Foram encontradas 125 questões.
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
Prior copy-protection mechanisms used to make clients secure about the software.
Provas
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
"compilers" (l.13) are computer programs that turn instructions in a high level language into a form that the computer can understand and on which it can act.
Provas
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
National and foreign sellers have already succeeded in stopping the illegal flow of software
Provas
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
It is rather difficult to prevent software from being hidden.
Provas
1 It is extremely difficult to restrict the flow of software.
It is too widely available, too easy to replicate, and too easy to
conceal. A single 8-mm digital videocassette, small enough to
4 fit into a shirt pocket, can hold all of the sources and binaries to
a major software package representing thousands of personyears
of effort. There is no way to prevent packages from being
7 carried and copied all over the world.
Inhibition of copying has been a concern of software
vendors domestically and within CoCom countries generally.
10 Vendors have resorted to legal protection against copying
(copyright, trade secret), copy protect mechanisms, objectcode-
only (OCO) shipment practices, and, in some cases, use of
13 proprietary compilers. One of the best examples of the difficulty
of protecting software is the decision by several key software
manufacturers (including Lotus Development) not to copy-
16 protect their disks. The previous copy-protection mechanism
were woefully inadequate and tended to alienate customers.
Global trends in computer technology and their impacts on
export control. National Academy Press, D. C. (with adaptations).
Based on the text above, judge the following items.
It is not easy to confine the flow of software.
Provas
Julgue os itens a seguir, referentes a redação de correspondências oficiais.
A diferença entre um atestado e uma certidão está no fato de que apenas o primeiro pode ser expedido também fora do serviço público.
Provas
Julgue os itens a seguir, referentes a redação de correspondências oficiais.
O ofício é uma comunicação enviada apenas por inferiores a superiores hierárquicos (no serviço público), por autoridades a particulares e vice-versa, e caracterizada por obedecer a certa fórmula epistolar e utilizar formato específico de papel.
Provas
Disciplina: TI - Redes de Computadores
Banca: CESPE / CEBRASPE
Orgão: SERPRO
Servidores Web são componentes importantes de sistemas de informação e redes de computadores. Acerca dos servidores Web, julgue os itens a seguir.
Não permitem a realização de uploads, sendo usados exclusivamente para download de informações.
Provas
Disciplina: TI - Redes de Computadores
Banca: CESPE / CEBRASPE
Orgão: SERPRO
Servidores Web são componentes importantes de sistemas de informação e redes de computadores. Acerca dos servidores Web, julgue os itens a seguir.
Podem realizar transferência de arquivos binários não codificados no formato HTML.
Provas
Disciplina: TI - Sistemas Operacionais
Banca: CESPE / CEBRASPE
Orgão: SERPRO
Servidores Web são componentes importantes de sistemas de informação e redes de computadores. Acerca dos servidores Web, julgue os itens a seguir.
Devem possuir um servidor de aplicação ou se comunicar com um servidor de aplicação para permitir a execução de scripts de servidor.
Provas
Caderno Container