Information Technologies Final 10. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

Which of the followings is not one of the eight functional modules of ERP system?


customer relationship management

human resource management

supply chain management

delivery management

production planning


2.Soru

Which of following is the Business-to-Business?


B2C

B2B

B1B

C2C

C2B


3.Soru

Which of the following is NOT a condition for an invention to be patentable?


Subject

Novelty

Applicability 

Good intention

Inventive step


4.Soru

Which of the following is true regarding hardware and software security?


Viruses are spread only through diskettes and CDs.

The Trojan horse infection method to the computer is completely different from the virus infection method.

Worms are malicious software designed to automatically copy itself from one computer to another.

It is not possible to insert malicious functions into a hardware component.

If the software has been engineered with a great care, there do not remain any security vulnerabilities.


5.Soru

Which of the following is true about symmetric cryptography? 


It is slower. 

It uses two keys.

Private key is disseminated to everyone.

It requires a secure communication channel to send or receive ciphertext. 

There is only one form of symmetric key cryptography.


6.Soru

"_________is the process of how one proves that they are who they claim that they are."

Which word below completes the above definition?


Authorization

Identification

Cryptography

Authentication

Spoofing


7.Soru

Which of the following e-commerce companies have components such as browsing, searching, reviews and contents, secure credit card payment, high level of customer service?


HRM

Amazon.com

e-Bay

ERP

SCM


8.Soru

E-mails that attempt to trick you into entering one's confidenital personal or account information is called _____.


Spams

Spoofing

Asset

Vulnerability

Phishing


9.Soru

What is the process of how one proves that they are who they claim that they are?


Identification

Authentication

Phishing

Decryption

Authorization 


10.Soru

Which one of the following is not one of the precautions to protect a computer from malicious software?


Make sure to back up your important data to another memory

Open e-mails from someone you do not know

Install up-to-date antivirus programs

Check applications installed on the system periodically, remove unused programs from the system

Monitor incoming traffic to your system and intercept unauthorized system access


11.Soru

Which of the following uses uniform resource locators to function?


Operating system.

Office suites.

Internet Relay Chat.

Web browsers.

Central processing units.


12.Soru

Which of the followings aims at establishing knowledge societies different from the others?


ACM

UNESCO

IEE-CS

AITP

INSEIT


13.Soru

What is a server?


A CPU

Storage disks

Gamer computers

Powerless Computers 

Powerful Computers


14.Soru

Which of the following statements is not true about ERP software?


It aims to meet the needs of an organization for its business process flow.

It must take into account the business processes in the organization.

It must incorporate all the functions of an organization.

It must manage the organization's connections with its stakeholders.

It must finance the chain management system and decide the delivery times.


15.Soru

Which module in ERP systems allows the company to maintain information on employees?


Finance Module.

Customer Relationship Management Module.

Supply Chain Management Module.

Production Planning Module.

Human Resource Management Module.


16.Soru

Which of the following is not main functions of trademarks?


Identify and differentiate the products of one company from those of other companies.

Distinguish products from a given source from identical or similar products from other sources.

Refer to a particular quality of the product for which a mark is used.

Promote the marketing and sale of products, and the marketing and provision of services.

Prepare brochures explaining how to use the products.


17.Soru

Which of the following feature is the salient feature of application softwares?


Close to system

Fast in speed

Bigger in size (requires large storage space)

Generally written in low-level language

Difficult to understand


18.Soru

Which of the following does the definition below match? 

"One of the core areas of artificial intelligence (AI) and deals with the implementation of systems and algorithms that are based on observations as data for the synthesis of new knowledge (inductive reasoning)."


Immersive Virtual Reality

Augmented Reality

Not Immersive Virtual Reality

Artificial Intelligence

Machine Learning


19.Soru

"Merging data from different sources such as databases, data flats etc. into a compatible data store."
Which of the following data preprocessing phase requires the given definition?


Data transformation

Data reduction

Data integration

Data cleaning

Discretization and generating concept
hierarchies


20.Soru

What is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source?


Spam

Phishing

Spoofing

Asset

Threat