Início

Questões de Concursos Especialidade Análise de Sistemas

Resolva questões de Especialidade Análise de Sistemas comentadas com gabarito, online ou em PDF, revisando rapidamente e fixando o conteúdo de forma prática.


41Q1018089 | Português, Sintaxe, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Desde que não seja um satélite natural, como a Lua, um corpo celeste do sistema solar merece ostatusde planeta apenas se obedecer a três condições: estar em órbita em torno do Sol; ter massa suficiente para que sua gravidade o leve a apresentar uma forma quase redonda; e ter a vizinhança de sua órbita livre de objetos significativos que possam entrar no seu caminho. Foi com esse trio de regras objetivas que a União Astronômica Internacional (IAU) aposentou, em 26/8/2006, o conceito antigo e vago de planeta, associado à ideia de um corpo errante e luminoso que podia ser visto no céu.
Os oito primeiros planetas do sistema solar (Mercúrio, Vênus, Terra, Marte, Júpiter, Saturno, Urano e Netuno) se encaixavam na nova caracterização. O então ainda considerado nono planeta, o caçulinha da turma, descoberto apenas em 1930, não. “Plutão é um ‘planeta anão’ segundo a definição acima e é reconhecido como o protótipo de uma nova categoria de objetos transnetunianos [situados depois de Netuno]”, escreveu a direção da IAU na resolução B6, divulgada naquela data.
No mesmo documento, a entidade determina que um planeta anão, além de não ser um satélite, deve obedecer às duas primeiras condições impostas aos planetas, mas não é necessário que sua órbita seja livre de outros corpos celestes.
As decisões da resolução resguardaram o conceito de planeta dentro do sistema solar para apenas oito objetos conhecidos. Se a mudança não tivesse sido adotada, outros objetos do cinturão de Kuiper, muito parecidos com Plutão, também teriam de ser considerados planetas. Descoberto em 2005, o objeto transnetuniano denominado Éris era um desses casos. Com massa maior que a de Plutão, chegou a ser anunciado como um novo planeta — até que a resolução da IAU barrou sua entrada no clube planetário, expulsou Plutão da turma e reduziu seus membros a oito.

Marcos Pivetta.Na órbita do Planeta9. In:Revista Pesquisa FAPESP, n.º 351, maio/2025. Internet:(com adaptações).

As quatro orações que compõem o último período do texto compartilham o mesmo sujeito referencial.
  1. ✂️
  2. ✂️

42Q1018087 | Português, Interpretação de Textos, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Desde que não seja um satélite natural, como a Lua, um corpo celeste do sistema solar merece ostatusde planeta apenas se obedecer a três condições: estar em órbita em torno do Sol; ter massa suficiente para que sua gravidade o leve a apresentar uma forma quase redonda; e ter a vizinhança de sua órbita livre de objetos significativos que possam entrar no seu caminho. Foi com esse trio de regras objetivas que a União Astronômica Internacional (IAU) aposentou, em 26/8/2006, o conceito antigo e vago de planeta, associado à ideia de um corpo errante e luminoso que podia ser visto no céu.
Os oito primeiros planetas do sistema solar (Mercúrio, Vênus, Terra, Marte, Júpiter, Saturno, Urano e Netuno) se encaixavam na nova caracterização. O então ainda considerado nono planeta, o caçulinha da turma, descoberto apenas em 1930, não. “Plutão é um ‘planeta anão’ segundo a definição acima e é reconhecido como o protótipo de uma nova categoria de objetos transnetunianos [situados depois de Netuno]”, escreveu a direção da IAU na resolução B6, divulgada naquela data.
No mesmo documento, a entidade determina que um planeta anão, além de não ser um satélite, deve obedecer às duas primeiras condições impostas aos planetas, mas não é necessário que sua órbita seja livre de outros corpos celestes.
As decisões da resolução resguardaram o conceito de planeta dentro do sistema solar para apenas oito objetos conhecidos. Se a mudança não tivesse sido adotada, outros objetos do cinturão de Kuiper, muito parecidos com Plutão, também teriam de ser considerados planetas. Descoberto em 2005, o objeto transnetuniano denominado Éris era um desses casos. Com massa maior que a de Plutão, chegou a ser anunciado como um novo planeta — até que a resolução da IAU barrou sua entrada no clube planetário, expulsou Plutão da turma e reduziu seus membros a oito.

Marcos Pivetta.Na órbita do Planeta9. In:Revista Pesquisa FAPESP, n.º 351, maio/2025. Internet:(com adaptações).

