مراجعة النخبة ict صف سادس الترم الاول من اكاديمية تراست
مراجعة النخبة ict صف سادس الترم الاول من اكاديمية تراست
G6 First Term
ICT
Final Revision
Contents :
Theme1 : Role of ICT in our lives .
L2 : Computer Network Devices
L3 : Futuristic Technology
L4 : Evaluating Cutting –Edge Technology
L5 : Digital Research skills
L7 : Operating systems
L8 : Website Design
Theme2 : Digital safety and security precautions
L2 : How to Deal with Electronic Games
L3 : Protecting yourself From Digital Theft
L4 : Cyber Security
L5 : Copyright and Electronic Financial Trading
L6 : Cloud Storage of Files
L7 : Cloud Computing Applications
Final revision
Model exam1
Model exam1
2
Theme1
L2 : Computer Network Devices
Networks الشبكات
They are groups of devices or things that are connected to each
other for a common purpose .
Network Devices
1) MODEM بيعمل وظفتين مهمين جدًا
3
Types of network
Wired Networks Wireless Networks
Use: Use:
Physical wiring ( cables) that Connect devices without
play in to holes called " wring through ( wireless ,
Ports" Wi – Fi )
L3 : Futuristic Technology
Intelligence (AI):
Cutting – Edge وكمانFuturistic • إيه اللي بنسميهم
1- Augmented reality ( AR )
2- Virtual reality ( VR )
3- Artificial Intelligence (AI)
Cutting –Edge← يعني ايه
The latest and most advanced version of a service or product.
أي اصدار جديد من أي جهاز أو أي خدمة
طيب أي أهميتهم
Importance of Cutting technology :
- It improves lives.
- It improves inclusion of people of determination.
4
Smart gloves : deaf خد بالك الجالفزبيساعد
blind people يعني لو قالكpeople
هتبقي اإلجابة خاطئة
: اللي هي
Empower deaf people to translate their signs in real time to spoken or text
output.
Cutting –Edge Assistive technology أمثلة تانية على
1- Screen magnification software.
2- Hearing a dis.
3- Speech into text and text to speech programs.
خليك فاكر
Assistive technology helpspeople of determination.
Combines with
by
shows
5
EX
: student can see cube , cylinder onto flat surfaces or see elephant or lion in the
classroom.
AI أما بقا ال
: لما تالقي في السؤال أي وظيفة لإلنسان زي
- Thinking
- Writing
- Learning نختار على طول
- Deduce
- Complex task as human AI
- They describe how people use and interact with a product and how
evaluate their experiences.
- is often divided into different areas and can be positive or negative.
Meeting Needs
1- Key word.
2- Phrases
7
Databases
Databases: They are collections of information that are typically stored
a computer system and can be accessed, for free, through a school.
A database is a good place toSearch for information frommagazines and
newspapers.
EKB is an example of a general database that covers many subjects.
The search results on EKB is credible and accurate.
Library catalog: It is a database that includes all the items owned by
alibrary.
L7 : Operating systems
APPs برامج
Operating systems
نظام التشغيل
Functions:
1) It runs a computer's software and hardware.
2) It allows a user to communicate with the computer easily.
3) It includes accessibility features such as screen readers and
magnifiers.
( لكل جهاز متطورo.s) ) يعني نفهم من كدة إن في نظام تشغيل4
8
Mobile devices
Computer O.S
Closed - Source
9
- It's used for building robot applications.
2) Self-driving cars OS:
Ex :AppleCarplay and Windows Automotive).
L8 : Website Design
HTML
يعني لو عرفت لغة منهم سهلة تتعلم الباقيين النهم شبه بعض
10
هكتبه ازاي؟Tag طيب أنا عايزة أعرف لما آجي أكتب الـ
Subheading <h2>Subheading</h2>
؟h2ولما تكتب عنوان فقرة يبقى
11
Bold <strong>Bold text</strong>
ولوعايزخطك تقيل يبقى
ده مكتوب كمثال Tag طبعًا أنت ذكي مش محتاجة أوضح لك ان الكالم اللي في نص الـ
دهمايتحفظش أنا كتباه كمثال <p>This is a paragraph</p> يعني
3) Security Dangers
12
1- Physical dangers: Eyes strain, back problems, and headaches Sleep
cycle, weight Gain.
