You are on page 1of 43

1)

Data Storage Contains the CPU Output Device Input Device

Mouse Monitor System Case Hard disk

Data Storage  Hard disk


Contains the CPU Case
Output Device Monitor
Input Device Mouse

2) The speed of a computer CPU can be measured in:

a. Megabits
b. Megacycles
c. Megaunits
d. Megahertz

Megahertz

3) A Gigabyte is approximately:

a. 1,000 bytes
b. 100 kilobytes
c. 1,000 kilobytes
d. 1,000 megabytes

4) Megabyte Terabyte Gigabyte Kilobyte Byte

Byte < Kilobyte < Megabyte < Gigabyte < Terabyte

1
5) Which one of these is computer hardware?

a. The operating system


b. A CPU
c. A word processing package
d. A spreadsheet

A CPU

6) Which one of these computer types is the most powerful?

Mainframe Laptop
Personal Computer Server Computer

7) Which of these computer types is the fastest at performing computer


calculation?

Mainframe Laptop
Personal Computer Server Computer

8) Which one of these devices can be used both to input and output data?

Light pen Scanner Microphone Touch Screen

9) Which two of the following devices can be used to input data to a


computer?

Light pen Printer Plotter Mouse Speaker

10) Which one of these types of storage provides the fastest access to data?

Zipdisk Floppy diskette Hard disk CD-RW

2
11) Which one of these devices can be used to output data from a
computer?

Keyboard Plotter Microphone Scanner

12) Computer workgroups allow which three of these resources to be shared


between multiple users at the same time?

Sharable Resource

Printer Disk space Monitor Applications Keyboards

13) Computer workgroups allow which three of these resources to be shared


between multiple users at the same time?

Sharable Resource

Printer Disk storage Monitor files Keyboards

14) Which one of the following enables a computer to run applications?

a. Word Processing Software


b. Operating System Software
c. Database Software
d. Desktop Publishing Software

3
15) Which two of these are operating systems?

a. Linux
b. MO DOS
c. Outlook
d. Internet Explorer
e. Google

16) Which two of these are operating systems?

1. Linux
2. Mac OS
3. Outlook
4. Internet Explorer
5. Google

17) Which two of these are operating systems?

a. Netscape Navigator
b. Yahoo!
c. Linux
d. Outlook
e. Windows

18) Which one of these statements correctly completes the following


sentence?
A computer's operating system:

a. does not control devices such as printers that are connected to the PC.
b. is the hardware the computer uses to run software.
c. is not necessary on some very powerful personal computer
d. enables All the other programs to run.

4
19) Which one of the statements correctly completes the following sentence?
A computer's operating system:

a. is the last program to load when you start the computer.


b. does not control devices connected to the PC.
c. is not necessary on high-powered personal computers.
d. instructs the screen to display data entered with the keyboard.

: ‫ل الجملَة التاليَة بشكل صحيح؟ نظام تشغيل الكمبيوتر‬ ُ ‫أي واحد من البيانات ُتكم‬
.‫ج الخيُر للَتحميل عندما َتْبدُأ الكمبيوتر‬ ُ ‫· هو البرنام‬
.‫ط بالكمبيوتر‬ ِ ‫· ل ُيسيطُر على الجهزِة الُمرَتِب‬
.‫ي على الكمبيوترات الشخصية المتقّدمة‬ َ ‫س ضرور‬ َ ‫· َلي‬
.‫ت المدخلة بواسطة لوحِة المفاتيح‬ ِ ‫· َيْأمُر الشاشَة لَعْرض البيانا‬

20) Drag:
An Operating System A Software Application
You can run more than
one at the same time.
Sets up the look and feel
of your computer
interface.
Controls the hardware
and software of your
computer.
This can be used to edit
data files.

21)
1. Very cheap means of backing up 1 Mb of text files
2. Archiving 1.8Gb of graphic files that are not currently needed.
3. Backing up 1.8Gb of files you are currently working on.

1.44 Mb Floppy 1
2Gb Back-up Tape 2
2Gb Hard Disk 3
5
22)
1. Archiving personal records.
2. Backing up text file
3. storing 1.5G of work in progress.

1.44 Mb Floppy 2
2Gb Back-up Tape 1
2Gb Hard Disk 3

23) Which one of these is application software?

a. Graphics Card
b. Word processor
c. Central Processing Unit (CPU)
d. Hard Disk

24) Which one of these is Computer software?

1. Monitor
2. Windows
3. System case
4. Scanner

25)
1. A Database Application
2. Desktop Publishing
3. A Presentation Application
4. Word Processing
5. A Spreadsheet Application

Creating letters, faxes or Creates overhead projections or


4 3
memos (‫ )مذكرة‬etc. slides

6
Makes financial projections 5 Sorting large amounts of information 1

Producing a newspaper
2
with complex page layouts

26)

1. A Database Application
2. Desktop Publishing
3. Multimedia application
4. Word Processing
5. A Spreadsheet Application

Creating letters and Create interactive Training


business document 4 3
material

Working out budgets 5 Creating a list of contact details 1

Producing complex
2
magazines layouts

27)
1) A Web Browser
2) A Multimedia Application
3) Word Processing
4) A Spreadsheet Application
5) An Accounting Application

To view web pages 1 Payroll and stock control 5

Produce a catalogue Produce charts and graphs


3 4
containing graphics

7
Create interactive
2
learning material

28) Which one of these statements about formatting computer storage


media is true?

a. Disks are automatically formatted when you saves file.


b. A used floppy disk cannot be reformatted.
c. Unformatted disks need operating system data written to them before
they can store files.
d. A full format does not erase data from your disk.

29) Which one of these statements about formatting computer storage


media is true?

a. All operating systems format disks in the same way.


b. You can't format a disk if it's been formatted already.
c. A pre-formatted disk can be used immediately to store data.
d. You should regularly format floppy disks.

.‫ت‬
ِ ‫خْزين البيانا‬
َ ‫ل فورًا لت‬
َ ‫ن ُيسَتعم‬
ْ ‫ن َأ‬
ُ ‫· القرص الُمَهّيأ من َقْبل ُيْمِك‬

30) Drag these statements Into the correct boxes.

True False
Formatting is the process of sawing data onto a
floppy disk
Full disk formatting completely erases the
previous contents of a disk
You cannot purchase pre-formatted disks
All disks need to be formatted before they can
store files
A used floppy disk cannot be reformatted
8
‫ت في القرص مرن‬ ِ ‫َالتْهِيئة هى عمليُة نشر بيانا‬
‫التهيئه الكامله للقرص تْمحو المحتويات السابقَة بالكامل من عليه‬
‫ل الُمَهّيئِة‬
َ ‫ص َقْب‬
ِ ‫شراء القرا‬ ِ ‫أنت ل َتستطيُع‬
َ ‫خزن الملفا‬
‫ت‬ ْ ‫ن َن‬
ْ ‫ن من َأ‬
ُ ‫ن ُتهّيئ قبل أن نُتْمِك‬ ْ ‫ضُروري َأ‬ ّ ‫ن ال‬
ْ ‫ل القراص َم‬ ّ ‫ُك‬
‫ن تهيئته مرة اخرى‬ ُ ‫ن المستعمل ل ُيمك‬ َ ‫ص المر‬
َ ‫القر‬

31) Which one of these statements about computer applications is


true?

a. The same version of an application will work on any type of computer.


b. They control devices such as printers and scanners that are attached to
the PC.
c. They enable users to carry out specific tasks (‫ )ينفذ مهام محددة‬such as
word processing.
d. They are the only programs that you need to use a PC.