Conclui-se da leitura do último parágrafo do texto que o objeto denominado Éris não faz parte da “turma” mencionada no último período do texto.
  1. ✂️
  2. ✂️

43Q1018099 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-II

Virtual reality (VR) can, in its own imperfect ways, transport a user into distant experiences. One thing VR can’t yet do, however, is simulate the experience of eating lunch. But that could change thanks to a new “bio-integrated gustatory interface” device called e-Taste.
Researchers from Ohio State University created a small electromagnetic pump connected to a liquid channel of chemicals that, when mixed in the right ratios, can approximate the taste of coffee, lemonade, cake, and other food and drinks. That newly crafted chemical liquid is then pushed through via a gel. Users ultimately experience the taste as a liquid that sits in their mouth. And while an initial group of human test subjects struggled to accurately differentiate between different taste profiles, the study suggests a future VR steakhouse experience might not be as far-fetched as it sounds.
The researchers tested their new device on 10 volunteers and received mixed results. On the positive side, the test subjects were able to differentiate between various sour taste profile intensities with approximately 70 percent accuracy. The tests were less conclusive though when researchers asked participants to distinguish between flavors intended to represent cake, fried egg, coffee, and fish soup. That discrepancy is not necessarily due entirely to poor device performance, though. Even in the physical world, taste is inherently subjective. Factors such as smell, memory, and visual cues can influence how we perceive food. Two people might experience the taste of the same meal slightly differently. “Taste and smell are greatly related to human emotion and memory,” added one of the researchers. “So our sensor has to learn to capture, control, and store all that information.”
The e-Taste researchers believe their device could also have applications beyond video games. Theoretically, the technology could one day allow users to virtually taste-test items before ordering them. Medical professionals might also use the device to remotely assess whether patients have lost certain aspects of taste, which could be an early indicator of illness. Additionally, the device could serve as an aid in reintroducing taste sensations to individuals with certain neurological disorders or illnesses, such as long COVID, that have impaired their ability to taste food.

Internet: <popsci.com> (adapted).

According to text CG2A1-II, judge the item that follow.
The test subjects of the research mentioned in the text could accurately distinguish between sour taste intensities most of the time.
  1. ✂️
  2. ✂️

44Q1018101 | Engenharia de Software, Desenvolvimento de Software, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
A respeito dos processos de desenvolvimento de software, julgue o item que se segue.
A abordagem de melhoria de processos baseada em maturidade objetiva a adoção de práticas estruturadas e técnicas para elevar a qualidade do produto e a previsibilidade do processo.
  1. ✂️
  2. ✂️

45Q1018102 | Engenharia de Software, Desenvolvimento de Software, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
A respeito dos processos de desenvolvimento de software, julgue o item que se segue.
No desenvolvimento incremental, não é exigida a entrega de cada um dos incrementos ao cliente, mas busca-se torná-los visíveis para possibilitar, sempre que viável, o feedback de stakeholders.
  1. ✂️
  2. ✂️

46Q1018105 | Engenharia de Software, Processos de Software, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Com relação a práticas ágeis e ao sistema de gestão Kanban, julgue o item subsequente.
A daily scrum baseada em fluxo altera o foco tradicional da reunião, o qual passa a ser as pessoas e a resolução de impedimentos dos itens de trabalho no quadro Kanban.
  1. ✂️
  2. ✂️

47Q1018094 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-I

Industry, government and law enforcement agencies are in race to keep up with the vast cybercrime ecosystem, experts say, as cybercriminals and malicious actors increasingly exploit the digital economy. “The global law enforcement community is struggling with the sheer volume of cyber-related crimes,” Jürgen Stock, the Secretary-General of INTERPOL, said during the World Economic Forum’s 2024 Annual Meeting in Davos. “The crime statistics only go in one direction, which is up.”
Cybercrime rose significantly during the COVID-19 pandemic. Currently, large and sophisticated cybercrimes continue to be deployed today. They are also becoming more expensive for the targeted companies and organizations. The average global cost of a data breach reached US$ 4.45 million last year, according to the latest research, the highest level ever recorded.
In Davos, experts maintain that so-called security by design is key to bolstering cyber resilience. The concept of security by design entails building cybersecurity protocols into software and hardware products from the earliest development stage. This approach allows safeguards to be embedded at each state of operation and limits the chances of cybersecurity vulnerabilities emerging as products develop and are put into use. “It has become an imperative for the digital public infrastructure,” Debjani Ghosh, President of Indian technology non-profit NASSCOM, said of security by design.
The international community needs to “start thinking about the processes we can put in place to make sure that we can support each other and defend each other’s public infrastructures,” Sadie Creese, a Professor of Cybersecurity at the University of Oxford, said in Davos.

