<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5486777263432064217</id><updated>2022-05-15T14:51:13.947-07:00</updated><category term="Lógica de Programação"/><category term="Rede de Computadores"/><category term="Linguagem C"/><category term="Segurança da Informação"/><category term="Banco de Dados"/><category term="Eletrônica"/><category term="Manutenção de Computadores"/><category term="Desenvolvimento Web"/><category term="Arduino"/><category term="Big Data"/><category term="Checklist"/><category term="Cursos"/><category term="Data Science"/><category term="Hardware"/><category term="IA"/><category term="Linux"/><category term="Power BI"/><category term="Python"/><category term="SQL"/><category term="Sistemas Operacionais"/><title type='text'>T.I. Fácil</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default?start-index=26&amp;max-results=25'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>52</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-2037643231740663182</id><published>2021-06-04T05:38:00.002-07:00</published><updated>2021-06-04T05:43:24.867-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Checklist"/><title type='text'>Modelo Check List Para Manutenção de Computadores</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-S6IarhBOKHw/YLofbn6OzlI/AAAAAAAAFZs/qvEys-HwCH4JaL6jfz4K77LawuhytthfwCLcBGAsYHQ/s431/checklist.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;334&quot; data-original-width=&quot;431&quot; src=&quot;https://1.bp.blogspot.com/-S6IarhBOKHw/YLofbn6OzlI/AAAAAAAAFZs/qvEys-HwCH4JaL6jfz4K77LawuhytthfwCLcBGAsYHQ/s320/checklist.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Nessa postagem tem um modelo de checklist para inserir as informações do equipamento, clique no link abaixo para fazer o download direto pelo google drive.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-eIlcdRmWZm8/YLobM0iNC-I/AAAAAAAAFZU/hHQV0EdTT-wVX7EtuLNhyu_ko-OksKefACLcBGAsYHQ/s1280/WhatsApp%2BImage%2B2021-04-06%2Bat%2B09.17.37.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;902&quot; height=&quot;623&quot; src=&quot;https://1.bp.blogspot.com/-eIlcdRmWZm8/YLobM0iNC-I/AAAAAAAAFZU/hHQV0EdTT-wVX7EtuLNhyu_ko-OksKefACLcBGAsYHQ/w440-h623/WhatsApp%2BImage%2B2021-04-06%2Bat%2B09.17.37.jpeg&quot; width=&quot;440&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://drive.google.com/file/d/1Pt_PkxHsZQRzd1IIr3dB4cev0oGwrN6_/view?usp=sharing&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;499&quot; data-original-width=&quot;2400&quot; src=&quot;https://1.bp.blogspot.com/-v1_vkNlZinU/YLodu1sin0I/AAAAAAAAFZk/kUGZB8LANFUJVz4IPtEIxHCmJ51af9o0wCLcBGAsYHQ/s320/orange-download-button-with-green-arrow.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/2037643231740663182/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/05/modelo-check-list-de-entrada-de.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2037643231740663182'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2037643231740663182'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/05/modelo-check-list-de-entrada-de.html' title='Modelo Check List Para Manutenção de Computadores'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-S6IarhBOKHw/YLofbn6OzlI/AAAAAAAAFZs/qvEys-HwCH4JaL6jfz4K77LawuhytthfwCLcBGAsYHQ/s72-c/checklist.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-3961280956082687214</id><published>2021-04-17T06:42:00.002-07:00</published><updated>2021-04-17T06:48:07.084-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hardware"/><category scheme="http://www.blogger.com/atom/ns#" term="Manutenção de Computadores"/><title type='text'>Como Montar Um PC Gamer - Passo a Passo</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-2Ot1mirlzJ0/YHrPGAF28lI/AAAAAAAAFVU/YC_4MFhLkPY-t5vdFjbvAXtfYAq0J0tOgCLcBGAsYHQ/s1120/09111156392166.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;420&quot; data-original-width=&quot;1120&quot; height=&quot;257&quot; src=&quot;https://1.bp.blogspot.com/-2Ot1mirlzJ0/YHrPGAF28lI/AAAAAAAAFVU/YC_4MFhLkPY-t5vdFjbvAXtfYAq0J0tOgCLcBGAsYHQ/w687-h257/09111156392166.jpg&quot; width=&quot;687&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Configuração&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Primeiro passo é importante saber qual jogo vamos rodar no PC. Pra esse artigo vamos usar o jogo Red Dead Redemption 2.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Veja abaixo os requisitos mínimos do jogo de acordo com o site da Rockstar:&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Sistema operacional: Windows 7 - Service Pack 1 (6.1.7601)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Processador: Intel® Core™ i5-2500K / AMD FX-6300.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Memória: 8 GB.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;Placa de vídeo: Nvidia GeForce GTX 770&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;2&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;GB / AMD Radeon R9 280 3 GB.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Espaço em disco: 150 GB.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white; color: #202124; font-size: 16px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Placa de som: Compatível com DirectX.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Note que não é necessário montar um PC caro para rodar o jogo, podemos fazer isso com um processador i5 de 2º geração, o que serviria para maioria dos jogos nesse nível.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Agora que já sabemos os requisitos podemos partir para a escolha das peças.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Para montar um PC barato, podemos pesquisar no mercado livre por Kit i5 com 8 GB RAM, veja que encontrei vários kits por um preço bem mais acessível.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;É possível também encontrar o kit com a placa de vídeo já incluída.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-uy8DLFPxXXE/YHrXYG98McI/AAAAAAAAFVg/__-gfW76J_AQcZ3ClhKHyv8v_Em5uR1CgCLcBGAsYHQ/s905/kits.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;465&quot; data-original-width=&quot;905&quot; height=&quot;331&quot; src=&quot;https://1.bp.blogspot.com/-uy8DLFPxXXE/YHrXYG98McI/AAAAAAAAFVg/__-gfW76J_AQcZ3ClhKHyv8v_Em5uR1CgCLcBGAsYHQ/w646-h331/kits.png&quot; width=&quot;646&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Agora que já temos a placa mãe, o processador, cooler e a memória RAM, podemos pesquisar da mesma forma para escolher o SSD, HD, Gabinete, Fonte e a Placa de vídeo.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Você pode acrescentar ou retirar as peças ou mudar as configurações de acordo com sua necessidade.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Ao pesquisar eu encontrei o seguintes valores:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;SDD Kingston 120 GB - R$ 199,00&lt;/div&gt;&lt;div&gt;HD 1TB Seagate - R$ 257,00&lt;/div&gt;&lt;div&gt;Gabinete gamer Blue case B-014 - R$ 209,00&lt;/div&gt;&lt;div&gt;Fonte Atx 500w Reais - R$ 178,00&lt;/div&gt;&lt;div&gt;Placa de vídeo 4GB Nvidia Afox Geforce 700 series - R$ 498,00&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Nessa configuração, escolhi o SSD para instalar o sistema operacional Win10. Um HD de 1TB para instalar os jogos, uma fonte real de 500w e a placa de vídeo de 4GB para não consumir a capacidade máximo ao rodar o jogo.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Se escolhermos o kit com o processador i5-650, o PC sairia no valor total de R$ 2.661,00, um valor relativamente baixo com uma placa de vídeo de 4GB.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Montagem&lt;/h3&gt;&lt;p&gt;Se você não sabe montar o PC, eu vou deixar um vídeo aqui em baixo para vocês.&amp;nbsp;&lt;/p&gt;&lt;iframe align=&quot;center&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;500&quot; src=&quot;https://www.youtube.com/embed/O9845EjK7o0&quot; title=&quot;YouTube video player&quot; width=&quot;650&quot;&gt;&lt;/iframe&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Espero que vocês tenham gostado do artigo, se você tem alguma dúvida, deixe seu comentário, até a próxima!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/3961280956082687214/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2021/04/como-montar-um-pc-gamer-passo-passo.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/3961280956082687214'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/3961280956082687214'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2021/04/como-montar-um-pc-gamer-passo-passo.html' title='Como Montar Um PC Gamer - Passo a Passo'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-2Ot1mirlzJ0/YHrPGAF28lI/AAAAAAAAFVU/YC_4MFhLkPY-t5vdFjbvAXtfYAq0J0tOgCLcBGAsYHQ/s72-w687-h257-c/09111156392166.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Brasil</georss:featurename><georss:point>-14.235004 -51.92528</georss:point><georss:box>-42.545237836178842 -87.08153 14.075229836178845 -16.76903</georss:box></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-130793839526525921</id><published>2020-04-27T17:21:00.000-07:00</published><updated>2020-04-27T17:21:55.770-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Eletrônica"/><title type='text'>Circuitos Digitais</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-Pot3UZfAhYo/Xqd1bXfWoqI/AAAAAAAAFD0/wnOtMwANJw0RcS-RtTn8GE-Qk8xbYkQgwCLcBGAsYHQ/s1600/eletronica-fisica.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;321&quot; data-original-width=&quot;385&quot; height=&quot;166&quot; src=&quot;https://1.bp.blogspot.com/-Pot3UZfAhYo/Xqd1bXfWoqI/AAAAAAAAFD0/wnOtMwANJw0RcS-RtTn8GE-Qk8xbYkQgwCLcBGAsYHQ/s200/eletronica-fisica.PNG&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;A lógica digital é utilizada para representar dispositivos eletrônicos. Esses dispositivos são formados por circuitos lógicos (ou gates), que tem a função de receber os dados, processá-los e gerar sua saída. Os sistemas lógicos admitem apenas duas grandezas: falso e verdadeiro, representados por 0 e 1.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Abaixo vemos as funções lógicas, os símbolos e a tabela verdade correspondente:&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;AND (E) -&amp;nbsp;&lt;/b&gt;Na função E, a saída será verdadeira, se todas as entradas forem verdadeiras.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-EZMQmSwbdLM/Xqdg1WJmKaI/AAAAAAAAFCY/L7h16MPHzQgQw_F2G6NxbXPX2JeyyLRfQCLcBGAsYHQ/s1600/AND.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;função lógica e tabela verdade and (e)&quot; border=&quot;0&quot; data-original-height=&quot;178&quot; data-original-width=&quot;331&quot; height=&quot;171&quot; src=&quot;https://1.bp.blogspot.com/-EZMQmSwbdLM/Xqdg1WJmKaI/AAAAAAAAFCY/L7h16MPHzQgQw_F2G6NxbXPX2JeyyLRfQCLcBGAsYHQ/s320/AND.PNG&quot; title=&quot;função lógica e tabela verdade and (e)&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;OR (OU) -&amp;nbsp;&lt;/b&gt;Na função OU, a função é verdadeira quando um dos termos for verdadeiro.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-2ytydiWflrQ/Xqdg-rWwpyI/AAAAAAAAFCc/s-GJIGgC41wnvjOubO9OPY6lFJ5yYZRlQCLcBGAsYHQ/s1600/OR.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;função lógica e tabela verdade or ou &quot; border=&quot;0&quot; data-original-height=&quot;192&quot; data-original-width=&quot;344&quot; height=&quot;178&quot; src=&quot;https://1.bp.blogspot.com/-2ytydiWflrQ/Xqdg-rWwpyI/AAAAAAAAFCc/s-GJIGgC41wnvjOubO9OPY6lFJ5yYZRlQCLcBGAsYHQ/s320/OR.PNG&quot; title=&quot;função lógica e tabela verdade or ou&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;NOT (NÃO) -&amp;nbsp;&lt;/b&gt;Nessa função, os valores iniciais são invertidos.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-wX0PWAfc_Ns/XqdhJLGUGoI/AAAAAAAAFCk/MKWJ04ygbHoOqzS9hc8_Q8X38mRalkU9gCLcBGAsYHQ/s1600/NOT.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;função lógica e tabela verdade not (não)&quot; border=&quot;0&quot; data-original-height=&quot;129&quot; data-original-width=&quot;266&quot; src=&quot;https://1.bp.blogspot.com/-wX0PWAfc_Ns/XqdhJLGUGoI/AAAAAAAAFCk/MKWJ04ygbHoOqzS9hc8_Q8X38mRalkU9gCLcBGAsYHQ/s1600/NOT.PNG&quot; title=&quot;função lógica e tabela verdade not (não)&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;NAND (NÃO-E) -&amp;nbsp;&lt;/b&gt;Equivale a uma função E seguida da função NÃO. O resultado é o inverso da função E.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-TPfnHTiBS4I/XqdhNntfHzI/AAAAAAAAFCo/vAzjAGpdFrAyKET1hraJg2_2AzN_OUyhQCLcBGAsYHQ/s1600/NAND.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;função lógica e tabela verdade nand (não-e)&quot; border=&quot;0&quot; data-original-height=&quot;187&quot; data-original-width=&quot;322&quot; height=&quot;185&quot; src=&quot;https://1.bp.blogspot.com/-TPfnHTiBS4I/XqdhNntfHzI/AAAAAAAAFCo/vAzjAGpdFrAyKET1hraJg2_2AzN_OUyhQCLcBGAsYHQ/s320/NAND.PNG&quot; title=&quot;função lógica e tabela verdade nand (não-e)&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;NOR (NÃO-OU) -&amp;nbsp;&lt;/b&gt;Nessa função, os valores iniciais também são invertidos. O resultado é o inverso da função OU.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a align=&quot;left&quot; href=&quot;https://1.bp.blogspot.com/-fdO6HcHQt5Q/Xqdhkg_uDBI/AAAAAAAAFC4/7bKt7eccF0wnUDL2kX-RwbzQvdUFOxMXACLcBGAsYHQ/s1600/NOR.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;função lógica e tabela verdade (não ou)&quot; border=&quot;0&quot; data-original-height=&quot;180&quot; data-original-width=&quot;301&quot; src=&quot;https://1.bp.blogspot.com/-fdO6HcHQt5Q/Xqdhkg_uDBI/AAAAAAAAFC4/7bKt7eccF0wnUDL2kX-RwbzQvdUFOxMXACLcBGAsYHQ/s1600/NOR.PNG&quot; title=&quot;função lógica e tabela verdade nor (não ou)&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;XOR (OU-Exclusivo) -&amp;nbsp;&lt;/b&gt;a função é verdadeira apenas se um dos valores é verdadeiro.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-qYNuxKt-Vc8/XqdjA5lV-1I/AAAAAAAAFDQ/KMBnUGK1akc1VTZvNCJkgzYU0ZaUGpv9QCLcBGAsYHQ/s1600/XOR.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;função lógica e tabela verdade xor (ou exclusivo)&quot; border=&quot;0&quot; data-original-height=&quot;180&quot; data-original-width=&quot;301&quot; src=&quot;https://1.bp.blogspot.com/-qYNuxKt-Vc8/XqdjA5lV-1I/AAAAAAAAFDQ/KMBnUGK1akc1VTZvNCJkgzYU0ZaUGpv9QCLcBGAsYHQ/s1600/XOR.png&quot; title=&quot;função lógica e tabela verdade xor (ou exclusivo)&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/130793839526525921/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2020/04/circuitos-digitais.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/130793839526525921'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/130793839526525921'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2020/04/circuitos-digitais.html' title='Circuitos Digitais'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-Pot3UZfAhYo/Xqd1bXfWoqI/AAAAAAAAFD0/wnOtMwANJw0RcS-RtTn8GE-Qk8xbYkQgwCLcBGAsYHQ/s72-c/eletronica-fisica.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-9145457469325544246</id><published>2020-04-20T17:49:00.000-07:00</published><updated>2020-04-23T15:55:29.891-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Segurança da Informação"/><title type='text'>Segurança na Internet</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-VGBNbpdj5gE/Xp5CzWfNTII/AAAAAAAAFBg/P9oxtvivjC0tGZg0CfFLtWQ0zXBF9bvqACLcBGAsYHQ/s1600/seguranc%25CC%25A7a_na_internet.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;900&quot; height=&quot;213&quot; src=&quot;https://1.bp.blogspot.com/-VGBNbpdj5gE/Xp5CzWfNTII/AAAAAAAAFBg/P9oxtvivjC0tGZg0CfFLtWQ0zXBF9bvqACLcBGAsYHQ/s320/seguranc%25CC%25A7a_na_internet.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;A Internet já está presente no cotidiano de grande parte da população e, provavelmente para estas pessoas, seria muito difícil imaginar como seria a vida sem poder usufruir das diversas facilidades e oportunidades trazidas por esta tecnologia.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Aproveitar os benefícios, entretanto, requer que alguns cuidados sejam tomados e, para isto, é importante que você esteja informado dos riscos aos quais está exposto para que possa tomar as medidas preventivas necessárias. Alguns destes riscos são:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Acesso a conteúdos impróprios ou ofensivos&lt;/b&gt;: ao navegar você&amp;nbsp;pode se deparar com páginas que contenham pornografia, que atentem contra a honra ou que incitem o ódio e o racismo.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Contato com pessoas mal-intencionadas&lt;/b&gt;: existem pessoas que se aproveitam da falsa sensação de anonimato da Internet para aplicar golpes, tentar se passar por outras pessoas e cometer crimes como, por exemplo, estelionato, pornografia infantil e sequestro.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Furto de identidade&lt;/b&gt;: assim como você&amp;nbsp;pode ter contato direto com impostores, também pode ocorrer de alguém tentar se passar por você&amp;nbsp;&amp;nbsp;e executar ações em seu nome, levando outras pessoas a acreditarem que estão se relacionando com você, e colocando em risco a sua imagem ou reputação.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Furto e perda de dados&lt;/b&gt;: os dados presentes em seus equipamentos conectados a Internet podem ser furtados e apagados, pela ação de ladrões, atacantes e códigos maliciosos.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Invasão de privacidade&lt;/b&gt;: a divulgação de informações pessoais pode comprometer a sua privacidade, de seus amigos e familiares e, mesmo que você restrinja o acesso, não há como controlar que elas não serão repassadas. Além disto, os sites costumam ter políticas próprias de privacidade e podem alterá-las sem aviso prévio, tornando público aquilo que antes era privado.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Divulgação de boatos&lt;/b&gt;: as informações na Internet podem se propagar rapidamente e atingir um grande numero de pessoas em curto período de tempo. Enquanto isto pode ser desejável em certos casos, também pode ser usado para a divulgação de informações falsas, que podem gerar panico e prejudicar pessoas e empresas.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Dificuldade de exclusão&lt;/b&gt;: aquilo que e divulgado na Internet nem sempre pode ser totalmente excluído ou ter o acesso controlado. Uma opinião dada em um momento de impulso pode ficar acessível por tempo indeterminado e pode, de alguma forma, ser usada contra você e acessada por diferentes pessoas, desde seus familiares ate seus chefes.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Dificuldade de detectar e expressar sentimentos&lt;/b&gt;: quando você&amp;nbsp;se comunica via Internet não há como observar as expressões faciais ou o tom da voz das outras pessoas, assim como elas não podem observar você (a não ser que vocês estejam utilizando webcams e microfones). Isto pode dificultar a percepção do risco, gerar mal-entendido e interpretação dúbia.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Dificuldade de manter sigilo&lt;/b&gt;: no seu dia a dia e possível ter uma conversa confidencial com alguém e tomar cuidados para que ninguém mais tenha acesso ao que está sendo dito. Na Internet, caso não sejam tomados os devidos cuidados, as informações podem trafegar ou ficar armazenadas de forma que outras pessoas tenham acesso ao conteúdo.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Uso excessivo&lt;/b&gt;: o uso desmedido da Internet, assim como de outras tecnologias, pode colocar em risco a sua saúde física, diminuir a sua produtividade e afetar a sua vida social ou profissional.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Plagio e violação de direitos autorais&lt;/b&gt;: a cópia, alteração ou distribuição não autorizada de conteúdos e materiais protegidos pode contrariar a lei de direitos autorais e resultar em problemas jurídicos e em perdas financeiras.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Fonte&lt;/b&gt;:&amp;nbsp;Cartilha de Segurança para Internet, versão 4.0 / CERT.br – São Paulo: Comitê Gestor da Internet no Brasil, 2012.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/9145457469325544246/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2020/04/seguranca-na-internet.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/9145457469325544246'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/9145457469325544246'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2020/04/seguranca-na-internet.html' title='Segurança na Internet'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-VGBNbpdj5gE/Xp5CzWfNTII/AAAAAAAAFBg/P9oxtvivjC0tGZg0CfFLtWQ0zXBF9bvqACLcBGAsYHQ/s72-c/seguranc%25CC%25A7a_na_internet.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-759689262286129859</id><published>2019-05-20T07:16:00.000-07:00</published><updated>2019-05-20T07:16:07.326-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Manutenção de Computadores"/><title type='text'>Como Criar Um Pen Drive Bootável</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-xLMyaouBwGI/XOK1UXonbII/AAAAAAAAE2Y/ceZrNhj9Rasaa0wjRwqggk5nw5lEe5n8wCLcBGAs/s1600/pendrive.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;205&quot; data-original-width=&quot;307&quot; src=&quot;https://2.bp.blogspot.com/-xLMyaouBwGI/XOK1UXonbII/AAAAAAAAE2Y/ceZrNhj9Rasaa0wjRwqggk5nw5lEe5n8wCLcBGAs/s1600/pendrive.jpg&quot; /&gt;&lt;/a&gt;O Yumi é uma ferramenta autoexecutável e fácil de usar, ou seja, você não precisa instalar o aplicativo no sistema para utilizá-lo. Neste artigo vamos ver como criar um Pen Drive bootável utilizando essa ferramenta. Confira!&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Caso não tenha o aplicativo e queira baixá-lo, acesse o site pelo link: &lt;a href=&quot;https://www.pendrivelinux.com/yumi-multiboot-usb-creator/&quot;&gt;pendrivelinux&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Vejamos então o passo a passo da criação do Pen Drive bootável.&lt;br /&gt;&lt;br /&gt;Depois de ter baixado o Yumi, dê dois cliques no executável para iniciar o programa.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-sBFmV8SNiq8/XOKl9P6dVaI/AAAAAAAAE1c/Q6XU8bLEExYWoLATLtPiaMZm5sM2mClxACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;407&quot; data-original-width=&quot;507&quot; src=&quot;https://2.bp.blogspot.com/-sBFmV8SNiq8/XOKl9P6dVaI/AAAAAAAAE1c/Q6XU8bLEExYWoLATLtPiaMZm5sM2mClxACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Na tela que se segue, clique em aceitar os termos de licença.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-5klipekBtPc/XOKl_wRHOuI/AAAAAAAAE1o/VO5R4xiFDaYALdw9YMV1IGXG2j-uphssACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;439&quot; data-original-width=&quot;549&quot; src=&quot;https://4.bp.blogspot.com/-5klipekBtPc/XOKl_wRHOuI/AAAAAAAAE1o/VO5R4xiFDaYALdw9YMV1IGXG2j-uphssACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo2.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;Agora vemos a tela principal do Yumi. O primeiro passo é selecionar o dispositivo onde queremos instalar o sistema operacional.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;Veja nas imagens abaixo, destacado de vermelho, em que foi selecionado o Pen drive para instalação do sistema.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-IrPsFZEThwM/XOKl_v2TLpI/AAAAAAAAE18/Fyb_VSqJ-A4BNeZ_HpAdrfx7xa7x9N5DQCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;437&quot; data-original-width=&quot;553&quot; src=&quot;https://2.bp.blogspot.com/-IrPsFZEThwM/XOKl_v2TLpI/AAAAAAAAE18/Fyb_VSqJ-A4BNeZ_HpAdrfx7xa7x9N5DQCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo3.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-Pa_HpXSxOfg/XOKl_952jRI/AAAAAAAAE2I/r27hPqLodIQg0aU6IERWHVNAp7Y1ciZiwCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;436&quot; data-original-width=&quot;542&quot; src=&quot;https://1.bp.blogspot.com/-Pa_HpXSxOfg/XOKl_952jRI/AAAAAAAAE2I/r27hPqLodIQg0aU6IERWHVNAp7Y1ciZiwCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo4.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Depois de selecionado o dispositivo, no passo 2 vamos selecionar o tipo de sistema operacional, neste exemplo iremos utilizar o Windows 7 todas as versões, mas você pode utilizar o sistema de sua preferência.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Note que podemos selecionar o tipo de sistema de arquivos NTFS ou FAT32, indicado pela seta ao lado. Ao selecionar essa opção o Pen drive será formatado.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-OFhCfy9CWvA/XOKmA43xn0I/AAAAAAAAE2E/90CjlN8dNXMaTx-GRGt00KiJ_Sa30ORRgCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;452&quot; data-original-width=&quot;564&quot; src=&quot;https://2.bp.blogspot.com/-OFhCfy9CWvA/XOKmA43xn0I/AAAAAAAAE2E/90CjlN8dNXMaTx-GRGt00KiJ_Sa30ORRgCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo5.