Questões de Concurso Comentadas para analista de políticas públicas e gestão governamental

Foram encontradas 275 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q969806 Sistemas Operacionais
Assinale a opção que indica, no sistema operacional Linux, o comando que pode ser utilizado para listar os arquivos do diretório /tmp, seus respectivos subdiretórios, inclusive os arquivos ocultos.
Alternativas
Q969805 Redes de Computadores

A topologia de uma rede de computadores determina como os dispositivos da rede estão interconectados uns nos outros. Em relação às topologias de rede, analise as afirmativas a seguir.


I. Em uma rede em estrela os dados são transmitidos unidirecionalmente de nó em nó até atingir o seu destino.

II. Na rede em barramento é necessário estabelecer um mecanismo de arbitragem para resolver conflitos para o caso de duas ou mais máquinas tentarem fazer uma transmissão simultaneamente.

III. Na topologia em anel os dispositivos da rede são conectados a um switch central responsável por encaminhar os dados especificamente para as estações de destino.


Está correto o que se afirma em

Alternativas
Q969804 Sistemas Operacionais

Sobre sistemas de arquivos, analise as afirmativas a seguir.


I. FAT32 utiliza 16 bits para o endereçamento de dados.

II. O tamanho máximo do nome de arquivo no sistema Ext2 é de 1024 bytes.

III. NTFS permite definir os usuários do sistema que podem ter acesso de leitura a determinados arquivos.


Está correto o que se afirma em

Alternativas
Q969803 Redes de Computadores

O RAID é a tecnologia que monta arranjos de discos com a finalidade de aprimorar a segurança e/ou desempenho. Em relação aos níveis de RAID, analise as afirmativas a seguir.

I. RAID 0 divide os dados em pequenos segmentos e os distribui entre os discos disponíveis.

II. RAID 1 usa espelhamento para armazenar os dados em duas ou mais unidades.

III. RAID 10 exige ao menos 3 discos, pois nesse arranjo um disco é dedicado para armazenar a informação de paridade necessária para detecção de erro.


Está correto o que se afirma em

Alternativas
Q969802 Noções de Informática

Pedro é o proprietário do arquivo header.txt em um sistema Linux e gostaria de assegurar que somente ele tivesse permissão de leitura, gravação e execução a este arquivo, enquanto que todos os demais usuários com acesso ao sistema tivessem somente a permissão de leitura.

Assinale a opção que indica o comando que pode ser usado para conseguir esse objetivo.

Alternativas
Q969801 Direito Constitucional

José e Antônio, estudantes de Direito, considerando a livre iniciativa, travaram intenso debate a respeito da intervenção do Estado na atividade econômica, sendo suas conclusões nitidamente influenciadas pela ideologia político-econômica que cada um deles adotava.

José afirmava que a livre iniciativa exigia que o Estado se distanciasse dessa atividade, não podendo incentivá-la ou planejá-la, mas apenas fiscalizá-la. Antônio, por sua vez, defendia que o Estado deveria não só fiscalizar como incentivar e planejar, sendo o planejamento determinante para o setor público e indicativo para o setor privado.

À luz da sistemática constitucional, assinale a afirmativa correta.

Alternativas
Q969800 Controle Externo

O Tribunal de Contas do Estado Alfa, único ali existente, ao analisar o ato de concessão de pensão por morte a Maria, viúva do servidor público municipal Carlos, identificou ilegalidade na contagem do tempo de contribuição. Em razão disso, determinou o retorno do respectivo processo administrativo ao órgão de origem e fixou prazo para a sua correção.

À luz da sistemática constitucional, a conduta do Tribunal de Contas do Estado Alfa está

Alternativas
Q969799 Direito Constitucional

O Art. 100 da Constituição do Estado Beta foi emendado há poucos dias e passou a dispor que o subsídio de todos os agentes públicos do Estado e dos Municípios nele localizados observaria, como limite único, o subsídio mensal dos Desembargadores do respectivo Tribunal de Justiça.