Internet: <weforum.org> (adapted).

Based on text CG2A1-I, judge the following item.
Replacing ‘sheer’ (second sentence of the first paragraph) with massive would preserve the original meaning and maintain the grammatical correctness of the text.
  1. ✂️
  2. ✂️

48Q1061602 | Segurança da Informação, Autenticação, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Julgue o seguinte item, relativo a CSRF (cross-site request forgery), testes de invasão e segurança de aplicativos web.
Em um ataque CSRF, o navegador de um usuário autenticado pode ser induzido a realizar ações maliciosas no sistema do usuário sem o conhecimento deste.
  1. ✂️
  2. ✂️

49Q1018096 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-II

Virtual reality (VR) can, in its own imperfect ways, transport a user into distant experiences. One thing VR can’t yet do, however, is simulate the experience of eating lunch. But that could change thanks to a new “bio-integrated gustatory interface” device called e-Taste.
Researchers from Ohio State University created a small electromagnetic pump connected to a liquid channel of chemicals that, when mixed in the right ratios, can approximate the taste of coffee, lemonade, cake, and other food and drinks. That newly crafted chemical liquid is then pushed through via a gel. Users ultimately experience the taste as a liquid that sits in their mouth. And while an initial group of human test subjects struggled to accurately differentiate between different taste profiles, the study suggests a future VR steakhouse experience might not be as far-fetched as it sounds.
The researchers tested their new device on 10 volunteers and received mixed results. On the positive side, the test subjects were able to differentiate between various sour taste profile intensities with approximately 70 percent accuracy. The tests were less conclusive though when researchers asked participants to distinguish between flavors intended to represent cake, fried egg, coffee, and fish soup. That discrepancy is not necessarily due entirely to poor device performance, though. Even in the physical world, taste is inherently subjective. Factors such as smell, memory, and visual cues can influence how we perceive food. Two people might experience the taste of the same meal slightly differently. “Taste and smell are greatly related to human emotion and memory,” added one of the researchers. “So our sensor has to learn to capture, control, and store all that information.”
The e-Taste researchers believe their device could also have applications beyond video games. Theoretically, the technology could one day allow users to virtually taste-test items before ordering them. Medical professionals might also use the device to remotely assess whether patients have lost certain aspects of taste, which could be an early indicator of illness. Additionally, the device could serve as an aid in reintroducing taste sensations to individuals with certain neurological disorders or illnesses, such as long COVID, that have impaired their ability to taste food.

Internet: <popsci.com> (adapted).

According to text CG2A1-II, judge the item that follow.
The device was projected to aid those who have lost their sense of taste in recovering it.
  1. ✂️
  2. ✂️

50Q1018110 | Legislação dos TRFs, Conselho Nacional de Justiça Cnj, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
À luz da Resolução CNJ n.º 335/2020 e das Portarias CNJ n.º 252/2020, n.º 253/2020 e n.º 131/2021, julgue o próximo item.
A contratação de qualquer novo sistema, módulo ou funcionalidade privados que cause dependência tecnológica do seu fornecedor poderá ensejar a responsabilização do ordenador de despesas por improbidade administrativa, sem prejuízo da comunicação da ocorrência ao respectivo tribunal de contas.
  1. ✂️
  2. ✂️

51Q1018088 | Português, Morfologia, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Desde que não seja um satélite natural, como a Lua, um corpo celeste do sistema solar merece ostatusde planeta apenas se obedecer a três condições: estar em órbita em torno do Sol; ter massa suficiente para que sua gravidade o leve a apresentar uma forma quase redonda; e ter a vizinhança de sua órbita livre de objetos significativos que possam entrar no seu caminho. Foi com esse trio de regras objetivas que a União Astronômica Internacional (IAU) aposentou, em 26/8/2006, o conceito antigo e vago de planeta, associado à ideia de um corpo errante e luminoso que podia ser visto no céu.
Os oito primeiros planetas do sistema solar (Mercúrio, Vênus, Terra, Marte, Júpiter, Saturno, Urano e Netuno) se encaixavam na nova caracterização. O então ainda considerado nono planeta, o caçulinha da turma, descoberto apenas em 1930, não. “Plutão é um ‘planeta anão’ segundo a definição acima e é reconhecido como o protótipo de uma nova categoria de objetos transnetunianos [situados depois de Netuno]”, escreveu a direção da IAU na resolução B6, divulgada naquela data.
No mesmo documento, a entidade determina que um planeta anão, além de não ser um satélite, deve obedecer às duas primeiras condições impostas aos planetas, mas não é necessário que sua órbita seja livre de outros corpos celestes.
As decisões da resolução resguardaram o conceito de planeta dentro do sistema solar para apenas oito objetos conhecidos. Se a mudança não tivesse sido adotada, outros objetos do cinturão de Kuiper, muito parecidos com Plutão, também teriam de ser considerados planetas. Descoberto em 2005, o objeto transnetuniano denominado Éris era um desses casos. Com massa maior que a de Plutão, chegou a ser anunciado como um novo planeta — até que a resolução da IAU barrou sua entrada no clube planetário, expulsou Plutão da turma e reduziu seus membros a oito.

