0% found this document useful (0 votes)
187 views52 pages

مراجعة النخبة ict صف سادس الترم الاول من اكاديمية تراست

Uploaded by

h01221997483hhh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views52 pages

مراجعة النخبة ict صف سادس الترم الاول من اكاديمية تراست

Uploaded by

h01221997483hhh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

1

G6 First Term
ICT
Final Revision
Contents :
Theme1 : Role of ICT in our lives .
L2 : Computer Network Devices
L3 : Futuristic Technology
L4 : Evaluating Cutting –Edge Technology
L5 : Digital Research skills
L7 : Operating systems
L8 : Website Design
Theme2 : Digital safety and security precautions
L2 : How to Deal with Electronic Games
L3 : Protecting yourself From Digital Theft
L4 : Cyber Security
L5 : Copyright and Electronic Financial Trading
L6 : Cloud Storage of Files
L7 : Cloud Computing Applications
Final revision
Model exam1
Model exam1

2
Theme1
L2 : Computer Network Devices
Networks ‫الشبكات‬
They are groups of devices or things that are connected to each
other for a common purpose .

Network Devices
1) MODEM ‫بيعمل وظفتين مهمين جدًا‬

1) Connects a local area net work(( LAN ) to the internet)


(Connect Users to the internet)
2) It converts the signal from the internet service provider (ISP )into a
digital signal .
signal ‫خارج منها‬ ‫عشان‬
‫الكمبيوتر‬
‫رايح للموديم‬ Digital ‫يفهمها‬
ISP signal

2) Switches ‫ خلي بالك‬switches are intelligent devices

They can send data to a specific devicesover a network which makes


connection easier and faster .
) gateway) ‫بنسميه كمان‬
3) Router
gateway= Router ‫يعني‬
It connects a modem to different networks

3
Types of network
Wired Networks Wireless Networks
Use: Use:
Physical wiring ( cables) that Connect devices without
play in to holes called " wring through ( wireless ,
Ports" Wi – Fi )
L3 : Futuristic Technology
Intelligence (AI):
Cutting – Edge ‫ وكمان‬Futuristic ‫• إيه اللي بنسميهم‬
1- Augmented reality ( AR )
2- Virtual reality ( VR )
3- Artificial Intelligence (AI)
Cutting –Edge← ‫يعني ايه‬
The latest and most advanced version of a service or product.
‫أي اصدار جديد من أي جهاز أو أي خدمة‬

‫ هم آخر اصدار جديد من التكنولوجي‬AI , VR , AR ‫يعنى‬

‫طيب أي أهميتهم‬
Importance of Cutting technology :

- It improves lives.
- It improves inclusion of people of determination.

Assistive technology ‫ للـ‬Cutting –Edge← ‫في كمان‬

‫يعني آخر اصدار حديث للتكنولوجيا اللي تساعد الناس‬


Cutting –Edge toAssistive technology.

4
Smart gloves : deaf ‫خد بالك الجالفزبيساعد‬
blind people ‫يعني لو قالك‬people
‫هتبقي اإلجابة خاطئة‬
: ‫اللي هي‬
Empower deaf people to translate their signs in real time to spoken or text
output.
Cutting –Edge Assistive technology ‫أمثلة تانية على‬
1- Screen magnification software.
2- Hearing a dis.
3- Speech into text and text to speech programs.

‫خليك فاكر‬
Assistive technology helpspeople of determination.

‫ ؟‬VR , AR ‫طيب أي الفرق بين‬


Virtual reality ( VR ) : It's Virtual 3D environment Users often wear a VR headset
that blocks on t the real world.
1- Visiting museum and historical sites virtually.
EX
2- Enlarging insects and atoms.
Augmented reality ( AR ) : ‫الواقع المعزز‬

Combines with

The real world A virtual world

by

adding images using smart phone or tablet.

shows

a 3D model of images look like real world

5
EX
: student can see cube , cylinder onto flat surfaces or see elephant or lion in the
classroom.
AI ‫أما بقا ال‬
: ‫لما تالقي في السؤال أي وظيفة لإلنسان زي‬
- Thinking
- Writing
- Learning ‫نختار على طول‬
- Deduce
- Complex task as human AI

1- It can predict the word.


It ability of computer to think , ……………..
: EX

2- It unlocks your phone with ( facial recognition )

User Experiences (UX)

- They describe how people use and interact with a product and how
evaluate their experiences.
- is often divided into different areas and can be positive or negative.
Meeting Needs

>> User experience is interlinked with the development of products


and services.
Example:The goal of cutting-edge assistive technology:
1) To improve independence.
2) Consequently, to be included in society.

Factors that Affect User Experience

1) Accessible • * Is it accessible for people of


determination?
6
2) Credible • Are the company and its products
trustworthy?
3) Desirable • Does the product meet your needs?
4) Findable • If there is an issue with the product, can
I find the solution?
5) Usable • Is it easy to use?
6) Useful • Is it practical?
7) Valuable • Does the product improve my life or
help me learn ?

L5 : Digital Research skills


copy paste copy

ctrl + c ctrl + v ctrl x


+

Most commonly used word processing commands

Search engines help people .

Search internet based on :

1- Key word.
2- Phrases

You can search as author or journal title to narrow a search.

False (✗) ‫هتكون اإلجابة‬narrow‫ مكان‬widen ‫يعني لو جت لك‬

7
Databases
Databases: They are collections of information that are typically stored
a computer system and can be accessed, for free, through a school.
A database is a good place toSearch for information frommagazines and
newspapers.
EKB is an example of a general database that covers many subjects.
The search results on EKB is credible and accurate.
Library catalog: It is a database that includes all the items owned by
alibrary.
L7 : Operating systems

Hardware ‫األجهزة‬ Software ‫البرامج‬

APPs ‫برامج‬
Operating systems
‫نظام التشغيل‬

Operating systems (O.S)


It is the software that manages a computer's functions, such as:

1) Memory 2) Drives 3) Printers 4) Other devices

Functions:
1) It runs a computer's software and hardware.
2) It allows a user to communicate with the computer easily.
3) It includes accessibility features such as screen readers and
magnifiers.
‫( لكل جهاز متطور‬o.s) ‫) يعني نفهم من كدة إن في نظام تشغيل‬4

8
Mobile devices
Computer O.S

Closed - Source

Android Apple iOS


Microsoft windows MacOS
It runs iphone and ipad
‫الزم تعرف ان‬
Most popular
Open - Source Closed - Source ‫ اختصار‬Mac
Worldwide ‫شركة ماكنتوش‬
‫اللي عاملة‬
‫أجهزة آبل‬

It runs Apple Computer


Both Android and iOS perform the same basic functions, such
as:
* Messaging * Web access Open ‫طيب يعني اي هبقا‬
* Video chat * Touch functions ‫؟‬Close source‫ و‬source
Open-source software ‫تعالى اقولك‬

- It means a person can change and read the programming


code.
Closed-source software
- It can't be seen or changed by the public.
‫( ؟‬O.S) ‫طيب ايه كمان أجهزة بتشتغل بنظام تشغيل‬

‫سؤال بطريقة أخرى ايه اخراصدار النظمة التشغيل ؟‬

Cutting Edge of operating system

1) The Robot Operating System (ROS):


- It's open-source software.