À luz da sistemática afeta ao regime de subsídios, tal qual estabelecido na Constituição da República Federativa do Brasil, o Art. 100 da Constituição do Estado Beta é

Alternativas
Q969798 Direito Constitucional

A Lei X do Estado Delta dispôs sobre os requisitos a serem observados na celebração de contratos de transporte no seu território.

A Associação das Empresas de Transporte, insatisfeita com os efeitos práticos da Lei X, procurou um advogado e solicitou que fosse esclarecido se o Estado teria competência para legislar sobre essa matéria.

À luz da sistemática constitucional, a Lei X

Alternativas
Q969797 Direito Constitucional

João foi condenado a alguns anos de prisão pela prática de certo crime. A sentença condenatória foi objeto de recurso de apelação, ainda não julgado pelo Tribunal competente. Posteriormente à sua condenação em primeira instância, entrou em vigor a Lei WX, que aumentou a pena mínima cominada ao crime pelo qual João fora condenado. Essa nova pena supera em muito a pena que lhe fora aplicada.

À luz da sistemática constitucional afeta aos direitos e às garantias fundamentais, o Tribunal competente, ao julgar o recurso de apelação, deve considerar a Lei WX

Alternativas
Q969795 Controle Externo
As opções a seguir apresentam exemplos da fiscalização contábil, financeira, orçamentária, operacional e patrimonial exercida pelo Tribunal de Contas da União (TCU), à exceção de uma. Assinale-a.
Alternativas
Q969794 Direito Administrativo

O Estado Sigma e os Municípios Zeta, Teta e Ômega, localizados no território do referido Estado, celebraram consórcio público para a gestão dos resíduos sólidos, constituindo-o como pessoa jurídica de direito privado.

Nesse caso,

Alternativas
Q969793 Direito Constitucional

A Polícia Civil do estado Ômega vem monitorando uma suposta quadrilha de distribuição de drogas sintéticas para jovens de classe média.

A partir de interceptação telefônica, uma das operações realizadas resultou na prisão de três suspeitos, na apreensão de dois mil comprimidos e de três aparelhos celulares, cujos registros de chamadas, após decisão judicial, foram analisados e levaram à expedição de dois mandados de busca e apreensão e de dois mandados de prisão.

Sobre o caso, assinale a afirmativa correta.

Alternativas
Q969791 Raciocínio Lógico

Entre os amigos Alberto, Rodrigo e Marcelo, um deles é flamenguista, outro é tricolor e, outro, vascaíno.

Entre as afirmações a seguir, somente uma é verdadeira:

- Alberto é tricolor.

- Rodrigo não é vascaíno.

- O tricolor não é Marcelo.

É correto afirmar que

Alternativas
Q969783 Inglês

(Source:http://www.revasolutions.com/internet-of-things-newchallenges-and-practices-for-information-governance/. Retrieved on January 26th, 2018) 


Governance Challenges for the Internet of Things


Virgilio A.F. Almeida -Federal University of Minas Gerais, Brazil

Danilo Doneda - Rio de Janeiro State University

Marília Monteiro - Public Law Institute of Brasília

Published by the IEEE Computer Society

© 2015 


The future will be rich with sensors capable of collecting vast amounts of information. The Internet will be almost fused with the physical world as the Internet of Things (IoT) becomes a reality. Although it’s just beginning, experts estimate that by the end of 2015 there will be around 25 billion “things” connected to the global Internet. By 2025, the estimated number of connected devices should reach 100 billion. These estimates include smartphones, vehicles, appliances, and industrial equipment. Privacy, security, and safety fears grow as the IoT creates conditions for increasing surveillance by governments and corporations. So the question is: Will the IoT be good for the many, or the mighty few? 


While technological aspects of the IoT have been extensively published in the technical literature, few studies have addressed the IoT’s social and political impacts. Two studies have shed light on challenges for the future with the IoT. In 2013, the European Commission (EC) published a study focusing on relevant aspects for possible IoT governance regimes. The EC report identified many challenges for IoT governance — namely privacy, security, ethics, and competition. In 2015, the US Federal Trade Commission (FTC) published the FTC Staff Report The Internet of Things: Privacy and Security in a Connected World. Although the report emphasizes the various benefits that the IoT will bring to consumers and citizens, it acknowledges that there are many risks associated with deploying IoT-based applications, especially in the realm of privacy and security. 