2- Psychological dangers: Anxiety, depression, aggression, Prevent
from thinking rationally and negatively affect your relationship with
family and friends.
3- Security dangers :
• Personal information exposure: Sharing details can lead to
privacy breaches.
• Cyberbullying: It's common in large gaming communities.
• Hackers and viruses: Threats to security.
aggressive تختارعلطولviolenceحاجة تانية مش حتقولهالك غيرمس أمل اما تالقی کلمه
يعني االلعاب الي فيها عنف بتخلي الالعب عدواني
نقطة مهمة جددددددا
. يعني اجهاد العين فقطEye مبتجيش غيرللstrain كلمة
✗Leg, hand للStrain مفيش حاجة اسمها
يعني دورة النومsleep مفيش غيرcycle ولما يقولك
13
L3 : Protecting Yourself From Digital Theft
جملة تمهيدية بس بتيجي في األسئلة محدش هيقولهالك غير مس أمل
14
Egypt has introduced the Data Protection low to protect its citizens.
.خد بالك بتحمي الشركات واألفراد مش الشركات بس
Data protection low
Companies individuals
الجملة غااااية في األهمية احفظها زي If they've victims of data
ما هي وزي ما بيجي فيها السؤال theft :
هتعرف تجاوبه 1-individuals must report.
Data protection low requires 2- individuals must report the
Companies to use strict family and friends they
security stands to protect communicate with online
their data
3 احناstrict security stands
كلمات مبنتفرقش لو ملقتناش جنب
بعض هتالقي واحد فينا في الـ
choose
→ If they've victims of data theft:
1- Companies must report immediately.
2- Companies must report its customers.
L4 : Cyber Security
Cyber security: is the protection of systems, networks, devices,
and data from electronic attacks.
طبعاCyber security protect your devices onlyيعني لوجالك سؤال يقولك
كمانnetwork, system االجابة حتكون✗بيحمي الشبكات
Types of Cyber Security Threats:
1) Malware
- This is the greatest cyber security threat.
- Scare ware ( type Malware)
15
.واالتنين ملهمش غير وظيفة واحدة فقط
Scare ware تقولك في فيرس أو مشكلة في جهازك يعني بيخضك
Pretends to be virus alert or you have a problem in your
device.
unsecured Wi-Fi networks can expose you to Malware
threats. خد بالك
2) Spoofing : وش100 ده بقا بـ
←ممكن يقولك
1- Fake domain
2- Fake business
3- Fake e-mail
4- Person you known ( impersonation )
Dealing with Threats:
- Stay calm but act swiftly; inform contacts immediately about the
Threats.
- Use antivirus to scan and remove viruses.
- Update security settings and change all passwords.
16
Notes
خد بااااااالك
Works in data libraries such as the Egyptian Knowledge Bank (EKB) is
already approved for use.
Egypt considers works to be in the public domain if the creator has been
deceased for at least 50 years. No creator permission is required
Stock Exchange and E-trading
A Stock Exchange:
It is a market where buyers and sellers deal in units of company
stocks.
These stocks are called shares. مهم جدًا
: على فكرة
The Egyptian stock exchange allows citizens to invest in any
market sector, such as:
- Food - Clothing - Petroleum
Smart investor should before invest :
* Research: Smart investors will research multiple companies before
deciding which one to invest in.
* Market Analysis: They analyze markets to see which companies
stocks go up or down.
* Evaluate: They also check the products or services offered to see
they're a good fit for their interests and goals.
Traditional vs. Electronic Trading
>> In settings, an investor will have a broker.
A broker:
It's a person who handles the buying and selling of shares.
broker يبقي مفيش غيره هو الperson تريكات مس أمل لما تالقي كلمة
ايه ياترى الميزات؟
17
اللي جاي مهم ال يخلو امتحان من واحدة فيهم
Electronic Financial Trading (E-Trading)
- E-trading has made the process of buying and selling shares more
efficient.
- E-trading provides the investor with more authority.
- With the spread of the internet, electronic trading platforms sare
now common places.
- E-trading allows the investor to:
1- Make trades on their own through websites or applications.
2- Use a broker if they want
3- Allow more independence and user-friendly options such as robo-
advisors.
Robo-advisors:
They're online applications that provide financialguidance and
services.
