Magna Concursos

Foram encontradas 50 questões.

Analise as seguintes afirmativas sobre planejamento e controle e assinale com V as verdadeiras e com F as falsas.

( ) As atividades de controle tendem a ter mais importância em relação às de planejamento quando são considerados horizontes de tempo mais longos.

( ) No planejamento e controle de longo prazo, são utilizados dados agregados sobre a previsão da demanda.

( ) No planejamento e controle de médio prazo, são considerados objetivos operacionais ad hoc (caso a caso).

( ) No planejamento e controle de curto prazo, os objetivos são estabelecidos primordialmente em termos financeiros.

Assinale a alternativa que apresenta a sequência de letras CORRETA.

 

Provas

Questão presente nas seguintes provas

Analise as seguintes afirmativas sobre as características da formulação de estratégias e assinale com V as verdadeiras e com F as falsas.

( ) As decisões estratégicas são baseadas em juízo de valor.

( ) As decisões estratégicas são previstas com antecipação.

( ) As decisões estratégicas são tomadas quando as oportunidades e os problemas ocorrem.

( ) Os executivos têm programas definidos para lidar com assuntos de estratégia.

Assinale a alternativa que apresenta a sequência de letras CORRETA.

 

Provas

Questão presente nas seguintes provas

Com referência às formas básicas de desenvolvimento de cenários, o executivo pode considerar como duas situações principais

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

The Center for International Mobility is

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

What will be presented at the International Conference in Dallas?

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

The aim of the research is to make speech authentication

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

According to the text, the research discussed here

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

“Current computer models […] may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance.”

In this sentence, the relative pronoun which refers to the

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

Models that compare acoustic profiles today

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

The text does NOT say that speech authentication will be used by

 

Provas

Questão presente nas seguintes provas