Information Technologies Final 8. Deneme Sınavı
Toplam 20 Soru1.Soru
Which of the following feature is the salient feature of system softwares?
More interactive |
Slow in speed |
Close to user |
Difficult to understand |
Easy to design |
Salient feature comparison of application software versus system software
System Software Application Software
Close to system Close to user
Fast in speed Slow in speed
Difficult to design Easy to design
Difficult to understand Easy to understand
Less interactive More interactive
Smaller in size Bigger in size (requires large storage space)
Difficult to manipulate Easy to manipulate and use
Generally written in low-level language Generally written in high-level language
2.Soru
"Big data represents large amounts of data." To which word below does this explanation belong to?
variety |
volume |
speed |
value |
heterogeneity |
Big data can be described in four words which are volume, speed, variety (heterogeneity), and value. Among them volume means that Big Data represents large amounts of data. It is generally said that 90% of the data available today have been created in the last two years. The correct option is B.
3.Soru
Which of the following is a widely known e-commerce company?
Abas. |
eBay. |
Netsis 3 Enterprise. |
Oracle. |
Microsoft Dynamics. |
eBay is a widely known e-commerce company. eBay was founded by Pierre Omidyar in 1995. Recently, it is a multibilliondollar business with operations in many countries.
4.Soru
Which of the following is defined by " It is an organized collection of schemas, tables, queries, reports, views, and other objects. "
Hadoop |
Apache |
Map reduce |
|
Database |
A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views, and other objects. The data are typically organized to model aspects of reality in a way that supports processes requiring information, such as modelling the availability of rooms in hotels in a way that supports finding a hotel with vacancies
5.Soru
Which of the following is not a best practice for avoiding security threats in a computer?
User passwords should be very strong. |
Installing powerful security software that includes to computer versatile and secure firewall. |
Keeping operating system and Internet browsers up-to-date. |
Monitoring incoming traffic to system and intercept unauthorized system access. |
Always leaving an open door for remote access to the computer. |
The answer is e.
Always leaving an open door for remote access to the computer is not a best practice for avoiding security threats in a computer. Therefore, the correct answer is E.
6.Soru
Which of the following offers various builtin themes and templates to give your slides an attractive, professional look?
Web Browser |
Database software |
Spreadsheet software |
Presentation software |
Word Processing software |
Presentation software offer various builtin themes and templates to give your slides an attractive, professional look. A theme is a readymade presentation design that contains matching colors, fonts, layouts, and special effects like shadows, reflections. The correct answer is D.
7.Soru
Which of the followings is not a general condition of an invention to be patentable?
Subject |
Applicability |
Replicability |
Novelty |
Inventive step |
A patent can be defined as a right granted for an invention, which is a product or process that is used as a new solution or approach for a technical problem arising in industry. So, replicability is not a general condition of an invention to be patentable.
8.Soru
If a small company with a production capacity of 100 units a month suddenly receives an order for 80 units of their product, which module of their enterprise resource planning software would keep track of the movement of their products and alert the company for the need of more products?
The finance module. |
The inventory module. |
The CRM module. |
The HRM module. |
The sales module. |
With a sudden purchase of 80 units from a company with a capacity of 100 units, the inventory module is essential for keeping track of the product inventory and their movements. This is true not only for small companies but for organizations of all sizes.
9.Soru
What is a conversion of data, text or information into a form, usually called ciphertext, which is unreadable and cannot be understood by any means of unauthorized people?
Block ciphers |
Digital signature |
Decryption |
Spam |
Encryption |
Encryption: It is a conversion of data, text or information into a form, usually called ciphertext, which is unreadable and cannot be understood by any means of unauthorized people.
Decryption: It is the reverse transformation of encryption process and it applies the similar steps but uses the key bits in reverse order where the key is used in the decryption transformation.
10.Soru
Which of the following is in domain of Industrial property?
A new story. |
A new Encyclopedia. |
A written manual explaining to a mobile phone. |
Symbol of a new FIFa World Cup. |
Monument a’ Statue of Liberty. |
The answer is D.
11.Soru
"No more infrastructure investment or time spent adding new servers and storage units."
Which area is this advantage of the cloud technologies related to?
Backup and disaster recovery |
Cost effectiveness |
Security |
Compatibility |
Storage and scalability |
Storage and Scalability: No more infrastructure investment or time spent
adding new servers and storage units. With the cloud, you basically have access to unlimited storage capacity and scalability.
12.Soru
What is the primary difference between companies like Hepsiburada and Amazon, and companies such as Craigslist and Sahibinden?
Hepsiburada and Amazon are large corporations while Craigslist and Sahibinden are small online entities. |
Hepsiburada and Amazon provide a vast scope of products and services, while Craigslist and Sahibinden only provide a single category. |
Amazon and Hepsiburada follow the consumer to business model while Sahibinden and Craigslist follow the business to consumer model. |
Amazon and Hepsiburada receive large amounts of government subsidies to operate internationally, therefore they are closer to a government to business model while Sahibinden and Craigslist are companies that provide a service and follow the business to consumer model. |
Sahibinden and Craigslist are intermediaries between consumers and follow the consumer to consumer model, while Amazon and Hepsiburada provide direct sales and follow the business to consumer model. |
Amazon and Hepsiburada are businesses that offer their goods and services to consumers directly, and therefore follow the business to consumer model. Craigslist and Sahibinden, however, act as intermediaries between consumers whom are selling their goods and services to each other and therefore follow the consumer to consumer model.
