1
IT Exercises
2
Which one of these is computer hardware?
المادية المكونات من يعتبر العناصر هذه من أى
O The operating system.
O A CPU.
O A word processing package.
O A spreadsheet.
A CPU.
3
Which one of these is application software?الحاسب تطبيقات برامج عن العناصريعبر هذه من أى
O Graphics card.
O Word processor.
O Central Processing Unit (CPU).
O Hard Disk.
Word processor
4
Mouse
Monitor System Case
Hard Disk
Data storage
Containing CPU
Output Device
Input Device
Hard Disk
System Case
Monitor Mouse
وحدة تخزين البيانات
وحدة تضمالمعالجة
إخراج وحدة إدخال وحدة
5
Large Organization often use a computer system to run the company typically it is most likely to be:
حاسوب نظام بإستعمال تقوم األحيان أغلب في الكبيرة لمنظمةي6ك7ون6 األغلب على هو نموذجيا: بشكل الشركة? لعمل
A. A Personal Computer.
B. A PDA.
C. A Mini Computer.
D. A Mainframe Computer. A Mainframe Computer
6
Which one of these computer types is the most powerful?األقوى هو األنواع هذه من أى
-Laptop.
-Mainframe Computer.
-Server.
-Personal Computer.
Mainframe Computer
7
Scanner can be described as:
أنه على يوصف أن يمكن الضوئى الماسحA. An output device only
B. An input device only
C. An input and output device
D. Storage device
An input device only
8
Which one is not true about RAM?
عن صحيح غير العبارة هذه من RAMأى
A. The data stored on it is volatile.
B. Information is lost when you switch off the computer.
C. The data held on it cannot be saved on your hard disk.
D. The operating system is copied on it when you switch on computer.
الذاكرة على المخزنة على RAMالبيانات تخزينها يتم أن يمكن الالصلب القرص
9
10
Which one of the following devices connect to the system unit externally and controlled by the central
processing unit?يتم ولكن خارجيا النظام بوحدة متصلة تكون الوحدات عن العبارات هذه من التحكم أى
المركزية المعالجة وحدة خالل من فيهاA. Additional devices.
B. Storage Units.
C. Input devices.
D. Peripheral devices.
11
Which one of these is a computer software?
الحاسب برامج من العناصر هذه من أى
A. Monitor.
B. Windows.
C. System Case.
D. Scanner.
12
A Gigabyte is approximately:
تساوى تقريبا بايت الجيجا
A. 1,000 bytes.
B. 100 kilobytes.
C. 1,000 kilobytes.
D. 1,000 Megabytes . The exactly 1024 mB
13
Which two of the following have a significant influence on the speed at which a computer
performs?
الحاسب وأداء سرعة فى كبير يؤثربشكل العناصر هذه من إثنان أى O Installing new applications.
O Clearing all the unwanted files off a hard disk.
O Installing a smaller monitor.
O Increasing the amount of RAM.
O Adding a CD-ROM drive.
الصلب القرص من فيها مرغوب الغير الملفات كل تنظيف أو إبعادالذاكرة قيمة أو كمية RAMزيادة
14
Creating letters, faxes or memos etc.
Make financial projections.
Create overhead projection or slides.
Sorting large amounts of information.
Producing a newspaper with complex page layouts
Desktop Publishing
Word processingA presentation
Application
A spreadsheet Application
A Database Application
Word Processing
A spreadsheet Application
A presentation Application
A Database Application
Desktop Publishing
15
Which two of these are operating systems?تشغيل نظام يعتبر العناصر هذه من إثنان أى
A. Linux.
B. Mac OS.
C. Internet explorer.
D. Outlook.
E. Google.
16
Which one of the following statements about copyright is true?
النسخ حقوق عن صحيح العبارات هذه من أى
A. You can use downloaded graphics in any way.
B. You are allowed to re-use text you copy from the web.
C. When you purchase software, the copyright transfer to you.
D. Audio files on the internet are subject to copyright.
اإلنترنت على النسخ لحقوق خاضعة المسموعة الملفات
17
Stage 1 Stage 3Stage 2
Analysis Design Programming
Drag each of the stages of development into logical orderللتطوير المنطقى الترتيب فى تطوير مرحلة كل .إسحب
Stage 4
Testing
Programming Design Testing Analysis
18
From an output devices:اإلخراج وحدات من
A. Mouse.
B. Keyboard.
C. Plotter.
D. Light Pen.
Plotter
19
Which of the following statement is true?
صحيح العبارات هذه من أى
A. The CPU is an input devices.
B. The CPU is an output devices. C. The CPU is used to process program instructions and data.
D. The CPU is used as non volatile storage media.
البيانات و البرامج بمعالجة يقوم المعالج أو المركزية المعالجة وحدة
20
Which two of the following is considered as input
devices? اإلدخال وحدات من أنه محسوب العبارات هذه من أى
A. Printers.
B. Monitor. C. Microphone.
D. Plotter.
E. Keyboard.
Microphone
Keyboard
21
22
23
24
25
Which one have the fastest access to data?البيانات إلى الوصول فى األسرع يعتبر هذه من أى
A. DVD drive.
B. Floppy disk. C. Zip disk.
D. Hard Disk. Hard Disk
26
27
Which one of the following is not an input device?
إدخال وحدة يكون ال اإلجهزة هذه من أى
A. Web camera.
B. Scanner.
C. Touch pad.
D. Monitor. Monitor
28
Which one of these memory can not be changed?تتغير أن يمكن ال الذاكرة من األنواع هذه من أى
A. Random Access Memory.
B. Storing Memory. C. Read Only Memory.
D. Virtual Memory.
Read Only Memory.
29
Which one of the following is considered as input devices?
وحدات من أنه محسوب يكون العبارات هذه من أىاإلدخال
A. Plotter.
B. Monitor. C. Web camera.
D. Charger.
Web camera.
