Foram encontradas 80 questões.
Em um determinado processo eletrônico, foi disponibilizada intimação eletrônica no Portal do Tribunal de Justiça do Estado do Rio Grande do Sul, destinada ao Advogado Público responsável. A intimação se referia à decisão que deferia ao Procurador o prazo de 05(cinco) dias para manifestação.
Diante dessa situação e levando-se em consideração o disposto na Lei nº 11.419/2006, que dispõe sobre a informatização do processo judicial, é CORRETO afirmar que o prazo de 05(cinco) dias para a manifestação terá início:
Provas
O termo Voz sobre IP (VoIP) éuma sigla em inglês para Voice over Internet Protocol ou, em português, voz sobre o protocolo de Internet. A tecnologia permite que a voz, normalmente transmitida pela rede de telefonia, seja transportada via Internet. Para se obter a qualidade de serviço desejada nas aplicações VoIP, é preciso definir claramente alguns parâmetros.
É CORRETO afirmar que o parâmetro correspondente à variação no atraso, que pode ocorrer em função da variação do tempo ou da sequência de entrega de pacotes, é:
Provas
Disciplina: Legislação dos Tribunais de Justiça (TJs)
Banca: IBGP
Orgão: TJ-RS
De acordo com o Regimento Interno do Tribunal de Justiça do Estado do Rio Grande do Sul, no que tange à composição e à competência de seus órgãos, é CORRETO afirmar que:
Provas
- Rio Grande do Sul - RSLei 13.320/2009: Consolida a Legislação Relativa à Pessoa com Deficiência no RS
A preocupação com inclusão social tornou-se uma medida do mundo contemporâneo que objetiva a integração de pessoas excluídas e marginalizadas na sociedade.
De acordo com a Lei Estadual nº 13.320/2009, que consolida a legislação relativa à Pessoa com Deficiência no Estado do Rio Grande do Sul, é CORRETO afirmar em matéria de inclusão social que:
Provas
A Lei Complementar nº 10.098/1994 dispõe sobre o estatuto e o regime jurídico dos servidores públicos civis do Estado do Rio Grande do Sul, excetuadas as categorias que, por disposição constitucional, devam reger-se por estatuto próprio.
A respeito dos servidores públicos civis do Estado do Rio Grande do Sul, é CORRETO afirmar que:
Provas
The tyranny of passwords – is it time for a rethink?
They are elusive, infuriating gatekeepers that rule our lives. Easy to crack and hard to remember, forgetting them is pricey – it cost Stefan Thomas £160m in lost bitcoin
Sirin Kale
Sun 31 Jan 2021
Modern life is the act of entering the third character of a long-dead family pet into an online form three times a week, getting it wrong, and speaking to a call-centre worker in India whose real name is almost certainly not Kenny, ad infinitum, until you die. Our ancestors lived short, brutish lives and died in childbirth, or were gored to death on the battlefield, but at least they didn’t have passwords, and that’s something.
The tyranny of passwords; it colonizes modern life. These petty dictators deny us access to our bank accounts, our baby photos, our phone contracts, even our heating. They reproduce as endlessly as bacteria, and yet, like Tupperware lids, you can never find the one you need. They are our boyfriends, our girlfriends, our children, our pets. A talented and motivated adversary could probably work yours out in the time it has taken you to read this paragraph.
Most of the time, not being able to remember your password is merely irritating. But sometimes, password amnesia can be life-altering. After going public with his account of losing the password to around $220m (£161m) worth of bitcoin, German programmer Stefan Thomas, 33, sparked a conversation around passwords, loss, and how you grieve a fortune you’ll never get back.
Thomas had three copies of his bitcoin passwords saved on hard drives and a USB stick, but the first two versions failed due to software updates, and the USB stick is password protected. If Thomas enters the password incorrectly 10 times, the data wipes. He has two attempts left, and he can’t remember the password. When we speak, Thomas is remarkably sanguine.
“There are some days where I’m almost grateful for it,” he says cheerfully. “There were weeks where I would lie in bed, looking at the ceiling, just completely desperate,” he says. “I’d spend hours trying to think of ways to recover the data, jump up, run to my computer and try it and then it wouldn’t work, so I’d go back to staring at my ceiling.” Eventually, he decided: enough. He climbed out of bed, and forged a career in technology, before founding his own company, Coil.
Not everyone can move on from such a wringing loss. “I’m coming up against a brick wall,” says James Howells, his voice rising. “They don’t even want to have a conversation with me about it! Which is so silly, given the valuation.” He is referring to Newport city council, owner and operator of the rubbish tip into which he accidentally slung a hard drive containing the key to the bitcoins he’d mined in 2009.
The bitcoins are now worth £210m, and the 35-year-old cryptocurrency trader from Newport is so desperate to get them back he’s offered 25% of his haul, or £50m, to Newport city council. The council has declined Howells’s offer repeatedly over the past eight years, due to the cost.
As gently as possible, I ask if it might be better to let this go? “I’m just looking for an opportunity to search for what belongs to me,” he says, sounding wretched. “And I am willing to share it. But it’s hard to accept it’s gone without being given the opportunity to search. Knowing the hard drive’s there, and there’s still a chance.”
We lose things; we forget. It is in our nature, it’s what makes us human. “The art of losing isn’t hard to master,” observed Elizabeth Bishop in her poem One Art. Life is a continual surrendering to loss. Some fare better than others: for every Thomas, there is a Howells. “Lose something every day,” Bishop writes, and we oblige her. We lose coats, books, bags, phones, friends, money, loved ones, mobility and eventually, ourselves. Most of all, we forget our passwords. The average person has close to 80 passwords, hardly any of which they remember.