9
- It's used for building robot applications.
2) Self-driving cars OS:
Ex :AppleCarplay and Windows Automotive).
L8 : Website Design

HTML

Hyper Text Markup Language (HTML) is the standard


programming language used to create web pages.

HTML describes the structure of a web page.

It consists of a series of elements such as:


1- Headings 2- Paragraphs 3- Links 4- Images

• HTML elements are the building blocks of web pages.


• Web browsers read HTML documents and display
‫خد بالك الكالم‬
the content according to the HTML tag. ‫ده مهم جدًا‬

• It's compatible with all major web browsers.

←‫انت عارف ان‬


Programming languages:
• They give instructions to a computer in code.
• They're usually open source; anyone can see, modify, or distribute the code.
• They often share similarities; once you learn one, it is easier to learn others.
• Programmers choose a language based on a specific purpose.

‫يعني لو عرفت لغة منهم سهلة تتعلم الباقيين النهم شبه بعض‬

10
‫هكتبه ازاي؟‬Tag ‫طيب أنا عايزة أعرف لما آجي أكتب الـ‬

Structure of HTML Tag


<h1> ‫<اسماء الطالب‬h1>← ً‫مثال‬
Tag has three parts:
1- <h1> an opening tag.
2- The content.
3- <h1> a closing tag.
‫ وأقفله بنفس الحرف واكتب في النص اللي أنا عايزه‬Tag ‫يبقى كده أنا فهمت الزم أفتح الـ‬

‫أومال أي الحروف اللي هكتبها في األول و اآلخر دي؟‬


‫برافو عليك‬
‫تعالى أقولك ملحوظة سريعة‬
Element HTML Tag
<h1>Largest heading</h1>
Largest heading (‫(لما تكتب عنوان عريض يعني دا اكبر حاجة فالصفحة؟‬

Subheading <h2>Subheading</h2>
‫؟‬h2‫ولما تكتب عنوان فقرة يبقى‬

Smallest subheading <h6>Smaller subheading</h6>


‫؟‬h6‫وفقرةاصغر‬

Paragraph <p>This is a paragraph</p>


Font size <font size="1">
Font color <font color="red">
Hyperlink <a href="https://www.ekb.eg">Visit EKB </a>

Italics(Emphasized <i>Emphasized text</i>


text) ‫عايزخطك مائل يبقى عليك وعلى الخط اإليطالي‬

11
Bold <strong>Bold text</strong>
‫ولوعايزخطك تقيل يبقى‬

‫ده مكتوب كمثال‬ Tag ‫طبعًا أنت ذكي مش محتاجة أوضح لك ان الكالم اللي في نص الـ‬
‫دهمايتحفظش أنا كتباه كمثال‬ <p>This is a paragraph</p> ‫يعني‬

‫ دي كلها ؟هقولك‬Tags ‫طيب ليه الرموز الـ‬


1) A large heading at the top of the page catches attention.
2) Subheadings make the text easy to scan so a reader can find the
information they want.
3) Text broken up into paragraphs makes it easy for the reader to scan for
the information they want.
4) Images also attract attention and can trigger different emotions.
5) To make the images accessible, add image and alt-text tags.
Theme2
L2 : How to deal With Electronic Games
Benefits of Online Gaming

1) It's fun and promotes critical and creative thinking


2) It encourages teamwork.
Disadvantages of Electronic Games
1) Physical Dangers 2) Psychological Dangers

3) Security Dangers

12
1- Physical dangers: Eyes strain, back problems, and headaches Sleep
cycle, weight Gain.
2- Psychological dangers: Anxiety, depression, aggression, Prevent
from thinking rationally and negatively affect your relationship with
family and friends.
3- Security dangers :
• Personal information exposure: Sharing details can lead to
privacy breaches.
• Cyberbullying: It's common in large gaming communities.
• Hackers and viruses: Threats to security.
aggressive‫ تختارعلطول‬violence‫حاجة تانية مش حتقولهالك غيرمس أمل اما تالقی کلمه‬
‫يعني االلعاب الي فيها عنف بتخلي الالعب عدواني‬
‫نقطة مهمة جددددددا‬
.‫ يعني اجهاد العين فقط‬Eye‫ مبتجيش غيرلل‬strain ‫كلمة‬
✗Leg, hand ‫ لل‬Strain ‫مفيش حاجة اسمها‬
‫ يعني دورة النوم‬sleep ‫ مفيش غير‬cycle ‫ولما يقولك‬

Responsible Gaming Practices:


- Play with people you know.
- Avoid sharing personal information in usernames or - ---
passwords.
-Don't use the webcam.
✗‫هتكون‬use webcam ‫خد بالك لو قالك هنا‬
-Accept parental limits.
✗‫هتكون‬Ignore the limit ‫ولو قالك‬
- Balance gaming with real-life activities.
- Communicate with your parents about any online dangers.

13
L3 : Protecting Yourself From Digital Theft
‫جملة تمهيدية بس بتيجي في األسئلة محدش هيقولهالك غير مس أمل‬

It is irresponsible to leave your devices at risk by not taking proper


safety precautions

✗ ‫هتكون اإلجابة‬ir ‫ من غير‬responsible ‫يعنى لو جت نفس الجملة بس كلمة‬

Ways you can Protect Your devices From Theft


(1) Passwords
- Use at least eight random characters (letters, numbers, and
symbols) for secure passwords and change it every 3 months.
(2) Multi-Factor Authentication (MFA) :
- It requires at least two ways to identify yourself (e.g.,passwords,
pins, and security codes(.
(3) Fingerprint Authentication:
-It scans your finger for confirmation
‫ طيب لو قالي بدل‬Fingerprint ‫ تبقى اإلجابة‬finger ‫هيجي سؤال يا شاطر يقولك فيه كلمة‬
.‫ ؟؟هقولكمهو معناه اصبع االبهام هي هي بصمة الصباع‬thumb ‫ قال‬finger
(4)Facial Recognition:
- It uses your device's camera to recognize your face.
Facial Recognition ‫طبعا‬
ً ‫هتقول‬face‫طيب لو جالي بيقولي‬
(5) Full Encryption:
It protects your information, accessible only with your password .
‫ عكسها فك التشفير‬Decryption ‫ يعني تشفير لكن كلمة‬Encryption ‫جددددددا كلمة‬
ً ‫مهم‬
.‫ ركز‬E ‫ودي يا شاطر ملناش دعوة بيها مش في درسنا اللي في درسنا اولها‬
‫مهم‬

