Information Technologies Final 1. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

What is booting?


Installing Hardware

Creating a software

Running a program

Starting a computer

Shutting a computer


2.Soru

Which of the following is an example for a B2B e-commerce model?


The relationship between the manufacturer, wholesaler, and retailer.

The relationship between a company and it's customers.

The feedback that customers provide regarding their e-commerce experience to a business.

Consumers conducting their own business with each other through an intermediary.

The electronic transaction of exchanging funds.


3.Soru

What is the main step in KDD?


Data collection

Data preprocessing

Data mining

Data warehousing

Pattern evaluation


4.Soru

Which of the following is NOT among the features of Trojan Horse? 


Trojan horses may not have visible damages on the system. 

Trojan horses open a TCP or UDP port. 

Trojan horses can take screenshots of the computer or format the hard disk. 

Trojan horses mainly have two components called servers and clients. 

Trojan horses automatically copy themselves from one computer to another. 


5.Soru

Which of following is one of C2C e-commerce model?


eBay

Alibaba.com

Amazon.com

Priceline.com

Hepsiburada.com


6.Soru

Which of the following is the computer unit that can be simply defined as the unit where data/information processing is carried out?


Memory

CPU

Keyboard

I/O Units

Printer


7.Soru

Which of the following can be found among the code of ethics developed by ACM? 


Focus on only personal development

Pursue the goal at all costs

Honor confidentiality

Respect the elderly

Honor your relatives


8.Soru

Which one of the following virtual reality types is immersive when it is able to create a sense of sensory immersion in three-dimensional computer generated?


Immersive Virtual Reality

Not Immersive Virtual Reality

Augmented Reality

Artificial Intelligence

Cloud Computing


9.Soru

Which of the below passwords is a strong password having the necessary features?


Eskisehir26

esk26532

Esk26/542

123456esk

0000


10.Soru

Which of the following may be considered as an example of a fundamental shift in e-commerce models by an e-business?


Amazon starting to sell it's own branded products and services.

eBay allowing businesses to open virtual stores on their site.

Amazon entering the music streaming service.

eBay acquiring Craigslist.

Sahibinden allowing the sale of services such as financial consulting and translation on their site.


11.Soru

"The invention must not be obvious, the proposed solution to the considered problem could not be reduced by someone with average knowledge of the technical field."
Which of the following concepts does the statement above explain?


Subject

Applicability

Novelty

Inventive step

Presentation of the invention


12.Soru

What of the terms is defined as “a sign, or a combination of signs used to distinguish product or service of a company from those of another”?


Industrial design

Acceptable use of policy

Invention

Copyright

Trademark


13.Soru

What is the difference between EFT and EDI?


EFT is software to better manage e-commerce and e-business while EDI is the electronic exchange of data.

EFT is commercial enterprise software while EDI is open source software.

EFT is the electronic transfer of money while EDI is the electronic exchange of documents using a standard electronic format.

EFT is the technological infrastructure of all e-commerce and EDI is the data interchange format used for electronic communication on the Internet.

EDI allows various modules of ERP software to communicate with each other while EFT allows banks to process monetary transactions between businesses.


14.Soru

Which one of the followings can come to the empty place in the sentence?
A code of ethics often finds place in business organizations and it is often developed to ______.


negatively affect all stakeholders, for instance, end-user of products, customers/clients,
employees of the firms, current and future supporter of projects.

depreciate the public’s confidence and respect to the management's decision.

complicate the responsibilities of the professionals’ to the society.

assist education of the member of profession at whom the code is directed.

support only professionals.


15.Soru

Which of the following is NOT one of the four words used to describe Big Data?


Volume

Variety

Value

Valve

Speed


16.Soru

Which of the layers found in the OSI reference model delivers data across network connections?


Physical Layer

Presentation Layer

Network Layer

Transport Layer

Data Link Layer


17.Soru

The specialized type of spam that attempts to trick you into entering one’s confidential, personal or account information is called:


Phishing.

Spoofing.

Authorization.

Encryption.

Decryption.


18.Soru

In information technology, which of the following is not one of the principle goals of security?


Confidentiality.

Security breach.

Integrity.

Availability of information.

Non-repudiation.


19.Soru

Which of the followings is the main reason for the case that a company monitors their workers’ use of the Internet and restricts their accessibility to the Internet?


Being exposed to less radiation

Increased feeling of loneliness

Technical problems

Protection from terrorist attacks

Violation of privacy rights


20.Soru

The Internet presents significant new challenges for protecting the right to privacy. Which ones below are among the challanges for protecting the right to privacy because of the Internet?

I The internet results in new types of personal information

II The internet simplifies the collection of location of personal information

III The internet introduces new capacities for government and private actors to analyse personal information

IV The Internet has become widespread around the world

V The Internet introduces new opportunities for commercial use of personal information


I, II, III

 

II, III, IV

 

I, II, III, IV

 

I, II, III, V

 

II, III, IV, V