Содержание

Слайд 2

Which one of the following types of computer is most likely

Which one of the following types of computer is most likely

to be used by a travelling salesman?
A desktop computer.
A tablet PC.
A server.
A laptop.

أي من أنواع الحاسوب الاّتية يفضل إستخدامه من قبل البائع المتجول؟

Слайд 3

Which one of the following is a term for systems used

Which one of the following is a term for systems used

to store, retrieve, process and transmit data?
Internet & Communication Technology.
Internet & Information Technology.
Information & Communication Technology.
Information & Computer Technology.

أي من الآتي مصطلح للأنظمة التي تستخدم تخزين, استرجاع, عمل ونقل البيانات؟

Слайд 4

Which one of the following measures the speed of the CPU?

Which one of the following measures the speed of the CPU?


Gigahertz (GHz).
Bits per second (Bps).
Gigabytes (GB).
Megabytes (MB).

أي من الآتي يقيس سرعة المعالج؟

Слайд 5

Which one of the following is a term for an audio

Which one of the following is a term for an audio

or video recording posted on a web site that can be downloaded and played later?
Podcast.
Blog.
VoIP.
RSS Feed.

أي من الآتي يكون مصطلح للتسجيلات الصوتية والمرئية المنشورة علي الموقع ويمكن تحميلها ومشاهدتها لاحقاً؟

Слайд 6

Which one of the following describes a computer’s operating system? Software

Which one of the following describes a computer’s operating system?
Software

that can retrieve information from a database.
Hardware that can scan and convert photographs into digital files.
Software that controls the allocation and usage of hardware.
Hardware that can record and send images across the Internet.

أي من الآتي يصف نظام تشغيل الحاسوب؟

Слайд 7

Which one of the following types of software would you most

Which one of the following types of software would you most

likely use to create a letter?
Web browsing software.
Spreadsheet software.
Accounting software.
Word processing software.

أي من أنواع البرامج الآتية تستخدمها علي الأرجح لإنشاء خطاب؟

Слайд 8

The computers in your office building are connected together so staff

The computers in your office building are connected together so staff

can share files and printers. What is this arrangement of computers called?
The Internet.
A Local Area Network.
The World Wide Web.
A network port.

يتم توصيل أجهزة الكمبيوتر في مبني مكتبك لكي يمكن الموظفين من مشاركة الملفات والطابعة.
ماذا يطلق علي ترتيب هذه الاجهزة؟

Слайд 9

Which one of the following is a private network that allows

Which one of the following is a private network that allows

specified external users access?
Intranet.
WorldNets.
Internet.
Extranet.

أي من الآتي يعتبر شبكة خاصة تسمح بدخول مستخدمين خارجين ومحددين؟

Слайд 10

Which one of the following devices do you need to be

Which one of the following devices do you need to be

able to communicate with other computers using the telephone network?
CD-ROM.
Modem.
Printer.
Speakers.

أي من الأجهزة التالية تحتاجها لكي تكون قادر على التواصل مع أجهزة الكمبيوتر الأخرى التي تستخدم شبكة الهاتف؟

Слайд 11

Which one of the following is a software application that assists

Which one of the following is a software application that assists

users who are visually impaired to identify and interpret what is displayed on screen?
A screen calendar.
A word processor.
A screen reader.
A web log.

أي من الآتي هو برنامج يساعد المستخدمين الذين يعانون من ضعف البصر لتحديد وتفسير ما يتم عرضه على الشاشة؟

Слайд 12

Which one of the following is a common feature of e-learning?

Which one of the following is a common feature of e-learning?


Always requires physical class attendance.
Cannot download documents for later reading.
Learning is self-paced.
Travel time and costs are very high.

أي من الآتي يعتبر ميزة شائعة للتعليم الإلكتروني؟

Слайд 13

Which one of the following is NOT a feature of electronic

Which one of the following is NOT a feature of electronic

commerce?
Goods can be advertised and prices compared.
There is physical contact between buyer and seller.
Transactions can be processed quickly.
Services are available 24 hours a day.

