Information Technologies Final 5. Deneme Sınavı
Toplam 20 Soru1.Soru
"In order to process big data, _______ is one of the most reliable tools which was run by Apache Software Foundation and Google file system based on the Map Reduce principle."
Which words completes the sentence best?
Cloud |
NoSQL |
QR code |
RFID |
Hadoop |
The power of Big Data is based on a revolutionary technology which involves Massively parallel processing, real-time data management, techniques to diminish the effects of system failures which is systematic redundancy of data in Big Data. In order to process big data, Hadoop is one of the most reliable tools. Hadoop is an Open Source project run by Apache Software Foundation and Google File System based on the Map Reduce principle. The correct option is E.
2.Soru
Which of the following e-business establishments started out by selling books online?
Sahibinden.com |
GittiGidiyor.com |
eBay |
Craigslist |
Amazon.com |
Amazon.com was founded in 1994 by Jeff Bezos, and was established as an online bookselling business. He believed that most people would take the risk of online buying for a product such as a book.
3.Soru
Which organization has proposed a code of ethics against the misuse and abuse of technology in 2011?
WHO (World Health Organization) |
UNICEF (United Nations Children's Fund) |
UNESCO (United Nations Educational, Scientific and Cultural Organization) |
WWF (World Wildlife Fund) |
UN (United Nations) |
A code of ethics for the information society has been proposed by an intergovernmental programme of UNESCO in 2011. The correct answer is C.
4.Soru
Which of following is one of C2C e-commerce model?
Sahibinden.com |
Alibaba.com |
Amazon.com |
Hepsibuarada |
Priceline.com |
Alibaba.com is a well-known B2B e-commerce website and companies can perform various transactions via this website. Amazon.com was one of the first companies using B2C e-commerce model in worldwide and a widely known example to B2C e-commerce companies in Turkey is Hepsiburada. While eBay is one of the widely known C2C e-commerce companies in worldwide, Sahibinden.com and GittiGidiyor can be
given as examples to C2C e-commerce companies in Turkey. However, Priceline.com can be given as an example to websites using C2B e-commerce model.
5.Soru
What is violation of copyright called?
Copyright infringement |
Copyright protection |
Copyright rules |
Copyright laws |
Copyright domain |
Violation of copyright is called as copyright infringement, which occurs when someone copies a substantial and material part of another’s copyrighted work without permission.
The correct answer is A.
6.Soru
Which system enables people to work on the same document in different places and devices?
IoT |
Database |
Cloud |
Hadoop |
MapReduce |
The cloud also allows the use of complex services without necessarily having advanced hardware and staff to plan or manage the system. The interest is to access its data from any computer connected to the Internet and to synchronize them on several devices. The user can freely access his documents without worrying about the machine he uses. For example; you are in the office and write the first pages of a report from any word processing software on your desktop. Simply upload your work to the cloud and log on to the cloud from your personal computer to quietly pursue your report without having to install the software in question. The correct option is C.
7.Soru
I. Confidentiality
II. Availability
III. Integrity
IV. Privacy
Which of the above are the goals of security?
II ve III |
I ve IV |
II, III and IV |
I, II and III |
I, III and IV |
There are three important goals of security as confidentiality, availability and integrity. Privacy can not be shown among the goals of security. Correct answer is D.
8.Soru
"The invention must have a practical application for industrial or agricultural purposes."
Which of the following concepts does the statement above explain?
Subject |
Applicability |
Novelty |
Inventive step |
Presentation of the invention |
Applicability; the invention must have a practical application for industrial or agricultural purposes. The correct answer is B.
9.Soru
Which category of business model does bidding for large infrastructure projects such as bridges and tunnels fall under?
Business to consumer. |
Government to consumer. |
Government to business. |
Business to government. |
Government to citizen. |
Large infrastructure projects involve businesses using the internet for transactions with the public sector and governmental services. As such, this transaction follows the business to government model.
10.Soru
Which of the following is the definition of e-mail phishing?
Unsolicited bulk e-mail messages. |
A specialized type of spam that attempts to trick you into entering one’s confidential personal information for identity theft or fraud. |
A forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source. |
Malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network. |
Malicious software that sends important personal information of the user and the actions taken by the user on the computer to the malicious persons without the knowledge of the user. |
Pishing is a specialized type of spam that attempts to trick you into entering one’s confidential personal information for identity theft or fraud. Therefore, the correct answer is B.
11.Soru
I. Classification
II. Clustering
III. Mining frequent patterns and associations, predictions, outlier analysis Which of the statements stated above are the purpose of data mining?
Only I |
Only III |
I and III |
II and III |
I, II and III |
Data mining is used with purpose of classification, clustering, mining frequent patterns and associations, predictions, outlier analysis and so on.
12.Soru
Which of the following is true regarding public key cryptography?
It uses only one key. |
It does not require any secure communication channel to send or receive ciphertext. |
Public key cryptographic algorithms are faster than symmetric key cryptographic algorithms. |
Public key cryptography is mainly classified as block ciphers and stream ciphers. |
Data encrypted with a public key can also be decrypted with a public key. |
In public key cryptography, there is no key distribution problem since public key can be accessible to everyone. For this reason, public key cryptography does not require any secure communication channel to send or receive ciphertext.