‫ُيمّكن المستعملين لَتنفيذ مهاِم معّينة مثل معالجِة الكلمات‬

32) Which two of the following have a significant influence on the speed
at which a computer performs?

a. Installing new applications


b. Clearing all the unwanted files off a hard disk
c. Installing a smaller monitor
d. Increasing the amount of RAM
e. Adding a CD-ROM drive

‫ي إثنان َلُه تأثير هاّم على السرعِة التى ُيؤّديها الكمبيوتر ؟‬


ّ ‫َأ‬
‫ج جديدَة‬َ ‫· وضع برنام‬
Hard disk ‫ن‬ ْ ‫ل الملفات الغير مرغوبة ِم‬ ّ ‫· مسح ُك‬
‫· وضع شاشة صغيرة‬
‫· َيِزيُد مساحة الرام‬
‫ جديد‬CD-ROM ‫· إضافة‬

9
33) Which one of the following does not influence (‫ )مؤثر‬the performance a
computer ?

a. The amount of free space on the PC's hard disk


b. The amount of main memory [RAM] that is installed
c. The use of a trackball rather than a mouse
d. The type of graphic that you load on your PC.

34) Which one of the following statements Is true about ROM (read-only
memory):

a. It is wiped clean when you switch off the computer.


b. It stores the computer's operating system.
c. It cannot be modified by the user.
d. It is loaded from your hard disk when you switch on the compute

35) Which one of these types of computer memory Is permanent (‫)دائم‬


and unchanging?

a. Random Access Memory


b. Working Memory
c. Virtual Memory
d. Read-Only Memory

36)
RAM ROM

1) The Operating System is loaded into this when the PC is switched on.
2) The contents of this disappear when the PC is switched off.
3) The contents of this are fixed during the manufacture of The PC
4) The contents of this change constantly as the PC is used.
10
5) You cannot write to this type of Memory

.‫( نظام التشغيل محّمل إلى هذا عندما الكمبيوتر مشغل‬1


.‫( محتويات هذه َتختفي عندما الكمبيوتر مطفأ‬2
‫( محتويات هذه ثابتة أثناء صناعِة الكمبيوتر‬3
.‫( محتويات هذا التغييِر بشكل ثابت كمستعمل كمبيوتر‬4
‫ن الذاكرِة‬
ْ ‫ع ِم‬
ِ ‫( أنت ل َتستطيُع الِكتاَبة إلى هذا النو‬5

37) Which one of the following best describes (‫ )يصف‬an Intranet?

a. A network which can only be accessed using an ISP


b. A world-wide collection of computer files connected by links
c. A network, using e-mail and Web, within a single organization
d. A network that is shared between more than one organization

38) Which one of the following statement best describes the Internet?

1. An internal network, using e-mail and Web, within a single


organization.
2. A global network of computers providing services such as e-mail
3. A network that is shared between more than one organization
4. A world-wide collection of computer files connected by links.

39) Which one of the following descriptions of an extranet is true?

a. A world-wide collection of files connected by links


b. A very large intranet within an organization
c. An extra-fast intranet for web and e-mail
d. Shares data between two or more organizations

40) Which of the following statements best describes an extranet?

11
a. A network using web and e-mail to share data between organizations
b. An extra-fast intranet within a single organization
c. Avery large intranet used by the general public
d. A network used to share data within a single organization

‫ف شبكة معلومات مساعدَة؟‬


ُ ‫ص‬
ِ ‫أي من البيانات التالية أفضل َت‬

ِ ‫ت بين المنظما‬
‫ت‬ ِ ‫أي إستعمال شبكِة ويب وبريد إلكتروني للشِتراك في البيانا‬ ·
‫إنترانت سريعة جدًا ضمن منظمة وحيدة‬ ·
ِ ‫إنترانت الكبيرة مستعملة من قبل النا‬
‫س‬ ·
‫ت ضمن منظمة وحيدة‬ ِ ‫ل للشِتراك في البيانا‬
ُ ‫أي شبكة ُتسَتعم‬ ·

41) Which of the following best describes a graphical user Interface (GUI)
:

a. using windows, a mouse and icons to operate a PC .


b. visual online help provided with a software application.
c. software designed to produce technical diagrams.
d. using a series of typed commands to operate PC.

42) Which of the following best describes a graphical user interface


(GUI):

a) A graphics package for technical illustration.


b) Typing in commands to operate a PC.
c) A system using windows, pointer and icons to operate a computer.
d) Providing graphical online help to assist a computer user.

43) Which one of these is the type of network that links computers in a
single site or location?

O LAN O Internet O PSTN O WAN

12
44) Which one of these statements about the speed of connecting to the
Internet is true?

a. Data transfer is slower with a digital line than with an analog line.
b. The processor speed of the computer affects the speed of data transfer
en the Internet.
c. A 14.4 Kbps modem transfers data more slowly than a 66.6 Kbps
modem.
d. The speed of data transfer does not vary significantly (‫)بشكل ملحوظ أو هام‬
with the time of day.

45) Drag just the two statements that describe the Internet Into the box.

Internet

1. A global network of computers linked together using communications


equipment
2. A vast collection of linked documents held on computers all over the
world
3. Invented to allow people to shop online
4. Can be accessed using a browser

ِ ‫ل أجهزَة إتصال‬
‫ت‬ َ ‫ت سوية َبستعما‬
ْ ‫ت إرتبط‬
ِ ‫ن الحاسبا‬
ْ ‫شبكة عالمية ِم‬

46) The Internet Is the name that Is given to:

a. the physical equipment used to connect computer systems all over the
world.

13
b. all the linked documents that are held on a global network of computer
systems.
c. linked computer systems that form a vast global network.
d. the dedicated telephone lines that permanently connect commercial
networks on distant sites.

: ‫ت السُم الذي ُيعطي إلى‬


َ ‫ن النترن‬
ّ‫إ‬

.‫ل ليصْال أنظمِة الكمبيوترفي جميع أنحاء العالم‬ ُ ‫الجهزة الطبيعية ُتسَتعم‬ ·
.‫ن أنظمِة الكمبيوتر‬ْ ‫حُمولة على شبكة عالمية ِم‬ْ ‫ل الوثائق الُمرَتَبطة التي َم‬
ّ ‫ُك‬ ·
.‫أنظمة الكمبيوترُمرَتَبطة التي ُتشّكل شبكة عالمية واسعة‬ ·
.‫ت التجاريَة بشكل دائم على المواقِع البعيدِة‬ َ ‫ل الشبكا‬
ُ ‫خطوط الهواتف المكّرسة التي ُتوص‬ ·

47) Drag two of the statements that describe the World Wide Web into the
box.

World Wide Web

a. A global network of computers linked together using communications


equipment
b. A vast collection of linked documents held on computers all over the
world
c. A network that grew out of the American military
d. The world-wide e-mail system

ِ‫ت مع بعض بإستعمال أجهزةِ إتصالت‬ ْ ‫ت إرتبط‬ ِ ‫ن الحاسبا‬ ْ ‫شبكة عالمية ِم‬ ·
‫ت على الكمبيوترات في جميع أنحاء العالم‬
ْ ‫حمل‬
َ ‫ق الُمرَتَبطِة‬
ِ ‫ن الوثائ‬
ْ ‫مجموعة واسعة ِم‬ ·
ِ ‫ش المريك‬
‫ي‬ ِ ‫ن الجي‬ْ ‫ت ِم‬ْ ‫الشبكة التي َنتج‬ ·
ِ ‫نظام البريد اللكتروني العالم‬
‫ي‬ ·

48) The World Wide Web is the name that is given to:

14
a. All the linked documents that are held on a global network of
computer systems.
b. the world-wide e-mail system.
c. The cables and communications satellites that connect computer
systems all over the world.
d. the organisation that regulates the Internet.

49) Which one of these is the type of network that links computers in
different cities or countries?

a. LAN.
b. Ethernet.
c. PSTN.
d. WAN.

50) Which two statements about Local Area Networks (LANs) are
true?

a. Applications cannot be shared over a LAN.


b. Authorized (‫ )يفوض او يسمح‬users can access and use data stored
anywhere on a LAN.
c. Telecommunications services cannot be shared over a LAN.
d. Large data files can be transferred between computers using a LAN.
e. It is not possible for users of a LAN to share printers.

