Information Technologies Final 8. Deneme Sınavı

Toplam 20 Soru
PAYLAŞ:

1.Soru

Which of the following feature is the salient feature of system softwares?


More interactive

Slow in speed

Close to user

Difficult to understand

Easy to design


2.Soru

"Big data represents large amounts of data." To which word below does this explanation belong to?


variety

volume

speed

value

heterogeneity


3.Soru

Which of the following is a widely known e-commerce company?


Abas.

eBay.

Netsis 3 Enterprise.

Oracle.

Microsoft Dynamics.


4.Soru

Which of the following is defined by " It is an organized collection of schemas, tables, queries, reports, views, and other objects. "


Hadoop

Apache

Map reduce

Google

Database


5.Soru

Which of the following is not a best practice for avoiding security threats in a computer?


User passwords should be very strong.

Installing powerful security software that includes to computer versatile and secure firewall.

Keeping operating system and Internet browsers up-to-date.

Monitoring incoming traffic to system and intercept unauthorized system access.

Always leaving an open door for remote access to the computer.


6.Soru

Which of the following offers various builtin themes and templates to give your slides an attractive, professional look?


Web Browser

Database software 

Spreadsheet software 

Presentation software 

Word Processing software 


7.Soru

Which of the followings is not a general condition of an invention to be patentable?


Subject

Applicability

Replicability

Novelty

Inventive step


8.Soru

If a small company with a production capacity of 100 units a month suddenly receives an order for 80 units of their product, which module of their enterprise resource planning software would keep track of the movement of their products and alert the company for the need of more products?


The finance module.

The inventory module.

The CRM module.

The HRM module.

The sales module.


9.Soru

What is a conversion of data, text or information into a form, usually called ciphertext, which is unreadable and cannot be understood by any means of unauthorized people?


Block ciphers

Digital signature 

Decryption

Spam

Encryption 


10.Soru

Which of the following is in domain of Industrial property?


A new story.

A new Encyclopedia.

A written manual explaining to a mobile phone.

Symbol of a new FIFa World Cup.

Monument a’ Statue of Liberty.


11.Soru

"No more infrastructure investment or time spent adding new servers and storage units."

Which area is this advantage of the cloud technologies related to?


Backup and disaster recovery

Cost effectiveness

Security

Compatibility

Storage and scalability 


12.Soru

What is the primary difference between companies like Hepsiburada and Amazon, and companies such as Craigslist and Sahibinden?


Hepsiburada and Amazon are large corporations while Craigslist and Sahibinden are small online entities.

Hepsiburada and Amazon provide a vast scope of products and services, while Craigslist and Sahibinden only provide a single category.

Amazon and Hepsiburada follow the consumer to business model while Sahibinden and Craigslist follow the business to consumer model.

Amazon and Hepsiburada receive large amounts of government subsidies to operate internationally, therefore they are closer to a government to business model while Sahibinden and Craigslist are companies that provide a service and follow the business to consumer model.

Sahibinden and Craigslist are intermediaries between consumers and follow the consumer to consumer model, while Amazon and Hepsiburada provide direct sales and follow the business to consumer model.


13.Soru

The process of how one proves that they are who they claim that they are in security controls is called:


Authorization.

Identification.

Phishing.

Authentication.

Spoofing.


14.Soru

Which ones below are protected by copyright laws?

I  distribution of copies of the work

II reservation of the work

III public performance of the work

IV translation of the work into other languages

V  adaptation of the work


I, II, III

II, III, IV

II, III, IV, V

III, IV, V, 

 

I, III, V, VI


15.Soru

I.Small storage II.Several sensors III.Processing capacity. Which one(s) do the active objects have?


Only I

II and III

Only II

I and II

Only III


16.Soru

Which of the following commercial ERP softwares has originated from Turkey?


SAP ERP

Oracle ERP

Microsoft Dynamics ERP

Netsis 3 Enterprise

Abas ERP


17.Soru

I. John wants to send a message to Mary. John encrypts the message with a key which is known only by John and Mary. Mary decypts the encrypted message with the same key.II. John wants to send a message to Mary. Mary has a key pair in which one of the keys is known by only Mary and the other one is known by everyone. John encrypts the message with Mary's key which is known by everyone. Mary decrypts the message with her key which is only known by herself.There are two different message sending scenarios above. Which one of the following is the correct pair of cryptographic algorithms appropriate for the scenarios?


I. Symmetric key cryptography II. Asymmetric key cryptography

I. Symmetric key cryptography II. Symmetric key cryptography

I. Public key cryptography II. Asymmetric key cryptography

I. Asymmetric key crptography II. Public key cryptography

I. Public key cryptography II. Symmetric key cryptography


18.Soru

Which of the following is true about a code of ethics? 


It negatively affects all stakeholders.

It enhances the public's confidence and respect to the management's decision.

It clarifies the responsibilities of a society to professionals.

It forbids education of the member of a profession at whom the code is directed.

It ignores a society's values and principles. 


19.Soru

Which module in ERP systems helps an organization in optimizating all available resources while delivering products?


Sales module.

Purchase module.

Production planning module.

Supply chain management module.

Inventory module.


20.Soru

Which of the following words best completes the sentence below? 

"__________ refer(s) to a set of technologies and IT service delivery modes that encourage the use and supply of software, the ability to store and process large amounts of information over Internet."


Active objects

Smart Home

Cloud

Environmental Solutions

Passive objects