Marcos Pivetta.Na órbita do Planeta9. In:Revista Pesquisa FAPESP, n.º 351, maio/2025. Internet:(com adaptações).

No segmento “mas não é necessário que sua órbita seja livre de outros corpos celestes” (terceiro parágrafo), a conjunção “mas” está empregada com sentido aditivo, podendo, portanto, ser substituída, sem alteração do sentido original do texto, pela conjunção e.
  1. ✂️
  2. ✂️

52Q1018092 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-I

Industry, government and law enforcement agencies are in race to keep up with the vast cybercrime ecosystem, experts say, as cybercriminals and malicious actors increasingly exploit the digital economy. “The global law enforcement community is struggling with the sheer volume of cyber-related crimes,” Jürgen Stock, the Secretary-General of INTERPOL, said during the World Economic Forum’s 2024 Annual Meeting in Davos. “The crime statistics only go in one direction, which is up.”
Cybercrime rose significantly during the COVID-19 pandemic. Currently, large and sophisticated cybercrimes continue to be deployed today. They are also becoming more expensive for the targeted companies and organizations. The average global cost of a data breach reached US$ 4.45 million last year, according to the latest research, the highest level ever recorded.
In Davos, experts maintain that so-called security by design is key to bolstering cyber resilience. The concept of security by design entails building cybersecurity protocols into software and hardware products from the earliest development stage. This approach allows safeguards to be embedded at each state of operation and limits the chances of cybersecurity vulnerabilities emerging as products develop and are put into use. “It has become an imperative for the digital public infrastructure,” Debjani Ghosh, President of Indian technology non-profit NASSCOM, said of security by design.
The international community needs to “start thinking about the processes we can put in place to make sure that we can support each other and defend each other’s public infrastructures,” Sadie Creese, a Professor of Cybersecurity at the University of Oxford, said in Davos.

Internet: <weforum.org> (adapted).

Based on text CG2A1-I, judge the following item.
The significance of international collaboration in the cybersecurity domain is questionable, according to Sadie Creese.
  1. ✂️
  2. ✂️

53Q1018111 | Legislação dos TRFs, Conselho Nacional de Justiça Cnj, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
À luz da Resolução CNJ n.º 335/2020 e das Portarias CNJ n.º 252/2020, n.º 253/2020 e n.º 131/2021, julgue o próximo item.
O processo de disponibilização de soluções para a PDPJ-Br será institucional e centralizado, limitando-se à participação de colaboradores integrantes do poder público, como medida de precaução e segurança.
  1. ✂️
  2. ✂️

54Q1018091 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-I

Industry, government and law enforcement agencies are in race to keep up with the vast cybercrime ecosystem, experts say, as cybercriminals and malicious actors increasingly exploit the digital economy. “The global law enforcement community is struggling with the sheer volume of cyber-related crimes,” Jürgen Stock, the Secretary-General of INTERPOL, said during the World Economic Forum’s 2024 Annual Meeting in Davos. “The crime statistics only go in one direction, which is up.”
Cybercrime rose significantly during the COVID-19 pandemic. Currently, large and sophisticated cybercrimes continue to be deployed today. They are also becoming more expensive for the targeted companies and organizations. The average global cost of a data breach reached US$ 4.45 million last year, according to the latest research, the highest level ever recorded.
In Davos, experts maintain that so-called security by design is key to bolstering cyber resilience. The concept of security by design entails building cybersecurity protocols into software and hardware products from the earliest development stage. This approach allows safeguards to be embedded at each state of operation and limits the chances of cybersecurity vulnerabilities emerging as products develop and are put into use. “It has become an imperative for the digital public infrastructure,” Debjani Ghosh, President of Indian technology non-profit NASSCOM, said of security by design.
The international community needs to “start thinking about the processes we can put in place to make sure that we can support each other and defend each other’s public infrastructures,” Sadie Creese, a Professor of Cybersecurity at the University of Oxford, said in Davos.