‫ي بيانان حول الشبكات المحلّيِة )شبكات التصالت المحلية( صحيح ؟‬


ّ ‫َأ‬

. LAN ‫ك فيها على‬ َ ‫ن ُتشَتر‬ ْ ‫تطبيقات ل ُيْمكن أ‬ ·


.‫خزنتْ أي مكان على شبكة إتصالت محلية‬ َ ‫ت‬َ ‫ن َيْدخلوا وَيستعملوا البيانا‬ْ ‫ن َأ‬
ُ ‫يفوض مستعملون ُيْمِك‬ ·
.‫ك فيها على شبكة إتصالت محلية‬ َ ‫ن ُتشَتر‬ْ ‫ت ل ُيْمكن أ‬ ِ ‫خدمات إتصال‬ ·
.‫ت شبكة إتصالت محلية‬ ِ ‫ن ُتحّول بين إستعمال الحاسبا‬ ْ ‫ن َأ‬ُ ‫ت كبيرِة ُيْمِك‬
ِ ‫ملفات بيانا‬ ·
.‫ت‬
ِ ‫س محتمَل لمستعملين شبكة إتصالت محلية للشِتراك في الطابعا‬ َ ‫هو َلي‬ ·

15
51) Which one of these statements about the Internet is false?

a. It enables computers with different operating systems to exchange


data.
b. It is not controlled by any single organization.
c. You need a license to publish material on the Internet.
d. It allows computers to share data over large distances.

52) Which one of these statements about connecting to the Internet is


true?

a) ISP stand for Internet Service provider


b) The Internet can only be used to connect with the same ISP
c) You must have a modem to connect to the Internet
d) You must have a telephone line connect to the Internet

53) What is the meaning of the letter e in the word e-mail?

a. Express
b. Electric
c. Electronic
d. Efficient

54) Which one of the following activities is best suited (‫ )مناسب‬for e-mail?

a. Performing calculations
b. Sharing very large video files, such as movie trailers
c. Sharing files between workers at different locations
d. Transmitting credit card details

16
55) Which one of the following is a digital line, used for both voice and
data?
a. ISDN.
b. FTP.
c. PSTN.
d. HTTP.

Note : PSTN : Public Switched Telephone Network

56) Which one of the following statements applies to PSTN?

• A network designed to transmit high-speed digital data.


• It's the Internet email system.
• It's a form of satellite communication.
• The public analog telephone network

Note: PSTN  Public Switched Telephone Network

57) The term ADSL stand for:


a. Anonymous Digital Service Line.
b. Asymmetric Digital Subscriber Line.
c. Analog Display Services Line.
d. Advanced data Service Link.

58) A PDA which has been backed up - but not password protected - has
been stolen (‫)سرق‬. Which one of the following consequences may result?

a. Loss of the right to use the software that came with the PDA
b. Time wasted an re-entering all the records in a replacement PDA
c. Misuse of confidential files and telephone numbers
d. Loss of contact details on the stolen PDA
17
ْ ‫ج التي جاء‬
‫ت‬ ِ ‫سِتْعمال البرام‬ْ ‫قل‬ ّ ‫خسارة الح‬ ·
‫ل السجلت في‬ ّ ‫أهدَر وقتَ إعادة إدخال ُك‬ ·
‫ت السّرية وأرقاِم الهاتف‬ ِ ‫سوء إستعمال الملفا‬ ·
‫ المسروقة‬PDA ‫ل على‬ ِ ‫ل التصا‬ ِ ‫خسارة تفاصي‬ ·
Note: PDA Personal Digital Assistant

59) The device that links computers to telephone networks by converting digital
and analog signals is called a:

a. Transcoder
b. Digitiser
c. Modem
d. Translator Unit

60) Which one of the following options describe the effects of teleworking
?

a. Reduced cost of equipment


b. Harder to socially interact with team members
c. Greater use of transport
d. Inflexible working hours
(‫)صعوبة فى التفاعل الجتماعى مع أعضاء الفريق‬
61) Which one of the following statements about teleworking is true?

a) More human contact with the team


b) Increased company space requirement
c) Greater ability to focus on one task
d) Inflexible schedules More human contact with the team

62) For which one of these tasks would a computerized solution be more
appropriate?

18
a. Calculating payroll (‫ )الرواتب‬for staff
b. Solving staff relations
c. Motivating (‫ )تشجيع‬staff
d. Selecting new staff

63) For which two of these tasks would a computerized solution be most
appropriate?

a. Assessing employee performance.


b. Enforcing rules and regulations.
c. Generating invoices.
d. Carrying out stock control.
e. Providing a customer support helpline

.‫َتقييم أداِء مستخدِم‬ ·


.‫ت‬ِ ‫َفْرض لوائح وتعليما‬ ·
.‫أعطاء فواتيِر‬ ·
.‫َتنفيذ مراقبِة المخازن‬ ·
ِ ‫ط مساعدة لدعِم الزبو‬
‫ن‬ ّ ‫ُيزّود خ‬ ·
64) Drag the two statement that show why computers can be useful
into the graphic computer screen
a) They can rapidly sort large amount of data
b) Thy can prevent users from making mistakes
c) They can carry out complex calculations accurately
d) They never stop working
e) They are more intelligent than people

65) For which two of these tasks would people be more appropriate than
computers?

a. Calculating payroll for staff


b. Motivating staff
c. Storing a list of staff contact details
19
d. Providing a customer support help line
e. Maintaining a list of every item in the company's inventory of goods

‫ت؟‬
ِ ‫ن الحاسبا‬
ْ ‫ن أكثَر ملئمة إنسانة ِم‬ َ ‫ن هذه المهاِمُ َيُكونو‬ْ ‫ي إثنان ِم‬
ّ ‫ل‬
َ
‫ظفين‬
ّ ‫قائمة الرواتب الُمَقّدرة للمو‬
‫ظفين‬ ّ ‫َتحفيز المو‬
‫ظفين‬
ّ ‫ل المو‬
ِ ‫ل إتصا‬ِ ‫خزين قائمة تفاصي‬ َ‫ت‬
ِ ‫َتزويد خط مساعدة لدعم الزبو‬
‫ن‬
‫ل مادة في جرِد شركَة السلِع‬ ّ ‫إْبقاء قائمة ُك‬

66) Large-scale computer applications are increasingly (‫ )بأزدياد‬used in


business.

1. Check policy details Analyse statistics to estimate premiums Provide


quotes for premiums.
2. Check ticket availability List customers' dietary needs Purchase
tickets.
3. Check your balance Transfer funds Apply for loans.
4. Administer employee payrolls Process orders Track invoices.

Online banking 3
Insurance claim Processing 1 (‫)معالجة إّدعاء التأمين‬
Airline booking 2
Business administration 4 (‫)إدارة أعمال‬
.ِ‫ت و ُتزوّيدها‬ِ ‫ت لَتخمين العلوا‬ َ ‫ل سياسِة مراقبِة الحصائيا‬ ُ ‫ ُتحّلل تفاصي‬.1
.ِ‫ فحص التذاكِر المتاحة لحجز المشترى لتذكرة‬.2
.‫ض‬
ِ ‫ل وميزانيتك لُيقّدم طلب للحصول على القرو‬ َ ‫ فحص الموا‬.3
.‫ت و الفواتيَر‬
َ ‫ أداْرة قوائَم الرواتب للمستخدِم لُمعالجُة الطلبا‬.4

67) Large-scale computer applications are increasingly used in


government.

1. Policy documents. Public health warnings.


2. Income tax payment form. Television licence payment form.
20
3. Census records. Vehicle registration listing.

Public information systems 1 ِ‫أنظمة معلومات عامة‬


Public record systems 3 ‫النظمة القياسية العاّمة‬
Administration systems 2 ‫أنظمة إدارِة‬

.‫ل على نحو متزايد في الحكومِة‬ ُ ‫ق َتستعم‬


ِ ‫ب الواسعة النطا‬
ِ ‫تطبيقات الحاسو‬
.‫ تحذيرات صحة عامِة‬.‫ وثائق سياسِة‬.1
.‫ن‬
ِ ‫ شكل دفعِة رخصِة تلفزيو‬.‫ شكل دفعِة ضريبِة دخل‬.2
. ‫ل العربة أو المركبات المسجلة‬ ِ ‫ تسجي‬.‫ سجلت إحصاِء سكان‬.3

68) Large-scale computer applications are Increasingly used In government.

