Questões de Concurso Para analista de redes e comunicação de dados

Foram encontradas 1.919 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Q43733 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

Em uma rede ethernet, após uma colisão, é possível tentar a retransmissão do frame, no máximo, vinte vezes.
Alternativas
Q43732 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

Segundo o algoritmo de back off exponencial das redes ethernet, pode-se ter um tempo de espera até duas mil vezes maior que o inicialmente esperado para se retransmitir um frame após uma colisão.
Alternativas
Q43731 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

No MPLS, como são adicionados labels aos pacotes IP de acordo com suas características, os roteadores tomam suas decisões de encaminhamento baseados nos labels e não apenas no endereço de destino.
Alternativas
Q43730 Redes de Computadores
Acerca das tecnologias de LAN e WAN, julgue os itens a seguir.

No ATM, para que seja implementada qualidade de serviço, define quatro classes de tráfego: CBR, geralmente usada para transmissão de voz; VBR-rt, utilizada para stream de vídeo em tempo real; VBR-nrt, empregada na transmissão de imagens paradas; ABR, usada para tráfego de baixa prioridade, como IP, em geral.
Alternativas
Q43729 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

children's relatives are supposed to judge whether the sites to be visited by their sons and daughters are proper for them to see.
Alternativas
Q43728 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

grown-up people are entitled to decide what choices to make as far as filtering is concerned.
Alternativas
Q43727 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

filtering software is used so as to make sure that improper sites won't be accessed.
Alternativas
Q43726 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

any individuals regardless of their ages can get into contact with valuable materials.
Alternativas
Q43725 Inglês
The Internet offers access to a wealth of material that is
personally, professionally and culturally enriching to individuals
of all ages. However, it also enables access to some material that
may be offensive, disturbing, illegal, inaccurate or incomplete.
Users are encouraged to evaluate the validity and appropriateness
of information accessed via the Internet.
Tests by the library and by independent agencies have shown that
filtering software may help to block access to objectionable
Internet sites. However, the software cannot block out all
objectionable sites, and it does sometimes block useful material,
including sites that are suitable for children, teens and adults.

Public Internet computers are equipped with commercial
filtering software. The library's filtering policy upholds the
principles of intellectual freedom, allowing adults to make their
own choices regarding filtering. The policy also aims to ensure
that our libraries are safe and welcoming places for children, and
it affirms the right and responsibility of parents to make choices
for their own children and teens.
Imagem 024.jpg

According to the text above, it can be deduced that

through the Internet people can get information about wealthy materials.
Alternativas
Q43309 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
At the beginning of the second paragraph, "should" can be correctly replaced by ought to.
Alternativas
Q43308 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
The plan is supposed to include the likelihood of failure, its results and the actions to be taken to contain development risk.
Alternativas
Q43307 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
In a lot of projects, it is hoped that the plan should be able to spot specific risky areas.
Alternativas
Q43305 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
Large projects demand patient learning to go through it.
Alternativas
Q43304 Inglês
One frequently overlooked area in planning is technical
reviews and inspections. A technical review requires substantial
preparation on the part of the presenters. Documents must be
published and distributed and presentation material organized and
made into slides or overheads. Practice sessions are conducted by
presenters with an audience of critics to prepare for the review.
The reviewers should read the material, attend the
presentations, and write reports. On large projects with many
reviews and walk-throughs involving many participants, a
substantial number of labor hours can be consumed analyzing
documents, attending meetings, and writing reports. For example,
a system design review for one module or unit can require 150
labor hours. When overlooked, this labor can result in a very
large error in resource and schedule estimation.
Many projects include risk assessment and risk
management as a key part of the planning process and expect the
plan to identify specific risk areas. The plan is expected to
quantify both probability of failure and consequences of failure
and to describe what will be done to contain development risk.

A. Behforooz and F. Hudson. Software engineering
fundamentals. Ed. Oxford (adapted).

Based on the text above, judge the following items.
The reviewers must read and rewrite the material while being present in the meetings.
Alternativas
Q43299 Estatística
       Uma empresa de consultoria realizou um levantamento estatístico para obter informações acerca do tempo (T) gasto por empregados de empresas brasileiras na Internet em sítios pessoais durante suas semanas de trabalho. Com base em uma amostra aleatória de 900 empregados de empresas brasileiras com um regime de trabalho de 44 h semanais, essa empresa de consultoria concluiu que cada empregado gasta, em média, 6 h semanais na Internet em sítios pessoais durante uma semana de trabalho; 50% dos empregados gastam 5 h semanais ou mais na Internet em  sítios pessoais durante uma semana de trabalho; e o desvio padrão do tempo gasto na Internet em sítios pessoais durante o regime de trabalho é igual a 4 h semanais por empregado.

