Information Technologies Final 9. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

Which one of the following is an output operation?


Keyboard

Speaker

Change

Scanner

USB Flash Drive


2.Soru

Which element of an ERP system is responsible for tracking order placement, order scheduling, shipping, invoicing and pricing information?


Sales module.

Purchase module.

Production planning module.

Inventory module.

Finance module.


3.Soru

Which of the following is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source.


Identification

Authentication

Authorization

Phishing

Spoofing


4.Soru

What is the primary difference between commercial ERP software solutions such as Oracle ERP and open source software such as ERPNext?


They differ in country of origin.

They differ in scope of ability.

They encompass different modules.

Large companies are only allowed to use commercial software.

Open source software solutions are usually free.


5.Soru

Which one(s) of the followings does an office suite include?
I. A word processor
II. A portable document format
III. A spreadsheet application


I and II

I and III

II and III

Only I

Only III


6.Soru

What is a small and permanent software programmed into a read-only memory called?


Device driver

Hardware

Firmware

Software

Kernell


7.Soru

Which of the following is among the general conditions of an invention to be patentable? 


Necessity

Novelty

Goal

Team effort

Rewarding


8.Soru

Which of the following is not one of the precautions that should be taken to protect a computer based system from malicious software?


Check applications installed on the system periodically.

Try to download only free software, as they are better controlled and more reliable.

Make sure to back up your important data to another memory.

Install the latest updates of the programs on the system.

Install powerful security software that includes your computer’s versatile and secure firewall.


9.Soru

Which one of the following variables is related to the perception of this magnitude can be very different depending on the situations in which a person is to find and what is happening around the observer?


space

time

interaction

environment

output


10.Soru

Which of the following is the correct definition for Security Breach


It is a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people.

It is a software or hardware failure or incompleteness which could result in accessing the computer security.

Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information.

It describes the ability of a system to maintain its function under a given set of conditions for a certain period of time.

Necessary regulations to keep the computer secure from malicious attacks.


11.Soru

"The invention must be new, its contribution in the technical field should be beyond to the state-of-art"
Which of the following concepts does the statement above explain?


Subject

Applicability

Novelty

Inventive step

Presentation of the invention


12.Soru

Which of the following is a comprehensive software solution for business processes?


E-Commerce

E-Business

Enterprise Resource Planning

Supply Chain Management

B2C


13.Soru

Which of the following factors does not affect the ERP software choice of companies?


requirements of companies

licence price of ERP software

hardware requirements

cost of integration

 cost of delivery


14.Soru

"A web site informs its users about the risk of losing some of their confidential data." Considering the possible actions of risk management, given action may be an example of which of the following?


Eliminating the risk

Transferring the risk

Accepting the risk

Rejecting the risk

Mitigating the risk


15.Soru

What creates an environment that allows its programmer to open a certain channel on the system, allowing the attacker to monitor or control the infected user’s system?


Trojan horse

Virus

Worm

Spyware

Spam


16.Soru

What are malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network, affecting the speed of the computer and/or causing the computer to crash called?


Viruses

Spyware

Worms

Trojan horse

Software


17.Soru

What is the network of smart devices that can communicate and interact with their external environment?


Internet of interaction

Internet of things

Internet for people

Things have internet

Things and the internet


18.Soru

Which of the following means preventing information from being changed by unauthorized persons?


Confidentiality

Integrity

Availability

Repudation

Non-repudation


19.Soru

Which of following is one of C2B e-commerce model?


Priceline.com

Amazon.com

Alibaba.com

Hepsiburada.com

Sahibinden.com


20.Soru

Which of the followings is different from the others?


Honoring confidentiality

Forbidding to use someone’s computer

Demeaning individuals or groups

Considering the physical safety of all workers

Considering the human dignity of all workers