Information Technologies Ara 10. Deneme Sınavı
Toplam 20 Soru1.Soru
I. Memory management
II. Device management
III. Power management
Which ones listed above are among the characteristics of operating systems?
Only I |
Only II |
Only III |
I and II |
I and III |
The most prominent characteristics of Operating Systems can be summarized as follows:
• Memory Management
• Processor Management
• File Management
• Device Management
• Protection and Security
Therefore, the correct option is D.
2.Soru
Data that describes core entities for an enterprise such as customers, assets, employees and so on is called:
Data architecture. |
Metadata. |
Master data. |
Data housing. |
Database. |
Master data is a data that describes core entities for an enterprise such as customers, assets, employees and so on. Master data management is a set of tasks, such as governing, controlling master data and so on. Master data management provides sharing data among departments and employees.
3.Soru
Which of the followings gathers similar objects which do not have a class label?
Mining of Frequent Patterns |
Class/Concept Description |
Mining Associations |
Mining Correlations |
Mining Clusters |
Mining of Frequent Patterns is the process of mining patterns that frequently occurs in data. Data can be described with classes or concepts. These descriptions are inferred with data characterization and data discrimination. Data characterization is the process of summarizing the general properties of a class whereas data discrimination is the process of comparing class properties with features of other one or more classes. Association is referred as patterns frequently purchased together. Mining association is the process of discovering relations among data. Correlations represent relations between items or their attributes. Two items can be positively or negatively correlated. Moreover, there may be no correlation between two items as a result of mining correlation. Clustering brings together similar objects which do not have a class label. Therefore, the correct option is E.
4.Soru
Which of the following is not a basic operation for computers?
Input |
Output |
Processing |
Storing |
Heating |
In general, computers can perform three basic operations. Firstly, they accept data (input) from users via various input devices. Secondly, they process the data. Finally, they store the processed data in a memory or transfer it to various output devices in the desired format (text, image, audio, video, etc.). "Heating" is not among the basic operations that computers can perform, so the answer is D.
5.Soru
Foreign key approach, merging relation approach and the approach in which "a relationship is created where primary keys of two entity types are used as foreign keys and one of these foreign keys is chosen as primary key of R" are all different ways of:
Mapping of strong entity types. |
Mapping of weak entity types. |
Mapping 1:1 binary relationship types. |
Mapping of 1:N binary relationship types. |
Mapping n-ary relationship types. |
Mapping 1:1 binary relationship types: There are three possible ways to be followed while mapping 1:1 binary relationship type R relating two entity types concept to relational design. One of the choices is foreign key approach where primary key of one of the entities is inserted to the other entity type’s relation as foreign key. Merging relation approach is valid when both entity types are total participated in R. This time, two different entity types are merged into one relation. As a third choice, a relationship is created where primary keys of two entity types are used as foreign keys. One of those foreign keys are chosen as primary key of R.
6.Soru
I. Enables the users to use computer in a convenient and efficient manner
II. To keep track of who is using which resource, granting resource requests, according for resource using and mediating conflicting requests from different programs and users
III. Provides efficient and fair sharing of resources among users and programs
IV. Manages the resources of a computer system
V. Acts as an intermediary between the computer hardware and its users
VI. Hides complexity of the hardware resources from the users
Which of the objectives stated above are the main objectives of the operating sytem?
Only II |
II and IV |
I, II and VI |
II, III, V and VI |
I, II, III, IV, V and VI |
The main objectives of the operating system can be summarized as follows:
• Enables the users to use computer in a convenient and efficient manner
• Hides complexity of the hardware resources from the users
• Acts as an intermediary between the computer hardware and its users
• Manages the resources of a computer system
• To keep track of who is using which resource, granting resource requests,
according for resource using and mediating conflicting requests from different programs and users
• Provides efficient and fair sharing of resources among users and programs
7.Soru
Which of the following is a fundamental characteristic of application software?
It is written in low-level programming languages. |
It is difficult to design. |
It operates at a high speed. |
It is close to the system. |
It is more interactive. |
Application is usually more interactive compared to system software. This is a salient feature of application software, as application software is a computer program designed to help people perform an activity while system software is more related to the operation of the actual computer.
8.Soru
I. It provides mechanisms to convert data into accessible, reliable, authentic and complete form.
II. It helps decision makers to make strategic decisions by allowing mining and analyzing data.
III. It allows organizing, tracking, deleting, creating, and reporting data.
IV. It disallows redundancy and loss in data.V. It minimizes damage caused by errors related with data.
Which of the statements above is true about the advantages of data management?
I and II |
II, III and V |
III, IV and V |
II, III, IV and V |
I, II, III, IV and V |
Managing data is important and provides some advantages described as follows:
• It provides mechanisms to become data into accessible, reliable, authentic and complete form.
• Itprovides mechanisms to securely share data between information technology systems, applications, departments or employees for an enterprise.
• It helps decision makers to make strategic decisions by allowing mining and analyzing data.
• It allows organizing, tracking, deleting, creating, and reporting data.
• It disallows redundancy and loss in data.
• It minimizes damage caused by errors related with data.
9.Soru
Which kind of attacks aim to prevent normal functioning of a computer System and usually flood the network with traffic until a shutdown occurs due to the overload?