Com base nas informações da situação hipotética acima descrita, julgue os itens a seguir.

Considerando que a probabilidade de um empregado gastar mais do que 8 h semanais na Internet em sítios pessoais durante seu regime de trabalho seja igual a 0,2 e considerando, também, que X seja uma variável aleatória que represente o número de casos de pessoas que gastam mais do que 8 h/semana na Internet em sítios pessoais durante seus regimes de trabalho na amostra aleatória de 900 empregados, o desvio padrão de X será igual ou inferior a 12.
Alternativas
Q43296 Estatística
       Uma empresa de consultoria realizou um levantamento estatístico para obter informações acerca do tempo (T) gasto por empregados de empresas brasileiras na Internet em sítios pessoais durante suas semanas de trabalho. Com base em uma amostra aleatória de 900 empregados de empresas brasileiras com um regime de trabalho de 44 h semanais, essa empresa de consultoria concluiu que cada empregado gasta, em média, 6 h semanais na Internet em sítios pessoais durante uma semana de trabalho; 50% dos empregados gastam 5 h semanais ou mais na Internet em  sítios pessoais durante uma semana de trabalho; e o desvio padrão do tempo gasto na Internet em sítios pessoais durante o regime de trabalho é igual a 4 h semanais por empregado.

Com base nas informações da situação hipotética acima descrita, julgue os itens a seguir.

Os tempos gastos na Internet em sítios pessoais durante o regime de trabalho pelos empregados observados no levantamento foram superiores a 2 h e inferiores a 10 h semanais.
Alternativas
Q43290 Raciocínio Lógico
Uma proposição é uma sentença que pode ser julgada
verdadeira (V) ou falsa (F). As proposições são normalmente
representadas pelas letras maiúsculas A, B, C etc. A partir de
proposições dadas, podem-se construir novas proposições
compostas, mediante o emprego de símbolos lógicos chamados
conectivos: "e", indicado pelo símbolo lógicoImagem 011.jpg , e "ou", indicado pelo símbolo lógico Imagem 012.jpg. Usa-se o modificador "não", representado pelo símbolo lógico ¬, para produzir a negação de uma
proposição; pode-se, também, construir novas proposições
mediante o uso do condicional "se A então B", representado
por AImagem 013.jpgB.O julgamento de uma proposição lógica composta
depende do julgamento que se faz de suas proposições
componentes. Considerando os possíveis julgamentos V ou F das
proposições A e B, tem-se a seguinte tabela-verdade para
algumas proposições compostas.
Imagem 014.jpg
Considerando-se a proposição A, formada a partir das
proposições B, C etc. mediante o emprego de conectivos (Imagem 015.jpg ou
Imagem 016.jpg), ou de modificador (¬) ou de condicional (Imagem 017.jpg), diz-se que A é uma tautologia quando A tem valor lógico V, dependentemente
dos valores lógicos de B, C etc. e diz-se que A é uma contradição
quando A tem valor lógico F, independentemente dos valores
lógicos de B, C etc. Uma proposição A é equivalente a uma
proposição B quando A e B têm as tabelas-verdade iguais, isto é,
A e B têm sempre o mesmo valor lógico.
A proposição (AImagem 009.jpgB) Imagem 009.jpg (¬A Imagem 010.jpgB) é uma tautologia.
Alternativas
Q43270 Português
Imagem 002.jpg
Tomando por base o texto acima, julgue os itens de 9 a 15.
Depreende-se da argumentação que o termo "ferramenta" (L.5) está empregado como um outro nome para designar "blog" (L.1).
Alternativas
Q43268 Português
Imagem 001.jpg
A partir do texto acima, julgue os itens de 1 a 8.
Depreende-se da argumentação do texto que a razão de a leitura do hipertexto ir além da "mera decodificação das palavras" (L.18) é ser ele composto também por um amálgama de "sons, gráficos e diagramas" (L.4).
Alternativas
Q43267 Português
Imagem 001.jpg
A partir do texto acima, julgue os itens de 1 a 8.
Seria mantida a correção gramatical caso o elemento do fosse inserido entre "mais" e "que", na linha 18.
Alternativas
Respostas
1841: E
1842: E
1843: C
1844: E
1845: E
1846: C
1847: E
1848: C
1849: E
1850: C
1851: C
1852: E
1853: C
1854: E
1855: C
1856: E
1857: C
1858: C
1859: C
1860: C