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;No passo 3, vamos selecionar a imagem ISO do sistema. Clique no botão &lt;b&gt;Browse, &lt;/b&gt;como indicado abaixo&lt;b&gt;,&amp;nbsp;&lt;/b&gt;para acessar a pasta onde se encontra a imagem ISO.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-KmhUchBbIEo/XOKmBFegEhI/AAAAAAAAE2A/-Cxl_aWXuJkEJCAapnU8oKxPtTzRKxjBwCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo6.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;437&quot; data-original-width=&quot;551&quot; src=&quot;https://3.bp.blogspot.com/-KmhUchBbIEo/XOKmBFegEhI/AAAAAAAAE2A/-Cxl_aWXuJkEJCAapnU8oKxPtTzRKxjBwCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo6.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;Ao acessar a pasta, selecione a imagem ISO e clique em abrir.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-xnbN4v3lE9Y/XOKmB9l6-tI/AAAAAAAAE2I/6Aav6HNZAcQcM0xlVnPeUNmuJSxopxnWwCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo7.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;558&quot; data-original-width=&quot;893&quot; height=&quot;398&quot; src=&quot;https://3.bp.blogspot.com/-xnbN4v3lE9Y/XOKmB9l6-tI/AAAAAAAAE2I/6Aav6HNZAcQcM0xlVnPeUNmuJSxopxnWwCEwYBhgL/s640/Sem%2Bt%25C3%25ADtulo7.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Pronto, com a imagem selecionada, agora é só clicar em &lt;b&gt;Create &lt;/b&gt;para criar o Pen Drive bootável.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Ao final da criação o Yumi vai exibir uma janela perguntando se você deseja repetir o processo, escolha sim caso deseje instalar outro sistema, depois é só seguir os passos novamente.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Caso você vá instalar outro sistema, desmarque a caixa de seleção ao lado para que o sistema instalado anteriormente não seja apagado.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-MKguTXXr3yo/XOKmCAHoDdI/AAAAAAAAE2I/G7gjCvOo060bWkp-G82WlmTvY3hb5uzCwCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo8.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;432&quot; data-original-width=&quot;549&quot; src=&quot;https://3.bp.blogspot.com/-MKguTXXr3yo/XOKmCAHoDdI/AAAAAAAAE2I/G7gjCvOo060bWkp-G82WlmTvY3hb5uzCwCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo8.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Espero que esse artigo tenha te ajudado no processo de criação do Pen drive de boot, caso tenha alguma dúvida deixe seu comentário abaixo. Se você gostou compartilhe!&lt;/div&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/759689262286129859/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/05/como-criar-um-pen-drive-bootavel.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/759689262286129859'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/759689262286129859'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/05/como-criar-um-pen-drive-bootavel.html' title='Como Criar Um Pen Drive Bootável'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-xLMyaouBwGI/XOK1UXonbII/AAAAAAAAE2Y/ceZrNhj9Rasaa0wjRwqggk5nw5lEe5n8wCLcBGAs/s72-c/pendrive.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-8729772655789587813</id><published>2019-05-13T14:54:00.002-07:00</published><updated>2019-05-17T07:14:13.809-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Manutenção de Computadores"/><title type='text'>Formatação de Computadores e Notebooks Com Windows 7 Passo a Passo</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-SHRRuMNvFs4/XNnZYoEXzZI/AAAAAAAAE1I/wWX60ndI8j0TnFD9UkI1BlclhlQLpjUWACLcBGAs/s1600/images.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;225&quot; data-original-width=&quot;225&quot; src=&quot;https://2.bp.blogspot.com/-SHRRuMNvFs4/XNnZYoEXzZI/AAAAAAAAE1I/wWX60ndI8j0TnFD9UkI1BlclhlQLpjUWACLcBGAs/s1600/images.png&quot; /&gt;&lt;/a&gt;Neste artigo veremos como fazer a instalação do Windows 7 em um computador ou notebook passo a passo, para isso vocês precisam ter o DVD de instalação do Windows ou um Pen drive bootável com a imagem do sistema operacional.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Saber formatar um computador é importante porque além de não ter que gastar dinheiro mais pagando um técnico para formatar sua máquina, você pode ganhar uma grana formatando o computador dos seus vizinhos ou mesmo seus parentes&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Dica&lt;/span&gt;&lt;/b&gt;: antes de fazer a instalação, verifique se o computador ou notebook já possuía o Windows instalado, se sim, instale a mesma versão e utilize a chave que está na etiqueta do produto, assim vai ser mais fácil fazer a ativação do sistema.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Caso vocês façam a formatação com a versão original do sistema no computador de algum cliente, por exemplo, isso vai evitar que haja algum problema futuro com a ativação. Então vamos lá!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Passo a Passo&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Antes de fazer a formatação e a instalação do novo sistema operacional, faça o backup de arquivos e dos drivers do sistema. Caso não saiba fazer o backup dos drivers, baixe do site do fabricante pesquisando pelo modelo do seu dispositivo.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div&gt;Para fazer a formatação, temos que entrar na BIOS e definir qual o dispositivo que queremos que o computador inicie.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Na inicialização do sistema aperte a tecla &lt;b&gt;DEL &lt;/b&gt;para entrar na BIOS, observe se o dispositivo tem como padrão outra tecla como &lt;b&gt;F2,&amp;nbsp;&lt;/b&gt;vai aparecer a seguinte tela:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-qn5Ry3zZDWo/XNm0EkZ0MAI/AAAAAAAAEu0/LYQB_AtTVj4K389Y8PU31VyhGEIF9VLiwCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;356&quot; src=&quot;https://4.bp.blogspot.com/-qn5Ry3zZDWo/XNm0EkZ0MAI/AAAAAAAAEu0/LYQB_AtTVj4K389Y8PU31VyhGEIF9VLiwCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Agora que entramos na BIOS, vamos até a aba de boot e selecionamos o dispositivo que queremos que o computador inicie primeiro. No nosso exemplo vamos utilizar o CD-ROM.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Para mover a opção para cima ou para abaixo, apertamos os botões de &lt;b&gt;+&lt;/b&gt; ou&lt;b&gt; -&lt;/b&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-6nWpLbmGuYM/XNm6TipP8WI/AAAAAAAAEvI/hmp4jsc89-4Oge8TaXJYIeaKoIqGSuQywCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-6nWpLbmGuYM/XNm6TipP8WI/AAAAAAAAEvI/hmp4jsc89-4Oge8TaXJYIeaKoIqGSuQywCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Depois de selecionado o dispositivo de boot, pressionamos a tecla &lt;b&gt;F10&lt;/b&gt;, para salvar e sair.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-glNjAD7pfS4/XNm7UBgZKiI/AAAAAAAAEvU/0orWHk5NgTk7VmHdZQNdPCLWY-NQmt60gCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-glNjAD7pfS4/XNm7UBgZKiI/AAAAAAAAEvU/0orWHk5NgTk7VmHdZQNdPCLWY-NQmt60gCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Agora, o computador vai reiniciar e vai exibir uma tela com a seguinte mensagem: pressione qualquer tecla para iniciar o boot pelo CD ou DVD. Aperte qualquer tecla para iniciar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-zX8-rcicN_A/XNm8ze9l9sI/AAAAAAAAEvo/Xn0mTPNC53ktu5QE0veAa_WSXaNCXyYTgCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;356&quot; src=&quot;https://2.bp.blogspot.com/-zX8-rcicN_A/XNm8ze9l9sI/AAAAAAAAEvo/Xn0mTPNC53ktu5QE0veAa_WSXaNCXyYTgCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo5.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Vai aparecer a tela de instalação, selecione o idioma português.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-DQn1ct933vo/XNm-XFlbupI/AAAAAAAAEv0/0_wT-6CsY9keTeIWyG9ozvZm3lKLJ1WsgCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo6.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://2.bp.blogspot.com/-DQn1ct933vo/XNm-XFlbupI/AAAAAAAAEv0/0_wT-6CsY9keTeIWyG9ozvZm3lKLJ1WsgCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo6.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Em seguida selecione o tipo de teclado, padrão ABNT 2, que é para teclados com &lt;b&gt;Ç&lt;/b&gt;, e clique em avançar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-I1qCy6fI6p8/XNm_mbmXCsI/AAAAAAAAEwI/vbRCZmSS_9AgUxCn3HoptCvcqevwsmEAgCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo7.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://2.bp.blogspot.com/-I1qCy6fI6p8/XNm_mbmXCsI/AAAAAAAAEwI/vbRCZmSS_9AgUxCn3HoptCvcqevwsmEAgCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo7.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Agora clique em instalar agora.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-1XsWGaUAsGc/XNm_-S1gOUI/AAAAAAAAEwQ/i1AQx2_usUIW2UWEvMAPp_5VdcUPmWB_ACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo8.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-1XsWGaUAsGc/XNm_-S1gOUI/AAAAAAAAEwQ/i1AQx2_usUIW2UWEvMAPp_5VdcUPmWB_ACLcBGAs/s640/Sem%2Bt%25C3%25ADtulo8.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Nesta tela temos uma lista das versões do Windows que queremos instalar e se ele é 32 ou 64 bits, selecione a que você quer instalar e clique em avançar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-ehIoZp7ar_8/XNnC6cu0faI/AAAAAAAAEws/xT0RRa8SAd4Y9bOvh7zDVcGsqz46xB53QCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo9.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://2.bp.blogspot.com/-ehIoZp7ar_8/XNnC6cu0faI/AAAAAAAAEws/xT0RRa8SAd4Y9bOvh7zDVcGsqz46xB53QCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo9.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Na tela seguinte, marque a caixa do lado esquerdo para aceitar os termos de licença, em seguida clique em avançar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-ANMKWNXM8jk/XNnDJbidc-I/AAAAAAAAEw4/L3XqRjBnvo8hVARmCbs3ZEHQ9bkM1RhQACEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo10.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://2.bp.blogspot.com/-ANMKWNXM8jk/XNnDJbidc-I/AAAAAAAAEw4/L3XqRjBnvo8hVARmCbs3ZEHQ9bkM1RhQACEwYBhgL/s640/Sem%2Bt%25C3%25ADtulo10.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Sobre o tipo de instalação, escolha a opção Personalizada (avançada).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-AuFFZD7Z9sM/XNnFY_o4m3I/AAAAAAAAExI/hV4-d3WCPfs2fR2ukHeBmun8ddxAIHpbwCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo11.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-AuFFZD7Z9sM/XNnFY_o4m3I/AAAAAAAAExI/hV4-d3WCPfs2fR2ukHeBmun8ddxAIHpbwCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo11.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Nesta tela é exibida a unidade que vamos fazer a instalação, selecione a unidade e clique em opções de unidade.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-MX7mzmRXxw4/XNnHKqYs0mI/AAAAAAAAExU/nFkjEiUZBmk5DCOz50t9NNi2lYSnh0FiQCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo12.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://3.bp.blogspot.com/-MX7mzmRXxw4/XNnHKqYs0mI/AAAAAAAAExU/nFkjEiUZBmk5DCOz50t9NNi2lYSnh0FiQCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo12.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Abaixo aparece os comandos para criar, excluir e formatar uma partição.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-UgrNC_Xq24M/XNnHsOWQoOI/AAAAAAAAExk/NySN0DD441Qw8_RMq0N7AnraRcYu-DzUACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo13.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://1.bp.blogspot.com/-UgrNC_Xq24M/XNnHsOWQoOI/AAAAAAAAExk/NySN0DD441Qw8_RMq0N7AnraRcYu-DzUACLcBGAs/s640/Sem%2Bt%25C3%25ADtulo13.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Selecione a unidade e clique em novo, aplique o tamanho desejado. Você pode também dividir as partições. Após criar a partição, selecione ela e clique em formatar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Agora selecione a unidade novamente e clique em avançar para instalar o sistema operacional.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-IcXOCRh-NO4/XNnIVt9nuqI/AAAAAAAAExw/SsruEnhclswnizzAGxoMWJScGSTVCdVBgCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo14.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-IcXOCRh-NO4/XNnIVt9nuqI/AAAAAAAAExw/SsruEnhclswnizzAGxoMWJScGSTVCdVBgCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo14.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Aguarde enquanto a instalação está sendo feita.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-AIroOPZ-1s8/XNnIwh_4O6I/AAAAAAAAEx4/kGnXWgLHKB0IxmXgfq8JCOz-tZKJFk8qQCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo15.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-AIroOPZ-1s8/XNnIwh_4O6I/AAAAAAAAEx4/kGnXWgLHKB0IxmXgfq8JCOz-tZKJFk8qQCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo15.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Após a instalação, o Windows vai reiniciar automaticamente.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-rIWUov_sFQQ/XNnJjaqoYGI/AAAAAAAAEyM/zFKqboSRpn0vuL1KfACnJlTnwQk7AUlSQCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo16.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-rIWUov_sFQQ/XNnJjaqoYGI/AAAAAAAAEyM/zFKqboSRpn0vuL1KfACnJlTnwQk7AUlSQCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo16.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Após reiniciar, vai aparecer novamente a mensagem: &lt;b&gt;Press any key to boot from CD or DVD..., &lt;/b&gt;dessa vez não aperte nenhuma tecla e deixe iniciar o Windows.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-QMtwGKzHb0I/XNnKEMkB5MI/AAAAAAAAEyU/0GgFh1tkKYsgvp9KXsI6CCkNfnr5WEgnwCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo17.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://1.bp.blogspot.com/-QMtwGKzHb0I/XNnKEMkB5MI/AAAAAAAAEyU/0GgFh1tkKYsgvp9KXsI6CCkNfnr5WEgnwCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo17.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;O Windows vai a atualizar as configurações de registro.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-mybNKIyFFHE/XNnK9Sa04JI/AAAAAAAAEyg/5jevQDru8h8cVh6mJWst6M7sskkrb9G3ACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo18.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-mybNKIyFFHE/XNnK9Sa04JI/AAAAAAAAEyg/5jevQDru8h8cVh6mJWst6M7sskkrb9G3ACLcBGAs/s640/Sem%2Bt%25C3%25ADtulo18.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Após a atualização de registro é exibido essa janela em que ele está concluindo a instalação.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-kjNJT59gcy8/XNnLWqEHayI/AAAAAAAAEyo/E1K_VwmV55gxPcHX2UrPSHCbC7jDbP-zACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo19.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://1.bp.blogspot.com/-kjNJT59gcy8/XNnLWqEHayI/AAAAAAAAEyo/E1K_VwmV55gxPcHX2UrPSHCbC7jDbP-zACLcBGAs/s640/Sem%2Bt%25C3%25ADtulo19.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Após a conclusão o computador vai reiniciar novamente.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-CqlF5tRRicY/XNnMBTq0QaI/AAAAAAAAEy8/xKsqDLIo6mcMZFttxTQdvJASgcTa4aEvgCEwYBhgL/s1600/Sem%2Bt%25C3%25ADtulo20.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://1.bp.blogspot.com/-CqlF5tRRicY/XNnMBTq0QaI/AAAAAAAAEy8/xKsqDLIo6mcMZFttxTQdvJASgcTa4aEvgCEwYBhgL/s640/Sem%2Bt%25C3%25ADtulo20.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Novamente na inicialização ignoramos a mensagem e não apertamos tecla nenhuma. E agora o Windows vai terminar de configurar o sistema.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-eMr1G6RWJ7k/XNnMnvbFLoI/AAAAAAAAEzE/T0L2RA8H7pMQkkHDOLo_J6coeRpZ2JI9wCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo21.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://3.bp.blogspot.com/-eMr1G6RWJ7k/XNnMnvbFLoI/AAAAAAAAEzE/T0L2RA8H7pMQkkHDOLo_J6coeRpZ2JI9wCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo21.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Na tela seguinte defina o nome do usuário e do computador, depois clique em avançar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-q_19ABuxnOY/XNnNyibBJzI/AAAAAAAAEzY/z2_PIp8WuLExn7YQABv44DS1tW1t-TB4gCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo22.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://3.bp.blogspot.com/-q_19ABuxnOY/XNnNyibBJzI/AAAAAAAAEzY/z2_PIp8WuLExn7YQABv44DS1tW1t-TB4gCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo22.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Aqui definimos uma senha de acesso ao computador, caso não queria colocar uma senha, é só deixar em branco e clicar em avançar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-DtsJhwB0q2k/XNnPVNJokBI/AAAAAAAAEzk/qawYgDGMX3Mfkmn1c_x5lmdfO5jOLs-BACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo23.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://1.bp.blogspot.com/-DtsJhwB0q2k/XNnPVNJokBI/AAAAAAAAEzk/qawYgDGMX3Mfkmn1c_x5lmdfO5jOLs-BACLcBGAs/s640/Sem%2Bt%25C3%25ADtulo23.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Na próxima tela o Windows vai pedir a chave de segurança, você pode digitar a chave que veio com seu dispositivo ou ativar mais tarde quando tudo já estiver pronto.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-Bt9RYDjGvRg/XNnRfdA1D-I/AAAAAAAAE0A/KBxWPIZ-JgIs0XqHLBJj0OgyHb094EnqQCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo24.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://2.bp.blogspot.com/-Bt9RYDjGvRg/XNnRfdA1D-I/AAAAAAAAE0A/KBxWPIZ-JgIs0XqHLBJj0OgyHb094EnqQCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo24.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Na tela seguinte, selecione a opção: usar configurações recomendadas.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-nq79onMNrAU/XNnTiM6spCI/AAAAAAAAE0M/xWRGlNx17sERXI3TifRRL8a1Zqe09mOiQCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo25.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://2.bp.blogspot.com/-nq79onMNrAU/XNnTiM6spCI/AAAAAAAAE0M/xWRGlNx17sERXI3TifRRL8a1Zqe09mOiQCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo25.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Agora configure a hora do sistema e clique em avançar.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-HqMej-YArhI/XNnT9eTb4GI/AAAAAAAAE0c/pcZy6LbA_cA34uPjSeLyjbCusuk9YbnsACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo26.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-HqMej-YArhI/XNnT9eTb4GI/AAAAAAAAE0c/pcZy6LbA_cA34uPjSeLyjbCusuk9YbnsACLcBGAs/s640/Sem%2Bt%25C3%25ADtulo26.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Nesta tela, escolha o tipo de rede utilizada, se ela é doméstica, de trabalho ou pública.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-C66jsRt8Rhc/XNnUOwmoVrI/AAAAAAAAE0k/Waz6zB7P_k8JK5I_LQPcWJKsVhLALP65wCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo27.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/-C66jsRt8Rhc/XNnUOwmoVrI/AAAAAAAAE0k/Waz6zB7P_k8JK5I_LQPcWJKsVhLALP65wCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo27.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;O Windows agora vai preparar a área de trabalho para exibição.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/--Jl91o6bVn0/XNnUjpZ1_iI/AAAAAAAAE0s/IDVarjC2A78QC00R77Qr2whY9UkJX4ttwCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo28.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://4.bp.blogspot.com/--Jl91o6bVn0/XNnUjpZ1_iI/AAAAAAAAE0s/IDVarjC2A78QC00R77Qr2whY9UkJX4ttwCLcBGAs/s640/Sem%2Bt%25C3%25ADtulo28.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Pronto o Windows finaliza a instalação exibindo a área de trabalho.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-pALu1a0FMVU/XNnU3CKYn9I/AAAAAAAAE00/joOijb2_gBEP9dCAhlbJVo7naDIMyFjnACLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo29.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;358&quot; src=&quot;https://2.bp.blogspot.com/-pALu1a0FMVU/XNnU3CKYn9I/AAAAAAAAE00/joOijb2_gBEP9dCAhlbJVo7naDIMyFjnACLcBGAs/s640/Sem%2Bt%25C3%25ADtulo29.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Pode haver algumas variações durante a instalação, mesmo que não der certo da primeira vez, continue tentando. Isso vai ajudar a aprimorar cada vez mais e com o tempo esse processo se torna mais fácil.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Fonte das imagens: &lt;a href=&quot;https://www.youtube.com/channel/UCzHVdOZqt5JfOAyP8v0yCXQ&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;PH tutoriais&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Curtiu? Compartilhe clicando nos botões abaixo!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/8729772655789587813/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/05/formatacao-de-computadores-com-windows.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/8729772655789587813'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/8729772655789587813'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/05/formatacao-de-computadores-com-windows.html' title='Formatação de Computadores e Notebooks Com Windows 7 Passo a Passo'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-SHRRuMNvFs4/XNnZYoEXzZI/AAAAAAAAE1I/wWX60ndI8j0TnFD9UkI1BlclhlQLpjUWACLcBGAs/s72-c/images.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-5404609901849448440</id><published>2019-04-27T06:54:00.001-07:00</published><updated>2021-04-17T07:39:00.460-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Big Data"/><category scheme="http://www.blogger.com/atom/ns#" term="Cursos"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Science"/><category scheme="http://www.blogger.com/atom/ns#" term="IA"/><category scheme="http://www.blogger.com/atom/ns#" term="Power BI"/><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><title type='text'>Cursos Gratuitos Data Science Academy</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-edfLLod-w-o/XMRdoVKtCJI/AAAAAAAAEuY/VMhDYg049XwWSwOydPz8dz95KZ5i_NCpgCLcBGAs/s1600/377e0f0ddde71b62d691794d8ac55255.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;379&quot; data-original-width=&quot;411&quot; height=&quot;183&quot; src=&quot;https://1.bp.blogspot.com/-edfLLod-w-o/XMRdoVKtCJI/AAAAAAAAEuY/VMhDYg049XwWSwOydPz8dz95KZ5i_NCpgCLcBGAs/s200/377e0f0ddde71b62d691794d8ac55255.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;A Data Science Academy é uma plataforma em português voltada para o ensino online de Ciência de Dados, Big Data, Inteligência Artificial e Blockchain.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A instituição oferece 5 cursos, totalmente em português, para quem quer iniciar os estudos sobre ciência de dados e inteligencia artificial, todos gratuitos e com certificado. Confira!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-RT1VWRgtkRo/XMRaq68lnqI/AAAAAAAAEto/JGKZnwDDS30GOhS5DUGE9StwTWk7dzprgCLcBGAs/s1600/bigdata.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;441&quot; data-original-width=&quot;700&quot; height=&quot;125&quot; src=&quot;https://4.bp.blogspot.com/-RT1VWRgtkRo/XMRaq68lnqI/AAAAAAAAEto/JGKZnwDDS30GOhS5DUGE9StwTWk7dzprgCLcBGAs/s200/bigdata.jpeg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;b&gt;&lt;a href=&quot;https://www.datascienceacademy.com.br/course?courseid=big-data-fundamentos&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Big Data Fundamentos 2.0&lt;/a&gt;&lt;/b&gt; - Traz os principais fundamentos do Big Data, faz uma análise de algumas ferramentas utilizadas para o tratamento dos dados e como iniciar um projeto de Big Data. Carga horária: 8 horas.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-hPfPTTPXRUY/XMRcalXfJ3I/AAAAAAAAEuE/I0mubFdrg_YqhmPpor96ZNbnKFA6dYAaACLcBGAs/s1600/0c6d0a87bc521847731bbe0f8e8f4140.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;764&quot; height=&quot;130&quot; src=&quot;https://3.bp.blogspot.com/-hPfPTTPXRUY/XMRcalXfJ3I/AAAAAAAAEuE/I0mubFdrg_YqhmPpor96ZNbnKFA6dYAaACLcBGAs/s200/0c6d0a87bc521847731bbe0f8e8f4140.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;b&gt;&lt;a href=&quot;https://www.datascienceacademy.com.br/course?courseid=inteligencia-artificial-fundamentos&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Inteligência Artificial Fundamentos&lt;/a&gt;&lt;/b&gt; - Nesse curso você vai entender o que é inteligência artificial, quais tecnologias utilizadas e o futuro dessa tecnologia. Carga horária: 8 horas.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-ZYnFIJWUOrw/XMRbPb5JoVI/AAAAAAAAEtw/sqW8R3OeTgk4OX-nPmZiSCvoZ655aqS-wCLcBGAs/s1600/1e372f7ed4493aa65d3dfa8ccd7826e4.