يبقى اإلجابةguidance وكلمةapplication تريكات مس أمل لما تالقي كلمة
. الروبوت بيديني دليل امشي عليهRobo-advisorsعلطول
18
- Cloud computing enables users to access files and data
easily and conveniently from anywhere and at any time.
الحوسبة السحابية تمكن المستخدمين من الوصول إلى الملفات والبيانات. -
.بسهولة ويسر من أي مكان وفي أي وقت
Examples of Cloud Computing:
Microsoft 365 Google
With its application One With its application
Drive Google Drive
.ركز مين تبع مين عشان بيلخبطك بينهم في السؤال
Advantages:
- It frees up device space.
- Multi-device access: You can access your files from various
devices.
- Backup: It provides a backup for your files.
- Security: It offers password protection and data
encryption.
- Data encryption: It converts data into a code to prevent
unauthorized access.
Disadvantages:
- Internet dependency: It requires an internet connection.
- Fee-based service: You should pay a fee to store files.
- Data breach risk: Your information may be compromised.
- Data breach: It occurs when unauthorized parties gain
access to data and information.
free يعني رسوم (بفلوس) مشfee خد بالك وركز كلمة
19
Data Encryption:
It converts data into a code to prevent unauthorized user
access.
Data Breach:
It occurs when unauthorized parties gain access to
confidential data and information.
. تعريفات مهمة4 خلي بالك الدرس فيه
connect users who are not on LAN to access
Remote servers and manage data, files, and applications via
the internet.
occurs when unauthorized parties gain
Data breach access to confidential data.
converts data into a code to prevent
Data encryption unauthorized user access.
Cloud storage قلناه في األول
خد باااالك
L7 : Cloud
Having a document Computing
management Applications
system allows you to organize
your documents so they are quick and easy to find.
→Microsoft 365 and Google Workspace:
- They have popular cloud computing software suites.
- They include productivity apps and storage.
→ Microsoft 365:
- It includes Microsoft Teams, Word, Excel, PowerPoint, and
Outlook.
1- Microsoft Teams: For communication and virtual meetings.
2- Word: For writing documents.
20
• When you select Microsoft Word, it opens a new
blank document.
• It allows you to draft ideas, a story, or an assignment.
3- Excel: For creating tables and graphs.
4- PowerPoint: For creating presentations.
5- Outlook: An email platform.
6- OneDrive: A storage and sharing application.
One Drive:
- It allows you to store, share, and access files from any
device.
- It's user-friendly.
- To upload files or folders:
• Sign in to Microsoft Office in Chrome.
• Select One Drive.
• Choose Upload > Files or Upload > Folder.
• Select desired files or folder.
• Click Open or Select Folder.
- To save a file:
• Select File > Save a Copy > One Drive
Personal/Company.
• Enter a file name and click Save.
- Files appear in One Drive when you open the Office app.
21
1) Choose the correct answer:
1- Adding ……… to images helps people with visual impairments.
a. borders b. colors c. alt-text d. animations
2- One of the following tags is false …………
a. <i> </i> b. <a> </a>
c. </b> </b> d. <h1> </h1>
3- Programming languages are usually ………......
a. closed-source b. open-source
c. proprietary d. expensive
4- Instructions to a computer are given in the form of………...
a. Word file b. code c. video d. audio
5- ……… can promote critical and creative thinking.
a. Violence b. Electronic games
c. Information d. Danger
6- Playing electronic games too much can affect your ……… cycle.
a. sleep b. digestive c. eating d. exercise
7- Some games promote violence, so this can make some people ………..
a. calm b. lazy c. stupid d. aggressive
8- One of the physical dangers of electronic games is.…
a. feeling lonely b. headaches
c. stealing data d. cyber bullying
9- Electronic games may make you anxious and depressed because ………
a. you feel lonely in the real world b. you may being bullied online
c. both a and b d. none of them
10- Electronic games can strain your ……… and cause headache
a. Hand b. eyes c. legs d. face
11- Large gaming communities are filled with ……..
a. cyberbullies b. doctors c. teachers d. none of the
12- Good electronic games help ………
a. enhance creative thinking b. disorganization
c. non-cooperation d. individual work
13- Hackers can steal your information and ………. can easily spread.
a. videos b. books c. security d. viruses
14- Real life activities, such as ……… should not be replaced with
electronic games.
