Questões de Concurso Para tce-sc

Foram encontradas 1.017 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q1901990 Economia

    Para dois bens X e Y, um consumidor consome quantidades x e y, respectivamente. Ao consumir x unidades de X e y unidades de Y, o consumidor desfruta utilidade dada por u(x, y) = ln x + y. Ele direciona uma dotação w (renda) para esses bens, que têm preços perfeitamente competitivos dados por pX e pY, respectivamente.

Considerando essa situação hipotética, julgue o item a seguir. 


No equilíbrio, a quantidade consumida do bem X não depende da renda w.

Alternativas
Q1901989 Economia

    Para dois bens X e Y, um consumidor consome quantidades x e y, respectivamente. Ao consumir x unidades de X e y unidades de Y, o consumidor desfruta utilidade dada por u(x, y) = ln x + y. Ele direciona uma dotação w (renda) para esses bens, que têm preços perfeitamente competitivos dados por pX e pY, respectivamente.

Considerando essa situação hipotética, julgue o item a seguir. 


No equilíbrio, fixados os preços dos dois bens, a curva de Engel de Y é uma linha reta. 

Alternativas
Q1901988 Economia

    Para dois bens X e Y, um consumidor consome quantidades x e y, respectivamente. Ao consumir x unidades de X e y unidades de Y, o consumidor desfruta utilidade dada por u(x, y) = ln x + y. Ele direciona uma dotação w (renda) para esses bens, que têm preços perfeitamente competitivos dados por pX e pY, respectivamente.

Considerando essa situação hipotética, julgue o item a seguir. 


O consumidor tem utilidade marginal decrescente para o bem Y.

Alternativas
Q1901987 Economia

Em relação às contas nacionais e aos principais agregados monetários, julgue o item subsequente.


Em uma economia tradicional, o multiplicador monetário é calculado a partir da razão entre depósitos à vista em bancos comerciais e reservas bancárias.

Alternativas
Q1901986 Economia

Em relação às contas nacionais e aos principais agregados monetários, julgue o item subsequente.


Se o país possui entrada de investimentos externos, então haverá aumento das reservas internacionais.

Alternativas
Q1901985 Economia

Em relação às contas nacionais e aos principais agregados monetários, julgue o item subsequente.


A elevação da taxa de juros gera aumento da demanda por moeda. 

Alternativas
Q1901984 Economia

Em relação às contas nacionais e aos principais agregados monetários, julgue o item subsequente.


O valor do M1 é superior à base monetária. 

Alternativas
Q1901983 Economia

Considerando as políticas fiscal e monetária e seus efeitos, julgue o próximo item.


A política monetária contracionista em um regime de câmbio fixo com plena mobilidade de capitais é incapaz de afetar o produto da economia.  

Alternativas
Q1901982 Economia

Considerando as políticas fiscal e monetária e seus efeitos, julgue o próximo item.


Senhoriagem é a forma como o governo financia os seus gastos públicos por intermédio da emissão de moeda. 

Alternativas
Q1901981 Economia

Considerando uma economia com o modelo macroeconômico tradicional no qual o governo controla a quantidade de moeda, julgue o item a seguir. 


O aumento do salário nominal gera aumento do nível de preços via expansão da demanda agregada.

Alternativas
Q1901980 Economia

Considerando uma economia com o modelo macroeconômico tradicional no qual o governo controla a quantidade de moeda, julgue o item a seguir. 


O modelo IS/LM possui a propriedade da dicotomia clássica.

Alternativas
Q1901979 Economia

Considerando uma economia com o modelo macroeconômico tradicional no qual o governo controla a quantidade de moeda, julgue o item a seguir. 


O aumento do consumo autônomo das famílias altera a inclinação da curva IS e, por conseguinte, da curva de demanda agregada.

Alternativas
Q1901978 Economia

Considerando uma economia com o modelo macroeconômico tradicional no qual o governo controla a quantidade de moeda, julgue o item a seguir. 


O modelo IS/LM é contracíclico, de modo que a expansão da quantidade de moeda gera redução do salário real de equilíbrio. 

Alternativas
Q1901977 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

In the second paragraph of the text, 


the word “disincentivize” could be correctly replaced by deter without any change in the meaning of the sentence.  

Alternativas
Q1901976 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

In the second paragraph of the text, 


the word “quandary” could be correctly replaced by dilemma without any change in the meaning of the sentence. 

Alternativas
Q1901975 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


It can be concluded from the text that the quickest option for hospitals being under attack of ransomware would be to pay more than the amount the attackers demand. 

Alternativas
Q1901974 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


The author of the text claims that the solution to ransomware is to stop paying ransoms. 

Alternativas
Q1901973 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


The text says that, in order to avoid bad press, companies should be required by law to report having paid ransom.

Alternativas
Q1901972 Inglês


    During a ransomware hack, attackers infiltrate a target’s computer system and encrypt its data. They then demand a payment before they will release the decryption key to free the system. This type of extortion has existed for decades, but in the 2010s it exploded in popularity, with online gangs holding local governments, infrastructure and even hospitals hostage. Ransomware is a collective problem—and solving it will require collaborative action from companies, the government and international partners.

     As long as victims keep paying, hackers will keep profiting from this type of attack. But cybersecurity experts are divided on whether the government should prohibit the paying of ransoms. Such a ban would disincentivize hackers, but it would also place some organizations in a moral quandary. For, say, a hospital, unlocking the computer systems as quickly as possible could be a matter of life or death for patients, and the fastest option may be to pay up.

     Collective action can help. If all organizations that fall victim to ransomware report their attacks, they will contribute to a trove of valuable data, which can be used to strike back against attackers. For example, certain ransomware gangs may use the exact same type of encryption in all their attacks. “White hat” hackers can and do study these trends, which allows them to retrieve and publish the decryption keys for specific types of ransomware. Many companies, however, remain reluctant to admit they have experienced a breach, wishing to avoid potential bad press. Overcoming that reluctance may require legislation, such as a bill introduced in the Senate last year that would require companies to report having paid a ransom within 24 hours of the transaction.

Internet:<www.scientificamerican.com>(adapted). 

Judge the following items according to the text above. 


It can be inferred from the text that ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. 

Alternativas
Q1901971 Administração Pública

Julgue o próximo item, relativo à Lei n.º 13.709/2018 (Lei Geral de Proteção de Dados atualizada).  


Competem ao controlador, e não a encarregado, as decisões referentes ao tratamento de dados pessoais.

Alternativas
Respostas
101: C
102: C
103: E
104: E
105: E
106: E
107: C
108: C
109: C
110: E
111: E
112: E
113: C
114: C
115: C
116: E
117: E
118: E
119: C
120: C