أي من الآتي لا يعتبر سمة من سمات التجارة الإلكترونية؟

Слайд 14

Which one of the following is the best way to maintain

Which one of the following is the best way to maintain

a good posture?
Ensure your computer is in a well-lit area.
Make sure that there are no cables on the floor.
Make sure that your computer is using a fast processor.
Make sure that your computer; desk and chair are positioned correctly.

أي من الآتي يعتبر أفضل وسيلة للحفاظ على وضعية جيدة؟

Слайд 15

Which one of the following statements describes a good approach to

Which one of the following statements describes a good approach to

information security for an organisation?
There are no procedures for reporting security lapses.
Staff passwords are not changed regularly.
Sensitive data is available to everyone that requests it.
Keeping an off-site backup of all files.

أي من العبارات الآتية يصف نهج صحيح لأمن المعلومات للمنظمة؟

Слайд 16

Which one of the following is a good password policy for

Which one of the following is a good password policy for

an organization?
All passwords are changed regularly.
All passwords are never changed.
All passwords are made up of less than four characters.
All passwords are made up of less than four numbers.

أي من الآتي يعتبر سياسة كلمة مرور جيدة للمنظمة؟

Слайд 17

Which one of the following is the best way to protect

Which one of the following is the best way to protect

a computer against computer viruses?
Only virus-check e-mail attachments.
Update antivirus software on a regular basis.
Always make sure that the operating system is up to date.
Only download files from the Internet during business hours.

أي من الآتي يعتبر أفضل وسيلة لحماية الكمبيوتر ضد الفيروسات؟

Слайд 18

Which one of the following statements describes shareware? Totally free software

Which one of the following statements describes shareware?
Totally free software

that is available only on the Internet.
Commercial based software that must be paid for.
Software available for free on a trial basis after which payment will be required.
Copyright free software that allows unlimited copies and distribution.

أي من العبارات التالية يوصف النسخة التجريبية؟

Слайд 19

There are rules governing the rights of a data subject and

There are rules governing the rights of a data subject and

the responsibilities of a data controller. What are these rules called?
Data Privacy Policy.
Data Management Act.
Data Protection legislation or conventions.
Data Publicity Law.

هناك قواعد تتحكم في حقوق موضوع البيانات ومسؤوليات وحدة تحكم البيانات.
ماذا تسمى هذه القواعد؟

Слайд 20

Which one of the following is an example of hardware? An

Which one of the following is an example of hardware?
An

antivirus program.
A spreadsheet application.
A mouse.
The World Wide Web.

أي من الأمثلة التالية هو مكون مادي؟

Слайд 21

Which one of the following would improve computer performance? Using a

Which one of the following would improve computer performance?
Using a

larger monitor.
Increasing the number of applications running.
Using a faster printer.
Increasing the size of RAM.

أي من الآتي يحسن من أداء الكمبيوتر؟

Слайд 22

Which one of the following is NOT a function of the

Which one of the following is NOT a function of the

Central Processing Unit?
Executing program instructions.
Ensuring program instructions are executed in the correct sequence.
Sending e-mail.
Carrying out calculations.

أي من الآتي ليس وظيفة من وحدة المعالجة المركزية؟

Слайд 23

Which one of the following is both an input and output

Which one of the following is both an input and output

device?
Touchscreen.
Keyboard.
Printer.
Scanner.

أي من الآتي هو وحدة إدخال وإخراج معاً؟

Слайд 24

Which one of the following is a method of publishing frequently

Which one of the following is a method of publishing frequently

updated content such as news headlines online?
A Blog.
RSS.
A Podcast.
Instant messaging.

أي من الآتي هو وسيلة لنشر المحتويات التي يتم تحديثها باستمرار مثل عناوين الأخبار عبر الإنترنت؟

Слайд 25

Which one of the following is an example of an operating

Which one of the following is an example of an operating

system?
iTunes.
PowerPoint.
Windows.
Netscape.

