logo
Daha önce çıkmış sorular ve yeni eklenen sınavlar! Hemen keşfetmeye başlayın.

Final Sınavı - Information Technologies

Soru 1:

Which one of the following is an output operation?

Soru 2:

Which element of an ERP system is responsible for tracking order placement, order scheduling, shipping, invoicing and pricing information?

Soru 3:

Which of the following is the forgery of an e-mail header so that the message seems to be sent from someone or somewhere other than the original source.

Soru 4:

What is the primary difference between commercial ERP software solutions such as Oracle ERP and open source software such as ERPNext?

Soru 5:

Which one(s) of the followings does an office suite include? I. A word processor II. A portable document format III. A spreadsheet application

Soru 6:

What is a small and permanent software programmed into a read-only memory called?

Soru 7:

Which of the following is among the general conditions of an invention to be patentable?

Soru 8:

Which of the following is not one of the precautions that should be taken to protect a computer based system from malicious software?

Soru 9:

Which one of the following variables is related to the perception of this magnitude can be very different depending on the situations in which a person is to find and what is happening around the observer?

Soru 10:

Which of the following is the correct definition for Security Breach ?

Soru 11:

"The invention must be new, its contribution in the technical field should be beyond to the state-of-art" Which of the following concepts does the statement above explain?

Soru 12:

Which of the following is a comprehensive software solution for business processes?

Soru 13:

Which of the following factors does not affect the ERP software choice of companies?

Soru 14:

"A web site informs its users about the risk of losing some of their confidential data." Considering the possible actions of risk management, given action may be an example of which of the following?

Soru 15:

What creates an environment that allows its programmer to open a certain channel on the system, allowing the attacker to monitor or control the infected user’s system?

Soru 16:

What are malicious software designed to automatically copy itself from one computer to another, which can consume high bandwidth on the local drive or on the network, affecting the speed of the computer and/or causing the computer to crash called?

Soru 17:

What is the network of smart devices that can communicate and interact with their external environment?

Soru 18:

Which of the following means preventing information from being changed by unauthorized persons?

Soru 19:

Which of following is one of C2B e-commerce model?

Soru 20:

Which of the followings is different from the others?