Information Technologies Final 7. Deneme Sınavı
Toplam 20 Soru1.Soru
Which of the following is defined as a collection of related data?
Database |
Database management system |
Stored data |
Data mining |
Data bank |
A database (DB) is defined as a collection of related data.
2.Soru
Which of the following is patentable?
Mathematical theories |
Inventions |
Discoveries |
Plant varieties |
Animal varieties |
Mathematical theories, discoveries, plant and animal varieties cannot be patentable. The correct answer is B.
3.Soru
Which of the following is NOT among the advantages of cloud technologies?
Applicability |
Back up and Disaster Recovery |
Storage and Scalability |
Cost Effectiveness |
Mobility |
The advantages of the cloud technologies:
• Storage and Scalability: No more infrastructure investment or time spent adding new servers and storage units. With the cloud, you basically have access to unlimited storage capacity and scalability.
• Backup and Disaster Recovery: Most cloud providers across types of services and platforms offer comprehensive backup and recovery capabilities.
• Mobility: Your cloud everywhere. Whether it is a development platform, suite of office tools or customized content management system, cloud mobility allows access data with a web connection.
• Cost effectiveness: Aside from storage and infrastructure costs, just think of all the other costs you can minimize cloud computing services: updating and managing software or applications, hiring and training new members of staff and even a reduction in the cost of energy on the spot.
4.Soru
which of the below measures is used in the storage of Big Data?
Petabyte |
Gigabyte |
Megabyte |
Kilobyte |
Byte |
The Big data is the ability to store and process very large amounts of data, in the order of the petabyte.
5.Soru
Which of the following is NOT among the precautions one can take to protect a computer based system from malicious software?
User passwords should be very strong so that no unauthorized entity is able to enter the system
|
Check applications installed on the system periodically, remove unused programs from the system
|
Install the earliest and first versions of the programs on the system
|
Check the entries of users entering the system and change your password policy so that strong password usage is required. |
Monitor incoming traffic to your system and intercept unauthorized system access. |
- User passwords should be very strong so that no unauthorized entity is able to enter the system;
- Check applications installed on the system periodically, remove unused programs from the system;
- Install the latest updates of the programs on the system;
- Check the entries of users entering the system and change your password policy so that strong password usage is required;
- Monitor incoming traffic to your system and intercept unauthorized system access;
6.Soru
'Consumer sends a request to businesses for a product or service and then businesses make a bid. Then, consumer decides where the product or service will be bought from' describes which type of e-commerce model?
B2B |
B2C |
C2B |
C2C |
B2G |
C2B is a type of e-commerce model where the one side of exchange is consumers and the other side of exchange is businesses. In C2B e-commerce model, they may be two different approaches. In the first approach, consumers may sell its products or services to businesses. In the second approach, the transactions are initiated by consumers. Consumer sends a request to businesses for a product or service and then businesses make a bid. Then, consumer decides where the product or service will be bought from.
7.Soru
In which of the following e-commerce models both sides of exchange are consumers providing an opportunity to sell assets via the Internet?
Business to Consumer |
Business to Business |
Consumer to Consumer |
Consumer to Business |
Business to Government |
Consumer to Consumer is type of e-commerce model where the two sides of exchange are both consumers. This model provides an opportunity to consumers to sell their assets via the Internet. These assets can be anything such as their previously used electronic devices and books. A transaction takes place directly between two consumers.
8.Soru
Which one of the following elements is not among the advantages of cloud technologies?
mobility |
cost effectiveness |
disaster recovery |
storage |
data security |
The advantages of the cloud technologies:
- Storage and Scalability: No more infrastructure investment or time spent adding new servers and storage units. With the cloud, you basically have access to unlimited storage capacity and scalability.
- Backup and Disaster Recovery: Most cloud providers across types of services and platforms offer comprehensive backup and recovery capabilities.
- Mobility: Your cloud everywhere. Whether it is a development platform, suite of office tools or customized content management system, cloud mobility allows access data with a web connection.
- Cost effectiveness: Aside from storage and infrastructure costs, just think of all the other costs you can minimize cloud computing services: updating and managing software or applications, hiring and training new members of staff and even a reduction in the cost of energy on the spot.
- The servers that hold the data of the companies are more secure than the main computers of the companies, because they take security measures 7/24 as software and hardware.
9.Soru
Which of the following best completes the following sentence?
"___________ is a legal term used to describe the rights that creators have over their original literary and artistic works."
Trademark |
Brand |
Privacy |
Copyright |
Industrial Design |
Copyright, which is referred to authors’ rights, is a legal term used to describe the rights that creators have over their original literary and artistic works. The domain of copyright covers literary works, such as scientific articles and books, artistic works and creations such as music, painting and sculpture, and technology-based works, which are databases, and computer programs
10.Soru
What describes the ability of a system to maintain its function under a given set of conditions for a certain period of time?
Security |
Reliability |
Adversary |
Security breach |
Security rules |
Reliability is the ability of a system to maintain its function under a given set of conditions for a certain period of time.