14
Egypt has introduced the Data Protection low to protect its citizens.
.‫خد بالك بتحمي الشركات واألفراد مش الشركات بس‬
Data protection low
Companies individuals
‫الجملة غااااية في األهمية احفظها زي‬ If they've victims of data
‫ما هي وزي ما بيجي فيها السؤال‬ theft :
‫هتعرف تجاوبه‬ 1-individuals must report.
Data protection low requires 2- individuals must report the
Companies to use strict family and friends they
security stands to protect communicate with online
their data
3 ‫ احنا‬strict security stands
‫كلمات مبنتفرقش لو ملقتناش جنب‬
‫بعض هتالقي واحد فينا في الـ‬
choose
→ If they've victims of data theft:
1- Companies must report immediately.
2- Companies must report its customers.
L4 : Cyber Security
Cyber security: is the protection of systems, networks, devices,
and data from electronic attacks.
‫ طبعا‬Cyber security protect your devices only‫يعني لوجالك سؤال يقولك‬
‫ كمان‬network, system ‫االجابة حتكون✗بيحمي الشبكات‬
Types of Cyber Security Threats:
1) Malware
- This is the greatest cyber security threat.
- Scare ware ( type Malware)

15
.‫واالتنين ملهمش غير وظيفة واحدة فقط‬
Scare ware ‫تقولك في فيرس أو مشكلة في جهازك يعني بيخضك‬
Pretends to be virus alert or you have a problem in your
device.
unsecured Wi-Fi networks can expose you to Malware
threats. ‫خد بالك‬
2) Spoofing : ‫ وش‬100 ‫ده بقا بـ‬
←‫ممكن يقولك‬
1- Fake domain
2- Fake business
3- Fake e-mail
4- Person you known ( impersonation )
Dealing with Threats:
- Stay calm but act swiftly; inform contacts immediately about the
Threats.
- Use antivirus to scan and remove viruses.
- Update security settings and change all passwords.

L5 : Copyright and Electronic Financial Trading


Copyright (Intellectual Property Rights)
Intellectual property refers to someone's invention, creation, or idea
that is protected by law from being copied by others, such as an
individual or a business.
Copyright includes:
* Written material * Visual content * Audios
* Videos * Web material
Creative Commons:
It refers to work that has been granted permission to share by the
creator.

16
Notes

‫خد بااااااالك‬
Works in data libraries such as the Egyptian Knowledge Bank (EKB) is
already approved for use.
Egypt considers works to be in the public domain if the creator has been
deceased for at least 50 years. No creator permission is required
Stock Exchange and E-trading
A Stock Exchange:
It is a market where buyers and sellers deal in units of company
stocks.
These stocks are called shares. ‫مهم جدًا‬
: ‫على فكرة‬
The Egyptian stock exchange allows citizens to invest in any
market sector, such as:
- Food - Clothing - Petroleum
Smart investor should before invest :
* Research: Smart investors will research multiple companies before
deciding which one to invest in.
* Market Analysis: They analyze markets to see which companies
stocks go up or down.
* Evaluate: They also check the products or services offered to see
they're a good fit for their interests and goals.
Traditional vs. Electronic Trading
>> In settings, an investor will have a broker.
A broker:
It's a person who handles the buying and selling of shares.
broker ‫ يبقي مفيش غيره هو ال‬person ‫تريكات مس أمل لما تالقي كلمة‬
‫ايه ياترى الميزات؟‬

17
‫اللي جاي مهم ال يخلو امتحان من واحدة فيهم‬
Electronic Financial Trading (E-Trading)
- E-trading has made the process of buying and selling shares more
efficient.
- E-trading provides the investor with more authority.
- With the spread of the internet, electronic trading platforms sare
now common places.
- E-trading allows the investor to:
1- Make trades on their own through websites or applications.
2- Use a broker if they want
3- Allow more independence and user-friendly options such as robo-
advisors.
Robo-advisors:
They're online applications that provide financialguidance and
services.
‫ يبقى اإلجابة‬guidance ‫ وكلمة‬application ‫تريكات مس أمل لما تالقي كلمة‬
.‫ الروبوت بيديني دليل امشي عليه‬Robo-advisors‫علطول‬

L6 : Cloud Storage of Files


Cloud Computing:
It isOn-demand storage and access of data and programs via
remote servers on the internet.
‫ يعني تحت امرك وتحت طلبك يبقى‬On-demand ‫تريكات مس أمل لما تالقي‬
.‫مفيش غيرها السحابة الجميلة‬
Remote Servers:
They connect users who are not on the local area network (LAN)
to access and manage data, files, and applications via the
internet.

18
- Cloud computing enables users to access files and data
easily and conveniently from anywhere and at any time.
‫الحوسبة السحابية تمكن المستخدمين من الوصول إلى الملفات والبيانات‬. -
.‫بسهولة ويسر من أي مكان وفي أي وقت‬
Examples of Cloud Computing:
Microsoft 365 Google
With its application One With its application
Drive Google Drive
.‫ركز مين تبع مين عشان بيلخبطك بينهم في السؤال‬
Advantages:
- It frees up device space.
- Multi-device access: You can access your files from various
devices.
- Backup: It provides a backup for your files.
- Security: It offers password protection and data
encryption.
- Data encryption: It converts data into a code to prevent
unauthorized access.
Disadvantages:
- Internet dependency: It requires an internet connection.
- Fee-based service: You should pay a fee to store files.
- Data breach risk: Your information may be compromised.
- Data breach: It occurs when unauthorized parties gain
access to data and information.
free ‫ يعني رسوم (بفلوس) مش‬fee ‫خد بالك وركز كلمة‬

19
Data Encryption:
It converts data into a code to prevent unauthorized user
access.
Data Breach:
It occurs when unauthorized parties gain access to
confidential data and information.
. ‫ تعريفات مهمة‬4 ‫خلي بالك الدرس فيه‬
connect users who are not on LAN to access
Remote servers and manage data, files, and applications via
the internet.
occurs when unauthorized parties gain
Data breach access to confidential data.
converts data into a code to prevent
Data encryption unauthorized user access.
Cloud storage ‫قلناه في األول‬
‫خد باااالك‬
L7 : Cloud
Having a document Computing
management Applications
system allows you to organize
your documents so they are quick and easy to find.
→Microsoft 365 and Google Workspace:
- They have popular cloud computing software suites.
- They include productivity apps and storage.
→ Microsoft 365:
- It includes Microsoft Teams, Word, Excel, PowerPoint, and
Outlook.
1- Microsoft Teams: For communication and virtual meetings.
2- Word: For writing documents.

