Questões de Concurso Comentadas para auditor fiscal

Foram encontradas 1.764 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q1174642 Direito Constitucional
Leia as afirmativas a seguir:

I. A todos é assegurado, independentemente do pagamento de taxas, o direito de petição aos Poderes Públicos em defesa de direitos ou contra ilegalidade ou abuso de poder.
II. O artigo 5º da Constituição Federal de 1988 prevê garantias fundamentais de sobrevivência aos brasileiros, sendo vedadas tais garantias aos estrangeiros residentes no Brasil.

Marque a alternativa CORRETA:
Alternativas
Q1167803 Banco de Dados

Nowadays the relational model is the primary data model for commercial data-processing applications mainly due to its simplicity, which eases the programmer’s job, when compared to earlier data models such as the network model or the hierarchical model.

Regarding the structure of relational databases, match the column 1 with the one 2.


Column 1

(I) Relation.

(II) Tuple. 

(III) Attribute. 

(IV) Table. 

(V) Domain.


Column 2

(A) It refers to a row. 

(B) It refers to permitted values.

(C) It refers to a table.

(D) It refers to a column.

(E) It has a single name.


Choose the alternative with the right association.

Alternativas
Q1167802 Segurança da Informação

A structural problem for digital signatures is that everyone has to agree to trust a central authority that knows everything and is trusted by everyone. The most logical candidates for central authority are the government, the banks, the accountants, and the lawyers. Unfortunately, none of these organizations inspire total confidence in all citizens. Hence, it would be nice if signing documents did not require a trusted authority. Fortunately, Public-key cryptography can make an important contribution to the improvement of digital signature security, allowing person A to send a digital signed message to person B without requiring a central authority.

Considering that person A has the private-key DA and the public-key EA and person B has the private-key DB and public-key EB, choose the alternative that shows the correct sequence of utilization of the keys when person A signs a message M, sends it to B and B checks he signature.

Alternativas
Q1167801 Programação

Consider the following statements about object-oriented programming.


I. Using different names for operations in the same types is called overloading.

II. Overloaded operators are useful to add functions to enable conventional notation.

III. A derived class is said to inherit properties from its base, so the relationship is also called inheritance.

IV. Pointers to functions can be used to provide a simple form of polymorphic routines.


Choose the right alternative.

Alternativas
Q1167800 Sistemas Operacionais

Some Intel processors provide hardware-assisted virtualization to improve the fundamental flexibility and robustness of traditional software-based virtualization solutions by accelerating key functions of the virtualized platform.

About hardware-assisted virtualization, consider the following statements.


I. It enables the VMM to share I/O devices with several guest OSs at the same time.

II. It speeds up the transfer of platform control between the guest operating systems (OSs) and the virtual machine manager (VMM)/hypervisor.

III. It optimizes the network for virtualization with adapter-based acceleration.

IV. It is used in data centers for disaster recovery, high availability and business continuity, and in desktops to increase flexibility, improve security, and reduce costs.


Choose the correct alternative.

Alternativas
Respostas
556: B
557: D
558: C
559: E
560: E