Magna Concursos

Foram encontradas 125 questões.

1859896 Ano: 2004
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: SERPRO

1 It is extremely difficult to restrict the flow of software.

It is too widely available, too easy to replicate, and too easy to

conceal. A single 8-mm digital videocassette, small enough to

4 fit into a shirt pocket, can hold all of the sources and binaries to

a major software package representing thousands of personyears

of effort. There is no way to prevent packages from being

7 carried and copied all over the world.

Inhibition of copying has been a concern of software

vendors domestically and within CoCom countries generally.

10 Vendors have resorted to legal protection against copying

(copyright, trade secret), copy protect mechanisms, objectcode-

only (OCO) shipment practices, and, in some cases, use of

13 proprietary compilers. One of the best examples of the difficulty

of protecting software is the decision by several key software

manufacturers (including Lotus Development) not to copy-

16 protect their disks. The previous copy-protection mechanism

were woefully inadequate and tended to alienate customers.

Global trends in computer technology and their impacts on

export control. National Academy Press, D. C. (with adaptations).


Based on the text above, judge the following items.

Prior copy-protection mechanisms used to make clients secure about the software.

 

Provas

Questão presente nas seguintes provas
1859895 Ano: 2004
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: SERPRO

1 It is extremely difficult to restrict the flow of software.

It is too widely available, too easy to replicate, and too easy to

conceal. A single 8-mm digital videocassette, small enough to

4 fit into a shirt pocket, can hold all of the sources and binaries to

a major software package representing thousands of personyears

of effort. There is no way to prevent packages from being

7 carried and copied all over the world.

Inhibition of copying has been a concern of software

vendors domestically and within CoCom countries generally.

10 Vendors have resorted to legal protection against copying

(copyright, trade secret), copy protect mechanisms, objectcode-

only (OCO) shipment practices, and, in some cases, use of

13 proprietary compilers. One of the best examples of the difficulty

of protecting software is the decision by several key software

manufacturers (including Lotus Development) not to copy-

16 protect their disks. The previous copy-protection mechanism

were woefully inadequate and tended to alienate customers.

Global trends in computer technology and their impacts on

export control. National Academy Press, D. C. (with adaptations).


Based on the text above, judge the following items.

"compilers" (l.13) are computer programs that turn instructions in a high level language into a form that the computer can understand and on which it can act.

 

Provas

Questão presente nas seguintes provas
1859894 Ano: 2004
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: SERPRO

1 It is extremely difficult to restrict the flow of software.

It is too widely available, too easy to replicate, and too easy to

conceal. A single 8-mm digital videocassette, small enough to

4 fit into a shirt pocket, can hold all of the sources and binaries to

a major software package representing thousands of personyears

of effort. There is no way to prevent packages from being

7 carried and copied all over the world.

Inhibition of copying has been a concern of software

vendors domestically and within CoCom countries generally.

10 Vendors have resorted to legal protection against copying

(copyright, trade secret), copy protect mechanisms, objectcode-

only (OCO) shipment practices, and, in some cases, use of

13 proprietary compilers. One of the best examples of the difficulty

of protecting software is the decision by several key software

manufacturers (including Lotus Development) not to copy-

16 protect their disks. The previous copy-protection mechanism

were woefully inadequate and tended to alienate customers.

Global trends in computer technology and their impacts on

export control. National Academy Press, D. C. (with adaptations).


Based on the text above, judge the following items.

National and foreign sellers have already succeeded in stopping the illegal flow of software

 

Provas

Questão presente nas seguintes provas
1859893 Ano: 2004
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: SERPRO

1 It is extremely difficult to restrict the flow of software.

It is too widely available, too easy to replicate, and too easy to

conceal. A single 8-mm digital videocassette, small enough to

4 fit into a shirt pocket, can hold all of the sources and binaries to

a major software package representing thousands of personyears

of effort. There is no way to prevent packages from being

7 carried and copied all over the world.

Inhibition of copying has been a concern of software

vendors domestically and within CoCom countries generally.

10 Vendors have resorted to legal protection against copying

(copyright, trade secret), copy protect mechanisms, objectcode-

only (OCO) shipment practices, and, in some cases, use of

13 proprietary compilers. One of the best examples of the difficulty

of protecting software is the decision by several key software

manufacturers (including Lotus Development) not to copy-

16 protect their disks. The previous copy-protection mechanism

were woefully inadequate and tended to alienate customers.

