Which of the followings is not a focus of UNESCO?
Doğru Cevap!
Yanlış Cevap!
Doğru Cevap: C) Giving proper credit for intellectual property
Which one below is can be regarded as an exception to copyright protection?
Doğru Cevap: B) Use of works for the purpose of news reporting
Which one below is not among one of the certain requirements that an invention needs to have to be considered as patentable?
Doğru Cevap: A) Appeal
I. Confidentiality II. Non-repudiation III. Availability IV. Integrity Which ones are among the principle goals of security?
Doğru Cevap: D) I,III and IV
Which of the following term refers to any group or force that may intentionally infringe on the integrity, confidentiality and availability of information?
Doğru Cevap: C) Adversary
Which of the following is NOT true about the characteristics of current information technologies?
Doğru Cevap: D) Cloud technology within IT requires physical use of storage disks.
Which one below is not protected by Industrial property rights basd on Considering The Convention Establishing the World Intellectual Property Organization (1967)?
Doğru Cevap: E) Novelty
Which of the following is not a direct consequence of protection of intellectual property?
Doğru Cevap: C) Opening new faculties in administrative science
Which of the following is "Electronic funds transfer" definitions?
Doğru Cevap: A) EFT
How many sections does the ACM code of ethics have?
Doğru Cevap: D) 4
What does AR stand for?
Doğru Cevap: E) Augmented reality
Which one of the following disadvantages of the cloud technologies is related to the ability to outsource the IT power to a specialized provider?
Doğru Cevap: C) control and reliability
Which of the following acronyms is not an e-commerce model?
Doğru Cevap: A) ERP
I. If John encrypts a message with his private key both July and Mary can decrypt the message.II. If John encypts a message with Mary's public key, July can decrypt the message.III. If John takes a message encrypted by his public key, he think that the message is sent by July.There is a communication channel between John, Mary ang July. Each of the participiants has a key pair in which one of the keys is public and the other one is private. Which one of the above expressions is / are definitely true?
Doğru Cevap: A) Only I
Which of the following accurately summarizes the relationship between e-business, e-commerce and the Internet?
Doğru Cevap: D) E-business is the use of the Internet for different business processes, including e-commerce, which is the sale and purchase of goods and services over the Internet.
Which of the following does the definition below match? "a union between the real and the virtual image: the real image, in essence, are superimposed virtual details that complement each other, thus creating a unique environment."
Doğru Cevap: D) Augmented Reality
___________________is a computer infrastructure mainly dedicated to the needs of a single organization.
Doğru Cevap: D) Private Cloud
Which of the following software is a protocol that facilitates synchronous communication in the form of text and allows several users to chat each other simultaneously?
Doğru Cevap: A) Internet Relay Chat
Which of the following best refers to an action or possible event to violate the security of the system by exploiting known or unknown vulnerabilities?
Doğru Cevap: B) Threat
Which one of the following refers to a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people?
Doğru Cevap: C) Security