Magna Concursos

Foram encontradas 120 questões.

2961192 Ano: 2006
Disciplina: TI - Redes de Computadores
Banca: CESPE / CEBRASPE
Orgão: DATAPREV

Enunciado 3288548-1

Os modelos OSI e TCP/IP são muitas vezes usados simultaneamente para se descrever a arquitetura de uma rede de comunicações. Na figura acima, que apresenta a tela de um analisador de protocolos, destaca-se um quadro capturado para análise pela ferramenta. Considerando o quadro destacado, julgue os itens a seguir, com relação aos conceitos de OSI e TCP/IP.

O protocolo IP mostrado pode ser identificado com os serviços de uma camada específica, tanto no modelo OSI, quanto no modelo TCP/IP.

 

Provas

Questão presente nas seguintes provas
2961191 Ano: 2006
Disciplina: TI - Redes de Computadores
Banca: CESPE / CEBRASPE
Orgão: DATAPREV

Enunciado 3288547-1

Os modelos OSI e TCP/IP são muitas vezes usados simultaneamente para se descrever a arquitetura de uma rede de comunicações. Na figura acima, que apresenta a tela de um analisador de protocolos, destaca-se um quadro capturado para análise pela ferramenta. Considerando o quadro destacado, julgue os itens a seguir, com relação aos conceitos de OSI e TCP/IP.

Trata-se de um quadro ethernet, que corresponde a um protocolo do nível 2 (enlace de dados) no modelo OSI.

 

Provas

Questão presente nas seguintes provas

In a small software development project a single person can analyze requirements, perform design, generate code, and conduct tests. As the size of a project increases, more people must become involved — we can rarely afford the luxury of approaching a ten person-year effort with one person working for ten years!

There is a common myth that is still believed by many managers who are responsible for software development effort: “if we fall behind schedule, we can always add more programmers and catch up later in the project”.

Idem, ibidem (with adaptations).

Based on the text above, judge the following item.

To update a software project is just a matter of hiring more people.

 

Provas

Questão presente nas seguintes provas

In a small software development project a single person can analyze requirements, perform design, generate code, and conduct tests. As the size of a project increases, more people must become involved — we can rarely afford the luxury of approaching a ten person-year effort with one person working for ten years!

There is a common myth that is still believed by many managers who are responsible for software development effort: “if we fall behind schedule, we can always add more programmers and catch up later in the project”.

Idem, ibidem (with adaptations).

Based on the text above, judge the following item.

A lot of project managers tend to believe in the same myth.

 

Provas

Questão presente nas seguintes provas

In a small software development project a single person can analyze requirements, perform design, generate code, and conduct tests. As the size of a project increases, more people must become involved — we can rarely afford the luxury of approaching a ten person-year effort with one person working for ten years!

There is a common myth that is still believed by many managers who are responsible for software development effort: “if we fall behind schedule, we can always add more programmers and catch up later in the project”.

Idem, ibidem (with adaptations).

Based on the text above, judge the following item.

We can often afford to have a ten person-year effort or one person working for ten years when developing a software project.

 

Provas

Questão presente nas seguintes provas

In a small software development project a single person can analyze requirements, perform design, generate code, and conduct tests. As the size of a project increases, more people must become involved — we can rarely afford the luxury of approaching a ten person-year effort with one person working for ten years!

There is a common myth that is still believed by many managers who are responsible for software development effort: “if we fall behind schedule, we can always add more programmers and catch up later in the project”.

Idem, ibidem (with adaptations).

Based on the text above, judge the following item.

The bigger the project, the fewer people are demanded.

 

Provas

Questão presente nas seguintes provas

In a small software development project a single person can analyze requirements, perform design, generate code, and conduct tests. As the size of a project increases, more people must become involved — we can rarely afford the luxury of approaching a ten person-year effort with one person working for ten years!

There is a common myth that is still believed by many managers who are responsible for software development effort: “if we fall behind schedule, we can always add more programmers and catch up later in the project”.

Idem, ibidem (with adaptations).

Based on the text above, judge the following item.

Small software projects usually require just one person to perform different tasks.

 

Provas

Questão presente nas seguintes provas

When we think of the people who make our lives miserable by hacking into computers, or spreading malicious viruses, most of us imagine an unpopular teenage boy, brilliant but geeky, venting his frustrations* from the safety of a suburban bedroom.

Actually, these stereotypes are just that — stereotypes — according to Sarah Gordon, an expert in computer viruses and security technology, and a Senior Research Fellow with Symantec Security Response. Since 1992, Gordon has studied the psychology of virus writers.

“A hacker or a virus writer is just as likely to be the guy next door to you,” she says, “or the kid at the checkout line bagging your groceries. Your average hacker is not necessarily some Goth type dressed entirely in black and sporting a nose ring: she may very well be a 50-year-old female”.