أي من الآتي هو مثال لنظام التشغيل؟

Слайд 26

Which one of the following is considered good environmental practice? Using

Which one of the following is considered good environmental practice?
Using

a slow computer.
Printing on both sides of a page.
Using up to date software.
Backing up data on a regular basis.

أي من الآتي يعتبر ممارسة بيئية جيدة؟

Слайд 27

Which one of the following statements about the Internet is TRUE?

Which one of the following statements about the Internet is TRUE?


The Internet is a global network that links many computer networks together.
The Internet is a private company network.
The Internet is a visual representation of linked documents.
The Internet is a network operating system.

أي من العبارات التالية عن الأنترنت صحيحة؟

Слайд 28

Which one of the following is an input/output port? Linear. Radial.

Which one of the following is an input/output port?
Linear.
Radial.


Lateral.
FireWire.

أي من الآتي هو منفذ إدخال وإخراج؟

Слайд 29

Which one of the following is an advantage of teleworking? Long

Which one of the following is an advantage of teleworking?
Long

commuting times.
Flexible schedules.
Less emphasis on teamwork.
Lack of human contact.

أي من الآتي هو ميزة للعمل عن بعد؟

Слайд 30

Which one of the following is a characteristic of broadband? Completely

Which one of the following is a characteristic of broadband?
Completely safe

from intruders.
It has a dial up connection.
High speed.
Cost can vary from day to day.

أي من الآتي هو سمة من النطاق العريض؟

Слайд 31

Which one of the following is a text-based communication between two

Which one of the following is a text-based communication between two

or more people over the Internet?
Podcasting.
Really Simple Syndication.
Voice over Internet Protocol.
Instant Messaging.

أي من الآتي هو النص المبني على التواصل بين شخصين أو أكثر عبر الإنترنت؟

Слайд 32

Which one of the following practices helps create a good ergonomic

Which one of the following practices helps create a good ergonomic

working environment?
Protecting computer monitors from reflections and glare by correct positioning.
Taking very few breaks away from the computer.
Keeping the office cold and using low overhead lighting.
Use of non-adjustable chairs when working with computers.

أي من الممارسات الاتية يساعد على خلق بيئة عمل مريحة؟

Слайд 33

Why is it necessary for an organization to adopt a good

Why is it necessary for an organization to adopt a good

password policy?
To allow easy sharing of files across the company network.
To make it easier for the computer to connect to a network.
To protect files against unauthorized use.
To make it easier to find files on a computer.

لماذا يعتبر من الضروري علي المنظمة إعتماد نهج كلمة مرور جيدة؟

Слайд 34

Which one of the following is a way to prevent the

Which one of the following is a way to prevent the

theft of data from a computer?
Use an up to date anti-virus program.
Back up data on a regular basis.
Remove the monitor when not in use.
Set up a username and password.

أي من الاتي هو وسيلة لمنع سرقة البيانات من الكمبيوتر؟

Слайд 35

Which one of the following should be carried out to safeguard

Which one of the following should be carried out to safeguard

files from loss in case the main copy is damaged?
Backup files to a new location on your computer.
Install password security.
Backup the files regularly and store offsite.
Install a firewall.

أي من الآتي يجب أن ينفذ لحماية الملفات من الخسارة في حالة تلف النسخة الرئيسية؟

Слайд 36

Which one of the following could allow a virus to enter

Which one of the following could allow a virus to enter

a computer?
Downloading files from the Internet onto the computer.
Connecting the computer to a new printer.
Running a virus scan on the computer.
Setting the computer monitor to a low resolution.

أي من الآتي يمكنه السماح لدخول الفيروس إلى جهاز كمبيوتر؟

Слайд 37

Which one of the following statements about an End User License

Which one of the following statements about an End User License

Agreement is true?
It gives full ownership of the software to the user of the software.
It gives the user the exclusive right to copy and sell the software to other potential users.
It gives the user the right to modify the software.
It gives the user the right to install and run the software on a specified number of computers.

