Questões de Concurso Para tj-sc

Foram encontradas 4.231 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635583 Programação
Atenção: A questão se refere ao Adobe Flex 3:

Analise o seguinte trecho de código em MXML e em seguida assinale a alternativa correta:


Imagem associada para resolução da questão


Ao tentar executar o código acima:

Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635582 Governança de TI
O modelo MPS.BR estabelece sete níveis de maturidade para a evolução de processos. O nível G (Parcialmente Gerenciado) é o mais básico deles, sendo composto pelos seguintes processos: 
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635581 Engenharia de Software
Assinale a alternativa que contém somente diagramas previstos na notação UML:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635580 Governança de TI
Assinale a alternativa que NÃO INDICA uma das quatro categorias básicas de elementos definidas pela notação BPMN:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635579 Engenharia de Software
Em orientação a objetos, o princípio pelo qual um método comporta-se de modo diferente dependendo da classe que o invoca é chamado de:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635578 Engenharia de Software
Assinale a alternativa que NÃO REPRESENTA uma das razões pelas quais se faz medições de software:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635577 Inglês

Atenção: A questão se refere ao seguinte texto:


Many businesses believe that if they purchase enough equipment, they can create a secure infrastructure. Firewalls, intrusion detection systems and antivirus programs are just some of the tools available to assist in protecting a network and its data. It is important to keep in mind that no product or combination of products will create a secure organization by itself. Security is a process; there is no tool that you can “set and forget”. All security products are only as secure as the people who configure and maintain them. The purchasing and implementation of security products should be only a percentage of the security budget. The employees tasked with maintaining the security devices should be provided with enough time, training, and equipment to properly support the products. Unfortunately, in many organizations security activities are less important than support activities. Highly skilled security professionals are often tasked with help-desk projects such as resetting forgotten passwords, fixing jammed printers, and setting up new employee workstations. For most organizations, the cost of creating a strong security posture is seen as a necessary evil, similar to purchasing insurance. Organizations don’t want to spend the money on it, but the risks of not making the purchase outweigh the costs. Because of this attitude, it is extremely challenging to create a secure organization. The attitude is enforced because requests for security tools are often supported by documents providing the average cost of a security incident instead of showing more concrete benefits of a strong security posture. The problem is exacerbated by the fact that IT professionals speak a different language than management. IT professionals are generally focused on technology. Management is focused on revenue. Concepts such as profitability, asset depreciation, return on investment, and total cost of ownership are the mainstays of management. These are alien concepts to most IT professionals.

Adaptado de: VACCA, John R. Computer and Information Security Handbook. Pg 5.

De acordo com o texto, profissionais de TI e gerências são focados respectivamente em:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635576 Inglês

Atenção: A questão se refere ao seguinte texto:


Many businesses believe that if they purchase enough equipment, they can create a secure infrastructure. Firewalls, intrusion detection systems and antivirus programs are just some of the tools available to assist in protecting a network and its data. It is important to keep in mind that no product or combination of products will create a secure organization by itself. Security is a process; there is no tool that you can “set and forget”. All security products are only as secure as the people who configure and maintain them. The purchasing and implementation of security products should be only a percentage of the security budget. The employees tasked with maintaining the security devices should be provided with enough time, training, and equipment to properly support the products. Unfortunately, in many organizations security activities are less important than support activities. Highly skilled security professionals are often tasked with help-desk projects such as resetting forgotten passwords, fixing jammed printers, and setting up new employee workstations. For most organizations, the cost of creating a strong security posture is seen as a necessary evil, similar to purchasing insurance. Organizations don’t want to spend the money on it, but the risks of not making the purchase outweigh the costs. Because of this attitude, it is extremely challenging to create a secure organization. The attitude is enforced because requests for security tools are often supported by documents providing the average cost of a security incident instead of showing more concrete benefits of a strong security posture. The problem is exacerbated by the fact that IT professionals speak a different language than management. IT professionals are generally focused on technology. Management is focused on revenue. Concepts such as profitability, asset depreciation, return on investment, and total cost of ownership are the mainstays of management. These are alien concepts to most IT professionals.

Adaptado de: VACCA, John R. Computer and Information Security Handbook. Pg 5.

