Information Technologies Final 1. Deneme Sınavı
Toplam 20 Soru1.Soru
What is booting?
Installing Hardware |
Creating a software |
Running a program |
Starting a computer |
Shutting a computer |
Booting is the process of starting or restarting a computer.
2.Soru
Which of the following is an example for a B2B e-commerce model?
The relationship between the manufacturer, wholesaler, and retailer. |
The relationship between a company and it's customers. |
The feedback that customers provide regarding their e-commerce experience to a business. |
Consumers conducting their own business with each other through an intermediary. |
The electronic transaction of exchanging funds. |
B2B, or business to business is an e-commerce model in which both sides of the exchange are businesses. Therefore the manufacturer, wholesaler, and retailer are all businesses which have a B2B relationship with each other.
3.Soru
What is the main step in KDD?
Data collection |
Data preprocessing |
Data mining |
Data warehousing |
Pattern evaluation |
Data mining is the main step in KDD process and discovers data patterns from various data repositories. Data mining functionalities specify the type of data for data mining tasks. The correct option is C.
4.Soru
Which of the following is NOT among the features of Trojan Horse?
Trojan horses may not have visible damages on the system. |
Trojan horses open a TCP or UDP port. |
Trojan horses can take screenshots of the computer or format the hard disk. |
Trojan horses mainly have two components called servers and clients. |
Trojan horses automatically copy themselves from one computer to another. |
Worms automatically copy themselves from one computer to another.
5.Soru
Which of following is one of C2C e-commerce model?
eBay |
Alibaba.com |
Amazon.com |
Priceline.com |
Hepsiburada.com |
Alibaba.com is a well-known B2B e-commerce website and companies can perform various transactions via this website. Amazon.com was one of the first companies using B2C e-commerce model in worldwide and a widely known example to B2C e-commerce companies in Turkey is Hepsiburada. While eBay is one of the widely known C2C e-commerce companies in worldwide, Sahibinden.com and GittiGidiyor can be
given as examples to C2C e-commerce companies in Turkey. However, Priceline.com can be given as an example to websites using C2B e-commerce model.
6.Soru
Which of the following is the computer unit that can be simply defined as the unit where data/information processing is carried out?
Memory |
CPU |
Keyboard |
I/O Units |
Printer |
CPU can be simply defined as the unit where data/information processing is carried out.
7.Soru
Which of the following can be found among the code of ethics developed by ACM?
Focus on only personal development |
Pursue the goal at all costs |
Honor confidentiality |
Respect the elderly |
Honor your relatives |
ACM code of ethics consists of four sections, however, the first section and third one address the ethical considerations, where, compared to third section, the first one takes into account the more general moral considerations, which can be summarized as below:
• Contribute to society and human wellbeing.
• Avoid harm to others.
• Be honest and trustworthy.
• Be fair and take action not to discriminate.
• Honor property rights including copyrights
and patent.
• Give proper credit for intellectual property.
• Respect the privacy of others.
• Honor confidentiality.
8.Soru
Which one of the following virtual reality types is immersive when it is able to create a sense of sensory immersion in three-dimensional computer generated?
Immersive Virtual Reality |
Not Immersive Virtual Reality |
Augmented Reality |
Artificial Intelligence |
Cloud Computing |
Immersive Virtual Reality (IVR): It defines immersive when it is able to create a sense of sensory immersion in three-dimensional computer generated. This feeling is enhanced by the ability to interact in real time with the objects depicted in the virtual space.
9.Soru
Which of the below passwords is a strong password having the necessary features?
Eskisehir26 |
esk26532 |
Esk26/542 |
123456esk |
0000 |
One has to use regularly updated operating system and security software on the computer. However,
one important thing is to use a strong password that has the following features:
• The password should be a minimum of 9-12 characters
• At least two-digit numbers
• At least one upper case letter
• At least one special symbol character
10.Soru
Which of the following may be considered as an example of a fundamental shift in e-commerce models by an e-business?
Amazon starting to sell it's own branded products and services. |
eBay allowing businesses to open virtual stores on their site. |
Amazon entering the music streaming service. |
eBay acquiring Craigslist. |
Sahibinden allowing the sale of services such as financial consulting and translation on their site. |
eBay has primarily followed the consumer to consumer model, and allowing businesses to offer their goods and services on the site indicates a shift towards the business to consumer model.
11.Soru
"The invention must not be obvious, the proposed solution to the considered problem could not be reduced by someone with average knowledge of the technical field."
Which of the following concepts does the statement above explain?
Subject |
Applicability |
Novelty |
Inventive step |
Presentation of the invention |
Inventive step; The invention must not be obvious, the proposed solution to the considered problem could not be reduced by someone with average knowledge of the technical field. The correct answer is D.
12.Soru
What of the terms is defined as “a sign, or a combination of signs used to distinguish product or service of a company from those of another”?
Industrial design |
Acceptable use of policy |
Invention |
Copyright |
Trademark |
A trademark is a sign, or a combination of signs, that is used to distinguish product or service of a company from those of another. Trademarks perform four main functions:
- Identify and differentiate the products of one company from those of other companies
- Distinguish products from a given source from identical or similar products from other sources.
- Refer to a particular quality of the product for which a mark is used
- Promote the marketing and sale of products, and the marketing and provision of services.