30
The data stored on CD-Rom are على المخزنة تكون CD-ROMالبيانات
A. Volatile and read only data.
B. Non Volatile and read only data. C. Non Volatile and read/write data.
D. Volatile and read/write data.
Non Volatile and read only data
فقط للقراءة وتكون متغيرة غير
31
Which is the most appropriate application to store census information?
عن معلومات تخزين فى يستخدم التطبيقات هذه من أى
السكان تعداد
A. Data Logging Application.
B. CAD Application. C. Database Application.
D. Word Processor Application.
Database Application.
32
A GUI is used to:
فى تستخدم الرسومية الواجهة
A. Draw graphs and drawing.
B. Provide the interface between two peripherals. C. Provide an easy way to use computer.
D. Store graphics image as file.
Provide an easy way to use computer.
الحاسوبV تكون VعWمال ت Wإلس X سهال X طريقا
33
Which one of these types of computer memory is permanent and unchanging?
تغيرها يمكن ال و دائمة أو ثابته الحاسب لذاكرة األنواع هذه من أى
O Random Access Memory.
O Working Memory.
O Virtual Memory.
O Read-Only Memory.
Read-Only Memory.
34
Which one of the following isn’t operating system?تشغيل نظام يكون ال العبارات هذه من أى
A. Unix.
B. Windows.
C. Ms Word.
D. Ms-Dos.
Ms Word
35
Which two of these statements could each be used to complete the following sentence?A computer virus is a program that:
التالية : الجمل إلكمال إستخدامها يمكن الجمل هذه من جملتين أىبرنامج هو الكمبيوتر فيروس
A. Cannot infect a stand alone PC.
B. Disappears once it has displayed a message.
C. Can usually be detected by anti-virus software.
D. Can be introduced when new software is installed.
E. Can enter a computer system if hardware such as a new mouse added.
الفيروسات مضادات برامج بواسطة دائما إكتشافة يمكنجديد برنامج بتحميل القيام عند يدخل أو يتقدم أن يمكن
36
Which one of the following dose not influence the Performance of a computer?
الحاسب أداء على تؤثر ال العناصر هذه من أىThe amount of free space on the PC’s hard disk.
The amount of main memory (RAM) that is installed.
The use of trackball rather than a mouse .التتابع كرة أو الماوس تستعمل أن
The type of graphics card that is installed.
37
Which one of the following statements about formatting computer storage media is true?
صحيح التخزين وحدات تشكيل أو تهيئة إلعادة بالنسبة صحيح الجمل هذه من أى
A. All operating systems format disks in the same way.
B. You can’t format a disk if it had been formatted already.
C. A pre-formatted disk can be used immediately to store data.
D. You should regularly format floppy disks.
البيانات مشكل الالقرص تخزين فى يستخدم أن يمكن
38
39
The speed of a computer CPU can be measured in:ب تقاس أن يمكن الحاسب معالج سرعة
o Gigabytes.
o Gigawatts.
o Gigahertz.
o Gigacycles.
Gigahertz Or Megahertz
40
Which two of the following devices can be used to input data to a computer ?
إدخال وحدة يكون أن يمكن األجهزة هذه من إثنان أى1- Joystick
2- printer
3- speaker
4- standard monitor
5- keyboard
Joystick
keyboard
41
Which one of these devices can be used to output data from a computer?
البيانات إخراج فى يستخدم أن يمكن األجهزة هذه من أىالكمبيوتر Joystick -1من
2- printer
3- Mouse
4- Scanner
printer
42
Which one of the following statement is true about ROM (read-only memory):
الدائمة الذاكرة عن صحيح العبارات هذه من ROMأى
O It is wiped clean when you switch off the computer.
O It stores the computer’s operating system.
O It cannot be modified by the user.
O It is loaded from your hard disk when you switch on the computer.
It cannot be modified by the user.
المستخدم خالل من فيها التعديل يمكن ال
43
Bit Kilobyte Gigabyte MegabyteByte
smallest
Largest
Bit
Byte
Kilobyte
Megabyte
Gigabyte
44
Sort these units of data by increasing order of size.
Terabyte
Kilobyte
Gigabyte
Megabyte
Byte
Byte
Kilobyte
Megabyte
Gigabyte
Terabyte
45
Which one of the following operating system does not have a GUI?
واجهة عى تحتوى ال األتية التشغيل نظم من واحدة أىرسومية
A. UNIX.
B. Microsoft Windows.
C. MAC OS X.
D. Microsoft DOS. Microsoft DOS
46
Microsoft Windows is a (an):
A. Database program.
B. Operating system.
C. Word processing program.
D. Graphics program.
Operating system
47
Which of the following is the first stage in the standard sequence of software development?
األولى المرحلة هى البرامج تطوير فى المراحل هذه من أى
A. Testing.
B. Analysis.
C. Programming.
D. Design.
Analysis
48
What type of computer application would be used in a hospital to maintain patient medical details?
تطبيق من نوع في الأي _عم̂ل ي̂ست Vلتخزينمستشفى الحاسب Vالطبية Vالتفاصيل
للمريض
A. A desktop publishing application.
B. A database application.
C. A accounting application.
D. A presentation engine.
A database application
49
Which one of the following statements about copyright is true?
اإلنترنت على من الشراء عن العبارات هذه من أى
صحيحA. You give up your copyright to text that you publish on the internet.
B. You can re-use downloaded graphics in any way.
C. Scanned images are subject to copyright.
D. When you purchase software, the copyright transfer to you.
النسخ حقوق لقانون خاضعة ضوئيا المقرؤه الصور
50
Which one of the following statements about purchasing online is true?
صحيح اإلنترنت على من الشراء عن العبارات هذه من أى
A. Purchases are only processed during business hours.
B. Shipping of purchases is normally free.
C. The consumer rights of your country apply.
D. You are at risk from insecure payment method .
أمنة الغير السداد أو الدفع طريقة من خطر فى أنت
51
• Which two of the following is true about a graphical user interface ( GUI )?
