Information Technologies Final 9. Deneme Sınavı
Toplam 20 Soru1.Soru
Which one of the following is an output operation?
Keyboard |
Speaker |
Change |
Scanner |
USB Flash Drive |
Printer, monitor, projector, and speaker are output operations.
2.Soru
Which element of an ERP system is responsible for tracking order placement, order scheduling, shipping, invoicing and pricing information?
Sales module. |
Purchase module. |
Production planning module. |
Inventory module. |
Finance module. |
The sales module allows an organization to track sales processes efficiently, assisting functions such as order placement, scheduling, shipping and invoicing. Item prices are maintained within this module.
3.Soru
Which of the following is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source.
Identification |
Authentication |
Authorization |
Phishing |
Spoofing |
Spoofing is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source.
4.Soru
What is the primary difference between commercial ERP software solutions such as Oracle ERP and open source software such as ERPNext?
They differ in country of origin. |
They differ in scope of ability. |
They encompass different modules. |
Large companies are only allowed to use commercial software. |
Open source software solutions are usually free. |
Open source software allows for the modification of the source code of the program, which means each and every user may modify the software for their own use. This also means that since the source code is not locked down, most open source software is free.
5.Soru
Which one(s) of the followings does an office suite include?
I. A word processor
II. A portable document format
III. A spreadsheet application
I and II |
I and III |
II and III |
Only I |
Only III |
A typical office suite includes/bundles all the software tools/packages required to get office work (collaboration, editing tools, and design) done
quickly and efficiently. In general, an office suite includes the following application software:
• A word processor
• A spreadsheet application
• A presentation software
Therefore, the correct option is B.
6.Soru
What is a small and permanent software programmed into a read-only memory called?
Device driver |
Hardware |
Firmware |
Software |
Kernell |
Firmware is a small and permanent software programmed into a read-only memory.
A device driver is a system software that operates or controls a particular hardware device (e.g., graphic card, printer, scanner, etc.) that is connected to a computer. It allows a computer to communicate with these internal or external peripheral devices.
Software is a set of instructions that enables the user to interact with a computer, its hardware, or perform tasks. Software is designed to enable a computer to perform a well-defined function.
The correct answer is C.
7.Soru
Which of the following is among the general conditions of an invention to be patentable?
Necessity |
Novelty |
Goal |
Team effort |
Rewarding |
The following can be considered as general conditions of an invention to be patentable:
• Subject; the subject of the invention must be in a scope of patentable subjects, which are described by national laws.
• Applicability; the invention must have a practical application for industrial or agricultural purposes
• Novelty; the invention must be new, its contribution in the technical field should be beyond to the state-of-art,
• Inventive step; The invention must not be obvious, the proposed solution to the considered problem could not be reduced
by someone with average knowledge of the technical field
• Presentation of the invention; The invention must be clearly and completely described while applying for a patent.
8.Soru
Which of the following is not one of the precautions that should be taken to protect a computer based system from malicious software?
Check applications installed on the system periodically. |
Try to download only free software, as they are better controlled and more reliable. |
Make sure to back up your important data to another memory. |
Install the latest updates of the programs on the system. |
Install powerful security software that includes your computer’s versatile and secure firewall. |
One important precaution to protect a computer based system from malicious software is to pay attention to free software as they can open security vulnerabilities.
9.Soru
Which one of the following variables is related to the perception of this magnitude can be very different depending on the situations in which a person is to find and what is happening around the observer?
space |
time |
interaction |
environment |
output |
The process of interaction with virtual objects actually happens, but obviously can not be compared to what happens in the real world. In order to achieve certain results must be provided with a graphical user interface (representing the virtual world) and, in particular, three main variables should be handled:
Space: This element can be changed at will. This possibility is the fact that it is a simulated environment and not the real space.
Time: the perception of this magnitude can be very different depending on the situations in which a person is to find and what is happening around the observer.
Interaction: environments and situations are not static but are generated depending on the user behavior, which is a protagonist of the events.
10.Soru
Which of the following is the correct definition for Security Breach?
It is a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people. |
It is a software or hardware failure or incompleteness which could result in accessing the computer security. |
Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information. |
It describes the ability of a system to maintain its function under a given set of conditions for a certain period of time. |
Necessary regulations to keep the computer secure from malicious attacks. |
Security: It is a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people.
• Reliability: It describes the ability of a system to maintain its function under a given set of conditions for a certain period of time.
• Adversary: Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information.
• Security rules: Necessary regulations to keep the computer secure from malicious attacks.
• Security breach: It is a software or hardware failure or incompleteness which could result in accessing the computer security.
