Information Technologies Final 11. Deneme Sınavı
Toplam 20 Soru1.Soru
What does URL stand for?
Unified resource Location |
Unity Recall Location |
United Resource Location |
Uniform Resource Locator |
Unified Resource Locator |
Each Web page is distinguished and accessed by its Uniform Resource Locator (URL), which is a human-memorable address used to locate resources on the Internet.
2.Soru
Which information processing step is related to the transfer of data and information within the system or between the systems?
Collect |
Organize |
Analyze |
Process |
Transmit/Receive |
Transmit/Receive: This step is related to the transfer of data and information within the system or between the systems.
3.Soru
"... creates an environment that allows its programmer to open a certain channel on the system, allowing the attacker to monitor or control the infected user’s system."
Which one of the following is the best appropriate term for the given gap?
A spam |
An antivirus |
A worm |
A Trojan horse |
A virus |
A Trojan horse creates an environment that allows its programmer to open a certain channel on the system, allowing the attacker to monitor or control the infected user’s system. Correct answer is D.
4.Soru
"Raw, unorganized facts and concepts which need to be processed" is the definition for:
Data. |
Information. |
Wisdom. |
Knowledge. |
Erudition. |
Data can be referred as raw, unorganized facts and concepts which need to be processed. Information is organized, categorized, contextualized data. Data becomes meaningful with information. Information needs to be analyzed especially for making strategic decisions. Information does not need to be useful. Knowledge is simply defined as useful information. Wisdom is related with judging which knowledge is true and applying it to real life.
5.Soru
Which of the following accurately defines financial transactions taking place during e-business processes?
Electronic funds transfer. |
Electronic data interchange. |
E-business. |
E-commerce. |
ERP. |
If any financial transaction takes place during e-business processes, this process is defined as e-commerce rather than e-business.
6.Soru
What type of e-commerce model are we dealing with if government begins transaction and the seller business sends an acknowledgement?
Business-to-Government. |
Government-to-Business. |
Government-to-Consumer. |
Consumer-to-Business. |
Business-to-Business. |
Business-to-Government is a type of e-commerce model where the one side of exchange is businesses and the other side of exchange is government. Businesses use the Internet for transactions with public sector or any other governmental services. Businesses may sell products or services to public sector.
7.Soru
Which of the following is not the IT platform that modern business looks for?
Fault tolerant technologies |
Data replication capabilities |
Remote diagnostics |
Remote system administration |
Hacking the websites |
Modern business looks for the IT platform that provides Integrated enterprise applications designed for high availability, reliability, and scalability, Redundant hardware and networking capa- bilities, Fault tolerant technologies, Data replication capabilities, Disaster resilient technologies, Remote system administration, Remote diagnostics and more secure environment with respect to user authentication, intrusion detection, secure transactions. Hacking is the unlawful part of coding, so it is not listed in modern business requirements.
8.Soru
What is the difference between e-commerce and e-business?
E-business is the exchange of documents between computer systems of business partners while e-commerce is the electronic transfer of money from one bank account to another via computer-based systems. |
They have the exact same meaning and can be used interchangeably. |
There is only one e-commerce model (B2C) but there are two e-business models (B2C) and (C2B). |
E-commerce is a subset of e-business that happens if a financial transaction takes place during e-business processes. |
In e-business the two sides of exchange are businesses while in e-commerce one side of exchange is businesses and the other side of exchange is consumers. |
E-business is the usage of the Internet for different kinds of business processes. So, the scope of e-business is not restricted with financial transactions. We can think that e-commerce is basically a subset of e-business. If any financial transaction takes place during e-business processes, we call this process as e-commerce rather than e-business.
9.Soru
'Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information' is the definition for:
Security rules. |
Security breach. |
Adversary. |
Security. |
Encryption. |
Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information is called adversary.
10.Soru
_______________is the ability to store and process very large amounts of data, in the order of the petabyte.
Artificial Intelligence |
Virtual Reality |
Big Data |
Database |
Internet of Things |
Te Big data is the ability to store and process very large amounts of data,
in the order of the petabyte. FaceBook®, for example, manages a database on the order of 100 peta bytes which is equal to 100 millions of bytes of information. We are talking about the number 100 followed by 15 zeros: 100.0000 .... 0000 ... etc.
11.Soru
The exchange of documents between computer systems of business partners using a standard electronic format is called:
E-commerce. |
E-business. |
Electronic data interchange. |
Electronic funds transfer. |
ERP |
Electronic data interchange (EDI) is the exchange of documents between computer systems of business partners using a standard electronic format.
