domingos, segundas e terças-feiras, dizendo a verdade no resto da semana. Certo dia, ambos disseram:

“AMANHÃ EU VOU MENTIR.”

O dia em que foi feita essa afirmação era:
Alternativas
Q379724 Segurança e Saúde no Trabalho
Para classificação da resistência ao fogo, sujeita-se o corpo de prova a testes, um dos quais consiste em se determinar a capacidade medida em tempo para resistir à atuação do fogo plenamente desenvolvido, sem ocorrência do colapso da estrutura. Para a classificação de resistência ao fogo em que o material resistirá por no mínimo 2 (duas) horas, EXCLUI-SE:
Alternativas
Q379709 Português
Estão presentes no texto as palavras último, é e aleatória. O acento gráfico se justifica, respectivamente, pelo mesmo motivo nas palavras da seguinte alternativa:
Alternativas
Q379515 Direito Processual Civil - CPC 1973
Constitui característica da jurisdição:
Alternativas
Q379511 Direito Civil
As obrigações, quanto ao seu objeto, podem ser:
Alternativas
Q379509 Direito Civil
Consideram-se fatos humanos voluntários os que:
Alternativas
Q379501 Direito Constitucional
De acordo com o modo pelo qual se estrutura, o Brasil pode ser classificado como um Estado:
Alternativas
Q379492 Português
            TEXTO: Estado laico e liberdade religiosa


            Em 12 de novembro último, o Ministério Público Federal ajuizou ação objetivando à retirada da expressão religiosa “Deus seja louvado” das cédulas do real. O argumento é a ofensa ao princípio do Estado laico, além da exclusão de minorias, ao promover uma religião em detrimento de outras. Outros instigantes debates a respeito do alcance da laicidade estatal e da liberdade religiosa têm chegado à Justiça, como o questionamento acerca do uso de símbolos religiosos (como crucifixos) em espaços públicos; de leis que autorizam excepcionalmente o sacrifício de animais em religiões de matriz africana; da realização de exames (como o Enem) em datas alternativas ao Shabat (dia sagrado para o judaísmo); da natureza do ensino religioso em escolas da rede pública, entre outros.

            Ainda que a Constituição, em seu preâmbulo, faça expressa alusão a Deus (a Carta é promulgada “sob a proteção de Deus”), o mesmo texto constitucional veda à União, aos estados, ao Distrito Federal e aos municípios “estabelecer cultos religiosos ou igrejas, subvencioná-los, embaraçar-lhes o funcionamento ou manter com eles ou seus representantes relações de dependência ou aliança (...)” (artigo 19, I da Constituição). É daí que se extrai o princípio do Estado laico: a necessária e desejável separação entre Estado e religião no marco do estado democrático de direito.

            De um lado, o princípio do Estado laico proíbe a fusão entre Estado e religião (como ocorrem nas teocracias), de modo a proteger a liberdade religiosa. Por outro, requer a atuação positiva do Estado no sentido de assegurar uma arena livre, pluralista e democrática em que toda e qualquer religião mereça igual consideração e respeito. A laicidade estatal demanda tanto a liberdade religiosa, como a igualdade no tratamento conferido pelo Estado às mais diversas religiões.

            Isto porque confundir Estado com religião implica a adoção oficial de dogmas incontestáveis, que, ao impor uma moral única, inviabiliza qualquer projeto de sociedade aberta, pluralista e democrática. A ordem jurídica em um estado democrático de direito não pode se converter na voz exclusiva da moral de qualquer religião. Os grupos religiosos têm o direito de constituir suas identidades em torno de seus princípios e valores, pois são parte de uma sociedade democrática. Mas não têm o direito a pretender hegemonizar a cultura de um Estado constitucionalmente laico.

            [...] O Brasil é considerado o maior país católico do mundo em números absolutos. Em 2000, os católicos representavam 74% da população (IBGE, Censo 2000). Em 2009, o universo de católicos correspondia a 68,5% da população brasileira (FGV, Novo Mapa das Religiões, 2011).

            Neste contexto, iniciativas como a do Ministério Público Federal constituem uma importante estratégia para consolidar o princípio do Estado laico, endossando o dever do Estado de garantir condições de igual liberdade religiosa. Inspirado pela razão pública e secular, o estado democrático de direito não pode ser refém de dogmas religiosos do sagrado, mas deve garantir a diversidade de doutrinas religiosas, filosóficas e morais como condição da própria cultura pública democrática.

            Flávia Piovesan [professora da PUC/SP e procuradora do estado] - fragmento Publicado em 29/11/12 - disponível em: http:// oglobo.globo.com/opiniao/estado-laico-liberdade-religiosa


“Ainda que a Constituição, em seu preâmbulo, faça expressa alusão a Deus...” (2º parágrafo)

Haveria importante alteração na relação de sentido estabelecida entre essa oração e a sequência da frase no texto se a expressão em destaque fosse substituída por:
Alternativas
Respostas
1821: D
1822: C
1823: B
1824: D
1825: E
1826: B
1827: C
1828: A
1829: E
1830: C
1831: D
1832: D
1833: B
1834: B
1835: E
1836: A
1837: A
1838: A
1839: C
1840: C