Questões de Concurso Comentadas para técnico

Foram encontradas 3.261 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Ano: 2011 Banca: CESGRANRIO Órgão: SEMGE - BA
Q1237832 Enfermagem
Segundo a Portaria GM/MS nº 1.820/2009, é direito dos pacientes
Alternativas
Ano: 2009 Banca: CESGRANRIO Órgão: BACEN
Q1237101 Direito Penal
Y tem 22 anos e é vigilante de uma instituição bancária que faz transporte de valores. Nessa função, de acordo com a Lei no 10.826/2003, é permitido a Y

Alternativas
Ano: 2013 Banca: CESPE / CEBRASPE Órgão: BACEN
Q1236520 Gestão de Pessoas
Com relação às diferentes formas e técnicas de recrutamento e seleção, julgue o item que se segue.
A técnica dos incidentes críticos pode ser utilizada na definição das características de um cargo, uma vez que supervisores e chefes diretos são capazes de identificar características desejáveis e indesejáveis nos futuros contratados ao adotarem essa técnica para observar comportamentos de suas equipes.
Alternativas
Ano: 2013 Banca: CESPE / CEBRASPE Órgão: BACEN
Q1236319 Gestão de Pessoas
Com relação às diferentes formas e técnicas de recrutamento e seleção, julgue o item que se segue.
Contratação de head hunters, utilização de currículos pré-cadastrados na empresa e consideração de indicações feitas por pessoas da organização são técnicas de recrutamento.
Alternativas
Ano: 2009 Banca: FUNDEPES Órgão: PRODABEL - MG
Q1236251 Inglês
Science News
New Research Advances Voice Security Technology
ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.
"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."
Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."
Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."
To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."
The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.
The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.
NC State's Department of Computer Science is part of the university's College of Engineering.
http://www.sciencedaily.com/releases/2010/03/100308102202.htm
According to the text, all the following statements are true of Dr. Robert Rodman, EXCEPT
Alternativas
Respostas
1906: A
1907: B
1908: C
1909: C
1910: B