BİL105U
INFORMATİON TECHNOLOGİES - Deneme Sınavı - 6
Dönem Sonu Sınavı
44738
Soru 1
Which of the followings is not among the general conditions of an invention to be patentable?
Soru 2
Which of the followings is a sign, or a combination of signs, used to distinguish product or service of a company from those of another?
Soru 3
Which of the followings is/are among the challenges presented by the Internet for protecting the right to privacy?
I. Resulting in the collection of new types of personal information
II. Simplifying the collection of location of personal information
III. Introducing new capacities for government and private actors to analyse personal information
IV. Introducing new opportunities for commercial use of personal information
Soru 4
Which of the followings is referred to authors’ rights and is a legal term used to describe the rights that creators have over their original literary and artistic
works?
works?
Soru 5
Which of the following term refers to any group or force that may intentionally infringe on the integrity, confidentiality and availability of information?
Soru 6
Which of the following terms refers to a software or hardware failure or incompleteness which could result in a breach of access in computer security?
Soru 7
Which of the following describes the ability of a system to maintain its function for a certain period of time?
Soru 8
Which of the following should be included in the question mark in the figure below?
Soru 9
Which of the following means preventing information from being changed by unauthorized persons?
Soru 10
Which of the following are suitable for the numbers listed below?
Soru 11
Which of the following is the definition of e-mail phishing?
Soru 12
Which of the following best refers to an action or possible event to violate the security of the system by exploiting known or unknown vulnerabilities?
Soru 13
Which of the following is not a best practice for avoiding security threats in a computer?
Soru 14
Which of the following would be an accurate equation when a function definition of the threats using the vulnerabilities in the system is needed to obtain, modify, damage or destroy the available assets of the system?
Soru 15
Which one of the followings can come to the empty place in the sentence?
A code of ethics often finds place in business organizations and it is often developed to ______.
A code of ethics often finds place in business organizations and it is often developed to ______.
Soru 16
Which of the followings are not protected by Industrial property rights and copyrights by considering The Convention Establishing the World Intellectual Property Organization (1967)?
Soru 17
"The invention must be new, its contribution in the technical field should be beyond to the state-of-art"
Which of the following concepts does the statement above explain?
Which of the following concepts does the statement above explain?
Soru 18
"The invention must have a practical application for industrial or agricultural purposes."
Which of the following concepts does the statement above explain?
Which of the following concepts does the statement above explain?
Soru 19
"The invention must not be obvious, the proposed solution to the considered problem could not be reduced by someone with average knowledge of the technical field."
Which of the following concepts does the statement above explain?
Which of the following concepts does the statement above explain?
Soru 20
Which of the following is in domain of Industrial property?