[…] 


The nature of privacy and security problems frequently associated with the IoT indicates that further research, analysis, and discussion are needed to identify possible solutions. First, the introduction of security and privacy elements in the very design of sensors, implementing Privacy by Design, must be taken into account for outcomes such as the homologation process of sensors by competent authorities. Even if the privacy governance of IoT can oversee the control centers for collected data, we must develop concrete means to set limits on the amount or nature of the personal data collected. 


Other critical issues regard notification and consent. If, from one side, it’s true that several sensors are already collecting as much personal data as possible, something must be done to increase citizens’ awareness of these data collection processes. Citizens must have means to take measures to protect their rights whenever necessary. If future scenarios indicate the inadequacy of a mere notice-and-consent approach, alternatives must be presented so that the individual’s autonomy isn’t eroded. 


As with other technologies that aim to change human life, the IoT must be in all respects designed with people as its central focus. Privacy and ethics aren’t natural aspects to be considered in technology’s agenda. However, these features are essential to build the necessary trust in an IoT ecosystem, making it compatible with human rights and ensuring that it’s drafted at the measure, and not at the expense, of people. 


(Source: https://cyber.harvard.edu/~valmeida/pdf/IoT-governance.pdf Retrieved on January 23rd, 2018)  

Text II concludes that, if the IoT ecosystem is to be trusted, it should focus on the needs of
Alternativas
Q969782 Inglês

(Source:http://www.revasolutions.com/internet-of-things-newchallenges-and-practices-for-information-governance/. Retrieved on January 26th, 2018) 


Governance Challenges for the Internet of Things


Virgilio A.F. Almeida -Federal University of Minas Gerais, Brazil

Danilo Doneda - Rio de Janeiro State University

Marília Monteiro - Public Law Institute of Brasília

Published by the IEEE Computer Society

© 2015 


The future will be rich with sensors capable of collecting vast amounts of information. The Internet will be almost fused with the physical world as the Internet of Things (IoT) becomes a reality. Although it’s just beginning, experts estimate that by the end of 2015 there will be around 25 billion “things” connected to the global Internet. By 2025, the estimated number of connected devices should reach 100 billion. These estimates include smartphones, vehicles, appliances, and industrial equipment. Privacy, security, and safety fears grow as the IoT creates conditions for increasing surveillance by governments and corporations. So the question is: Will the IoT be good for the many, or the mighty few? 


While technological aspects of the IoT have been extensively published in the technical literature, few studies have addressed the IoT’s social and political impacts. Two studies have shed light on challenges for the future with the IoT. In 2013, the European Commission (EC) published a study focusing on relevant aspects for possible IoT governance regimes. The EC report identified many challenges for IoT governance — namely privacy, security, ethics, and competition. In 2015, the US Federal Trade Commission (FTC) published the FTC Staff Report The Internet of Things: Privacy and Security in a Connected World. Although the report emphasizes the various benefits that the IoT will bring to consumers and citizens, it acknowledges that there are many risks associated with deploying IoT-based applications, especially in the realm of privacy and security. 

[…] 


The nature of privacy and security problems frequently associated with the IoT indicates that further research, analysis, and discussion are needed to identify possible solutions. First, the introduction of security and privacy elements in the very design of sensors, implementing Privacy by Design, must be taken into account for outcomes such as the homologation process of sensors by competent authorities. Even if the privacy governance of IoT can oversee the control centers for collected data, we must develop concrete means to set limits on the amount or nature of the personal data collected. 


Other critical issues regard notification and consent. If, from one side, it’s true that several sensors are already collecting as much personal data as possible, something must be done to increase citizens’ awareness of these data collection processes. Citizens must have means to take measures to protect their rights whenever necessary. If future scenarios indicate the inadequacy of a mere notice-and-consent approach, alternatives must be presented so that the individual’s autonomy isn’t eroded. 


