Information Technologies Final 10. Deneme Sınavı
Toplam 20 Soru1.Soru
Which of the followings is not one of the eight functional modules of ERP system?
customer relationship management |
human resource management |
supply chain management |
delivery management |
production planning |
ERP system has 8 functional modules. The names of these modules are finance, customer relationship management (CRM), human resource management (HRM), supply chain management (SCM), inventory, purchase, production planning, and sales. These
are some common modules which exist in many ERP systems. Delivery management is not one of the ERP system modules.
2.Soru
Which of following is the Business-to-Business?
B2C |
B2B |
B1B |
C2C |
C2B |
Business-to-Business (B2B)
Business-to-Consumer (B2C)
Consumer-to-Consumer (C2C)
Consumer-to-Business (C2B)
Business-to-Government (B2G)
Government-to-Business (G2B)
Government-to-Consumer (G2C)
3.Soru
Which of the following is NOT a condition for an invention to be patentable?
Subject |
Novelty |
Applicability |
Good intention |
Inventive step |
The following can be considered as general conditions of an invention to be patentable:
- Subject
- Applicability
- Novelty
- Inventive step
- Presentation of the invention
The correct answer is D.
4.Soru
Which of the following is true regarding hardware and software security?
Viruses are spread only through diskettes and CDs. |
The Trojan horse infection method to the computer is completely different from the virus infection method. |
Worms are malicious software designed to automatically copy itself from one computer to another. |
It is not possible to insert malicious functions into a hardware component. |
If the software has been engineered with a great care, there do not remain any security vulnerabilities. |
The most dangerous and relatively easy to spread viruses are network based viruses, named as worms. Worms are malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network, affecting the speed of the computer and/or causing the computer to crash.
5.Soru
Which of the following is true about symmetric cryptography?
It is slower. |
It uses two keys. |
Private key is disseminated to everyone. |
It requires a secure communication channel to send or receive ciphertext. |
There is only one form of symmetric key cryptography. |
Block ciphers are symmetric cryptographic algorithms. They are faster algorithms than public key cryptographic algorithms. It uses only one key, that is, the same key is used when encrypting a message or decrypting a ciphertext. However, for block ciphers, sender requires securely transferring the key to the receivers.
There are different types of symmetric key cryptography. It is mainly classified as block ciphers and stream cipher. A stream cipher generally adds the plaintext digits with a pseudorandom cipher stream that is called key stream.
6.Soru
"_________is the process of how one proves that they are who they claim that they are."
Which word below completes the above definition?
Authorization |
Identification |
Cryptography |
Authentication |
Spoofing |
Authentication is the process of how one proves that they are who they claim that they are.
7.Soru
Which of the following e-commerce companies have components such as browsing, searching, reviews and contents, secure credit card payment, high level of customer service?
HRM |
Amazon.com |
e-Bay |
ERP |
SCM |
Some of the key components of Amazon.com are as follows:
• Browsing;
• Searching;
• Reviews and content;
• Secure credit card payment;
• High level of customer service.
The initial concept of Amazon.com was to create a virtual bookshop on its website.
8.Soru
E-mails that attempt to trick you into entering one's confidenital personal or account information is called _____.
Spams |
Spoofing |
Asset |
Vulnerability |
Phishing |
Phishing is a specialized type of spam that attempts to trick you into entering one’s confidential personal or account information for many different purposes including violating his/her account and identity theft or fraud.
9.Soru
What is the process of how one proves that they are who they claim that they are?
Identification |
Authentication |
Phishing |
Decryption |
Authorization |
Authentication is the process of how one proves that they are who they claim that they are. When one claims to be “Ahmet San” by logging into a computer as “ahmetsan”, the computer system will most likely ask him for a password. He has claimed to be that person by entering the name into the username field. This part is the identification process. However, now he must prove that he is really that person. This is the authentication part. Almost all user access control systems require a password.
10.Soru
Which one of the following is not one of the precautions to protect a computer from malicious software?
Make sure to back up your important data to another memory |
Open e-mails from someone you do not know |
Install up-to-date antivirus programs |
Check applications installed on the system periodically, remove unused programs from the system |
Monitor incoming traffic to your system and intercept unauthorized system access |
Opening e-mails from someone you do not know may harm your computer security. Correct answer is B.
