Yeni eklenen sınavlar ve güncel içerikler! Hemen keşfedin

Final Sınavı

Information Technologies

20
Soru
60
Dakika
0
Görüntülenme
0
Çözülme

Sınav Ayarları

Soru 1

Orta Zorluk

What is booting?

Soru 2

Orta Zorluk

Which of the following is an example for a B2B e-commerce model?

Soru 3

Orta Zorluk

What is the main step in KDD?

Soru 4

Orta Zorluk

Which of the following is NOT among the features of Trojan Horse?

Soru 5

Orta Zorluk

Which of following is one of C2C e-commerce model?

Soru 6

Orta Zorluk

Which of the following is the computer unit that can be simply defined as the unit where data/information processing is carried out?

Soru 7

Orta Zorluk

Which of the following can be found among the code of ethics developed by ACM?

Soru 8

Orta Zorluk

Which one of the following virtual reality types is immersive when it is able to create a sense of sensory immersion in three-dimensional computer generated?

Soru 9

Orta Zorluk

Which of the below passwords is a strong password having the necessary features?

Soru 10

Orta Zorluk

Which of the following may be considered as an example of a fundamental shift in e-commerce models by an e-business?

Soru 11

Orta Zorluk

"The invention must not be obvious, the proposed solution to the considered problem could not be reduced by someone with average knowledge of the technical field." Which of the following concepts does the statement above explain?

Soru 12

Orta Zorluk

What of the terms is defined as “a sign, or a combination of signs used to distinguish product or service of a company from those of another”?

Soru 13

Orta Zorluk

What is the difference between EFT and EDI?

Soru 14

Orta Zorluk

Which one of the followings can come to the empty place in the sentence? A code of ethics often finds place in business organizations and it is often developed to ______.

Soru 15

Orta Zorluk

Which of the following is NOT one of the four words used to describe Big Data?

Soru 16

Orta Zorluk

Which of the layers found in the OSI reference model delivers data across network connections?

Soru 17

Orta Zorluk

The specialized type of spam that attempts to trick you into entering one’s confidential, personal or account information is called:

Soru 18

Orta Zorluk

In information technology, which of the following is not one of the principle goals of security?

Soru 19

Orta Zorluk

Which of the followings is the main reason for the case that a company monitors their workers’ use of the Internet and restricts their accessibility to the Internet?

Soru 20

Orta Zorluk

The Internet presents significant new challenges for protecting the right to privacy. Which ones below are among the challanges for protecting the right to privacy because of the Internet? I The internet results in new types of personal information II The internet s implifies the collection of location of personal information III The internet introduces new capacities for government and private actors to analyse personal information IV The Internet has become widespread around the world V The Internet introduces new opportunities for commercial use of personal information

Derse Dön