Information Technologies Final 4. Deneme Sınavı
Toplam 20 Soru1.Soru
Which one below is universal and does not present differences among different contexts?
Code of ethics |
Copyrights |
Copyright protection |
The need for rotection of privacy |
The definition of privacy |
Privacy is a fundamental right, however, it is
complicated to define exactly what the contents of the
right is. Some rights or their combinations may be used
to define the privacy, however, that definition can not
be universal and satisfy the requirements of the people.
Since the understandings of privacy has been started
to shape from the date when the first technology was
introduced to the human life, it involves protection
of your home and personal possessions in this era. In
addition, it was also defined as the right of people to
determine when, and what extent of information about
them is communicated to others while the processors
of the computers were improving.
2.Soru
Which of the below is a cloud applicaiton?
|
Word |
Microsoft Edge |
Onedrive |
|
Onedrive is a cloud application provided by Microsoft.
3.Soru
What do we call the combination of hardware and software devices that are able to create a simulated three-dimensional environment in which to move exactly as if in the real world?
Artificial intelligence |
Augmented reality |
Machine learning |
Neural network |
Virtual reality |
Virtual Reality (VR) can be defined as the combination of hardware and software devices able to create, for the senses of one or more users, a simulated three-dimensional environment in which to move exactly as if they were in the real world. The correct option is E.
4.Soru
Which of the below is a presentation program?
Word Processor |
|
Excel |
Safari |
Powerpoint |
A gentle introduction to office tools is made in this section. Details of the aforementioned tools are out of the scope of this chapter. However, further details of Microsoft products (Word, Excel, PowerPoint and so on can be found on office training center.
5.Soru
- It is developed to affect all stakeholders positively.
- It is developed to enhance the public’s confidence and respect to the managements’ decision.
- It is developed to clarify the responsibilities of the professionals to the society.
Which of the given above is TRUE about the code of ethics in business organizations?
Only II |
I & II |
I & III |
II & III |
I, II & III |
A code of ethics often finds place in business organizations and it is often developed to
- positively affect all stakeholders, for instance, end-user of products, customers/clients, employees of the firms, current and future supporter of projects,
- enhance the public’s confidence and respect to the managements’ decision,
- clarify the responsibilities of the professionals to the society,
- assist education of the member of profession at whom the code is directed.
E is the correct answer.
6.Soru
Which of following is one of B2B e-commerce model?
Amazon.com |
Hepsibarada.com |
Alibaba.com |
Sahibinden.com |
Gittigidiyor.com |
Alibaba.com is a well-known B2B e-commerce website and companies can perform various transactions via this website. Amazon.com was one of the first companies using B2C e-commerce model in worldwide and a widely known example to B2C e-commerce companies in Turkey is Hepsiburada. While eBay is one of the widely known C2C e-commerce companies in worldwide, Sahibinden.com and GittiGidiyor can be
given as examples to C2C e-commerce companies in Turkey. However, Priceline.com can be given as an example to websites using C2B e-commerce model.
7.Soru
Which of the followings are not protected by Industrial property rights and copyrights by considering The Convention Establishing the World Intellectual Property Organization (1967)?
inventions, industrial designs |
trademarks, service marks, commercial names and designations |
copy designs, paintings and sculptures |
literary, artistic and scientific works |
performances of performing artists, phonograms and broadcasts |
Considering The Convention Establishing the World Intellectual Property Organization (1967), inventions, industrial designs, trademarks, service marks, commercial names and designations, literary, artistic and scientific works, performances of performing artists, phonograms and broadcasts are protected by industrial property rights and copyrights but not copy designs, paintings and sculptures. The correct answer is C.
8.Soru
Which one of the following terms is related to the unmatched hardware capacity both for storage and for processor resources needed for processing?
NoSQL |
Map Reduce |
Cloud Computing |
Hadoop |
In-Memory |
Big Data requires unmatched hardware capacity, both for storage and for processor resources needed for processing. This requirement is related to cloud computing.
9.Soru
________________ is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many di?erent ways without having to reorganize the database tables.
Relational database |
Map reduce |
Radio frequency identification |
Cloud computing |
Machine learning |
A relational database is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many di?erent ways without having to reorganize the database tables. NoSQL is a relational database that has a very specifc organizational philosophy, including the SQL query language, the transaction integrity principle (ACID), and the standardization laws.
10.Soru
Which of the following is NOT among the features of knowledge societies?
Freedom of expression |
Protecting the environment |
Universal access to information and knowledge |
Respect for cultural and linguistic diversity |
Quality education for all |
UNESCO has been working on to establish knowledge societies, which are based on the following:
- freedom of expression
- universal access to information and knowledge
- respect for cultural and linguistic diversity
- quality education for all.
The correct answer is B.
11.Soru
Which one below is not among one of the professional organizations which create Professional code of ethics?
