Information Technologies Final 6. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

What term is used to refer to a right granted for an invention, which is a product orprocess that is used as a new solution or approach for a technical problem arising in industry?


Grant 

Patent

Copyright

Terms of use

Code of Ethics


2.Soru

One of the most popular block ciphers is:


SALSA20

RC4

A5/1

Asymmetric encryption.

Data Encryption Standard (DES).


3.Soru

Which of the following CANNOT be considered as a violation of privacy rights? 


Monitoring the activity of employees in working hours.

E-mail monitoring of employees in a company, where they work.

Controlling the Internet connections of individuals at home.

Exposing the patient records in Hospitals.

Declaring a code of ethics in business.


4.Soru

Which one of the followings is not a challange for protecting the right to privacy appeared as a direct result of the Internet?


finger-scanning technologies

iris-scanning technologies

processor technologies

cloud technologies

educational technologies


5.Soru

Which of the following means that information should be kept secret, that is, keeping information among persons who authorized to access, no one else can access it.


Reliability

Non-repudiation

Confidentiality

Availability

Integrity


6.Soru

Which of the below is something that a hardware trojan do?


Taking screenshots

Formatting the harddisk

Accessing confidential files

Ageing acceleration

Open a TCP port


7.Soru

Which one of the core areas of artificial intelligence (AI) deals with the implementation of systems and algorithms that are based on observations as data for the synthesis of new knowledge?


machine learning

artificial neural network

eye tracking

fuzzy systems

evolutionary computation


8.Soru

Which one of the following components of Big data is related to analysis of the data represents and the usages that can be made of it?


volume

value

speed

variety

heterogeneity


9.Soru

Correctness and completeness of information as well as the forestalling of unauthorized alteration of information in computers are provided with which service?


Integrity.

Availability.

Non-repudiation.

Trust.

Confidentiality.


10.Soru

When was the first wearable technology designed?


1950

1955

1960

1965

1970


11.Soru

Which of following is "Consumer-to-Consumer "?


G2C

C2B

C2C

B2C

B2B


12.Soru

  1. Validity
  2. Compatibility
  3. Mobility

Which ones above can be considered as the advantages of Cloud?


Only I

I and II

I and III

II and III

I, II and III


13.Soru

Which of the following is not one of the advantages of data management?


It provides mechanisms to become data into accessible, reliable, authentic and complete form.

It provides mechanisms to securely share data between information technology systems, applications, departments or employees for an enterprise.

It helps decision makers to make strategic decisions by allowing mining and analyzing data.

It allows organizing, tracking, deleting, creating, and reporting data.

It allows redundancy and loss in data.


14.Soru

Which type of cloud is a computer infrastructure mainly dedicated to the needs of a single organization?


private cloud

public cloud

hybrid cloud

active cloud

passive cloud


15.Soru

Why did scientist create first wearable technology?


To make the world a better place

To start the technology age

To guess the chance of winning in gambling

To make money 

To pass a test


16.Soru

Which of the following e-commerce models allow consumers to bid for tickets and offer their own prices?


Consumer to Consumer

Business to Consumer

Business to Business

Consumer to Business

Business to Government


17.Soru

What is IoT?


Internet of Them

Internet of things

Instead of Them

Instead of Things

Internet on Them


18.Soru

If GittiGidiyor.com were to only allow established businesses to set up storefronts on their website, how would the e-commerce model of GittiGidiyor be changing?


From B2C to B2B.

From C2B to B2C.

From C2C to B2C.

From C2C to C2B.

From C2C to B2C.


19.Soru

Which one of the following systems gathers data from multiple points to control such as air pollution, rainfall situation, dam infestation and warns the authorities to intervene in an emergency? 


smart home

smart cities

environmental solutions

active objects

passive objects


20.Soru

___________________ is the combination of hardware and software devices able to create, for the senses of one or more users, a simulated three-dimensional environment in which to move exactly as if they were in the real world.


Virtual reality

Augmented reality

Artificial Intelligence

Big Data

Cloud computing