logo
Daha önce çıkmış sorular ve yeni eklenen sınavlar! Hemen keşfetmeye başlayın.

Final Sınavı - Information Technologies

Soru 1:

What is booting?

Soru 2:

Which of the following is an example for a B2B e-commerce model?

Soru 3:

What is the main step in KDD?

Soru 4:

Which of the following is NOT among the features of Trojan Horse?

Soru 5:

Which of following is one of C2C e-commerce model?

Soru 6:

Which of the following is the computer unit that can be simply defined as the unit where data/information processing is carried out?

Soru 7:

Which of the following can be found among the code of ethics developed by ACM?

Soru 8:

Which one of the following virtual reality types is immersive when it is able to create a sense of sensory immersion in three-dimensional computer generated?

Soru 9:

Which of the below passwords is a strong password having the necessary features?

Soru 10:

Which of the following may be considered as an example of a fundamental shift in e-commerce models by an e-business?

Soru 11:

"The invention must not be obvious, the proposed solution to the considered problem could not be reduced by someone with average knowledge of the technical field." Which of the following concepts does the statement above explain?

Soru 12:

What of the terms is defined as “a sign, or a combination of signs used to distinguish product or service of a company from those of another”?

Soru 13:

What is the difference between EFT and EDI?

Soru 14:

Which one of the followings can come to the empty place in the sentence? A code of ethics often finds place in business organizations and it is often developed to ______.

Soru 15:

Which of the following is NOT one of the four words used to describe Big Data?

Soru 16:

Which of the layers found in the OSI reference model delivers data across network connections?

Soru 17:

The specialized type of spam that attempts to trick you into entering one’s confidential, personal or account information is called:

Soru 18:

In information technology, which of the following is not one of the principle goals of security?

Soru 19:

Which of the followings is the main reason for the case that a company monitors their workers’ use of the Internet and restricts their accessibility to the Internet?

Soru 20:

The Internet presents significant new challenges for protecting the right to privacy. Which ones below are among the challanges for protecting the right to privacy because of the Internet? I The internet results in new types of personal information II The internet s implifies the collection of location of personal information III The internet introduces new capacities for government and private actors to analyse personal information IV The Internet has become widespread around the world V The Internet introduces new opportunities for commercial use of personal information