20
• When you select Microsoft Word, it opens a new
blank document.
• It allows you to draft ideas, a story, or an assignment.
3- Excel: For creating tables and graphs.
4- PowerPoint: For creating presentations.
5- Outlook: An email platform.
6- OneDrive: A storage and sharing application.
One Drive:
- It allows you to store, share, and access files from any
device.
- It's user-friendly.
- To upload files or folders:
• Sign in to Microsoft Office in Chrome.
• Select One Drive.
• Choose Upload > Files or Upload > Folder.
• Select desired files or folder.
• Click Open or Select Folder.
- To save a file:
• Select File > Save a Copy > One Drive
Personal/Company.
• Enter a file name and click Save.
- Files appear in One Drive when you open the Office app.

)‫(الحمدهلل الذي بنعمته تتم الصالحات‬

21
1) Choose the correct answer:
1- Adding ……… to images helps people with visual impairments.
a. borders b. colors c. alt-text d. animations
2- One of the following tags is false …………
a. <i> </i> b. <a> </a>
c. </b> </b> d. <h1> </h1>
3- Programming languages are usually ………......
a. closed-source b. open-source
c. proprietary d. expensive
4- Instructions to a computer are given in the form of………...
a. Word file b. code c. video d. audio
5- ……… can promote critical and creative thinking.
a. Violence b. Electronic games
c. Information d. Danger
6- Playing electronic games too much can affect your ……… cycle.
a. sleep b. digestive c. eating d. exercise
7- Some games promote violence, so this can make some people ………..
a. calm b. lazy c. stupid d. aggressive
8- One of the physical dangers of electronic games is.…
a. feeling lonely b. headaches
c. stealing data d. cyber bullying
9- Electronic games may make you anxious and depressed because ………
a. you feel lonely in the real world b. you may being bullied online
c. both a and b d. none of them
10- Electronic games can strain your ……… and cause headache
a. Hand b. eyes c. legs d. face
11- Large gaming communities are filled with ……..
a. cyberbullies b. doctors c. teachers d. none of the
12- Good electronic games help ………
a. enhance creative thinking b. disorganization
c. non-cooperation d. individual work
13- Hackers can steal your information and ………. can easily spread.
a. videos b. books c. security d. viruses
14- Real life activities, such as ……… should not be replaced with
electronic games.
a. good sleep b. bullies
c. strangers d. online search

22
15- The impact on your sleep cycle is one of the ……… of electron
games.
a. security dangers b. physical danger
c. psychological dangers d. all of them
16- One of the advantages of online multiplayer games that friends share is
that they are ………
a. entertaining b. not effective in team work
c. traditional d. boring
17- You should ……… that your parents set to prevent unhealthy gaming
habits.
a. pirates b. leak information
c. accept limits d. share
18- One of the dangers of electronic games is ……… because you may not
be exercising.
a. hacking b. gaining weight
c. bullying d. violence
19- You should not share ……… because others can access you address,
email, and phone number.
a. games b. news c. personal information. d. jokes
20- It is preferable for passwords to contain at least ……… characters.
a. five b. eight c. three d. four
21- MFA requires at least ……… ways of identifying yourself.
a. two b. three c. eight d. four
22- The authentication type that scans your finger as a way of confirming
it's you, is ……….
a. face recognition b. MFA
c. fingerprint d. self-access
23- Data protection law requires companies to use strict ……… to protect
their data
a. procedures b. steps
c. security stands d. browsers
24- ……… Requires companies to use strict security stands to protect their
data.
a. Full Encryption b. Voice recognition
c. Data Protection Law d. I-Stem platform
25- Which of the following is NOT typically used in MFA?
a. Passwords b. PINS
c. Security codes d. Voice recognition
23
26- The software that scans your face using your device's camera is
………
a. Fingerprint b. Password
c. Multi-Factor d. Facial Recognition

27- ……… protects your information so only you can access it on your
device.
a. Decryption b. Compression
c. Encryption d. Firewall
28- Fingerprint authentication usually scans your ……
a. eye b. face c. finger (thumb) d. palm
29- Full encryption protects ………
a. only passwords b. only files
c. all information d. only footprint
30- What must companies do if they're victims of data theft?
a. Report immediately
b. Inform customers immediately
c. Wait for a week
d. Both a and b
31- Use ……… software to do a sweep of your computer and remove any
viruses.
a. passwords b. antivirus c. browsers d. scareware
32- Verify the information you find to make sure it is………
a. accurate b. false c. untrusted d. biased
33- ……… is defined as protecting systems, networks, devices, and data
from electronic attacks.
a. Cyber security b. Digital footprint
c. Dangerous electronic games d. Piracy
34- Verify that the websites that you frequent are ……..
a. real b. safe
c. age appropriate d. all of them
35- If you are exposed to cyber security threat, you should ……… it.
a. ignore b. accept c. report d. share
36- A fake domain pretending to be a business or an email account that has
he name of a trusted service is an example of …………
a. maleware b. spoofing c. antivirus d. scareware

24
37- ……… are types of cyber threats.
a. Malware b. Spoofing
c. Both of them d. None of them
38- ………… is a type of malware that pretends to be a virus alert.
a. Virus b. Firewall c. Sweepstake d. Scareware
39- It is preferable to change your passwords every ……… month.
a. eight b. six c. three d. none of them
40- ………… are cyber criminals who pretend to be a business, or known
person to trick you.
a. Male ware b. Hackers
c. Spoofing d. Scareware
41- To deal with cyber security threats, stay calm, but take a ………
action.
a. slow b. swift c. calm d. delayed
42- ……… is the greatest cyber security threat.
a. Malware b. Antivirus c. Firewall d. Phishing
43- Using ……… is/are important for cyber security.
a. antivirus b. strong passwords
c. safe web browsers d. all of them
44- After a threat, you should update ………
a. calendar b. apps
c. security settings d. web browsers
45- ……… is someone's invention, creation, or idea that is protected by
law from being copied by someone else, such as an individual or a
business.
a. Intellectual property(copyright) b. Electronic right
c. Electronic trading d. Public domain
46- Books whose authors have been deceased for 50 years are ………
a. copyrighted b. in public domain
c. creative commons d. none of them
47- ……… refers to works for which the creator has granted permission
for sharing.
a. Digital footprint b. Impersonate
c. Cyber security d. Creative Commons
48- …………… is a market where buyers and sellers deal in units of
company stocks.
a. Online shopping b. Stock exchange
c. Supermarket d. Copyright
25
49- ………… allow(s) investors to make trades on their own through
websites or applications.
a. Brokers b. E-trading
c. Robo-advisors d. None of them
50- ………… is an online application that provides inquiries, guidance,
and financial services to customers.
a. Stock broker b. Robo-advisor
c. Stock exchange d. Financial trading
51- In stock exchange, stocks are called ………
a. money b. shares c. e-commerce d. bonds
52- ……… is a person who handles the buying and selling of shares.
a. A broker b. A robo-advisor
c. A scanner d. IAN
53- ………… has made the process of buying and selling shares more
efficient.
a. E-learning b. E-trading
c. Stock exchange d. Robo-advisor
54- Copyright includes written and ……… materials.
a. visual b. audio c. video d. all of them
55- In traditional settings, a stock investor will have a/an ………..
a. broker b. bank teller c. instructor d. hacker
56- Smart investors ……… the company before investing in it.
a. research b. buy c. sell d. invest
57- .......... is the on-demand storage and access of data and
programs via remote servers on the internet.
a) Cloud computing b) Hard disk drive
c) copyright d) Desktop software
58- One of the disadvantages of using cloud computing is ……...
a) Improving storage capacity on devices.
b) The ability to access your files from multiple devices
c) The possibility of data breaches.
d) Ability to share files with authorized users.
59- Internet safety precautions
a) Share your personal information on the Internet.
b) Use secure Internet browsers.
c) Communicate with people you don't know.
d) Use weak passwords.
26
60- ……… is doing a complex task that simulate the performance
and thinking of human.
a) Artificial intelligence b) Switches
c) Digital footprint d) Wired network
61- The wireless networks are connected using ………
a) Ports b) Wi-Fi
c) Switches d) Modem
62- ........ is used to convert signal from ISP to digital signal.
a) Modem b) Ports
c) Switches d) Wi-Fi
63- .......... is a technology that help imitate the sound of an actual
human being
a) Artificial intelligence b) Speaker
c) Bluetooth d) Assistive technology
64- The cables and wires in wired networks are plugged into holes
are called..........
a) Ports b) Wi-Fi
c) Switches d) Modem
65- …...... help in sending data to a specific device via network
easily.
a) Switches b) Ports
c) Mouse d) Wi-Fi
66- ……… is used as a 3-D environment that allows user to interact
as if it a reality
a) Virtual reality b) Switches
c) Digital footprint d) Assistive technology
67- ……… is a technology used for unlock your phone using facial
recognition.
a) Assistive technology b) Artificial intelligence
c) Virtual reality d) Switches