1. Store census information Store passport details.


2. Handle social welfare payments. Collect television licence fees.
3. Announce policy documents online. Notify citizens of government
decisions.

Public information systems ((‫أنظمة معلومات عامِة‬ 3


Public record systems ((‫أنظمة القياسية العاّمة‬ 1
Administration systems ((‫أنظمة إدارِة‬ 2

.‫ل على نحو متزايد في الحكومِة‬


ُ ‫ق َتستعم‬
ِ ‫تطبيقات الكمبيوتر الواسعة النطا‬

.‫ن‬
ِ ‫تفاصيل جواِز سفر مخز‬ ‫ تخزين معلومات الحصاِء للسكان‬.1
.‫ن‬
ِ ‫ جمْع أجوَر رخصِة التلفزيو‬. ‫ معالجْة النفقات الجتماعية‬.2
.‫ت الحكومة‬
ِ ‫ يشعْر مواطنين قرارا‬.‫ت‬
َ ‫ن سياسًة الحقوق الفكرية على النترن‬ْ ‫ يعل‬.3

69) Which of the following are examples of large-scale applications of


computers In education?
Match the following statements with the correct boxes.

Computer based education Uses traditional methods


‫الكمبيوتر فى التعليم‬ ‫أستعمال الطرق التقليدية‬
21
Student registration systems Computer based education
Provide student counseling Uses traditional methods
Distance learning Computer based education
Researching homework on the internet Computer based education
Coaching of slower students Uses traditional methods

ِ‫ل الطالب‬ِ ‫أنظمِة تسجي‬


‫تزويد الطالب بالنصيحة‬
‫التعليم عن بعِد‬
َ ‫ى النترن‬
‫ت‬ ِ ‫حث الواجب البيتي عل‬ ْ ‫َب‬
‫ب البطِأ‬
ِ ‫ن أو َتدريب الطل‬ ُ ‫تلقي‬

70) Three of the following are examples of computer uses in education.


Match the statements with the correct boxes.

Computer based education Uses traditional methods

Organizing student timetables Computer based education


Coaching students with learning 'difficulties Uses traditional methods
Distance learning Computer based education
Helping students with career advice Uses traditional methods
Using the Web for research Computer based education

ِ‫َتنظيم جداولِ مواعيد الطالب‬


‫ب بَتَعّلم الصعوبات‬
ِ ‫َتدريب الطل‬
‫التعليم عن بعد‬
‫ب بنصيحة المهنِة‬ ِ ‫عَدة الطل‬
َ ‫سا‬
َ ‫ُم‬
ِ ‫استعمال الويب للبح‬
‫ث‬

71) You can reduce the risk of neck, back and shoulder pain, by one of the
following actions:
: ‫ل التاليِة‬
ِ ‫ف والظهَر بأحد العما‬
َ ‫ن خطَر الرقبِة و ألم الكت‬
َ ‫ن تقلل م‬
ْ ‫ن َأ‬
ُ ‫أنت ُيْمِك‬
a. Using a larger monitor with sharper resolution.
b. Using a wireless mouse.
22
c. Keeping the keyboard close to the front of the desk.
d. Using a fully adjustable operator's chair.
‫ل بالكامل‬
ِ ‫إستعمال كرسي قابل للتعدي‬

72) Which two of the following help to create a good working


environment for computer users?

a. Bright fluorescent lighting


b. Use of a mouse mat with wrist support
c. Turning up screen contrast
d. Use of a monitor filter to reduce glare
e. Sitting as close as possible to the monitor

‫خْلق بيئة عاملة جيدة لمستعملي الكمبيوتِر؟‬


َ ‫ن المساعدِة التاليِة ل‬
ْ ‫ي اثنان ِم‬
ّ ‫َأ‬
‫· إستعمال البادِة تدعِم الرسِغ‬
ِ ‫· إستعمال الفلتِر لَتخفيض الوه‬
‫ج‬

73) Which one of the following contributes (‫ )يساهم‬to a good working


environment (‫ )البيئة المحيطة‬for a computer operator?

a. Locating the PC close to a printer


b. Elbow and wrist support
c. High level of contrast between the screen brightness and other lighting
d. Direct light shining on the monitor
‫· ُيحّدد مكان الكمبيوتر قريب من طابعة‬
َ ‫· دعم الرسَغ والِمْرَف‬
‫ق‬
‫ع الشاشَة والضاءة الخرى‬
ِ ‫ن المقارنِة بين سطو‬ْ ‫· مستوى عالي ِم‬
‫· ضوء خفيف مباشر على الشاشة‬

74) You can reduce the risk of eye-strain by one of the following actions:

a. using the brightest possible screen setting.


b. setting the screen facing a window.
c. sitting approximately 12" from your monitor.
23
d. having your eyes level with the top of your monitor.

:‫ض خطر ضعف العين بواحد من العمال التالية‬ َ ‫ن تخف‬ ْ ‫ن َأ‬


ُ ‫أنت ُيْمِك‬
.‫· أستعمال الشاشِة اللمِع‬
.‫· وضع الشاشَة تواجُه النافذة‬
.‫ن الشاشَة‬
ْ ‫ بوصة تقريبًا ِم‬12 ‫· الجلوس على بعد‬
. ‫ن َتتساوى مع قمِة الحافة الخاصة بالشاشة‬ َ ‫ل العي‬ ُ ‫جع‬ ْ‫· ي‬
75) You can reduce the risk of eye-strain by one of the following
actions:

a) Increase between screen and room lighting


b) Using an anti-glare filter on your monitor
c) Reducing your monitor’s color depth setting
d) Positioning the screen with a window behind it

76) Which two of the following contribute to a good working environment for a
computer operator?

a. Use of a monitor filter to reduce glare


b. Sitting as close as possible to the monitor
c. A good level of ventilation in the room
d. Plenty desk space in which to move the mouse
e. The keyboard positioned close to the front edge of the desk

‫ي إثنان يساهَم في بيئة جيدة لنظام التشغيل ؟‬


ّ ‫َأ‬

ِ ‫ب لَتخفيض الوه‬
‫ج‬ ِ ‫شح مراق‬ ِ ‫إستعمال مر‬ ·
‫جلوس بأقرب ما يمكن إلى الشاشة‬ ·
‫ن التهويِة في الغرفِة‬
ْ ‫أي مستوى جيد ِم‬ ·
‫فضاء المنضدِة عند حركة الماوس‬ ·
‫َوضع لوحَة المفاتيح قريبة من الحافِة الماميِة للمنضدِة‬ ·

77) You can reduce the risk of repetitive strain Injury by one of the
following actions :
24
a. using an adjustable chair.
b. sitting with your feet firmly on the ground.
c. using an anti-glare screen.
d. taking frequent breaks from your work.

:‫ي بأحد العمالِ التاليِة‬


ِ ‫ح الجهاِد التكرار‬
ِ ‫ن تخفض خطَر جر‬
ْ ‫ن َأ‬
ُ ‫أنت ُيْمِك‬

.‫ل‬
َ ‫ل كرسي قابل للتعدي‬ ُ ‫َيستعم‬ ·
.‫ض‬
ِ ‫ك ِبحزم على الر‬ َ ‫جلوس بأقداِم‬ ·
.‫ج‬
َ ‫ضّد وه‬
ِ ‫ل شاشَة‬ ُ ‫َيستعم‬ ·
.‫ك‬
ِ ‫ن عمِل‬ْ ‫ت متكّررة ِم‬
َ ‫َيْأخُذ إجازا‬ ·

78) Which two of the following contribute to a good working environment


for a computer operator?
a. A good level of ventilation in the room.
b. Plenty of free desk space in which to move the mouse.
c. The keyboard positioned close to the front edge of the desk.
d. Very strong artificial lighting.
e. Taking frequent breaks from the screen.