• الرسومية الواجهة عن صحيح العبارات هذه من أىالتشغيل لنظام
• using a software application for technical drawing • using picture rather then words for online help• using windows icons and a mouse to operate a
computer• allows you to interact very flexibly with your
computer • أعمال- 3األجابة : فى والماوس النوافذ إستعمال
الحاسب• الحاسب -4 مع المرن بالتفاعل يسمح
52
• Which two of these is an open source operating system?
• مصدر هذه التشغيل نظم من إثنان أىعلى ( لتحصل تشترية أن اليحتاج أى مفتوح الترخيص )
• Windows xp
• Linux
• Solaris
• BSD
• MS-DOS
53
Which one of these statements about computer application is true?
الحاسب لتطبيقات بالنسبة صحيح العبارات هذه من أىA. The same version of an application will work on any type of computer.
B. They control devices such as printers and scanners that are attached to the PC.
C. They enable users to carry out specific tasks such as word processing.
D. They are the only programs that you need to use PC.
الورد برنامج مثل محدده مهام عمل من المستخدم يمكن الذى هو
54
Which two of the following devices can be used to input data to a computer ?
إدخال فى تستخدم أن يمكن األجهزة هذه من أى Mouse -1البيانات
2- printer
3- speaker
4- Plotter
5- Light pen
Mouse
Light pen
55
RAM ROM
The contents of this are fixed during the manufacture of the PC
The Operating system is loaded into this when the PC is switched on.
The contents of this disappear when the PC is switched off.
You cannot write to this type of memory.
The contents of this change constantly as the PC is used.
The Operating system is loaded into this when the PC is switched on.
The contents of this disappear when the PC is switched off.
The contents of this are fixed during the
manufacture of the PC
The contents of this change constantly as the PC is used.
You cannot write to this type of memory.
تحميل نظام التشغي
فيها لعند فتح الحاستفقد ب
محتويتها غلق عند الحاسب
تتغير محتويته
بشكل امستمر
أثناء إستخدا
م الحاس
ب
محتويات إنالذاكرة هذه
من ثابتةتصنيع خاللالحاسب
تستطيع الالكتابة
هذه علىمن النوع الذاكرة
56
Very cheap means of backing up 1 MB of
text files
Backing up 1.8GB of files you are currently
working on.
Archiving 1.8GB of graphic files that are not currently needed.
1.44 MBFloppy Disk
2GB Back-up Tape 2GB Hard Disk
1.44 MBFloppy Disk
2GB Back-up Tape
2GB Hard Disk
رخيصة تخزين وسيلةجدا
الملفات 1.8تخزين منتكون ال التى الرسومية
اإلرشيف مثل حاليا مطلوبة
تخزين من 1.8يدعمتستخدم التى الملفاتحاليا
57
58
An operating System A Software ApplicationYou can run more
than one at the same time
Sets up the look and feel of your computer
interface
Controls the hardware and software of your
computer
This can be used to edit data files
You can run more than one at the same
time
This can be used to edit data files
Sets up the look and feel of your computer interface
Controls the hardware and software of your computer
تشغيل نظام تطبيقى برنامج
واجهة لك يقدممعها تتفاعل للحاسب
فى طريقه عن تتحكمالمادية المكونات
للحاسب
مع تتعامل أن تستطيعنفس فى واحد من أكثر
الوقت
كتابة إضافة من يمكنكالملف فى
59
Which two of these are operating systems?تشغيل نظام يكون العبارات هذه من أى
o Windows.
o Netscape Navigator.
o Yahoo!
o Linux.
o Outlook.
Windows.
Linux
60
Which one of these devices can be used to output data from a computer?
من البيانات إخراج فى يستخدم المكونات هذه من أى Keyboard -1 الحاسب
2- Microphone
3- Plotter
4- Scanner
Plotter
61
Which one of these types of storage provides the fastest access to data?
إلى الوصول فى األسرع يكون الوحدات هذه من أى Zip disk -1البيانات
2- Floppy diskette
3- Hard disk
4- CD-Rom
Hard disk
62
Which one of these devices can be used to input and output data ?
وإخراج إدخال فى يستخدم أن يمكن األجهزة هذه من أى Scanner -1 البانات
2- Microphone
3- Touch screen
4- Light pen
Touch screen
63
Which one of the following is the a digital line, used for both voice and data?
الصوت مع التعامل فى يستخدم رقمى خط األتى من أى والبيانات
A. ISDN.
B. FTP.
C. PSTN.
D. HTTP.
ISDN.
64
What is ISDN?ISDNماهى
A. Integrated Standard Digital Networks.
B. Integrated Services Digital Network.
C. Interactive Standard Dynamic Networks.
D. Internet Services Data Network.
Integrated Services Digital Network
المتكاملة للخدمات الرقمية الشبكة
65
The range of voice, computer messages and other
services provided by:
A. ISBN.
B. PSBX.
C. ISDN.
D. PSDN.
ISDN
66
Which one of these statements about formatting Computer storage media is true?
صحيح التخزين وحدات تشكيل أو تهيئة إلعادة بالنسبة صحيح الجمل هذه من أى O Disks are automatically formatted when you
save a file .
O A used floppy disk cannot be reformatted.
O Unformatted disks need operating system data written to them before they can store files.
O A Full format does not erase data from your disk.
مشكل الغير علية القرص تكتب التشغيل نظام من بيانات إلى يحتاجالملفات حفظ فى إستخدامه قبل
67
Which one of these actions demonstrate poor health and safety practice in the use of computers?
الصحة لمارسة بالنسبة خطاء فعل عن يعبر األفعال هذه من أى
الحاسب إلستعمال بالنسبة والسالمةA. Touching internal parts of the PC.
