Foram encontradas 630 questões.
- Gestão de ProjetosGestão Ágil de Projetos
- Gestão de ProcessosBPM: Gerenciamento de Processos de NegócioBPMN: Business Process Model and NotationBPMN: Tipos de Eventos
Acerca da modelagem de processos em BPMN e da metodologia Scrum, julgue o item.
Na notação BPMN, os eventos intermediários, ou seja, aqueles que ocorrem ao longo do processo, são representados por círculos, com borda dupla.
Provas
- Gestão de ProcessosBPM: Gerenciamento de Processos de NegócioBPMN: Business Process Model and NotationBPMN: Gateways
Acerca da modelagem de processos em BPMN e da metodologia Scrum, julgue o item.
Na notação BPMN, o registro de uma exceção no processo é feito por meio da utilização de um losango, o qual é chamado de gateway.
Provas
Acerca da modelagem de processos em BPMN e da metodologia Scrum, julgue o item.
Na modelagem de processos em BPMN, as atividades em um processo nada mais são do que uma sequência de passos.
Provas
CREATE OR REPLACE FUNCTION mostra_cargo_CFT (
p_RENDIMENTO IN FUNCIONARIO.RENDIMENTO%type
)
RETURN FUNCIONARIO.CARGO%type;
IS
v_CARGO FUNCIONARIO.CARGO%type;
BEGIN
IF p_RENDIMENTO < 2000 THEN
v_CARGO := 'ESTAGIARIO' ;
ELSIF p_RENDIMENTO < 5000 THEN
v_CARGO := 'COORDENADOR';
ELSIF p_RENDIMENTO < 7000 THEN
v_CARGO := 'GERENTE';
END IF;
RETURN v_CARGO;
END;
A partir do código PL/SQL (Procedural Language/Structured Query Language) acima, julgue o item.
Há um erro de sintaxe no código. A palavra reservada ELSIF foi escrita de forma errada. O correto seria ELSEIF.
Provas
CREATE OR REPLACE FUNCTION mostra_cargo_CFT (
p_RENDIMENTO IN FUNCIONARIO.RENDIMENTO%type
)
RETURN FUNCIONARIO.CARGO%type;
IS
v_CARGO FUNCIONARIO.CARGO%type;
BEGIN
IF p_RENDIMENTO < 2000 THEN
v_CARGO := 'ESTAGIARIO' ;
ELSIF p_RENDIMENTO < 5000 THEN
v_CARGO := 'COORDENADOR';
ELSIF p_RENDIMENTO < 7000 THEN
v_CARGO := 'GERENTE';
END IF;
RETURN v_CARGO;
END;
A partir do código PL/SQL (Procedural Language/Structured Query Language) acima, julgue o item.
Infere-se do código acima que p_RENDIMENTO é uma constante, pois foi utilizado o atributo %type, que tem como função única declarar as constantes como sendo do mesmo tipo de dado da coluna da tabela referenciada.
Provas
CREATE OR REPLACE FUNCTION mostra_cargo_CFT (
p_RENDIMENTO IN FUNCIONARIO.RENDIMENTO%type
)
RETURN FUNCIONARIO.CARGO%type;
IS
v_CARGO FUNCIONARIO.CARGO%type;
BEGIN
IF p_RENDIMENTO < 2000 THEN
v_CARGO := 'ESTAGIARIO' ;
ELSIF p_RENDIMENTO < 5000 THEN
v_CARGO := 'COORDENADOR';
ELSIF p_RENDIMENTO < 7000 THEN
v_CARGO := 'GERENTE';
END IF;
RETURN v_CARGO;
END;
A partir do código PL/SQL (Procedural Language/Structured Query Language) acima, julgue o item.
O código em questão tem como objetivo criar uma função, utilizando o sistema de gerenciamento de banco de dados (SGBD) Oracle.
Provas
CREATE OR REPLACE FUNCTION mostra_cargo_CFT (
p_RENDIMENTO IN FUNCIONARIO.RENDIMENTO%type
)
RETURN FUNCIONARIO.CARGO%type;
IS
v_CARGO FUNCIONARIO.CARGO%type;
BEGIN
IF p_RENDIMENTO < 2000 THEN
v_CARGO := 'ESTAGIARIO' ;
ELSIF p_RENDIMENTO < 5000 THEN
v_CARGO := 'COORDENADOR';
ELSIF p_RENDIMENTO < 7000 THEN
v_CARGO := 'GERENTE';
END IF;
RETURN v_CARGO;
END;
A partir do código PL/SQL (Procedural Language/Structured Query Language) acima, julgue o item.