79) Which one of the following statements about safety precautions (


‫ )أحتياطات‬when using computers is true?

a. Faulty cables should be repaired using insulating tape.


b. You should shut down your PC by unplugging it from the electricity
supply.
c. There is no safe way to run cables across open areas.
d. More than one computer should not use the same power socket.

80) Which one of these actions demonstrate poor health and safety
practice?
25
a. Installing too much software on a computer.
b. Leaving power cables unsecured.
c. Turning off the power without fire shutting down the PC.
d. Running several applications at the same time

‫ل تكون غير صحيحة وآمنه وتعتبر أستخدام سئ ؟‬ ِ ‫أي واحد من هذه العما‬
.‫· يضع برامجًا أكثر من اللزَم على الكمبيوتر‬
.‫ك كهرباء غير مضمونِة‬ ِ ‫· َتْرك أسل‬
. Shutdown ‫· َيطفئ الجهاز بدون أستخدام‬
‫عّدة برامج في نفس الوقت‬
ِ ‫ل‬
ُ ‫· ُيشغ‬

81) Which one of these actions demonstrates poor health and safety
practice In the use of computers?

a. Touching internal parts of the PC.


b. Running several applications at the same time.
c. Only using a single power socket for each PC.
d. Using out-of-date software.

‫ل سئ للكمبيوتِر؟‬ِ ‫ل تعتبر إستعما‬ ِ ‫أي واحد من هذه العما‬


.‫· لمس أجزاء داخلية ُمَؤّثرة للكمبيوتر‬
.‫· تشغيل عدة برامج في نفس الوقت‬
.‫ل كمبيوتر‬ ّ ‫· إستعمال مقبس كهربائي وحيد لُك‬
.‫خ‬
َ ‫ل برامج منتهية التاري‬
ُ ‫· َأستعما‬

82) Which statement about computers and the environment is true?

a. Running an animated Screensaver saves power.


b. Printer toner cartridge scan be recycled.
c. You can't recycle paper from a laser printer
d. Laptops on standby use more electricity than when running normally.

‫ت والبيئِة صحيحة ؟‬
ِ ‫ي بيان حول الحاسبا‬
ّ ‫َأ‬

26
.‫حّركة ُتوّفر قّوًة‬
َ ‫· أن ُيديُر شاشَة َتَوّقف ُمَت‬
. ‫سح خرطوشِة حبِر الطابعِة‬ ْ ‫· إعادة َم‬
‫ن طابعة ليزِر‬ ْ ‫· أنت ل َتستطيُع تكرار الورقِة ِم‬
. ‫ن انها فى وضع التشغيل الطبيعى‬
ْ ‫ل أقل كهرباء ِم‬
ُ ‫الكمبيوترات المحموله في حالة تأّهب َتستعم‬.

83) Which statement about computers and the environment is true?


a. You can’t recycle paper from an inkjet printer.
b. Using an animated screensaver saves power.
c. If a PC needs to be left on, you won’t save energy by switching off the
monitor.
d. Laptops on standby use less electricity than when running
normally.

‫ت والبيئِة حقيقيُة ؟‬ ِ ‫ي البيان حول الحاسبا‬ ّ ‫َأ‬


.inkjet ‫ن طابعِة‬ ْ ‫ أنت ل َتستطيُع تكرار الورقِة ِم‬.
.‫حّركة قّوًة‬َ ‫ ُيوفُر إستعمال شاشَة َتَوّقف ُمَت‬.
.‫طفاء الشاشِة‬
ْ ‫ن ُتوّفر طاقَة بإ‬
ْ ‫ فأنت َل‬،‫ك الكمبيوتر‬ َ ‫ن ُيْتَر‬
ْ ‫ضُروري َأ‬ّ ‫ن ال‬
ْ ‫ إذا كان َم‬.
. ‫ن انها فى وضع التشغيل الطبيعى‬ ْ ‫ل أقل كهرباء ِم‬ ُ ‫الكمبيوترات المحموله في حالة تأّهب َتستعم‬.

84) Which one of the following statements describes the process of


backup?

a. Restoring work from an older file


b. Copying a file from your C: drive to your Desktop
c. Keeping copies of data in two locations
d. Moving a file to a different folder on a hard drive

85) Which one of these statements best describes computer backup?

a. Reverting to the previously saved version of an electronic file


b. Keeping a copy of computer files on a separate storage device
c. Storing paper printout from your computer files
27
d. Storing computer files on a variety of separate storage devices

86) A laptop which has been password protected, but not backed up, has
been stolen. Which one of the following consequences may result?

a. You will have to change your e-mail address


b. Confidential files can be misused
c. You will need to change your password
d. Work stored on the laptop will be lost

‫ أي واحد من‬.‫ق‬
َ ‫سِر‬
ُ ‫س له نسخة احتياطية‬
َ ‫الكمبيوتر المحمول المحمى بواسطة كلمَة سر قد وضعت وَلي‬
‫ج؟‬
ُ ‫النتائج التالية َقْد َتْنت‬

‫ك اللكتروني‬
َ ‫ن ُتغّير عنوان بريد‬ ْ ‫جبُ َأ‬
ِ ‫أنت َي‬ ·
‫ئ إستعمال‬ُ ‫ن تسي‬
ْ ‫ن َأ‬
ُ ‫ملفات سّرية ُيْمِك‬ ·
َ ‫ج لَتغيير كلمِة سر‬
‫ك‬ ُ ‫سَتحتا‬
َ ‫أنت‬ ·
‫العمال المخزنه على الكمبيوتر المحمول ستفقد‬ ·

87) Electronic documents help to save paper, while other documents are
best printed out.

Should be printed Can be distributed electronically

Staff announcement s Should be printed


Documents that need careful proof-reading Can be distributed electronically
Working drafts of a lengthy report Can be distributed electronically
Contracts Should be printed

‫ظفين‬ّ ‫ملحوظات المو‬


َ‫ج التصحيح‬
ُ ‫الوثائق التي َتحتا‬
‫عمل الُمسّودات لتقرير طويل‬
‫العقود‬

88) Electronic documents help to save paper, while other documents are
best printed out.
28
.‫طُبوعِة‬
ْ ‫ بينما وثائق أخرى يفضل الَم‬، ‫ق اللكترونيُة لَتوفير الورقِة‬
ُ ‫ُتساعُد الوثائ‬

Are best printed Are suitable for electronic distribution

Help for a software application electronic


Guarantees ‫ضمانات‬ printed
E-mail messages electronic
Contracts ‫عقود‬ printed

89) Electronic documents help to save paper, while other documents are
best printed out.

Should be printed Should be distributed electronically

Help for a software application electronically


Planning applications (‫ِ)تخطيط التطبيقات‬ printed
Documents that are regularly updated electronically
Academic certificates (‫)الشهادات الكاديمية‬ printed

90) Shareware is the term that is applied to:

a. an application that is used to track the movement of stocks and shares.


b. software that you try for free but pay for if you keep it.
c. any application for which a multiuser licence is available.
d. any software that can be used on a server.

‫برامج تكون مجانية للتجربة ولكن يجب أن تشتريها إذا أردت الحتفاظ بها‬

91) Software that you can use without the need for any payment is referred
to as :

a. E-ware
b. Freeware
29
c. Shareware
d. Multiuser software

92) A computer virus is a program that:

a. will always be spotted by anti-virus software.


b. can make the hard disk unusable on a computer.
c. can be avoided if you regularly back up your hard disk.
d. Cannot enter your computer unless your computer is on a network.