B. Running several application at the same time.
C. Only using a single power socket for each PC.
D. Using out-of-date software .
للحاسب الدخلية اإلجزاء لمس
68
Which one of these statements correctly completes the following sentence? A computer’s operating system:
الجملة لتكملة صحيح العبارات هذه من واحده للحاسب ؟أى التشغيل نظام
O is the last program to load when you start the computer .
O does not control devices connected to the PC.
O is not necessary on high-powered personal computers.
O instructs the screen to display data entered with the keyboard.
المفاتيح بلوحة? أد6خل̀ت التى البيانات? لع6̀رض الشاشة7 يرشد7
69
70
To view web pagesاإلنترنت صفحات يعرض
Produce a catalogue containing graphicsتشمل قائمة يخرج
رسومات
Create interactive learning material
التفاعلية المواد صنعللتعليم
Payroll and stock controlمراقبة و الرواتب قائمة
المخزون
Produce charts and graphsو بيانى رسم يخرج
رسومات
A web browser
Word processingA multimedia application
A spreadsheet Application
An Accounting Application
A web browser
Word processing
A multimedia application
An Accounting Application
A spreadsheet Application
71
Creating a list of contact details.
Producing complex magazine layouts.
Working out budgets.
Creating interactive training materials.
Creating letters and business documents.
Desktop Publishing
Word processingA multimedia application
A spreadsheet Application
A Database Application
A Database Application
Desktop Publishing
A spreadsheet Application
A Multimedia Application
Word Processing
72
Which of following best describes a graphical user
interface (GUI): الرسومية للواجه تعريف أفضل يعتبر العبارات هذه من GUIأى
O using a software application for technical drawing .
O using a windows, icons and a mouse to operate a computer.
O using a system of typed commands to operate a computer.
O using picture rather than words for online help.
الكمبيوتر عمل فى الفأرة و الرموز و النوافذ إستخدام هو
73
Which one of these stages of software development is the last stage to be finally completed?
األخيرة المرحلة هى البرامج تطوير فى المراحل هذه من أى
O Analysis.
O Design.
O Programming.
O Testing.
Testing
74
Which two statement about local area networks (LAN) are true?
المحلية للشبكة بالنسبة صحيح العبارات هذه من إثنان أى O Applications cannot be shared over a LAN.
O Authorized users can access and use data stored anywhere on a LAN.
O Telecommunication services cannot be shared over a LAN.
O Large data files can be transferred between computers using a LAN.
O It is not possible for users of a LAN share printers . من • البيانات وإستخدام الوصول لهم يمكن لهم المرخص المتسعملون
المحلية الشبكة فى مكان أى
الشبكة • فى المستخدمة األجهزة بين نقلها يمكن الكبيرة البيانات المحلية
75
Which one of the following best describes an intranet?
شبكة تعريف فى األول يعتبر العبارات هذه من تعريف intranetأى
O A network which can only be accessed using an ISP.
O A world-wide collection of computer files connected by links.
O A network, using e-mail and web, within a single organization.
O A network that is shared between more than one organization.
و اإللكترونى البريد تستخدم التى المنظمة webالشبكة أو الشركة نفس فى
76
Which one of the following best describes an extranet?
شبكة تعريف عن صحيح العبارات هذه من extranetأى
O A network, using e-mail to share data between organizations.
O An extra-fast intranet within a single organizations.
O A very large intranet used by the general public.
O A network used to share data within a single organization.
المنظمات من أكثر أو إثنان بين البيانات مشاركة
77
78
79
80
81
82
Drag just the two of the statements that describe the internet into the box.
Internet
A global network of computers linked together
using communications equipment
A Vast collection of linked documents held on computers all over
the world
The world-wide e-mail system
A network that grew out of the American military
Can be accessed using a browser
A global network of computers linked together
using communications equipment
A network that grew out of the American military
الصندوق هذا فى اإلنترنت وصف عن العبارات هذه من إثنان إسحب
هى الشبكة
نمت التىمن
الجيش األمريكى
هى شبكة عالمية لربط األجهزة
بإستخدام
أجهزة إتصال
83
Drag two of the statements that describe the World Wide Web into the box.
The World Wide Web
A Vast collection of linked documents held on computers all over
the world
A global network of computers linked together
using communications equipment
A Vast collection of linked documents held on computers all over
the world
Can be accessed using a browser
The world-wide e-mail system
A network that grew out of the American military
Can be accessed using a browser
شبكة وصف عن العبارات هذه من إثنان webإسحب
يمكن إليه الوصول
بإستخدام برنامج لتصفح اإلنترنت
مجموعكبيرة ة
من الوثائق المرتبطحملت ة
على الحاسبامن تجميع أنحاء العالم
84
Which one of these statement about the speed of connecting to the internet is true?
صحيح باإلنترنت اإلتصال سرعة حول العبارات هذه من أى O Data transfer is slower with a digital line than with an
analog line.
O The processor speed of the computer affects the speed of data transfer on the internet.
O A 14.4 Kbps modem transfers data more slowly than a 56 Kbps modem.
O The speed of data transfer does not vary significantly
with the time of the day .
بسرعة بيانات ينقل الذى ينقل 14المودم الذى من سرعة أقل بايت 56كيلو كيلوبايت
85
For which one of these tasks would a computerized solution be more appropriate?
مالئمة أكثر النظم تحليل نظام يكون المهام هذه من أى O Calculating payroll of staff.
O Solving staff relations.
O Motivating staff.
O Selecting new staff.
Calculating payroll of staff
للموظفين الرواتب بيان حساب
86
You can reduce the risk of neck, back and shoulder pain, by one of the following actions:
بواسطة الظهر و الكتف ألم و الرقبة عن الخطر تقلل أن يمكنA. Using a larger monitor with sharper resolution.
B. Using a wireless mouse.
C. Keeping the keyboard close to the front of the disk.
D. Using a fully adjustable operator’s chair .
التكيف أو للتعديل قابل كرسى إستعمال
87
Store census information.
