Yeni eklenen sınavlar ve güncel içerikler! Hemen keşfedin

Final Sınavı

Information Technologies

20
Soru
60
Dakika
0
Görüntülenme
0
Çözülme

Sınav Ayarları

Soru 1

Orta Zorluk

Which one of the following is an output operation?

Soru 2

Orta Zorluk

Which element of an ERP system is responsible for tracking order placement, order scheduling, shipping, invoicing and pricing information?

Soru 3

Orta Zorluk

Which of the following is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source.

Soru 4

Orta Zorluk

What is the primary difference between commercial ERP software solutions such as Oracle ERP and open source software such as ERPNext?

Soru 5

Orta Zorluk

Which one(s) of the followings does an office suite include? I. A word processor II. A portable document format III. A spreadsheet application

Soru 6

Orta Zorluk

What is a small and permanent software programmed into a read-only memory called?

Soru 7

Orta Zorluk

Which of the following is among the general conditions of an invention to be patentable?

Soru 8

Orta Zorluk

Which of the following is not one of the precautions that should be taken to protect a computer based system from malicious software?

Soru 9

Orta Zorluk

Which one of the following variables is related to the perception of this magnitude can be very different depending on the situations in which a person is to find and what is happening around the observer?

Soru 10

Orta Zorluk

Which of the following is the correct definition for Security Breach ?

Soru 11

Orta Zorluk

"The invention must be new, its contribution in the technical field should be beyond to the state-of-art" Which of the following concepts does the statement above explain?

Soru 12

Orta Zorluk

Which of the following is a comprehensive software solution for business processes?

Soru 13

Orta Zorluk

Which of the following factors does not affect the ERP software choice of companies?

Soru 14

Orta Zorluk

"A web site informs its users about the risk of losing some of their confidential data." Considering the possible actions of risk management, given action may be an example of which of the following?

Soru 15

Orta Zorluk

What creates an environment that allows its programmer to open a certain channel on the system, allowing the attacker to monitor or control the infected user’s system?

Soru 16

Orta Zorluk

What are malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network, affecting the speed of the computer and/or causing the computer to crash called?

Soru 17

Orta Zorluk

What is the network of smart devices that can communicate and interact with their external environment?

Soru 18

Orta Zorluk

Which of the following means preventing information from being changed by unauthorized persons?

Soru 19

Orta Zorluk

Which of following is one of C2B e-commerce model?

Soru 20

Orta Zorluk

Which of the followings is different from the others?

Derse Dön