.‫ت‬
ِ ‫ج ضّد الفيروسا‬
ِ ‫ف بالبرام‬
ُ ‫سُيكَتش‬ َ ‫دائمًا‬ ·
.‫ل على الكمبيوتر‬
َ ‫ب غير صالح للستعما‬ َ ‫ل القرص الصل‬ َ ‫جع‬ ْ ‫ن َي‬
ْ ‫ن َأ‬
ُ ‫ُيْمِك‬ ·
. ‫ب بإنتظام‬
َ ‫ك الصل‬
َ ‫ن ُيتفادى إذا َتْدعُم قرص‬ ْ ‫ن َأ‬
ُ ‫ُيْمِك‬ ·
‫خول الكمبيوتَر مالم يكن على الشبكة‬ ُ ‫ل َيستطيُع ُد‬ ·

93) Anti-virus software can disable a virus on your computer. This action
is called:
a. De-installing.
b. Disinfecting.
c. Restoring.
d. Scanning.

94) Which one of the following statements about anti-virus software is


true?

a. Before accessing the Internet, you need to run a virus check.


b. Deleting an infected file will eliminate the virus.
c. Antivirus software can detect all known viruses.
d. Anti-virus software can disinfect applications as well as files.

.‫س‬
ِ ‫ج لتشغيل برنامج الفيرو‬ُ ‫ َتحتا‬،‫ت‬
ِ ‫خول النترن‬ ُ ‫· قبل ُد‬
.‫س‬
َ ‫ل الفيرو‬
ُ ‫سُيزي‬
َ ‫ب‬ً ‫صا‬
َ ‫ف الُم‬
ً ‫ف المل‬
ُ ‫حذ‬ْ ·
30
.‫ل الفيروسات المعروفة‬ّ ‫ف ُك‬
َ ‫ن َتكتش‬
ْ ‫ن َأ‬
ُ ‫· برامج ضّد الفيروسات ُيْمِك‬
.‫ت‬
ِ ‫ت بالضافة إلى الملفا‬
َ ‫ن ُتطّهر التطبيقا‬
ْ ‫ن َأ‬
ُ ‫· برامج ضّد الفيروسات ُيْمِك‬
95)
Good anti-virus practice Poor anti-virus practice

Ensuring that no updates are made to your anti-virus software Poor


Regularly visiting the web-site of your anti-virus software supplier Good
Running a virus check on an e-mail attachment Good
Running software that you have received bye-mail Poor

96)
Good anti-virus practice Poor anti-virus practice

Updating anti-virus software once a year Poor


Scheduling virus checks to run once a day Good
Deleting e-mail from unknown sources Good
Opening unknown e-mail attachments Poor

97) A computer virus Is a program that :

a. will always be spotted by anti-virus software.


b. can make the hard disk unusable on a computer.
c. can be avoided if you regularly back up your hard disk.
d. cannot enter your computer unless your computer is on a network.

98)
(a) Good anti-virus practice Poor anti-virus practice

Opening e-mail from unknown sources Poor


Deleting e-mail from unknown sounds Good
Putting a virus-checked disk in a floppy drive Good
Downloading and running free software from the Web Poor

31
99)
Which two of these statements could each be used to complete the
following sentence?
A computer virus is a program that:

a) cannot infect a standalone PC


b) disappears once it has displayed a message
c) can usually be detected by anti-virus software
d) can be introduced when new software is installed
e) can enter a computer system if hardware such as a new mouse is
added

100) Drage :

Helps to avoid Doesn’t help to


‫ُيساعُد فى َتفادي خطِر أنتشار الفيروس للكمبيوتر‬
the risk of avoid the risk of
‫ل ُيساعُد فى َتفادي خطر أنتشار الفيروس‬
spreading a spreading a
‫للكمبيوتر‬
computer virus computer virus.
Scanning all unfamiliar disks with
anti-virus software.
Write-protecting all copies of
application disks once they have
been checked.
Only copying applications from your
close friends.
Rebooting your PC if you find a file
that is infected
Virus scanning all applications
before loading them onto your hard
disk.

101) Which of these stages of software development Is the first to be


completed?
32
a. Design
b. Analysis
c. Programming
d. Testing

102) Which of these stages of software development Is the Last to be


completed?

a. Design
b. Analysis
c. Programming
d. Testing

103)
Stage 1 Stage 2 Stage 3 Stage 4

Design Analysis Programming Testing

1- Analysis 2- Design 3- Programming 4- Testing

104) Which two of the following statements about purchasing (‫ )شراء‬online


are true?

a. Initial shipping of goods is free.


b. The supplier covers the cost of returning goods.
c. The consumer rights of the supplier's country apply.
d. It's more difficult to return goods purchased online than goods bought
in a shop.
e. Online purchases are free of customs duties.

33
.‫ك لبلِد البائع‬
َ ‫· تطبيق حقوق المستهل‬
. ‫ت ِمنْ السلِع التى اشترت في محل‬
َ ‫· هو أكثر صعوبًة لْرجاع السلِع التى اشترت على النترن‬

105) Which two of the following statements about purchasing online are
true?

a. The consumer rights of the supplier’s country apply.


b. E-commerce offers access to goods around the clock.
c. The supplier covers the cost of shipping.
d. All e-commerce transactions are safe.
e. The supplier covers the cost of returning goods.

‫ك لبلِد البائع‬
َ ‫تطبيق حقوق المستهل‬
.‫ساعة‬
ّ ‫ض التجارة اللكترونيَة على مدار ال‬
ُ ‫عرو‬
ْ َ‫الوصول إلى السلع من خلل‬

106) Which one of the following statements about purchasing online is


true?

a. Purchases are only processed during business hours.


b. Shipping of purchases is normally free.
c. The consumer rights of your country apply.
d. You are at risk from insecure payment methods.

‫ت حقيقيُة؟‬
ِ ‫أي واحد من البيانات التالية حول الشراء على النترن‬
.‫ت عمل‬ ِ ‫ت أثناء ساعا‬ ْ ‫· مشتريات وحيدة عالج‬
.‫جانية عادة‬ّ‫تم‬ ِ ‫· شحن المشتريا‬
.‫ك‬
َ ‫ك المستهل‬ِ ‫· تطبيق حقوق الشراء لبلِد‬
.‫ق الدفع الغير آمنِة‬ِ ‫ن طر‬ْ ‫· أنت في الخطِر ِم‬

107) Which one of the following statements about an organisation's


Information security policy is true?

a. Cover the licensing of software applications


b. Deals solely with data held on computers
c. Is concerned with the handling of confidential data
d. Applies to actions of the employer, not the employee
34
‫ت منظمِة صحيحةُ؟‬
ِ ‫ن معلوما‬ِ ‫أي واحد من البيانات التالية حول سياسِة أم‬
ِ ‫ت البرام‬
‫ج‬ ِ ‫· ترخيص تطبيقا‬
ِ ‫ت على الحاسبا‬
‫ت‬ ْ ‫حمل‬
َ ‫ت‬
ِ ‫ل فقط بالبيانا‬ُ ‫· َيتعام‬
‫ت السّرية‬
ِ ‫· ُمهتّمة بمعالجة البيانا‬
‫س المستخدَم‬َ ‫ َلي‬،‫ب العمل‬
ّ ‫لر‬ ِ ‫· ُيقّدم إلى أعما‬

108) Which one of the following statements about an organization’s


information security policy is true?

a. Applies to the employee, not the employer


b. Deals with the handling of confidential data
c. Deals only with data held on computers
d. Covers the licensing of operating system software

‫ت حقيقية منظمِةُ؟‬
ِ ‫ن معلوما‬
ِ ‫أي واحد من البيانات التالية حول سياسِة أم‬
‫س لصاحب العمل‬ َ ‫· ُيقّدم إلى المستخدِم و َلي‬
‫ت السّرية‬
ِ ‫ل مع معالجة البيانا‬ ُ ‫· َيتعام‬
ِ ‫ت على الحاسبا‬
‫ت‬ ْ ‫حمل‬
َ ‫ت‬ ِ ‫ل فقط بالبيانا‬
ُ ‫· َيتعام‬
‫ج نظاِم التشغيل‬
ِ ‫طي ترخيص برام‬ ّ ‫· َيغ‬

109) An Important purpose of data protection legislation Is to:

a. Improve the standards for electronic storage media.


b. prevent the illegal use of commercial software.
c. safeguard the privacy of individuals' personal data.
d. protect companies from industrial espionage.