أي من العبارات التالية حول اتفاقية ترخيص المستخدم يعتبر صحيح؟

Слайд 38

Which one of the following describes spam? Gathering information about a

Which one of the following describes spam?
Gathering information about a person

or organization without their knowledge.
Performing an unauthorized, usually malicious, action such as erasing files.
Putting unnecessary load on the network by making copies of files.
Sending unwanted bulk messages.

أي من الآتي يصف البريد المزعج؟

Слайд 39

Which one of the following can protect a computer from the

Which one of the following can protect a computer from the

risk of unwanted emails?
Anti-spam software.
Anti-virus software.
Anti-spyware software.
PC diagnostic software.

أي مما يلي يستطيع حماية جهاز الكمبيوتر من خطر رسائل البريد الإلكتروني غير المرغوب فيها؟

Слайд 40

Which one of the following could lead to the spread of

Which one of the following could lead to the spread of

a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.

أي واحد مما يلي بإمكانه ان يؤدي إلى انتشار برنامج ضار؟

Слайд 41

Which one of the following protects a computer from the risk

Which one of the following protects a computer from the risk

of malicious programs?
PC diagnostic software.
Web tracking software.
Anti-spam software.
Anti-spyware software.

أي من الاتي يمكن ان يحمي الكمبيوتر من مخاطر البرامج الضارة؟

Слайд 42

Which one of the following describes why it is important to

Which one of the following describes why it is important to

update antivirus software regularly?
To ensure the software identifies old viruses.
To protect your computer from all known viruses.
To protect your computer from unwanted bulk messages.
To prevent the spread of malicious programs on the Internet.

أي من العبارات الاتية تصف السبب في أنه من المهم تحديث برامج مكافحة الفيروسات بشكل منتظم؟

Слайд 43

Which one of the following describes what you should do if

Which one of the following describes what you should do if

you receive a chain letter email?
Forward the email.
Download it onto your system.
Delete the email.
Send a read receipt.

أي من الآتي يصف ما يجب عليك فعله عند استلامك سلسلة مزعجة من خطابات البريد الالكتروني؟

Слайд 44

Which one of the following describes a computer hacker? A skilled

Which one of the following describes a computer hacker?
A skilled programmer

who uses authorised access to exploit information available on a computer.
A skilled programmer who secretly invades computers without authorisation.
A skilled programmer who writes programs to train new employees.
A skilled programmer who helps in the installation of new software for an organisation.

أي مما يلي يصف قراصنة الكمبيوتر؟

Слайд 45

Which one of the following describes why firewalls are used? To

Which one of the following describes why firewalls are used?
To prevent

unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.

أي مما يلي يصف سبب إستخدام الحائط الناري؟

Слайд 46

Which one of the following is MOST likely to be a

Which one of the following is MOST likely to be a

hoax?
An email from a friend you have not seen recently.
An email with an attachment sent by a colleague using their personal email address.
An email asking you to go to a website for a free computer scan.
An email advertisement from a local shop you subscribe to.

أي مما يلي يعتبر الأكثر احتمالا أن يكون خدعة؟

Слайд 47

Which one of the following is the reason that users should

Which one of the following is the reason that users should

log on with a username and password?
To be aware of who is in the building.
To check up on the time-keeping of users.
To protect computers against unauthorised use.
To enable a personalised greeting for each user.

أي مما يلي يعتبر السبب في أن المستخدمين يجب تسجيل دخولهم بإستخدام أسم المستخدم وكلمة المرور؟

Слайд 48

Which one of the following statements about a password is TRUE?

Which one of the following statements about a password is TRUE?
It

must be changed only if it is compromised.
It cannot contain special character symbols.
It should be changed regularly.
It must be registered with the system administrator.

