Foram encontradas 125 questões.
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
Prior copy-protection mechanisms used to make clients secure about the software.
Provas
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
"compilers" (l.13) are computer programs that turn instructions in a high level language into a form that the computer can understand and on which it can act.
Provas
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
National and foreign sellers have already succeeded in stopping the illegal flow of software
Provas
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
It is rather difficult to prevent software from being hidden.
Provas
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
It is not easy to confine the flow of software.
Provas
Julgue os itens a seguir, referentes a redação de correspondências oficiais.
A diferença entre um atestado e uma certidão está no fato de que apenas o primeiro pode ser expedido também fora do serviço público.
Provas
Julgue os itens a seguir, referentes a redação de correspondências oficiais.
O ofício é uma comunicação enviada apenas por inferiores a superiores hierárquicos (no serviço público), por autoridades a particulares e vice-versa, e caracterizada por obedecer a certa fórmula epistolar e utilizar formato específico de papel.
Provas
Disciplina: TI - Desenvolvimento de Sistemas
Banca: CESPE / CEBRASPE
Orgão: SERPRO
Acerca da sintaxe e da semântica da linguagem Python, julgue os itens seguintes.
A função imprimeLista mostrada a seguir imprime o valor de cada elemento da lista L. Na chamada à imprimeLista(L[2:]), usa-se a técnica denominda slicing.
def imprimeLista(L):
if L:
print L[1]
imprimeLista(L[2:])
Provas
Disciplina: TI - Desenvolvimento de Sistemas
Banca: CESPE / CEBRASPE
Orgão: SERPRO
Acerca da sintaxe e da semântica da linguagem Python, julgue os itens seguintes.
A definição de recursividade para cálculo de fatorial definida a seguir está correta.
def fatorial(n):
if n = = 1:
return 1
else:
return n * fatorial(n-1)
Provas
Disciplina: TI - Gestão e Governança de TI
Banca: CESPE / CEBRASPE
Orgão: SERPRO
O sentido da palavra qualidade está diretamente relacionado com a satisfação do usuário. No caso de qualidade de software isso quer dizer que o usuário deve ter seus requisitos plenamente atendidos. Para que isso aconteça, todas as etapas do ciclo de desenvolvimento de um software e seus respectivos produtos devem atender determinadas normas. A respeito dessas normas, julgue os itens que se seguem.
Um dos modelos existentes para normalizar a avaliação e a melhoria da capacitação de uma organização com relação aos processos de produção de software é o CMM (capability maturity model), desenvolvido pelo SEI (software engineering institute), que estabelece cinco níveis de maturidade em que uma organização pode se encontrar: inicial, repetível, definido, gerenciado e otimizado.
Provas
Caderno Container