27
68- You can immerse to an ancient historical site and thousand
years ago, using ………
a) Virtual reality b) Modem
c) Bluetooth d) Router
69-.......... is a technology that combine real world with a virtual
world
a) Router b) Augmented reality
c) Bluetooth d) Digital fingerprint
70- …….. is a technology that helps to make interactive and
memorable learning.
a) Digital footprint b) Switches
c) Modem d) Augmented reality
71- You can wear a headset to deal with a technology called
............
a) Virtual reality b) Digital footprint
c) Piracy d) Scanner
72- You can see atoms and insects are bigger than you by using
......... technology.
a) Virtual reality b) Switches
c) Modem d) Router
73- ……... is a technology that improve the life of people of
determinations.
a) Assistive technology b) Old technology
c) Traditional technology d) Complex technology
74- ......... is the last and most advanced version of products or
services
a) Cutting-edge technology b) Old technology
c) Past technology d) Traditional technology
75- ……… helps people with visual impaired (poor vision) to read
a) Scanning and reading b) Prostatic legs
c) Printer d) Taking picture

28
76- ......... is a technology that helps people of determinations to
enlargement (zoom) screen, hearing aids, and convert speech to
text and text to speech.
a) Traditional technology b) Assistive technology
c) Past technology d) Piracy
77- ……… helps in instant translate of the signs of deaf people
a) Screen enlargement (zoom) software
b) Ring bell ball
c) Prostatic legs d) Smart gloves
78- ......... is from the elements to evaluate a good product
a) High cost
b) Bad manufacturing
c) Ability to find solution (findable)
d) Manufacturing country
79- ……… is the important goal of assistive technology.
a) Difficult usability
b) Improve someone's independence
c- Not useful to others
d- Difficult accessibility
80- ……… is from the points to be considered when buying a good
product.
a) Usability (usable) b) Difficult usability
c) Manufacturing country d) No need to it
81- .......... are group of information usually stored inside a computer
system.
a) Printed books b) Databases
c) Search engines d) Digital search tools
82- ......... is a database that contain all the sources and items
owned by a library.
a) Library catalog b) Internet
c) Paint program d) Search engine

29
83- .......... is an operating system, and it's open-source program to
build robot applications
a) Microsoft windows
b) Robot operating system (ROS)
c) Android
d) Apple iOS
84- The programmers are using ......... language to create
webpages.
a) Automative b) MacOS
c) HTML d) Apple iOS
85.......... is the standard programming language used to create a
webpage
a) Microsoft windows b) Word
c) Android d) HTML
86-……… is the tag that used to create a paragraph
a) <p> b) <h1> c) <i> d) <strong>
87-Internet safety precautions
a) Share your personal information on the Internet.
b) Use secure Internet browsers.
c) Communicate with people you don't know.
d) Use weak passwords.
88-…...... includes written, visual, audio, video, and materials from
the Internet.
a) Malware. b) Electronic financial trading.
c) Copyright d) Programming languages
89-Microsoft provides a range of productivity applications, such as
………
a) HTML b) Microsoft Teams
c) Internet d) Viruses
90-The .................... platform allows you to store and share your
files.
a) Calculator b) Paint
c) Help d) OneDrive

30
91-……… is/are a group of devices or things that are connected to
each other for a common purpose.
a. Devices b. Networks
c. Routers d. Software
92-……… is/are the device(s) that can be connected to internet.
a. Desktop computer b. Laptop computer
c. All of them d. None of them
93-……… is/are computer applications that perform complex tasks
that simulate the thinking and performance of humans.
a. Artificial intelligence b. Holograms
c. Networks d. Switches
94-……… networks connect devices using Wi-Fi.
a. Wired b. Wireless
c. Software d. Both a and b
95-Through ……… you can transfer data with wires and cables.
a. wireless networks b. Wi-Fi
c. wired networks d. email
96-……… is a device that connects a local area network (LAN) to
the internet.
a. Artificial intelligence b. A modem
c. A server d. A switch
97-The modem converts the signals from the ……… into a digital
signal.
a. device b. LAN c. ISP d. Wi-Fi
98-……… technology is considered as the latest and most advance
version of services or products.
a. Cutting-edge b. Assistive
c. Past d. Traditional
99-……… in user experience means the company and its produce
are trustworthy.
a. Accessible b. Credible
c. Desirable d. Findable
100-……… describe(s) how to use the product and interact with it.
a. Futuristic technology b. User experiences
c. VR d. Al