أي من العبارات الآتيه لكلمة السر تعتبر صحيحة؟

Слайд 49

Which one of the following should be used to change your

Which one of the following should be used to change your

password?
Internet Explorer.
Anti-virus software.
Control Panel
Windows Firewall.

أي مما يلي ينبغي أن تستخدمه لتغيير كلمة السر الخاصة بك؟

Слайд 50

Which one of the following would be considered the BEST way

Which one of the following would be considered the BEST way

to store a PIN number?
Keep a written note of it with you bank cards.
Store it on your computer.
Memorise it.
Keep a written note of it in your office drawer.

أي من العبارات الاتية يمكن إعتباره أفضل وسيلة لتخزين رقم سري؟

Слайд 51

Which one of the following shows respect for confidentiality of information?

Which one of the following shows respect for confidentiality of information?
Discussing

confidential information over the telephone.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
Disclosing confidential information only to authorised individuals.

أي مما يلي يبين احترام سرية المعلومات؟

Слайд 52

Which one of the following describes why users should lock their

Which one of the following describes why users should lock their

computer when leaving their desk?
To prevent a waste of electricity.
To prevent unauthorised access to data.
To prevent data from getting corrupted.
To prevent the computer from malfunctioning.

أي مما يلي يصف لماذا يجب على المستخدمين قفل جهاز الكمبيوتر الخاص بهم عند مغادرة مكاتبهم؟

Слайд 53

Which one of the following is an example of phishing? An

Which one of the following is an example of phishing?
An email

warning the recipient of a computer virus threat.
An email directing the recipient to forward the email to friends.
An email directing the recipient to enter personal details on a fake website.
An email directing the recipient to download an attachment.

أي واحد مما يلي هو مثال على الخداع؟

Слайд 54

Which one of the following is unsafe online activity? Giving your

Which one of the following is unsafe online activity?
Giving your home

address to someone you met in a chat room.
Using a screen name or nick name that cannot identify you.
Meeting someone you met online face-to-face in the company of your parents.
Keeping your social network profile private.

أي مما يلي يعتبر نشاط للانترنت الغير اّمن؟

Слайд 55

Which one of the following describes a public network? A network

Which one of the following describes a public network?
A network where

devices outside the network cannot see or communicate directly with computers on the network.
A network where devices outside the network can see but cannot communicate directly with computers on the network.
A network where devices outside the network can see and communicate directly with computers on the network.
A network where devices outside the network cannot see but can communicate directly with computers on the network.

أي مما يلي يصف الشبكة العامة؟

Слайд 56

Which one of the following describes how confidential information should be

Which one of the following describes how confidential information should be

sent using an unsecured network?
In an unsigned email.
In an attachment.
In a compressed format.
In an encrypted format.

أي مما يلي يصف كيف يتم إرسال معلومات سرية باستخدام شبكة غير اّمنة؟

Слайд 57

Which one of the following statements about wireless networks is TRUE?

Which one of the following statements about wireless networks is TRUE?
They

cannot be intercepted by unknown users.
They limit accessibility to other users.
They limit visibility to other users.
They can be accessible to other users.

أي من العبارات الاتية بخصوص الشبكات اللاسلكية يعتبر صحيح؟

Слайд 58

Which one of the following is the recommended action to prevent

Which one of the following is the recommended action to prevent

the risk of access to a network by other users?
Disconnect the computer from the network.
Complain to the System Administrator.
Change the computer login password frequently.
Adjust the Internet security settings.

أي مما يلي يعتبر الفعل الموصى به لمنع خطر الوصول إلى شبكة من قبل مستخدمين اّخرين؟

Слайд 59

Which one of the following describes Bluetooth? Short-range wired protocol for

Which one of the following describes Bluetooth?
Short-range wired protocol for exchanging

data.
Short-range wireless protocol for exchanging data.
Long-range wireless protocol for exchanging data.
Long-range wired protocol for exchanging data.

