Information Technologies Final 2. Deneme Sınavı

Toplam 10 Soru
PAYLAŞ:

1.Soru

Which of the following describes the ability of a system to maintain its function for a certain period of time?


Security

Reliability

Adversary

Security breach

Security rules


2.Soru

Which of the following terms refers to a software or hardware failure or incompleteness which could result in a breach of access in computer security?


Security

Security rules

Security breach

Reliability

Adversary


3.Soru

What type of switched network is used in telephone networks? 


Channel

Information

Packet

Message

Curcuit


4.Soru

What does RFID stand for?


Remote Fast Internet Direction

Radio Frequency Internet Directory

Radio FrequencyIdentification

Real Fast Internet Definition

Read Fast Internet Directory


5.Soru

Authentication is the process of how one proves that they are who they claim that they are. According to the given expression which one of the following can not be used as authentication?


fingerprint

username

password

driver's license

smart card


6.Soru

"Any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information."

Which term does the above definition define?


Adversary

Security

Reliability

Security rules

Security breach


7.Soru

Who developed the AI (Artificial Intelligence) technology?


Albert Einstein

Michael Faraday

Steve Wozniak

Alan Turing

Nikola Tesla


8.Soru

_________________is the science that deals with how to create intelligent machines, and found in the possibilities offered by information technology and the most practical way possible to achieve a similar result.


Augmented reality

Artificial Neural Network

Artificial Intelligence 

Database

Computer learning


9.Soru

Which of the followings is not a drawback of code of ethics in business


Taking into account a common set of core values and beliefs

Some statements are not meaningful

They may cause unethical behaviors

Breaking a code is not a crime in itself

Losing some of it customers or clients


10.Soru

Which of the following means  the process of claiming user, group or system’s identity.


Identification

Authentication

Authorization

Phishing 

Spoofing