31
101-Artificial intelligence, augmented reality, and virtual reality are
examples of ……… technology.
a. assistive b. cutting-edge
c. outdated d. simple
102-Evaluating new technologies helps society make better
decisions about their ……… of such technologies.
a. cost b. color
d. popularity c. use and development
103-……… is a database which includes all the items owned by a
library.
a. The EKB b. A search engine
c. A library catalog d. A keyword
104-You can search for information from magazines and
newspapers throw ………
a. search engines b. databases
c. Google Chrome d. smart phones
105-When you search online, make sure the result you get is
………
a. credible b. accurate
c. biased d. both a and b
106-……… is an open-source operating system for mobile devices.
a. Android b. iOS
c. macOS d. Windows
107-……… is a mobile operating system.
a. ROS b. iOS c. Linux d. macOS
108-There are many operating systems for computers, such as
Windows and ………
a. iOS b. Android c. ROS d. macOS
109-……… is a closed-source operating system for iPhone and
iPad.
a. Android b. Apple iOS c. Windows d. macOS
110-Programming languages have evolved from ……… to human-
like languages.
a. complex b. binary
c. pictorial d. none of them
111-A/An …….. gives commands to the computer in the form of codes that
can be used to create animation.
a. assistive technology b. programming language
c. database d. digital footprint
32
112-HTML stands for ………
a. High Tech Markup Language
b. Hyper Text Markup Language
c. Human Text Machine Language
d. Hybrid Text Markup Language
113-HTML is ……… with all the major web browsers.
a. compatible b. incompatible
c. irrelevant d. unnecessary
114-The ……… is the software that manages a computer's
functions, such as memory, drives, and printers.
a. programming language b. operating system
c. input unit d. email
115-Most computers come ……… with an operating system.
a. without b. pre-loaded
c. damaged d. uninstalled
116-……… is open-source software used for building robot
applications.
a. Windows b. Microsoft Word
c. ROS d. None of them
117-……… software means that the code can't be seen or changed
by the public.
a. Open-source b. Closed-source
c. Both of them d. None of them
118-........ runs on most computers worldwide.
a. Android b. macOS c. Windows d. iOS
119-……… is an operating system for Apple computers.
a. Windows b. macOS c. iOS d. ROS
120-The most popular mobile OS is/are ………
a. Android b. Apple iOS c. macOS d. both a and b
121-The programming code of ............ can be changed by anyone.
a. iOS b. Windows c. macOS d. Android
122-A ……… is used when copying, pasting, or cutting information.
a. digital editing tool b. QR code
c. hyperlink d. drawing tool
123-Search engines help people to search internet websites based
on ……..
a. keywords b. phrases
c. a and b d. none of them
33
124-You can search for some books in the school library using
………
a. databases b. an email
c. a printer d. user experience

125-A practical product is considered ……… in user experience.


a. useful b. usable
c. findable d. desirable
126……… empower deaf people to translate their signs in real time
to spoken or text output.
a. Hearing aids b. Screen readers
c. Scanners d. Smart gloves
127-If the product is practical and meets customer needs, the user
experience will be ………
a. positive b. negative
c. neutral d. experiences.
128-A product that meets your needs is considered ……… in user
experience terms.
a. accessible b. desirable
c. findable d. valuable
129-Complicated and hard-to-use products result in ……… user
expensive.
a. positive b. negative
c. neutral d. cheap
130-……… in user experience means the product is easy to use.
a. Accessible b. Credible
c. Desirable d. Usable
131-User experience is ……… with product development.
a. unrelated b. opposite
c. interlinked d. unnecessary
132-If a product improves your life or helps you learn, it is
considered ………
a. accessible b. credible c. valuable d. findable
133-In a math class, AR can project ……… onto a flat surface.
a. video lectures b. text
c. 2-D shapes d. 3-D images

34
134-VR Can make ……… appear larger, so you can study them
closely.
a. buildings b. planets
c. insects and atoms d. mountains
135-Al learns by ……… available examples.
a. analyzing b. storing c. saving d. ignoring
136-……… predicts the word you will write from words you have
written previously.
a. VR b. AR c. Al d. IR
137-……… can help disabled individuals make phone calls using
voice commands.
a. Virtual assistant b. VR headsets
c. AR glasses d. Smartwatches
138-……… feel(s) futuristic, but they are already being used in
everyday life.
a. Virtual reality (VR) b. Augmented reality (AR)
c. Artificial intelligence (Al) d. All of them
139-……… combines the real world with a virtual world by adding
images using computers.
a. Virtual reality b. Augmented reality
c. Assistive technology d. Artificial intelligence
140-……… is a virtual 3-D environment that allows users to explore
and interact with the surroundings, as if it were reality.
a. Virtual reality b. Artificial intelligence
c. Assistive technology d. Augmented reality
141-The ability of the computer to think, learn, and deduce is
………
a. virtual reality (VR) b. augmented reality (AR)
c. artificial intelligence (Al) d. none of them
142-Visually impaired people can use ……… to see their family
members up close.
a. scanners b. augmented reality
c. braille d. transformers
143-To experience virtual reality, users often wear ………
a. 3D glasses b. smart gloves
c. AR headsets d. VR headsets

35
144-Augmented reality can be done through a ………
a. tablet b. computer
c. hardware d. printer
145-Cables and wires in wired networks are plugged into holes
called ………
a. ports b. Wi-Fi c. switches d. modems