a. good sleep b. bullies
c. strangers d. online search
22
15- The impact on your sleep cycle is one of the ……… of electron
games.
a. security dangers b. physical danger
c. psychological dangers d. all of them
16- One of the advantages of online multiplayer games that friends share is
that they are ………
a. entertaining b. not effective in team work
c. traditional d. boring
17- You should ……… that your parents set to prevent unhealthy gaming
habits.
a. pirates b. leak information
c. accept limits d. share
18- One of the dangers of electronic games is ……… because you may not
be exercising.
a. hacking b. gaining weight
c. bullying d. violence
19- You should not share ……… because others can access you address,
email, and phone number.
a. games b. news c. personal information. d. jokes
20- It is preferable for passwords to contain at least ……… characters.
a. five b. eight c. three d. four
21- MFA requires at least ……… ways of identifying yourself.
a. two b. three c. eight d. four
22- The authentication type that scans your finger as a way of confirming
it's you, is ……….
a. face recognition b. MFA
c. fingerprint d. self-access
23- Data protection law requires companies to use strict ……… to protect
their data
a. procedures b. steps
c. security stands d. browsers
24- ……… Requires companies to use strict security stands to protect their
data.
a. Full Encryption b. Voice recognition
c. Data Protection Law d. I-Stem platform
25- Which of the following is NOT typically used in MFA?
a. Passwords b. PINS
c. Security codes d. Voice recognition
23
26- The software that scans your face using your device's camera is
………
a. Fingerprint b. Password
c. Multi-Factor d. Facial Recognition
27- ……… protects your information so only you can access it on your
device.
a. Decryption b. Compression
c. Encryption d. Firewall
28- Fingerprint authentication usually scans your ……
a. eye b. face c. finger (thumb) d. palm
29- Full encryption protects ………
a. only passwords b. only files
c. all information d. only footprint
30- What must companies do if they're victims of data theft?
a. Report immediately
b. Inform customers immediately
c. Wait for a week
d. Both a and b
31- Use ……… software to do a sweep of your computer and remove any
viruses.
a. passwords b. antivirus c. browsers d. scareware
32- Verify the information you find to make sure it is………
a. accurate b. false c. untrusted d. biased
33- ……… is defined as protecting systems, networks, devices, and data
from electronic attacks.
a. Cyber security b. Digital footprint
c. Dangerous electronic games d. Piracy
34- Verify that the websites that you frequent are ……..
a. real b. safe
c. age appropriate d. all of them
35- If you are exposed to cyber security threat, you should ……… it.
a. ignore b. accept c. report d. share
36- A fake domain pretending to be a business or an email account that has
he name of a trusted service is an example of …………
a. maleware b. spoofing c. antivirus d. scareware
24
37- ……… are types of cyber threats.
a. Malware b. Spoofing
c. Both of them d. None of them
38- ………… is a type of malware that pretends to be a virus alert.
a. Virus b. Firewall c. Sweepstake d. Scareware
39- It is preferable to change your passwords every ……… month.
a. eight b. six c. three d. none of them
40- ………… are cyber criminals who pretend to be a business, or known
person to trick you.
a. Male ware b. Hackers
c. Spoofing d. Scareware
41- To deal with cyber security threats, stay calm, but take a ………
action.
a. slow b. swift c. calm d. delayed
42- ……… is the greatest cyber security threat.
a. Malware b. Antivirus c. Firewall d. Phishing
43- Using ……… is/are important for cyber security.
a. antivirus b. strong passwords
c. safe web browsers d. all of them
44- After a threat, you should update ………
a. calendar b. apps
c. security settings d. web browsers
45- ……… is someone's invention, creation, or idea that is protected by
law from being copied by someone else, such as an individual or a
business.
a. Intellectual property(copyright) b. Electronic right
c. Electronic trading d. Public domain
46- Books whose authors have been deceased for 50 years are ………
a. copyrighted b. in public domain
c. creative commons d. none of them
47- ……… refers to works for which the creator has granted permission
for sharing.
a. Digital footprint b. Impersonate
c. Cyber security d. Creative Commons
48- …………… is a market where buyers and sellers deal in units of
company stocks.
a. Online shopping b. Stock exchange
c. Supermarket d. Copyright
25
49- ………… allow(s) investors to make trades on their own through
websites or applications.