: ‫ت لـ‬ِ ‫غرض مهم فى تشريِع حمايِة البيانا‬


.‫ن اللكترونيِة‬ ِ ‫سن المعاييَر لجهزِة إعلم الخز‬ ّ ‫· ُيح‬
.‫ج التجاريِة‬
ِ ‫ي للبرام‬ َ ‫ل الغير شرع‬ َ ‫· َيْمنُع الستعما‬
.‫ت الفراِد الشخصيِة‬ ِ ‫حمي سريَة بيانا‬ ْ ‫· َي‬
.‫ي‬
ِ ‫س الصناع‬ ِ ‫ن التجس‬ ْ ‫ت ِم‬
َ ‫حمي الشركا‬ ْ ‫· َي‬

110) Which two of the following statements about access rights are true?
35
a. Are intended to protect a company's intellectual property
b. Decide who can work in a building outside office hours
c. Determine which files individuals can read or change on a network
d. Are the same for all users on a single network
e. Depend on which computer you are using to access the network

‫ل حقيقية؟‬ ِ ‫ق الوصو‬ ِ ‫ت التاليِة حول حقو‬ ِ ‫ن البيانا‬ْ ‫ي إثنان ِم‬ ّ ‫َأ‬


‫حماية ملكية الفكرية لشركِة‬ ِ ·
‫ت العمل‬ ِ ‫سَتطيع الَعَمل في خارج ساعا‬ ْ ‫ن َي‬
ْ ‫· ُيقّرر َم‬
‫ن َيْقرأوا َأو َيتغّيروا على شبكة النترنت‬
ْ ‫ن َأ‬
ُ ‫ت الشخصية ُيْمِك‬ ِ ‫ي الملفا‬ ّ ‫· ُيقّرر َأ‬
ً‫· نفس المستعملون على الشبكة المحلية الواحدة‬
‫خول للشبكِة‬ ُ ‫· َيعتمُد على أى كمبيوتر أنت َتستعملُه فى الُد‬

111) Click to Indicate which two of the following statements about data
protection legislation are true .

a. Deals with industrial espionage between competing companies


b. Can result in litigation if personal data is not adequately protected
c. Means that personal data must be stored for a certain period of time
d. Ensures the laws about data security are the same in every country
e. Obliges organizations to protect confidential data within their control

. ‫ت صحيح‬
ِ ‫ت التاليِة حول تشريِع حمايِة البيانا‬
ِ ‫ن البيانا‬
ْ ‫ي إثنان ِم‬
ّ ‫َأ‬

ِ‫ي بين َتَناُفس الشركات‬ ِ ‫س الصناع‬ ِ ‫ل مع التجس‬ ُ ‫َيتعام‬ ·


‫حَم بشكل كافي‬
ْ ‫ت شخصيِة َلْم ُت‬ ِ ‫ن ُيؤّدي إلى المقاضاِة إذا بيانا‬ْ ‫ن َأ‬
ُ ‫ُيْمِك‬ ·
ِ ‫ن وق‬
‫ت‬ ْ ‫ن لفترة زمنية معينة ِم‬ َ ‫خَز‬ْ ‫ن ُت‬
ْ ‫ت الشخصيِة يجب أ‬ ِ ‫تعنى أن تلك البيانا‬ ·
‫ل بلد‬ ّ ‫ت نفس في ُك‬ ِ ‫ن البيانا‬
ِ ‫ن حول أم‬ َ ‫ن القواني‬ُ ‫ضم‬ْ ‫َي‬ ·
‫ت سّرية ضمن سيطرِتهم‬ ِ ‫حماية بيانا‬
ِ ‫تل‬َ ‫ُيلزُم المنظما‬ ·

112) Which one of the following statements about the use of e-commerce is true?

a. An Internet connection is optional fore-commerce.


b. Transactions can occur anywhere in the world.
36
c. Customers can only pay by emailing credit card details.
d. Customers give up the right to return unsatisfactory goods.

‫ي؟‬
ُ ‫ل التجارة اللكترونيِة حقيق‬
ِ ‫أي واحد من البيانات التالية حول إستعما‬

.‫ت تجارُة أماُم إختياريُة‬ ِ ‫إّتصال النترن‬ ·


.‫ث في أي مكان في العالم‬ َ ‫حد‬ ْ ‫ن َت‬
ْ ‫ن َأ‬
ُ ‫صفقات ُيْمِك‬ ·
.‫ل بطاقِة الئتمان‬
ِ ‫ن بإْرسال بالبريد اللكتروني تفاصي‬ َ ‫ن َيْدفعو‬
ْ ‫ن فقط َأ‬ ُ ‫زبائن ُيْمِك‬ ·
.‫ق العودة الغير مرضيَة‬ ّ ‫ن عن سلَع ح‬ ُ ‫َيتخّلى زبائ‬ ·

113) E-commerce is the term used to describe business that:


a) Uses computer to carry out its work
b) Is carried out using electronic funds transfer
c) Involves the import and export of electronic equipment
d) Buys or sells good and services online

114) Drag each of the statements about user IDs and passwords to the
relevant box

ID Password

Should be changed regularly Password


Must be unique on the network ID
Identities a specific user on a network ID
Not Confidential ID
Ensures that the person logging on is who they say they are Password

‫ن ُيغّير بإنتظام‬
ْ ‫ب َأ‬
ُ ‫ج‬ِ ‫َي‬
‫ن فريَد على الشبكِة‬َ ‫ن َيُكو‬
ْ ‫ب َأ‬
ُ ‫ج‬ِ ‫َي‬
‫هوّية المستعمل على الشبكة‬
‫س سّري‬ َ ‫َلي‬
‫جل على الذي َيدخلون بدون تسجيل‬ ّ ‫ص الذي ُيس‬
ُ ‫ن الشخ‬ ُ ‫ضم‬ ْ ‫َي‬

115) Which two of the following statements about password are true?
a) You should use the same password for everything

37
b) You should write down your password and keep it in a convenient
place
c) Password should contain both letters and number
d) Once you create a password, you can’t change it
e) A password should be know only to the user

116) A mobile phone which has been insured but not password protected
has been stolen. Which one of the following consequences may result?

a. Misuse of confidential numbers.


b. Meeting the cost of replacement.
c. Paying for calls made after the theft is reported.
d. Taking out new insurance on the replacement phone.

‫ج؟‬
ُ ‫ أي واحد من النتائج التالية َقْد َتْنت‬.‫ت‬
ْ ‫سِرق‬
ُ ‫س كلمَة السر‬ َ ‫الهاتف الجّوال الذي يكون ُأّمن لكن َلي‬
.‫ سوء استعمال العداِد السّرية‬.
.‫ل‬
ِ ‫ اجتماع كلفِة البدي‬.
.‫عْنهُا‬
َ ‫خَبرة‬
ْ ‫ت بعد السرقِة ُم‬ ْ ‫جعل‬ َ ‫ت‬ ِ ‫ َدْفع ثمن النداءا‬.
.‫ل‬
َ ‫ف البدي‬
ِ ‫ن الجديِد على هات‬ ِ ‫خذ التأمي‬
ْ ‫ َأ‬.

117) Which two of the following documents contain sensitive data and
need protection?
These items contain These items do not
sensitive data need protection.
Contact details for sales enquiries.
Research on new products.
Training materials.
Management accounts.

‫ساسة‬ّ‫تح‬َ ‫َتحتوي هذه المواِد بيانا‬ •


.‫ت ِبحاجٍة إلى حمايِة‬
ْ ‫هذه المواِد َليس‬ •

38
.‫ت‬
ِ ‫ت المبيعا‬ِ ‫تفاصيل اتصال لتحقيقا‬
.‫بحث على المنتجات الجديدِة‬
.‫تدريب المواِد‬
.‫حسابات إدارِة‬

118) Which one of the following statements about copyright is true?

a. The paper license that comes with software on CD transfers the


copyright to you.
b. You can make a backup CD of software bought for your own use.
c. Software purchased on the Web and copied to CD-ROM can be shared
with friends.
d. Copying text, images, audio, or video from disk is always illegal.

