Questões de Concurso Comentadas para analista de sistemas - desenvolvimento de sistemas

Foram encontradas 434 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q2074637 Governança de TI
Quais são as categorias de eventos descritas no processo de Gestão de Eventos da Operação de Serviço (Service Operation) da biblioteca ITIL V3?
Alternativas
Q2074634 Algoritmos e Estrutura de Dados

Analise as afirmativas referentes às estruturas de dados básicas:


I – Uma lista linear é uma sequência de zero ou mais itens x1, x2, ..., xn, em que xi é de um determinado tipo e n representa o tamanho da lista linear.


II – Uma pilha é uma lista linear em que todas as inserções, retiradas e geralmente todos os acessos, são feitos em apenas um extremo da lista.


III – Uma fila é uma lista linear em que todas as inserções são realizadas em um extremo da lista e todos os acessos e retiradas são realizados no mesmo extremo da lista.


Estão CORRETAS as afirmativas:

Alternativas
Q2074629 Direito Constitucional
Os Estados que compõem uma Federação vinculam-se à seguinte premissa própria desta forma de organização: 
Alternativas
Q2074628 Direito Constitucional
O exercício da representação política no Estado brasileiro, consideradas todas as esferas da Federação no modelo atual, está corretamente relacionado ao requisito contido em: 
Alternativas
Q2074622 Direito Constitucional
O Direito Humano fundamental à saúde, na Constituição da República Federativa do Brasil de 1988, é garantido com as seguintes características:
Alternativas
Q2074621 Inglês

Ten critical actions needed to address four major cybersecurity challenges:



In the sentence “4. Ensure the security of emerging technologies...”, the word emerging functions as 
Alternativas
Q2074620 Inglês

Ten critical actions needed to address four major cybersecurity challenges:



The use of the preposition for in “1. Develop and execute a more comprehensive federal strategy for national cybersecurity…” indicates

Alternativas
Q2074618 Inglês

Cybersecurity: An overview of cyber challenges facing the nation, and actions needed


Federal agencies and the nation’s critical infrastructure — such as energy, transportation systems, communications, and financial services — depend on Information Technology (IT) systems to carry out operations and process essential data. However, the risks to these IT systems are increasing—including insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Rapid developments in new technologies, such as artificial intelligence, the Internet of Things, and ubiquitous Internet and cellular connectivity, can also introduce security issues. Over 28,000 security incidents were reported by federal civilian agencies to the Department of Homeland Security in FY 2019.

Additionally, since many government IT systems contain vast amounts of personally identifiable information (PII), federal agencies must protect the confidentiality, integrity, and availability of this information—and effectively respond to data breaches and security incidents. Likewise, the trend in the private sector of collecting extensive and detailed information about individuals needs appropriate limits.

To highlight the importance of these issues, Government Accountability Office (GAO) has designated information security as a government-wide high-risk area since 1997. This high-risk area was expanded in 2003 to include the protection of critical cyber infrastructure and, in 2015, to include protecting the privacy of PII.

GAO has made about 3,300 recommendations to federal agencies to address cybersecurity shortcomings—and we reported that more than 750 of these had not been fully implemented as of December 2020. We designated 67 as priority, meaning that we believe they warrant priority attention from heads of key departments and agencies.

Adapted from: https://www.gao.gov/cybersecurity. Available on November 16th, 2022

The pronoun these in “more than 750 of these had not been fully implemented” refers to 
Alternativas
Q2074617 Inglês

Cybersecurity: An overview of cyber challenges facing the nation, and actions needed


Federal agencies and the nation’s critical infrastructure — such as energy, transportation systems, communications, and financial services — depend on Information Technology (IT) systems to carry out operations and process essential data. However, the risks to these IT systems are increasing—including insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Rapid developments in new technologies, such as artificial intelligence, the Internet of Things, and ubiquitous Internet and cellular connectivity, can also introduce security issues. Over 28,000 security incidents were reported by federal civilian agencies to the Department of Homeland Security in FY 2019.

