logo
Daha önce çıkmış sorular ve yeni eklenen sınavlar! Hemen keşfetmeye başlayın.

Final Sınavı - Information Technologies

Soru 1:

Which of the followings is not a focus of UNESCO?

Soru 2:

Which one below is can be regarded as an exception to copyright protection?

Soru 3:

Which one below is not among one of the certain requirements that an invention needs to have to be considered as patentable?

Soru 4:

I. Confidentiality II. Non-repudiation III. Availability IV. Integrity Which ones are among the principle goals of security?

Soru 5:

Which of the following term refers to any group or force that may intentionally infringe on the integrity, confidentiality and availability of information?

Soru 6:

Which of the following is NOT true about the characteristics of current information technologies?

Soru 7:

Which one below is not protected by Industrial property rights basd on  Considering The Convention Establishing the World Intellectual Property Organization (1967)?

Soru 8:

Which of the following is not a direct consequence of protection of intellectual property?

Soru 9:

Which of the following is "Electronic funds transfer" definitions?

Soru 10:

How many sections does the ACM code of ethics have?

Soru 11:

What does AR stand for?

Soru 12:

Which one of the following disadvantages of the cloud technologies is related to the ability to outsource the IT power to a specialized provider?

Soru 13:

Which of the following acronyms is not an e-commerce model?

Soru 14:

I. If John encrypts a message with his private key both July and Mary can decrypt the message.II. If John encypts a message with Mary's public key, July can decrypt the message.III. If John takes a message encrypted by his public key, he think that the message is sent by July.There is a communication channel between John, Mary ang July. Each of the participiants has a key pair in which one of the keys is public and the other one is private. Which one of the above expressions is / are definitely true?

Soru 15:

Which of the following accurately summarizes the relationship between e-business, e-commerce and the Internet?

Soru 16:

Which of the following does the definition below match? "a union between the real and the virtual image: the real image, in essence, are superimposed virtual details that complement each other, thus creating a unique environment."

Soru 17:

___________________is a computer infrastructure mainly dedicated to the needs of a single organization.

Soru 18:

Which of the following software is a protocol that facilitates synchronous communication in the form of text and allows several users to chat each other simultaneously?

Soru 19:

Which of the following best refers to an action or possible event to violate the security of the system by exploiting known or unknown vulnerabilities?

Soru 20:

Which one of the following refers to a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people?