أي مما يلي يصف البلوتوث ؟

Слайд 60

Which one of the following describes why Bluetooth device settings should

Which one of the following describes why Bluetooth device settings should

be adjusted?
To increase the range of the device.
To improve the quality of reception.
To prevent the risk of unauthorised access.
To reduce interference from other devices.

أي مما يلي يبين سبب أن إعدادات أجهزة البلوتوث لابد أن تكون مضبطة؟

Слайд 61

Which one of the following would result in the loss of

Which one of the following would result in the loss of

contact details if it were stolen?
Printer.
Mobile Phone.
Modem.
MP3.

أي مما يلي ينتج في فقدان تفاصيل الأسماء إذا تم سرقتها؟

Слайд 62

Which one of the following should you do to ensure that

Which one of the following should you do to ensure that

your USB storage device is kept safe and secure?
Only use it in private surroundings.
Do not access it using a Bluetooth device.
Use firewall software.
Never leave it unattended.

أي مما يلي يجب فعله لكي تضمن أن وحدة تخزينك المحمولة تظل اّمنة ومحمية؟

Слайд 63

Which one of the following departments would usually hold guidelines and

Which one of the following departments would usually hold guidelines and

procedures for the secure use of IT within an organisation?
The Marketing Department.
The IT Department.
The Sales Department.
The Finance Department.

أي من الأقسام الاتية يمكن ان يتحكم عادة بالمبادئ التوجيهية والاجراءات للإستخدام الآمن لتكنولوجيا المعلومات داخل المنظمة؟

Слайд 64

Which one of the following describes why you should follow guidelines

Which one of the following describes why you should follow guidelines

and procedures while using IT resources in an organisation?
To ensure easy access to information on your computer.
To ensure the secure use of IT resources.
To ensure the IT Department is able to monitor all activity.
To ensure the Finance Department is able to monitor the costs of IT resources.

أي مما يلي يصف لماذا يجب أن تتبع المبادئ التوجيهية والإجراءات أثناء استخدام موارد تكنولوجيا المعلومات في المنظمة؟؟

Слайд 65

Which one of the following should you approach if you are

Which one of the following should you approach if you are

unsure of the IT security procedure to follow when uninstalling an application on your computer?
A technically well-informed team member.
The Systems Administrator.
A senior colleague in the Finance Department.
The Maintenance Department.

أي مما يلي يجب أن تتوصل إليه إذا لم تكن متأكد من إجراءات حماية تكنولوجيا المعلومات التي تتبعها عندما تلغي تثبيت تطبيق من حاسبك؟

Слайд 66

Which one of the following describes how a breach in IT

Which one of the following describes how a breach in IT

security should be reported?
Using the telephone.
By emailing to the IT Manager.
Using the method listed in the organisation’s security policy.
Using any means of communication.

أي مما يلي يصف كيفة الإبلاغ عن ثغرة في أمن تكنولوجيا المعلومات؟

Слайд 67

Which one of the following describes how to find out about

Which one of the following describes how to find out about

an organisation’s privacy policy?
By reading the office newsletter.
By speaking to the Finance Department.
By speaking to the Sales Department.
By reading the policy in the organisation’s policy manual.

أي مما يلي يصف كيفية إكتشاف سياسة خصوصية المؤسسة؟

Слайд 68

Which one of the following would prevent the theft of a

Which one of the following would prevent the theft of a

laptop?
Anti-virus software.
A webcam.
Spyware.
A security cable.

أي مما يلي يمكنه منع سرقة اللاب توب؟

Слайд 69

Which one of the following could be the unexpected outcome of

Which one of the following could be the unexpected outcome of

deleting a large group of files?
The files would be hidden.
An important file may be accidentally deleted.
The files would become read-only.
A delete file confirmation window may appear.

أي مما يلي يمكن أن يكون نتائج غير متوقعة من حذف مجموعة كبيرة من الملفات؟

Слайд 70

Which one of the following would NOT happen if a computer

Which one of the following would NOT happen if a computer

suddenly malfunctions?
The operating system will fail.
Files saved on the hard drive will be lost.
All off-site backups will be lost.
Some software may have to be reinstalled.