Additionally, since many government IT systems contain vast amounts of personally identifiable information (PII), federal agencies must protect the confidentiality, integrity, and availability of this information—and effectively respond to data breaches and security incidents. Likewise, the trend in the private sector of collecting extensive and detailed information about individuals needs appropriate limits.

To highlight the importance of these issues, Government Accountability Office (GAO) has designated information security as a government-wide high-risk area since 1997. This high-risk area was expanded in 2003 to include the protection of critical cyber infrastructure and, in 2015, to include protecting the privacy of PII.

GAO has made about 3,300 recommendations to federal agencies to address cybersecurity shortcomings—and we reported that more than 750 of these had not been fully implemented as of December 2020. We designated 67 as priority, meaning that we believe they warrant priority attention from heads of key departments and agencies.

Adapted from: https://www.gao.gov/cybersecurity. Available on November 16th, 2022

The use of the conjunction since in “since many government IT systems contain vast amount of personally identifiable information” conveys an idea of
Alternativas
Q2074616 Inglês

Cybersecurity: An overview of cyber challenges facing the nation, and actions needed


Federal agencies and the nation’s critical infrastructure — such as energy, transportation systems, communications, and financial services — depend on Information Technology (IT) systems to carry out operations and process essential data. However, the risks to these IT systems are increasing—including insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Rapid developments in new technologies, such as artificial intelligence, the Internet of Things, and ubiquitous Internet and cellular connectivity, can also introduce security issues. Over 28,000 security incidents were reported by federal civilian agencies to the Department of Homeland Security in FY 2019.

Additionally, since many government IT systems contain vast amounts of personally identifiable information (PII), federal agencies must protect the confidentiality, integrity, and availability of this information—and effectively respond to data breaches and security incidents. Likewise, the trend in the private sector of collecting extensive and detailed information about individuals needs appropriate limits.

To highlight the importance of these issues, Government Accountability Office (GAO) has designated information security as a government-wide high-risk area since 1997. This high-risk area was expanded in 2003 to include the protection of critical cyber infrastructure and, in 2015, to include protecting the privacy of PII.

GAO has made about 3,300 recommendations to federal agencies to address cybersecurity shortcomings—and we reported that more than 750 of these had not been fully implemented as of December 2020. We designated 67 as priority, meaning that we believe they warrant priority attention from heads of key departments and agencies.

Adapted from: https://www.gao.gov/cybersecurity. Available on November 16th, 2022

Which of the sentences from the text presented below is in the Passive Voice?
Alternativas
Q2074615 Inglês

Cybersecurity: An overview of cyber challenges facing the nation, and actions needed


Federal agencies and the nation’s critical infrastructure — such as energy, transportation systems, communications, and financial services — depend on Information Technology (IT) systems to carry out operations and process essential data. However, the risks to these IT systems are increasing—including insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Rapid developments in new technologies, such as artificial intelligence, the Internet of Things, and ubiquitous Internet and cellular connectivity, can also introduce security issues. Over 28,000 security incidents were reported by federal civilian agencies to the Department of Homeland Security in FY 2019.

Additionally, since many government IT systems contain vast amounts of personally identifiable information (PII), federal agencies must protect the confidentiality, integrity, and availability of this information—and effectively respond to data breaches and security incidents. Likewise, the trend in the private sector of collecting extensive and detailed information about individuals needs appropriate limits.

To highlight the importance of these issues, Government Accountability Office (GAO) has designated information security as a government-wide high-risk area since 1997. This high-risk area was expanded in 2003 to include the protection of critical cyber infrastructure and, in 2015, to include protecting the privacy of PII.

GAO has made about 3,300 recommendations to federal agencies to address cybersecurity shortcomings—and we reported that more than 750 of these had not been fully implemented as of December 2020. We designated 67 as priority, meaning that we believe they warrant priority attention from heads of key departments and agencies.