a. Brokers b. E-trading
c. Robo-advisors d. None of them
50- ………… is an online application that provides inquiries, guidance,
and financial services to customers.
a. Stock broker b. Robo-advisor
c. Stock exchange d. Financial trading
51- In stock exchange, stocks are called ………
a. money b. shares c. e-commerce d. bonds
52- ……… is a person who handles the buying and selling of shares.
a. A broker b. A robo-advisor
c. A scanner d. IAN
53- ………… has made the process of buying and selling shares more
efficient.
a. E-learning b. E-trading
c. Stock exchange d. Robo-advisor
54- Copyright includes written and ……… materials.
a. visual b. audio c. video d. all of them
55- In traditional settings, a stock investor will have a/an ………..
a. broker b. bank teller c. instructor d. hacker
56- Smart investors ……… the company before investing in it.
a. research b. buy c. sell d. invest
57- .......... is the on-demand storage and access of data and
programs via remote servers on the internet.
a) Cloud computing b) Hard disk drive
c) copyright d) Desktop software
58- One of the disadvantages of using cloud computing is ……...
a) Improving storage capacity on devices.
b) The ability to access your files from multiple devices
c) The possibility of data breaches.
d) Ability to share files with authorized users.
59- Internet safety precautions
a) Share your personal information on the Internet.
b) Use secure Internet browsers.
c) Communicate with people you don't know.
d) Use weak passwords.
26
60- ……… is doing a complex task that simulate the performance
and thinking of human.
a) Artificial intelligence b) Switches
c) Digital footprint d) Wired network
61- The wireless networks are connected using ………
a) Ports b) Wi-Fi
c) Switches d) Modem
62- ........ is used to convert signal from ISP to digital signal.
a) Modem b) Ports
c) Switches d) Wi-Fi
63- .......... is a technology that help imitate the sound of an actual
human being
a) Artificial intelligence b) Speaker
c) Bluetooth d) Assistive technology
64- The cables and wires in wired networks are plugged into holes
are called..........
a) Ports b) Wi-Fi
c) Switches d) Modem
65- …...... help in sending data to a specific device via network
easily.
a) Switches b) Ports
c) Mouse d) Wi-Fi
66- ……… is used as a 3-D environment that allows user to interact
as if it a reality
a) Virtual reality b) Switches
c) Digital footprint d) Assistive technology
67- ……… is a technology used for unlock your phone using facial
recognition.
a) Assistive technology b) Artificial intelligence
c) Virtual reality d) Switches
27
68- You can immerse to an ancient historical site and thousand
years ago, using ………
a) Virtual reality b) Modem
c) Bluetooth d) Router
69-.......... is a technology that combine real world with a virtual
world
a) Router b) Augmented reality
c) Bluetooth d) Digital fingerprint
70- …….. is a technology that helps to make interactive and
memorable learning.
a) Digital footprint b) Switches
c) Modem d) Augmented reality
71- You can wear a headset to deal with a technology called
............
a) Virtual reality b) Digital footprint
c) Piracy d) Scanner
72- You can see atoms and insects are bigger than you by using
......... technology.
a) Virtual reality b) Switches
c) Modem d) Router
73- ……... is a technology that improve the life of people of
determinations.
a) Assistive technology b) Old technology
c) Traditional technology d) Complex technology
74- ......... is the last and most advanced version of products or
services
a) Cutting-edge technology b) Old technology
c) Past technology d) Traditional technology
75- ……… helps people with visual impaired (poor vision) to read
a) Scanning and reading b) Prostatic legs
c) Printer d) Taking picture
28
76- ......... is a technology that helps people of determinations to
enlargement (zoom) screen, hearing aids, and convert speech to
text and text to speech.
a) Traditional technology b) Assistive technology
c) Past technology d) Piracy
77- ……… helps in instant translate of the signs of deaf people
a) Screen enlargement (zoom) software
b) Ring bell ball
c) Prostatic legs d) Smart gloves
78- ......... is from the elements to evaluate a good product
a) High cost
b) Bad manufacturing
c) Ability to find solution (findable)
d) Manufacturing country
79- ……… is the important goal of assistive technology.
a) Difficult usability
b) Improve someone's independence
c- Not useful to others
d- Difficult accessibility
80- ……… is from the points to be considered when buying a good
product.
