Information Technologies Final 3. Deneme Sınavı
Toplam 20 Soru1.Soru
Which of the followings is not a focus of UNESCO?
Freedom of expression |
Universal access to information and knowledge |
Giving proper credit for intellectual property |
Respect for cultural and linguistic diversity |
Quality education for all |
Giving proper credit for intellectual property is one of the more general considerations as stated in the ACM code of ethics while the other options are UNESCO’s focus.
2.Soru
Which one below is can be regarded as an exception to copyright protection?
Quoting the date of th work |
Use of works for the purpose of news reporting |
Quoting tables, and figures |
Providing the source of the quotation |
Quoting from a protected work |
Violation of copyright is called as copyright
infringement, which occurs when someone copies a
substantial and material part of another’s copyrighted
work without permission. However, there are some
exceptions to copyright protection. For instance,
• quoting from a protected work, provided
that the source of the quotation and
the name of the author are mentioned,
and that the extent of the quotation is
compatible with fair practice;
• use of works by way of illustration for
teaching purposes;
• use of works for the purpose of news
reporting.
3.Soru
Which one below is not among one of the certain requirements that an invention needs to have to be considered as patentable?
Appeal |
Clear presentation |
Novelty |
Applicability |
Patentable subject |
An invention can be patentable if and only
if it satisfies some certain requirements, which
differ from a country to the others. However, the
following can be considered as general conditions
of an invention to be patentable:
• Subject; the subject of the invention must
be in a scope of patentable subjects, which
are described by national laws.
• Applicability; the invention must have a
practical application for industrial or agricultural
purposes
• Novelty; the invention must be new, its
contribution in the technical field should
be beyond to the state-of-art,
• Inventive step; The invention must not
be obvious, the proposed solution to the
considered problem could not be reduced
by someone with average knowledge of
the technical field
Presentation of the invention; The invention
must be clearly and completely
described while applying for a patent.
4.Soru
I. Confidentiality
II. Non-repudiation
III. Availability
IV. Integrity
Which ones are among the principle goals of security?
I and II |
II and III |
I,II and III |
I,III and IV |
II,III and IV |
In information technology, there are three principle goals of security (1) confidentiality, (2) integrity, and (3) availability of information.
5.Soru
Which of the following term refers to any group or force that may intentionally infringe on the integrity, confidentiality and availability of information?
Security |
Reliability |
Adversary |
Security rules |
Security breach |
In general, the definition of an adversary is as follows:
Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information. Therefore, the correct answer is C.
6.Soru
Which of the following is NOT true about the characteristics of current information technologies?
IT is often understood as an application computing machines in certain networks. |
IT makes use of communication protocols by using routers and other network devices. |
IT makes it possible for millions of computers to exchange, store, receive, and transmit data. |
Cloud technology within IT requires physical use of storage disks. |
Thanks to IT, millions of people can make a Skype, meeting, shop, communicate, and find virtual friends. |
IT is often understood as application of computing machines in certain networks, some of which provide communication protocols by using routers and other network devices in order to ensure that millions of computers can exchange, store, transmit, and receive data. That is, millions of people can make a skype meeting, shop, communicate, find virtual friends whenever they connect the network. In addition, by one of the recent improvements in IT, called as cloud technology, we can store and share any type of data such as photos, which may need a large space in sense of Giga bytes instead of using physical storage disks. These opportunities have facilitated and simplified our life.
7.Soru
Which one below is not protected by Industrial property rights basd on Considering The Convention Establishing the World Intellectual Property Organization (1967)?
Inventions |
Industrial designs |
trademarks |
Service marks |
Novelty |
Intellectual property is often classified as an
industrial property and copyright. Considering The
Convention Establishing the World Intellectual
Property Organization (1967), the following are
protected by Industrial property rights:
• inventions, industrial designs,
• trademarks, service marks, commercial
names and designations,
• protection against unfair competition,
and the following are protected by copyrights
• literary, artistic and scientific works,
• performances of performing artists, phonograms
and broadcasts;
• paintings and sculptures, films and technology-
based works (computer programs
and electronic databases).
8.Soru
Which of the following is not a direct consequence of protection of intellectual property?
Increasing the number of patent applications. |
Economical growth |
Opening new faculties in administrative science |
Appearance of new industries |
Enhance in the life quality and enjoyment of life. |
The answer is C.
9.Soru
Which of the following is "Electronic funds transfer" definitions?
EFT |
EDI |
ERP |
EPR |
ERS |
Electronic funds transfer (EFT): EFT is the electronic transfer of money from one bank account to another via computer-based systems without the direct intervention of bank staff.
10.Soru
How many sections does the ACM code of ethics have?
1 |
2 |
3 |
4 |
5 |
ACM code of ethics consists of four sections, however, the first section and third one address the ethical considerations, where, compared to third section, the first one takes into account the more general moral considerations.
11.Soru
What does AR stand for?
