Information Technologies Final 2. Deneme Sınavı
Toplam 10 Soru1.Soru
Which of the following describes the ability of a system to maintain its function for a certain period of time?
Security |
Reliability |
Adversary |
Security breach |
Security rules |
Reliability describes the ability of a system to maintain its function under a given set of conditions for a certain period of time. Therefore, the correct answer is B.
2.Soru
Which of the following terms refers to a software or hardware failure or incompleteness which could result in a breach of access in computer security?
Security |
Security rules |
Security breach |
Reliability |
Adversary |
In general, the definition of securityn breach is as follows:
It is a software or hardware failure or incompleteness which could result in a breach of access in computer security. Therefore, the correct answer is C.
3.Soru
What type of switched network is used in telephone networks?
What type of switched network is used in telephone networks?
Channel |
Information |
Packet |
Message |
Curcuit |
Telephone network is a typical example of a circuit switched network. In other words, the telephone line exchanging voice signals is isolated from all other lines, which means a reserved bandwidth is guaranteed for a phone call.
4.Soru
What does RFID stand for?
Remote Fast Internet Direction |
Radio Frequency Internet Directory |
Radio FrequencyIdentification |
Real Fast Internet Definition |
Read Fast Internet Directory |
The name of the Internet of Things (IoT) has been introduced by Kevin Ashton, who is a British technology pioneer, working on Radio Frequency Identification (RFID), and with this term, he imagined connecting the real world and internet with radio frequencies through a sensor system anywhere.
5.Soru
Authentication is the process of how one proves that they are who they claim that they are. According to the given expression which one of the following can not be used as authentication?
fingerprint |
username |
password |
driver's license |
smart card |
Username is not a way of proving that a person who he/she claims that he/she is. Username is the identification process. Using password, authentication can be provided. Another type of authentication is showing something about one’s identity, such as a national identity card, driver’s license, and smart card. One can also authenticate using biometrics. When someone uses his/her biometrics, he/she must first identify himself/herself then submit his biometric information such as a fingerprint or an iris scan. Correct answer is B.
6.Soru
"Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information."
Which term does the above definition define?
Adversary |
Security |
Reliability |
Security rules |
Security breach |
Adversary: Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information.
7.Soru
Who developed the AI (Artificial Intelligence) technology?
Albert Einstein |
Michael Faraday |
Steve Wozniak |
Alan Turing |
Nikola Tesla |
Artificial Intelligence (AI) is a new and rapidly evolving technology, first developed in 1950 by Alan Turing, the author of the famous Turing Test (first conversation between human and Artificial Intelligence).
8.Soru
_________________is the science that deals with how to create intelligent machines, and found in the possibilities offered by information technology and the most practical way possible to achieve a similar result.
Augmented reality |
Artificial Neural Network |
Artificial Intelligence |
Database |
Computer learning |
By combining the terms of “artificial” and “intelligence” together, we assume to find the definition of artificial intelligence. However, there is no single definition of artificial intelligence and there is not even a broad consensus among researchers and information on how it can be defined, because the concept includes a large amount of topics ranging from pure computer science to neurology, through studies on how our brain works. In general we can say: the AI is the science that deals with how to create intelligent machines, and found in the possibilities offered by information technology and the most practical way possible to achieve a similar result.
9.Soru
Which of the followings is not a drawback of code of ethics in business
Taking into account a common set of core values and beliefs |
Some statements are not meaningful |
They may cause unethical behaviors |
Breaking a code is not a crime in itself |
Losing some of it customers or clients |
Code of ethics is a written document that describes the key ethical issues of organizations, companies, and groups. In addition to these, it provides important principles and values to guide their employees or members in decision making process.
10.Soru
Which of the following means the process of claiming user, group or system’s identity.
Identification |
Authentication |
Authorization |
Phishing |
Spoofing |
Identification is the process of claiming user, group or system’s identity.