Store passport details.
Handle social welfare payments
Collect television license fees.
Announce policy documents online.
Notify citizens of government
decisions.
Public information systems
Public record systems
Administration systems
Public information
systemsAdministration
systems
Public record systems
Large-scale computer applications are increasingly used in government.
معلومات عن تخزينالسكان إحصاء
تفاصيل جواز تخزينالسفر
الشعبية المعلومات أنظمةاإلعالن أو العامة
السجالت أنظمة الشعبية
أو اإلدارة أنظمة التحكم
لعمل النفاقات جمع إجتماعية رفاهية
رخص أجور جمع التليفزيون
على توثيق سياسة أعلناإلنترنت
الحكومة قرارات إعلن للموطنين
88
Check policy details.Analyse statistics to estimate premiums.Provide quotes for
premiums
Check an account. Transfer funds.Apply for loans.
AdministerEmployee payrolls.
Process orders.Track invoices.
Check timetables.
Check ticket availability.
Online bankingInsurance claim
processingAirline booking
Businessadministration
Insurance claim processing
Airline booking
Businessadministration
Online banking
Large-scale computer applications are increasingly used in business.
تفاصيل فحصالبوليصه .
اإلحصائيات_ تحليل. األقساط _خمين لت
Vالتأمين طلب معالجة شركة حجز الطيران
األعمال على المصرفية
اإلنترنت
األعمال إدارة
89
Policy documents.
Public health warnings.
Income taxPayment form.
Television licensePayment form.
Census records.
Vehicle registrationlisting.
Public information systems
Public record systems
Administration systems
Public information
systems
Administration systems
Public record systems
Large-scale computer applications are increasingly used in government.
90
Drag each of the statements about user IDs and passwords to the relevant box.
ID PasswordShould be changed
regularly
Must be unique on the network
Identifies a specific user on a network
Not confidential
Ensures that the person logging on
is who they say they are
Should be changed regularly
Must be unique on the network
Identifies a specific user on a network
Not confidential
Ensures that the person logging on
is who they say they are
يكون أن يجبغير فريد
متكرر
أو معين شخص يعرفمحدد
سرية غير
المستمر بالتغيير ينصحفيها
الذى الشخص أن تضمنالشخص هو بالدخول قام
السليم
91
What is the meaning of the letter e in the word e-mail?
تعنى اإللكترونى eماذا البريد كلمة e-mailفى
O Express.
O Electric.
O Electronic.
O Efficient.
Electronic.
92
Which one of the following descriptions of an extranet is true?
وصف عن صحيح العبارات هذه من extranetأى
O A world-wide collection of files connected by links.
O A very large intranet within an organization.
O An extra-fast intranet for web and e-mail.
O Shares data between two or more organizations.
المنظمات من أكثر أو إثنان بين البيانات مشاركة
93
94
Which one of the following statement describes the process of backup?
للحاسب اإلحتياطية النسخ تصف العبارات من أى
O Restoring work from an older file.
O Copying a file from your C: drive to your desktop.
O Keeping copies of data in two locations.
O Moving a file to a different folder on a hard drive.
مكان فى الملفات من نسخة ين وجود
95
Which two of the following contribute to a good working environment for a computer operator?
التعامل فى جيدة عمل بيئة يقدم العبارات هذه من أىالكمبيوتر مع
O Use of a monitor filter to reduce the glare.
O Sitting as close as possible to the monitor.
O A good level of ventilation in the room.
O Plenty disk space in which to move the mouse.
O The keyboard positioned close to the front edge of the disk.
الشاشة وهج ضد مرشح إستعمال
الحجرة فى جيدة تهوية وجود
96
Which one of these statements about the internet is false?
اإلنترنت عن صحيح غير الجمل هذه من أى O It enables computer with different operating systems to
exchange data.
O It is not controlled by any single organization.
O You need a license to publish material on the internet.
O It allows computers to share data over large distance.
اإلنترنت على المواد لنشر لترخيص تحتاج
97
E-commerce is the term used to describe business that:
لوصف يستعمل عنصر اإللكترونية التجارة
A. uses computers to carry out its work.
B. is carried out using electronic funds transfer.
C. involves the import and export of electronic equipment.
D. buys or sells goods and services online .
اإلنترنت خدمة طريق عن الجيد البيع أو الشراء
98
You can reduce the risk of repetitive strain injury by one of the following actions:
األفعال هذه من أى بإتباع التوتر أو اإلجهاد خطر تقليل يمكنك O using an adjustable chair.
O sitting with your feet firmly on the ground.
O using an anti-glare screen.
O taking frequent breaks form your work.
العمل من متكرر بشكل راحة أخذ
99
Which statement about computers and the environment is true?
صحيح والبيئة الحاسب عن العبارات هذه من أى
O Running an animated screensavers saves power.
O Printer toner cartridges can be recycled.
O You can’t recycle paper from a laser printer.
O Laptops on standby use more electricity than when running normally.
لها التعبئة إعادة يمكن الطابعة فى الخبر خراظيش
100
A PDA which has been backed up - but not password protected - has been stolen. Which one
of the following consequences may result?الرقمى النتيجة PDAالمساعد هى ما سر كلمة عليه يكن ولم سرق
ذلك من المتوقعة
O Loss of the right to use the software that came with PDA.
O Time wasted on re-entering all the records in a replacement PDA.
O Misuse of confidential files and telephone numbers.
O Loss of contact details on the stolen PDA.
السرية واألرقام الملفات إستخدام سوء
101
A mobile phone which has been insured but not password protected has been stolen. Which one of
the following consequences may result?