13.Soru
What is the difference between EFT and EDI?
EFT is software to better manage e-commerce and e-business while EDI is the electronic exchange of data. |
EFT is commercial enterprise software while EDI is open source software. |
EFT is the electronic transfer of money while EDI is the electronic exchange of documents using a standard electronic format. |
EFT is the technological infrastructure of all e-commerce and EDI is the data interchange format used for electronic communication on the Internet. |
EDI allows various modules of ERP software to communicate with each other while EFT allows banks to process monetary transactions between businesses. |
EFT (electronic funds transfer) is the electronic transfer of money from one bank account to another without the direct intervention of bank staff. EDI (electronic data interchange) is the exchange of documents between computer systems of business partners using a standard electronic format.
14.Soru
Which one of the followings can come to the empty place in the sentence?
A code of ethics often finds place in business organizations and it is often developed to ______.
negatively affect all stakeholders, for instance, end-user of products, customers/clients, |
depreciate the public’s confidence and respect to the management's decision. |
complicate the responsibilities of the professionals’ to the society. |
assist education of the member of profession at whom the code is directed. |
support only professionals. |
A code of ethics often finds place in business organizations and it is often developed to positively affect all stakeholders, for instance, end-user of products, customers/clients, employees of the firms, current and future supporter of projects; enhance the public’s confidence and respect to the managements’ decision; clarify the responsibilities of the professionals’ to the society; and assist education of the member of profession at whom the code is directed. The correct answer is D.
15.Soru
Which of the following is NOT one of the four words used to describe Big Data?
Volume |
Variety |
Value |
Valve |
Speed |
It is possible to describe Big Data in four
words
• Volume: Big Data represents large amounts of data. It is generally said that 90% of the data available today have been created in the last two years.
• Speed: Data is generated, captured and shared at ever faster speeds Data and data delays are always shorter and are most often processed in real time or near real time.
• Variety (or heterogeneity): the analyzed data are not necessarily structured. They can come from different sources (and have a different format, such as text, images, multimedia content, digital traces, etc.) and can be combined. Data stored in an internal customer file can be combined with external data from social networks, search engines, official notice sheets or open data portals managed by public authorities.
• Value: the last characteristic is the added value that the analysis of the data represents and the usages that can be made of it.
16.Soru
Which of the layers found in the OSI reference model delivers data across network connections?
Physical Layer |
Presentation Layer |
Network Layer |
Transport Layer |
Data Link Layer |
Transport Layer delivers data across network connections. It provides message segmentation, message acknowledgment, session multiplexing, and message traffic control. The right answer is D.
17.Soru
The specialized type of spam that attempts to trick you into entering one’s confidential, personal or account information is called:
Phishing. |
Spoofing. |
Authorization. |
Encryption. |
Decryption. |
Phishing is a specialized type of spam that attempts to trick you into entering one’s confidential personal or account information for many different purposes including violating his/her account and identity theft or fraud.
18.Soru
In information technology, which of the following is not one of the principle goals of security?
Confidentiality. |
Security breach. |
Integrity. |
Availability of information. |
Non-repudiation. |
In information technology, there are three principle goals of security (1) confidentiality, (2) integrity, and (3) availability of information.In addition to those three important goals, non-repudiation is also important. Meanwhile security breach is a software or hardware failure or incompleteness which could result in a breach of access in computer security.
19.Soru
Which of the followings is the main reason for the case that a company monitors their workers’ use of the Internet and restricts their accessibility to the Internet?
Being exposed to less radiation |
Increased feeling of loneliness |
Technical problems |
Protection from terrorist attacks |
Violation of privacy rights |
Considering the fact that all citizens have the right to communicate and reach information guaranteed by law, the situation above is most probably about limiting the right to communicate violating privacy rights.
20.Soru
The Internet presents significant new challenges for protecting the right to privacy. Which ones below are among the challanges for protecting the right to privacy because of the Internet?
I The internet results in new types of personal information
II The internet simplifies the collection of location of personal information
III The internet introduces new capacities for government and private actors to analyse personal information
IV The Internet has become widespread around the world
V The Internet introduces new opportunities for commercial use of personal information
I, II, III
|
II, III, IV
|
I, II, III, IV
|
I, II, III, V
|
II, III, IV, V |
The Internet presents significant new challenges for protecting the right to privacy. The most important
ones are summarized as follows.
Results in the collection of new types of personal information. The recent improvements in
science made the usage of finger and iris-scanning technologies very popular. They may be used
to secure identification to prevent fraud by retailers, to identify voters in election, however, such
question may arise who will control storage and usage of such a huge data.
Simplifies the collection of location of personal information; for instance, each device has a
unique IP address while connecting to the Internet, therefore, it is not difficult to trace them.
• Introduces new capacities for government and private actors to analyse personal information;
Since the advances in processor technology and cloud, it is not difficult to use vast quantities of
information compared to past. Once the information is collected, for instance, by using finger
and iris-scanning technologies, it can be cheaply and efficiently stored, consolidated and analysed.
• Introduces new opportunities for commercial use of personal information. There exists numerous
services provided by these companies are free and their business models rely on collecting
user information, and, then, using it for marketing purposes.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