Virtual Reality |
Agricultural Reality |
Agreeable Reality |
Anger Readiness |
Augmented reality |
Augmented Reality (Augmented Reality, AR), allows you to superimpose computer-generated images to the real ones, increasing the information content (think of the famous Robocop movie, where the hero drew the world’s information and the right people through data that were stacked to view).
12.Soru
Which one of the following disadvantages of the cloud technologies is related to the ability to outsource the IT power to a specialized provider?
compatibility |
mobility |
control and reliability |
data security |
confidentiality |
Control and Reliability: The biggest fear of cloud computing lies in its main advantage - the ability to outsource the IT power to a specialized provider.
13.Soru
Which of the following acronyms is not an e-commerce model?
ERP |
B2C |
G2C |
B2B |
C2C |
ERP is an acronym for enterprise resource planning, while the other available choices are acronyms for e-commerce models such as business to consumer and business to business.
14.Soru
I. If John encrypts a message with his private key both July and Mary can decrypt the message.II. If John encypts a message with Mary's public key, July can decrypt the message.III. If John takes a message encrypted by his public key, he think that the message is sent by July.There is a communication channel between John, Mary ang July. Each of the participiants has a key pair in which one of the keys is public and the other one is private. Which one of the above expressions is / are definitely true?
Only I |
Only II |
I and III |
II and III |
I and II |
Since each of the participiants has a key pair in which one of the keys is public and the other one is private, the communication between participiants are provided with public key cryptography. Data encrypted by the private key can only be decrypted by its public key counterpart. Data encrypted with a public key can only be decrypted with its private key. If John encrypts a message with his private key both July and Mary can decrypt the message. Because they know John's public key. If John encypts a message with Mary's public key, only Mary can decrypt the message. If John takes a message encrypted by his public key, the message may be sent by either Mary or July because both of them know John's public key. Correct answer is A.
15.Soru
Which of the following accurately summarizes the relationship between e-business, e-commerce and the Internet?
Businesses wishing to expand their sales portfolio developed commerce methodologies that would allow them to provide goods and services through the Internet. |
The rise of internet technologies led to businesses transforming their regular business models into e-commerce practices. |
Businesses established solely on the Internet led to the rise of e-commerce, while traditional businesses followed suit. |
E-business is the use of the Internet for different business processes, including e-commerce, which is the sale and purchase of goods and services over the Internet. |
E-business refers to electronically based financial transactions while e-commerce is the commercial sale of goods and services. The internet encompasses both distinct terms. |
E-business is the use of the Internet for all kinds of business processes, and thus includes e-commerce. As a subset of e-business, e-commerce entails selling and buying products over the Internet. The internet, or internet technologies provide the infrastructure at the core of both e-commerce and e-business.
16.Soru
Which of the following does the definition below match?
"a union between the real and the virtual image: the real image, in essence, are superimposed virtual details that complement each other, thus creating a unique environment."
Immersive Virtual Reality |
Artificial Intelligence |
Not Immersive Virtual Reality |
Augmented Reality |
Machine Learning |
The augmented reality can be defined as a union between the real and the virtual image: the real image, in essence, are superimposed virtual details that complement each other, thus creating a unique environment. Precisely, in augmented reality, you can integrate the actual image with a series of virtual products such as videos and 3D animations, audio or multimedia elements, and much more. The Augmented reality is a technology that allows you to “multiply” our experience of reality through visual indicators.
17.Soru
___________________is a computer infrastructure mainly dedicated to the needs of a single organization.
Public cloud |
Hybrid cloud |
iCloud |
Private Cloud |
Artificial Intelligence |
Private Cloud: Te “private cloud” is a computer infrastructure (network of connected computers to provide services) mainly dedicated to the needs of a single organization. They are located and controlled either by companies’ IT department or third party services (in the traditional form of hosting server), to have a precise control on data. Te private clouds can be compared to traditional data centers.
18.Soru
Which of the following software is a protocol that facilitates synchronous communication in the form of text and allows several users to chat each
other simultaneously?
Internet Relay Chat |
Instant Messenger |
Electronic Mail |
Media Player |
Browser |
Internet Relay Chat (IRC) is a protocol that facilitates synchronous communication in the form of text. It allows several users to chat each
other simultaneously.
19.Soru
Which of the following best refers to an action or possible event to violate the security of the system by exploiting known or unknown vulnerabilities?
Asset |
Threat |
Vulnerability |
Risk |
Spam |
The definition given in the question is known as the threat definition.
Threat: It is an action or possible event to violate the security of the system by exploiting known or unknown vulnerabilities (weak points in the security of the system). Threats can be the source of natural events, accidents, or intentional attacks to harm the computer system. Simply, a threat can be considered what it is aimed to be protected against. Therefore, the correct answer is B.
20.Soru
Which one of the following refers to a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people?
Reliability |
Adversary |
Security |
Availability |
Risk |
Security is a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people. Correct answer is C.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