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1067&quot; data-original-width=&quot;1600&quot; height=&quot;133&quot; src=&quot;https://2.bp.blogspot.com/-ZYnFIJWUOrw/XMRbPb5JoVI/AAAAAAAAEtw/sqW8R3OeTgk4OX-nPmZiSCvoZ655aqS-wCLcBGAs/s200/1e372f7ed4493aa65d3dfa8ccd7826e4.jpeg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://www.datascienceacademy.com.br/course?courseid=introduo--cincia-de-dados&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Introdução à Ciência de Dados 2.0&lt;/a&gt;&lt;/b&gt; - Introdução a ciência de dados e como a demanda por cientista de dados é grande no mercado. Você vai aprender a relação entre ciência de dados e Big Data e os principais conceitos relacionados a Data Science. Carga horária: 8 horas.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-B3142e54_AY/XMRbzrd8zuI/AAAAAAAAEt8/4ebnoSVYxl86IemozTV9irCt_S1Vg7lQgCLcBGAs/s1600/pwbi.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;256&quot; data-original-width=&quot;409&quot; height=&quot;125&quot; src=&quot;https://3.bp.blogspot.com/-B3142e54_AY/XMRbzrd8zuI/AAAAAAAAEt8/4ebnoSVYxl86IemozTV9irCt_S1Vg7lQgCLcBGAs/s200/pwbi.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;b&gt;&lt;a href=&quot;https://www.datascienceacademy.com.br/course?courseid=microsoft-power-bi-para-data-science&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Microsoft Power BI para Data Science&lt;/a&gt;&lt;/b&gt; - Nesse curso você vai aprender como aplicar técnicas de Data Science para gerar modelos preditivos e extrair insights para tomada de decisões, integrando&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;o Power BI com o Microsoft R. Carga horária: 54 horas.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-S2ZSS5o8FKo/XMRZ-4UcbFI/AAAAAAAAEtg/hlfUUdLLhhk9637yD_T9ZDuIMgoUDrV2QCLcBGAs/s1600/python.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1306&quot; data-original-width=&quot;1600&quot; height=&quot;162&quot; src=&quot;https://3.bp.blogspot.com/-S2ZSS5o8FKo/XMRZ-4UcbFI/AAAAAAAAEtg/hlfUUdLLhhk9637yD_T9ZDuIMgoUDrV2QCLcBGAs/s200/python.jpeg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;b&gt;&lt;a href=&quot;https://www.datascienceacademy.com.br/course?courseid=python-fundamentos&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Python Fundamentos Para Análise de Dados&lt;/a&gt;&lt;/b&gt; - Apresenta os conceitos básicos da linguagem Python, com exemplos práticos, quizzes, exercícios e projetos e sua aplicação em projetos de Data Science.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;Curtiu? Compartilhe! &lt;br /&gt;&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/5404609901849448440/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/04/cursos-gratuitos-data-science-academy.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/5404609901849448440'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/5404609901849448440'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/04/cursos-gratuitos-data-science-academy.html' title='Cursos Gratuitos Data Science Academy'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-edfLLod-w-o/XMRdoVKtCJI/AAAAAAAAEuY/VMhDYg049XwWSwOydPz8dz95KZ5i_NCpgCLcBGAs/s72-c/377e0f0ddde71b62d691794d8ac55255.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-9136251666899373310</id><published>2019-04-21T07:17:00.002-07:00</published><updated>2021-04-17T07:39:25.767-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rede de Computadores"/><title type='text'>Como Fazer Um Cabo de Rede</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-L4qwaQKXFxU/XLx7QJXGitI/AAAAAAAAEtM/oQowfEumI3UNRtdW4Xse3GnbbipXHzkFQCLcBGAs/s1600/Cabeamen.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;378&quot; data-original-width=&quot;495&quot; height=&quot;244&quot; src=&quot;https://1.bp.blogspot.com/-L4qwaQKXFxU/XLx7QJXGitI/AAAAAAAAEtM/oQowfEumI3UNRtdW4Xse3GnbbipXHzkFQCLcBGAs/s320/Cabeamen.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Neste artigo vamos ver como fazer um cabo de rede, os padrões de cores utilizados, as ferramentas necessárias e sua utilização. Confira!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;T568A &lt;/b&gt;e &lt;b&gt;T568B &lt;/b&gt;são padrões internacionais que determinam a sequencia de cores que devemos utilizar quando vamos confeccionar um cabo de rede. Veja na imagem abaixo:&lt;/div&gt;&lt;br /&gt;&lt;h3&gt;&lt;b&gt;Sequencia de cores&amp;nbsp;&lt;/b&gt;&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-zo1zYusvGY8/XLoRsJxgV-I/AAAAAAAAEsI/DRrehYi6mt0Xl2QEtbje-pfvQCtL-OU6wCLcBGAs/s1600/672587.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;237&quot; data-original-width=&quot;625&quot; src=&quot;https://2.bp.blogspot.com/-zo1zYusvGY8/XLoRsJxgV-I/AAAAAAAAEsI/DRrehYi6mt0Xl2QEtbje-pfvQCtL-OU6wCLcBGAs/s1600/672587.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3&gt;&lt;b&gt;Utilização&lt;/b&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No cabo paralelo ambas as extremidades utilizam o padrão &lt;b&gt;T568A &lt;/b&gt;ou ambas &lt;b&gt;T568B&lt;/b&gt;, e são utilizados para conectar, por exmeplo, computadores a hubs e switches.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O cabo cruzado (ou cross-over) utiliza o padrão &lt;b&gt;T568A &lt;/b&gt;em uma extremidade e o padrão &lt;b&gt;T568B &lt;/b&gt;em outra, é utilizado quando queremos conectar &lt;b&gt;Switch&lt;/b&gt;-&lt;b&gt;Hub&lt;/b&gt;, &lt;b&gt;PC&lt;/b&gt;-&lt;b&gt;Roteador&lt;/b&gt; ou dois dispositivos iguais, como no exemplo abaixo em que é feita a conexão entre dois computadores.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Nos dispositivos mais novos, os aparelhos utilizam a tecnologia &lt;b&gt;Auto MDI/MDIX&lt;/b&gt;, em que o aparelho detecta qual tipo de cabo está conectado e configura automaticamente sua interface.&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-gc75j0JK0CI/XLxuCf6TPLI/AAAAAAAAEs4/ZpBrxU7RBM8d6zG5O2EfJD_ZXEdBVBfQQCLcBGAs/s1600/cabo-paralelo-cruzado.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;293&quot; data-original-width=&quot;629&quot; src=&quot;https://4.bp.blogspot.com/-gc75j0JK0CI/XLxuCf6TPLI/AAAAAAAAEs4/ZpBrxU7RBM8d6zG5O2EfJD_ZXEdBVBfQQCLcBGAs/s1600/cabo-paralelo-cruzado.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h3&gt;Ferramentas&lt;/h3&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Para confeccionar o cabo de rede podemos usar o cabo UTP Cat5e, e um desencapador para fazer sua ponta. Inserimos o cabo no conector RJ-45 e usamos o alicate grimpador para prender o cabo ao conector. Por fim utilizamos o testador para verificar se o cabo foi feito de forma correta.&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-nKESOj2YMBo/XLoVjVn2VtI/AAAAAAAAEsc/94AHjRwV-Uo4pO7lVvgfztMz5VA_q1UIgCLcBGAs/s1600/ferramentas.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;531&quot; data-original-width=&quot;691&quot; height=&quot;306&quot; src=&quot;https://4.bp.blogspot.com/-nKESOj2YMBo/XLoVjVn2VtI/AAAAAAAAEsc/94AHjRwV-Uo4pO7lVvgfztMz5VA_q1UIgCLcBGAs/s400/ferramentas.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Veja no vídeo abaixo como fazer a confecção do cabo de rede usando o padrão T568A.&lt;br /&gt;&lt;br /&gt;&lt;div align=&quot;center&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay;  encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;415&quot; src=&quot;https://www.youtube.com/embed/ko7hT2_4Ugc&quot; width=&quot;660&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Curtiu? Compartilhe!&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/9136251666899373310/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/04/como-fazer-um-cabo-de-rede.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/9136251666899373310'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/9136251666899373310'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/04/como-fazer-um-cabo-de-rede.html' title='Como Fazer Um Cabo de Rede'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-L4qwaQKXFxU/XLx7QJXGitI/AAAAAAAAEtM/oQowfEumI3UNRtdW4Xse3GnbbipXHzkFQCLcBGAs/s72-c/Cabeamen.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-5396904681300538746</id><published>2019-04-07T09:44:00.003-07:00</published><updated>2021-04-17T07:39:47.288-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Sistemas Operacionais"/><title type='text'>Guia de Comandos Linux</title><content type='html'>&lt;a href=&quot;https://4.bp.blogspot.com/-kr2W9W4CQ_M/XKopWZQp1lI/AAAAAAAAErQ/hjSDDrGNMhgZ7T6EgqutibvJnJnLs_qrgCLcBGAs/s1600/2000px-Tux.svg.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;532&quot; data-original-width=&quot;451&quot; height=&quot;200&quot; src=&quot;https://4.bp.blogspot.com/-kr2W9W4CQ_M/XKopWZQp1lI/AAAAAAAAErQ/hjSDDrGNMhgZ7T6EgqutibvJnJnLs_qrgCLcBGAs/s200/2000px-Tux.svg.png&quot; width=&quot;169&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;A&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/adduser.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;adduser&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- cria um novo usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/alias.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;alias&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- permite nomear um conjunto de comandos, a ser executado pelo sistema, por um único nome.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/apropos.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;apropos&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- informa quais os comandos do Linux possuem, em sua definição, uma determinada expressão.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ar.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ar&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- inclui/atualiza/extrai/deleta arquivos de/em um repositório de arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/at.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;at&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- agenda tarefas a serem executadas pelo sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/atq.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;atq&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- lista as tarefas agendadas com o comando&amp;nbsp;&lt;b&gt;at&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/atrm.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;atrm&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- remove tarefas agendadas.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/awk.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;awk&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- linguagem de processamento e procura de padrões.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_b&quot;&gt;&lt;/a&gt;B&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/bg.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;bg&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- faz um programa, que está executando em primeiro plano, passar a executar em segundo plano.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_c&quot;&gt;&lt;/a&gt;C&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/cal.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;cal&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe um calendário simplificado.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/cat.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;cat&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- concatena e/ou exibe um ou mais arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/cd.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;cd&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- altera o diretório atual de trabalho do usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/chfn.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;chfn&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- altera as informações apresentadas pelo utilitário&amp;nbsp;&lt;b&gt;finger&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/chgrp.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;chgrp&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- altera o grupo de arquivos/diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/chmod.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;chmod&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- altera as permissões de acesso de arquivos/diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/chown.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;chown&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- altera o dono e o grupo de arquivos/diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/chsh.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;chsh&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- altera o&amp;nbsp;&lt;b&gt;shell&lt;/b&gt;&amp;nbsp;padrão do usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/clear.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;clear&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- limpa a tela do terminal.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/comandos.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;comandos do linux&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- explica o formato dos comandos do Linux.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/compress.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;compress&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- compacta/descompacta arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/consoles.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;consoles virtuais&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- interface do Linux com os usuários.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/cotas.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;cotas de disco&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- define a quantidade de espaço em disco que cada usuário pode usar.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/cp.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;cp&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- copia arquivos e diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/crontab.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;crontab&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- agenda tarefas para serem executadas periodicamente.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/curingas.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;curingas&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- *, ? e [ ]&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/cut.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;cut&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- seleciona colunas de um arquivo txt ou da entrada padrão.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/cvs.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;cvs&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo para gerenciamento de código-fonte.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_d&quot;&gt;&lt;/a&gt;D&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/date.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;date&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe ou modifica a data e a hora do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/dd.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;dd&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- converte e copia um arquivo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/depmod.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;depmod&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- produz arquivo contendo as dependências de módulo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/df.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;df&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- mostra o espaço livre das partições.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/diff.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;diff&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- compara dois arquivos, em formato texto, linha a linha.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/display.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;DISPLAY&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- variável de ambiente que define onde a saída de uma aplicação gráfica deve aparecer.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/dmesg.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;dmesg&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- mostra as mensagens da última inicialização do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/du.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;du&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- informações sobre o uso do disco.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/dvips.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;dvips&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- converte arquivo&amp;nbsp;&lt;b&gt;.dvi&lt;/b&gt;&amp;nbsp;em&amp;nbsp;&lt;b&gt;.ps&lt;/b&gt;&amp;nbsp;(PostScript).&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_e&quot;&gt;&lt;/a&gt;E&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/echo.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;echo&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- mostra o conteúdo dos diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/edquota.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;edquota&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- editor do sistema de cotas.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/emacs.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;emacs&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- editor de textos distribuído pela&amp;nbsp;&lt;i&gt;Free Software Foundation&lt;/i&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/env.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;env&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- executa um programa/comando em um ambiente modificado.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/exit.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;exit&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- encerra execução do&amp;nbsp;&lt;b&gt;shell&lt;/b&gt;&amp;nbsp;atualmente em uso pelo usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/export.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;export&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- comando do&amp;nbsp;&lt;b&gt;shell&lt;/b&gt;&amp;nbsp;que permite configurar e compartilhar variáveis de ambiente entre diversos programas e bibliotecas acessados a partir do mesmo terminal.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_f&quot;&gt;&lt;/a&gt;F&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/fdformat.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;fdformat&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- formatação de baixo nível em disquete.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/fdisk.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;fdisk&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo utilizado para particionar discos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/fg.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;fg&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- faz um programa, que está sendo executado em segundo plano (&lt;b&gt;background&lt;/b&gt;), passar a ser executado em primeiro plano.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/file.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;file&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- determina o tipo do arquivo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/find.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;find&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- pesquisa arquivos em uma hierarquia de diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/finger.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;finger&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe informações sobre um usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/fortune.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;fortune&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo que exibe uma citação aleatória.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/free.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;free&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe a quantidade de memória livre/usada no sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/fsck.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;fsck&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- verifica e repara um sistema de arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/fuser.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;fuser&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- identifica os processos que estão usando um determinado arquivo e/ou diretório.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_g&quot;&gt;&lt;/a&gt;G&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/gcc.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;gcc&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- compilador de C para Linux.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/gdb.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;gdb&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo para depuração de programas C, C++ e Modula-2.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/getty.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;getty&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- configura o modo de funcionamento, velocidade e comportamento da linha.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ghostview.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ghostview&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo para visualização de arquivos&amp;nbsp;&lt;b&gt;.ps&lt;/b&gt;&amp;nbsp;(PostScript) e&amp;nbsp;&lt;b&gt;PDF&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/gid.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;GID&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- número de identificação de grupo para o&amp;nbsp;&lt;b&gt;kernel&lt;/b&gt;&amp;nbsp;do Linux.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/grep.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;grep&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- procura padrões em um arquivo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/groupadd.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;groupadd&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- cria um novo grupo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/groupdel.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;groupdel&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- deleta um grupo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/groupmod.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;groupmod&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- modifica um grupo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/groups.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;groups&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- lista os grupos aos quais um usuário pertence.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/grpconv.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;grpconv&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- usa o sistema&amp;nbsp;&lt;b&gt;gshadow&lt;/b&gt;&amp;nbsp;para proteger as senhas dos grupos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/grpunconv.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;grpunconv&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- elimina o uso do sistema&amp;nbsp;&lt;b&gt;gshadow&lt;/b&gt;&amp;nbsp;de proteção de senhas.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/gunzip.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;gunzip&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- descompacta arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ghostview.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;gv&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- mesmo que&amp;nbsp;&lt;b&gt;ghostview&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/gzip.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;gzip&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- compacta/descompacta arquivos.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_h&quot;&gt;&lt;/a&gt;H&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/head.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;head&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe o início de um arquivo texto.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/help.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;help&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe informações sobre um comando.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/hostname.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;hostname&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- mostra ou muda o nome do computador na rede.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/hwclock.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;hwclock&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe ou modifica a data e a hora do relógio da máquina.