No bloco PL/SQL, há um erro grave de lógica, pois as condições p_RENDIMENTO < 5000 e p_RENDIMENTO < 7000 foram definidas equivocadamente. Para que o código funcione corretamente, elas devem ser substituídas, respectivamente, por p_RENDIMENTO >= 2000 AND < 5000 e p_RENDIMENTO >=5000 AND < 7000.
Provas
CREATE OR REPLACE FUNCTION mostra_cargo_CFT (
p_RENDIMENTO IN FUNCIONARIO.RENDIMENTO%type
)
RETURN FUNCIONARIO.CARGO%type;
IS
v_CARGO FUNCIONARIO.CARGO%type;
BEGIN
IF p_RENDIMENTO < 2000 THEN
v_CARGO := 'ESTAGIARIO' ;
ELSIF p_RENDIMENTO < 5000 THEN
v_CARGO := 'COORDENADOR';
ELSIF p_RENDIMENTO < 7000 THEN
v_CARGO := 'GERENTE';
END IF;
RETURN v_CARGO;
END;
A partir do código PL/SQL (Procedural Language/Structured Query Language) acima, julgue o item.
Para que o código seja executado sem erro de compilação, independentemente de qualquer ferramenta, é imprescindível o uso do caractere barra (/) após o END;.
Provas
Data security is the practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle. It’s a concept that encompasses every aspect of information security from the physical security of hardware and storage devices to administrative and access controls, as well as the logical security of software applications. It also includes organizational policies and procedures.
When properly implemented, robust data security strategies will protect an organization’s information assets against cybercriminal activities, but they also guard against insider threats and human error, which remains among the leading causes of data breaches today. Data security involves deploying tools and technologies that enhance the organization’s visibility into where its critical data resides and how it is used. Ideally, these tools should be able to apply protections like encryption, data masking, and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.
Digital transformation is profoundly altering every aspect of how today’s businesses operate and compete. The sheer volume of data that enterprises create, manipulate, and store is growing, and drives a greater need for data governance. In addition, computing environments are more complex than they once were, routinely spanning the public cloud, the enterprise data center, and numerous edge devices ranging from IoT (Internet of Things) sensors to robots and remote servers. This complexity creates an expanded attack surface that’s more challenging to monitor and secure.
The business value of data has never been greater than it is today. The loss of trade secrets or IP (intellectual property) can impact future innovations and profitability. So, trustworthiness is increasingly important to consumers, with a full 75% reporting that they will not purchase from companies they don’t trust to protect their data.
Internet: <https://www.ibm.com> (adapted).
Concerning the text above and previous knowledge, judge the item from.
The sentence “When properly implemented, robust data security strategies will protect an organization’s information assets against cybercriminal activities” conveys the idea of a future result.
Provas
Data security is the practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle. It’s a concept that encompasses every aspect of information security from the physical security of hardware and storage devices to administrative and access controls, as well as the logical security of software applications. It also includes organizational policies and procedures.
When properly implemented, robust data security strategies will protect an organization’s information assets against cybercriminal activities, but they also guard against insider threats and human error, which remains among the leading causes of data breaches today. Data security involves deploying tools and technologies that enhance the organization’s visibility into where its critical data resides and how it is used. Ideally, these tools should be able to apply protections like encryption, data masking, and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.
Digital transformation is profoundly altering every aspect of how today’s businesses operate and compete. The sheer volume of data that enterprises create, manipulate, and store is growing, and drives a greater need for data governance. In addition, computing environments are more complex than they once were, routinely spanning the public cloud, the enterprise data center, and numerous edge devices ranging from IoT (Internet of Things) sensors to robots and remote servers. This complexity creates an expanded attack surface that’s more challenging to monitor and secure.
The business value of data has never been greater than it is today. The loss of trade secrets or IP (intellectual property) can impact future innovations and profitability. So, trustworthiness is increasingly important to consumers, with a full 75% reporting that they will not purchase from companies they don’t trust to protect their data.
Internet: <https://www.ibm.com> (adapted).
Concerning the text above and previous knowledge, judge the item from.
According to the text, losing trade secrets would cause a positive effect in the consumer’s trustability.
Provas
Caderno Container