13.Soru
The process of how one proves that they are who they claim that they are in security controls is called:
Authorization. |
Identification. |
Phishing. |
Authentication. |
Spoofing. |
Authentication is the process of how one proves that they are who they claim that they are. When one claims to be “Ahmet San” by logging into a computer as “ahmetsan”, the computer system will most likely ask him for a password. He has claimed to be that person by entering the name into the username field. This part is the identification process. However, now he must prove that he is really that person. This is the authentication part.
14.Soru
Which ones below are protected by copyright laws?
I distribution of copies of the work
II reservation of the work
III public performance of the work
IV translation of the work into other languages
V adaptation of the work
I, II, III
II, III, IV
II, III, IV, V
III, IV, V,
|
I, III, V, VI |
For the sake of protection of the intellectual property, most copyright laws state that authors or other right
owners can authorize or prevent
• reproduction of the work;
• distribution of copies of the work;
• public performance of the work;
• broadcasting of the work to the public;
• translation of the work into other languages;
• adaptation of the work.
15.Soru
I.Small storage II.Several sensors III.Processing capacity. Which one(s) do the active objects have?
Only I |
II and III |
Only II |
I and II |
Only III |
Active objects: They can be equipped with several sensors, have greater storage capacity, have a processing capacity or be able to communicate over a network. Those are the devices for collecting, storing, transmitting and processing data from the physical world.
16.Soru
Which of the following commercial ERP softwares has originated from Turkey?
SAP ERP |
Oracle ERP |
Microsoft Dynamics ERP |
Netsis 3 Enterprise |
Abas ERP |
SAP ERP has Germany as the country of origin, Oracle ERP has United States of America, Microsoft Dynamics ERP has United States of America, Netsis 3 Enterprise has Turkey, and Abas ERP has Germany as the country of origin respectively.
17.Soru
I. John wants to send a message to Mary. John encrypts the message with a key which is known only by John and Mary. Mary decypts the encrypted message with the same key.II. John wants to send a message to Mary. Mary has a key pair in which one of the keys is known by only Mary and the other one is known by everyone. John encrypts the message with Mary's key which is known by everyone. Mary decrypts the message with her key which is only known by herself.There are two different message sending scenarios above. Which one of the following is the correct pair of cryptographic algorithms appropriate for the scenarios?
I. Symmetric key cryptography II. Asymmetric key cryptography |
I. Symmetric key cryptography II. Symmetric key cryptography |
I. Public key cryptography II. Asymmetric key cryptography |
I. Asymmetric key crptography II. Public key cryptography |
I. Public key cryptography II. Symmetric key cryptography |
There are mainly two categories of cryptographic algorithms, symmetric and public key (asymmetric) cryptographic algorithms. Symmetric cryptography uses only one shared key. Sender and receiver agree on a key and encrypts and decrypt the messages using this key, respectively. The same key is used to encrypt and decrypt the data. Contrarily, public key cryptography requires two different keys, private key that is only known by the owner and public key that is delivered anyone freely. Data encrypted by the public key can only be decrypted by its private key counterpart. Correct answer is A.
18.Soru
Which of the following is true about a code of ethics?
It negatively affects all stakeholders. |
It enhances the public's confidence and respect to the management's decision. |
It clarifies the responsibilities of a society to professionals. |
It forbids education of the member of a profession at whom the code is directed. |
It ignores a society's values and principles. |
A code of ethics often finds place in business organizations and it is often developed to
• positively affect all stakeholders, for instance, end-user of products, customers/clients, employees of the firms, current and future supporter of projects,
• enhance the public’s confidence and respect to the managements’ decision,
• clarify the responsibilities of the professionals’ to the society,
• assist education of the member of profession at whom the code is directed.
19.Soru
Which module in ERP systems helps an organization in optimizating all available resources while delivering products?
Sales module. |
Purchase module. |
Production planning module. |
Supply chain management module. |
Inventory module. |
Production planning helps an organization for optimization of all available resources while delivering products. Organizations can track product creation processes with the help of this ERP module. It is mainly designed to monitor day-to-day production progress.
20.Soru
Which of the following words best completes the sentence below?
"__________ refer(s) to a set of technologies and IT service delivery modes that encourage the use and supply of software, the ability to store and process large amounts of information over Internet."
Active objects |
Smart Home |
Cloud |
Environmental Solutions |
Passive objects |
The term “Cloud” is a marketing term that is somewhat obscure to some, but which is explained very simply. The term cloud computing, or simply, cloud refers to a set of technologies and IT service delivery modes that encourage the use and supply of software, the ability to store and process large amounts of information over Internet.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