As with other technologies that aim to change human life, the IoT must be in all respects designed with people as its central focus. Privacy and ethics aren’t natural aspects to be considered in technology’s agenda. However, these features are essential to build the necessary trust in an IoT ecosystem, making it compatible with human rights and ensuring that it’s drafted at the measure, and not at the expense, of people. 


(Source: https://cyber.harvard.edu/~valmeida/pdf/IoT-governance.pdf Retrieved on January 23rd, 2018)  

The word “several” in “it’s true that several sensors are already collecting as much personal data as possible” (fourth paragraph) is a synonym for
Alternativas
Q969781 Inglês

(Source:http://www.revasolutions.com/internet-of-things-newchallenges-and-practices-for-information-governance/. Retrieved on January 26th, 2018) 


Governance Challenges for the Internet of Things


Virgilio A.F. Almeida -Federal University of Minas Gerais, Brazil

Danilo Doneda - Rio de Janeiro State University

Marília Monteiro - Public Law Institute of Brasília

Published by the IEEE Computer Society

© 2015 


The future will be rich with sensors capable of collecting vast amounts of information. The Internet will be almost fused with the physical world as the Internet of Things (IoT) becomes a reality. Although it’s just beginning, experts estimate that by the end of 2015 there will be around 25 billion “things” connected to the global Internet. By 2025, the estimated number of connected devices should reach 100 billion. These estimates include smartphones, vehicles, appliances, and industrial equipment. Privacy, security, and safety fears grow as the IoT creates conditions for increasing surveillance by governments and corporations. So the question is: Will the IoT be good for the many, or the mighty few? 


While technological aspects of the IoT have been extensively published in the technical literature, few studies have addressed the IoT’s social and political impacts. Two studies have shed light on challenges for the future with the IoT. In 2013, the European Commission (EC) published a study focusing on relevant aspects for possible IoT governance regimes. The EC report identified many challenges for IoT governance — namely privacy, security, ethics, and competition. In 2015, the US Federal Trade Commission (FTC) published the FTC Staff Report The Internet of Things: Privacy and Security in a Connected World. Although the report emphasizes the various benefits that the IoT will bring to consumers and citizens, it acknowledges that there are many risks associated with deploying IoT-based applications, especially in the realm of privacy and security. 

[…] 


The nature of privacy and security problems frequently associated with the IoT indicates that further research, analysis, and discussion are needed to identify possible solutions. First, the introduction of security and privacy elements in the very design of sensors, implementing Privacy by Design, must be taken into account for outcomes such as the homologation process of sensors by competent authorities. Even if the privacy governance of IoT can oversee the control centers for collected data, we must develop concrete means to set limits on the amount or nature of the personal data collected. 


Other critical issues regard notification and consent. If, from one side, it’s true that several sensors are already collecting as much personal data as possible, something must be done to increase citizens’ awareness of these data collection processes. Citizens must have means to take measures to protect their rights whenever necessary. If future scenarios indicate the inadequacy of a mere notice-and-consent approach, alternatives must be presented so that the individual’s autonomy isn’t eroded. 


As with other technologies that aim to change human life, the IoT must be in all respects designed with people as its central focus. Privacy and ethics aren’t natural aspects to be considered in technology’s agenda. However, these features are essential to build the necessary trust in an IoT ecosystem, making it compatible with human rights and ensuring that it’s drafted at the measure, and not at the expense, of people. 


(Source: https://cyber.harvard.edu/~valmeida/pdf/IoT-governance.pdf Retrieved on January 23rd, 2018)  

The first paragraph opens and ends, in this order, with
Alternativas
Q969780 Inglês

(Source:http://www.revasolutions.com/internet-of-things-newchallenges-and-practices-for-information-governance/. Retrieved on January 26th, 2018) 


Governance Challenges for the Internet of Things


Virgilio A.F. Almeida -Federal University of Minas Gerais, Brazil

Danilo Doneda - Rio de Janeiro State University

Marília Monteiro - Public Law Institute of Brasília

Published by the IEEE Computer Society

© 2015 


The future will be rich with sensors capable of collecting vast amounts of information. The Internet will be almost fused with the physical world as the Internet of Things (IoT) becomes a reality. Although it’s just beginning, experts estimate that by the end of 2015 there will be around 25 billion “things” connected to the global Internet. By 2025, the estimated number of connected devices should reach 100 billion. These estimates include smartphones, vehicles, appliances, and industrial equipment. Privacy, security, and safety fears grow as the IoT creates conditions for increasing surveillance by governments and corporations. So the question is: Will the IoT be good for the many, or the mighty few? 