‫يمكن عمل نسخة احتياطية للمشترى لستعماله الخاص‬

119) Which one of the following statements about copyright is true?

a. You can use downloaded graphics in any way.


b. You are allowed to re-use text that you copy from the Web.
c. When you purchase software, the copyright transfers to you.
d. Audio files on the Internet are subject to copyright.

‫ق الطبع‬
ِ ‫ت خاضعة لحقو‬
ِ ‫الملفات السمعية على النترن‬

120) Which one of the following statements about copyright is true?

a. Publishing digital work on disk requires permission from the copyright


holder.
b. When you purchase software on CD, the copyright transfers to you.
c. Any material which is published on disk is subject to copyright.
d. You can reproduce graphics from the Web as CD-ROM clip-art.

. ‫ن الحامل لحقوق الطبع‬


ْ ‫ َيتطّلب رخصًة ِم‬diskِ ‫لًعلى الـ‬
ً ‫· لْنشُر عم‬
39
.‫ حقوق الطبع تنتقل إليك‬CD ‫· عندما َتشتري برامج على‬
.‫ق الطبع‬ِ ‫ص خاضعه لحقو‬ ِ ‫شورُة على القر‬ ُ ‫· الماّدة الَمْن‬
.ِ‫ب كفن القصاصات‬ِ ‫ن الوي‬
ْ ‫ت ِم‬
َ ‫ن ُتعيَد إنتاج الُرسوما‬
ْ ‫ن َأ‬
ُ ‫· أنت ُيْمِك‬

121) Which one of the following statements about copyright is true?

a. Text on a web page can be freely copied and re-used.


b. Graphics published on the Web are subject to copyright.
c. When you buy software, the copyright transfers to you.
d. It is legal to share any audio files on the Internet.

.‫خ بحرية ومستعملة ثانيًة‬ َ‫س‬


َ ‫ن ُتْن‬
ْ ‫ن َأ‬
ُ ‫ص فى صفحة ويب ُيْمِك‬ ّ ‫َن‬ ·
.‫ق الطبع‬
ِ ‫ت على الشبكة خاضعة لحقو‬ ْ ‫ُرسومات َنشر‬ ·
.‫ إنتقال الحقوق إليك‬، ‫عندما َتشتري برامجًا‬ ·
.‫ت‬
ِ ‫ي ملفات سمعية على النترن‬ ّ ‫ي للشِتراك في أ‬ ُ ‫هو قانون‬ ·

122) Which one of the following statements about copyright is true?

a. You give up your copyright to text that you publish on the Internet.
b. You can re-use downloaded graphics in anyway.
c. Scanned images are subject to copyright
d. When you purchase software, the copyright transfers- to you.

‫ق الطبع حقيقيُة ؟‬
ِ ‫أي واحد من البيانات التالية حول حقو‬

.‫ت‬
ِ ‫ص الذي َتْنشُر على النترن‬
ّ ‫ك إلى الَن‬
َ ‫ق طبع‬
َ ‫َتتخّلى عن حقو‬
.‫ت في أية حال‬
َ ‫ن َأنْ إعادة إستعماِل ُتحّمل الُرسوما‬
ُ ‫أنت ُيْمِك‬
‫ق الطبع‬ ِ ‫الصور المقروءة ضوئيًا خاضعة لحقو‬
.‫عندما َتشتري برامجًا ينتقل حقوق الطبع إليك‬

123) Which one of the following statements about copyright is true?

40
a. If you can copy material from a disk, you automatically gain the
copyright.
b. Copyright provides control over how other people make disk copies of
someone's work.
c. Graphics published on CD-ROM are not subject to any form of
copyright.
d. If you create a CD-ROM yourself, you own the copyright to anything
you put on it.

‫ق الطبع حقيقيُة؟‬
ِ ‫أي واحد من البيانات التالية حول حقو‬

.‫ق الطبع آليًا‬


َ ‫ب حقو‬ ُ ‫ َتْكس‬،‫ن قرص‬ ْ ‫خ ماّدة ِم‬
َ ‫ن َتْنس‬
ْ ‫ن َأ‬
ُ ‫إذا أنت ُيْمِك‬ ·
.‫ل شخص ما‬ ِ ‫ص من عم‬
ِ ‫ن نسخ قر‬ َ ‫ن َيْعملو‬
ِ ‫س آخري‬ ِ ‫ق طبع سيطرًة على هكذا نا‬ َ ‫ُتزّود حقو‬ ·
.‫ق الطبع‬ِ ‫ي شكل حقو‬ ّ ‫ت خاضع ل‬ ْ ‫ج َليس‬ِ ‫ت على قرص الذاكرة المدم‬ ْ ‫ُرسومات َنشر‬ ·
.‫ت عليه‬
َ ‫ئ َوضع‬ِ ‫يش‬ّ ‫ق الطبع إلى أ‬ َ ‫ك حقو‬ ُ ‫ َتمتل‬، ‫ق قرص ذاكرة مدمج بنفسك‬ ُ ‫خل‬
ْ ‫إذا َت‬ ·

124) For which one of the following tasks In hospitals and healthcare would
large-scale computer applications be most appropriate?

a. Running life support systems


b. Diagnosing patients
c. Comforting patients
d. Guiding support groups

‫ن أكثر‬
ُ ‫ق َتُكو‬
ِ ‫ت الكمبيوتر واسعة النطا‬
ُ ‫لي واحد من المهام التالية في المستشفيات والرعاية الصحيِة تطبيقا‬
‫الملئمة ؟‬

‫أجهزة إنعاش جارية‬ ·


‫َتشخيص مرضى‬ ·
‫َتْرييح مرضى‬ ·
‫ت دعم‬
ِ ‫َتوجيه مجموعا‬ ·

125) For which two of the following tasks in hospitals and healthcare would
large-scale computer applications be most appropriate?
41
a. Establishing bed availability
b. Providing information to relatives
c. Informing a patient of a diagnosis
d. Treating mental health issues
e. Tracking patient medical history

‫ن أكثر‬
ُ ‫ق َتُكو‬
ِ ‫ت الكمبيوتِر واسعة النطا‬
ُ ‫ن المهاِم التاليِة في المستشفيات والرعاية الصحيِة تطبيقا‬
ْ ‫ي إثنان ِم‬
ّ ‫ل‬
َ
‫الملئمِة؟‬

ِ‫َتأسيس توفِر سرير‬ ·


‫ت إلى القرباِء‬ ِ ‫َتزويد معلوما‬ ·
‫ُيعلُم مريض تشخيص‬ ·
‫ج قضايا الصحِة العقليِة‬ ُ ‫ُيعال‬ ·
ِ ‫خ طب‬
‫ي‬ ِ ‫تتبع تأري‬ ·

126) For which two of the following tasks in hospitals and healthcare
would large-scale computer applications be more appropriate?

a. Bereavement counseling.
b. Tracking treatment costs.
c. Informing a patient of a diagnosis.
d. Providing a medical database.
e. Treating mental health issues.

‫ن أكثر‬
ُ ‫ق َتُكو‬
ِ ‫ب واسعة النطا‬
ِ ‫ت حاسو‬
ُ ‫ن المهاِم التاليِة في المستشفيات والرعاية الصحيِة تطبيقا‬
ْ ‫ي إثنان ِم‬
ّ ‫َأ‬
‫ملئمة؟‬

. ‫إستشارة فى ماساة او مصيبة‬ ·


.‫ف معالجِة‬
ِ ‫تتبع كل‬ ·
.‫ُيعلُم المريض بالتشخيص‬ ·
.‫ُيزّود قاعدة بيانات طبية‬ ·
.‫ج قضايا الصحِة العقليِة‬ ُ ‫ُيعال‬ ·

42
43

You might also like