Information Technologies Final 6. Deneme Sınavı
Toplam 20 Soru1.Soru
What term is used to refer to a right granted for an invention, which is a product orprocess that is used as a new solution or approach for a technical problem arising in industry?
Grant |
Patent |
Copyright |
Terms of use |
Code of Ethics |
Patent can be defined as a right granted for an invention, which is a product or process that is used as a new solution or approach for a technical problem arising in industry.
2.Soru
One of the most popular block ciphers is:
SALSA20 |
RC4 |
A5/1 |
Asymmetric encryption. |
Data Encryption Standard (DES). |
There are different types of symmetric key cryptography. It is mainly classified as block ciphers and stream cipher. Some important stream ciphers are RC4, A5/1, SALSA20. The most popular block ciphers are Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES).
3.Soru
Which of the following CANNOT be considered as a violation of privacy rights?
Monitoring the activity of employees in working hours. |
E-mail monitoring of employees in a company, where they work. |
Controlling the Internet connections of individuals at home. |
Exposing the patient records in Hospitals. |
Declaring a code of ethics in business. |
In business, productivity of the employees and professionals may diminish due to the excessive monitoring systems, which control and monitor the connection of the works, however, they cause the violation of rights or privacy. Some stronger laws should be introduced since, protection of rights of privacy is base of the democracy.On the other hand, declaring a code of ethics in business is not a violation of privacy.
4.Soru
Which one of the followings is not a challange for protecting the right to privacy appeared as a direct result of the Internet?
finger-scanning technologies |
iris-scanning technologies |
processor technologies |
cloud technologies |
educational technologies |
The Internet presents significant new challenges for protecting the right to privacy. The most important ones are finger and iris-scanning technologies, processor technologies, cloud technologies but educational technologies don't pose a thread to the privacy. The correct answer is E.
5.Soru
Which of the following means that information should be kept secret, that is, keeping information among persons who authorized to access, no one else can access it.
Reliability |
Non-repudiation |
Confidentiality |
Availability |
Integrity |
Confidentiality means that information should be kept secret, that is, keeping information among persons who authorized to access, no one else can access it.
6.Soru
Which of the below is something that a hardware trojan do?
Taking screenshots |
Formatting the harddisk |
Accessing confidential files |
Ageing acceleration |
Open a TCP port |
For a given design, a hardware Trojan can be added into a particular specification, toplevel models, RTL level descriptions, gate-level netlist, chip layout or chip mask. The Trojan behaviour varies from a denial of service attacks such as aging acceleration of transistors and bus deadlocks to subtler attacks, such as bypassing the authentication and gaining unrecognized privileged access on a system for unauthorized adversaries, or data leakage through side channels of the hardware components.
7.Soru
Which one of the core areas of artificial intelligence (AI) deals with the implementation of systems and algorithms that are based on observations as data for the synthesis of new knowledge?
machine learning |
artificial neural network |
eye tracking |
fuzzy systems |
evolutionary computation |
The machine learning is one of the core areas of artificial intelligence (AI) and deals with the implementation of systems and algorithms that are based on observations as data for the synthesis of new knowledge (inductive reasoning). Learning can take place by capturing characteristics of interest from examples, data structures or sensors, to analyze and evaluate the relationships between the observed variables.
8.Soru
Which one of the following components of Big data is related to analysis of the data represents and the usages that can be made of it?
volume |
value |
speed |
variety |
heterogeneity |
Value is characteristic is the added value that the analysis of the data represents and the usages that can be made of it.
9.Soru
Correctness and completeness of information as well as the forestalling of unauthorized alteration of information in computers are provided with which service?
Integrity. |
Availability. |
Non-repudiation. |
Trust. |
Confidentiality. |
Correctness and completeness of information as well as the forestalling of unauthorized alteration of information in computers are provided with integrity service. Integrity concerns the completeness, origin and correctness of the information. In information technology, the origin of the information is equally important as the integrity of information.
10.Soru
When was the first wearable technology designed?
1950 |
1955 |
1960 |
1965 |
1970 |
The first wearable electronically equipped wearable dates back to 1960, designed by Claude Shannon one of the greatest mathematicians of all time, and Edward Thorp a mathematics professor at MIT, who they had set out to be able to beat the dealer in games of chance provided using mathematical algorithms. The correct option is C.
11.Soru
Which of following is "Consumer-to-Consumer "?
