Bilgi Teknolojisi Ödev Yardımı
Bilgi teknolojisi atama yardımı, kullanıcılara en ileri bilim ve teknoloji hakkında çok yüksek kalitede bilgi sağlayabilir. Çok detaylı kategorize edilmiş bilgi verileri vardır ve yazılımın kendisinin bunları kullanma izni yoktur, böylece herkes teknolojiden sonuna kadar yararlanabilir.
Alışılmışın dışında teknoloji ve yaşam için de mükemmel bir içerik organizasyonudur. İlginç ve profesyonel içerik üretmek için kullanıcıları ve markaları birbirine bağlar. Teknik bilgiler, derinlemesine incelemeler, beceri ipuçları ve ürün deneyimleri vb. içerir. Grafik, video ve bilgilendirici reklam içerik formatlarına sahiptir ve başlıca yeni medya platformlarını kapsar.
- Which gate is not available on Logic Tutor LT345 MKII? a. NOR b. NOT c. XOR d. OR e. NAN D
- What is the purpose of a shift register in digital circuits? a. Converts analog signals to digital b. None of them c. Adds binary numbers d. Multiplies binary numbers e. Inverts shifted data
- Name & Surname: Instruction: Answer all questions by choosing the right option. 1. The term for any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information or processing capability? A) Digital security risk B) Cybercrime C) Malware D) Firewall __ is the name of a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device? A) Adware B) Rootkit C) Trojan horse D)Worm 3. What is the technique of making a network or Internet transmission appear legitimate to a firewall? A) Back door B)Spoofing C)Botnet D)DoS attack 4. The process of converting data that is readable by humans into encoded characters to prevent unauthorized access is called? A) Encryption B) Decryption C) Compression D) Hashing 5. What is the notice that guarantees a user or a website is legitimate? A) Digital signature B)Digital certificate C) Encryption key D)License agreement 6. __ a private combination of words associated with a user name that allows access to certain computer resources? A) Password B)PIN C) CAPTCHA D) Passphrase 7. Ascam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information is? A) Pharming B)Phishing C) Spoofing D) Spyware 8. What is a written list of guidelines for the ethical and moral use of computers and other technology? A) Acceptable use policy B) Code of conduct C) Privacy policy D)Terms of service 9. What is a type of application program that assists professionals and designers in creating engineering, architectural, and scientific designs and models? A) CAD B)CAM C) CGI D)VRML 10. The term for a website that uses encryption techniques to secure its data? A) Secure site B)Certificate authority C) Digital certificate D) Secure HTTP 11. What is the difference between installed and Web-based software? a) Installed software runs on the computer, while Web-based software runs on the Internet b) Installed software is purchased in physical form , while Web-based software is downloaded from the Internet. c) Installed software must be installed on the computer before it can be run, while Web -based software can be run directly from the Internet d) Installed software is always commercial software, while Web-based software is always freeware.
- 12. Is the name of the programmed formula that performs mathematical operations on the content of other cells in a spreadsheet? a) Function b) Formula c) Constant d) Label 13. The term for a collection of related data that is stored in a manner enabling information to be retrieved as needed? a) Database b) Spreadsheet c) Table d) Record 14. __ is the term for a one-page presentation graphic that can be displayed in a group with others to form an electronic slide show? a) Slide b) Template c) Chart d) Report 15. What is the term for graphical images such as digital photographs clip art, scanned drawings,and original images created using a software program? a) Graphics b) Multimedia c) Presentation graphics d)Animation 16. The term for the software that allows the creation and manipulation of an electronic database?a) Database management system (DBMS) b)Database software c) Relational database d) Query 17. Is the term for the text-based entry in a worksheet cell that identifies data on the worksheet? a) Label b) Constant c) Formula d) Function 18. __ is the term for the software that is not copyrighted and ownership rights have been donated to the public domain? a) Public domain software b) Freeware c) Shareware d) Open-source software 19. What is the term for the software that is used to create DVD content, such as importing videos, creating menus, and burning onto a DVD? a) DVD burning software b) DVD authoring software c) Video editing software d) DVD ripping software 20. The term for the software that is used to modify existing videos, such as preparing video clips for presentations or Web sites? a) Video editing software b) Video playing software c) Video capturing software d) Video streaming software 21. Which of the following is not a quality of valuable information? A) Accurate B) Verifiable C) Timely D) Complex __ is the term for a set of hardware software, data, people, and procedures that work together to produce information? A) Information system B)Information literacy C) Information technology D) Information resource 23. What is the name of the information system that integrates MRP II with the information flow across an organization? A) Document management system B) Content management system C) Enterprise resource planning D) Transaction processing system 24. The name of the information system that helps users analyze information and make decisions? A) Management information system B) Decision support system C) Expert system D)Online analytical processing 25. What is the name of the information system that captures and stores the knowledge of human experts and then imitates human reasoning and decision making? A) Management information system B) Decision support system C) Expert system D) Online analytical processing 26. Which of the following is not a technology career field according to the document? A) Technology equipment B)Technology service and repair C) Technology education and training D) Technology entertainment
- 28. __ is the term for a set of hardware , software, data, people, and procedures that work together to produce information? A) Information system B)Information literacy C) Information technology D) Information resource 29. The term for any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information or processing capability? A) Digital security risk B) Cybercrime C) Malware D) Firewall movely 30 __ is the name of a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device? A) Adware B) Rootkit C) Trojan horse D)Worm 31. What is the technique of making a network or Internet transmission appear legitimate to a firewall? A) Back door B)Spoofing C)Botnet D)DoS attack 32. Which of the following technology jobs is responsible for the security of data and information stored on computers and mobile devices within an organization? A) Computer security incident responder B) Computer security specialist C) Digital forensics examiner D) Network security administrator 33. What is the name of the process of planning scheduling, and then controlling the activities during system development? A) Project management B)Feasibility assessment C) Documentation D) Data and information gathering 34. The name of the conversion strategy that involves running the old system alongside the new system for a specified time is? A) Direct conversion B)Parallel conversion C) Phased conversion D) Pilot conversion 35. What is the name of the test that verifies that all programs in an application work together properly? A) Unit test B)Systems test C) Integration test D) Acceptance test 36. The following technolog jobs writes and develops web content and website layouts so that they will appear at the beginning of search results when users search for content? A) Customer relationship management specialist B) Internet/social media marketing specialist C) Search engine optimization expert D) User experience designer 37. Which of the following is not a technology career field according to the document? A) Technology equipment B)Technology service and repair C) Technology education and training D) Technology entertainment 38. What is the difference between installed and Web-based software? a) Installed software runs on the computer, while Web-based software runs on the Internet b) Installed software is purchased in physical form while Web-based software is downloaded from the Internet. c) Installed software must be installed on the computer before it can be run, while Web-based software can be run directly from the Internet d) Installed software is always commercial software, while Web-based software is always freeware. 39. Is the name of the programmed formula that performs mathematical operations on the content of other cells in a spreadsheet? a) Function b) Formula c) Constant d) Label 40. The term for a collection of related data that is stored in a manner enabling information to be retrieved as needed? a) Database b)Spreadsheet c) Table d)Record __ of the following technology jobs uses analytics and other Big Data techniques to interpret a company's data from a variety of sources to better understand its performance , make recommendations for improvement, and predict future outcomes? A) Data scientist B) Database administrator C) Database analyst D) Web analytics expert