Questões de Concurso
Comentadas para prodabel - mg
Foram encontradas 78 questões
Resolva questões gratuitamente!
Junte-se a mais de 4 milhões de concurseiros!
Nesse caso, o tipo de backup realizado foi
1. Em função de alterações na legislação fiscal, o departamento de contabilidade solicitou adaptações no banco de dados em que trabalha. Portanto, teremos que alterar a estrutura dos arquivos e todos os aplicativos referentes a eles.
2. Observaram-se nos sistemas do RH e do departamento de treinamento informações inconsistentes de alguns funcionários. Precisamos identificar a razão do problema.
Analise as seguintes afirmativas e assinale com V as verdadeiras e com F as falsas.
( ) As situações descritas nas sentenças 1 e 2 são consequência da não utilização de um sistema gerenciador de banco de dados.
( ) A situação descrita na sentença 2 é consequência da duplicação de dados.
( ) A situação descrita na sentença 1 é consequência da dependência dos programas de aplicação.
Assinale a alternativa que apresenta a sequência de letras CORRETA.
( ) Na guia “Planilha”, é possível definir a orientação (retrato ou paisagem) da planilha a ser impressa.
( ) Na guia “Planilha”, é possível selecionar um intervalo de planilha a ser impresso, usando a caixa “Área de Impressão”.
( ) Na guia “Página” é possível configurar a impressão de títulos de linha e coluna.
( ) Na guia “Margens”, é possível personalizar o cabeçalho e o rodapé da planilha.
Assinale a opção com a sequência CORRETA.
Posted by Olga Kharif on January 27
On Jan. 27, Apple said it will soon make available a version of its iPad tablet computer able to run over AT&T‟s wireless network, as long as you pay $15 or $30 a month for service. The device could usher in the era of more people paying wireless charges for multiple mobile devices.
In other parts of the world, paying for multiple mobile devices is already commonplace. In Italy, people often own several phones, one for calling and one for messaging. And Americans should follow suit. In a few years, each American will own four or five mobile devices, each of them requiring a voice or a data plan, figures wireless expert Chetan Sharma.
A small percentage of Americans already pays for service for several mobile devices. Amazon‟s Kindle e-reader comes with wireless connectivity to Sprint Nextel‟s network priced in. Some consumers pay monthly charges for data cards, allowing them to connect their laptops to wireless networks. The iPad, which some analysts expect to sell 5 million units in its first year, could push the idea of paying for service for non-phone devices into the mainstream. If the iPad takes off, that is.
That, in turn, could lead to the introduction of family plans for devices, an idea analysts have talked about for years. A carrier might sell you a pool of wireless minutes and data access to be used by your stable of three or four wireless devices, such as a tablet, a gaming console, a car navigation system and your phone.
Clearly, as Americans snap up more wireless gadgets that require wireless plans, carriers stand to benefit, big time. Their costs in pushing these gadgets to consumers should be low: The devices‟ manufacturers will do the heavy lifting of marketing and selling the gadgets in their stores. The devices won‟t necessarily have to be subsidized; AT&T won‟t subsidize the iPad, Jefferies analyst Jonathan Schildkraut says in a Jan. 27 note. The carriers will likely have to share service revenues with the manufacturers, though, and those service fees may be smaller than regular phone charges. But even those fees could drive the carriers‟ growth for years to come, Sharma says.
http://www.businessweek.com/the_thread/techbeat/archives/2010/01/ipad_pushing_mo.html
From the text we see that Chetan Sharma is
I. Handoff é quando um hospedeiro (host) móvel se desloca para fora da faixa de alcance de uma estação-base e entra na faixa de outra. Assim, ele muda seu ponto de conexão com a rede maior alterando a estação-base com a qual estava associado inicialmente.
II. Quando os hosts sem fio estão conectados a uma rede maior por intermédio de uma estação-base (ou ponto de acesso) diz-se que a rede sem fio está operando em modo infraestrutura.
III. Em redes ad hoc, os hosts sem fio não dispõem de estação-base (ou ponto de acesso) para se conectarem a rede sem fio.
Assinale a alternativa CORRETA:
( ) A = 0; B = 0; X = 0. ( ) A = 0; B = 1; X = 1. ( ) A = 1; B = 0; X = 1. ( ) A = 1; B = 1; X = 1.
Assinale a opção com a sequência de respostas CORRETA.
Protocolo
I. FTP II. HTTP III. SMTP IV. Telnet
Porta
( ) 25 ( ) 23 ( ) 21 ( ) 80
Está CORRETA a seguinte sequência de respostas:
I. A escala também é apresentada na forma gráfica.
II. A escala numérica indica no denominador o valor que deve ser usado para multiplicar uma medida feita sobre o mapa e transformá-la num valor correspondente na mesma unidade de medida sobre a superfície terrestre.
III. A escala não deve ser representada de forma gráfica, pois causa lixo visual.
Estão corretas:
New Research Advances Voice Security Technology
ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity. "The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."
Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."
Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."
To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."
The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.
The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.
NC State's Department of Computer Science is part of the university's College of Engineering.
http://www.sciencedaily.com/releases/2010/03/100308102202.htm
“Current computer models […] may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance.”
In this sentence, the relative pronoun which refers to the