INSEIT |
ACM |
AITP |
IT |
IEEE-CS |
Professional code of ethics are created by professional organizations,
for instance, Association of Computing Machinery
(ACM), Association of Information Technology
(AITP), and Institute of Electrical and Electronics
Engineers Computer Society (IEEE-CS) are
the well-known IT-related organizations that
create code of ethics for IT professionals, who
are specialists on software development, network
management and administration. Because of some
similarities between business ethics and IT ethics,
code of ethics created by the above organizations
12.Soru
Which of the following ERP modules functions as order placement, order scheduling, shipping, and invoicing?
Purchase module |
Production Planning Module |
Sales Module |
Finance Module |
Inventory Module |
Sales module allows an organization to track the sales processes in an efficient way. It helps such functions as order placement, order scheduling, shipping, and invoicing. Prices for items are maintained with this module.
13.Soru
What term is descirbed as are fabricated products with a tiny size, however, they consist of millions of resistors, capacitors, and transistors, and various circuit elements?
Networks |
Electronic devices |
Phonograms |
Layout designs |
Integrated curcuits |
Integrated circuits (IC) are fundamental parts
of most circuit products, which are called often
brain of our electronic devices that we frequently
use in our daily life. They are fabricated products
with a tiny size, however, they consist of millions
of resistors, capacitors, and transistors, and various
circuit elements, which are set up to achieve the
objectives of the IC.
14.Soru
Which of following is one of B2C e-commerce model?
Amazon.com |
Alibaba.com |
Gitttigidiyor.com |
Hepsiburada |
Sahibinden.com |
Amazon.com was one of the first companies using B2C e-commerce model.
15.Soru
Which one is true about systematic cryptography?
Its algorithms are slower than public cryptographic algorithms. |
A stream cipher applies an encryption transformation to blocks |
Data encryption standard is known as a standard block ciphers. |
A block cipher adds the plaintext digits with a pseudorandom cipher stream. |
Some important block ciphers are RC4 and SALSA20. |
Block ciphers are symmetric cryptographic algorithms. They are faster algorithms than public key cryptographic algorithms. It uses only one key, that is, the same key is used when encrypting a message or decrypting a ciphertext. However, for block ciphers, sender requires securely transferring the key to the receivers. Tere are well-known and
standard block ciphers including Data Encryption Standard and Advanced Encryption Standard.
16.Soru
Which e-commerce model exemplifies the situation in which an online retailer uses EDI to notify their suppliers of an increase in demand of a product?
C2B |
B2B |
B2C |
C2C |
EFT |
The use of EDI (electronic data interchange) for an online retailer, which is a business, to notify their supplier, which is also a business, of an increased demand in a certain product would exemplify a business to business (B2B) model of e-commerce.
17.Soru
Which one of the following terms refers to any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information?
Security |
Reliability |
Adversary |
Security rules |
Security breach |
Adversary is any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information. Correct answer is C.
18.Soru
Which one of the following refers to anything on a computer that may harm or copy the data, or allow one to access the computer without anyone’s knowledge?
Asset |
Threat |
Vulnerability |
Spoofing |
Risk |
A risk in a computer security can be anything on the computer that may harm or copy the data, or allow one to access the computer without anyone’s knowledge. Simply, risk is the intersection of assets, threats, and vulnerabilities. Correct answer is E.
19.Soru
Which of the following is true about the impact of IT in our lives?
We are exposed to less radiation compared to past due to lesser use of mobile phones. |
Loneliness is never associated with excessive use of Internet. |
Identity theft is never an issue to consider during Internet use. |
Our network activities are often monitored by governments. |
Most companies monitor their workers' use of Internet to maintain their focus on the work. |
For instance, we are exposed the more radiation compared to past due to the excessive use of mobile phones. The Internet provides perfect communication among people who live far away their families by social networks, however, loneliness has been associated with excessive use of it. Due to the less secure connections or various technical problems, someone may use IT to access our financial information to use it inappropriate direction. The Internet connections and/or our network activities are often monitored and/or controlled our internet connection by governments or security services to protect our life from the terrorist attacks. Similarly, most of the companies monitor their workers’ use of the Internet and check employee e-mail and restrict their accessibility to the Internet to maintain their focus on the working tasks.
20.Soru
Which of the following is NOT true about the concept of IoT?
The IoT is a widespread network system where the infrastructure is basically formed by device-to-device communication technology. |
The IoT consists of end devices connected across the same network topologies and protocols. |
The physical objects in an environment are communicated with each other or with wider systems. |
The meaning of the object concept in the IoT varies according to the technology used in the terminal devices. |
These devices can either be simple sensors or RFID devices or complex intelligent systems and multiple sensors connected to them. |
The IoT is a widespread network system where the infrastructure is basically formed by the device to the device communication technology and the physical objects in an environment are communicated with each other or with wider systems. The meaning of the object concept in the IoT varies according to the technology used in the terminal devices. Those can either be simple sensors or RFID devices or complex intelligent systems and multiple sensors connected to them. The IoT consists of end devices connected with different network topologies and protocols.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