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_i&quot;&gt;&lt;/a&gt;I&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/id.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;id&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- identifica os&amp;nbsp;&lt;b&gt;UIDs&lt;/b&gt;&amp;nbsp;e&amp;nbsp;&lt;b&gt;GIDs&lt;/b&gt;&amp;nbsp;efetivos e reais.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ifconfig.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ifconfig&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- configura uma interface de rede.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/init.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;init&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- processo de controle da inicialização do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/inode.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;inode&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- identificador de diretório/arquivo em um sistema de arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/insmod.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;insmod&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- carrega módulos do&amp;nbsp;&lt;b&gt;kernel&lt;/b&gt;&amp;nbsp;na memória do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ipcrm.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ipcrm&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- remove recurso&amp;nbsp;&lt;b&gt;ipc&lt;/b&gt;&amp;nbsp;(inter-process communication).&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ipcs.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ipcs&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- fornece informações sobre recursos&amp;nbsp;&lt;b&gt;ipc&lt;/b&gt;&amp;nbsp;(inter-process communication).&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ispell.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ispell&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- ferramenta para correção ortográfica.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_j&quot;&gt;&lt;/a&gt;J&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/jobs.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;jobs&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- mostra os processos executando em segundo plano (&lt;b&gt;background&lt;/b&gt;).&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_k&quot;&gt;&lt;/a&gt;K&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/kernel.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;kernel&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- núcleo do Linux.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/kill.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;kill&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- envia um determinado sinal a um processo em execução no sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/killall.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;killall&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- envia um determinado sinal a um conjunto de processos que usam o mesmo nome.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/kudzu.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;kudzu&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- ferramenta que detecta e configura dispositivos de hardware.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_l&quot;&gt;&lt;/a&gt;L&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/last.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;last&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe todas as informações referentes a entrada (login) e saída (logout) de usuários do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/lastlog.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;lastlog&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe informações referentes ao último login de cada usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/latex.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;latex&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- gera arquivo&amp;nbsp;&lt;b&gt;.dvi&lt;/b&gt;&amp;nbsp;a partir da definição de macros&amp;nbsp;&lt;b&gt;TEX&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ldconfig.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ldconfig&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- atualiza os links para as bibliotecas compartilhadas.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/less.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;less&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- permite fazer a paginação de arquivos ou da entrada padrão.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/lesskey.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;lesskey&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- personaliza as teclas usadas no paginador&amp;nbsp;&lt;b&gt;less&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/lilo.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;lilo&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- carregador de inicialização do&amp;nbsp;&lt;b&gt;Linux&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/linux_logo.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;linux_logo&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo que exibe os logotipos do&amp;nbsp;&lt;b&gt;Linux&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/linuxconf.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;linuxconf&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- ferramenta de administração do&amp;nbsp;&lt;b&gt;Linux&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ln.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ln&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- cria ligações entre arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/locate.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;locate&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- lista os arquivos cujos nomes coincidem com o padrão informado.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/login.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;login&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- processo responsável por permitir ou não o acesso de usuários ao sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/lpc.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;lpc&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo para controle de impressão de arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/lpq.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;lpq&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- examina o conteúdo da fila de impressão.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/lpr.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;lpr&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- imprime arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/lprm.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;lprm&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- remove arquivos da fila de impressão.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ls.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ls&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- lista o conteúdo de um diretório.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/lsmod.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;lsmod&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- lista os módulos do&amp;nbsp;&lt;b&gt;kernel&lt;/b&gt;&amp;nbsp;que estão carregados na memória.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_m&quot;&gt;&lt;/a&gt;M&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/make.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;make&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- utilitário para verificação e compilação de grupo de arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/makedev.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;MAKEDEV&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- script usado para criar/alterar/deletar dispositos em&amp;nbsp;&lt;b&gt;/dev&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/makewhatis.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;makewhatis&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- cria a base de dados makewhatis.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/man.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;man&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- formata e apresenta páginas do manual on-line.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mc.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mc&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo para manipulação de arquivos e diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mesg.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mesg&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- habilita/desabilita o recebimento de mensagens de outros usuários.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mingetty.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mingetty&lt;/a&gt;&lt;/b&gt;&amp;nbsp;-&amp;nbsp;&lt;b&gt;getty&lt;/b&gt;&amp;nbsp;mínimo para consoles virtuais.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mkbootdisk.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mkbootdisk&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- cria um disco de inicialização (emergência) do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mkdir.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mkdir&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- cria diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mke2fs.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mke2fs&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- formata uma partição de disco usando o sistema de arquivos&amp;nbsp;&lt;b&gt;ext2&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mkfs.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mkfs&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- constrói um sistema de arquivos Linux.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mkswap.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mkswap&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- configura uma área de troca (&lt;b&gt;swap&lt;/b&gt;) do&amp;nbsp;&lt;b&gt;Linux&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/modprobe.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;modprobe&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- carrega módulos e verifica as dependências dos módulos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/modulos.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;módulos&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- peças de código de objeto que podem ser carregados em um&amp;nbsp;&lt;b&gt;kernel&lt;/b&gt;&amp;nbsp;em operação.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/more.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;more&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- permite fazer a paginação de arquivos ou da entrada padrão.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mount.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mount&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- monta sistemas de arquivos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mouseconfig.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mouseconfig&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo para configurar o mouse.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mpage.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mpage&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- permite imprimir várias páginas em uma única folha de papel.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mt.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mt&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- controla unidades de fita.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mtools.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mtools&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- utilitários para acessar discos DOS no UNIX.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/mv.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;mv&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- move (ou altera o nome de) arquivos.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_n&quot;&gt;&lt;/a&gt;N&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/newgrp.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;newgrp&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- muda, temporariamente, o grupo (&lt;b&gt;GID&lt;/b&gt;) do usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/nice.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;nice&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- configura a prioridade de execução de um comando ou de um programa.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/nl.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;nl&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe o conteúdo de um arquivo enumerando as linhas.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/nohup.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;nohup&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- executa um comando imune a interrupções de conexão.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_o&quot;&gt;&lt;/a&gt;O&lt;/h2&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_p&quot;&gt;&lt;/a&gt;P&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/passwd.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;passwd&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- altera a senha de um usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/permissao.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;permissão de acesso&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- autorização para ler/gravar/executar um arquivo/diretório do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/pico.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;pico&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- editor de texto baseado no sistema de mensagens&amp;nbsp;&lt;b&gt;pine&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/pid.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;PID&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- número de identificação (&lt;b&gt;ID&lt;/b&gt;) de um processo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/pr.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;pr&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- formata arquivos de texto para impressão.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/printenv.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;printenv&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- mostra as variáveis de ambiente utilizadas pelo sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/processo.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;processo&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- programa em execução.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/ps.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;ps&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe informações sobre os processos que estão executando na máquina.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/pwconv.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;pwconv&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- usa o sistema&amp;nbsp;&lt;b&gt;shadow&lt;/b&gt;&amp;nbsp;para proteger as senhas dos usuários.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/pwd.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;pwd&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe o nome do diretório atual.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/pwunconv.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;pwunconv&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- elimina o uso do sistema&amp;nbsp;&lt;b&gt;shadow&lt;/b&gt;&amp;nbsp;de proteção de senhas.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_q&quot;&gt;&lt;/a&gt;Q&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/quota.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;quota&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- fornece informações sobre o sistema de cotas.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/quotaoff.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;quotaoff&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- desabilita o sistema de cotas.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/quotaon.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;quotaon&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- habilita o sistema de cotas.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_r&quot;&gt;&lt;/a&gt;R&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/rcs.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;RCS&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- aplicativo para gerenciamento de código-fonte.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/reboot.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;reboot&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- reinicializa o computador.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/redirecionadores.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;redirecionadores de E/S&lt;/a&gt;&amp;nbsp;&lt;/b&gt;-&amp;nbsp;&lt;b&gt;&amp;gt;&lt;/b&gt;,&amp;nbsp;&lt;b&gt;&amp;gt;&amp;gt;&lt;/b&gt;,&amp;nbsp;&lt;b&gt;&amp;lt;&lt;/b&gt;&amp;nbsp;e&amp;nbsp;&lt;b&gt;|&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/renice.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;renice&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- altera a prioridade de um processo que está executando.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/rev.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;rev&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- inverte as linhas de um arquivo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/rlogin.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;rlogin&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- inicia uma sessão de terminal remoto.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/rm.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;rm&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- remove arquivos/diretórios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/rmdir.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;rmdir&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- remove diretórios vazios.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/rmmod.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;rmmod&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- descarrega módulos do&amp;nbsp;&lt;b&gt;kernel&lt;/b&gt;&amp;nbsp;da memória do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/root.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;root&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- administrador do sistema ou superusuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/rpm.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;rpm&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- gerenciador de pacotes da distribuição&amp;nbsp;&lt;b&gt;Red Hat&lt;/b&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_s&quot;&gt;&lt;/a&gt;S&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/separador.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;separador de comandos&lt;/a&gt;&lt;/b&gt;&amp;nbsp;-&amp;nbsp;&lt;b&gt;;&lt;/b&gt;&amp;nbsp;e&amp;nbsp;&lt;b&gt;;\&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/set.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;set&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe a lista das variáveis de ambiente.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/setserial.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;setserial&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- exibe ou modifica as definições sobre porta serial.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/setterm.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;setterm&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- configura os atributos do terminal no modo texto.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/shell.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;shell&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- interpretador de comandos do&amp;nbsp;&lt;b&gt;Linux&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/shutdown.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;shutdown&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- encerra/reinicializa o sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/sistemas_de_arquivos.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;sistemas de arquivos&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- como os arquivos e os diretórios são organizados no&amp;nbsp;&lt;b&gt;Linux&lt;/b&gt;.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/sort.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;sort&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- ordena as linhas de arquivos textos.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/source.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;source&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- atualiza arquivos do sistema.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/split.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;split&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- divide um arquivo em arquivos menores.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/strfile.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;strfile&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- cria um arquivo de acesso aleatório para armazenamento de strings.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/strings.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;strings&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- extrai strings de arquivos binários.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/stty.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;stty&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- modifica e/ou mostra as configurações de linhas de terminal.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/su.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;su&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- executa um&amp;nbsp;&lt;b&gt;shell&lt;/b&gt;&amp;nbsp;com substituição de usuário e grupo.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/sudo.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;sudo&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- executa um comando usando os privilégios de um outro usuário.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/swap.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;swap&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- partição do disco usada como memória auxiliar (área de troca).&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/swapoff.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;swapoff&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- desabilita dispositivos e arquivos para paginação e troca.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/swapon.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;swapon&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- habilita dispositivos e arquivos para paginação e troca.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/sync.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;sync&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- grava os dados da memória nas unidades de disco.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_t&quot;&gt;&lt;/a&gt;T&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/tac.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;tac&lt;/a&gt;&lt;/b&gt;- concatena e exibe um ou mais arquivos na ordem inversa.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/tail.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;tail&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- exibe as últimas linhas de um arquivo texto.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/talk.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;talk&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- permite conversa em tempo real entre dois usuários.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/tar.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;tar&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- armazena e extrai arquivos de um arquivo&amp;nbsp;&lt;b&gt;tar&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/teclas.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;teclas especiais&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- conjunto de teclas com características especiais no Linux.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/tee.