Information Technologies Final 7. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

Which of the following is defined as a collection of related data?


Database

Database management system

Stored data

Data mining

Data bank


2.Soru

Which of the following is patentable?


Mathematical theories

Inventions

Discoveries

Plant varieties 

Animal varieties 


3.Soru

Which of the following is NOT among the advantages of cloud technologies?


Applicability

Back up and Disaster Recovery

Storage and Scalability 

Cost Effectiveness

Mobility


4.Soru

which of the below measures is used in the storage of Big Data?


Petabyte

Gigabyte

Megabyte

Kilobyte

Byte


5.Soru

Which of the following is NOT among the precautions one can take to protect a computer based system from malicious software?  


User passwords should be very strong so that no unauthorized entity is able to enter the system

 

Check applications installed on the system periodically, remove unused programs from the system

 

Install the earliest and first versions of the programs on the system

 

Check the entries of users entering the system and change your password policy so that strong password usage is required.

Monitor incoming traffic to your system and intercept unauthorized system access. 


6.Soru

'Consumer sends a request to businesses for a product or service and then businesses make a bid. Then, consumer decides where the product or service will be bought from' describes which type of e-commerce model? 


B2B

B2C

C2B

C2C

B2G


7.Soru

In which of the following e-commerce models both sides of exchange are consumers providing an opportunity to sell assets via the Internet?


Business to Consumer

Business to Business

Consumer to Consumer

Consumer to Business

Business to Government


8.Soru

Which one of the following elements is not among the advantages of cloud technologies?


mobility

cost effectiveness

disaster recovery

storage

data security


9.Soru

Which of the following best completes the following sentence?

"___________ is a legal term used to describe the rights that creators have over their original literary and artistic works."


Trademark

Brand

Privacy

Copyright

Industrial Design


10.Soru

What describes the ability of a system to maintain its function under a given set of conditions for a certain period of time?


Security

Reliability 

Adversary 

Security breach 

Security rules


11.Soru

Which of the following word pairs best complete the sentence below? 

"The most important fact that accelerates the evolution of human beings is undoubtedly the __________ and ___________ of information shared during communication."


exchange / termination

deprivation / dedication

calculation / animation

proliferation / production

accumulation / utilization


12.Soru

Which of the followings is a more representative example of risk of using less secure connections?


Restriction of reaching information

Being exposed to more radiation

Feeling lonely

Revealing financial information

Being monitored by the government


13.Soru

Which of the following statements relating to information technologies in business is true?


E-business refers to online-only business entities.

E-commerce is a subset of e-business.

E-commerce encompasses the concept of e-business.

The introduction of POS devices at physical stores is a result of e-business.

E-commerce has enabled larger corporations to dominate small businesses, thereby cornering their markets.


14.Soru

Which application below is not a web browser?


Safari

Internet Explorer

Chrome

Firefox

Windows


15.Soru

What does asset in computer security refer to?


Any data, device, or any confidential resource that the computer possesses.

An action or possible event to violate the security of the system.

A flaw in a computer system that can leave it open to possible malicious attacks.

Prevention of the disclosure of information to unauthorized persons.

A service that provides proof of the integrity and the origin of data.


16.Soru

Which of the following is the correct definition of Integrity? 


Prevention of the disclosure of information to unauthorized persons.

It defines a service that provides proof of the integrity and the origin of data.

Prevention of unauthorized detention of information or resources

Prevention of the modification of information by unauthorized persons

Prevention of the transaction of information by unauthorized people.


17.Soru

According to UNESCO, which of the following should NOT serve as a basis for knowledge societies? 


nepotism based on knowledge

freedom of expression

universal access to information and knowledge

respect for cultural and linguistic diversity

quality education for all


18.Soru

I. Use strong passwords
II. Stay away from the latest updates of the programmes
III. Check e-mails from unknown senders
IV. Monitor incoming traffic to your system
Which ones are among the ways to avoid security threats?


I and II

II and III

I,III and IV

III and IV

I and IV


19.Soru

Which e-commerce model allows consumers to determine their needs while businesses compete to meet those needs by offering competitive prices?


B2C

C2C

B2G

C2B

B2B


20.Soru

Which of the following can be protected by patent?


A best-seller music cd

A new paint from a well-known artist

A new mobile payment system design

A best-seller book

A new movie from a well-known director