a) Usability (usable) b) Difficult usability
c) Manufacturing country d) No need to it
81- .......... are group of information usually stored inside a computer
system.
a) Printed books b) Databases
c) Search engines d) Digital search tools
82- ......... is a database that contain all the sources and items
owned by a library.
a) Library catalog b) Internet
c) Paint program d) Search engine
29
83- .......... is an operating system, and it's open-source program to
build robot applications
a) Microsoft windows
b) Robot operating system (ROS)
c) Android
d) Apple iOS
84- The programmers are using ......... language to create
webpages.
a) Automative b) MacOS
c) HTML d) Apple iOS
85.......... is the standard programming language used to create a
webpage
a) Microsoft windows b) Word
c) Android d) HTML
86-……… is the tag that used to create a paragraph
a) <p> b) <h1> c) <i> d) <strong>
87-Internet safety precautions
a) Share your personal information on the Internet.
b) Use secure Internet browsers.
c) Communicate with people you don't know.
d) Use weak passwords.
88-…...... includes written, visual, audio, video, and materials from
the Internet.
a) Malware. b) Electronic financial trading.
c) Copyright d) Programming languages
89-Microsoft provides a range of productivity applications, such as
………
a) HTML b) Microsoft Teams
c) Internet d) Viruses
90-The .................... platform allows you to store and share your
files.
a) Calculator b) Paint
c) Help d) OneDrive
30
91-……… is/are a group of devices or things that are connected to
each other for a common purpose.
a. Devices b. Networks
c. Routers d. Software
92-……… is/are the device(s) that can be connected to internet.
a. Desktop computer b. Laptop computer
c. All of them d. None of them
93-……… is/are computer applications that perform complex tasks
that simulate the thinking and performance of humans.
a. Artificial intelligence b. Holograms
c. Networks d. Switches
94-……… networks connect devices using Wi-Fi.
a. Wired b. Wireless
c. Software d. Both a and b
95-Through ……… you can transfer data with wires and cables.
a. wireless networks b. Wi-Fi
c. wired networks d. email
96-……… is a device that connects a local area network (LAN) to
the internet.
a. Artificial intelligence b. A modem
c. A server d. A switch
97-The modem converts the signals from the ……… into a digital
signal.
a. device b. LAN c. ISP d. Wi-Fi
98-……… technology is considered as the latest and most advance
version of services or products.
a. Cutting-edge b. Assistive
c. Past d. Traditional
99-……… in user experience means the company and its produce
are trustworthy.
a. Accessible b. Credible
c. Desirable d. Findable
100-……… describe(s) how to use the product and interact with it.
a. Futuristic technology b. User experiences
c. VR d. Al
31
101-Artificial intelligence, augmented reality, and virtual reality are
examples of ……… technology.
a. assistive b. cutting-edge
c. outdated d. simple
102-Evaluating new technologies helps society make better
decisions about their ……… of such technologies.
a. cost b. color
d. popularity c. use and development
103-……… is a database which includes all the items owned by a
library.
a. The EKB b. A search engine
c. A library catalog d. A keyword
104-You can search for information from magazines and
newspapers throw ………
a. search engines b. databases
c. Google Chrome d. smart phones
105-When you search online, make sure the result you get is
………
a. credible b. accurate
c. biased d. both a and b
106-……… is an open-source operating system for mobile devices.
a. Android b. iOS
c. macOS d. Windows
107-……… is a mobile operating system.
a. ROS b. iOS c. Linux d. macOS
108-There are many operating systems for computers, such as
Windows and ………
a. iOS b. Android c. ROS d. macOS
109-……… is a closed-source operating system for iPhone and
iPad.
a. Android b. Apple iOS c. Windows d. macOS
110-Programming languages have evolved from ……… to human-
like languages.
a. complex b. binary
c. pictorial d. none of them
111-A/An …….. gives commands to the computer in the form of codes that
can be used to create animation.
a. assistive technology b. programming language
c. database d. digital footprint
32
112-HTML stands for ………
a. High Tech Markup Language
b. Hyper Text Markup Language
c. Human Text Machine Language
d. Hybrid Text Markup Language
113-HTML is ……… with all the major web browsers.
a. compatible b. incompatible
c. irrelevant d. unnecessary
114-The ……… is the software that manages a computer's
functions, such as memory, drives, and printers.