Internet: <weforum.org> (adapted).

Based on text CG2A1-I, judge the following item.
According to the concept of security by design, cybersecurity protocols must be put in place during software’s latest phases of development.
  1. ✂️
  2. ✂️

55Q1018097 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-II

Virtual reality (VR) can, in its own imperfect ways, transport a user into distant experiences. One thing VR can’t yet do, however, is simulate the experience of eating lunch. But that could change thanks to a new “bio-integrated gustatory interface” device called e-Taste.
Researchers from Ohio State University created a small electromagnetic pump connected to a liquid channel of chemicals that, when mixed in the right ratios, can approximate the taste of coffee, lemonade, cake, and other food and drinks. That newly crafted chemical liquid is then pushed through via a gel. Users ultimately experience the taste as a liquid that sits in their mouth. And while an initial group of human test subjects struggled to accurately differentiate between different taste profiles, the study suggests a future VR steakhouse experience might not be as far-fetched as it sounds.
The researchers tested their new device on 10 volunteers and received mixed results. On the positive side, the test subjects were able to differentiate between various sour taste profile intensities with approximately 70 percent accuracy. The tests were less conclusive though when researchers asked participants to distinguish between flavors intended to represent cake, fried egg, coffee, and fish soup. That discrepancy is not necessarily due entirely to poor device performance, though. Even in the physical world, taste is inherently subjective. Factors such as smell, memory, and visual cues can influence how we perceive food. Two people might experience the taste of the same meal slightly differently. “Taste and smell are greatly related to human emotion and memory,” added one of the researchers. “So our sensor has to learn to capture, control, and store all that information.”
The e-Taste researchers believe their device could also have applications beyond video games. Theoretically, the technology could one day allow users to virtually taste-test items before ordering them. Medical professionals might also use the device to remotely assess whether patients have lost certain aspects of taste, which could be an early indicator of illness. Additionally, the device could serve as an aid in reintroducing taste sensations to individuals with certain neurological disorders or illnesses, such as long COVID, that have impaired their ability to taste food.

Internet: <popsci.com> (adapted).

According to text CG2A1-II, judge the item that follow.
In the last sentence of the second paragraph, the use of “far-fetched” implies that the possibility of a VR steakhouse experience comes across as highly unrealistic and unlikely to occur.
  1. ✂️
  2. ✂️

56Q1018098 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-II

Virtual reality (VR) can, in its own imperfect ways, transport a user into distant experiences. One thing VR can’t yet do, however, is simulate the experience of eating lunch. But that could change thanks to a new “bio-integrated gustatory interface” device called e-Taste.
Researchers from Ohio State University created a small electromagnetic pump connected to a liquid channel of chemicals that, when mixed in the right ratios, can approximate the taste of coffee, lemonade, cake, and other food and drinks. That newly crafted chemical liquid is then pushed through via a gel. Users ultimately experience the taste as a liquid that sits in their mouth. And while an initial group of human test subjects struggled to accurately differentiate between different taste profiles, the study suggests a future VR steakhouse experience might not be as far-fetched as it sounds.
The researchers tested their new device on 10 volunteers and received mixed results. On the positive side, the test subjects were able to differentiate between various sour taste profile intensities with approximately 70 percent accuracy. The tests were less conclusive though when researchers asked participants to distinguish between flavors intended to represent cake, fried egg, coffee, and fish soup. That discrepancy is not necessarily due entirely to poor device performance, though. Even in the physical world, taste is inherently subjective. Factors such as smell, memory, and visual cues can influence how we perceive food. Two people might experience the taste of the same meal slightly differently. “Taste and smell are greatly related to human emotion and memory,” added one of the researchers. “So our sensor has to learn to capture, control, and store all that information.”
The e-Taste researchers believe their device could also have applications beyond video games. Theoretically, the technology could one day allow users to virtually taste-test items before ordering them. Medical professionals might also use the device to remotely assess whether patients have lost certain aspects of taste, which could be an early indicator of illness. Additionally, the device could serve as an aid in reintroducing taste sensations to individuals with certain neurological disorders or illnesses, such as long COVID, that have impaired their ability to taste food.

Internet: <popsci.com> (adapted).

