logo
Daha önce çıkmış sorular ve yeni eklenen sınavlar! Hemen keşfetmeye başlayın.

Final Sınavı - Information Technologies

Soru 1:

Which of the followings is not one of the eight functional modules of ERP system?

Soru 2:

Which of following is the Business-to-Business?

Soru 3:

Which of the following is NOT a condition for an invention to be patentable?

Soru 4:

Which of the following is true regarding hardware and software security?

Soru 5:

Which of the following is true about symmetric cryptography?

Soru 6:

"_________is the process of how one proves that they are who they claim that they are." Which word below completes the above definition?

Soru 7:

Which of the following e-commerce companies have components such as browsing, searching, reviews and contents, secure credit card payment, high level of customer service?

Soru 8:

E-mails that attempt to trick you into entering one's confidenital personal or account information is called _____.

Soru 9:

What is the process of how one proves that they are who they claim that they are?

Soru 10:

Which one of the following is not one of the precautions to protect a computer from malicious software?

Soru 11:

Which of the following uses uniform resource locators to function?

Soru 12:

Which of the followings aims at establishing knowledge societies different from the others?

Soru 13:

What is a server?

Soru 14:

Which of the following statements is not true about ERP software?

Soru 15:

Which module in ERP systems allows the company to maintain information on employees?

Soru 16:

Which of the following is not main functions of trademarks?

Soru 17:

Which of the following feature is the salient feature of application softwares?

Soru 18:

Which of the following does the definition below match? "One of the core areas of artificial intelligence (AI) and deals with the implementation of systems and algorithms that are based on observations as data for the synthesis of new knowledge (inductive reasoning)."

Soru 19:

"Merging data from different sources such as databases, data flats etc. into a compatible data store." Which of the following data preprocessing phase requires the given definition?

Soru 20:

What is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source?