a. programming language b. operating system
c. input unit d. email
115-Most computers come ……… with an operating system.
a. without b. pre-loaded
c. damaged d. uninstalled
116-……… is open-source software used for building robot
applications.
a. Windows b. Microsoft Word
c. ROS d. None of them
117-……… software means that the code can't be seen or changed
by the public.
a. Open-source b. Closed-source
c. Both of them d. None of them
118-........ runs on most computers worldwide.
a. Android b. macOS c. Windows d. iOS
119-……… is an operating system for Apple computers.
a. Windows b. macOS c. iOS d. ROS
120-The most popular mobile OS is/are ………
a. Android b. Apple iOS c. macOS d. both a and b
121-The programming code of ............ can be changed by anyone.
a. iOS b. Windows c. macOS d. Android
122-A ……… is used when copying, pasting, or cutting information.
a. digital editing tool b. QR code
c. hyperlink d. drawing tool
123-Search engines help people to search internet websites based
on ……..
a. keywords b. phrases
c. a and b d. none of them
33
124-You can search for some books in the school library using
………
a. databases b. an email
c. a printer d. user experience
34
134-VR Can make ……… appear larger, so you can study them
closely.
a. buildings b. planets
c. insects and atoms d. mountains
135-Al learns by ……… available examples.
a. analyzing b. storing c. saving d. ignoring
136-……… predicts the word you will write from words you have
written previously.
a. VR b. AR c. Al d. IR
137-……… can help disabled individuals make phone calls using
voice commands.
a. Virtual assistant b. VR headsets
c. AR glasses d. Smartwatches
138-……… feel(s) futuristic, but they are already being used in
everyday life.
a. Virtual reality (VR) b. Augmented reality (AR)
c. Artificial intelligence (Al) d. All of them
139-……… combines the real world with a virtual world by adding
images using computers.
a. Virtual reality b. Augmented reality
c. Assistive technology d. Artificial intelligence
140-……… is a virtual 3-D environment that allows users to explore
and interact with the surroundings, as if it were reality.
a. Virtual reality b. Artificial intelligence
c. Assistive technology d. Augmented reality
141-The ability of the computer to think, learn, and deduce is
………
a. virtual reality (VR) b. augmented reality (AR)
c. artificial intelligence (Al) d. none of them
142-Visually impaired people can use ……… to see their family
members up close.
a. scanners b. augmented reality
c. braille d. transformers
143-To experience virtual reality, users often wear ………
a. 3D glasses b. smart gloves
c. AR headsets d. VR headsets
35
144-Augmented reality can be done through a ………
a. tablet b. computer
c. hardware d. printer
145-Cables and wires in wired networks are plugged into holes
called ………
a. ports b. Wi-Fi c. switches d. modems
1. Playing too often can affect your sleep cycle. Which hinders ( )
your ability to sleep.
2. Electronic games can strain your hand. ( )
3. Excessive electronic gaming can lead to headaches. ( )
4. It is recommended to play games and chat with people you ( )
don't know.
5. Multiplayer electronic games in particular can put your ( )
security at risk.
6. Ignore the limits that your parents set to prevent unhealthy ( )
gaming habits.
7. Use a webcam to limit the dangers of electronic games. ( )
8. Electronic games can prevent some players from thinking ( )
rationally.
9. When you face dangers online, you should solve them ( )
yourself.
10. Electronic gaming can have a positive impact on your ( )
39
relationships with others.
11. Care must be taken to not replace real-life activities with ( )
electronic games.
12. Encryption allows anyone to access your information on ( )
your device.
13. Data protection is important for only individuals. ( )
14. The facial recognition feature allows only your face to ( )
unlock your device.
15. Fingerprint authentication is a type of authentication ( )
confirming it's you.
16. Scareware and impersonation are considered types of cyber ( )
threats.
17. Spoofing is the greatest cyber security threat. ( )
18. Scareware tells you to click on the link to remove it, but the ( )
link is a virus.
19. Unsecured Wi-Fi can expose you to malware threats. ( )
20. Malware means that cyber criminals pretend to be a ( )
business.
21. Scareware is a type of malware that pretends to be a virus ( )
alert.
22. You can limit the dangers you are exposed to by only ( )
playing games and chatting with people you don't know and
don't trust.
23. If your account has been hacked, it is preferable to change ( )
the password of this account only.