G2C |
C2B |
C2C |
B2C |
B2B |
Business-to-Business (B2B)
Business-to-Consumer (B2C)
Consumer-to-Consumer (C2C)
Consumer-to-Business (C2B)
Business-to-Government (B2G)
Government-to-Business (G2B)
Government-to-Consumer (G2C)
12.Soru
- Validity
- Compatibility
- Mobility
Which ones above can be considered as the advantages of Cloud?
Only I |
I and II |
I and III |
II and III |
I, II and III |
The advantages of the Cloud are:
- Storage and Scalability
- Backup and Disaster Recovery
- Mobility
- Cost-effectiveness
- Confidentiality and data security
- Control and Reliability
- Compatibility
- The servers that hold the data of the companies are more secure than the main computers of the companies because they take security measures 7/24 as software and hardware.
The correct option is D.
13.Soru
Which of the following is not one of the advantages of data management?
It provides mechanisms to become data into accessible, reliable, authentic and complete form. |
It provides mechanisms to securely share data between information technology systems, applications, departments or employees for an enterprise. |
It helps decision makers to make strategic decisions by allowing mining and analyzing data. |
It allows organizing, tracking, deleting, creating, and reporting data. |
It allows redundancy and loss in data. |
Managing data is important and provides some advantages described as follows:It provides mechanisms to become data into accessible, reliable, authentic and complete form; it provides mechanisms to securely share data between information technology systems, applications, departments or employees for an enterprise; it helps decision makers to make strategic decisions by allowing mining and analyzing data; it allows organizing, tracking, deleting, creating, and reporting data; it disallows redundancy and loss in data.
14.Soru
Which type of cloud is a computer infrastructure mainly dedicated to the needs of a single organization?
private cloud |
public cloud |
hybrid cloud |
active cloud |
passive cloud |
The “private cloud” is a computer infrastructure (network of connected computers to provide services) mainly dedicated to the needs of a single organization. They are located and controlled either by companies’ IT department or third party services (in the traditional form of hosting server), to have a precise control on data. The private clouds can be compared to traditional data centers.
15.Soru
Why did scientist create first wearable technology?
To make the world a better place |
To start the technology age |
To guess the chance of winning in gambling |
To make money |
To pass a test |
The two mathematicians after long studied the physics of ball that spun the roulette, they created an algorithm that would allow increasing of chance of winning by as much as 44%. The algorithm was added to a microcomputer which was hidden in the shoe and connected to an audible microphone emitting a sound which cheats the roulette gambling. The results were amazing.
16.Soru
Which of the following e-commerce models allow consumers to bid for tickets and offer their own prices?
Consumer to Consumer |
Business to Consumer |
Business to Business |
Consumer to Business |
Business to Government |
In Consumer to Business model, the transactions are initiated by consumers. Consumer sends a request to businesses for a product or service and then businesses make a bid. Then, consumer decides where the product or service will be bought from.
17.Soru
What is IoT?
Internet of Them |
Internet of things |
Instead of Them |
Instead of Things |
Internet on Them |
The name of the Internet of Things (IoT) has been introduced by Kevin Ashton, who is a British technology pioneer, working on Radio Frequency Identification (RFID), and with this term, he imagined connecting the real world and internet with radio frequencies through a sensor system anywhere.
18.Soru
If GittiGidiyor.com were to only allow established businesses to set up storefronts on their website, how would the e-commerce model of GittiGidiyor be changing?
From B2C to B2B. |
From C2B to B2C. |
From C2C to B2C. |
From C2C to C2B. |
From C2C to B2C. |
GittiGidiyor.com operates on a consumer to consumer e-commerce model, but if they were to only allow businesses to use them as intermediaries, they would be transitioning to a business to consumer model.
19.Soru
Which one of the following systems gathers data from multiple points to control such as air pollution, rainfall situation, dam infestation and warns the authorities to intervene in an emergency?
smart home |
smart cities |
environmental solutions |
active objects |
passive objects |
Environmental Solutions: Distributed information system which gathers data from multiple points provide control such as air pollution, rainfall situation, dam infestation, forest fire. The system warns the authorities to intervene in an emergency.
20.Soru
___________________ is the combination of hardware and software devices able to create, for the senses of one or more users, a simulated three-dimensional environment in which to move exactly as if they were in the real world.
Virtual reality |
Augmented reality |
Artificial Intelligence |
Big Data |
Cloud computing |
Virtual Reality (VR) can be defined as the combination of hardware and software devices able to create, for the senses of one or more users, a simulated three-dimensional environment in which to move exactly as if they were in the real world. Te VR, therefore, is conceived as a space created
digitally accessible which comes into existence by special devices and electronic equipment (not only the viewer, but also gloves, boots etc.) that allows to interact with the virtual environment achieved through powerful software.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