Adapted from: https://www.gao.gov/cybersecurity. Available on November 16th, 2022

The use of the modal verb can in “can also introduce security issues” indicates that 
Alternativas
Q2074614 Inglês

Cybersecurity: An overview of cyber challenges facing the nation, and actions needed


Federal agencies and the nation’s critical infrastructure — such as energy, transportation systems, communications, and financial services — depend on Information Technology (IT) systems to carry out operations and process essential data. However, the risks to these IT systems are increasing—including insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Rapid developments in new technologies, such as artificial intelligence, the Internet of Things, and ubiquitous Internet and cellular connectivity, can also introduce security issues. Over 28,000 security incidents were reported by federal civilian agencies to the Department of Homeland Security in FY 2019.

Additionally, since many government IT systems contain vast amounts of personally identifiable information (PII), federal agencies must protect the confidentiality, integrity, and availability of this information—and effectively respond to data breaches and security incidents. Likewise, the trend in the private sector of collecting extensive and detailed information about individuals needs appropriate limits.

To highlight the importance of these issues, Government Accountability Office (GAO) has designated information security as a government-wide high-risk area since 1997. This high-risk area was expanded in 2003 to include the protection of critical cyber infrastructure and, in 2015, to include protecting the privacy of PII.

GAO has made about 3,300 recommendations to federal agencies to address cybersecurity shortcomings—and we reported that more than 750 of these had not been fully implemented as of December 2020. We designated 67 as priority, meaning that we believe they warrant priority attention from heads of key departments and agencies.

Adapted from: https://www.gao.gov/cybersecurity. Available on November 16th, 2022

According to the text, the escalating threats to IT systems

Alternativas
Q2074613 Matemática
No lançamento de uma moeda por seis vezes consecutivas, qual a probabilidade de se obter exatamente 2 caras?
Alternativas
Q2074612 Matemática
Observe a tabela a seguir, obtida a partir de dados retirados dos arquivos de certa academia, composta pela medida da altura de alguns de seus frequentadores matriculados: 
Imagem associada para resolução da questão

A altura mediana é igual a:
Alternativas
Q2074611 Matemática

Para estruturar determinada armação de madeira em vigas de sustentação do telhado de um salão de jogos do clube, o planejamento foi desenhado previamente no seguinte projeto: 


Imagem associada para resolução da questão


Considerando que o desenho acima está na escala 1:20 e que a medida CE, no desenho, é igual a 80 cm e que o ângulo AÊD é igual a 30º , o comprimento BC de madeira que deverá ser cortada para compor a estrutura deverá ser igual a

Alternativas
Q2074609 Matemática
Para a análise territorial de determinada região rural cuja área é de 1 km² , um mapa cuja escala é 1:1000 foi utilizado. Essa região no mapa ocupa uma área de
Alternativas
Q2074608 Matemática
Uma torneira aberta enche um tanque em 15 minutos e outro modelo de torneira, com vazão diferente da primeira, enche o mesmo tanque em 30 minutos. Ao abrilas simultaneamente, o tempo gasto para encherem o mesmo tanque será igual a
Alternativas
Q2074607 Matemática
Rodrigo trabalha em uma empresa de maneira remota, mas precisa frequentar reuniões periódicas presenciais com a sua equipe a cada 4 dias. O seu primeiro dia de reunião presencial com a equipe foi em um sábado; a segunda vez foi na quarta-feira seguinte e assim por diante. Nesse caso, a centésima vez em que Rodrigo teve reunião presencial foi 
Alternativas
Q2074606 Matemática
Determinada empresa de produção de dados cúbicos pretende realizar uma entrega armazenando esses cubos em caixas retangulares de dimensões 18 cm, 30 cm e 48 cm. O menor número total de dados cúbicos iguais que enchem totalmente essa caixa é igual a 
Alternativas
Q2020874 Sistemas Operacionais

Julgue o item a seguir acerca de computação em nuvem.


Infrastructure as code (IaC) consiste na utilização de uma linguagem de codificação descritiva de alto nível cujo objetivo é automatizar o provisionamento da infraestrutura de TI.

Alternativas
Respostas
101: A
102: A
103: B
104: A
105: B
106: C
107: D
108: C
109: A
110: B
111: D
112: C
113: D
114: B
115: A
116: C
117: B
118: A
119: B
120: C