24. Materials in the Egyptian Knowledge Bank (EKB) need ( )
permission for use.
25. Creative Commons refers to works that the creator has ( )
40
granted permission to share.
26. No creator permission is required if the creator has been ( )
deceased for at least 50 years.
27. Robo-advisors are human financial experts. ( )
28. Electronic financial trading hinders the speed of performing ( )
investment activities over the internet.
29. E-trading allows more independence for investors. ( )
30. Investors should check the products or services offered by a ( )
company before investing.
31. The internet helps electronic trading platforms become ( )
common places.
32. Electronic trading platforms are rare in modern markets. ( )
42
Model (1)
1) Choose the correct answer:
1- ……………. app is used to browse mailing lists.
a- Microsoft Teams. b- Microsoft Word
c- Outlook d- One Drive
2- Electronic games can strain your …………… and cause
headaches.
a- hands b- eyes c- legs d- face
3- the HTML tag <P> ………</P> refers to …………
a- subheading b- create a paragraph
c- largest heading d- create a link
4- ………….. is open – source software used for building robot
application.
a- iOS b- ROS c- MFA d- Isp
5- A network that connect without wiring is named …………
a- Physical wiring b- wireless
c- port d- cable
6- The storage application in Microsoft 365 is named ………….
a- One Drive b- Word
c- Excel d- power point
7- The physical dangers of playing games causes ………….
a- depression b- back problems
c- aggressive d- build online
43
(2) Put (✔) or (✕):
1- You can share personal information online. ( )
2- Switches send data to a specific device over a network, which
makes connection easier and faster. ( )
3- Copyright doesn't include web material. ( )
4- Author and journal title, can be used to widen a search range.
( )
5- Android is an open – source operating system. ( )
6- Remote server connects users who are not on LAN to access
and manage data via the internet. ( )
7- Cloud storage services are always free. ( )
8- Virtual reality is a virtual 3 – D environment that allows users to
explore and interact with their surroundings, as if it were reality.
( )
44
Model (2)
1) Choose the correct answer:
1- The most popular mobile OS are ………….
a- Android b- Apple
c- both of them d- none of them
2- …………… is one of cloud computing application.
a- One Drive b- one
c- Drive d- All of them
3- …………….. convert data into a code to prevent unauthorized
user access.
a- copy b- past
c- data encryption d- data brech
4- ………………….. is a person who handles the buying and selling
of shares.
a- A broker b- LAN
c- A scanner d- A programmer
5- programmer use Hyper Text Markup language ( HTML ) to
create…………………………..
a- web pages b- modify
c- source d- slide show
6- …………………… is a data base which includes all the items
owned by a library.
a- library b- A library catalog
c- key words d- search engine
45
Complete the missing parts using the words between the brackets:
(Facial Recognition - HTML- Malware - Assistive Technology -
Modem)
1- ………………. is the greatest cyber security threat.
2- ………………. converts the signal from the (ISP) into a digital
signal.
3- ……………….. is abbreviation of Hyper Text Markup
Language.
4- ………………. software will scan your face using your device's
camera.
5- ………………. helps people of determination, such as hearing
aids.
46
47
1) Choose the correct answer:
48
intelligence
64) a) Artificial 65) a) Ports 66) a) Switches
intelligence
67) a) Virtual reality 68) b) Artificial 69) a) Virtual reality
intelligence
70) b) Augmented 71) d) Augmented 72) a) Virtual reality
reality reality
73) a) Virtual reality 74) a) Assistive 75) a) Cutting-edge
technology technology
49
112) b. programming 113) b. Hyper Text 114) a. compatible
language Markup Language
115) b. operating 116) b. pre-loaded 117) c. ROS
system
118) b. Closed- 119) c. Windows 120) b. macOS
source
121) d. both a and b 122) d. Android 123) a. digital editing
tool
124) c. a and b 125) a. databases 126) a. useful
50
computing server encryption
169) b. fee-based 170) d. Cloud 171) a. Google Drive
computing
172) b. the internet 173) a. File 174) a. Upload
dependency
175) c. Share 176) d. all of them 177) d. Both a and b
51
Model (1)
1) Choose the correct answer:
1- c- Outlook 3- b- eyes 3- b- create a
paragraph
4- b- ROS 5- b- wireless 6- a- One Drive
7- b- back problems
52