Information Technologies Final 5. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

"In order to process big data, _______ is one of the most reliable tools which was run by Apache Software Foundation and Google file system based on the Map Reduce principle."

Which words completes the sentence best?


Cloud

NoSQL

QR code

RFID

Hadoop


2.Soru

Which of the following e-business establishments started out by selling books online?


Sahibinden.com

GittiGidiyor.com

eBay

Craigslist

Amazon.com


3.Soru

Which organization has proposed a code of ethics against the misuse and abuse of technology in 2011?


WHO (World Health Organization)

UNICEF (United Nations Children's Fund)

UNESCO (United Nations Educational, Scientific and Cultural Organization) 

WWF (World Wildlife Fund)

UN (United Nations)


4.Soru

Which of following is one of C2C e-commerce model?


Sahibinden.com

Alibaba.com

Amazon.com

Hepsibuarada

Priceline.com


5.Soru

What is violation of copyright called?


Copyright infringement

Copyright protection

Copyright rules

Copyright laws

Copyright domain


6.Soru

Which system enables people to work on the same document in different places and devices?


IoT

Database

Cloud

Hadoop

MapReduce


7.Soru

I. Confidentiality

II. Availability

III. Integrity

IV. Privacy

Which of the above are the goals of security?


II ve III

I ve IV

II, III and IV

I, II and III

I, III and IV


8.Soru

"The invention must have a practical application for industrial or agricultural purposes."
Which of the following concepts does the statement above explain?


Subject

Applicability

Novelty

Inventive step

Presentation of the invention


9.Soru

Which category of business model does bidding for large infrastructure projects such as bridges and tunnels fall under?


Business to consumer.

Government to consumer.

Government to business.

Business to government.

Government to citizen.


10.Soru

Which of the following is the definition of e-mail phishing?


Unsolicited bulk e-mail messages.

A specialized type of spam that attempts to trick you into entering one’s confidential personal information for identity theft or fraud.

A forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source.

Malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network.

Malicious software that sends important personal information of the user and the actions taken by the user on the computer to the malicious persons without the knowledge of the user.


11.Soru

I. Classification
II. Clustering
III. Mining frequent patterns and associations, predictions, outlier analysis Which of the statements stated above are the purpose of data mining?


Only I 

Only III

I and III

II and III

I, II and III


12.Soru

Which of the following is true regarding public key cryptography?


It uses only one key.

It does not require any secure communication channel to send or receive ciphertext.

Public key cryptographic algorithms are faster than symmetric key cryptographic algorithms.

Public key cryptography is mainly classified as block ciphers and stream ciphers.

Data encrypted with a public key can also be decrypted with a public key.


13.Soru

  1. Literary works
  2. Sculptures
  3. Industrial designs

Which of the given above is protected by copyrights?


Only II

I & II

I & III

II & III

I, II & III


14.Soru

Which one of the following RTF systems with several sensors, have greater storage capacity, have a processing capacity or be able to communicate over a network?


passive objects

smart cities

environmental solutions

active objects

smart home


15.Soru

Which of the followings is not among the actions most copyright laws state that authors or other right owners can authorize or prevent for the sake of protection of the intellectual property?


reproduction of the work

distribution of copies of the work

public performance of the work

use of works by way of illustration for teaching purposes

adaptation of the work


16.Soru

I.exchange, store, transmit, and receive data II.make a skype meeting III.find virtual friends IV. shop Which one/s of the above are among the advantages emerged out of ITs?


I and II

II and III

I, II and III

I, II and IV

I, II, III and IV


17.Soru

Which of the following terms is defined as the transformation of key business processes through the use of Internet technologies?


e-business

e-commerce

e-company

e-organization

e-software


18.Soru

Which of the following is not one of the various e-commerce models that categorize e-commerce systems based on the nature of transactions or relationship between participants?


Consumer to Government

Consumer to Consumer

Business to Government

Government to Consumer

Business to Business


19.Soru

Which of the following is not true about data?


Extracting knowledge from data is valuable since raw data are converted into useful form.

Data is valuable when they are analyzed and used for gaining useful information.

Data can be grouped as qualitative data and quantitative data.

The only way to collect data is to do it explicitly.

Data include raw, unorganized facts and concepts which need to be processed. 


20.Soru

Which of the following is IBM's definition of e-business?


E-business is the transformation of a business from a physical entity to an online presence.

E-business is organizations conducting the act of e-commerce.

E-business is the transformation of key business processes through the use of Internet technologies.

E-business is the usage of Internet technologies to enhance business processes.

E-business is the use of Internet technologies to conduct business practices and commerce.