(…)
Because passwords are tedious, humans are very bad at them. “There are literally billions of passwords breached every year,” says Gerald Beuchelt of the password manager LastPass. “It’s a total epidemic. It’s happening on a daily basis.” A Google/Harris poll from 2019 found that 52% of people reuse their passwords across multiple accounts, which is very bad security practice.
“The best password is a random password,” says password researcher professor Lorrie Cranor of Carnegie Mellon University. “But people aren’t good at generating random passwords or remembering them.” Almost everything you intuitively believe about passwords is not correct. “If you struggle to remember your passwords,” Cranor says, “write them in a notebook and hide it at home. It’s highly unlikely that a hacker is going to get access to your house.”
(…)
Our passwords reveal a humanity that is much more shared than we think. “We all think alike,” says Cranor, “and we all do similar things, in creating passwords. People think they are being smart by going diagonally on the keyboard,” Cranor says. “But it’s in all the hacker dictionaries.” John used to play a game where she’d ask her friends five questions, before guessing their passwords. “I’d ask them their parents’, siblings’ and children’s names, anniversaries and birthdays, their pet’s name, and their favourite sporting team,” she says. “I’d usually get 70% of them right.”
We would not leave the door to our house open and yet many of us leave our digital accounts vulnerable to cybercriminals every day, because of our laissez-faire attitude to password security. Sometimes, criminals access accounts using personal information a person has shared online, or matching passwords from previous data breaches but, increasingly, hackers also use brute-force software – programmes which match thousands of dictionary words until something fits. “You can brute force most eight character passwords within 10 minutes,” says Beuchelt.
(…)
There is a solution to all this chaos and confusion: a password manager. “These are apps or small pieces of software,” says Beuchelt, “that store all your different usernames and passwords in secure vaults.” A password manager like LastPass (Google also has a version) will randomly generate impenetrable passwords for all your various accounts and store them for you. “All users need to do is remember your master password,” says Beuchelt, “and LastPass remembers the rest.” It’s the equivalent of having a book in your house, with all your passwords written in it – only digital and highly secure.
Of course, your master password needs to be extremely strong: LastPass recommends a minimum of 12 characters, but the longer the better. A long passphrase, composed of random words, numbers and symbols, that is pronounceable – meaning you’re likely to remember it – but doesn’t use personal information, works best. LastPass doesn’t store its users’ passwords centrally, meaning that even if hackers were able to get into their internal systems they wouldn’t be able to break into accounts. “That gives users the highest degree of security you can get,” says Beuchelt.
(…)
From: < https://www.theguardian.com/technology/2021/jan/31/the-tyranny-of-passwords-is-it-time-for-a-rethink>. Acess: January 31, 2021.
The solution to the password nightmare recommended in the text will:
Provas
- Fundamentos de ProgramaçãoAlgoritmosDefinição de Algoritmo
- Fundamentos de ProgramaçãoAlgoritmosDiagrama de Chapin
- Fundamentos de ProgramaçãoAlgoritmosFluxogramas
- Fundamentos de ProgramaçãoPseudocódigo
Os algoritmos são amplamente utilizados na área da ciência da computação, desde a definição das instruções realizadas pelo hardware – processadores e demais dispositivos –, passando pelas operações executadas pelo sistema operacional no gerenciamento dos computadores, até a documentação das operações necessárias à elaboração de soluções voltadas para a construção de interfaces entre software e hardware, programas e demais aplicativos.
É CORRETO afirmar que o tipo de algoritmo que apresenta a solução do problema por meio de um diagrama de quadros com uma visão hierárquica e estruturada é:
Provas
A tradução de IDS (Intrusion Detection System) e de IPS (Intrusion Prevention System) é, respectivamente, Sistema de Detecção de Intrusão e Sistema de Prevenção de Intrusão. Sobre esses sistemas, analise as afirmativas a seguir:
I - Os sistemas de IDS analisam os registros de acesso à internet, procuram falhas que possam indicar uma invasão à rede e sinalizam isso para que o administrador da rede possa agir ou entender o que está acontecendo.
II - O IPS se restringe a detectar tentativas de intrusão, registrá-las e enviá-las ao administrador da rede.
III - O IDS opera “inline” na rede, adotando medidas adicionais para bloquear as intrusões em tempo real.
IV - Os sistemas IDS e IPS necessitam de uma base de dados de assinaturas conhecidas para realizar a comparação com possíveis ataques.
Estão CORRETAS as afirmativas:
Provas
Os frameworks ITIL e COBIT são utilizados por profissionais da tecnologia da informação para o gerenciamento de serviços de TI. Juntos, eles fornecem orientações para a governança e o gerenciamento de serviços, sejam eles prestados internamente ou obtidos de terceiros.
Considerando os princípios básicos do COBIT, assinale a alternativa INCORRETA:
Provas
O Access é uma ferramenta de design e implantação de aplicativos de banco de dados que pode ser usada para acompanhar informações importantes. Ele fornece seis objetos de banco de dados que, quando combinados, ajudam a aproveitar ao máximo seus dados.
Dessa forma, assinale a alternativa que apresenta CORRETAMENTE os objetos que possibilitam automatizar tarefas em um banco de dados.
Provas
Caderno Container