aofsorular.com
BİL105U

INFORMATİON TECHNOLOGİES - Deneme Sınavı - 5

Dönem Sonu Sınavı 44739
Soru 1
Which of the following can be protected by patent?
Soru 2
Which of the following cannot be considered as a violation of privacy rights?
Soru 3
Which of the following is not a direct consequence of protection of intellectual property?
Soru 4
Which of the following is not main functions of trademarks?
Soru 5
Which one of the following terms refers to any person, group or force that may intentionally infringe on the integrity, confidentiality and availability of information?
Soru 6
I. Confidentiality

II. Availability

III. Integrity

IV. Privacy

Which of the above are the goals of security?

Soru 7
I. John wants to send a message to Mary. John encrypts the message with a key which is known only by John and Mary. Mary decypts the encrypted message with the same key.II. John wants to send a message to Mary. Mary has a key pair in which one of the keys is known by only Mary and the other one is known by everyone. John encrypts the message with Mary's key which is known by everyone. Mary decrypts the message with her key which is only known by herself.There are two different message sending scenarios above. Which one of the following is the correct pair of cryptographic algorithms appropriate for the scenarios?
Soru 8
I. If John encrypts a message with his private key both July and Mary can decrypt the message.II. If John encypts a message with Mary's public key, July can decrypt the message.III. If John takes a message encrypted by his public key, he think that the message is sent by July.There is a communication channel between John, Mary ang July. Each of the participiants has a key pair in which one of the keys is public and the other one is private. Which one of the above expressions is / are definitely true?
Soru 9
Authentication is the process of how one proves that they are who they claim that they are. According to the given expression which one of the following can not be used as authentication?
Soru 10
Which one of the following refers  to anything on a computer that may harm or copy the data, or allow one to access the computer without anyone’s knowledge?
Soru 11
"A web site informs its users about the risk of losing some of their confidential data." Considering the possible actions of risk management, given action may be an example of which of the following?
Soru 12
"... creates an environment that allows its programmer to open a certain channel on the system, allowing the attacker to monitor or control the infected user’s system."

Which one of the following is the best appropriate term for the given gap?

Soru 13
Which one of the following is not one of the precautions to protect a computer from malicious software?
Soru 14
Which one of the following refers to a degree of protection of computer hardware and software from intentional or unintentional changes, uses, spoofing, spread of information over unauthorized people?
Soru 15
Which of the following is "Electronic funds transfer" definitions?
Soru 16
Which of following is the Business-to-Business?
Soru 17
Which of following is "Government-to-Consumer"?
Soru 18
Which of following is "Consumer-to-Consumer "?
Soru 19
Which of following is "Government-to-Business"?
Soru 20
Which of following is one of B2C e-commerce model?