Information Technologies Ara 2. Deneme Sınavı
Toplam 20 Soru1.Soru
Which of the followings is used in the prediction process?
Regression |
If-Then rule |
K-nearest neighbor |
Bayesian classifiers |
Naïve Bayesian classifiers |
If-Then rule, k-nearest neighbor, Bayesian classifiers and Naïve Bayesian classifiers are used for classification purposes. On the other hand, regression is one of the mostly known prediction algorithms. Therefore, the correct option is A.
2.Soru
Which of the followning transmission media types is different from the others?
Shielded twisted pair |
Unshielded twisted pair |
Coaxical |
Optical fiber |
Radio wave |
Radio wave is a component of unguided media while the remaining options are components of guided media. Therefore, the correct option is E.
3.Soru
Which of the followings is the system software that operates or controls a particular hardware device connected to a computer.
Operating system |
Firmware |
Device driver |
System software |
Application software |
A device driver is a system software that operates or controls a particular hardware device (e.g., graphic card, printer, scanner, etc.) that is connected to a computer. It allows a computer to communicate with these internal or external peripheral devices. Therefore, the correct option is C.
4.Soru
Which of the following statements regarding the role of requirement collection and analysis in database management system design is correct?
Requirement collection and analysis is the process of determining which data needs to be gathered for the database. |
Requirement collection and analysis is the determination of end user needs from the database management system. |
Requirement collection and analysis is used to determine the expectation of users and apply rules to the database. |
Requirement collection and analysis is the process of utilizing data to create meaningful information by analyzing the data and filtering it through certain requirements. |
Requirement collection and analysis is the final stage of database management design, intended to implement the database management design into real world applications. |
Requirement collection and analysis entails establishing requirements based on the intents and expectations of users, and implementing them as rules or constraints for the database. The others options are not correct. The correct answer is C.
5.Soru
Which of the folllowing is not one of the key technologies that The Web is based on?
HTML (Hypertext Markup Language) |
HTTP (Hypertext Transfer Protocol) |
Web Servers |
Web Browsers |
Central Processing Unit |
The Web is based on four key technologies:HTML (Hypertext Markup Language),HTTP (Hypertext Transfer Protocol), Web Servers and Web Browsers. E is the correct answer.
6.Soru
Which of the most prominent characteristics of Operating Systems is described in the following statements: "A process must be in memory to be executed. OS manages memory in a way that many processes reside in memory simultaneously."?
Memory Management |
Protection and Security |
Processor Management |
Device Management |
File Management |
Memory Management
OS keeps tracks of primary memory i.e. what part of it is in use by whom, what part is not in use etc. and allocates the memory when a process or program requests it. Programs to be executed by the computer systems first must be loaded into the main memory. A set of processes, together with the
data they access, reside in the memory.
A process must be in memory to be executed. OS manages memory in a way that many processes reside in memory simultaneously.
7.Soru
Which of the following is not a data model?
Conceptual |
Organizational |
High-level |
Low-level |
Physical |
Data models can be grouped as conceptual or high-level data model, low-level or physical data models and implementation or representational data models.
8.Soru
Which of the following can be simply defined as conducting business via electronic medium, e.g. over the internet?
Web Sites |
Ethernet |
Electonic business |
Remote administration |
Technology |
Electronic business (E-business) can be simply defined as conducting business via electronic medium, e.g. over the internet.
9.Soru
What is the name of the topology shown in the picture?
Bus Topology |
Star Topology |
Ring Topology |
Mesh Topology |
Tree Topology |
In a mesh topology, each device has a point- to-point connection with a single or multiple devices. Either routing or flooding operations can transmit the messages. In this topology, there exist redundant links in the network. Thus, the correct answer is D.
10.Soru
Which of the following is not a property of data requirements in database design?
irrelevant |
detailed |
complete |
unambiguous |
consistent |
Requirements should be detailed, relevant, descriptor, unambiguous,
complete and conistent.
11.Soru
Which of the following is one of the challenges of e-business
Reducing operating costs of business and its processes and avoiding consumption |
Increasing market opportunity (Faster access to the market and customer trends) |
Elimination of processing errors |
Strengthening internal management |
The complexity of ensuring security |
The main benefits of e-business: • Reducing operating costs of business and its processes and avoiding consumption, • Increasing market opportunity (Faster access to the market and customer trends), • Fast access to customers: enabling them to access the information about products or services they need at any time (7/24), • Elimination of processing errors, • Strengthening internal management, • Supply chain management: Provide uninterrupted (continuous) supply chain, • Reduction of sales cycles, • Increasing visibility, • Communication improvements, • Predicting the fall in the probable life curve of product.
The main challenges in e-business are: • Determining customer’s changing needs, • Organizational structure, • The high speed of the development of IT, • Integration of the front and back-end systems of the organization, • A lack of qualified human resources, • The complexity of ensuring security,• Growing competition, • Effective and efficient customer service (high availability, ease of use, personalized systems), • High quality access, • Expensive.
While A, B, C, D are the benefits of e-business, E is one of the challenges.
12.Soru
Which one below is an application protocol that contains the rules for transferring text, image, sound, video, and other multimedia?
Which one below is an application protocol that contains the rules for transferring text, image, sound, video, and other multimedia?
