Questões de Concurso Para técnico em desenho

Foram encontradas 115 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Ano: 2009 Banca: FUNDEPES Órgão: PRODABEL - MG
Q1236251 Inglês
Science News
New Research Advances Voice Security Technology
ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.
"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."
Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."
Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."
To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."
The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.
The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.
NC State's Department of Computer Science is part of the university's College of Engineering.
http://www.sciencedaily.com/releases/2010/03/100308102202.htm
According to the text, all the following statements are true of Dr. Robert Rodman, EXCEPT
Alternativas
Ano: 2010 Banca: FUNDEPES Órgão: PRODABEL - MG
Q1200647 Contabilidade Geral
Otaviano, contador recém-contratado pela empresa Vende Bem S/A, precisava calcular o valor da conta de provisão para créditos de liquidação duvidosa em determinado período. Contudo, havia uma grande dúvida sobre qual valor efetivamente reconhecer: R$ 20.000,00 ou R$ 30.000,00. Assim, sem indícios de que um valor seria mais provável de ocorrer que o outro, Otaviano optou pelo valor de R$ 30.000,00. 
Ao fazer tal julgamento, esse contador seguiu o princípio fundamental de contabilidade
Alternativas
Ano: 2009 Banca: FUNDEPES Órgão: PRODABEL - MG
Q1183312 Inglês
Science News
New Research Advances Voice Security Technology
ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity. "The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."
Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."
Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."
To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."
The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.
The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.
NC State's Department of Computer Science is part of the university's College of Engineering.
http://www.sciencedaily.com/releases/2010/03/100308102202.htm
“Current computer models […] may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance.”
In this sentence, the relative pronoun which refers to the
Alternativas
Q1112371 Arquitetura
O código de obras do munícipio de Ibirité dispõe, entre outras coisas, das necessidades de acessibilidade às edificações públicas, quando trata na seção IV de corredores, escadas e rampas para construções em geral. Nessa seção, encontra-se a seguinte indicação: “Art. 36º – As rampas para pedestres de ligação entre dois pavimentos não poderão ter declividade superior a 12% (doze por cento). Se a declividade excede 6% (seis por cento), o piso deverá ser revestido com material não escorregadio.”.
Por outro lado, a mesma lei indica no Artigo 103, inciso I, em sua seção V, que trata das especificidades dos edifícios públicos: “Rampas de acesso ao prédio deverão ter declividade máxima de 8% (oito por cento), possuir piso antiderrapante e corrimão na altura de 0,75 cm (setenta e cinco centímetros).”.
Na hipótese de o projeto de uma edificação de uso misto ter que atender a qualquer uma das exigências anteriormente descritas, assinale a alternativa que apresenta a extensão mínima de uma rampa para vencer um desnível de 3,6 metros e a exigência acerca do material que reveste seu piso.
Alternativas
Q1112370 Arquitetura
Uma das partes mais importantes da apresentação de desenhos de projetos arquitetônicos é o uso da escala. A escolha da escala de representação deve partir, antes de tudo, da necessidade de se apresentar elementos suficientemente legíveis, facilitando a leitura e a interpretação dos elementos que compõem o projeto.
Partindo desse pressuposto, associado às normas técnicas das especificidades impostas pela prefeitura de Ibirité para a apresentação e aprovação de projetos arquitetônicos, assinale a alternativa CORRETA.
Alternativas
Respostas
1: B
2: C
3: C
4: C
5: A