11.Soru
Which of the following uses uniform resource locators to function?
Operating system. |
Office suites. |
Internet Relay Chat. |
Web browsers. |
Central processing units. |
A Uniform Resource Locator (URL) is a human memorable address used to locate resources on the Internet. As such, web browsers use URLs to access each web page.
12.Soru
Which of the followings aims at establishing knowledge societies different from the others?
ACM |
UNESCO |
IEE-CS |
AITP |
INSEIT |
UNESCO has been working on to establish knowledge societies while the others are international organizations on IT.
13.Soru
What is a server?
A CPU |
Storage disks |
Gamer computers |
Powerless Computers |
Powerful Computers |
Going into tangible services when we say “cloud” we are talking about servers (more powerful computers) controlled by a software which provides the computing capacity (CPU) and storage (disks); the services provided are automatically deployed (usually at the decision of the same software) among all available servers and in case of necessity new servers can be easily added to increase the overall system capacity.
14.Soru
Which of the following statements is not true about ERP software?
It aims to meet the needs of an organization for its business process flow. |
It must take into account the business processes in the organization. |
It must incorporate all the functions of an organization. |
It must manage the organization's connections with its stakeholders. |
It must finance the chain management system and decide the delivery times. |
ERP is a type of software solution that aims to meet the needs of an organization for its business process flow. It must take into account the business processes in the organization and incorporate all the functions of an organization. It must also manage the organization’s connections with its outside stakeholders. So, it is possible to say that ERP integrates all departments and functions across a company into a single computer system.
15.Soru
Which module in ERP systems allows the company to maintain information on employees?
Finance Module. |
Customer Relationship Management Module. |
Supply Chain Management Module. |
Production Planning Module. |
Human Resource Management Module. |
HRM module in ERP systems allows the Human Resources Department Staff to maintain information on employees. It is designed to maximize employee performance depending on employers’ strategic objectives. HRM module can be used to track some functions like payroll, administration, and hiring.
16.Soru
Which of the following is not main functions of trademarks?
Identify and differentiate the products of one company from those of other companies. |
Distinguish products from a given source from identical or similar products from other sources. |
Refer to a particular quality of the product for which a mark is used. |
Promote the marketing and sale of products, and the marketing and provision of services. |
Prepare brochures explaining how to use the products. |
The answer is E. Preparing brochures explaining how to use the products is not main function of trademarks.
17.Soru
Which of the following feature is the salient feature of application softwares?
Close to system |
Fast in speed |
Bigger in size (requires large storage space) |
Generally written in low-level language |
Difficult to understand |
Salient feature comparison of application software versus system software
System Software Application Software
Close to system Close to user
Fast in speed Slow in speed
Difficult to design Easy to design
Difficult to understand Easy to understand
Less interactive More interactive
Smaller in size Bigger in size (requires large storage space)
Difficult to manipulate Easy to manipulate and use
Generally written in low-level language Generally written in high-level language
18.Soru
Which of the following does the definition below match?
"One of the core areas of artificial intelligence (AI) and deals with the implementation of systems and algorithms that are based on observations as data for the synthesis of new knowledge (inductive reasoning)."
Immersive Virtual Reality |
Augmented Reality |
Not Immersive Virtual Reality |
Artificial Intelligence |
Machine Learning |
The machine learning is one of the core areas of artificial intelligence (AI) and deals with the implementation of systems and algorithms that are based on observations as data for the synthesis of new knowledge (inductive reasoning). Learning can take place by capturing characteristics of interest from examples, data structures or sensors, to analyze and evaluate the relationships between the observed variables.
19.Soru
"Merging data from different sources such as databases, data flats etc. into a compatible data store."
Which of the following data preprocessing phase requires the given definition?
Data transformation |
Data reduction |
Data integration |
Data cleaning |
Discretization and generating concept |
Data integration: Data integration merges data from different sources
such as databases, data flats etc. into a compatible data store.
20.Soru
What is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source?
Spam |
Phishing |
Spoofing |
Asset |
Threat |
Spoofing is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source. E-mail spoofing is used in phishing and spam since people are more likely open such e-mails when they think the e-mail has a legitimate source. More generally, spoofing is impersonating someone to trick you into doing something malicious.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