Global trends in computer technology and their impacts on

export control. National Academy Press, D. C. (with adaptations).


Based on the text above, judge the following items.

It is rather difficult to prevent software from being hidden.

 

Provas

Questão presente nas seguintes provas
1859892 Ano: 2004
Disciplina: Inglês (Língua Inglesa)
Banca: CESPE / CEBRASPE
Orgão: SERPRO

1 It is extremely difficult to restrict the flow of software.

It is too widely available, too easy to replicate, and too easy to

conceal. A single 8-mm digital videocassette, small enough to

4 fit into a shirt pocket, can hold all of the sources and binaries to

a major software package representing thousands of personyears

of effort. There is no way to prevent packages from being

7 carried and copied all over the world.

Inhibition of copying has been a concern of software

vendors domestically and within CoCom countries generally.

10 Vendors have resorted to legal protection against copying

(copyright, trade secret), copy protect mechanisms, objectcode-

only (OCO) shipment practices, and, in some cases, use of

13 proprietary compilers. One of the best examples of the difficulty

of protecting software is the decision by several key software

manufacturers (including Lotus Development) not to copy-

16 protect their disks. The previous copy-protection mechanism

were woefully inadequate and tended to alienate customers.

Global trends in computer technology and their impacts on

export control. National Academy Press, D. C. (with adaptations).


Based on the text above, judge the following items.

It is not easy to confine the flow of software.

 

Provas

Questão presente nas seguintes provas

Julgue os itens a seguir, referentes a redação de correspondências oficiais.

A diferença entre um atestado e uma certidão está no fato de que apenas o primeiro pode ser expedido também fora do serviço público.

 

Provas

Questão presente nas seguintes provas

Julgue os itens a seguir, referentes a redação de correspondências oficiais.

O ofício é uma comunicação enviada apenas por inferiores a superiores hierárquicos (no serviço público), por autoridades a particulares e vice-versa, e caracterizada por obedecer a certa fórmula epistolar e utilizar formato específico de papel.

 

Provas

Questão presente nas seguintes provas
1859458 Ano: 2004
Disciplina: TI - Desenvolvimento de Sistemas
Banca: CESPE / CEBRASPE
Orgão: SERPRO
Provas:

Acerca da sintaxe e da semântica da linguagem Python, julgue os itens seguintes.

A função imprimeLista mostrada a seguir imprime o valor de cada elemento da lista L. Na chamada à imprimeLista(L[2:]), usa-se a técnica denominda slicing.

def imprimeLista(L):

if L:

print L[1]

imprimeLista(L[2:])

 

Provas

Questão presente nas seguintes provas
1859457 Ano: 2004
Disciplina: TI - Desenvolvimento de Sistemas
Banca: CESPE / CEBRASPE
Orgão: SERPRO
Provas:

Acerca da sintaxe e da semântica da linguagem Python, julgue os itens seguintes.

A definição de recursividade para cálculo de fatorial definida a seguir está correta.

def fatorial(n):

if n = = 1:

return 1

else:

return n * fatorial(n-1)

 

Provas

Questão presente nas seguintes provas
1859456 Ano: 2004
Disciplina: TI - Gestão e Governança de TI
Banca: CESPE / CEBRASPE
Orgão: SERPRO
Provas:

O sentido da palavra qualidade está diretamente relacionado com a satisfação do usuário. No caso de qualidade de software isso quer dizer que o usuário deve ter seus requisitos plenamente atendidos. Para que isso aconteça, todas as etapas do ciclo de desenvolvimento de um software e seus respectivos produtos devem atender determinadas normas. A respeito dessas normas, julgue os itens que se seguem.

Um dos modelos existentes para normalizar a avaliação e a melhoria da capacitação de uma organização com relação aos processos de produção de software é o CMM (capability maturity model), desenvolvido pelo SEI (software engineering institute), que estabelece cinco níveis de maturidade em que uma organização pode se encontrar: inicial, repetível, definido, gerenciado e otimizado.

 

Provas

Questão presente nas seguintes provas