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;tee&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- ler da entrada padrão e grava na saída padrão.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/telinit.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;telinit&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- processo de controle da inicialização do sistema.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/telnet.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;telnet&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- permite acessar uma máquina remotamente.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/tempo_epoca.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;tempo de época&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- data e hora que o Linux considera como o início dos tempos.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;big&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/tex.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;tex&lt;/a&gt;&lt;/b&gt;&lt;/big&gt;- sistema de processamento de textos para formatação de documentos.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/time.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;time&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- mede o tempo necessário para executar um comando/aplicativo.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/top.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;top&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- utilitário que lista, em tempo real, os processos que estão usando a cpu.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/touch.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;touch&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- muda a data e a hora do último acesso/modificação de um arquivo.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/tr.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;tr&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- apaga ou altera caracteres.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/tree.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;tree&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- apresenta, em formato de árvore, o conteúdo de um diretório.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/type.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;type&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- exibe o tipo de um arquivo.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_u&quot;&gt;&lt;/a&gt;U&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/uid.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;UID&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- número de identificação do usuário para o&amp;nbsp;&lt;b&gt;kernel&lt;/b&gt;&amp;nbsp;do Linux.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/umask.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;b&gt;umask&lt;/b&gt;&lt;/a&gt;&amp;nbsp;- define as permissões que não estão disponíveis aos usuários do sistema.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/umount.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;umount&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- desmonta sistemas de arquivos.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/uname.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;uname&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- exibe informações sobre o sistema.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/uniq.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;uniq&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- remove as linhas duplicadas de um arquivo ordenado.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/unset.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;unset&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- apaga uma variável de ambiente.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/updatedb.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;updatedb&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- atualiza banco de dados de nome de arquivos.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/uptime.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;uptime&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- diz há quanto tempo o sistema está funcionando.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/adduser.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;useradd&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- cria&amp;nbsp; um novo usuário.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/userdel.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;b&gt;userdel&lt;/b&gt;&lt;/a&gt;&amp;nbsp;- remove usuário e seus respectivos arquivos do sistema.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/usermod.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;usermod&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- modifica uma conta de usuário do sistema.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/users.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;users&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- mostra os usuários que estão atualmente conectados ao sistema.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_v&quot;&gt;&lt;/a&gt;V&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/variaveis.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;variáveis de ambiente&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- conjunto de variáveis usadas para definir o ambiente de trabalho dos usuários do sistema.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/vigr.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;vigr&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- edita o arquivo&amp;nbsp;&lt;b&gt;/etc/group&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/vim.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;vim&lt;/a&gt;&lt;/b&gt;&amp;nbsp;- editor de textos em formato ASCII.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/vipw.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;vipw&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- edita o arquivo&amp;nbsp;&lt;b&gt;/etc/passwd&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/visudo.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;visudo&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- edita o arquivo&amp;nbsp;&lt;b&gt;/etc/sudoers&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_w&quot;&gt;&lt;/a&gt;W&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/w.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;w&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- informa quais os usuários que estão conectados e o que eles estão executando.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/wc.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;wc&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- conta linhas, palavras e caracteres de arquivos.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/whatis.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;b&gt;whatis&lt;/b&gt;&lt;/a&gt;&amp;nbsp;- mostra um resumo rápido sobre um ou mais comandos.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/whereis.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;whereis&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- lista as localizações de programas binários, fontes e documentações.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/who.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;who&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- informa quais os usuários que estão conectados.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/whoami.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;b&gt;&lt;big&gt;whoami&lt;/big&gt;&lt;/b&gt;&lt;/a&gt;&amp;nbsp;- fornece a identificação efetiva do usuário.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_x&quot;&gt;&lt;/a&gt;X&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/xwindow.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;b&gt;X ou X Window&lt;/b&gt;&lt;/a&gt;&amp;nbsp;- é a interface gráfica (GUI) padrão do Linux.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/xhost.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;b&gt;xhost&lt;/b&gt;&lt;/a&gt;&amp;nbsp;- define quais máquina podem acessar o servidor X.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/xman.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;b&gt;xman&lt;/b&gt;&lt;/a&gt;&amp;nbsp;- aplicativo gráfico de exibição da documentação do&amp;nbsp;&lt;b&gt;Linux&lt;/b&gt;&amp;nbsp;para o sistema&amp;nbsp;&lt;b&gt;X Window&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_y&quot;&gt;&lt;/a&gt;Y&lt;/h2&gt;&lt;h2 style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;letra_z&quot;&gt;&lt;/a&gt;Z&lt;/h2&gt;&lt;ul style=&quot;background-color: white; font-family: arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/zgrep.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;b&gt;&lt;big&gt;zgrep&lt;/big&gt;&lt;/b&gt;&lt;/a&gt;&amp;nbsp;- procura padrões em um arquivo compactado.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://grsecurity.com.br/apostilas/COMANDOS/guia/zip.html&quot; style=&quot;text-decoration-line: none;&quot;&gt;&lt;big&gt;&lt;b&gt;zip&lt;/b&gt;&lt;/big&gt;&lt;/a&gt;&amp;nbsp;- compacta arquivos.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #666666; font-family: &amp;quot;arial&amp;quot;;&quot;&gt;&lt;b&gt;Fonte: grsecurity.com.br&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/5396904681300538746/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/04/guia-de-comandos-linux.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/5396904681300538746'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/5396904681300538746'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/04/guia-de-comandos-linux.html' title='Guia de Comandos Linux'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-kr2W9W4CQ_M/XKopWZQp1lI/AAAAAAAAErQ/hjSDDrGNMhgZ7T6EgqutibvJnJnLs_qrgCLcBGAs/s72-c/2000px-Tux.svg.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-2660823011613148932</id><published>2019-03-31T13:11:00.001-07:00</published><updated>2021-04-17T07:40:07.043-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Banco de Dados"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL"/><title type='text'>Comandos SQL 1 - Como Criar o Banco de Dados</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-umO28AIJ8WY/XCvg-sGO6MI/AAAAAAAAEaU/V9WaAlstozABR3zeq3W4MfF6BVw-AqXMQCPcBGAYYCw/s1600/SQL.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;234&quot; data-original-width=&quot;411&quot; height=&quot;182&quot; src=&quot;https://4.bp.blogspot.com/-umO28AIJ8WY/XCvg-sGO6MI/AAAAAAAAEaU/V9WaAlstozABR3zeq3W4MfF6BVw-AqXMQCPcBGAYYCw/s320/SQL.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Esse é o primeiro de uma série de artigos que vamos abordar como utilizar os comandos &lt;b&gt;SQL &lt;/b&gt;para criar e gerenciar um banco de dados.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Neste artigo vamos ver os comandos básicos para criar, visualizar, selecionar e excluir um banco de dados, confira!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;CREATE&lt;/b&gt; - é utilizado para criar o banco de dados ou tabela, em seguida devemos especificar o que vai ser criado (database) e seu nome (base_de_dados).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-w_rHOWHqHhw/XKERwY-3jjI/AAAAAAAAEqY/oSdd_KGbg2EmqktdBLTB8s7zMxZogbLDwCLcBGAs/s1600/create.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;38&quot; data-original-width=&quot;347&quot; src=&quot;https://4.bp.blogspot.com/-w_rHOWHqHhw/XKERwY-3jjI/AAAAAAAAEqY/oSdd_KGbg2EmqktdBLTB8s7zMxZogbLDwCLcBGAs/s1600/create.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;USE&amp;nbsp;&lt;/b&gt;- para executar alguma ação sobre a banco de dados criado, primeiro devemos selecioná-lo, para isso utilizamos o comando USE, seguido do nome do banco de dados. veja abaixo:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-3LAdPrqSIBo/XKER6r-eNGI/AAAAAAAAEqg/PKXi917X4YcpnGWASInUX9u8teFE7Ee6QCLcBGAs/s1600/use.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;31&quot; data-original-width=&quot;347&quot; src=&quot;https://3.bp.blogspot.com/-3LAdPrqSIBo/XKER6r-eNGI/AAAAAAAAEqg/PKXi917X4YcpnGWASInUX9u8teFE7Ee6QCLcBGAs/s1600/use.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;SHOW &lt;/b&gt;- esse comando também é utilizado para exibir os banco de dados ou tabelas . Utilizando o comando abaixo, por exemplo, em um SGBD, o programa vai exibir todos os bancos de dados criados.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-WOsJS9Ee2oE/XKER2MkdqLI/AAAAAAAAEqc/TpaDxvTmtyU9GeJBkD01Ehi1qUBuFfILACLcBGAs/s1600/show.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;31&quot; data-original-width=&quot;347&quot; src=&quot;https://2.bp.blogspot.com/-WOsJS9Ee2oE/XKER2MkdqLI/AAAAAAAAEqc/TpaDxvTmtyU9GeJBkD01Ehi1qUBuFfILACLcBGAs/s1600/show.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DROP &lt;/b&gt;- depois de criado um banco de dados, podemos apagá-lo utilizando o comando DROP. Sua sintaxe é semelhante ao utilizado para criar o banco de dados, como podemos ver abaixo:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-Bg45oQ40-Wk/XKER-3E7SDI/AAAAAAAAEqk/mpTWCb1fSQo_UKD9krStYE6y1XQXyNtmACLcBGAs/s1600/drop.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;35&quot; data-original-width=&quot;347&quot; src=&quot;https://2.bp.blogspot.com/-Bg45oQ40-Wk/XKER-3E7SDI/AAAAAAAAEqk/mpTWCb1fSQo_UKD9krStYE6y1XQXyNtmACLcBGAs/s1600/drop.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Para testar os comandos acima, você pode baixar o MYSQL Worbench, que é um ambiente de desenvolvimento para sistema de banco de dados MYSQL, &lt;a href=&quot;https://www.mysql.com/downloads/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Download Workbench&lt;/a&gt;.&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Curtiu? Compartilhe!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/2660823011613148932/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/03/comandos-sql-1-como-criar-o-banco-de.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2660823011613148932'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2660823011613148932'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/03/comandos-sql-1-como-criar-o-banco-de.html' title='Comandos SQL 1 - Como Criar o Banco de Dados'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-umO28AIJ8WY/XCvg-sGO6MI/AAAAAAAAEaU/V9WaAlstozABR3zeq3W4MfF6BVw-AqXMQCPcBGAYYCw/s72-c/SQL.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-6670466786863499035</id><published>2019-03-26T18:17:00.004-07:00</published><updated>2021-04-17T07:41:00.255-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rede de Computadores"/><title type='text'>Classes de Endereçamento IP</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9BIM1Lg9GL4/XJrPAvapiTI/AAAAAAAAEqE/4x3oUhtBADokxpdzuZop6aKs4XmwtTiKACLcBGAs/s1600/img.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;399&quot; data-original-width=&quot;552&quot; height=&quot;231&quot; src=&quot;https://1.bp.blogspot.com/-9BIM1Lg9GL4/XJrPAvapiTI/AAAAAAAAEqE/4x3oUhtBADokxpdzuZop6aKs4XmwtTiKACLcBGAs/s320/img.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;O endereço de protocolo de internet (&lt;b&gt;Endereço IP&lt;/b&gt;) é usado para identificar um dispositivo na rede. O endereçamento IP é dividido em cinco classes, A, B, C, D e E, sendo que as três primeiras são utilizadas atualmente e as outras duas reservadas para expansões futuras.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O &lt;b&gt;IP &lt;/b&gt;é dividido em duas partes, a primeira (destacado em branco) identifica a rede em que o computador está conectado e a segunda identifica o dispositivo dentro da rede.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;Endereços válidos&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-aIFG9JKqgVo/XJrIBblBusI/AAAAAAAAEpw/YWWalTK6ihAyw9p8F9bv6OR9myEZoXrHwCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;121&quot; data-original-width=&quot;517&quot; src=&quot;https://1.bp.blogspot.com/-aIFG9JKqgVo/XJrIBblBusI/AAAAAAAAEpw/YWWalTK6ihAyw9p8F9bv6OR9myEZoXrHwCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Na classe A o primeiro octeto identifica a rede, na classe B são usados os dois primeiros octetos e na classe C são utilizados três octetos e somente o último é reservado para identificar os dispositivos na rede.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Curtiu? Deixe seu like na nossa página do Facebook!&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/6670466786863499035/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/03/classes-de-enderecamento-ip.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/6670466786863499035'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/6670466786863499035'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/03/classes-de-enderecamento-ip.html' title='Classes de Endereçamento IP'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-9BIM1Lg9GL4/XJrPAvapiTI/AAAAAAAAEqE/4x3oUhtBADokxpdzuZop6aKs4XmwtTiKACLcBGAs/s72-c/img.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-6642994816649064725</id><published>2019-03-20T18:34:00.001-07:00</published><updated>2021-04-17T07:41:20.276-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rede de Computadores"/><title type='text'>Rede de Computadores - Protocolos</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-KZ_GpuSi52c/XJLmzQSsKyI/AAAAAAAAEpI/09S56FHItYcdVHdg6jviQAeCmUO8BRQ-ACLcBGAs/s1600/39187c3f4c4e487f45afa05cb0bcbaed.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;282&quot; data-original-width=&quot;425&quot; height=&quot;212&quot; src=&quot;https://2.bp.blogspot.com/-KZ_GpuSi52c/XJLmzQSsKyI/AAAAAAAAEpI/09S56FHItYcdVHdg6jviQAeCmUO8BRQ-ACLcBGAs/s320/39187c3f4c4e487f45afa05cb0bcbaed.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Os protocolos possibilitam o controle, comunicação e transmissão de dados entre sistemas computacionais, e possuem informações no cabeçalho como identificação, endereço de IP de origem e destino, tipo de serviço, endereço MAC, porta, entre outros.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Na lista abaixo apresentamos os protocolos mais utilizados e suas funções.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;HTTP &lt;/b&gt;– HyperText Transfer Protocol – é utilizado para transferência de dados na internet na forma de textos simples, hipertextos, áudios, vídeos, entre outras.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;SMTP&lt;/b&gt; – Simple Mail Transfer Protocol – protocolo padrão usado&amp;nbsp; na troca de e-mail na internet.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;FTP&lt;/b&gt; – File Transfer Protocol – o protocolo FTP é utilizado para transferência de arquivos de um dispositivo para o outro.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;SNMP&lt;/b&gt; – Simple NetWork Management Protocol – é usado para monitoramento e gerenciamento de dispositivos em redes IP.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DNS&lt;/b&gt; – Domain Name Server – esse protocolo de aplicação é utilizado para fazer a tradução de endereços IP&#39;s para nomes de domínio, tem a função de identificar endereços IP&#39;s e manter uma lista de endereços na internet.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;TCP&lt;/b&gt; – Transmission Control Protocol – esse é um protocolo sob o qual se assenta a internet e é um complemento do protocolo IP, é composto por vários protocolos, também chamado de pilha de protocolos.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-sYu1o0mZiHY/XJLi-mrM0rI/AAAAAAAAEos/Qs4ZHLm_qdUiNDilwZAuRC0h4CwFjQVoACLcBGAs/s1600/sobre.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;325&quot; data-original-width=&quot;282&quot; src=&quot;https://4.bp.blogspot.com/-sYu1o0mZiHY/XJLi-mrM0rI/AAAAAAAAEos/Qs4ZHLm_qdUiNDilwZAuRC0h4CwFjQVoACLcBGAs/s1600/sobre.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Fonte da imagem: Wikipédia.&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;UDP &lt;/b&gt;– User Datagram Protocol – protocolo simples da camada de transporte, que permite à aplicação enviar informações encapsuladas num pacote IPv4 e IPv6 a um destino, sem qualquer garantia de que o mesmo chegue corretamente, por isso é considerado um protocolo não confiável.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;IP&lt;/b&gt; – Internet Protocol – protocolo responsável por fazer a comunicação entre dispositivos na internet.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Cabeçalho IP&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-jWPnHTHcpOk/XJLmG_dlWlI/AAAAAAAAEpA/cvfXhrJMC84PKWTdfvr2hzf0ywXQ7UiQwCLcBGAs/s1600/7011-cabecalho-ip.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;620&quot; src=&quot;https://4.bp.blogspot.com/-jWPnHTHcpOk/XJLmG_dlWlI/AAAAAAAAEpA/cvfXhrJMC84PKWTdfvr2hzf0ywXQ7UiQwCLcBGAs/s1600/7011-cabecalho-ip.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Fonte da imagem: Techtudo&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;TLS/SSL&lt;/b&gt; - Transport Layer Security - é um protocolo de segurança para proteger a comunicação via internet para serviços como e-mail, páginas de internet, entre outros. Seu funcionamento se dá através do compartilhamento de chaves de segurança, dessa forma fica estabelecida a troca criptografada de dados entre dois computadores.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;ICMP&lt;/b&gt; – Internet Control Message Protocol – responsável por informar ao remetente se ocorreu algum erro durante a entrega da mensagem ao destino.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;ARP&lt;/b&gt; – Adress Resolution Protocol – protocolo que faz a conversão de endereços da camada de internet em endereços da camada de enlace. Permite obter o endereço físico de um computador utilizando o endereço IP da máquina de destino&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;Curtiu? Deixe seu like na nossa página do Facebook!</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/6642994816649064725/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/03/rede-de-computadores-protocolos.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/6642994816649064725'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/6642994816649064725'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/03/rede-de-computadores-protocolos.html' title='Rede de Computadores - Protocolos'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-KZ_GpuSi52c/XJLmzQSsKyI/AAAAAAAAEpI/09S56FHItYcdVHdg6jviQAeCmUO8BRQ-ACLcBGAs/s72-c/39187c3f4c4e487f45afa05cb0bcbaed.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-2024805867931117157</id><published>2019-01-23T05:14:00.001-08:00</published><updated>2021-04-17T07:44:05.789-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rede de Computadores"/><category scheme="http://www.blogger.com/atom/ns#" term="Segurança da Informação"/><title type='text'>Segurança da informação e Ferramentas de Rede</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-yLVguqy15uM/XEhoT-AfIcI/AAAAAAAAEck/Vo1PnxRw2sgnd71QxiYTRvr3_lkdCWlGACLcBGAs/s1600/image_content_987489_20170913094904.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;380&quot; data-original-width=&quot;380&quot; height=&quot;200&quot; src=&quot;https://1.bp.blogspot.com/-yLVguqy15uM/XEhoT-AfIcI/AAAAAAAAEck/Vo1PnxRw2sgnd71QxiYTRvr3_lkdCWlGACLcBGAs/s200/image_content_987489_20170913094904.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Se você é fã de segurança da informação e redes de computadores, neste artigo vamos ver algumas ferramentas que vai nos ajudar a entender como tudo funciona na prática, instalar e testar cada uma dessas ferramentas vai te ajudar entender como funciona a comunicação entre portas, como são utilizados o protocolos de rede, monitoramento, servidores de arquivos, endereçamento IP, vulnerabilidades, entre outras coisas.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Com esse conhecimento em mente, você pode aprofundar seus estudos pesquisando mais sobre programação, protocolos, criptografia, servidores, firewalls, ameaças, redes e segurança da informação no geral. Vejamos:&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;IPScanner&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O IPScanner é utilizado por administradores de rede, ele escaneia os dispositivos de rede e nos dá acesso a pastas compartilhadas e servidores FTP.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-L5qgImejAVI/XEhjd9Xv5dI/AAAAAAAAEbw/Ym894Na6MIs88F_LhU-JfT82z4WBhKO-ACLcBGAs/s1600/07_radmin_control.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;474&quot; data-original-width=&quot;653&quot; height=&quot;290&quot; src=&quot;https://4.bp.blogspot.com/-L5qgImejAVI/XEhjd9Xv5dI/AAAAAAAAEbw/Ym894Na6MIs88F_LhU-JfT82z4WBhKO-ACLcBGAs/s400/07_radmin_control.