11.Soru
Which of the following word pairs best complete the sentence below?
"The most important fact that accelerates the evolution of human beings is undoubtedly the __________ and ___________ of information shared during communication."
exchange / termination |
deprivation / dedication |
calculation / animation |
proliferation / production |
accumulation / utilization |
The most important fact that accelerates the evolution of human beings is undoubtedly the accumulation and utilization of the information shared during communication.
12.Soru
Which of the followings is a more representative example of risk of using less secure connections?
Restriction of reaching information |
Being exposed to more radiation |
Feeling lonely |
Revealing financial information |
Being monitored by the government |
Using less secure connections may help a hacker steal our sensitive financial information on the Internet such as on the shopping websites, gaming websites, etc. This includes credit card information, personal information, etc.
13.Soru
Which of the following statements relating to information technologies in business is true?
E-business refers to online-only business entities. |
E-commerce is a subset of e-business. |
E-commerce encompasses the concept of e-business. |
The introduction of POS devices at physical stores is a result of e-business. |
E-commerce has enabled larger corporations to dominate small businesses, thereby cornering their markets. |
E-business is the broader term referring to all business processes, while e-commerce mainly refers to the commercial aspect of e-businesses and may therefore be considered a subset of e-business.
14.Soru
Which application below is not a web browser?
Safari |
Internet Explorer |
Chrome |
Firefox |
Windows |
Some of the most common browsers are Google Chrome, Mozilla Firefox, Internet Explorer, and Safari. Types of Windows are operating systems. Therefore, the correct answer is E.
15.Soru
What does asset in computer security refer to?
Any data, device, or any confidential resource that the computer possesses. |
An action or possible event to violate the security of the system. |
A flaw in a computer system that can leave it open to possible malicious attacks. |
Prevention of the disclosure of information to unauthorized persons. |
A service that provides proof of the integrity and the origin of data. |
In computer security, any data, device, or any confidential resource that the computer possess is evaluated as an asset of the computer system which needs to be protected with security tools. Simply, an asset can be considered what it is aimed to be protected from malicious events or attacks
16.Soru
Which of the following is the correct definition of Integrity?
Prevention of the disclosure of information to unauthorized persons. |
It defines a service that provides proof of the integrity and the origin of data. |
Prevention of unauthorized detention of information or resources |
Prevention of the modification of information by unauthorized persons |
Prevention of the transaction of information by unauthorized people. |
• Confidentiality: Prevention of the disclosure of information to unauthorized persons.
• Integrity: Prevention of the modification of information by unauthorized persons.
• Availability: Prevention of unauthorized detention of information or resources.
• Non-repudiation: It defines a service that provides proof of the integrity and the origin of data.
17.Soru
According to UNESCO, which of the following should NOT serve as a basis for knowledge societies?
nepotism based on knowledge |
freedom of expression |
universal access to information and knowledge |
respect for cultural and linguistic diversity |
quality education for all |
By taking into account the rapid evolution of technology in last three decades, UNESCO (United Nations Educational, Scientific and Cultural Organization) has been working on to establish knowledge societies, which are based on the following:
• freedom of expression,
• universal access to information and knowledge,
• respect for cultural and linguistic diversity,
• quality education for all.
18.Soru
I. Use strong passwords
II. Stay away from the latest updates of the programmes
III. Check e-mails from unknown senders
IV. Monitor incoming traffic to your system
Which ones are among the ways to avoid security threats?
I and II |
II and III |
I,III and IV |
III and IV |
I and IV |
- User passwords should be very strong so that no unauthorized entity is able to enter the system;
- Check applications installed on the system periodically, remove unused programs from the system;
- Install the latest updates of the programs on the system;
- Check the entries of users entering the system and change your password policy so that strong password usage is required;
- Monitor incoming traffic to your system and intercept unauthorized system access;
- Control remote access to the system and use a strong access infrastructure;
- Install powerful security software that includes your computer’s versatile and secure firewall;
- Keep your operating system and Internet browsers up-to-date;
- Do not open e-mails from someone you do not know;
- Do not download, install or run programs that you do not know on your computer;
- Pay attention to free software, they can open security vulnerabilities;
- Take care to use licensed software;
- Make sure to back up your important data to another memory;
- Install up-to-date antivirus programs;
- Do not click unknown links or attachments;
- Keep in your mind that sending data through via unencrypted wireless is easy for attackers to get your data;
- Remember that use “https” URL.
19.Soru
Which e-commerce model allows consumers to determine their needs while businesses compete to meet those needs by offering competitive prices?
B2C |
C2C |
B2G |
C2B |
B2B |
When consumers either sell their products or services to businesses, or they initiate a transaction by requesting certain products or services from a business, these transactions follow the consumer to business model of e-commerce.
20.Soru
Which of the following can be protected by patent?
A best-seller music cd |
A new paint from a well-known artist |
A new mobile payment system design |
A best-seller book |
A new movie from a well-known director |
The answer is C
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