Information Technologies Ara 3. Deneme Sınavı
Toplam 20 Soru1.Soru
Which one of the following executes and controls all the processes within the computer?
HDD |
DVD |
I/O |
CD |
CPU |
Central Processing Unit is located on the mainboard. CPU executes and controls all the processes within the computer. The correct answer is E.
2.Soru
Which of the following is the description of a database including structure and constraints that the database should obey?
Database design |
Database management system |
Database storage |
Database schema |
Data Integration |
A database schema is the description of a database including structure and constraints that the database should obey.
3.Soru
Which of the following is the most commonly used transmission media due to easy installation and low prices?
Coaxial cable |
Optical fiber |
Twisted pair |
Radiowave |
Microwave |
Twisted-pair cable is the most commonly used transmission media due to easy installation and low prices. C is the correct answer.
4.Soru
A/an ............... is a signal to the processor released by hardware or software that indicates a particular event requiring immediate attention. Which term is defined above?
CPU |
optical disk drive |
mainboard |
interrupt |
central processing unit |
An interrupt is a signal to the processor released by hardware or software that
indicates a particular event requiring immediate attention.
5.Soru
which of the below is a web browser?
Skype |
Messenger |
Chrome |
|
|
All others are social media networks and instant messengers only chrome is a browser.
6.Soru
"It is a very powerful multi-user computer that can support thousands ofusers at the same time." Which type of computer is described above?
mainframe |
supercomputer |
microcomputer |
workstation |
minicomputer |
Mainframe: A very powerful multi-user computer that can support thousands of
users at the same time.
7.Soru
Which of the following is a circuit board that enables a computer to connect to a network?
Network Interface Controllers |
Repeaters and Hubs |
Bridges |
Switches |
Routers |
A network interface controller (NIC) is a circuit board that enables a computer to connect to a network. A is the correct answer.
8.Soru
Which of these situations describes the case of a Denial-of-Service attack?
When many different sources flood the network with traffic until a shutdown occurs due to the overload. |
When the attacker copies a trusted IP address to send out packages using this address. |
When an outsider inserts themselves into a conversation between two parties and gains access to the data in transmission. |
When the attacker uses Trojan horses to infect the browsers. |
When the attacker modifies the DNS server to reroute a domain name to a different IP address. |
Denial-of-Service attacks aim to prevent normal functioning of a computer system. DoS attacks usually flood the network with traffic until a shutdown occurs due to the overload. The right answer is A.
9.Soru
I. Difficult to understand
II. Fast in speed
III. Close to user
IV. Generally written in high-level language
Which of the ones listed above are correct for system software?
I and II |
II and III |
I and III |
III and IV |
II and IV |
System Software | Application Software |
Close to system | Close to user |
Fast in speed | Slow in speed |
Difficult to design | Easy to design |
Difficult to understand | Easy to understand |
Less interactive | More interactive |
Smaller in size | Bigger in size (requires large storage space) |
Difficult to manipulate | Easy to manipulate and use |
Generally written in low-level language | Generally written in high-level language |
Therefore, the correct option is A.
10.Soru
What do users need in order to send HTTP requests to web servers?
HTML |
HTTP |
HTTPS |
Web servers |
Web browsers |
Users send HTTP requests to web servers by client programs called web browsers. Some of the most common browsers are Google Chrome, Mozilla Firefox, Internet Explorer, and Safari. Therefore, the correct option is E.
11.Soru
FCAPS, which describes the requirements of network management is the acronym for:
Fault, certainty, accounting, performance, and sustainability. |
Fault, certainty, adjustment, performance, and security. |
Fault, configuration, adjustment, performance, and sustainability. |
Fault, configuration, adjustment, performance, and security. |
Fault, configuration, accounting, performance, and security. |
The requirements of network management are described with FCAPS, a model for network management created by ISO. FCAPS is the acronym for fault, configuration, accounting, performance, and security.
12.Soru
What does HTTP stand for?
Hypen Text Type protocol |
Hypertext Markup Protocol |
Hypertext Transit Protocol |
Hypen Transfer protocol |
Hypertext Transfer protocol |
HTTP (Hypertext Transfer Protocol): HTTP is an application protocol that contains the rules for transferring text, image, sound, video, and other multimedia.
13.Soru
- Data warehousing
- Visualization
- Data mining
- Data collection
Put these steps of KDD into the correct order starting from the beginning stage?
1-2-3-4 |
2-1-3-4 |
3-4-1-2 |
4-1-3-2 |
2-4-1-3 |
The steps of KDD is as follows:
- Data collection
- Data preprocessing
- Data warehousing
- Taking relevant data
- Data mining
- Pattern evaluation
- Visualization
The correct option is D.
14.Soru
In which of these network topologies, each device has a point- to-point connection with a single or multiple devices?
Bus topology |
Star topology |
Mesh topology |
Ring topology |
Tree topology |
In a mesh topology, each device has a point-to-point connection with a single or multiple devices.Since there exist redundant links in the network, the cabling cost is high in this topology.The right answer is C.
15.Soru
Which of these common security attacks describes the situation when the attacker impersonates another user or device on the network to attack the network and access data sources?
Eavesdropping |
Man-in-the-Middle Attack |
Spoofing Attack |
Man-in-the-Browser Attack |
Denial-of-Service Attack |
A spoofing attack occurs when the attacker impersonates another user or device on the network to attack the network, spread malware, and access data sources. The right answer is C.
16.Soru
Which type of computer is a very powerful multi-user computer that can support thousands of users at the same time?
Mainframe |
Microcomputer |
Workstation |
Minicomputer |
Server |
Mainframe is a very powerful multi-user computer that can support thousands of users at the same time. The correct answer is A.
17.Soru
Which one below is the name of a popular data model used for conceptual design that epresents data as entities, attributes, and relationships?
Primary key |
Derived attribute |
Local design |
Entity-relationship |
Conceptual design |
The conceptual design provides a conceptual schema of DB. It allows representing entities and relationships between them in high-level view models. Entity-Relationship model is one of the popular data model used for conceptual design. It represents data as entities, attributes, and relationships. The correct option is D.
18.Soru
Whih of the following is an input device?
Printer |
Projector |
Speaker |
Monitor |
Scanner |
In computer systems, these data can be collected using various input devices such as keyboard, mouse, scanner, microphone, digital camera, touchpad etc.
19.Soru
Which of the network management requirements is concerned with tracking the usage of computation and network resources to provide a fair distribution of resources among users?
Configuration Management |
Sustainibility management |
Accounting management |
Security management |
Fault management |
Accounting management aims to track the usage of computation and network resources to provide a fair distribution of resources among users. The right answer is C.
20.Soru
Which of these basic hardware components are used to connect computers, printers and servers within a building?
Bridges |
Switches |
Routers |
Modems |
Firewalls |
Network switches are hardware components that centralize communications among multiple devices within a local area network. In most of the business networks, switches are used to connect computers, printers, and servers within a building.The right answer is B.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