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Wireshark&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Utilizamos o wireshark para analisar o tráfego em uma rede, assim podemos ver a troca de informações e os protocolos de rede utilizados na comunicação. Podemos utilizar uma ferramenta semelhante, o Microsoft Network Monitor.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-RXiOomBrGzQ/XEhjs61_7sI/AAAAAAAAEb0/gGpPpQL7sl44fVcs62pIOLu2KxK0OulLQCLcBGAs/s1600/wireshark-captur.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;640&quot; data-original-width=&quot;970&quot; height=&quot;420&quot; src=&quot;https://1.bp.blogspot.com/-RXiOomBrGzQ/XEhjs61_7sI/AAAAAAAAEb0/gGpPpQL7sl44fVcs62pIOLu2KxK0OulLQCLcBGAs/s640/wireshark-captur.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Metasploit&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O Metasploit é utilizado para fazer análises de vulnerabilidades e facilitar testes de penetração e desenvolvimento de assinaturas para sistemas de detecção de intrusão (IDS).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-At2lN_kuM2k/XEhkNpUoAvI/AAAAAAAAEcE/WGnKbDE4SYE0ygr4FKxK5SfgYrkYQ0QZACLcBGAs/s1600/msf_console.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;327&quot; data-original-width=&quot;587&quot; height=&quot;356&quot; src=&quot;https://3.bp.blogspot.com/-At2lN_kuM2k/XEhkNpUoAvI/AAAAAAAAEcE/WGnKbDE4SYE0ygr4FKxK5SfgYrkYQ0QZACLcBGAs/s640/msf_console.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Honeypot&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O honeypot é uma ferramenta que simula falhas de segurança e colhe informações sobre quem tenta invadir um sistema. Na imagem abaixo temos uma imagem do valhala honeypot, ele cria servidores, FTP por exemplo, que detecta quando o usuário tenta invadir o sistema.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9eo3Vpp8Ka4/XEhkCpI4lrI/AAAAAAAAEcA/5r4Ub5S5AawUrcHPqplqK3_FsiCCBxHVwCLcBGAs/s1600/honeypot1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;488&quot; data-original-width=&quot;781&quot; height=&quot;396&quot; src=&quot;https://1.bp.blogspot.com/-9eo3Vpp8Ka4/XEhkCpI4lrI/AAAAAAAAEcA/5r4Ub5S5AawUrcHPqplqK3_FsiCCBxHVwCLcBGAs/s640/honeypot1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;GFILANguard&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O GFILANguard é uma ferramenta paga, que permite a análise dos equipamentos de rede e se esses apresentam alguma falha que poderia apresentar algum risco a segurança, assim essa ferramenta nos ajuda a detectar falhas em um sistema e fazer sua correção.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-JWP8CRa14XM/XEhkbME56bI/AAAAAAAAEcM/0ZmkxfxaWGUc74zvcPi_A9SFIhDaNdlLwCLcBGAs/s1600/gfi-languard.master.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;751&quot; data-original-width=&quot;1001&quot; height=&quot;480&quot; src=&quot;https://2.bp.blogspot.com/-JWP8CRa14XM/XEhkbME56bI/AAAAAAAAEcM/0ZmkxfxaWGUc74zvcPi_A9SFIhDaNdlLwCLcBGAs/s640/gfi-languard.master.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Curtiu? Deixe seu like na nossa página do Facebook.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/2024805867931117157/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/01/seguranca-da-informacao-e-ferramentas.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2024805867931117157'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2024805867931117157'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/01/seguranca-da-informacao-e-ferramentas.html' title='Segurança da informação e Ferramentas de Rede'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-yLVguqy15uM/XEhoT-AfIcI/AAAAAAAAEck/Vo1PnxRw2sgnd71QxiYTRvr3_lkdCWlGACLcBGAs/s72-c/image_content_987489_20170913094904.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-7327067880199710335</id><published>2019-01-15T07:14:00.002-08:00</published><updated>2021-04-17T07:44:40.087-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Desenvolvimento Web"/><title type='text'>Como Criar Um Menu Com HTML e CSS</title><content type='html'>&lt;a href=&quot;https://2.bp.blogspot.com/-bOd3R6ReWlo/WzuBPBVgITI/AAAAAAAAD2g/YC3QbpS7Og4v_Icr0t6aaaXlldF2BQgNgCPcBGAYYCw/s1600/iStock_000003045800XSmall.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;300&quot; data-original-width=&quot;400&quot; height=&quot;240&quot; src=&quot;https://2.bp.blogspot.com/-bOd3R6ReWlo/WzuBPBVgITI/AAAAAAAAD2g/YC3QbpS7Og4v_Icr0t6aaaXlldF2BQgNgCPcBGAYYCw/s320/iStock_000003045800XSmall.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;O menu é importante porque facilita a navegação dos usuários, neste artigo vamos ver como fazer um menu utilizando HTML e CSS.&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Nos artigos anteriores vimos como fazer um layout básico e como fazer formulários. Note que saber quais os elementos que compõem um site, ajuda a ter uma visão geral na hora de construir uma página web, tendo mente que uma página é composta pelo layout, páginas, menus, formulários, entre outros.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No nosso exemplo, o menu é composto por links que direciona os usuários para páginas do site, veja o resultado abaixo:&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-FzBZV0BRJEY/XD3kF5ThnJI/AAAAAAAAEao/aRcZ8sgE3wchMiwbhc0J9sT8kITfEfTCACLcBGAs/s1600/menu.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;61&quot; data-original-width=&quot;809&quot; height=&quot;48&quot; src=&quot;https://1.bp.blogspot.com/-FzBZV0BRJEY/XD3kF5ThnJI/AAAAAAAAEao/aRcZ8sgE3wchMiwbhc0J9sT8kITfEfTCACLcBGAs/s640/menu.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Para criá-lo utilizamos a estrutura padrão do HTML e definimos uma lista com &amp;lt;ul&amp;gt; e &amp;lt;li&amp;gt; no corpo &amp;lt;body&amp;gt; da página. Veja:&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-MDd13E9w-fc/XD3m6FW8phI/AAAAAAAAEa8/rgE7yxke128nN0iXrAPrEfdDRxf3DlAVQCLcBGAs/s1600/html.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;288&quot; data-original-width=&quot;467&quot; src=&quot;https://2.bp.blogspot.com/-MDd13E9w-fc/XD3m6FW8phI/AAAAAAAAEa8/rgE7yxke128nN0iXrAPrEfdDRxf3DlAVQCLcBGAs/s1600/html.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Para chamar o arquivo CSS com a folha de estilo utilizamos a tag &amp;lt;link&amp;gt; com o caminho do arquivo &amp;lt;href=&quot;menu.css&quot;&amp;gt;. Tanto o arquivo HTML quanto o CSS devem estar na mesma pasta para funcionar de maneira correta.&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-QzNIqGvVgAg/XD3wgq6iNhI/AAAAAAAAEbY/U5rnUETm4E81xOZZVirTuZwn546T7lKgwCLcBGAs/s1600/css2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;33&quot; data-original-width=&quot;457&quot; src=&quot;https://2.bp.blogspot.com/-QzNIqGvVgAg/XD3wgq6iNhI/AAAAAAAAEbY/U5rnUETm4E81xOZZVirTuZwn546T7lKgwCLcBGAs/s1600/css2.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No arquivo CSS definimos o comportamento e os parâmetros do menu como altura, margens, fonte do texto, cor de fundo, entre outros. Veja no código abaixo:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-AR-XCw4xxuk/XD3nDO2eM8I/AAAAAAAAEbA/1Euvz0PV_ZAE-lFjsxxARGHF6VykVarAQCLcBGAs/s1600/css.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;545&quot; data-original-width=&quot;576&quot; src=&quot;https://3.bp.blogspot.com/-AR-XCw4xxuk/XD3nDO2eM8I/AAAAAAAAEbA/1Euvz0PV_ZAE-lFjsxxARGHF6VykVarAQCLcBGAs/s1600/css.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;É importante escrever os códigos, porque isso é que vai nos ajudar a entender e a gravá-los na mente e vai facilitar nosso trabalho em outros projetos.&lt;/div&gt;&lt;br /&gt;Curtiu? Deixe seu like na nossa página do Facebook!</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/7327067880199710335/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/01/como-criar-um-menu-com-html-e-css.html#comment-form' title='2 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/7327067880199710335'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/7327067880199710335'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/01/como-criar-um-menu-com-html-e-css.html' title='Como Criar Um Menu Com HTML e CSS'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-bOd3R6ReWlo/WzuBPBVgITI/AAAAAAAAD2g/YC3QbpS7Og4v_Icr0t6aaaXlldF2BQgNgCPcBGAYYCw/s72-c/iStock_000003045800XSmall.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-7955719875993291787</id><published>2019-01-01T13:54:00.003-08:00</published><updated>2021-04-17T07:45:11.792-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Banco de Dados"/><title type='text'>Comandos Básicos SQL</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-umO28AIJ8WY/XCvg-sGO6MI/AAAAAAAAEaQ/7we2_dcDKOgtclbK9_SHPD-uJKgwqA22ACLcBGAs/s1600/SQL.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;234&quot; data-original-width=&quot;411&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-umO28AIJ8WY/XCvg-sGO6MI/AAAAAAAAEaQ/7we2_dcDKOgtclbK9_SHPD-uJKgwqA22ACLcBGAs/s320/SQL.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;A Linguagem de Consulta Estruturada ou SQL é a linguagem padrão para banco de dados relacional, que permite o acesso e a manipulação de dados nos SGBDs.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Seus comandos podem ser classificados da seguinte forma:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;DDL&lt;/li&gt;&lt;li&gt;DML&lt;/li&gt;&lt;li&gt;DCL&lt;/li&gt;&lt;li&gt;DTL&lt;/li&gt;&lt;li&gt;DQL&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Veja abaixo a definição de cada categoria e seus comandos, nos próximos artigos vamos utilizá-los na prática para manipulação de um banco de dados:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DDL &lt;/b&gt;- Data Definition Language (Linguagem de Definição de Dados), são comandos que permitem que usuário crie, altere e exclua novas tabelas ou banco de dados.&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-S-34R67UZuI/XCvRTGcJT1I/AAAAAAAAEY0/k5fIokmYNlUF8LvMZyhOiQ5nUKOlGQmTgCLcBGAs/s1600/DDL.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;129&quot; data-original-width=&quot;589&quot; src=&quot;https://3.bp.blogspot.com/-S-34R67UZuI/XCvRTGcJT1I/AAAAAAAAEY0/k5fIokmYNlUF8LvMZyhOiQ5nUKOlGQmTgCLcBGAs/s1600/DDL.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DML&lt;/b&gt; - Data Manipulation Language (Linguagem de Manipulação de Dados), são utilizados para fazer inclusões, alterações e exclusões de dados em registros.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-0DUBQTPU8cY/XCvSYcQ9dAI/AAAAAAAAEZA/J7_LdC_Sr4MSEUSyX5Pj-pj2Ity6xWO8QCLcBGAs/s1600/DML.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;130&quot; data-original-width=&quot;591&quot; src=&quot;https://4.bp.blogspot.com/-0DUBQTPU8cY/XCvSYcQ9dAI/AAAAAAAAEZA/J7_LdC_Sr4MSEUSyX5Pj-pj2Ity6xWO8QCLcBGAs/s1600/DML.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DCL&lt;/b&gt; - Data Control Language (Linguagem de Controle de Dados), faz o controle das permissões de acesso e manipulação dos dados pelo usuário.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-Yw2Wf2Dl71U/XCvTiuKdU6I/AAAAAAAAEZU/HUCgppdIxSI8KJgZ4XhmlJfV9kkghOq9gCLcBGAs/s1600/DCL.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;101&quot; data-original-width=&quot;589&quot; src=&quot;https://2.bp.blogspot.com/-Yw2Wf2Dl71U/XCvTiuKdU6I/AAAAAAAAEZU/HUCgppdIxSI8KJgZ4XhmlJfV9kkghOq9gCLcBGAs/s1600/DCL.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DTL&lt;/b&gt; - Data Transaction Language (Linguagem de Transação de Dados), esses comandos são responsáveis por realizar as transações dentro de um banco de dados.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-U-cXR2bIf4I/XCvX6QmhOLI/AAAAAAAAEZ8/VREaAP6hR9sy5w7WJ9gTULQcHmD-W9AVgCLcBGAs/s1600/DTL.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;128&quot; data-original-width=&quot;628&quot; src=&quot;https://4.bp.blogspot.com/-U-cXR2bIf4I/XCvX6QmhOLI/AAAAAAAAEZ8/VREaAP6hR9sy5w7WJ9gTULQcHmD-W9AVgCLcBGAs/s1600/DTL.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DQL&lt;/b&gt; - Data Query Language (Linguagem de Consulta de Dados), esse comando é um dos mais utilizados no gerenciamento dos SGBDs, e permite ao usuário realizar consultas no banco de dados.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-4urAe6aNsb4/XCvVMoMdqkI/AAAAAAAAEZg/xwcKrLfUjuU2xc8l6t6s11xN5OPEdZYuwCLcBGAs/s1600/DQL.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;78&quot; data-original-width=&quot;589&quot; src=&quot;https://1.bp.blogspot.com/-4urAe6aNsb4/XCvVMoMdqkI/AAAAAAAAEZg/xwcKrLfUjuU2xc8l6t6s11xN5OPEdZYuwCLcBGAs/s1600/DQL.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Curtiu? Deixe seu like na nossa página do Facebook!</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/7955719875993291787/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/01/comandos-basicos-sql.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/7955719875993291787'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/7955719875993291787'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/01/comandos-basicos-sql.html' title='Comandos Básicos SQL'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-umO28AIJ8WY/XCvg-sGO6MI/AAAAAAAAEaQ/7we2_dcDKOgtclbK9_SHPD-uJKgwqA22ACLcBGAs/s72-c/SQL.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-1345502421490752736</id><published>2019-01-01T11:37:00.002-08:00</published><updated>2021-04-17T07:45:28.845-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Banco de Dados"/><title type='text'>Composição do Banco de Dados</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-XsJ0FYRyQyg/XCvCWug5JII/AAAAAAAAEYY/qRbqRn-B8n8WcE-2o_DVSriwb-YBzupJgCLcBGAs/s1600/download.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;319&quot; data-original-width=&quot;345&quot; height=&quot;184&quot; src=&quot;https://1.bp.blogspot.com/-XsJ0FYRyQyg/XCvCWug5JII/AAAAAAAAEYY/qRbqRn-B8n8WcE-2o_DVSriwb-YBzupJgCLcBGAs/s200/download.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;O modelo relacional do banco de dados é representado por um conjunto de tabelas, cada tabela é composta por linhas e colunas.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Tabela &lt;/b&gt;- as tabelas ou relações, são os objetos onde são armazenados os dados de um banco de dados relacional.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Coluna &lt;/b&gt;- as colunas armazenam os atributos dos dados e mantém informações específicas sobre cada registro.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Linha&lt;/b&gt; - as linhas ou tuplas, representam os registros individuais contidos em uma tabela.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-utd6vXoEt6M/XCu_GHgBIiI/AAAAAAAAEX4/z633_F3PYfwKEG3rNKj9p7tF9a9V7YkwwCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo3.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;275&quot; data-original-width=&quot;503&quot; src=&quot;https://2.bp.blogspot.com/-utd6vXoEt6M/XCu_GHgBIiI/AAAAAAAAEX4/z633_F3PYfwKEG3rNKj9p7tF9a9V7YkwwCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo3.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #999999; font-size: x-small;&quot;&gt;Crédito da imagem: Slideshare:&amp;nbsp;&lt;span face=&quot;&amp;quot;arial&amp;quot; , sans-serif&quot; style=&quot;background-color: white;&quot;&gt;Prof. Dr.-Ing. Leonardo Andrade Ribeiro&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span face=&quot;&amp;quot;arial&amp;quot; , sans-serif&quot; style=&quot;background-color: white; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: #999999; font-size: small; text-align: start;&quot;&gt;&lt;span face=&quot;&amp;quot;arial&amp;quot; , sans-serif&quot; style=&quot;background-color: #222222; font-size: 13px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Esses conceitos são simples de entender e ao mesmo tempo importantes, porque sempre vamos falar deles ao criar tabelas, inserir registros, entre outros.&lt;/span&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span face=&quot;&amp;quot;arial&amp;quot; , sans-serif&quot; style=&quot;background-color: #222222; font-size: 13px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Curtiu? Deixe seu like na nossa página do Facebook.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/1345502421490752736/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2019/01/composicao-do-banco-de-dados.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/1345502421490752736'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/1345502421490752736'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2019/01/composicao-do-banco-de-dados.html' title='Composição do Banco de Dados'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-XsJ0FYRyQyg/XCvCWug5JII/AAAAAAAAEYY/qRbqRn-B8n8WcE-2o_DVSriwb-YBzupJgCLcBGAs/s72-c/download.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-8397884581956267491</id><published>2018-12-30T06:30:00.001-08:00</published><updated>2021-04-17T07:45:45.047-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linguagem C"/><title type='text'>Linguagem C - Funções</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s1600/linguagemc2.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;350&quot; data-original-width=&quot;480&quot; height=&quot;145&quot; src=&quot;https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s200/linguagemc2.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Utilizamos as funções para trabalhar com rotinas. Elas nos ajudam a escrever códigos mais simples e de fácil entendimento, além de reduzir seu tamanho, porque você não vai precisar fazer o mesmo código várias vezes.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Na linguagem C precisamos de três componentes para adicionar uma função a um programa, que são: o &lt;b&gt;protótipo da função&lt;/b&gt;, a &lt;b&gt;chamada à função&lt;/b&gt; e sua &lt;b&gt;definição&lt;/b&gt;. Veja o exemplo abaixo:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-kjG9PH1eaZI/XCfZBxFmk-I/AAAAAAAAEWg/AaqfkS-e61YkTcObUHzZDLzZwV3dt2LDgCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;398&quot; data-original-width=&quot;516&quot; src=&quot;https://1.bp.blogspot.com/-kjG9PH1eaZI/XCfZBxFmk-I/AAAAAAAAEWg/AaqfkS-e61YkTcObUHzZDLzZwV3dt2LDgCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo1.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Uma função deve ser declarada antes de se fazer sua chamada, utilizamos para isso o &lt;/span&gt;&lt;b style=&quot;text-align: justify;&quot;&gt;protótipo da função&lt;/b&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;, ele é importante para que o compilador verifique a sintaxe de chamada à função, sem ele o compilador não consegue verificar se há erros em seu código.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Se definirmos a função antes da chamada à função, o protótipo não é obrigatório, dessa forma nosso código ficaria assim:&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-tVLSHmN3ExA/XCjKELQiIfI/AAAAAAAAEXk/2UctmUbuoKkvn-mKhRYha36Wjpn6YBVgQCLcBGAs/s1600/semprototipo.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;364&quot; data-original-width=&quot;511&quot; src=&quot;https://3.bp.blogspot.com/-tVLSHmN3ExA/XCjKELQiIfI/AAAAAAAAEXk/2UctmUbuoKkvn-mKhRYha36Wjpn6YBVgQCLcBGAs/s1600/semprototipo.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No protótipo da função definimos o tipo, o nome e os parâmetros.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-AURo4860kUY/XCfauyBbO8I/AAAAAAAAEWs/0E1amBB_dI4kxyIi23x-YhQKS2yVWuvBwCLcBGAs/s1600/prototipo.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;22&quot; data-original-width=&quot;457&quot; src=&quot;https://3.bp.blogspot.com/-AURo4860kUY/XCfauyBbO8I/AAAAAAAAEWs/0E1amBB_dI4kxyIi23x-YhQKS2yVWuvBwCLcBGAs/s1600/prototipo.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A função main é responsável pela execução dos comandos. Um programa pode ter uma ou mais funções, sendo essa a principal. Definimos também os comandos que serão executados e a &lt;b&gt;chamada à função&lt;/b&gt;.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-OQlw3et9v1E/XCfbQOhVGzI/AAAAAAAAEW8/eOZ_995DoL018jflPNTNjC4WmIr9hopcQCLcBGAs/s1600/chamada.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;22&quot; data-original-width=&quot;475&quot; src=&quot;https://2.bp.blogspot.com/-OQlw3et9v1E/XCfbQOhVGzI/AAAAAAAAEW8/eOZ_995DoL018jflPNTNjC4WmIr9hopcQCLcBGAs/s1600/chamada.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Na função que foi definida será realizado o cálculo e seu retorno. O tipo de função deve estar de acordo com o retorno que foi definido, quando a função não retorna nada ela é do tipo &lt;b&gt;void&lt;/b&gt;. No entanto, se não definirmos o tipo da função assume-se que ela é do tipo inteiro(&lt;b&gt;int&lt;/b&gt;).&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-imMRr32QFvc/XCfct1vLJBI/AAAAAAAAEXI/kYxU9MLBe88qRHlMsdaweTkT0ieoFuAIgCLcBGAs/s1600/defini%25C3%25A7%25C3%25A3o.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;93&quot; data-original-width=&quot;473&quot; src=&quot;https://4.bp.blogspot.com/-imMRr32QFvc/XCfct1vLJBI/AAAAAAAAEXI/kYxU9MLBe88qRHlMsdaweTkT0ieoFuAIgCLcBGAs/s1600/defini%25C3%25A7%25C3%25A3o.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Toda função segue um padrão geral em sua declaração, veja:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;tipo &lt;/b&gt;nome_da_funcao (&lt;b&gt;tipo1&lt;/b&gt; parâmetro){&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;instruções&lt;/b&gt;;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;return &lt;/b&gt;valor_de_retorno&lt;br /&gt;}&lt;br /&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Nesse artigo vimos alguns conceitos básicos das funções em C, teste os exemplos acima, você também pode modificá-los e criar suas próprias funções.&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;Curtiu? Deixe seu comentário!</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/8397884581956267491/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/12/linguagem-c-funcoes.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/8397884581956267491'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/8397884581956267491'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/12/linguagem-c-funcoes.html' title='Linguagem C - Funções'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s72-c/linguagemc2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-5278037075759049192</id><published>2018-12-10T14:02:00.004-08:00</published><updated>2021-04-17T07:46:03.138-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linguagem C"/><title type='text'>Linguagem C - Comandos de Decisão</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s1600/linguagemc2.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;350&quot; data-original-width=&quot;480&quot; height=&quot;233&quot; src=&quot;https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s320/linguagemc2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Comandos de decisão nos permite determinar a sequência de comandos executados por um programa com base no resultado de uma expressão condicional. Em C temos três comandos de decisão: &lt;b&gt;if&lt;/b&gt;, &lt;b&gt;if-else&lt;/b&gt;, &lt;b&gt;switch&lt;/b&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Caso você tenha instalado o DevC++ no seu computador, escreva os códigos que serão mostrados neste artigo e execute os programas, você pode modificar as condicionais e testar outras instruções.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Quanto mais você praticar, mais você vai ficar familiarizado com a linguagem C.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Comando if&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O comando &lt;b&gt;if &lt;/b&gt;é um controle de decisão simples, e imprime o resultado de acordo com a condição que foi definida, veja:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Sintaxe&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;if&lt;/b&gt; (condição){&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;comando 1;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;comando...;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;}&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Exemplo&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No exemplo abaixo, utilizamos a estrutura &lt;b&gt;for &lt;/b&gt;para exibir 5 vezes: &quot;Digite um número&quot;, e com base na expressão condicional &lt;b&gt;if&lt;/b&gt;, o programa vai exibir o resultado com quantidade de vezes que usuário digitou um número maior que 10.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-l16LRJzZzm0/XA1F3vLH_ZI/AAAAAAAAEU4/H1X1MLbYscgwSbw29Av-sx3hR2Kk-phYgCPcBGAYYCw/s1600/if.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;290&quot; data-original-width=&quot;423&quot; src=&quot;https://3.bp.blogspot.com/-l16LRJzZzm0/XA1F3vLH_ZI/AAAAAAAAEU4/H1X1MLbYscgwSbw29Av-sx3hR2Kk-phYgCPcBGAYYCw/s1600/if.