Magna Concursos

Foram encontradas 50 questões.

Analise as seguintes afirmativas sobre as características da formulação de estratégias e assinale com V as verdadeiras e com F as falsas.

( ) As decisões estratégicas são baseadas em juízo de valor.

( ) As decisões estratégicas são previstas com antecipação.

( ) As decisões estratégicas são tomadas quando as oportunidades e os problemas ocorrem.

( ) Os executivos têm programas definidos para lidar com assuntos de estratégia.

Assinale a alternativa que apresenta a sequência de letras CORRETA.

 

Provas

Questão presente nas seguintes provas

Com referência às formas básicas de desenvolvimento de cenários, o executivo pode considerar como duas situações principais

 

Provas

Questão presente nas seguintes provas
65323 Ano: 2010
Disciplina: Administração Geral
Banca: FUNDEP
Orgão: PRODABEL

Considere as seguintes informações referentes à análise dos concorrentes.

I. Nessa etapa, o executivo deve efetuar as análises interna e externa de seus principais concorrentes por meio de um processo de empatia.

II. Nessa etapa, evidencia-se a necessidade de uma avaliação da qualidade da informação para uma avaliação preliminar do nível de risco que a empresa está adotando.

III. O resultado dessa etapa irá proporcionar a identificação das vantagens competitivas da própria empresa.

Considerando as informações acima, pode-se concluir que

 

Provas

Questão presente nas seguintes provas
65322 Ano: 2010
Disciplina: Administração Geral
Banca: FUNDEP
Orgão: PRODABEL

De acordo com Oliveira (2004), a postura estratégica a ser adotada pela empresa na qual a análise externa indica a predominância de ameaças e a análise interna indica a predominância de pontos fortes será de

 

Provas

Questão presente nas seguintes provas
65321 Ano: 2010
Disciplina: Administração Geral
Banca: FUNDEP
Orgão: PRODABEL

Analise as seguintes afirmativas sobre estratégias empresariais e assinale com V as verdadeiras e com F as falsas.

( ) A estratégia empresarial não está relacionada à arte de utilizar adequadamente os recursos físicos, tecnológicos, financeiros e humanos, tendo em vista a maximização dos resultados.

( ) As estratégias empresariais podem ser classificadas quanto à amplitude, quanto à concentração, quanto à qualidade dos resultados, quanto à fronteira, quanto aos recursos aplicados e quanto ao enfoque.

( ) Além de ser um instrumento administrativo facilitador e otimizador das interações da empresa com os fatores externos, as estratégias também têm forte influência sobre os fatores internos.

( ) A formulação da estratégia é um dos aspectos mais importantes que o administrador enfrenta no processo de elaboração do planejamento operacional e na execução do controle tático.

Assinale a alternativa que apresenta a sequência de letras CORRETA.

 

Provas

Questão presente nas seguintes provas
65301 Ano: 2010
Disciplina: Legislação Tributária Estadual
Banca: FUNDEP
Orgão: PRODABEL

Analise as seguintes afirmativas sobre os tributos de competência dos Estados e assinale com V as verdadeiras e com F as falsas:

( ) Os Estados podem instituir imposto sobre operações relativas à circulação de mercadorias e sobre prestações de serviços de transporte interestadual e intermunicipal e de comunicação, ainda que as operações e as prestações se iniciem no exterior.

( ) O imposto que incide sobre a circulação de mercadorias não é cumulativo, compensando-se o que for devido em cada operação relativa à circulação de mercadorias ou prestação de serviços com o montante cobrado nas anteriores pelo mesmo ou outro Estado.

( ) O imposto sobre a circulação de mercadorias incide também sobre as importadas se o comprador for pessoa jurídica e contribuinte habitual do imposto, cabendo o imposto ao Estado onde estiver situado o estabelecimento do comprador.

( ) O imposto sobre a circulação de mercadorias não incide sobre a venda de mercadorias para o exterior, mas nessas operações não é assegurada a manutenção e o aproveitamento do montante do imposto cobrado nas operações e prestações anteriores.

Assinale a alternativa que apresenta a sequência de letras CORRETA.

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

The Center for International Mobility is

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

What will be presented at the International Conference in Dallas?

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

The aim of the research is to make speech authentication

 

Provas

Questão presente nas seguintes provas

Read the following text carefully and then choose the correct alternative that answers the question or complete the statement below.

Science News

New Research Advances Voice Security Technology

ScienceDaily (Mar. 11, 2010) — Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the vocal tract, and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research was co-authored by NC State's Rodman; Rahim Saeidi, Tomi Kinnunen and Pasi Franti of the University of Joensuu in Finland; and Hamid Reza Sadegh Mohammadi of the Iranian Academic Center for Education, Culture & Research.

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification", will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19. The research was funded, in part, by the Centre for International Mobility.

NC State's Department of Computer Science is part of the university's College of Engineering.

http://www.sciencedaily.com/releases/2010/03/100308102202.htm

According to the text, the research discussed here

 

Provas

Questão presente nas seguintes provas