Assinale a alternativa correta, de acordo com as idéias expressas pelo texto:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635575 Inglês

Atenção: A questão se refere ao seguinte texto:


Many businesses believe that if they purchase enough equipment, they can create a secure infrastructure. Firewalls, intrusion detection systems and antivirus programs are just some of the tools available to assist in protecting a network and its data. It is important to keep in mind that no product or combination of products will create a secure organization by itself. Security is a process; there is no tool that you can “set and forget”. All security products are only as secure as the people who configure and maintain them. The purchasing and implementation of security products should be only a percentage of the security budget. The employees tasked with maintaining the security devices should be provided with enough time, training, and equipment to properly support the products. Unfortunately, in many organizations security activities are less important than support activities. Highly skilled security professionals are often tasked with help-desk projects such as resetting forgotten passwords, fixing jammed printers, and setting up new employee workstations. For most organizations, the cost of creating a strong security posture is seen as a necessary evil, similar to purchasing insurance. Organizations don’t want to spend the money on it, but the risks of not making the purchase outweigh the costs. Because of this attitude, it is extremely challenging to create a secure organization. The attitude is enforced because requests for security tools are often supported by documents providing the average cost of a security incident instead of showing more concrete benefits of a strong security posture. The problem is exacerbated by the fact that IT professionals speak a different language than management. IT professionals are generally focused on technology. Management is focused on revenue. Concepts such as profitability, asset depreciation, return on investment, and total cost of ownership are the mainstays of management. These are alien concepts to most IT professionals.

Adaptado de: VACCA, John R. Computer and Information Security Handbook. Pg 5.

Analise as afirmativas a seguir e assinale a alternativa correta, de acordo com as ideias apresentadas no texto:


I. Os funcionários encarregados de manter os dispositivos de segurança devem ser providos com tempo, treinamento e equipamentos suficientes para manter adequadamente os produtos.

II. A compra e implementação de produtos de segurança deve representar 100% do orçamento de segurança.

III. Em muitas organizações, as atividades de apoio são mais importantes do que as atividades de segurança.

Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635574 Inglês

Atenção: A questão se refere ao seguinte texto:


Many businesses believe that if they purchase enough equipment, they can create a secure infrastructure. Firewalls, intrusion detection systems and antivirus programs are just some of the tools available to assist in protecting a network and its data. It is important to keep in mind that no product or combination of products will create a secure organization by itself. Security is a process; there is no tool that you can “set and forget”. All security products are only as secure as the people who configure and maintain them. The purchasing and implementation of security products should be only a percentage of the security budget. The employees tasked with maintaining the security devices should be provided with enough time, training, and equipment to properly support the products. Unfortunately, in many organizations security activities are less important than support activities. Highly skilled security professionals are often tasked with help-desk projects such as resetting forgotten passwords, fixing jammed printers, and setting up new employee workstations. For most organizations, the cost of creating a strong security posture is seen as a necessary evil, similar to purchasing insurance. Organizations don’t want to spend the money on it, but the risks of not making the purchase outweigh the costs. Because of this attitude, it is extremely challenging to create a secure organization. The attitude is enforced because requests for security tools are often supported by documents providing the average cost of a security incident instead of showing more concrete benefits of a strong security posture. The problem is exacerbated by the fact that IT professionals speak a different language than management. IT professionals are generally focused on technology. Management is focused on revenue. Concepts such as profitability, asset depreciation, return on investment, and total cost of ownership are the mainstays of management. These are alien concepts to most IT professionals.

Adaptado de: VACCA, John R. Computer and Information Security Handbook. Pg 5.

Analise as afirmativas a seguir e assinale a alternativa correta, de acordo com as ideias apresentadas no texto:


I. Muitas empresas acreditam que não é necessário adquirir equipamentos para criar uma infraestrutura segura.

II. Firewalls, sistemas de detecção de intrusão e programa antivírus são apenas algumas das ferramentas disponíveis para ajudar a proteger uma rede e seus dados.

III. Nenhum produto ou combinação de produtos vai criar uma organização segura por si só.

IV. Para auxiliar na criação de um processo de segurança, existem ferramentas que você pode “configurar e esquecer”.

Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635573 Inglês

Atenção: A questão se refere ao seguinte texto:


What makes determining the causes of project failure so tough are all of the variables involved. Companies, teams, and projects have different sets of requirements and environmental factors that can influence outcome. Small and seemingly harmless circumstances can be like a "snowball" and bring the whole project to a standstill. "Project failure", however, is not synonymous with "project death". There are varying degrees of failure. The most extreme case, of course, is total project cancellation, and perhaps a few broken windows and bruised egos. But a project can also be considered a failure if it deviates too far from original specifications, doesn't meet key user requirements, and is late or over budget. The list of reasons for project failure is a long one, but we can conclude that the main causes are: setting an overly ambitious project scope, absence of project methodology, lack of support from senior management and poor interpersonal skills.