أي مما يلي لا يمكن حدوثه إذا تعطل جهاز الكمبيوتر فجاءة؟

Слайд 71

Which one of the following should you use to backup personal

Which one of the following should you use to backup personal

data?
A labelled CD.
A printout.
A website offering a file sharing service.
A friend’s computer.

أي مما يلي يجب أن تستخدمه لنسخ البيانات الشخصية إحتياطياً؟

Слайд 72

Which one of the following describes why it is important to

Which one of the following describes why it is important to

have a secure off-site backup copy of files?
To improve accessible of files from other locations.
To speed up the process of accessing the files at any time.
To prevent the loss of data in the event of a fire.
To reduce the possibility of data theft.

أي من العبارات الاتية تصف اهمية أن يكون هناك نسخة احتياطية آمنة خارج الموقع من الملفات؟

Слайд 73

Which one of the following describes how software can be stored

Which one of the following describes how software can be stored

safely?
Storing it in a place free of magnetic fields.
Storing it in a cupboard.
Storing backups of the software.
Storing it in its original packing.

أي مما يلي يصف كيفية تخزين البرامج بأمان؟

Слайд 74

Which one of the following is safe to post on a

Which one of the following is safe to post on a

social networking website?
A personal telephone number.
A home address.
Hobbies.
A school or work-place address.

أي من الآتي هو اّمن للنشر علي شبكة التواصل الاجتماعي؟

Слайд 75

Which one of the following is most likely to cause repetitive

Which one of the following is most likely to cause repetitive

strain injury (RSI)?
Viewing a monitor that has a lot of glare and reflections.
Working where there is inadequate lighting and ventilation.
Using a chair without arms.
Typing for a long period of time without breaks.

أي واحد مما يلي هو الأكثر احتمالا أن يسبب إصابات الإجهاد المتكررة RSI؟

Слайд 76

Computer use can cause repetitive strain injury (RSI). Which of the

Computer use can cause repetitive strain injury (RSI). Which of the

following is the best way to avoid this?
Ensure your computer is in a well-lit area
Use an operator chair without arms
Place your monitor at the correct height
Work with your wrists level with the keyboard

قد يسبب إستخدام الكمبيوتر الي الاصابة بالاجهاد المتكرر RSI. أي من الآتي هو أفضل وسيلة لتجنب ذلك؟

Слайд 77

Which one of the following statements about software copyright is TRUE?

Which one of the following statements about software copyright is TRUE?
Copyright

promotes the illegal use of software.
Copyright is the exclusive legal right of software authors to produce copies of their own software.
Copyright is designed to protect a disk against computer viruses.
Copyright will prevent a CD-ROM from being duplicated.

أي من العبارات التالية عن حقوق طبع ونشر البرامج صحيحة؟

Слайд 78

Which one of the following best describes the purpose of Data

Which one of the following best describes the purpose of Data
protection

legislation?
To give computer owners the right to protect themselves against computer fraud.
To give software owners the right to promote software copyright.
To give governments the right to control data access on the Internet.
To give a right to individuals to establish the existence of personal data.

أي مما يلي أفضل وصف لغرض قانون حماية البيانات؟

Слайд 79

Which one of the following tasks could you perform in order

Which one of the following tasks could you perform in order

to improve the performance of your computer?
Add a password to your user account.
Set up parental controls.
Defragment the file system.
Turn off your firewall.

أي من المهام التالية يمكن تنفيذها لكي تحسن الأداء لحاسبك؟

Слайд 80

Which one of the following actions is the most appropriate step

Which one of the following actions is the most appropriate step

to resolve a lost network connection?
Check the router and modem are turned on.
Check the printer is turned on.
Update the device drivers.
Defragment the hard drive.

أي من الافعال الآتية هو أنسب خطوة لحل فقدان اتصال الشبكة؟

Слайд 81

Which one of the following is NOT appropriate within an organisation?

