Questões de Concurso Para tre-rn

Foram encontradas 687 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105436 Programação
Em relação a EJB QL (Enterprise JavaBeans Query Language), considere a query :

SELECT DISTINCT OBJECT(p)
FROM Player p
WHERE p.position = ?1

I. Na cláusula SELECT, a palavra OBJECT deve estar antes de uma variável de identificação tal como p;

II. A palavra DISTINCT elimina valores duplicados;

III. A cláusula WHERE restringe os valores retornados através da verificação de suas posições, em um campo persistente;

IV. O elemento ?1 significa o parâmetro do método findByPosition.

É correto o que se afirma em:
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105435 Programação
É uma API Java com menor performance que outras APIs gráficas e maior consumo de memória RAM. Em compensação, é bem mais completa e os programas mantêm uma aparência muito semelhante, independente do sistema operacional utilizado:
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105434 Programação
É uma API que padroniza a ligação a aplicações legadas na plataforma Java Enterprise Edition:
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105433 Programação
Em relação ao Java Standard Edition, é INCORRETO afirmar:
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105432 Programação
Imagem 005.jpg

A relação das variáveis do programa com seus respectivos valores, no momento do Break-Point., é exibida na janela
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105431 Engenharia de Software
Em desenvolvimento de sistemas, focalizar nos aspectos essenciais inerentes a uma entidade e ignorar propriedades significa concentrar-se no que um objeto é e faz antes de se decidir como ele será implementado. Na orientação a objetos, este é um conceito típico
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105430 Engenharia de Software
Utilizado em ambiente de desenvolvimento integrado, consiste na melhoria constante do código-fonte, por meio de modificações num sistema de software para melhorar a estrutura interna do código sem alterar seu comportamento externo:
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105429 Banco de Dados
Em relação à modelagem funcional e modelagem de dados, é correto afirmar:
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105428 Programação
Considere os seguintes fragmentos de código Java:

I. int sum = 7; if ( sum > 20 ) {
System.out.print("ganhou "); } else {
System.out.print("perdeu "); } System.out.println("o bônus.");

II. int sum = 21; if ( sum != 20 )
System.out.print("ganhou"); else
System.out.print("perdeu "); System.out.println("o bônus.");

O resultado da execução dos fragmentos em I e II será, respectivamente,
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105427 Algoritmos e Estrutura de Dados
Uma estrutura de dados onde cada nó mantém uma informação adicional, chamada fator de balanceamento, que indica a diferença de altura entre as subárvores esquerda e direita, é conhecida por árvore
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105426 Arquitetura de Computadores
O padrão PCI Express
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105425 Arquitetura de Computadores
A busca antecipada de instruções é uma técnica utilizada nos processadores dos microcomputadores atuais, de forma a acelerar a execução de um programa. As instruções são pré-carregadas da memória
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105424 Programação
AX e BX são, entre outros, registradores gerais de dados e endereços do processador 8086. Em linguagem assembly, a instrução para somar o valor de AX com o valor de BX e guardar o resultado em AX está corretamente representada por
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105423 Engenharia de Software
Num projeto estruturado é o modelo que identifica, entre outros, os depósitos de dados envolvidos:
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105422 Inglês

Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
Imagem 001.jpg of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
Imagem 002.jpg of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)

Segundo o texto,
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105421 Inglês

Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
Imagem 001.jpg of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
Imagem 002.jpg of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)

Em qual das alternativas abaixo like tem o mesmo significado que tem no texto? (2o parágrafo)
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105420 Inglês

Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
Imagem 001.jpg of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
Imagem 002.jpg of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)

A alternativa que preenche corretamente a lacuna Imagem 004.jpg é
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105419 Inglês

Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
Imagem 001.jpg of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
Imagem 002.jpg of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)

De acordo com o texto,
Alternativas
Ano: 2011 Banca: FCC Órgão: TRE-RN Prova: FCC - 2011 - TRE-RN - Programador de computador |
Q105418 Inglês

Technology and legal pressure have changed
spammers’ terms of trade. They long relied on sending
more e-mails from more computers, knowing that some
will get through. But it is hard to send 100m e-mails
without someone noticing. In 2008 researchers from the
University of California at Berkeley and San Diego posed
as spammers, infiltrated a botnet and measured its
success rate. The investigation confirmed only 28 “sales”
on 350m e-mail messages sent, a conversion rate
under .00001%. Since then the numbers have got worse.
But spammers are a creative bunch.
Imagem 001.jpg of tricking
consumers into a purchase, they are stealing their money
directly. Links used to direct the gullible to a site selling
counterfeits. Now they install “Trojan” software that
ransacks hard drives for bank details and the like.
Spammers also have become more sophisticated
about exploiting trust. In few places is it granted more
readily than on social-networking sites. Twitter, a forum for
short, telegram-like messages, estimates that only 1% of
its traffic is spam. But researchers from the University of
California at Berkeley and the University of Illinois at
Champaign-Urbana show that 8% of links published were
shady, with
Imagem 002.jpg of them leading to scams and the rest to
Trojans. Links in Twitter messages, they found, are over
20 times more likely to get clicked than those in e-mail
spam.
Nor is Facebook as safe as it seems. As an
experiment, BitDefender, an online-security firm, set up
fake profiles on the social network and asked strangers to
enter into a digital friendship. They were able to create as
many as 100 new friends a day. Offering a profile picture,
particularly of a pretty woman, increased their odds. When
the firm’s researchers expanded their requests to strangers
who shared even one mutual friend, almost half accepted.
Worse, a quarter of BitDefender’s new friends clicked on
links posted by the firm, even when the destination was
obscured.


(Adapted from http://www.economist.com/node/17519964)

A alternativa que preenche corretamente a lacuna Imagem 003.jpg é
Alternativas
Q105404 Engenharia Civil
Considere a viga biapoiada apresentada na figura.

Imagem 024.jpg

O momento fletor, em kN.m, e o esforço cortante, em kN, máximos na viga são, respectivamente,
Alternativas
Respostas
281: D
282: E
283: C
284: B
285: D
286: C
287: B
288: C
289: E
290: D
291: E
292: D
293: E
294: A
295: C
296: E
297: B
298: A
299: E
300: D