logo
Daha önce çıkmış sorular ve yeni eklenen sınavlar! Hemen keşfetmeye başlayın.

Final Sınavı - Information Technologies

Soru 1:

Which of the following is defined as a collection of related data?

Soru 2:

Which of the following is patentable?

Soru 3:

Which of the following is NOT among the advantages of cloud technologies?

Soru 4:

which of the below measures is used in the storage of Big Data?

Soru 5:

Which of the following is NOT among the precautions one can take to protect a computer based system from malicious software?

Soru 6:

'Consumer sends a request to businesses for a product or service and then businesses make a bid. Then, consumer decides where the product or service will be bought from' describes which type of e-commerce model?

Soru 7:

In which of the following e-commerce models both sides of exchange are consumers providing an opportunity to sell assets via the Internet?

Soru 8:

Which one of the following elements is not among the advantages of cloud technologies?

Soru 9:

Which of the following best completes the following sentence? "___________ is a legal term used to describe the rights that creators have over their original literary and artistic works."

Soru 10:

What describes the ability of a system to maintain its function under a given set of conditions for a certain period of time?

Soru 11:

Which of the following word pairs best complete the sentence below? "The most important fact that accelerates the evolution of human beings is undoubtedly the __________ and ___________ of information shared during communication."

Soru 12:

Which of the followings is a more representative example of risk of using less secure connections?

Soru 13:

Which of the following statements relating to information technologies in business is true?

Soru 14:

Which application below is not a web browser?

Soru 15:

What does asset in computer security refer to?

Soru 16:

Which of the following is the correct definition of Integrity?

Soru 17:

According to UNESCO, which of the following should NOT serve as a basis for knowledge societies?

Soru 18:

I. Use strong passwords II. Stay away from the latest updates of the programmes III. Check e-mails from unknown senders IV. Monitor incoming traffic to your system Which ones are among the ways to avoid security threats?

Soru 19:

Which e-commerce model allows consumers to determine their needs while businesses compete to meet those needs by offering competitive prices?

Soru 20:

Which of the following can be protected by patent?