13.Soru
- Literary works
- Sculptures
- Industrial designs
Which of the given above is protected by copyrights?
Only II |
I & II |
I & III |
II & III |
I, II & III |
The following are protected by copyrights:
- literary, artistic and scientific works
- performances of performing artists, phonograms and broadcasts
- paintings and sculptures, films and technology-based works (computer programs and electronic databases).
The correct answer is B.
14.Soru
Which one of the following RTF systems with several sensors, have greater storage capacity, have a processing capacity or be able to communicate over a network?
passive objects |
smart cities |
environmental solutions |
active objects |
smart home |
Active objects can be equipped with several sensors, have greater storage capacity, have a processing capacity or be able to communicate over a network. Those are the devices for collecting, storing, transmitting and processing data from the physical world. The most common hardware for those active objects are embedded systems. An embedded system is a complex system that integrates software and hardware designed together to provide specific functionality.
15.Soru
Which of the followings is not among the actions most copyright laws state that authors or other right owners can authorize or prevent for the sake of protection of the intellectual property?
reproduction of the work |
distribution of copies of the work |
public performance of the work |
use of works by way of illustration for teaching purposes |
adaptation of the work |
For the sake of protection of the intellectual property, most copyright laws state that authors or other right owners can authorize or prevent: reproduction of the work; distribution of copies of the work; public performance of the work; broadcasting of the work to the public; translation of the work into other languages; adaptation of the work. However, there are some exceptions to copyright protection like use of works by way of illustration for teaching purposes. The correct answer is D.
16.Soru
I.exchange, store, transmit, and receive data II.make a skype meeting III.find virtual friends IV. shop Which one/s of the above are among the advantages emerged out of ITs?
I and II |
II and III |
I, II and III |
I, II and IV |
I, II, III and IV |
IT is often understood as application of computing machines in certain networks, some of which provide communication protocols by using routers and other network devices in order to ensure that millions of computers can exchange, store, transmit, and receive data. That is, millions of people can make a skype meeting, shop, communicate, find virtual friends whenever they connect the network. The correct answer is E.
17.Soru
Which of the following terms is defined as the transformation of key business processes through the use of Internet technologies?
e-business |
e-commerce |
e-company |
e-organization |
e-software |
E-business can be defined as the usage of the Internet technologies to enhance business processes. E-business is the transformation of key business processes through the use of Internet technologies.
18.Soru
Which of the following is not one of the various e-commerce models that categorize e-commerce systems based on the nature of transactions or relationship between participants?
Consumer to Government |
Consumer to Consumer |
Business to Government |
Government to Consumer |
Business to Business |
As the end-user, consumers are not usually on the providing end of commercial transactions, with consumer to consumer e-commerce being an exception. As such, consumer to government e-commerce is not a recognized e-commerce model.
19.Soru
Which of the following is not true about data?
Extracting knowledge from data is valuable since raw data are converted into useful form. |
Data is valuable when they are analyzed and used for gaining useful information. |
Data can be grouped as qualitative data and quantitative data. |
The only way to collect data is to do it explicitly. |
Data include raw, unorganized facts and concepts which need to be processed. |
Data can be referred as raw, unorganized facts and concepts which need to be processed. Information is organized, categorized, contextualized data. Data becomes meaningful with information. Information needs to be analyzed especially for making strategic decisions. Information does not need to be useful. Knowledge is simply defined as useful information. Wisdom is related with judging which knowledge is true and applying it to real life.
Data can be grouped as qualitative data and quantitative data. Quantitative data can be referred as data in numerical form whereas qualitative data can be referred as data different than numerical form. A quantitative or numeric data can be continuous or discrete. A continuous data can be any value from the specified range. A discrete data can be any one of the specified discrete numerical values. Qualitative data or categorical data can be grouped as nominal data and ordinal data. Unlike nominal data, categories are in certain orders in ordinal data.
Data can be collected explicitly or implicitly. Explicitly collecting data includes the ways which data is gained directly such as questionnaires, votes etc. Tracking user behaviors, keeping click through rate of a web site are some of the ways of implicitly collecting data.
Data is valuable when it is analyzed and used for gaining useful information. Thus, data needs to be managed in order to define, identify, describe, modify, destroy, mine, report data and so on. Data management includes topics such as data defining, data architecture management, data quality management, master data management, metadata management, database management, data warehousing, reporting and so on.
Extracting knowledge from data is extremely valuable since raw data is converted into useful, interesting form.
20.Soru
Which of the following is IBM's definition of e-business?
E-business is the transformation of a business from a physical entity to an online presence. |
E-business is organizations conducting the act of e-commerce. |
E-business is the transformation of key business processes through the use of Internet technologies. |
E-business is the usage of Internet technologies to enhance business processes. |
E-business is the use of Internet technologies to conduct business practices and commerce. |
IBM defines e-business as the transformation of key business processes through the use of Internet technologies.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