While technological aspects of the IoT have been extensively published in the technical literature, few studies have addressed the IoT’s social and political impacts. Two studies have shed light on challenges for the future with the IoT. In 2013, the European Commission (EC) published a study focusing on relevant aspects for possible IoT governance regimes. The EC report identified many challenges for IoT governance — namely privacy, security, ethics, and competition. In 2015, the US Federal Trade Commission (FTC) published the FTC Staff Report The Internet of Things: Privacy and Security in a Connected World. Although the report emphasizes the various benefits that the IoT will bring to consumers and citizens, it acknowledges that there are many risks associated with deploying IoT-based applications, especially in the realm of privacy and security. 

[…] 


The nature of privacy and security problems frequently associated with the IoT indicates that further research, analysis, and discussion are needed to identify possible solutions. First, the introduction of security and privacy elements in the very design of sensors, implementing Privacy by Design, must be taken into account for outcomes such as the homologation process of sensors by competent authorities. Even if the privacy governance of IoT can oversee the control centers for collected data, we must develop concrete means to set limits on the amount or nature of the personal data collected. 


Other critical issues regard notification and consent. If, from one side, it’s true that several sensors are already collecting as much personal data as possible, something must be done to increase citizens’ awareness of these data collection processes. Citizens must have means to take measures to protect their rights whenever necessary. If future scenarios indicate the inadequacy of a mere notice-and-consent approach, alternatives must be presented so that the individual’s autonomy isn’t eroded. 


As with other technologies that aim to change human life, the IoT must be in all respects designed with people as its central focus. Privacy and ethics aren’t natural aspects to be considered in technology’s agenda. However, these features are essential to build the necessary trust in an IoT ecosystem, making it compatible with human rights and ensuring that it’s drafted at the measure, and not at the expense, of people. 


(Source: https://cyber.harvard.edu/~valmeida/pdf/IoT-governance.pdf Retrieved on January 23rd, 2018)  

Mark the statements below as true (T) or false (F) according to Text II:


( ) There are already many studies on the social and political effects of the IoT.

( ) Research studies on security and privacy still need to be carried out.

( ) The report from the US Federal Trade Commission supported the unrestricted use of the IoT.

Alternativas
Q969779 Inglês

(Source: http://www.information-age.com/approach-cloud-computingcyber-security-2017-123466624/ Retrieved on January 26th, 2018) 



How to approach cloud computing and cyber security in 2017


The adoption of cloud computing has been on the up since as far back as 2008, when a survey conducted by the Pew Research Institute found that cloud services were used by nearly 69% of Americans. Since then, the industry has experienced hypergrowth and exceeded the already vast predictions of how big it would become. 


IDC predicts that the cloud computing market in 2017 will be worth $107 billion and, according to Gartner, by 2020 a corporate ‘no-cloud’ policy will be as unusual as a ‘no-internet’ policy would be today. Indeed, it would be difficult to imagine an organisation in 2017 that did not use webmail, file sharing and storage, and data backup.


As the use of cloud computing spreads so does awareness of the associated risks. At the time of writing, there have been 456 data breaches worldwide this year according to the Identity Theft Resource Center (ITRC). The ITRC also noted a 40% increase in data breaches in 2016 compared to the previous year. Yet, despite the well-documented cases of data breaches, organisations continue to invest in and adopt cloud computing services because the benefits usually outweigh the risks. 


To understand why the growth of cloud computing has continued in the face of high-profile data breaches, look first to what it can offer an organisation.