12.Soru
Which of the following terms is defined as “a non-physical property concerning creations of the human mind that is used in commerce”?
Invention |
Intellectual property |
Acceptable use of policy |
Industrial designs |
Trademarks |
Since the information regarded as a commodity, intellectual property rights refer to the legal rights given to the inventor or creator to protect and fully benefit from his/her own work or investment in a certain period of time. Also, countries have laws to protect and promote the intellectual property because of its contribution to economic and social improvements.
13.Soru
Which one is a disadvantage of cloud systems?
Confidentiality and data security |
Secure servers |
Cost effectiveness |
Mobility |
Backup and disaster recovery |
Confidentiality and data security: the data is hosted outside the company. The provider offering the service hosts the data of the user company. This can pose a potential risk to the company to see its data misused or stolen. It is, therefore, a matter of ensuring that the provider has sufficient security and proposes a policy of confidentiality regarding the user’s data.
14.Soru
Which of the following merges data from different sources such as databases, data flats etc. into a compatible data store?
Data cleaning |
Data integration |
Data mining |
Visualization |
Tasking relevant data |
Data integration merges data from different sources such as databases, data flats etc. into a compatible data store.
15.Soru
Which of the following is protected by Industrial property rights and copyrights?
Industrial designs |
Cultural Heritage |
Personal belongings |
People's private information |
State secrets |
Considering The Convention Establishing the World Intellectual Property Organization (1967), the following are protected by Industrial property rights:
• inventions, industrial designs,
• trademarks, service marks, commercial
names and designations,
• protection against unfair competition,
and the following are protected by copyrights
• literary, artistic and scientific works,
• performances of performing artists, phonograms
and broadcasts;
• paintings and sculptures, films and technology-
based works (computer programs
and electronic databases).
16.Soru
The function of the purchase module in ERP systems is to:
Handle the processes related to procurement of items that are required for organizations. |
Allow an organization to track the sales processes in an efficient way |
Maintain the items of inventory and their movements regardless of the size of organizations. |
Coordinate all supply activities of an organization. |
Gather financial data and generate reports, such as overall balance sheets and quarterly financial statements. |
Purchase module handles the processes related to procurement of items that are required for organizations. This module contains information about suppliers for various items. Efficient operations about purchase processes help cost savings for manufacturing organizations.
17.Soru
Which of the following is among the possibilities that analysis of big data offers?
To better understand the future of nanotechnology |
To better examine the history of technology |
To better understand the inclinations of users |
To better understand the causes of social change |
To better understand the relevant infrastructure for the future |
The analysis of big data makes it possible first of all to better understand the inclinations of users, to better understand their modes of use of services and to refine the offer.
18.Soru
Which equation is true about the risk in a computer security?
Risk = assets + threats |
Risk = asset+ (treats x vulnerabilities) |
Risk = assets + treats + vulnerabilities |
Risk = assets x treats x vulnerabilities |
Risk = assets - (treats x vulnerabilities) |
A risk in a computer security can be anything on the computer that may harm or copy the data, or allow one to access the computer without anyone’s knowledge. Simply, risk is the intersection of assets, threats, and vulnerabilities.
19.Soru
Which of the following is not among the main benefits of e-business?
Elimination of processing errors. |
Strengthening internal management. |
Supply chain management. |
Increasing operating costs of business. |
Reduction of sales cycles. |
The main benefits of e-business: • Reducing operating costs of business and its processes and avoiding consumption, • Increasing market opportunity (Faster access to the market and customer trends), • Fast access to customers: enabling them to access the information about products or services they need at any time (7/24), • Elimination of processing errors, • Strengthening internal management, • Supply chain management: Provide uninterrupted (continuous) supply chain, • Reduction of sales cycles, • Increasing visibility, • Communication improvements, • Predicting the fall in the probable life curve of product.
20.Soru
Which of the followings represents the knowledge discovery from data (KDD) steps in its correct order?
I. Data mining
II. Visualization
III. Data collection
IV. Data processing
V. Pattern evaluation
VI. Data warehousing
VII. Tasking relevant data
III-IV-VI-VII-I-V-II |
VI-V-II-III-I-IV-VII |
VII-II-I-V-III-VI-IV |
I-II-V-IV-III-VI-VII |
IV-III-II-VI-V-VII-I |
KDD is a collection of seven steps:
- Data collection
- Data processing
- Data warehousing
- Tasking relevant data
- Data mining
- Pattern evaluation
- Visualizing
Therefore, the correct option is A.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