Which one of the following executes and controls all the processes within the computer?
Doğru Cevap!
Yanlış Cevap!
Doğru Cevap: E) CPU
Which of the following is the description of a database including structure and constraints that the database should obey?
Doğru Cevap: D) Database schema
Which of the following is the most commonly used transmission media due to easy installation and low prices?
Doğru Cevap: C) Twisted pair
A/an ............... is a signal to the processor released by hardware or software that indicates a particular event requiring immediate attention. Which term is defined above?
Doğru Cevap: D) interrupt
which of the below is a web browser?
Doğru Cevap: C) Chrome
"It is a very powerful multi-user computer that can support thousands ofusers at the same time." Which type of computer is described above?
Doğru Cevap: A) mainframe
Which of the following is a circuit board that enables a computer to connect to a network?
Doğru Cevap: A) Network Interface Controllers
Which of these situations describes the case of a Denial-of-Service attack?
Doğru Cevap: A) When many different sources flood the network with traffic until a shutdown occurs due to the overload.
I. Difficult to understand II. Fast in speed III. Close to user IV. Generally written in high-level language Which of the ones listed above are correct for system software?
Doğru Cevap: A) I and II
What do users need in order to send HTTP requests to web servers?
Doğru Cevap: E) Web browsers
FCAPS, which describes the requirements of network management is the acronym for:
Doğru Cevap: E) Fault, configuration, accounting, performance, and security.
What does HTTP stand for?
Doğru Cevap: E) Hypertext Transfer protocol
Data warehousing Visualization Data mining Data collection Put these steps of KDD into the correct order starting from the beginning stage?
Doğru Cevap: D) 4-1-3-2
In which of these network topologies, each device has a point- to-point connection with a single or multiple devices?
Doğru Cevap: C) Mesh topology
Which of these common security attacks describes the situation when the attacker impersonates another user or device on the network to attack the network and access data sources?
Doğru Cevap: C) Spoofing Attack
Which type of computer is a very powerful multi-user computer that can support thousands of users at the same time?
Doğru Cevap: A) Mainframe
Which one below is the name of a popular data model used for conceptual design that epresents data as entities, attributes, and relationships?
Doğru Cevap: D) Entity-relationship
Whih of the following is an input device?
Doğru Cevap: E) Scanner
Which of the network management requirements is concerned with tracking the usage of computation and network resources to provide a fair distribution of resources among users?
Doğru Cevap: C) Accounting management
Which of these basic hardware components are used to connect computers, printers and servers within a building?
Doğru Cevap: B) Switches