HTML |
HTTP |
WWW |
Mozilla Firefox |
TCP |
-
HTML (Hypertext Markup Language): HTML is the language that describes and defines the content of a web page.
-
HTTP (Hypertext Transfer Protocol): HTTP is an application protocol that contains the rules for transferring text, image, sound, video, and other multimedia.
-
Web Servers: A computer that hosts a website on the Internet is called a web server. These computers supply content to web browsers.
-
Web Browsers: Users send HTTP requests to web servers by client programs called web browsers. Some of the most common browsers are Google Chrome, Mozilla Firefox, Internet Explorer, and Safari.
13.Soru
Which of the following is the process of discovering relations among data?
Data mining |
Data storage |
Visualization |
Mining association |
Mining clusters |
Association is referred as patterns frequently purchased together. Mining association is the process of discovering relations among data.
14.Soru
While mapping ER concepts to relational schemas in logical design, which mapping step entails the insertion of the primary key of one of the entities to the other entity types relation as a foreign key, assuming both entities participate in the same relation?
Mapping of strong entity types. |
Mapping of 1:N or N:1 binary relationship types. |
Mapping 1:1 binary relationship types. |
Mapping n-ary relationship types. |
Mapping N:M binary relationship types. |
Using the primary key of one entity and inserting it to the other entity types relation as a foreign key is one of the three possible approaches to mapping 1:1 binary relationship types. The correct answer is C.
15.Soru
In which of the following, transistors replaced vacuum tubes and magnetic cores were used for the primary memory and magnetic tape and magnetic disks for secondary storage devices?
The first generation |
The second generation |
The third generation |
The fourth generation |
The fifth generation |
In the first generation (Vacuum Tubes-1940-1956) the vacuum tubes were used as the basic components for memory in the first generation computers. Punch cards, magnetic tape, and paper Regarding the main features of the first generation computers, in general, their sizes were very large (non-portable), their energy consumption and heat release to the environment were too high. Those computers were relatively very slow (solve only one problem at a time) and quite expensive. They used machine code as the programming language and used batch processing operating system. In the second generation (Transistors-1956 - 1963) transistors replaced vacuum tubes in the second generation computers. Those computers were cheaper, consuming less power, smaller in size, more reliable and faster than the first generation computers. In this generation, magnetic cores were used for the primary memory and magnetic tape and magnetic disks for secondary storage devices. Low-level programming languages such as assembly language, batch processing and multiprogramming operating system were used as well. The computers belonging to the third generation (Integrated Circuits-1964- 1971) used integrated circuits instead of transistors. These computers were smaller in size, more reliable, faster and more efficient than the previously developed ones. In this generation, remote processing, high- level programming languages, multiprogramming operating system were used. The fourth generation computers (Microprocessors-1971-Present used Very or even thousands of integrated circuits were built onto a single silicon chip to form a microprocessor. These computers became more compact, powerful, portable, reliable, cheaper, and easily available. Real time networks, time-sharing, distributed operating system and high-level languages were used in this generation. The fifth generation computers (Artificial Intelligence-Present and Future), based on artificial intelligence, are still in development, though certain applications such as computer vision and pattern recognition are being used today. The use of parallel processing enabled hardware and software allow computers to perform artificial intelligence based tasks. It is evident that quantum computation and nanotechnology would change the computers dramatically in the near future. The correct answer is Choice B.
16.Soru
Which of these computer networks interconnects communication devices within a building?
Wide Area Network (WAN) |
Wireless Personal Area Network (WPAN) |
Personal Area Network (PAN) |
Metropolitan Area Network (MAN) |
Local Area Network (LAN) |
A local area network (LAN) interconnects communication devices within a small geographical area such as an office, home or a building. The right answer is E.
17.Soru
The processes of filling missing values, correcting inconsistencies, identifying outliers and getting rid of them are called:
Data cleaning. |
Data integration. |
Data transformation. |
Data reduction. |
Data discretization. |
Data cleaning includes processes of filling missing values, correcting inconsistencies, identifying outliers and getting rid of them. Missing values can be filled with attribute mean, attribute mean of all tuples belonging to the same class of the given tuple containing missing values, overall system mean, and a prediction produced by a learning algorithm.
18.Soru
Which one below is a spreadsheet?
Excel |
|
Word |
Powerpoint |
Notes |
A spreadsheet program, such as Microsoft Excel, is used for reviewing and editing spreadsheets. Spreadsheets can be thought of tables filled with data in the form of numbers, dates, strings etc. Spreadsheet programs are powerful tools for getting meaning out of raw data. It helps to discover trends and patterns using data bars, sparklines, color coding, and icons. Even helps summarize and illustrate insights by charts and graphs.
19.Soru
In what year the computer communication started?
1929 |
1942 |
1940 |
1960 |
2010 |
George Stibitz performed the first remote computation by using a teletype to send commands to the Complex Number Computer in New York in 1940.
20.Soru
Which of the following is not one of the steps for designing a database to process, manage, and organize data?
Requirement collection and analysis. |
Conceptual design. |
Logical design. |
Physical design. |
Low level design. |
The main steps for designing a database are; requirement collection and analysis, conceptual design, logical design, and physical design. Low level design is not one of the steps. The correct answer is E.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