11.Soru
"The invention must be new, its contribution in the technical field should be beyond to the state-of-art"
Which of the following concepts does the statement above explain?
Subject |
Applicability |
Novelty |
Inventive step |
Presentation of the invention |
Novelty; the invention must be new, its contribution in the technical field should
be beyond to the state-of-art. The correct answer is C.
12.Soru
Which of the following is a comprehensive software solution for business processes?
E-Commerce |
E-Business |
Enterprise Resource Planning |
Supply Chain Management |
B2C |
Enterprise Resource Planning software is a software solution that integrates all business departments into a single software solution, including subdivisions and functions such as supply chain management.
13.Soru
Which of the following factors does not affect the ERP software choice of companies?
requirements of companies |
licence price of ERP software |
hardware requirements |
cost of integration |
cost of delivery |
Various factors may affect the ERP software choice of companies. These factors may be related to requirements of companies, licence price of ERP software, hardware requirements, cost of integration, cost of maintenance, and cost of software consultancy. The size of companies and industry they included help determining their requirements. As it is valid for many software solutions, big companies require more professional and sophisticated software solutions.
14.Soru
"A web site informs its users about the risk of losing some of their confidential data." Considering the possible actions of risk management, given action may be an example of which of the following?
Eliminating the risk |
Transferring the risk |
Accepting the risk |
Rejecting the risk |
Mitigating the risk |
Possible actions in risk management is eliminating or mitigating risk, assigning risk to a third party or transferring risk and accepting risk. Suppose that the risk management has same set of actions for a computer based system that is connected to the Internet. There are numerous vulnerabilities in such a system so that malicious intruders can harm the system. Thus, the risk in this system is very high especially if the data is sensitive. To eliminate the risk, employing strong security primitives, e.g., installing an antivirus program, enabling a firewall and using trusted hardware and software will help to mitigate the risk. Again, transferring this risk to a third party is possible. Security can be guaranteed by a secure network service provider. For some situations, the system has to accept the risk since some websites provides minimal security that might lead a potential data loss or harm. Correct answer is C.
15.Soru
What creates an environment that allows its programmer to open a certain channel on the system, allowing the attacker to monitor or control the infected user’s system?
Trojan horse |
Virus |
Worm |
Spyware |
Spam |
Trojan horses can be considered as a kind of spyware. The Trojan horse infection method to the computer is very similar to the virus infection method.
Opening a link that comes by an e-mail or downloading a file from internet that we are not sure of its security of the source and opening it result in with infecting our computer with a Trojan. But contrary to viruses, Trojan horses may not have visible damages on the system. Te most obvious thing that Trojan horses do on a computer is to open a TCP or UDP port, which
allows another malicious entity to reach the entire system through these ports.
16.Soru
What are malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network, affecting the speed of the computer and/or causing the computer to crash called?
Viruses |
Spyware |
Worms |
Trojan horse |
Software |
Worms are malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network, affecting the speed of the computer and/or causing the computer to crash.
17.Soru
What is the network of smart devices that can communicate and interact with their external environment?
Internet of interaction |
Internet of things |
Internet for people |
Things have internet |
Things and the internet |
The Internet of Things (IoT) is the network of smart devices that can communicate and interact with their external environment. A smart car that can calculate the shortest route to a destination is an example of an IoT scheme.
18.Soru
Which of the following means preventing information from being changed by unauthorized persons?
Confidentiality |
Integrity |
Availability |
Repudation |
Non-repudation |
Confidentiality can be defined as: Prevention of the disclosure of information to unauthorized
persons. Therefore, the correct answer is A.
19.Soru
Which of following is one of C2B e-commerce model?
Priceline.com |
Amazon.com |
Alibaba.com |
Hepsiburada.com |
Sahibinden.com |
Alibaba.com is a well-known B2B e-commerce website and companies can perform various transactions via this website. Amazon.com was one of the first companies using B2C e-commerce model in worldwide and a widely known example
to B2C e-commerce companies in Turkey is Hepsiburada. While eBay is one of the widely known C2C e-commerce companies in worldwide, Sahibinden.com and GittiGidiyor can be given as examples to C2C e-commerce companies in Turkey.
However, Priceline.com can be given as an example to websites using C2B e-commerce model.
20.Soru
Which of the followings is different from the others?
Honoring confidentiality |
Forbidding to use someone’s computer |
Demeaning individuals or groups |
Considering the physical safety of all workers |
Considering the human dignity of all workers |
Honoring confidentiality is an example of the ACM code of ethics in more general terms, but the other options are directly related to more specific rules of using information technology.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