Information Technologies Ara 10. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

I. Memory management
II. Device management
III. Power management
Which ones listed above are among the characteristics of operating systems?


Only I

Only II

Only III

I and II

I and III


2.Soru

Data that describes core entities for an enterprise such as customers, assets, employees and so on is called:


Data architecture.

Metadata.

Master data.

Data housing.

Database.


3.Soru

Which of the followings gathers similar objects which do not have a class label?


Mining of Frequent Patterns

Class/Concept Description

Mining Associations

Mining Correlations

Mining Clusters


4.Soru

Which of the following  is not a basic operation for computers?


Input

Output

Processing

Storing

Heating


5.Soru

Foreign key approach, merging relation approach and the approach in which "a relationship is created where primary keys of two entity types are used as foreign keys and one of these foreign keys is chosen as primary key of R" are all different ways of:


Mapping of strong entity types.

Mapping of weak entity types.

Mapping 1:1 binary relationship types.

Mapping of 1:N binary relationship types.

Mapping n-ary relationship types.


6.Soru

I. Enables the users to use computer in a convenient and efficient manner
II. To keep track of who is using which resource, granting resource requests, according for resource using and mediating conflicting requests from different programs and users
III. Provides efficient and fair sharing of resources among users and programs
IV. Manages the resources of a computer system
V. Acts as an intermediary between the computer hardware and its users
VI. Hides complexity of the hardware resources from the users
Which of the objectives stated above are the main objectives of the operating sytem?


Only II

II and IV

I, II and VI

II, III, V and VI

I, II, III, IV, V and VI


7.Soru

Which of the following is a fundamental characteristic of application software?


It is written in low-level programming languages.

It is difficult to design.

It operates at a high speed.

It is close to the system.

It is more interactive.


8.Soru

I. It provides mechanisms to convert data into accessible, reliable, authentic and complete form.
II. It helps decision makers to make strategic decisions by allowing mining and analyzing data.
III. It allows organizing, tracking, deleting, creating, and reporting data.
IV. It disallows redundancy and loss in data.V. It minimizes damage caused by errors related with data.
Which of the statements above is true about the advantages of data management?


I and II

II, III and V

III, IV and V

II, III, IV and V

I, II, III, IV and V


9.Soru

Which kind of attacks aim to prevent normal functioning of a computer System and usually flood the network with traffic until a shutdown occurs due to the overload?


Denial-of-Service Attack

Man-in-the-Middle Attack

Eavesdropping

Spoofing Attacks

Man-in-the-Browser Attacks


10.Soru

In which stage, the solution system is defined based on the requirements and analysis decision?


Analysis

Development

Design

Implementation/Testing

Evaluation/Maintenance


11.Soru

Which group of computer network usually covers a campus or a city?


Personal Area Network

Local Area Network

Office Network

Metropolitan Area Network

Wide Area Network


12.Soru

Which of the followings refers to the set of rules, models, methodologies to determine data flow for enterprises’ applications, to manage data in rest for enterprises’ information technology systems and so on?


Data Quality

Data Security

Data Definition

Data Architecture

Data Warehousing


13.Soru

Which of the following is the process of understanding data classes or concepts?


Data mining

Data cleaning

Classification

Visualization

Class/concept description:


14.Soru

In hexadecimal representation of data, which letter is used for the number 15?


A

B

D

F

C


15.Soru

Which of the following cannot be done thanks to computer networks?


Exchange and share data and files

Share a hardware resource such as a printer or a scanner

Share Internet connections

Access files and share resources even if it is not permitted

Store and access data centrally


16.Soru

Which statement below accurately describes the difference between "conceptual design" and "logical design"?


Conceptual design establishes how concepts are related to each other within the database.

Conceptual design is the utilization of normalization rules to apply constraints that allow us to uniquely identify attributes.

Logical design is the logical categorization of entities based on their attributes and provides a general schema of the database.

Conceptual design establishes the entity-relationship model of the data in the database, while logical design maps the entities and their relationships into relational schemas.

Conceptual design establishes the relational schema between entities, applying domain, key, integrity and reference constraints to better categorize and map the relations between entities.


17.Soru

How many characters does ASCII code include in total?


16

32

64

94

128


18.Soru

Which of the followings is a device that serves as a bridge between a local network and the Internet?


Router

Modem

Switch

Hub

Bridge


19.Soru

"It is a set of instructions that enables the user to interact with a computer, its hardware, or perform tasks. It is designed to enable a computer to perform a well-defined function."

Which term is defined above?


Software

Device driver

Firmware

Operating system

Booting


20.Soru

What is true about application software?


It's close to user

Requires small storage space

It's more interactive than system software

It's difficult to manipulate

It's generally written in low-level language