ذلك من المتوقعة النتيجة هى ما سر كلمة عليه يكن ولم سرق المحمول الهاتف
A. Misuse of confidential numbers.
B. Meeting the cost of replacement.
C. Paying for calls made after the theft is reported.
D. Taking out new insurance on the replacement phone .
الخاصة أو السرية األرقام إستخدام سوء
102
A laptop which has been password protected, but not backed up, has been stolen. Which one of the
following consequences may result?النتيجة ماهى سرق ولكنه سر كلمة علية يوجد المحمول الحاسب
هذه من العبارات المتوقعة O You will have to change your e-mail address.
O Confidential files can be Misused.
O You will need to change your password.
O Work stored on the laptop will be lost.
يفقد سوف الحاسب على المخزن العمل
103
Anti-virus software can disable a virus on your computer. This action is called:
أن يستطيع الفيروسات داخل مكافح فيروس أى نشاط إيقافيسمى الفعل هذه الحاسب
O De-installing.
O Disinfecting.
O Restoring.
O Scanning.
Disinfecting
تطهير
104
Good Anti-virus practice Poor Anti-virus practiceOpening e-mail from
unknown sources
Deleting e-mail from unknown sources
Putting a virus-checked disk in a
floppy drive
Downloading and running free software
from the web
Opening e-mail from unknown sources
Deleting e-mail from unknown sources
Putting a virus-checked disk in a
floppy drive Downloading and running free software
from the web
اإللكترونى البريد فتحالمصدر محدد الغير
البرامج تشغيل و تحميلالمواقع من المجانية
اإللكترونى البريد إلغاءالمصدر محدد الغير
الفيروسات مضاد تفعيلالمرن القرص لفحص
105
Good Anti-virus practice Poor Anti-virus practiceUpdating anti-virus
software once a year
Scheduling virus checks to run once a
day
Deleting e-mail from unknown sources
Opening unknown e-mail attachments
Updating anti-virus software once a year
Deleting e-mail from unknown sources
Scheduling virus checks to run once a day
Opening unknown e-mail attachments
106
107
Electronic commerce is best described as:
لوصف يستعمل عنصر اإللكترونية التجارة
A. Requesting information from companies selling electronic equipment.
B. The buying of electronic equipments from a high street shop.
C. Advertising electronic goods on the internet.
D. Buys or sells good and services online
اإلنترنت خدمة طريق عن الجيد البيع أو الشراء
108
A computer virus is a program that?
O Before accessing the internet, you need to run a virus check.
O Deleting an infected file will eliminate the virus.
O Anti-virus software can detect all known viruses.
O can make the hard disk unusable on a computer
فعال غير الهاردسك يجعل أن ممكن
109
Which one of the following statements about teleworking is true?
عن العبارات هذه من البيت ( )teleworkingأى من العمل صحيح O More human contact with the team.
O Increased company space requirements.
O Greater ability to focus on one task.
O Inflexible schedules.
واحدة ة? pمهم على للت6ركيز اإلكبر القدرة
110
For which two of the following tasks in hospitals and health care would large-scale computer applications be most
appropriate?المستشفيات فى الحاسب لتطبيقات التالية المهام من إثنان أىالصحية والرعاية
المالئمة? أكثر ت6ك7ون7 O Bereavement counseling.
O Tracking treatment costs.
O Informing a patient of a diagnosis.
O Providing a medical database.
O Treating mental health issues.
العالج تكاليف تتبع
طبية بيانات قاعدة عمل
111
The device that links computers to telephone networks by converting digital and analog signals is called a:
اإلشارات وتحول التليفون بشبكة الحاسب تربط هذه من أى
تماثلية إلى الرقميةA. Transcoder.
B. Digitiser.
C. MODEM.
D. Translator Unit.
MODEM
112
Which one of these is the type of network that links computers in different cities or countries?
دول أو مختلفة أماكن فى األجهزة تربط األنواع هذه من واحدة أىمختلفة
O LAN.
O Ethernet.
O PSTN.
O WAN. WAN
113
114
Computer workgroups allow which three of these resources to be shared between multiple users at same time?
مجموعة شبكة عبر فيه المشاركة يتم أن يمكن المصادر هذه من ثالثه أىSharable Resources العمل
Printers
Printers Disk Space
Disk Space
Monitors
Applications Keyboards
Applications
115
The term ADSL stands for:
على ADSLالتعبير يدل أو يؤيد O Anonymous Digital Service Line.
O Asymmetric Digital Subscriber Line.
O Analog Digital Service Line.
O Advanced Data Service Link.
Asymmetric Digital Subscriber Line
متماثل غير رقمى إشترال خط
116
117
Which one of the following statements about the use of e-commerce is true?
صحيح اإللكترونية التجارة إستخدام عن العبارات هذه من أى
A. An internet connection is optional for e-commerce.
B. Transaction can occur anywhere in the world.
C. Customers can only pay by e-mailing credit card details.
D. Customers give up the right return unsatisfactory goods .
العالم فى مكان أى من تحدث أن ممكن الصفقات
118
You can reduce the risk of eye-strain by one of the following actions:
األتى الفعل عمل بإتباع العين عن الخطر تقليل يمكنك O increase the contrast between screen and room lighting.
O using an anti-glare filter on your monitor.
O reducing your monitor’s colour depth setting.
O positioning the screen with a window behind it.
using an anti-glare filter on your monitor
للشاشة اإلشعاع خطر من للوقاية مرشح وضع
119
Which one of the following statements about copyright is true?
صحيح النشر حقوق عن العبارات هذه من أىO If you can copy material from a disk you automatically gain the copyright.
O Copyrights provides control over how other people make disk copies of someone’s work.
O Graphics published on CD-ROM are not subjected to any form of copyright.
O If you create a CD-ROM yourself, you own the copyright to anything you put on it.
عمل? من قرص? نسخ ي6̀عملون6 الذين األشخاص على السيطرة: الطبع حقوق7 ت7زوpد7ما شخص
120
Which two of the following statements about passwords are true?