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Comando if-else&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O comando &lt;b&gt;if-else&lt;/b&gt; é equivalente a &lt;b&gt;se&lt;/b&gt;...&lt;b&gt;senão&lt;/b&gt;, esse comando nos permite exibir um resultado se a condição for verdadeira, se a condição for falsa podemos exibir outro resultado.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Quando há somente um comando para ser exibido, não precisamos colocar as chaves.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Sintaxe&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;if&lt;/b&gt; (condição){&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp;comando 1;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp;comando...;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;}&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;else&lt;/b&gt;{&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp;comando 2;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp;comando...;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;}&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Exemplo&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Pedimos ao usuário para digitar um número, definimos através do comando de decisão que, se o número for maior que 5, exibimos o resultado: &quot;Número maior que 5&quot;, senão o programa exibe o número é menor.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-bGcIlMwon8M/XA5HPbHhhwI/AAAAAAAAEVM/6QjrNA9XtgEQEAlQyTkQ0RPRv-wtl_U7wCPcBGAYYCw/s1600/if-else.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;271&quot; data-original-width=&quot;514&quot; src=&quot;https://3.bp.blogspot.com/-bGcIlMwon8M/XA5HPbHhhwI/AAAAAAAAEVM/6QjrNA9XtgEQEAlQyTkQ0RPRv-wtl_U7wCPcBGAYYCw/s1600/if-else.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Comando switch&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O &lt;b&gt;switch &lt;/b&gt;é um comando de tomada de decisão, ele compara o valor da variável em relação as constantes em cada opção, e assim executa os comandos. O comando &lt;b&gt;break &lt;/b&gt;interrompe o switch quando um do comandos é executado.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A declaração &lt;b&gt;default &lt;/b&gt;é executada quando a variável não for igual a nenhuma das contantes.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Sintaxe&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;switch &lt;/b&gt;(variável){&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;case &lt;/b&gt;constante1:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; comando 1;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;break&lt;/b&gt;;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;case &lt;/b&gt;constante2:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; comando 2;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;break&lt;/b&gt;;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;default&lt;/b&gt;:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; comando 3;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;}&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Exemplo&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Criamos uma variável &lt;b&gt;num&lt;/b&gt;, quando o valor da variável for igual a uma das constantes que correspondam ao case, o programa executa um dos comandos e exibe o resultado na tela.&lt;br /&gt;&lt;br /&gt;Quando o usuário digita um número quando não corresponde a nenhuma das opções, o programa exibe: &quot;Número inválido&quot;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-PUnBsDAM5_0/XA5HqVUvX7I/AAAAAAAAEVU/C2o4fDEed6gSDPfMEtPVwexeU6nl5W3SQCPcBGAYYCw/s1600/switch.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;505&quot; data-original-width=&quot;472&quot; src=&quot;https://4.bp.blogspot.com/-PUnBsDAM5_0/XA5HqVUvX7I/AAAAAAAAEVU/C2o4fDEed6gSDPfMEtPVwexeU6nl5W3SQCPcBGAYYCw/s1600/switch.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Curtiu? Deixe seu comentário!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/5278037075759049192/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/12/linguagem-c-comandos-de-decisao.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/5278037075759049192'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/5278037075759049192'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/12/linguagem-c-comandos-de-decisao.html' title='Linguagem C - Comandos de Decisão'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s72-c/linguagemc2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-2109350417373980767</id><published>2018-12-08T11:39:00.001-08:00</published><updated>2021-04-17T07:46:28.403-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Eletrônica"/><title type='text'>Eletrônica - Multímetro Digital e Analógico</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-NV4jGr5kACo/XAwc0BZNsSI/AAAAAAAAEUg/tlWYX32GGMwU1hhWc0eP_k59UEEuRMy3gCLcBGAs/s1600/img.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;240&quot; data-original-width=&quot;360&quot; height=&quot;213&quot; src=&quot;https://2.bp.blogspot.com/-NV4jGr5kACo/XAwc0BZNsSI/AAAAAAAAEUg/tlWYX32GGMwU1hhWc0eP_k59UEEuRMy3gCLcBGAs/s320/img.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;O multímetro é um instrumento que permite fazer a leitura de várias grandezas elétricas, por exemplo, tensão, corrente, resistência, capacitância, indutância e frequência, e também fazer testes em diodos, transistores.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Esse instrumento é essencial na realização de reparos e testes, nesse artigo vamos ver dois tipos principais, multímetro digital e analógico.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Multímetro Digital&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O multímetro digital é bastante utilizado para realizar medições de grandezas elétricas pela facilidade de uso e por ser um aparelho de fácil acesso. Veja a imagem abaixo:&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-piQ_HJ2ghao/XAvtrDUjkKI/AAAAAAAAEUE/lEUXdFDH_W4dff6JvhcP6Ztogjl-lRWfQCLcBGAs/s1600/mult_et_1002.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;794&quot; data-original-width=&quot;934&quot; height=&quot;544&quot; src=&quot;https://2.bp.blogspot.com/-piQ_HJ2ghao/XAvtrDUjkKI/AAAAAAAAEUE/lEUXdFDH_W4dff6JvhcP6Ztogjl-lRWfQCLcBGAs/s640/mult_et_1002.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Partes principais:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Display&amp;nbsp;&lt;/b&gt;- local onde é mostrado os resultados das medições.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Seletor de função&lt;/b&gt;&amp;nbsp;- permite selecionar a grandeza e sua escala de corrente, tensão, resistência, que ser á medida.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Bornes de Entrada&lt;/b&gt;&amp;nbsp;- são os terminais utilizados para conectar o instrumento ao circuito ou componente. Podem ser de três tipos:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;COM&lt;/b&gt;: terminal comum ou negativo.&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;VΩ mA&lt;/b&gt;: terminal para medir tensão, corrente, resistência. É o terminal positivo, no caso de medida de corrente e tensão.&lt;/li&gt;&lt;li&gt;&lt;b&gt;10A&lt;/b&gt;: terminal para medir corrente até 10 amperes.&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Multímetro Analógico&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A vantagem em utilizar o multímetro analógico é que ele é utilizado para casos específicos em que há variações no valor de grandezas, pela sua facilidade em verificar as variações através do movimento dos ponteiros.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-7g6E3vMUg4A/XAvulPG_9uI/AAAAAAAAEUM/zgjMzTycrrYhnkglL2l4vRJNKrDhjMtygCLcBGAs/s1600/multimetro-analogico-e.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;846&quot; data-original-width=&quot;1168&quot; height=&quot;463&quot; src=&quot;https://1.bp.blogspot.com/-7g6E3vMUg4A/XAvulPG_9uI/AAAAAAAAEUM/zgjMzTycrrYhnkglL2l4vRJNKrDhjMtygCLcBGAs/s640/multimetro-analogico-e.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As seleção das escalas no multímetro analógico é semelhante ao digital, por exemplo, se quisermos medir a tensão em uma tomada 127 Volts, devemos colocar o seletor sobre a grandeza ACV, na escala de 250, o resultado vai ser exibido pelo ponteiro na escala ACV (em vermelho).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Escalas e Bornes&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;HFE&lt;/b&gt;: medidor de transistor.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DCV/VCC&lt;/b&gt;: medidor de tensão em corrente contínua. Para o teste, é colocada a ponta de prova preta (-) no terra e a vermelha (+) no terminal do componente. A medida é feita da escala maior para menor.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;ACV/VCA&lt;/b&gt;: medidor de tensão em corrente alternada. Na escala ACV, colocamos o seletor sempre na maior escala para evitar danos ao aparelho e diminuímos de acordo com o resultado até o valor mais próximo da leitura desejada.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Ω/Ohm&lt;/b&gt;: medidor de resistência. A resistência dos componentes podem ser medida com apenas um terminal do componente fora da placa, ou com o componente completamente retirado da placa, o que dá maior exatidão na leitura. É necessário saber o valor do componente antes de fazer a medição, a fim de que seja selecionada a escala mais apropriada.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No multímetro analógico o valor da resistência é composto por 5 faixas X1, X10, X100, X1K, X10K. Essas faixas são multiplicadores para obter o resultado, por exemplo, Faixa X1 = [valor lido] x 1.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;DCA&lt;/b&gt;: medidor de amperagem em corrente contínua. Fornece o valor de corrente que passa por um determinado condutor.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Curtiu? Se inscreva e compartilhe!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/2109350417373980767/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/12/eletronica-basica-multimetro-digital-e.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2109350417373980767'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2109350417373980767'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/12/eletronica-basica-multimetro-digital-e.html' title='Eletrônica - Multímetro Digital e Analógico'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-NV4jGr5kACo/XAwc0BZNsSI/AAAAAAAAEUg/tlWYX32GGMwU1hhWc0eP_k59UEEuRMy3gCLcBGAs/s72-c/img.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-8144122797011423960</id><published>2018-12-02T07:51:00.001-08:00</published><updated>2021-04-17T07:46:47.429-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linguagem C"/><title type='text'>Linguagem C - Laços de Repetição</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s1600/linguagemc2.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;350&quot; data-original-width=&quot;480&quot; height=&quot;232&quot; src=&quot;https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s320/linguagemc2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Os laços de repetição são usados para repetir comandos enquanto uma condição for verdadeira.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Essas estruturas fazem parte do controle de fluxo, sem elas teríamos que escrever o código, comando por comando, sem ter a possibilidade de trabalhar com condições, repetições ou saltos. Existem três comandos de laços em C, que são: &lt;b&gt;for&lt;/b&gt;, &lt;b&gt;while &lt;/b&gt;e &lt;b&gt;do-while&lt;/b&gt;.&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Laço - for&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Usamos o comando &lt;b&gt;for &lt;/b&gt;quando sabemos antecipadamente o número de repetições que desejamos executar. No exemplo abaixo utilizamos o comando para exibir 10 vezes a frase &quot;olá mundo&quot;, note que fizemos a inicialização &lt;b&gt;i=1&lt;/b&gt;, declaramos a condição &lt;b&gt;i&amp;lt;=10&lt;/b&gt;, e finalizamos com o operador de incremento &lt;b&gt;i++.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-fKBOY9c1fyY/XALdtZHMZYI/AAAAAAAAESI/hSQ0rZWjRFwNiVk7b4T-YneH8KT4vt3bACLcBGAs/s1600/Para.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;183&quot; data-original-width=&quot;535&quot; src=&quot;https://4.bp.blogspot.com/-fKBOY9c1fyY/XALdtZHMZYI/AAAAAAAAESI/hSQ0rZWjRFwNiVk7b4T-YneH8KT4vt3bACLcBGAs/s1600/Para.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Laço for aninhado &lt;/b&gt;- No exemplo abaixo temos um &lt;b&gt;for&lt;/b&gt; dentro da estrutura de outro &lt;b&gt;for&lt;/b&gt;, que é chamado for aninhado.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-iXFj8W57Ogo/XAPx_ooFTTI/AAAAAAAAETI/emMr4xbbU9gtnBCFzX2MOmQ9T8WtvGrOACLcBGAs/s1600/aninhado.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;219&quot; data-original-width=&quot;701&quot; src=&quot;https://2.bp.blogspot.com/-iXFj8W57Ogo/XAPx_ooFTTI/AAAAAAAAETI/emMr4xbbU9gtnBCFzX2MOmQ9T8WtvGrOACLcBGAs/s1600/aninhado.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;b&gt;Múltiplos&lt;/b&gt; - podemos exibir múltiplos de um número até uma determinada condição, por exemplo, abaixo temos um programa que exibe múltiplos de 3 até 30.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-2aPDzVVyGJQ/XAPsrQjCchI/AAAAAAAAES0/hzbaa2rrsOYk362RnaG_6ehPh9gayDkUgCLcBGAs/s1600/multiplos.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;146&quot; data-original-width=&quot;621&quot; src=&quot;https://1.bp.blogspot.com/-2aPDzVVyGJQ/XAPsrQjCchI/AAAAAAAAES0/hzbaa2rrsOYk362RnaG_6ehPh9gayDkUgCLcBGAs/s1600/multiplos.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Laço infinito -&amp;nbsp;&lt;/b&gt;é aquele que é executado sem parar e só é interrompido quando o programa é fechado, ou quando é utilizado o comando &lt;b&gt;break&lt;/b&gt;, assim o &lt;b&gt;break &lt;/b&gt;interrompe o laço infinito e o programa continua sua execução normal. Sintaxe:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-4eHrpq6uQdU/XAPsVJ5mAnI/AAAAAAAAESs/Axsl-pSGThA9x5sdksi0vnVqdZHqVBEzwCLcBGAs/s1600/for-infinito.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;45&quot; data-original-width=&quot;217&quot; src=&quot;https://2.bp.blogspot.com/-4eHrpq6uQdU/XAPsVJ5mAnI/AAAAAAAAESs/Axsl-pSGThA9x5sdksi0vnVqdZHqVBEzwCLcBGAs/s1600/for-infinito.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;Laço - while&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O comando &lt;b&gt;while &lt;/b&gt;(enquanto) testa um condição enquanto ela for verdadeira, quando a condição se torna falsa (ou igual a zero) o laço é interrompido e o programa continua sua execução. É apropriado quando não conhecemos antecipadamente o número de interações que serão executadas. Veja no exemplo abaixo:&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-6taiM9Xt76g/XAP5iR-gNcI/AAAAAAAAETc/GcPbLH1tsCwjYtp3ZIV0cio27yQv-_GxQCLcBGAs/s1600/while.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;201&quot; data-original-width=&quot;533&quot; src=&quot;https://1.bp.blogspot.com/-6taiM9Xt76g/XAP5iR-gNcI/AAAAAAAAETc/GcPbLH1tsCwjYtp3ZIV0cio27yQv-_GxQCLcBGAs/s1600/while.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Laço do-while&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O laço &lt;b&gt;do-while&lt;/b&gt; é utilizado quando temos a necessidade de executar a declaração antes de testar a condição, garantindo assim que a declaração vai ser executadas pelo menos uma vez. Essa estrutura facilita a interpretação do bloco de instruções e permite a sua execução mesmo que o teste seja falso no inicio.&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-GhRR_AgtS9s/XALeHkPj8VI/AAAAAAAAESY/vUaNOTGuMxQG-cAMhtdsz-rmDfu-A5DyACLcBGAs/s1600/Fa%25C3%25A7a...Enquanto.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;199&quot; data-original-width=&quot;539&quot; src=&quot;https://2.bp.blogspot.com/-GhRR_AgtS9s/XALeHkPj8VI/AAAAAAAAESY/vUaNOTGuMxQG-cAMhtdsz-rmDfu-A5DyACLcBGAs/s1600/Fa%25C3%25A7a...Enquanto.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Curtiu? Se inscreva e compartilhe!</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/8144122797011423960/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/12/linguagem-c-lacos-de-repeticao.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/8144122797011423960'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/8144122797011423960'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/12/linguagem-c-lacos-de-repeticao.html' title='Linguagem C - Laços de Repetição'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s72-c/linguagemc2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-6086576506099943853</id><published>2018-11-22T04:26:00.003-08:00</published><updated>2021-04-17T07:47:25.862-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Eletrônica"/><title type='text'>Eletrônica - Conceitos Básicos</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-FjBRo0YYQNM/W_agRfF4oXI/AAAAAAAAERw/wMmyISWla9UJh6Vi-AgJXVgPgVqMApoxgCLcBGAs/s1600/Eletronic.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;417&quot; data-original-width=&quot;417&quot; height=&quot;200&quot; src=&quot;https://1.bp.blogspot.com/-FjBRo0YYQNM/W_agRfF4oXI/AAAAAAAAERw/wMmyISWla9UJh6Vi-AgJXVgPgVqMApoxgCLcBGAs/s200/Eletronic.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;A eletrônica é o campo da ciência e da engenharia que trata dos dispositivos eletrônicos e sua utilização, podendo ser analógica e digital.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Neste e em artigos futuros vamos ver um pouco sobre os conceitos básicos da eletrônica.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;Grandezas Elétricas&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Corrente&lt;/b&gt; - a corrente elétrica corresponde ao movimento das cargas, ou seja, é o movimento dos elétrons dentro do condutor. Sua unidade de medida é o &lt;b&gt;Ampere &lt;/b&gt;representada pela letra &lt;b&gt;(I)&lt;/b&gt;.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;A intensidade da corrente elétrica pode variar no decorrer do tempo, de acordo com isso podemos classificar a corrente elétrica em três tipos:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Corrente Contínua&lt;/b&gt; - é aquela que é fornecida por pilhas, baterias, fontes de alimentação. A corrente contínua percorre em um único sentido e mantem a polaridade da tensão de saída. É representada pela sigla &lt;b&gt;DC&lt;/b&gt; (Direct Current).&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-QBjDUEx6VYs/W_X0TGNHcyI/AAAAAAAAEP8/FGGqKrWRjvsbGeFlbp3Z1DO8qqlTnP4IQCLcBGAs/s1600/CC.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;184&quot; data-original-width=&quot;381&quot; height=&quot;153&quot; src=&quot;https://3.bp.blogspot.com/-QBjDUEx6VYs/W_X0TGNHcyI/AAAAAAAAEP8/FGGqKrWRjvsbGeFlbp3Z1DO8qqlTnP4IQCLcBGAs/s320/CC.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Corrente Pulsante&lt;/b&gt; - fornecida por retificadores, a corrente pulsante varia sua intensidade, mas permanece no mesmo sentido (negativo ou positivo).&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-z9Ku11Sup0c/W_X1Lru5lWI/AAAAAAAAEQM/uqX2ij6m-10Ob-5qJA6T3YnmdnHq33AnACLcBGAs/s1600/pp.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;184&quot; data-original-width=&quot;381&quot; height=&quot;154&quot; src=&quot;https://3.bp.blogspot.com/-z9Ku11Sup0c/W_X1Lru5lWI/AAAAAAAAEQM/uqX2ij6m-10Ob-5qJA6T3YnmdnHq33AnACLcBGAs/s320/pp.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Corrente Alternada&lt;/b&gt; - é aquela que é fornecida pela concessionária de energia. A corrente alternada varia o sentido ao longo do tempo e inverte sua polaridade. Sua sigla é &lt;b&gt;AC&lt;/b&gt; (Alternating Current).&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-w2eYINEwy9o/W_X1bAic84I/AAAAAAAAEQQ/Cg4UDpl3e84SeolcKVwoZ1t7mtHztQi6ACLcBGAs/s1600/CA.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;184&quot; data-original-width=&quot;381&quot; height=&quot;154&quot; src=&quot;https://1.bp.blogspot.com/-w2eYINEwy9o/W_X1bAic84I/AAAAAAAAEQQ/Cg4UDpl3e84SeolcKVwoZ1t7mtHztQi6ACLcBGAs/s320/CA.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Os condutores tem uma determinada condutividade elétrica, em outras palavras, trata-se da facilidade do material em conduzir uma corrente, o que é o inverso do seu valor resistivo. Podem ser de três tipos:&lt;/div&gt;&lt;ul&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Condutores&lt;/b&gt;: são os materiais que apresentam baixo valor resistivo, facilitando a passagem da corrente elétrica, por exemplo, ouro, prata, cobre.&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Isolantes&lt;/b&gt;: são materiais que apresentam alto valor resistivo, dificultando a passagem da corrente, por exemplo, cerâmica, vidro, louça.&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Semi-condutores&lt;/b&gt; - são os materiais que representam um valor resistivo entre os condutores e isolantes, por exemplo, germânio, silício.&lt;/li&gt;&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-jkJi4EIRpC4/W_K2s9v5N3I/AAAAAAAAEPo/_tqIP4qmLMkqnT1R8Yx0JnfXt4G9dLXuwCLcBGAs/s1600/corrente.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;308&quot; data-original-width=&quot;568&quot; height=&quot;173&quot; src=&quot;https://3.bp.blogspot.com/-jkJi4EIRpC4/W_K2s9v5N3I/AAAAAAAAEPo/_tqIP4qmLMkqnT1R8Yx0JnfXt4G9dLXuwCLcBGAs/s320/corrente.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Resistência &lt;/b&gt;- chamamos de resistência elétrica a propriedade que todo corpo possui que oferece oposição à passagem da corrente elétrica. A unidade de medida da resistência é o &lt;b&gt;ohm&lt;/b&gt;, representado pelo simbolo ômega (&lt;b&gt;Ω&lt;/b&gt;) e pela sigla (&lt;b&gt;R&lt;/b&gt;).&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-6Y1e5H2vimM/W_X2VzwEiSI/AAAAAAAAEQg/s1CBfvXRNQwnYCvdTFn5wJrgAu9Jg0uCQCLcBGAs/s1600/resistencia.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;244&quot; data-original-width=&quot;600&quot; height=&quot;130&quot; src=&quot;https://4.bp.blogspot.com/-6Y1e5H2vimM/W_X2VzwEiSI/AAAAAAAAEQg/s1CBfvXRNQwnYCvdTFn5wJrgAu9Jg0uCQCLcBGAs/s320/resistencia.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: right;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Resistor&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;b&gt;Tensão &lt;/b&gt;- o trabalho realizado por uma carga ao deslocar outra carga por atração ou repulsão é chamado de &lt;b&gt;diferença de potencial, &lt;/b&gt;a essa força que obriga as cargas a se moverem, comumente chamamos de tensão elétrica. Sua unidade de medida é o &lt;b&gt;Volt &lt;/b&gt;representado pela sigla&amp;nbsp;&lt;b&gt;(V).&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-sx-PIW6vkow/W_X5oOEnxZI/AAAAAAAAEQ0/fPT_w13FqzIsffV8PDGOyuk8B0UV7KF4gCLcBGAs/s1600/corrente1%25281%2529.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;219&quot; data-original-width=&quot;435&quot; height=&quot;161&quot; src=&quot;https://1.bp.blogspot.com/-sx-PIW6vkow/W_X5oOEnxZI/AAAAAAAAEQ0/fPT_w13FqzIsffV8PDGOyuk8B0UV7KF4gCLcBGAs/s320/corrente1%25281%2529.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Potência &lt;/b&gt;- é a capacidade que a corrente elétrica tem de percorrer um determinado trajeto no menor tempo possível. Sua unidade de medida é o &lt;b&gt;watt &lt;/b&gt;representado pela letra &lt;b&gt;P&lt;/b&gt; e pela sigla (&lt;b&gt;W&lt;/b&gt;). Para definir o valor da potência, multiplicamos o valor da tensão pela corrente elétrica, veja a equação:&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-9RLnlcYxzFw/W_aRPLvmL7I/AAAAAAAAERI/44Kkr0vOr_gs-HAUz5kNMdnhcQFEDU9PACLcBGAs/s1600/potencia.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;70&quot; data-original-width=&quot;124&quot; src=&quot;https://3.bp.blogspot.com/-9RLnlcYxzFw/W_aRPLvmL7I/AAAAAAAAERI/44Kkr0vOr_gs-HAUz5kNMdnhcQFEDU9PACLcBGAs/s1600/potencia.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Frequência &lt;/b&gt;- as &lt;b&gt;ondas eletromagnéticas&lt;/b&gt; se propagam ao longo do tempo, esse tempo é divido em&amp;nbsp;&lt;b&gt;períodos&lt;/b&gt; que é a duração de um ciclo de &lt;b&gt;360º&lt;/b&gt;. A frequência corresponde a um determinado número de ciclos por segundo. Sua unidade de medida é o &lt;b&gt;Hertz &lt;/b&gt;representado pela sigla &lt;b&gt;Hz&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;Um Hertz equivale a um ciclo realizado em um segundo. A rede elétrica, por exemplo, é de 60 Hz, significa que ela realiza 60 ciclos por segundo.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-NFkHifxD--M/W_aYLD4EQgI/AAAAAAAAERc/KMsiNAxUWOgz23vnv6vv34vgB7YO23X4gCLcBGAs/s1600/periodo.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;215&quot; data-original-width=&quot;365&quot; height=&quot;187&quot; src=&quot;https://2.bp.blogspot.com/-NFkHifxD--M/W_aYLD4EQgI/AAAAAAAAERc/KMsiNAxUWOgz23vnv6vv34vgB7YO23X4gCLcBGAs/s320/periodo.