Which one of the following is NOT appropriate within an organisation?
Going

to lunch with a colleague.
Sharing files.
Sharing your user name and password.
Sharing your calendar.

أي مما يلي غير ملائم داخل المنظمة؟

Слайд 82

Which of the following tasks is a function of the operating

Which of the following tasks is a function of the operating

system?
Adding data to a spreadsheet
Producing a database report
File management
Producing a presentation

أي من المهام التالية هو وظيفة نظام التشغيل؟

Слайд 83

Which software would you use to search for information in the

Which software would you use to search for information in the

internet?
Web browsing software
Spreadsheet software
Accounting software
Word processing software

أي برنامج من الآتي يمكنك استخدامه للبحث عن المعلومات في الانترنت؟

Слайд 84

An intranet is: A network operating system A network filing system

An intranet is:
A network operating system
A network filing system
A private company

network
A private company network that includes external specified users

الشبكة الداخلية هي:

Слайд 85

Which of the following tasks would be more suited to a

Which of the following tasks would be more suited to a

person rather than a computer?
Tasks that are repetitive
Tasks that require speed
Tasks that require complex mathematical processing
Tasks that require imagination

أي من المهام التالية ستكون اكثر ملائمة للإنسان عن الكمبيوتر ؟

Слайд 86

Which of the following is NOT a use of computer applications

Which of the following is NOT a use of computer applications

in a school?
Class timetabling
Student registration
Computer based training
Stock Control

أي مما يلي لا يستخدم كبرنامج حاسوبي داخل المدرسة؟

Слайд 87

What is the best way of preventing your computer from being

What is the best way of preventing your computer from being

infected with a virus?
Only virus-check e-mail attachments
Have updateable anti-virus software running on your computer
Have anti-virus software running on your computer
Never open any e-mail attachments

ما هي أفضل وسيلة لمنع جهازك من اصابته بفيروس؟

Слайд 88

Disk formatting is used to: Find files on a disk Lock

Disk formatting is used to:
Find files on a disk
Lock a disk
Unlock

a disk
Prepare a disk to store files

تهيئة القرص تستخدم ل :

Слайд 89

What is ISDN? Integrated Standard Digital Networks Integrated Services Digital Network

What is ISDN?
Integrated Standard Digital Networks
Integrated Services Digital Network
Interactive Standard Dynamic

Networks
Internet Services Data Network

ما هي خدمة الشبكة الرقمية المتكاملة؟

Слайд 90

What type of computer application would be used in a hospital

What type of computer application would be used in a hospital

to maintain patient medical details?
A desktop publishing application
A database application
An accounting application
A presentation application

أي نوع من برامج الحاسوب التي يمكن استخدمها في المستشفيات للحفاظ علي التفاصيل الطبية للمريض؟

Слайд 91

Which of the following is a use of the Internet in

Which of the following is a use of the Internet in

the home?
Managing household accounts
Formatting a disk
Electronic mail (e-mail)
Creating a database

أي مما يلي هو إستخدام الانترنت في المنزل؟

Слайд 92

If you were working from home, what software application could be

If you were working from home, what software application could be

used to communicate directly with colleagues and customers?
Presentation
Electronic mail (e-mail)
Database
Spreadsheet

إذا كنت تعمل من المنزل, أي من البرامج تستخدمها للتواصل المباشر مع الزملاء والعملاء؟

Слайд 93

Which of the following can be an advantage of electronic documents?

Which of the following can be an advantage of electronic documents?
They

can never be lost
They can always be e-mailed regardless of size
They can reduce the usage of paper
They can never be copied

أي مما يلي يمكن أن يكون ميزة الملفات الالكترونية؟

Слайд 94

Which one of the following should be used to change your

Which one of the following should be used to change your

password in your computer?
Internet Explorer.
Anti-virus software.
Control Panel
Windows Firewall.

أي مما يلي لابد أن تستخدمه لتغيير كلمة المرور الخاصة بك علي جهازك؟