Denial-of-Service Attack |
Man-in-the-Middle Attack |
Eavesdropping |
Spoofing Attacks |
Man-in-the-Browser Attacks |
Denial-of-Service (DoS) attacks aim to prevent normal functioning of a computer system. DoS attacks usually flood the network with traffic until a shutdown occurs due to the overload. Thus, the correct answer is A.
10.Soru
In which stage, the solution system is defined based on the requirements and analysis decision?
Analysis |
Development |
Design |
Implementation/Testing |
Evaluation/Maintenance |
In design stage, the solution system is defined based on the requirements and analysis decision. The correct answer is C.
11.Soru
Which group of computer network usually covers a campus or a city?
Personal Area Network |
Local Area Network |
Office Network |
Metropolitan Area Network |
Wide Area Network |
A metropolitan area network (MAN) is a computer network that usually covers a campus or a city.D is the correct answer.
12.Soru
Which of the followings refers to the set of rules, models, methodologies to determine data flow for enterprises’ applications, to manage data in rest for enterprises’ information technology systems and so on?
Data Quality |
Data Security |
Data Definition |
Data Architecture |
Data Warehousing |
Data needs to be defined, its structure must be described. Data is stored to databases for online transactional purposes, creating, modifying, deleting, retrieving data. Data warehousing keeps historical data for preprocessing, mining, analyzing, reporting data. Data security topics such as accessing to data, privacy of data, erasing data must be managed. Data quality is important for decision-making. Data quality must be managed since data quality affects quality of extracted knowledge. Data architecture is the set of rules, models, methodologies to determine data flow for enterprises’ applications, to manage data in rest for enterprises’ information technology systems and so on. Data architecture must be managed to design, deploy and modify it. Therefore, the correct option is D.
13.Soru
Which of the following is the process of understanding data classes or concepts?
Data mining |
Data cleaning |
Classification |
Visualization |
Class/concept description: |
Classification is the process of understanding data classes or concepts. Class labels of data are given for purpose of classification.
14.Soru
In hexadecimal representation of data, which letter is used for the number 15?
A |
B |
D |
F |
C |
In base 16 (hexadecimal), the number system consists of 16 digits: 0 through 9 and A for 10, B for 11, C for 12, D for 13, E for 14, F for 15.
15.Soru
Which of the following cannot be done thanks to computer networks?
Exchange and share data and files |
Share a hardware resource such as a printer or a scanner |
Share Internet connections |
Access files and share resources even if it is not permitted |
Store and access data centrally |
Computer networks allow the users to:
• Exchange and share data and files
• Communicate with each other via e-mails, video calls, instant messaging, etc.
• Share a hardware resource such as a printer or a scanner
• Share Internet connections
• Store and access data centrally
D is the correct answer.
16.Soru
Which statement below accurately describes the difference between "conceptual design" and "logical design"?
Conceptual design establishes how concepts are related to each other within the database. |
Conceptual design is the utilization of normalization rules to apply constraints that allow us to uniquely identify attributes. |
Logical design is the logical categorization of entities based on their attributes and provides a general schema of the database. |
Conceptual design establishes the entity-relationship model of the data in the database, while logical design maps the entities and their relationships into relational schemas. |
Conceptual design establishes the relational schema between entities, applying domain, key, integrity and reference constraints to better categorize and map the relations between entities. |
Conceptual design provides the conceptual schema of a database by representing entities and relationships. Logical design is a more precise map of the entity relationships, providing a relational schema of the database. The correct answer is D.
17.Soru
How many characters does ASCII code include in total?
16 |
32 |
64 |
94 |
128 |
ASCII (American Standard Code for Information Interchange) code is used to represent information such as character-based data. ASCII code includes 94 characters that consists of 26 uppercase letters, 26 lowercase letters, 10 numerals, and 32 special characters. Besides, 34 characters are used for various control functions. The correct option is E.
18.Soru
Which of the followings is a device that serves as a bridge between a local network and the Internet?
Router |
Modem |
Switch |
Hub |
Bridge |
A modem is a device that serves as a bridge between a local network and the Internet. The primary function of a modem is to convert between analog and digital data in real time. Therefore, the correct option is B.
19.Soru
"It is a set of instructions that enables the user to interact with a computer, its hardware, or perform tasks. It is designed to enable a computer to perform a well-defined function."
Which term is defined above?
Software |
Device driver |
Firmware |
Operating system |
Booting |
Software is a set of instructions that enables the user to interact with a computer, its hardware, or perform tasks. Software is designed to enable a computer to perform a well-defined function.
A device driver is a system software that operates or controls a particular hardware device (e.g., graphic card, printer, scanner, etc.) that is connected to a computer. It allows a computer to communicate with these internal or external peripheral devices.
Firmware is a small and permanent software programmed into a read-only memory.
An operating system is a program that manages the computer hardware. It provides an container environment in which other programs can work.
Booting is the process of starting or restarting a computer.
The correct answer is A.
20.Soru
What is true about application software?
It's close to user |
Requires small storage space |
It's more interactive than system software |
It's difficult to manipulate |
It's generally written in low-level language |
Application Software is
- Close to user
- Slow in speed
- Easy to design
- Easy to understand
- More interactive
- Bigger in size (requires large storage space)
- Easy to manipulate and use
- Generally written in high-level language
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