Information Technologies Ara 4. Deneme Sınavı
Toplam 20 Soru1.Soru
Which is true for processing and storage? I. Primary storage: RAM, ROM, Cache II. Tertiary storage: USB flash drive III. Off-line storage: Optical disk IV. Secondary storage: Hard disk
I and II |
II and III |
I, II and III |
I and IV |
I, II, III and IV |
Processing and storage
• Manipulate
• Change
• Storage
• Primary storage: RAM, ROM, Cache
• Secondary storage: Hard disk
• Tertiary storage: Optical disk
• Off-line storage: USB flash drive
2.Soru
Which of the followings is correct when attributes are in question?
A simple attribute is divisible. |
An attribute is a real-world object. |
A multi-valued attribute symbolizes the collection of simple attributes. |
A composite attribute contains more than one entry for a specific entity. |
An attribute is derived attribute if it can be derived from other described attributes. |
An entity is a real-world object, whereas an attribute represents a property describing the related entity. An attribute can be any type of composite, derived, simple and multivalued. A simple attribute is the attribute which is not divisible. To illustrate, an id property for a book is simple attribute. A composite attribute symbolizes the collection of simple attributes. Thus, it can be divided into sub-attributes. To illustrate, name attribute is a composite attribute which is composed of simple attributes such as first name, middle name and last name. A multi-valued attribute contains more than one entry for a specific entity. To illustrate, birthdate of an author is single-valued because there is only one birthdate for the corresponding author whereas, phone number is a multi-valued attribute if there are more than one valid phone number for the related author. An attribute is derived attribute if it can be derived from other described attributes. To exemplify, age is a derived attribute for an author because it can be derived from birthdate attribute. Therefore, the correct option is E.
3.Soru
Which of the followings is a circuit board that enables a computer to connect to a network?
Modem |
Router |
Switch |
Network Interface Controller |
Repeaters and Hubs |
Network Interface Controller (NIC) provides the computers with the ability to access the transmission media. Therefore, the correct option is D.
4.Soru
Which information is not true for data-information-knowledge-wisdom hierarchy?
It is hierarchical and pyramidal. |
While the understanding increases, the context decreases. |
Wisdom is the value attached to knowledge. |
These concepts are related to the past. |
Data are plentiful. |
Besides being hierarchical, the figure is pyramidal, in that data are plentiful whereas wisdom is limited and even almost nonexistent. While the understanding increases from data to wisdom, the context decreases. While the three underlying concepts of this hierarchy are related to the past, the fourth
and top concept, which is wisdom, is relevant to the future, and it is essence of philosophical probing.
If data is characterized as recorded facts, then information is the set of patterns, or expectations underlying the data. Knowledge can be described as the accumulation of the set of expectations and wisdom as the value attached to knowledge.
5.Soru
Which of the following is used as input/output device in the first generation (vacuum tube) of computers?
Touchable Screen |
Punch Cards |
Keyboard |
Mouse |
Printer |
Vacuum tubes were used as the basic components for memory in the first generation computers. Punch cards, magnetic tape, and paper tape were used as the input and output(I/O) devices. Therefore the correct answer is B.
6.Soru
Which one below is unguided media?
Microwave |
unshielded Twisted pair |
Shielded twisted pair |
Optical fiber |
coaxial cable |
Microwave transmission is quite similar to the radio transmission, except the difference
regarding the wavelengths. Microwaves have smaller wavelengths (ranging from one meter to one millimeter) than radio waves. Microwaves cannot penetrate through obstacles, which forces the sender and the receiver to be in line of sight.
7.Soru
When the benefits and challenges of e-business are taken into account, how should the chart below be completed?
- Reduction of sales cycles
- Determining customer’s changing needs
- Supply chain management: provide uninterrupted (continuous) supply chain
- Increasing visibility
- The high speed of the development of IT
- Integration of the front and back-end systems of the organization
Benefits of e-business | Challenges of e-business |
a. | d. |
b. | e. |
c. | f. |
a.III/ b.II/ c.VI/ d.I/ e.IV/ f.V |
a.VI/ b.V/ c.I/ d.III/ e.II/ f.IV |
a.IV/ b.VI/ c.V/ d.I/ e.III/ f.II |
a.I/ b.III/ c.IV/ d.II/ e.V/ f.VI |
a.II/ b.I/ c.V/ d.IV/ e.VI/ f.III |
Converting companies into successful e-businesses has become an important objective for today’s businesses. In order to achieve this goal, the requirements of global networking, integrated business processes, agility in responding to the market, intelligent decision-making and support of supply-chain management, customer relationship management and e-commerce features must be met and some of the main benefits of e-business: (1) reducing operating costs of business and its processes and avoiding consumption,(2) increasing market opportunity (Faster access to the market and customer trends), (3) fast access to customer: enabling them to access the information about products or services they need at any time (7/24), (4) elimination of processing errors, (5) strengthening internal management, supply chain management: provide uninterrupted (continuous) supply chain, (6) reduction of sales cycle, (7) increasing visibility, (8) communication improvement, and (9) predicting the fall in the probable life curve of product. The difficulty and high cost of transformation and change, and especially high expectation of performance lead to certain challenges in e-business. The main challenges in e-business are: (1) determining customer’s changing needs, (2) organizational structure, (3) the high speed of the development of IT, (4) Integration of the front and back-end sytems of the organization, (5) a lack of quality human resources, (6) the complexity of ensuring security, (6) growing competition, (7) effective and efficient customer service (high availability, ease of use, personalized systems), (8) high quality Access, and (9) expensive infrastructure of information system. The correct answer is Choice D.