Cheaper, bigger, better 

Cloud computing is a virtual environment that can adapt to meet user needs. It is not constrained by physical limits, and is easily scalable – making it an obvious choice for start-ups. Cloud computing makes state-of-the-art capability available to anyone with an internet connection and a browser, reducing hardware and IT personnel costs. 


Cloud services and software applications are managed and upgraded off-site by the provider, meaning organisations can access technology they would not have been able to afford to install and manage on their own. The popularity of the cloud essentially comes down to its provision of advanced, nextgeneration IT resources in an environment that is cheaper and more scalable than local networks. 


The risks involved with cloud computing are mostly securitybased. Clouds are often made up of multiple entities, which means that no configuration can be more secure than its weakest link. The link between separate entities means that attacks to multiple sites can occur simultaneously. When cloud providers do not employ adequate cyber security measures, those clouds become a target for cybercriminals. 


Yet, it’s not all bad news. A user survey conducted by one cloud service provider found that concerns about security fell to 25% compared to 29% last year. And as more becomes known about security risks so too does our knowledge around what organisations can do to protect themselves. 

(Source: http://www.information-age.com/approach-cloud-computingcyber-security-2017-123466624/. Retrieved on January 25th, 2018) 

The fifth paragraph stresses as an advantage of cloud computing its
Alternativas
Q969778 Inglês

(Source: http://www.information-age.com/approach-cloud-computingcyber-security-2017-123466624/ Retrieved on January 26th, 2018) 



How to approach cloud computing and cyber security in 2017


The adoption of cloud computing has been on the up since as far back as 2008, when a survey conducted by the Pew Research Institute found that cloud services were used by nearly 69% of Americans. Since then, the industry has experienced hypergrowth and exceeded the already vast predictions of how big it would become. 


IDC predicts that the cloud computing market in 2017 will be worth $107 billion and, according to Gartner, by 2020 a corporate ‘no-cloud’ policy will be as unusual as a ‘no-internet’ policy would be today. Indeed, it would be difficult to imagine an organisation in 2017 that did not use webmail, file sharing and storage, and data backup.


As the use of cloud computing spreads so does awareness of the associated risks. At the time of writing, there have been 456 data breaches worldwide this year according to the Identity Theft Resource Center (ITRC). The ITRC also noted a 40% increase in data breaches in 2016 compared to the previous year. Yet, despite the well-documented cases of data breaches, organisations continue to invest in and adopt cloud computing services because the benefits usually outweigh the risks. 


To understand why the growth of cloud computing has continued in the face of high-profile data breaches, look first to what it can offer an organisation.



Cheaper, bigger, better 

Cloud computing is a virtual environment that can adapt to meet user needs. It is not constrained by physical limits, and is easily scalable – making it an obvious choice for start-ups. Cloud computing makes state-of-the-art capability available to anyone with an internet connection and a browser, reducing hardware and IT personnel costs. 


Cloud services and software applications are managed and upgraded off-site by the provider, meaning organisations can access technology they would not have been able to afford to install and manage on their own. The popularity of the cloud essentially comes down to its provision of advanced, nextgeneration IT resources in an environment that is cheaper and more scalable than local networks. 


The risks involved with cloud computing are mostly securitybased. Clouds are often made up of multiple entities, which means that no configuration can be more secure than its weakest link. The link between separate entities means that attacks to multiple sites can occur simultaneously. When cloud providers do not employ adequate cyber security measures, those clouds become a target for cybercriminals. 


Yet, it’s not all bad news. A user survey conducted by one cloud service provider found that concerns about security fell to 25% compared to 29% last year. And as more becomes known about security risks so too does our knowledge around what organisations can do to protect themselves. 

(Source: http://www.information-age.com/approach-cloud-computingcyber-security-2017-123466624/. Retrieved on January 25th, 2018) 

The phrase “so does awareness of the associated risks” (third paragraph) implies that this kind of awareness
Alternativas
Respostas
121: A
122: B
123: C
124: D
125: E
126: E
127: D
128: E
129: C
130: B
131: C
132: D
133: B
134: A
135: A
136: E
137: B
138: A
139: A
140: D