The virus writers Gordon has come to know have varied backgrounds; while predominately male, some are female. Some are solidly academic, while others are athletic.

Many have friendship with members of the opposite sex, good relationships with their parents and families; most are popular with their peers. They don’t spend all their time in the basement. One virus writer volunteers in his local library, working with elderly people. One of them is a poet and a musician, another is an electrical engineer, and others work for a university quantum physics department.

Hackers and virus writers are actually very different, distinct populations. “Hackers tend to have a more thorough knowledge of systems and a more highly developed skill set,” Gordon says, “whereas virus writers generally take a shallower approach to what they’re doing.” Hackers tend to have a much deeper knowledge of individual applications and are still regarded as being somewhat “sexy” in today’s counterculture, while virus writing is looked down upon, mostly for its random damage and lack of required skill.

*venting his frustrations – getting rid of feelings of anger or resentment.

Neil Anderson. Active skills for reading: Book 4.
Thomson/Heinle, 2002, p. 17 (with adaptations).

In the text,

“volunteers” is a noun.

 

Provas

Questão presente nas seguintes provas

When we think of the people who make our lives miserable by hacking into computers, or spreading malicious viruses, most of us imagine an unpopular teenage boy, brilliant but geeky, venting his frustrations* from the safety of a suburban bedroom.

Actually, these stereotypes are just that — stereotypes — according to Sarah Gordon, an expert in computer viruses and security technology, and a Senior Research Fellow with Symantec Security Response. Since 1992, Gordon has studied the psychology of virus writers.

“A hacker or a virus writer is just as likely to be the guy next door to you,” she says, “or the kid at the checkout line bagging your groceries. Your average hacker is not necessarily some Goth type dressed entirely in black and sporting a nose ring: she may very well be a 50-year-old female”.

The virus writers Gordon has come to know have varied backgrounds; while predominately male, some are female. Some are solidly academic, while others are athletic.

Many have friendship with members of the opposite sex, good relationships with their parents and families; most are popular with their peers. They don’t spend all their time in the basement. One virus writer volunteers in his local library, working with elderly people. One of them is a poet and a musician, another is an electrical engineer, and others work for a university quantum physics department.

Hackers and virus writers are actually very different, distinct populations. “Hackers tend to have a more thorough knowledge of systems and a more highly developed skill set,” Gordon says, “whereas virus writers generally take a shallower approach to what they’re doing.” Hackers tend to have a much deeper knowledge of individual applications and are still regarded as being somewhat “sexy” in today’s counterculture, while virus writing is looked down upon, mostly for its random damage and lack of required skill.

*venting his frustrations – getting rid of feelings of anger or resentment.

Neil Anderson. Active skills for reading: Book 4.
Thomson/Heinle, 2002, p. 17 (with adaptations).

Based on the text above, judge the following item.

Virus writers know more about computers than hackers.

 

Provas

Questão presente nas seguintes provas

When we think of the people who make our lives miserable by hacking into computers, or spreading malicious viruses, most of us imagine an unpopular teenage boy, brilliant but geeky, venting his frustrations* from the safety of a suburban bedroom.

Actually, these stereotypes are just that — stereotypes — according to Sarah Gordon, an expert in computer viruses and security technology, and a Senior Research Fellow with Symantec Security Response. Since 1992, Gordon has studied the psychology of virus writers.

“A hacker or a virus writer is just as likely to be the guy next door to you,” she says, “or the kid at the checkout line bagging your groceries. Your average hacker is not necessarily some Goth type dressed entirely in black and sporting a nose ring: she may very well be a 50-year-old female”.

The virus writers Gordon has come to know have varied backgrounds; while predominately male, some are female. Some are solidly academic, while others are athletic.

Many have friendship with members of the opposite sex, good relationships with their parents and families; most are popular with their peers. They don’t spend all their time in the basement. One virus writer volunteers in his local library, working with elderly people. One of them is a poet and a musician, another is an electrical engineer, and others work for a university quantum physics department.

Hackers and virus writers are actually very different, distinct populations. “Hackers tend to have a more thorough knowledge of systems and a more highly developed skill set,” Gordon says, “whereas virus writers generally take a shallower approach to what they’re doing.” Hackers tend to have a much deeper knowledge of individual applications and are still regarded as being somewhat “sexy” in today’s counterculture, while virus writing is looked down upon, mostly for its random damage and lack of required skill.

*venting his frustrations – getting rid of feelings of anger or resentment.

Neil Anderson. Active skills for reading: Book 4.
Thomson/Heinle, 2002, p. 17 (with adaptations).

Based on the text above, judge the following item.

An average hacker would never be a female in her fifties.

 

Provas

Questão presente nas seguintes provas