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: right;&quot;&gt;Ciclo de um Hertz.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;É muito importante entender cada um desses conceitos, por que eles são muito usados nas áreas de eletrônica, elétrica e informática. No próximo artigo vamos ver sobre a primeira lei de ohm e cálculo de resistores e capacitores.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Curtiu? Deixe seu comentário!&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/6086576506099943853/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/11/eletronica-conceitos-basicos.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/6086576506099943853'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/6086576506099943853'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/11/eletronica-conceitos-basicos.html' title='Eletrônica - Conceitos Básicos'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-FjBRo0YYQNM/W_agRfF4oXI/AAAAAAAAERw/wMmyISWla9UJh6Vi-AgJXVgPgVqMApoxgCLcBGAs/s72-c/Eletronic.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-2629268679226569247</id><published>2018-11-17T13:58:00.000-08:00</published><updated>2018-11-17T14:04:08.952-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Banco de Dados"/><title type='text'>Introdução ao Banco de Dados</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-1NkJD36f8og/W_CQHQjTzUI/AAAAAAAAEPU/7NWAvEN6S34ImRDdv1v9KN6mefSrpBq8QCLcBGAs/s1600/6-2-database-free-png-image-thumb.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;137&quot; data-original-width=&quot;184&quot; src=&quot;https://1.bp.blogspot.com/-1NkJD36f8og/W_CQHQjTzUI/AAAAAAAAEPU/7NWAvEN6S34ImRDdv1v9KN6mefSrpBq8QCLcBGAs/s1600/6-2-database-free-png-image-thumb.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;O banco de dados é um conjunto de dados relacionados entre si que visam produzir algum sentido, que são as informações. Desde a antiguidade o ser humano tem a necessidade de guardar informações, compostos por seus sistemas de numeração, atividades comerciais, entre outros. Hoje as informações são vitais para as organizações.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Para trabalhar com o banco de dados utilizamos o Sistema Gerenciador de Banco de Dados (&lt;b&gt;SGBD&lt;/b&gt;), o que facilita a organização e a rapidez na recuperação dos dados. Os SGBD&#39;s mais utilizados no mercado são: Oracle, MySQL, SQL Server, entre outros.&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Modelos de Base de Dados&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Neste artigo vamos ver os principais modelos de base de dados, que são: Plano, Relacional e Orientado a Objetos.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Modelo Plano&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Modelo plano ou tabular, é composto por matrizes simples, bidimensionais. São a base das &lt;b&gt;planilhas eletrônicas&lt;/b&gt;.&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Modelo Relacional&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O modelo relacional substituiu os modelos hierárquico e de rede. Neste modelo os dados são classificados como relações ou tabelas. As colunas contém os atributos, um ou mais atributos podem ser definidos como chave primária e pode ser consultada em outras tabelas, o que é chamado de chave estrangeira. Os atributos também recebem todas as regras e restrições.&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-_pY4zOGkXoE/W_BowQEDDEI/AAAAAAAAEOg/liAhXaGD3MgTXTcqlm-Q4RsmjHA5PdfJACLcBGAs/s1600/Figura-10-Modelo-relacional-do-banco-de-dados.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;345&quot; data-original-width=&quot;750&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-_pY4zOGkXoE/W_BowQEDDEI/AAAAAAAAEOg/liAhXaGD3MgTXTcqlm-Q4RsmjHA5PdfJACLcBGAs/s400/Figura-10-Modelo-relacional-do-banco-de-dados.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Modelo Orientado a Objeto&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Também conhecido como diagrama de classes, este modelo é composto por classes, elas definem a estrutura e o comportamento do conjunto de objetos. Sua estrutura contém atributos (valores de dados) e associações (ou relacionamentos).&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif , &amp;quot;kanji2&amp;quot;; font-size: 13.3333px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-lNmRRwsP72I/W_BoD8lCeQI/AAAAAAAAEOQ/_pBzICve_mQYjTUvnIVz7xZKGkx4QXs_gCLcBGAs/s1600/classdg.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;397&quot; data-original-width=&quot;469&quot; height=&quot;337&quot; src=&quot;https://2.bp.blogspot.com/-lNmRRwsP72I/W_BoD8lCeQI/AAAAAAAAEOQ/_pBzICve_mQYjTUvnIVz7xZKGkx4QXs_gCLcBGAs/s400/classdg.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Transações&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;As transações são processos executados em um banco de dados e obedecem a quatro propriedades conhecidas como ACID, que são:&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Atomicidade &lt;/b&gt;-&lt;b&gt; &lt;/b&gt;a atomicidade garante que todas as transações sejam executadas, caso uma delas falhe, todo o processo deve ser revertido (rollback). Se todas as ações forem concluídas, as transações podem ser efetivadas e persistidas (commit).&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Consistência&lt;/b&gt; - as regras e restrições definidas devem ser obedecidas para que as transações sejam feitas de modo correto.&amp;nbsp;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Isolamento &lt;/b&gt;- com o acesso simultâneo aos dados é necessário que haja um isolamento entre as operações para que uma transação não interfira uma na outra e nem influenciem os resultados.&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Durabilidade &lt;/b&gt;- a durabilidade garante que os dados serão gravados de modo definitivo e não poderão ser apagados caso haja queda de energia, erros, etc..&lt;/div&gt;&lt;br /&gt;Curtiu? Deixe seu comentário!&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/2629268679226569247/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/11/introducao-ao-banco-de-dados.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2629268679226569247'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/2629268679226569247'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/11/introducao-ao-banco-de-dados.html' title='Introdução ao Banco de Dados'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-1NkJD36f8og/W_CQHQjTzUI/AAAAAAAAEPU/7NWAvEN6S34ImRDdv1v9KN6mefSrpBq8QCLcBGAs/s72-c/6-2-database-free-png-image-thumb.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-8960285464210735449</id><published>2018-11-17T06:53:00.000-08:00</published><updated>2018-11-17T06:53:53.599-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linguagem C"/><title type='text'>Linguagem C - Operadores</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s1600/linguagemc2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;350&quot; data-original-width=&quot;480&quot; height=&quot;233&quot; src=&quot;https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s320/linguagemc2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Os operadores em C são utilizados para executar ações entre um ou mais elementos.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Nesse artigo vamos falar sobre os principais operadores da linguagem C, que são: de atribuição e aritméticos, relacionais e lógicos.&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Operadores A&lt;/b&gt;&lt;b&gt;ritméticos e&amp;nbsp;&lt;/b&gt;&lt;b&gt;de Atribuição&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Os operadores aritméticos são utilizados para realizar operações matemáticas em C. Possui operadores unários e binários. O unário age em apenas uma variável, podendo modificar ou não seu valor, e retornam o seu valor final. O binário, por exemplo em uma soma, utiliza duas variáveis e retorna um terceiro valor, conservando as variáveis originais.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Os operadores de incremento e decremento são unários que modificam o valor da variável. Assim o operador diminui ou acrescenta 1 à variável aplicada . Por exemplo: &lt;b&gt;x++&lt;/b&gt; é equivalente à &lt;b&gt;x = x+1&lt;/b&gt;;. Também podem ser pré-fixados (&lt;b&gt;++x&lt;/b&gt;) ou pós-fixados (&lt;b&gt;x++&lt;/b&gt;).&lt;br /&gt;&lt;br /&gt;O operador de atribuição em C é o sinal de igual (&lt;b&gt;=&lt;/b&gt;). Por exemplo: &lt;b&gt;x = 16&lt;/b&gt;, aqui dizemos que a variável&amp;nbsp;&lt;b&gt;x&lt;/b&gt; recebeu o valor &lt;b&gt;16&lt;/b&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-wDjmM9-nZE4/W-8hyyaQxdI/AAAAAAAAEDQ/l5n0qUl_zagGoEbNQdwDzVVK5M6s1sFLwCLcBGAs/s1600/operadores-aritmeticos.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img align=&quot;left&quot; alt=&quot;Operadores aritméticos&quot; border=&quot;0&quot; data-original-height=&quot;182&quot; data-original-width=&quot;454&quot; src=&quot;https://2.bp.blogspot.com/-wDjmM9-nZE4/W-8hyyaQxdI/AAAAAAAAEDQ/l5n0qUl_zagGoEbNQdwDzVVK5M6s1sFLwCLcBGAs/s1600/operadores-aritmeticos.png&quot; title=&quot;Operadores aritméticos&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Operadores Aritméticos e de Atribuição&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;b&gt;Exemplo:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-spHXYQJS8IE/W_AocvP0ZeI/AAAAAAAAED4/ZR2BjZpGnjMdk2KRRkUv4d9ePd-PtpLtgCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;109&quot; data-original-width=&quot;303&quot; src=&quot;https://4.bp.blogspot.com/-spHXYQJS8IE/W_AocvP0ZeI/AAAAAAAAED4/ZR2BjZpGnjMdk2KRRkUv4d9ePd-PtpLtgCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo3.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Incremento&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;b&gt;Operadores Relacionais e&amp;nbsp;&lt;/b&gt;&lt;b&gt;Lógicos&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Operadores relacionais fazem comparações entre as variáveis e retornam um valor booleano, ou seja, verdadeiro (1) ou falso (0).&amp;nbsp;&lt;/div&gt;&lt;br /&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-QCfgEfRra3c/W-8ieaxaaOI/AAAAAAAAEDY/IVH1SZQP7383mfg2bxUuhsCiNP-SlZAXwCLcBGAs/s1600/relacionais-e-l%25C3%25B3gicos.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Operadores relacionais&quot; border=&quot;0&quot; data-original-height=&quot;153&quot; data-original-width=&quot;216&quot; src=&quot;https://1.bp.blogspot.com/-QCfgEfRra3c/W-8ieaxaaOI/AAAAAAAAEDY/IVH1SZQP7383mfg2bxUuhsCiNP-SlZAXwCLcBGAs/s1600/relacionais-e-l%25C3%25B3gicos.png&quot; title=&quot;Operadores relacionais&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Operadores Relacionais&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Os operadores lógicos nos permitem fazer diversas operações com condições relacionais. Podemos usar os operadores relacionais e lógicos para fazer diversos testes seguindo a tabela verdade.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-cr6K0yo8w1c/W-8ix2U_59I/AAAAAAAAEDk/oqos8GGsKCMYtCTnNedPI6NScIt3QaBOACLcBGAs/s1600/l%25C3%25B3gicos.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;operadores lógicos&quot; border=&quot;0&quot; data-original-height=&quot;93&quot; data-original-width=&quot;174&quot; src=&quot;https://1.bp.blogspot.com/-cr6K0yo8w1c/W-8ix2U_59I/AAAAAAAAEDk/oqos8GGsKCMYtCTnNedPI6NScIt3QaBOACLcBGAs/s1600/l%25C3%25B3gicos.png&quot; title=&quot;operadores lógicos&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Operadores lógicos&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;Exemplo:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-3MoMRj_-Mz4/W_Aqhosan8I/AAAAAAAAEEE/daDUwRh71fQe1UfJvT4QWQgerBKA-4n2QCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;126&quot; data-original-width=&quot;396&quot; src=&quot;https://4.bp.blogspot.com/-3MoMRj_-Mz4/W_Aqhosan8I/AAAAAAAAEEE/daDUwRh71fQe1UfJvT4QWQgerBKA-4n2QCLcBGAs/s1600/Sem%2Bt%25C3%25ADtulo1.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Operações com condições relacionais&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Curtiu? Deixe seu comentário!&lt;br /&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/8960285464210735449/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/11/linguagem-c-operadores.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/8960285464210735449'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/8960285464210735449'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/11/linguagem-c-operadores.html' title='Linguagem C - Operadores'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-FDjVLJ588L0/W2SuJcd23YI/AAAAAAAAD7U/ZokZMgP5__cCvzeeEL-SPL5kZM3FXFKVgCPcBGAYYCw/s72-c/linguagemc2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-3168579299509099395</id><published>2018-11-16T09:31:00.003-08:00</published><updated>2021-04-17T07:48:03.428-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Arduino"/><category scheme="http://www.blogger.com/atom/ns#" term="Eletrônica"/><title type='text'>Introdução ao Arduino</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-QVT4KDoMLvs/W-7_i1WuViI/AAAAAAAAEC8/vBEVzCLy1og1ioJzUn_TybWGfnmRWBfaQCLcBGAs/s1600/Arduino-uno-perspective-transparent.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img align=&quot;left&quot; border=&quot;0&quot; data-original-height=&quot;747&quot; data-original-width=&quot;849&quot; height=&quot;281&quot; src=&quot;https://2.bp.blogspot.com/-QVT4KDoMLvs/W-7_i1WuViI/AAAAAAAAEC8/vBEVzCLy1og1ioJzUn_TybWGfnmRWBfaQCLcBGAs/s320/Arduino-uno-perspective-transparent.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Arduino é uma plataforma livre e de fácil acesso para prototipagem eletrônica, com ele podemos desenvolver diversos projetos relacionados à eletrônica, robótica, IoT, entre outros. O limite é sua imaginação, o Arduino é acessível, tem baixo custo, é flexível e é fácil de usar, com ele você pode criar projetos básicos a avançados.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Nesse artigo veremos uma introdução sobre seus principais componentes, sua programação e seu funcionamento, conceitos básicos para começar a desenvolver nossos projetos.&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Placa Arduino&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O Arduino utiliza uma placa única, ou seja, tem todos os componentes necessários para seu funcionamento. Seus principais componentes são: portas de Entrada/Saída digital e analógica, porta Serial/USB para &lt;b&gt;ligar ao computador&lt;/b&gt;, entrada de energia e o microcontrolador Atmega328.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-dDTsFiPfcQg/W-65m14DjQI/AAAAAAAAEB4/nmzWiwatJ1UVcq20ylhIRn0dtyWirQr0ACLcBGAs/s1600/arduino_3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;843&quot; data-original-width=&quot;1000&quot; height=&quot;531&quot; src=&quot;https://3.bp.blogspot.com/-dDTsFiPfcQg/W-65m14DjQI/AAAAAAAAEB4/nmzWiwatJ1UVcq20ylhIRn0dtyWirQr0ACLcBGAs/s640/arduino_3.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Interface de Programação Arduino&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O Arduino utiliza software embarcado para controlar os dispositivos, sua linguagem de programação é essencialmente C/C++. A programação é feita através da IDE Arduino ou por meio do Editor Web, que pode ser acessado no site oficial&amp;nbsp;&lt;a href=&quot;https://www.arduino.cc/en/Main/Software&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;aqui&lt;/b&gt;&lt;/a&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O Arduino Também utiliza bibliotecas, que são programas básicos incluídos na IDE quando você baixa pela primeira vez, são usadas para controlar a maioria dos dispositivos, como Ethernet, GSM, SD, Servo, etc... Veja na imagem abaixo:&lt;/div&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-aFHaMKR8SV4/W-7fGEM0d3I/AAAAAAAAECU/8yZGLDnL8NIcVadoxuNd7mBFkFkZbBX9gCLcBGAs/s1600/bibliotecas.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;746&quot; data-original-width=&quot;1184&quot; src=&quot;https://2.bp.blogspot.com/-aFHaMKR8SV4/W-7fGEM0d3I/AAAAAAAAECU/8yZGLDnL8NIcVadoxuNd7mBFkFkZbBX9gCLcBGAs/s1600/bibliotecas.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: right;&quot;&gt;IDE Arduino - Imagem direita: bibliotecas.&lt;/div&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;font-size: 12.8px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Na imagem podemos ver a estrutura básica de um programa Arduino. O comando&amp;nbsp;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;int led = 13&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #cc0000;&quot;&gt;&amp;nbsp;&lt;/span&gt;é utilizado para determinar em qual pino da placa o LED foi conectado. Para determinar a rotina, acender o LED, é utilizado o comando&lt;span style=&quot;color: red; font-weight: bold;&quot;&gt; setup()&lt;/span&gt;. O &lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;loop()&lt;/b&gt;&lt;/span&gt; é usado para chamar a repetição do bloco de comandos ou até que seja desligada.&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Shields Extensores&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Os shields são expansões que disponibilizam várias funções, como manipulação de motores, rede sem fio, leitor de cartão SD, LCD, Ethernet, etc. São conectados direto na placa Arduino.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: right;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-Qp0aSJjOUVY/W-74ggxOKWI/AAAAAAAAECo/Cp2jHsggpZo3Bb9NOeqyEEnpX2F5EKIDACLcBGAs/s1600/51ddc93fce395f8764000001.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;437&quot; data-original-width=&quot;552&quot; height=&quot;252&quot; src=&quot;https://4.bp.blogspot.com/-Qp0aSJjOUVY/W-74ggxOKWI/AAAAAAAAECo/Cp2jHsggpZo3Bb9NOeqyEEnpX2F5EKIDACLcBGAs/s320/51ddc93fce395f8764000001.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: right;&quot;&gt;Shield Ethernet&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;Projetos&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;O Arduino é uma plataforma flexível e de fácil uso, o limite é a imaginação. Com o crescimento da tecnologia ficou mais fácil desenvolver projetos que podem nos auxiliar no dia a dia. A tendência é que isso se torne cada vez mais interessante com o uso da internet das coisas(IoT), robótica e a inteligência artificial.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Acesse o site do Arduino e veja os diversos projetos desenvolvidos com a plataforma, &lt;b&gt;&lt;a href=&quot;https://create.arduino.cc/projecthub&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Aqui&lt;/a&gt;&lt;/b&gt;.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Curtiu? Deixe seu comentário!&amp;nbsp;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/3168579299509099395/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/11/introducao-ao-arduino.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/3168579299509099395'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/3168579299509099395'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/11/introducao-ao-arduino.html' title='Introdução ao Arduino'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-QVT4KDoMLvs/W-7_i1WuViI/AAAAAAAAEC8/vBEVzCLy1og1ioJzUn_TybWGfnmRWBfaQCLcBGAs/s72-c/Arduino-uno-perspective-transparent.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5486777263432064217.post-3412335496772888622</id><published>2018-11-08T04:45:00.001-08:00</published><updated>2018-11-08T04:45:10.398-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rede de Computadores"/><title type='text'>Redes de Computadores - Topologia</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a align=&quot;left&quot; href=&quot;https://2.bp.blogspot.com/-ZACYfdae2xg/W-QvXUTQkVI/AAAAAAAAEBk/Qbd7zznrZqUxztKIrLbc7FlCUDJkIzfHgCLcBGAs/s1600/Redes-de-Computadores.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;435&quot; data-original-width=&quot;580&quot; height=&quot;240&quot; src=&quot;https://2.bp.blogspot.com/-ZACYfdae2xg/W-QvXUTQkVI/AAAAAAAAEBk/Qbd7zznrZqUxztKIrLbc7FlCUDJkIzfHgCLcBGAs/s320/Redes-de-Computadores.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;A topologia de rede representa a maneira como os computadores e outros dispositivos estão conectados em uma rede de computadores.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Há duas categorias básicas de topologia: física e lógica.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Topologia física&lt;/b&gt; - se refere a maneira como estão organizados os cabos, roteadores, switches, entre outros.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Topologia lógica&lt;/b&gt; - descreve o fluxo que os dados percorrem na rede.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A topologia é importante porque vai influenciar diretamente na velocidade, segurança e flexibilidade da rede.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Nesse artigo vamos ver quatro topologias de rede, as mais comuns atualmente:&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Barramento &lt;/b&gt;- topologia em que todos os computadores são conectados em uma mesma barra de dados, essa tecnologia, normalmente, utiliza cabos coaxiais. A transmissão de dados é assíncrona, ou seja, somente um computador pode enviar informações por vez. Atualmente a topologia em barramento está ultrapassada.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-joV5A63GRnk/W-QlIRyDqvI/AAAAAAAAEAw/WrYNCuJ2nuE6tsQDVsVICfgmkHoA-NqXACLcBGAs/s1600/barramento.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;222&quot; data-original-width=&quot;359&quot; height=&quot;197&quot; src=&quot;https://4.bp.blogspot.com/-joV5A63GRnk/W-QlIRyDqvI/AAAAAAAAEAw/WrYNCuJ2nuE6tsQDVsVICfgmkHoA-NqXACLcBGAs/s320/barramento.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Anel&lt;/b&gt;- a topologia em anel cria um circuito fechado em forma de anel. As informações são transmitidas passando os dados por cada estação até chegar ao seu destino, por isso a cada estação inserida, há um aumento no tempo de transmissão dos dados. Essa tecnologia é mais utilizada em backbones de internet e operadoras de telefonia. &lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-lu6HsOPEXdo/W-QlMXdyeGI/AAAAAAAAEA0/Z-1vuGGFnKoxAYaDg8aZAeHdRgDQj4mKgCLcBGAs/s1600/anel.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;260&quot; data-original-width=&quot;359&quot; height=&quot;232&quot; src=&quot;https://2.bp.blogspot.com/-lu6HsOPEXdo/W-QlMXdyeGI/AAAAAAAAEA0/Z-1vuGGFnKoxAYaDg8aZAeHdRgDQj4mKgCLcBGAs/s320/anel.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Estrela &lt;/b&gt;- topologia mais utilizada atualmente e com melhor custo/benefício, utilizam cabos de par trançado e um switch como ponto central da rede, o que proporciona um ganho de desempenho e melhora na resolução de falhas.&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-CJodo74jXUA/W-QlR8UR4MI/AAAAAAAAEA4/ZKWyo0M0rUcRbRx2oh8mm0JMg69_DICJQCLcBGAs/s1600/estrela.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;313&quot; data-original-width=&quot;393&quot; height=&quot;254&quot; src=&quot;https://3.bp.blogspot.com/-CJodo74jXUA/W-QlR8UR4MI/AAAAAAAAEA4/ZKWyo0M0rUcRbRx2oh8mm0JMg69_DICJQCLcBGAs/s320/estrela.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Mista ou Híbrida&amp;nbsp;&lt;/b&gt;- topologia mais utilizada em redes de grande porte. São as que usam mais de uma topologia, é utilizada também para se adequar ao ambiente e compensar questões de custos, expansibilidade, flexibilidade e funcionalidade. Outros tipos de topologia são: &lt;b&gt;Árvore&lt;/b&gt;, &lt;b&gt;Malha&lt;/b&gt;, &lt;b&gt;Ponto-a-Ponto&lt;/b&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-AFdHWswqSB8/W-Qs7siEFJI/AAAAAAAAEBQ/s5njn434hJMRikIZIO7juEhb6iHrQrGGgCLcBGAs/s1600/mista.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;469&quot; data-original-width=&quot;710&quot; height=&quot;210&quot; src=&quot;https://2.bp.blogspot.com/-AFdHWswqSB8/W-Qs7siEFJI/AAAAAAAAEBQ/s5njn434hJMRikIZIO7juEhb6iHrQrGGgCLcBGAs/s320/mista.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Curtiu? Deixe seu comentário!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.projetotifacil.com/feeds/3412335496772888622/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.projetotifacil.com/2018/11/redes-de-computadores-topologia.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/3412335496772888622'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5486777263432064217/posts/default/3412335496772888622'/><link rel='alternate' type='text/html' href='http://www.projetotifacil.com/2018/11/redes-de-computadores-topologia.html' title='Redes de Computadores - Topologia'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-ZACYfdae2xg/W-QvXUTQkVI/AAAAAAAAEBk/Qbd7zznrZqUxztKIrLbc7FlCUDJkIzfHgCLcBGAs/s72-c/Redes-de-Computadores.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>