Adaptado de: CHIN, Paul. Cold Case File: Why Projects Fail. Revista IT Management, 06/05/2003.

O texto lista algumas ocorrências que levam um projeto a ser considerado falho. Assinale a alternativa que NÃO INDICA uma dessas ocorrências:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635572 Inglês

Atenção: A questão se refere ao seguinte texto:


What makes determining the causes of project failure so tough are all of the variables involved. Companies, teams, and projects have different sets of requirements and environmental factors that can influence outcome. Small and seemingly harmless circumstances can be like a "snowball" and bring the whole project to a standstill. "Project failure", however, is not synonymous with "project death". There are varying degrees of failure. The most extreme case, of course, is total project cancellation, and perhaps a few broken windows and bruised egos. But a project can also be considered a failure if it deviates too far from original specifications, doesn't meet key user requirements, and is late or over budget. The list of reasons for project failure is a long one, but we can conclude that the main causes are: setting an overly ambitious project scope, absence of project methodology, lack of support from senior management and poor interpersonal skills.

Adaptado de: CHIN, Paul. Cold Case File: Why Projects Fail. Revista IT Management, 06/05/2003.

Assinale a alternativa que NÃO É CITADA no texto como uma das principais causas de falha dos projetos:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635571 Inglês

Atenção: A questão se refere ao seguinte texto:


What makes determining the causes of project failure so tough are all of the variables involved. Companies, teams, and projects have different sets of requirements and environmental factors that can influence outcome. Small and seemingly harmless circumstances can be like a "snowball" and bring the whole project to a standstill. "Project failure", however, is not synonymous with "project death". There are varying degrees of failure. The most extreme case, of course, is total project cancellation, and perhaps a few broken windows and bruised egos. But a project can also be considered a failure if it deviates too far from original specifications, doesn't meet key user requirements, and is late or over budget. The list of reasons for project failure is a long one, but we can conclude that the main causes are: setting an overly ambitious project scope, absence of project methodology, lack of support from senior management and poor interpersonal skills.

Adaptado de: CHIN, Paul. Cold Case File: Why Projects Fail. Revista IT Management, 06/05/2003.

Analise as afirmativas a seguir e assinale a alternativa correta, de acordo com o texto:


I. Os termos “falha do projeto” e “morte do projeto” podem ser considerados sinônimos.

II. Determinar as causas do fracasso de projetos é difícil por causa das janelas quebradas e egos machucados.

III. O caso mais extremo de falha é o cancelamento total do projeto.

Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635570 Inglês

Atenção: A questão se refere ao seguinte texto:

According a recent research, the Americans devote 22,7% of the time they spend on the Internet on social networking sites and blogs. A year ago, this number it was lower than 16%. Driving this trend is the social networking Facebook, which recently celebrated reaching half a billion users worldwide. It claimed an 85% share of social networking use; MySpace came in a distant second with a 5% share; and Twitter with just 1%. For the first time, games beat out e-mail as the No. 2 online time killer, accounting for 10% of time spent. The research found that half of all Americans online spend time playing games like online-gaming Zynga’s explosively popular FarmVille. It was unclear if time spent playing games like FarmVille on Facebook significantly influenced how much time people spend on Facebook. It’s not that people are not e-mailing or using instant messaging. They are engaged in those activities on services such as Facebook. And they are still heavily involved in those activities while online. E-mail was the third most popular activity at 8%, and instant messaging came in fifth at 4%. The other activity on the rise is watching videos and movies on YouTube, Hulu and Netflix, which jumped 12% to account for nearly 4% of all time spent online.

Adaptado de: GUYNN, Jessica. Social networking tops e-mail as most popular online activity. Los Angeles Times Website, 02/08/2010.

