Yeni eklenen sınavlar ve güncel içerikler! Hemen keşfedin

Final Sınavı

Information Technologies

20
Soru
60
Dakika
0
Görüntülenme
0
Çözülme

Sınav Ayarları

Soru 1

Orta Zorluk

Which of the followings is not a focus of UNESCO?

Soru 2

Orta Zorluk

Which one below is can be regarded as an exception to copyright protection?

Soru 3

Orta Zorluk

Which one below is not among one of the certain requirements that an invention needs to have to be considered as patentable?

Soru 4

Orta Zorluk

I. Confidentiality II. Non-repudiation III. Availability IV. Integrity Which ones are among the principle goals of security?

Soru 5

Orta Zorluk

Which of the following term refers to any group or force that may intentionally infringe on the integrity, confidentiality and availability of information?

Soru 6

Orta Zorluk

Which of the following is NOT true about the characteristics of current information technologies?

Soru 7

Orta Zorluk

Which one below is not protected by Industrial property rights basd on  Considering The Convention Establishing the World Intellectual Property Organization (1967)?

Soru 8

Orta Zorluk

Which of the following is not a direct consequence of protection of intellectual property?

Soru 9

Orta Zorluk

Which of the following is "Electronic funds transfer" definitions?

Soru 10

Orta Zorluk

How many sections does the ACM code of ethics have?

Soru 11

Orta Zorluk

What does AR stand for?

Soru 12

Orta Zorluk

Which one of the following disadvantages of the cloud technologies is related to the ability to outsource the IT power to a specialized provider?

Soru 13

Orta Zorluk

Which of the following acronyms is not an e-commerce model?

Soru 14

Orta Zorluk

I. If John encrypts a message with his private key both July and Mary can decrypt the message.II. If John encypts a message with Mary's public key, July can decrypt the message.III. If John takes a message encrypted by his public key, he think that the message is sent by July.There is a communication channel between John, Mary ang July. Each of the participiants has a key pair in which one of the keys is public and the other one is private. Which one of the above expressions is / are definitely true?

Soru 15

Orta Zorluk

Which of the following accurately summarizes the relationship between e-business, e-commerce and the Internet?

Soru 16

Orta Zorluk

Which of the following does the definition below match? "a union between the real and the virtual image: the real image, in essence, are superimposed virtual details that complement each other, thus creating a unique environment."

Soru 17

Orta Zorluk

___________________is a computer infrastructure mainly dedicated to the needs of a single organization.

Soru 18

Orta Zorluk

Which of the following software is a protocol that facilitates synchronous communication in the form of text and allows several users to chat each other simultaneously?

Soru 19

Orta Zorluk

Which of the following best refers to an action or possible event to violate the security of the system by exploiting known or unknown vulnerabilities?

Soru 20

Orta Zorluk

Which one of the following refers to a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people?

Derse Dön