صحيح السر كلمة عن العبارات هذه من إثنان أىA. You should use the same password for everything.
B. You should write down your password and keep it in a convenient place.C. Passwords should contain both letters and numbers.D. Once you create a password, you can’t change it.
E. A Password should be known only to the user.
وحروف أرقام من تتكون أن ينصحفقط للمستخدم معروفة تكون أن ينصح
121
Shareware is the term that is applied to:على تنطبق أن ممكن أو تصف المشاركة مصطلح
O an application that is used to track the movement of stocks and share.
O software that you try for free but pay for it if you keep it.
O any application for which a multi-user license is available.
O any software that can be used on a server.
إذا شراءه يجب ولكن مجانى بشكل إستخدامة أو تجربته يمكنك الذى البرنامج
به اإلحتفاظ تريد كنت
122
Software that you can try free of charge before buying
123
Software that can be use for more than one user is referred to
من أكثر مع تستخدم أن يمكن برامجهى مستخدم
124
Software that you can use without the need for any payment is referred to
تشتريها أن بدون تستخدمها من يمكنك التى البرامج
125
126
127
128
Should be printed Can be distributed electronicallyStaff announcements
Documents that need careful proof-reading
Working drafts of lengthy report
Contacts
Staff announcementsDocuments that need careful proof-reading
Contacts
Working drafts of lengthy report
Electronic documents help to save paper , while other documents are best printed out.
تطبع , أن أفضل أخرى وثائق بينما الورق لتوفير اإللكترونية الوثائق تساعد
تحتاجة وثيقةالتنبية إلثبات
العقود
إعالن أو إبالغ الموظفين
بإشخاص طويل تقريرمهمة إلى إرسالهم يتم
129
Should be printed Can be distributed electronically
Help for a software application
Planning application
Documents that are regularly updated
Academic certificates
Help for a software application
Planning application
Academic certificates Documents that are
regularly updated
Electronic documents help to save paper , while other documents are best printed out.
130
131
Which one of these actions demonstrate poor health and safety practice?
الكمبيوتر مع التعامل فى جيدة الغير الممارسات من
O Installing too much of software on a computer.
O Leaving power cable unsecured.
O Turning off the power without first shutting down the PC.
O Running several applications at the same time.
أمنه غير الطاقة كابالت ترك
132
Which one of the following activities is best suited for e-mail?
البريد إستخدام فى أكثر مناسب النشاطات هذه من واحدة أى
اإللكترونىA. Performing calculations.
B. Sharing very large video files, such as movie trailers .
C. Sharing files between workers at different locations.
D. Transmitting credit card details.
مختلفة أماكن فى العمال بين الملفات مشاركة
133
134
An important purpose of data protection legislation is to:
هو البيانات? حماية? لتشريع? الرئيسي6 الغرض6 pإن
O improve the standards for electronic storage media.
O prevent the illegal use of commercial software.
O safeguard the privacy of individuals’ personal data.
O protect companies from industrial espionage.
الشخصية? التفاصيل? وقاية? سرية
135
136
Which two of the following statements about access rights are true?
صحيح الفكرية الملكية وصف عن التالية اإلختيارات من أى O Are intended to protect a company’s intellectual
property.
O Decide who can work in a building outside office hours.
O Determine which files individuals can read or change on a network.
O Are the same for all users on single network.
O Depend on which computer you are using to access the networkالفكرية الملكية بحماية الشركة تعتنى أن يجب
الشبكة على وتغير تعدل التى الفردية الملفات تحديد
137
For which two of these tasks would a computerized solution be most appropriate?
فى مالئمة أكثر الكمبيوتر إستخدام يكون المهام هذه من أىمعها التعامل
O Assessing employee performance.
O Enforcing rules and regulations.
O Generating invoices.
O Carrying out stock control.
O Providing a customer support helpline.
المخزون – حصر الفواتير تحصيل
138
Which one of the following statements about an organization’s information security policy is true?
المنظمة? معلومات? أمن? سياسة عن العبارات هذه من أىصحيح
O Applies to the employee, not the employer .
O Deals with the handling confidential data.
O Deals only with data held on computers.
O Covers the licensing of operating system software.
السرية البيانات بمعالجة القيام
139
Which one of the following statements about copyright is true?
O The paper license that comes with software on CD transfers the copyright to you .
O You can make a backup CD of software bought for your own use.
O Software purchased on the web and copied to CD-ROM can be shared with friends.
O Copying text, images, audio, or video from disk is always illegal.
الشخصى إلستخدامك إحتياطية كنسخة البرنامج من نسخة عمل تستطيع
140
Which one of the following statements about copyright is true?
النسخ حقوق عن صحيح العبارات هذه من أىA. Publishing digital work on disk requires permission of
the copyright holder .
B. When you purchase software in CD the copyright transfer to you.
C. Any material which is published on disk is subjected to copyright.
D. You can reuse graphics from the web on CD- Rom.
رخصة_ _تطلp̂ب ي Vالقرص على Vالرقمي Vالعمل النسخ نشر حق صاحب .من
141
Unauthorized access to computer files can be prevented by using:
الملفات مع بالتعامل له مرخص الغير الشخص منع يمكنطريق عن
A. Password.
B. Anti-virus software. C. Uninterruptible power supply.
D. Secure backup copies.
Password
142
Which of the following precautions would prevent virus-infected software being used on computer?
خطر من معها التعامل الواجب اإلحتياطات ماهىالكمبيوتر مع التعامل فى الفيروساتA. Install a virus protection system.
B. Install software to prevent hacking. C. Install password security to the system.
D. Take regular backups.
Install a virus protection system.
143
Which of the following provides an example of a good working environment?