According to text CG2A1-II, judge the item that follow.
The text states that, even though they have tried, the creators of e-Taste could not emulate the experience of eating lunch.
  1. ✂️
  2. ✂️

57Q1018100 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-II

Virtual reality (VR) can, in its own imperfect ways, transport a user into distant experiences. One thing VR can’t yet do, however, is simulate the experience of eating lunch. But that could change thanks to a new “bio-integrated gustatory interface” device called e-Taste.
Researchers from Ohio State University created a small electromagnetic pump connected to a liquid channel of chemicals that, when mixed in the right ratios, can approximate the taste of coffee, lemonade, cake, and other food and drinks. That newly crafted chemical liquid is then pushed through via a gel. Users ultimately experience the taste as a liquid that sits in their mouth. And while an initial group of human test subjects struggled to accurately differentiate between different taste profiles, the study suggests a future VR steakhouse experience might not be as far-fetched as it sounds.
The researchers tested their new device on 10 volunteers and received mixed results. On the positive side, the test subjects were able to differentiate between various sour taste profile intensities with approximately 70 percent accuracy. The tests were less conclusive though when researchers asked participants to distinguish between flavors intended to represent cake, fried egg, coffee, and fish soup. That discrepancy is not necessarily due entirely to poor device performance, though. Even in the physical world, taste is inherently subjective. Factors such as smell, memory, and visual cues can influence how we perceive food. Two people might experience the taste of the same meal slightly differently. “Taste and smell are greatly related to human emotion and memory,” added one of the researchers. “So our sensor has to learn to capture, control, and store all that information.”
The e-Taste researchers believe their device could also have applications beyond video games. Theoretically, the technology could one day allow users to virtually taste-test items before ordering them. Medical professionals might also use the device to remotely assess whether patients have lost certain aspects of taste, which could be an early indicator of illness. Additionally, the device could serve as an aid in reintroducing taste sensations to individuals with certain neurological disorders or illnesses, such as long COVID, that have impaired their ability to taste food.

Internet: <popsci.com> (adapted).

According to text CG2A1-II, judge the item that follow.
The tests of the e-Taste device suggest that taste perception presents a high degree of uniformity across individuals.
  1. ✂️
  2. ✂️

58Q1018093 | Inglês, Interpretação de Texto Reading Comprehension, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Text CG2A1-I

Industry, government and law enforcement agencies are in race to keep up with the vast cybercrime ecosystem, experts say, as cybercriminals and malicious actors increasingly exploit the digital economy. “The global law enforcement community is struggling with the sheer volume of cyber-related crimes,” Jürgen Stock, the Secretary-General of INTERPOL, said during the World Economic Forum’s 2024 Annual Meeting in Davos. “The crime statistics only go in one direction, which is up.”
Cybercrime rose significantly during the COVID-19 pandemic. Currently, large and sophisticated cybercrimes continue to be deployed today. They are also becoming more expensive for the targeted companies and organizations. The average global cost of a data breach reached US$ 4.45 million last year, according to the latest research, the highest level ever recorded.
In Davos, experts maintain that so-called security by design is key to bolstering cyber resilience. The concept of security by design entails building cybersecurity protocols into software and hardware products from the earliest development stage. This approach allows safeguards to be embedded at each state of operation and limits the chances of cybersecurity vulnerabilities emerging as products develop and are put into use. “It has become an imperative for the digital public infrastructure,” Debjani Ghosh, President of Indian technology non-profit NASSCOM, said of security by design.
The international community needs to “start thinking about the processes we can put in place to make sure that we can support each other and defend each other’s public infrastructures,” Sadie Creese, a Professor of Cybersecurity at the University of Oxford, said in Davos.

Internet: <weforum.org> (adapted).

Based on text CG2A1-I, judge the following item.
Industrial and governmental organizations are working to match the speed of cybercrime development.
  1. ✂️
  2. ✂️

59Q1018103 | Engenharia de Software, Processos de Software, Especialidade Análise de Sistemas, STM, CESPE CEBRASPE, 2025

Texto associado.
Com relação a práticas ágeis e ao sistema de gestão Kanban, julgue o item subsequente.
A limitação do WIP (work in progress) é uma prática fundamental no Kanban para apoiar a implementação do sistema puxado, no qual um novo item só é iniciado quando há capacidade disponível na equipe.
  1. ✂️
  2. ✂️
Utilizamos cookies e tecnologias semelhantes para aprimorar sua experiência de navegação. Política de Privacidade.