Assinale a alternativa correta, conforme as ideias expressas no texto: 
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635569 Inglês

Atenção: A questão se refere ao seguinte texto:

According a recent research, the Americans devote 22,7% of the time they spend on the Internet on social networking sites and blogs. A year ago, this number it was lower than 16%. Driving this trend is the social networking Facebook, which recently celebrated reaching half a billion users worldwide. It claimed an 85% share of social networking use; MySpace came in a distant second with a 5% share; and Twitter with just 1%. For the first time, games beat out e-mail as the No. 2 online time killer, accounting for 10% of time spent. The research found that half of all Americans online spend time playing games like online-gaming Zynga’s explosively popular FarmVille. It was unclear if time spent playing games like FarmVille on Facebook significantly influenced how much time people spend on Facebook. It’s not that people are not e-mailing or using instant messaging. They are engaged in those activities on services such as Facebook. And they are still heavily involved in those activities while online. E-mail was the third most popular activity at 8%, and instant messaging came in fifth at 4%. The other activity on the rise is watching videos and movies on YouTube, Hulu and Netflix, which jumped 12% to account for nearly 4% of all time spent online.

Adaptado de: GUYNN, Jessica. Social networking tops e-mail as most popular online activity. Los Angeles Times Website, 02/08/2010.

De acordo com o texto, a atividade de assistir vídeos e filmes:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635568 Inglês

Atenção: A questão se refere ao seguinte texto:

According a recent research, the Americans devote 22,7% of the time they spend on the Internet on social networking sites and blogs. A year ago, this number it was lower than 16%. Driving this trend is the social networking Facebook, which recently celebrated reaching half a billion users worldwide. It claimed an 85% share of social networking use; MySpace came in a distant second with a 5% share; and Twitter with just 1%. For the first time, games beat out e-mail as the No. 2 online time killer, accounting for 10% of time spent. The research found that half of all Americans online spend time playing games like online-gaming Zynga’s explosively popular FarmVille. It was unclear if time spent playing games like FarmVille on Facebook significantly influenced how much time people spend on Facebook. It’s not that people are not e-mailing or using instant messaging. They are engaged in those activities on services such as Facebook. And they are still heavily involved in those activities while online. E-mail was the third most popular activity at 8%, and instant messaging came in fifth at 4%. The other activity on the rise is watching videos and movies on YouTube, Hulu and Netflix, which jumped 12% to account for nearly 4% of all time spent online.

Adaptado de: GUYNN, Jessica. Social networking tops e-mail as most popular online activity. Los Angeles Times Website, 02/08/2010.

Analise as afirmativas a seguir e assinale a alternativa correta, de acordo com o texto:


I. Os sites de redes sociais e blogs são responsáveis por 22,7% do tempo que os americanos passam na Internet.

II. O Facebook atingiu recentemente a marca de meio bilhão de usuários somente nos Estados Unidos.

III. Os americanos dedicam 85% do tempo que passam na Internet usando o Facebook.

IV. O MySpace representa 5% do tempo que os americanos gastam com redes sociais.

Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635567 Legislação Estadual
Assinale a alternativa correta segundo a Constituição do Estado de Santa Catarina:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635566 Legislação Estadual
De acordo com a Constituição Estadual, o Estado de Santa Catarina tem competência para firmar acordos e compromissos com outros Estados e entidades de personalidade internacional desde que observados certos princípios, entre os quais, NÃO se inclui: 
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635565 Legislação Estadual
Nos termos do Estatuto dos Funcionários Públicos Civis do Estado de Santa Catarina, o deslocamento motivado de cargo de provimento efetivo, ocupado ou vago no âmbito do quadro de pessoal, para outro órgão ou entidade do mesmo Poder, com prévia apreciação do órgão central de pessoal, denomina-se:
Alternativas
Ano: 2010 Banca: TJ-SC Órgão: TJ-SC Prova: TJ-SC - 2010 - TJ-SC - Analista de Sistemas |
Q1635563 Direito Administrativo
No âmbito do direito administrativo existe uma categoria de pessoas que recebem a incumbência de executar, em nome próprio e por sua conta e risco, um determinado serviço público, seguindo as normas e fiscalização do Estado. Esta categoria de pessoas é denominada:
Alternativas
Respostas
1461: B
1462: E
1463: A
1464: C
1465: D
1466: D
1467: E
1468: A
1469: B
1470: D
1471: A
1472: C
1473: E
1474: C
1475: B
1476: B
1477: B
1478: D
1479: C
1480: E