146-……… are intelligent devices that send data to a specific


device over a network.
a. Switches b. Hubs c. Modems d. Cables
147-HTML consists of a series of elements, such as ………
a. headings a. paragraph
c. links and images d. all of them
148-HTML language consists of three main parts and there is a
……… at the beginning and the end.
a. paragraphs b. word c. drawing d. tag
149-The closing tag for a paragraph in HTML is ………
a. </p> b. <p/> c. </para> d. <end p>
150-<a> tag refers to the ………
a. italic font b. strong font
c. hyperlink d. paragraph
151-To make the images accessible on web pages, add image and
……… tag.
a. alt-text b. meta
c. title d. address
152-The <h1>.....</h1> tag refers to ………
a. create paragraph b. largest heading
c. subheading d. create link
153-A large heading at the top of a page is used to ………
a. confuse readers b. catch attention
c. reduce space d. slow loading
154-To create the smallest subheading in HTML, use the ………
tag.
a. <h1></h1> b. <h6></h6>
c. <p></p> d. <a></a>
155-The pages written by HTML language is displayed by……
a. photo editing b. spreadsheets
c. PowerPoint presentations d. web browsers
36
156-Large headings are placed at the ……… of the web page to
catch attention.
a. middle b. bottom c. top d. end
157-HTML tags consist of an opening tag, a closing tag, and ………
a. the content b. comments
c. attributes d. none of them
158-The ……… tag is used to italicize text in HTML.
a. <h></h> b. <b></b>
c. <i></i> d. <strong></strong>
159-To make the text bold in HTML, you can use the .…….. tag.
a. <i> b. <strong> c. <S> d. <i>
160-……… make(s) the text easy to scan and read in a web page.
a. Images b. Subheadings
c. Music d. Videos
161-The HTML tag <h2>.....</h2> refers to a ………
a. subheading b. small subheading
c. large heading d. paragraph
162-The tag used for emphasized text in HTML is
a. <strong> b. <em> c. <i> d. <bold>
163-HTML code can assist people with ……… to distinguish parts a
web page.
a. hearing issues b. low vision
c. mobility issues d. speech problems
164-Images in a web page can be used to ………
a. slow loading b. attract attention
c. increase file size d. confuse users
165- The on-demand storage and access of data and programs via
remote servers on the internet is ………
a. data encryption b. artificial intelligence
c. cloud computing d. server
166- ……… connects users who are not on the LAN to access and
manage data, files, and applications via the internet.
a. A remote server b. OneDrive
c. Microsoft 365 d. None of them
167- ……… converts data into a code to prevent unauthorized user
access.
a. Data breach b. A cloud
c. Data encryption d. A server
37
168- Cloud storage is often a ……… service.
a. free-based b. fee-based
c. limited-based d. none of them
169- ……… provides a backup for your files.
a. A web browser b. A search engine
c. Social media d. Cloud computing
170- …….. is considered an example of cloud computing.
a. Google Drive b. Facebook
c. WhatsApp d. YouTube
171- A disadvantage of cloud computing is ………
a. the limited storage b. the internet dependency
c. the slow processing d. that there is no file sharing
172- To save a file to One Drive, open the ……… menu, then select
Save a Copy.
a. File b. Insert c. Edit d. View
173- To upload files or folders to One Drive, select ………
a. Upload b. Save As
c. Download d. Share
174- After uploading your files on One Drive, you can click on the
……… option to share a file with your friends.
a. Download b. Open c. Share d. Save
175- OneDrive is mainly used for .. ..............
a. file storage b. file sharing
c. file access d. all of them
176- ……… Is/are the most popular software that deal(s) with cloud
computing applications.
a. Microsoft 365 b. Google Workspace
c. Facebook d. Both a and b
177- ……… app is used to browse mailing lists.
a. Microsoft Teams b. Microsoft Word
c. Microsoft Outlook d. Microsoft OneDrive
178- When you choose ………, it opens a blank document that
allows you to draft your ideas.
a. Outlook b. PowerPoint c. Word d. Excel
179- ……… occurs when unauthorized parties gain access
confidential data and information.
a. Data breach b. Data theft
c. Data encryption d. MFA
38
180- ……… allows you to directly share files with authorized users.
a. Cloud computing b. Social media
c. A web browser d. None of them
181- ……… provides an extra layer of security by offering password
protected data storage and data encryption.
a. Cloud computing b. Shopping
c. A remote server d. Downloading
182- The more cloud storage you require, the ……… the fee you
will pay.
a. higher b. lower c. same d. constant
183- The document management system helps ………
a. edit files b. create backups
c. organize documents d. increase storage
(2) Put (✔) or (✕):

1. Playing too often can affect your sleep cycle. Which hinders ( )
your ability to sleep.
2. Electronic games can strain your hand. ( )
3. Excessive electronic gaming can lead to headaches. ( )
4. It is recommended to play games and chat with people you ( )
don't know.
5. Multiplayer electronic games in particular can put your ( )
security at risk.
6. Ignore the limits that your parents set to prevent unhealthy ( )
gaming habits.
7. Use a webcam to limit the dangers of electronic games. ( )
8. Electronic games can prevent some players from thinking ( )
rationally.
9. When you face dangers online, you should solve them ( )
yourself.
10. Electronic gaming can have a positive impact on your ( )

39
relationships with others.
11. Care must be taken to not replace real-life activities with ( )
electronic games.
12. Encryption allows anyone to access your information on ( )
your device.
13. Data protection is important for only individuals. ( )
14. The facial recognition feature allows only your face to ( )
unlock your device.
15. Fingerprint authentication is a type of authentication ( )
confirming it's you.
16. Scareware and impersonation are considered types of cyber ( )
threats.
17. Spoofing is the greatest cyber security threat. ( )
18. Scareware tells you to click on the link to remove it, but the ( )
link is a virus.
19. Unsecured Wi-Fi can expose you to malware threats. ( )
20. Malware means that cyber criminals pretend to be a ( )
business.
21. Scareware is a type of malware that pretends to be a virus ( )
alert.
22. You can limit the dangers you are exposed to by only ( )
playing games and chatting with people you don't know and
don't trust.
23. If your account has been hacked, it is preferable to change ( )
the password of this account only.
24. Materials in the Egyptian Knowledge Bank (EKB) need ( )
permission for use.
25. Creative Commons refers to works that the creator has ( )
40
granted permission to share.
26. No creator permission is required if the creator has been ( )
deceased for at least 50 years.
27. Robo-advisors are human financial experts. ( )
28. Electronic financial trading hinders the speed of performing ( )
investment activities over the internet.
29. E-trading allows more independence for investors. ( )
30. Investors should check the products or services offered by a ( )
company before investing.
31. The internet helps electronic trading platforms become ( )
common places.
32. Electronic trading platforms are rare in modern markets. ( )

33. Google is one of the cloud computing service providers. ( )


34. Microsoft 365 is a cloud computing service provider ( )
through the OneDrive application.
35. Electronic financial trading provides investors with ( )
independence and easy-to-use alternatives.
36. Malware is considered one of the most dangerous cyber ( )
threats.
37. Using unsecured Wi-Fi networks exposes you to malware ( )
threats.
38. Through the font formatting commands copy, cut, and paste ( )
commands can be chosen in a word processing application
file
39. Egyptian knowledge bank (EKB) is an example for a ( )
"general database".
40. Specialized search engines help in searching for needed ( )
information.
41. Alexandria library catalogs can be used through the library ( )
website on the internet.
42. To limit the dangers of electronic games, use personal ( )
41
information in username.
43. Eye strain and backbend problem are considered from ( )
security dangers of over usage of electronic games.
44. Big electronic games communities are full of cyber bullies. ( )
45. Full encryption works on protecting your information so ( )
you're the only one who will have access to it.
46. You cannot upload your files to OneDrive. ( )
47. All digital search tools give similar results. ( )
48. Author and journal title can be used to widen a search range ( )
in databases.
49. Google is a reliable database. ( )
50. The Egyptian Knowledge Bank (EKB) is an untrusted ( )
source of information.
51. Be sure the search result you select is credible and ( )
accurate.
52. Smart gloves are a type of assistive technology. ( )
53. User experience is always positive. ( )
54. Artificial intelligence is an example of advanced technology. ( )
55. Devices can be connected without wiring (wireless or Wi-Fi). ( )
56. Wireless networks connect devices with physical wiring and ( )
cables.

