Information Technologies Final 4. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

Which one below is universal and does not present differences among different contexts?


Code of ethics

Copyrights

Copyright protection

The need for rotection of privacy

The definition of privacy


2.Soru

Which of the below is a cloud applicaiton?


Facebook

Word

Microsoft Edge

Onedrive

Twitter


3.Soru

What do we call the combination of hardware and software devices that are able to create a simulated three-dimensional environment in which to move exactly as if in the real world?


Artificial intelligence

Augmented reality

Machine learning

Neural network

Virtual reality


4.Soru

Which of the below is a presentation program?


Word Processor

PDF

Excel

Safari 

Powerpoint


5.Soru

  1. It is developed to affect all stakeholders positively.
  2. It is developed to enhance the public’s confidence and respect to the managements’ decision.
  3. It is developed to clarify the responsibilities of the professionals to the society.

Which of the given above is TRUE about the code of ethics in business organizations?


Only II

I & II

I & III

II & III

I, II & III


6.Soru

Which of following is one of B2B e-commerce model?


Amazon.com

Hepsibarada.com

Alibaba.com

Sahibinden.com

Gittigidiyor.com


7.Soru

Which of the followings are not protected by Industrial property rights and copyrights by considering The Convention Establishing the World Intellectual Property Organization (1967)?


inventions, industrial designs

trademarks, service marks, commercial names and designations

copy designs, paintings and sculptures

literary, artistic and scientific works

performances of performing artists, phonograms and broadcasts


8.Soru

Which one of the following terms is related to the unmatched hardware capacity both for storage and for processor resources needed for processing?


NoSQL

Map Reduce

Cloud Computing

Hadoop

In-Memory


9.Soru

________________ is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many di?erent ways without having to reorganize the database tables.


Relational database

Map reduce

Radio frequency identification

Cloud computing

Machine learning


10.Soru

Which of the following is NOT among the features of knowledge societies?


Freedom of expression

Protecting the environment

Universal access to information and knowledge

Respect for cultural and linguistic diversity

Quality education for all


11.Soru

Which one below is not among one of the  professional organizations which create Professional code of ethics?


INSEIT

ACM

AITP

IT

IEEE-CS


12.Soru

Which of the following ERP modules functions as order placement, order scheduling, shipping, and invoicing?


Purchase module

Production Planning Module

Sales Module

Finance Module

Inventory Module


13.Soru

What term is descirbed as are fabricated products with a tiny size, however, they consist of millions of resistors, capacitors, and transistors, and various circuit elements?


Networks

Electronic devices

Phonograms

Layout designs

Integrated curcuits


14.Soru

Which of following is one of B2C e-commerce model?


Amazon.com

Alibaba.com

Gitttigidiyor.com

Hepsiburada

Sahibinden.com


15.Soru

Which one is true about systematic cryptography? 


Its algorithms are slower than public cryptographic algorithms.

A stream cipher applies an encryption transformation to blocks

Data encryption standard is known as a standard block ciphers.

A block cipher adds the plaintext digits with a pseudorandom cipher stream.

Some important block ciphers are RC4 and SALSA20.


16.Soru

Which e-commerce model exemplifies the situation in which an online retailer uses EDI to notify their suppliers of an increase in demand of a product?


C2B

B2B

B2C

C2C

EFT


17.Soru

Which one of the following terms refers to any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information?


Security

Reliability

Adversary

Security rules

Security breach


18.Soru

Which one of the following refers  to anything on a computer that may harm or copy the data, or allow one to access the computer without anyone’s knowledge?


Asset

Threat

Vulnerability

Spoofing

Risk


19.Soru

Which of the following is true about the impact of IT in our lives? 


We are exposed to less radiation compared to past due to lesser use of mobile phones.

Loneliness is never associated with excessive use of Internet.

Identity theft is never an issue to consider during Internet use.

Our network activities are often monitored by governments. 

Most companies monitor their workers' use of Internet to maintain their focus on the work. 


20.Soru

Which of the following is NOT true about the concept of IoT?


The IoT is a widespread network system where the infrastructure is basically formed by device-to-device communication technology.

The IoT consists of end devices connected across the same network topologies and protocols.

The physical objects in an environment are communicated with each other or with wider systems.

The meaning of the object concept in the IoT varies according to the technology used in the terminal devices.

These devices can either be simple sensors or RFID devices or complex intelligent systems and multiple sensors connected to them.