8.Soru
I. one-to-one (1:1)
II. one-to-zero (1:0),
III. many-to-many (N:M)
Which of the cardinality ratios stated above are true for a binary relationship?
Only I |
Only II |
I and II |
I and III |
I, II and III |
For a binary relationship, cardinality ratio can be one of the following
options: one-to-one (1:1), one-to-many (1:N), many-to-one (N:1) and many-to-many (N:M).
9.Soru
What does IRC stand for?
Internet Ray Chat |
Internet Relay Chat |
Internet Relax Chat |
In Relay Chatting |
In Relax Chatting |
Internet Relay Chat (IRC) is a protocol that facilitates synchronous communication in the form of text. It allows several users to chat with each other simultaneously.
10.Soru
Which of the following features are not used via words processor?
Insert footnotes |
Find and replace terms |
Reviewing and editing spreadsheets |
Place a header and footer at the top and the bottom of a page |
Use different fonts (character design), font size (character scale), and font style (character appearance such as bold, italic and underline) |
Text related tasks such as composing, editing, formatting, and printing of text documents are carried out by word processor. Furthermore, word processing software allows users to
• change margins
• insert footnotes
• find and replace terms
• place a header and footer at the top and the bottom of a page
• use different fonts (character design), font size (character scale), and font style (character appearance such as bold, italic and underline).
11.Soru
Which one below is NOT one of the computer network types?
Personal Area Network |
Local Area Network |
Limited Area Network |
Metropolitan Area Network |
Wide Area Network |
Ranging from small to large, computer networks can be classified into
four primary groups:
I. Personal Area Network
II. Local Area Network
III. Metropolitan Area Network
IV. Wide Area Network
12.Soru
"This step is related to providing the appropriate format of data to be usedfor further processes. It is the formatting process of the data including copying,sorting, grouping, or arranging it in a more convenient way for input. Verification of the collected data is handled in this stage." Which stage is mentioned above?
analyze |
process |
store/retrieve |
display |
organize |
Organize: This step is related to providing the appropriate format of data to be used for further processes. It is the formatting process of the data including copying, sorting, grouping, or arranging it in a more convenient way for input. Verification of the collected data is handled in this stage.
13.Soru
Which of the below is a passive attack that listens to a network in order to capture sensitive information like session tokens, usernames, passwords, and confidential information?
Spoofing |
Man-in-the-middle |
Denial of Service |
Man in the browser |
Eavesdropping |
Eavesdropping is a kind of passive attack that listens to a network in order to capture sensitive information like session tokens, usernames, passwords, and confidential information. In order to prevent eavesdropping attacks, strong encryption services should be used in data transmission.
14.Soru
Which of the following is data about other data or catalog for a data?
Classification |
Prediction |
Mining associations |
Mining clusters |
Metadata |
Metadata is generally referred as data about other data or catalog for a data. It describes, identifies, explains, manages, and uses a data resource.
15.Soru
In what year 100 Gigabit Ethernet standard was ratified?
1980 |
1990 |
2005 |
2010 |
2015 |
100 Gigabit Ethernet standard was ratified in 2010. D is the correct answer.
16.Soru
Which one below is not an advantage of data management?
It minimizes damage caused by errors related with data. |
It creates opportunities for redundancy and loss in data. |
It allows organizing, tracking, deleting, creating, and reporting data. |
It helps decision-makers to make strategic decisions by allowing mining and analyzing data. |
It provides mechanisms to become data into an accessible, reliable, authentic and complete form. |
Managing data is important and provides some advantages described as follows:
- It provides mechanisms to become data into an accessible, reliable, authentic and complete form.
- It provides mechanisms to securely share data between information technology systems, applications, departments or employees for an enterprise.
- It helps decision-makers to make strategic decisions by allowing mining and analyzing data.
- It allows organizing, tracking, deleting, creating, and reporting data.
- It disallows redundancy and loss in data.
- It minimizes damage caused by errors related to data.
The correct option is B.
17.Soru
Which of the following is not an example for a browser?
Firefox |
Safari |
Microsoft Edge |
Google Chrome |
|
A browser is a software to connect to the Internet (WorldWideWeb) and displayWeb pages. Several browser implementations, such as Firefox, Safari and Microsoft Edge are listed in Table 2.5. Each Web page is distinguished and accessed by its Uniform Resource Locator (URL), which is a human-memorable address used to locate resources on the Internet. For example, to access e-Campus Web site of the Anadolu University, https:// ekampus.anadolu.edu.tr is entered in the address bar of a browser. Here, the address should be easy to remember by humans. The correct answer is E.
18.Soru
Which of the following is an unguided media used for data transmissions?
Microwave |
Fiber |
Unshielded Twisted Pair |
Coaxial Cable |
Shielded Twisted Pair |
Unguided media (often called unbounded or wireless media) is the type of transmission media that sends the data through the air. Only Radio Wave is an unguided media type. Other ones are guided medias. Therefore, the correct answer is A.
19.Soru
In the concept of DIKW, for what the letter W stands?
Wide |
Wisdom |
White |
Whole |
Web |
DIKW can be also summarized as follows. If data is characterized as recorded facts, then information is the set of patterns, or expectations underlying the data. Knowledge can be described as the accumulation of the set of expectations and wisdom as the value attached to knowledge. In the abbreviation W stands for Wisdom.
20.Soru
Which of the below is a feature of application software when compared to system software?
Close to system |
More interactive |
Smaller in size |
Difficult to manipulate |
Fast in speed |
Application softwares are easy to understand though they are bigger in size.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