جيدة عمل بيئة تقدم العبارات هذه من أى
A. Adequate lighting.
B. Energy-saving hardware.
C. New computer hardware every two years.
D. Staff welfare benefits.
Adequate lighting
الكافية اإلضاءة
144
Which of the following best describes teleworking?البيت من العمل توصف العبارات هذه من أى
A. Working for a television.
B. Working for a telesales company.
C. Designing teletext pages.
D. Working at home using electronic communications.
البيت في إلكترونية_ إتصاالت_ _ستعم̂ل ي الذي الع_م_ل
145
Which one of the following options describe the effects of teleworking?
البيت من العمل عن صحيح العبارات هذه من أى
A. Reduced cost of equipments.
B. Harder to socially interact with team members.
C. Greater use of transport.
D. Inflexible working hours.
الجماعى العمل روح فى صعوبة هناك نكون قد
146
Which of the following is a good password policy for an organization?
A. All passwords are changed regularly.
B. All passwords are never changed.
C. All passwords are made up of less than four characters.
D. All passwords are made up of less than four numbers.
All passwords are changed regularly
147
Which of the following is not a function of the CPU?
A. Executing program instruction.
B. Ensuring program instructions are executed in the right sequence.
C. Sending e-mail.
D. Carrying out calculations.
Sending e-mail
148
The location of information on the internet can be
obtained by using a database: البيانات قاعدة بإستعمال عليها ت̂حWص_ل_ Wن
_ أ ي̂مWكV̂ن Vاإلنترنت على Vالمعلومات موقع
A. Web editor application.
B. Search engine. C. Spreadsheet application.
D. Word perfect.
Search engine
149
An equipment that attached to computer to stop large volts of electricity :
A. UPS.
B. Battery. C. Charger.
D. Surge suppressor. Surge suppressor.
150
Which one of the following statements applies to PSTN?
على ينطبق العبارات هذه من PSTNأى
A. A network designed to transmit high-speed digital data.
B. It’s the Internet e-mail system.
C. It’s a form of satellite communication.
D. The Public Analog Telephone network.
151
Which two of the following statements about purchasing on line are true?
على الشراء حول Vالتالية Vالبيانات WنVم إثنان pصحيح _ي اإلنترنت
O The consumers rights of the supplier’s country apply.
O E-commerce offers access to goods around the clock.
O The supplier covers the cost of shipping.
O All e-commerce transactions are safe.
O The supplier covers the cost of returning goods.
الشراء لدولة تخضع المستهلك حقوف
. اعة pالس مدار على Vالسلع إلى X وصوال اإللكتروني̂ة التجارة _عWرُ̂ض ت
152
A computer virus is a program that
A. Always spotted by antivirus.
B. Make your hard disk unusable.
C. The only way for infection is internet.
D. Can be avoid by regular backup.
Always spotted by antivirus.
153
Which one is more appropriate about Shareware
software?
A. Any software used by a group of people in the same time.
B. Any application you borrow from your friend.
C. Any application downloaded from internet.
D. Any software you try for free time and pay for keeping it. Any software you try for free time and pay for keeping it.
154
Which two of the following statements about data protection legislation are true?
A. Deals with industrial espionage between competing companies.
B. Can result in litigation if personal data is not adequately protected.
C. Means that personal data must be stored for certain period of time.
D. Ensures that laws about data security are the same in every country.
E. Obliges organizations to protect confidential data within their control.
155
Which two of the following statements about purchasing on line are true?
A. Initial shipping of goods is free.
B. The supplier covers the cost of returning goods.
C. The consumers rights of the supplier’s country apply.
D. It’s more difficult to return goods purchased online than goods bought in a shop.
E. Online purchases are free of customs duties.
156
You can reduce the risk of eye-strain by one of the following:
A. Using the brightest possible screen setting.
B. Setting the screen facing a window.
C. Sitting approximately 12" from your monitor.
D. Having your eyes level with the top of your monitor.
157
Three of the following are examples of computer uses in education. Match the statements with the correct boxes.
Computer based education
Uses traditional methods
Organizing student timetables
Using the Web for research
Distance learning
Coaching students with learning difficulties
Helping students with career advice
Coaching students with learning difficulties
Helping students with career advice
Organizing student timetables
Distance learning
Using the Web for research
158
These items contain sensitive data
These items do not need protection
Contact details for sales enquiries
Research on new products
Training materials
Management accounts
Research on new products
Contact details for sales enquiries
Management accounts
Training materials
Which two of the following documents contain sensitive data and need protection?
159
Which of the following are examples of large-scale applications of computers in education?Match the following statements with the correct boxes.
Computer based education
Uses traditional methods
Student registration systems
Provide student counseling
Distance learning
Researching homework on the
internet
Coaching of slower students
Provide student counseling
Coaching of slower students
Student registration
systems
Distance learning
Researching homework on
the internet
160
Helps to avoid the risk of spreading a
computer virus
Doesn’t help to avoid the risk of spreading a
computer virus
Scanning all unfamiliar disks with anti-virus
software
Virus scanning all application before
loading them onto your hard disk
Only copying applications from your
close friends
Write-protecting all copies of application disks once they have
been checked
Rebooting your PC if you find a file that is infected
Only copying applications from your
close friends
Rebooting your PC if you find a file that is
infected
Scanning all unfamiliar disks with anti-virus software
Write-protecting all copies of application disks once they have
been checked
Virus scanning all application before loading them onto
your hard disk
161
For which two of these tasks would people be more appropriate than computers?
التعامل من فيها أفضل اإلنسان يكون المهام هذه من أىاإللكترونى A. Calculating payroll for staff.
B. Motivating staff.
C. Storing a list of staff contact details.
D. Providing a customer support helpline.
E. Maintaining a list of every item in the company’s inventory of goods.
األفراد تحفيز
العمالء لخدمة هاتفى خط تقديم
162
Which of the following statements about safety precautions when using computers?
A. Faulty cables should be repaired using insulating tape.
B. You should shut down your PC by unplugging it from electricity supply.
C. There no safe way to run cables across open areas.
D. More than one computer should not use the same power socket.