With my Best wishes


Mrs. Aml fouad

42
Model (1)
1) Choose the correct answer:
1- ……………. app is used to browse mailing lists.
a- Microsoft Teams. b- Microsoft Word
c- Outlook d- One Drive
2- Electronic games can strain your …………… and cause
headaches.
a- hands b- eyes c- legs d- face
3- the HTML tag <P> ………</P> refers to …………
a- subheading b- create a paragraph
c- largest heading d- create a link
4- ………….. is open – source software used for building robot
application.
a- iOS b- ROS c- MFA d- Isp
5- A network that connect without wiring is named …………
a- Physical wiring b- wireless
c- port d- cable
6- The storage application in Microsoft 365 is named ………….
a- One Drive b- Word
c- Excel d- power point
7- The physical dangers of playing games causes ………….
a- depression b- back problems
c- aggressive d- build online

43
(2) Put (✔) or (✕):
1- You can share personal information online. ( )
2- Switches send data to a specific device over a network, which
makes connection easier and faster. ( )
3- Copyright doesn't include web material. ( )
4- Author and journal title, can be used to widen a search range.
( )
5- Android is an open – source operating system. ( )
6- Remote server connects users who are not on LAN to access
and manage data via the internet. ( )
7- Cloud storage services are always free. ( )
8- Virtual reality is a virtual 3 – D environment that allows users to
explore and interact with their surroundings, as if it were reality.
( )

44
Model (2)
1) Choose the correct answer:
1- The most popular mobile OS are ………….
a- Android b- Apple
c- both of them d- none of them
2- …………… is one of cloud computing application.
a- One Drive b- one
c- Drive d- All of them
3- …………….. convert data into a code to prevent unauthorized
user access.
a- copy b- past
c- data encryption d- data brech
4- ………………….. is a person who handles the buying and selling
of shares.
a- A broker b- LAN
c- A scanner d- A programmer
5- programmer use Hyper Text Markup language ( HTML ) to
create…………………………..
a- web pages b- modify
c- source d- slide show
6- …………………… is a data base which includes all the items
owned by a library.
a- library b- A library catalog
c- key words d- search engine

45
Complete the missing parts using the words between the brackets:
(Facial Recognition - HTML- Malware - Assistive Technology -
Modem)
1- ………………. is the greatest cyber security threat.
2- ………………. converts the signal from the (ISP) into a digital
signal.
3- ……………….. is abbreviation of Hyper Text Markup
Language.
4- ………………. software will scan your face using your device's
camera.
5- ………………. helps people of determination, such as hearing
aids.

Put (✔) or (✕):


1- Artificial intelligence (Al) is the ability of the computer to think
and learn. ( )
2- Android runs on mac devices. ( )
3- The tag <i> refers to emphasized text. ( )
4- It is not important that you report the threats to a trusted adult.
( )

46
47
1) Choose the correct answer:

1) c. alt-text 2) c. </b> </b> 3) b. open-source


4) b. code 5) b. Electronic games 6) a. sleep
7) d. aggressive 8) b. headaches 9) c. both a and b
10) b. eyes 11) a. cyber bullies 12) a. enhance creative
thinking
13) d. viruses 14) a. good sleep 15) b. physical danger
16) a. entertaining 17) c. accept limits 18) b. gaining weight
19) c. personal 20) b. eight 21) a. two
information
22) c. fingerprint 23) c. security stands 24) c. Data Protection
Law
25) d. Voice 26) d. Facial 27) a. Decryption
recognition Recognition
28) c. finger (thumb) 29) c. all information 30) d. Both a and b
31) b. antivirus 32) a. accurate 33) a. Cyber security
34) d. all of them 35) c. report 36) b. spoofing
37) c. Both of them 38) d. Scare ware 39) c. three

40) c. Spoofing 41) b. swift 42) a. Maleware

43) d. all of them 44) c. security settings 45) a. Intellectual


property(copyright)
46) b. in public domain 47) b. in public domain 48) d. Creative
Commons
49) b. Stock exchange 50) b. E-trading 51) b. Robo-advisor

52) b. shares 53) a. A broker 54) b. E-trading

55) d. all of them 56) a. broker 57) a. research

58) a) Cloud 59) c) The possibility 60) b) Use secure


computing of data breaches Internet browsers

61) a) Artificial 62) b) Wi-Fi 63) a) Modem

48
intelligence
64) a) Artificial 65) a) Ports 66) a) Switches
intelligence
67) a) Virtual reality 68) b) Artificial 69) a) Virtual reality
intelligence
70) b) Augmented 71) d) Augmented 72) a) Virtual reality
reality reality
73) a) Virtual reality 74) a) Assistive 75) a) Cutting-edge
technology technology

76) a) Scanning and 77) b) Assistive 78) d) Smart gloves


reading technology
79) c) Ability to find 80) b) Improve 81) a) Usability
solution (findable someone's (usable)
independence
82) b) Databases 83) a) Library catalog 84) b) Robot
operating system
(ROS)
85) c) HTML 86) d) HTML 87) a) <p>

88) b) Use secure 89) c) Copyright 90) b) Microsoft


Internet browsers. Teams
91) d) One Drive 92) b. Networks 93) c. All of them

94) a. Artificial 95) b. Wireless 96) c. wired networks


intelligence
97) b. A modem 98) c. ISP 99) a. Cutting-edge

100) b. Credible 101) b. User 102) b. cutting-edge


experiences
103) c. use and 104) c. A library 105) b. databases
development catalog
106) d. both a and b 107) a. Android 108) b. iOS

109) d. mac OS 110) b. Apple iOS 111) b. binary

49
112) b. programming 113) b. Hyper Text 114) a. compatible
language Markup Language
115) b. operating 116) b. pre-loaded 117) c. ROS
system
118) b. Closed- 119) c. Windows 120) b. macOS
source
121) d. both a and b 122) d. Android 123) a. digital editing
tool
124) c. a and b 125) a. databases 126) a. useful

127) d. Smart gloves 128) a. positive 129) b. desirable

130) b. negative 131) d. Usable 132) c. interlinked

133) c. valuable 134) d. 3-D images 135) c. insects and


atoms
136) a. analyzing 137) c. Al 138) a. Virtual
assistant
139) d. All of them 140) b. Augmented 141) a. Virtual reality
reality
142) c. artificial 143) b. augmented 144) d. VR headsets
intelligence (Al) reality
145) a. tablet 146) a. ports 147) a. Switches

148) d. all of them 149) d. tag 150) a. </p>

151) c. hyperlink 152) a. alt-text 153) b. largest


heading
154) b. catch 155) b. <h6></h6> 156) d. web browsers
attention
157) c. top 158) a. the content 159) c. <i></i>

160) b. <strong> 161) b. Subheadings 162) a. subheading

163) c. <i> 164) b. low vision 165) b. attract


attention
166) c. cloud 167) a. A remote 168) c. Data

50
computing server encryption
169) b. fee-based 170) d. Cloud 171) a. Google Drive
computing
172) b. the internet 173) a. File 174) a. Upload
dependency
175) c. Share 176) d. all of them 177) d. Both a and b

178) c. Microsoft 179) c. Word 180) a. Data breach


Outlook
181) a. Cloud 182) a. Cloud 183) a. higher
computing computing
184) c. organize
documents

(2) Put (✔) or (✕):


1) ✓ 2) ✗ 3) ✗ 4) ✓
5) ✗ 6) ✗ 7) ✓ 8) ✗
9) ✗ 10) ✓ 11) ✗ 12) ✗
13) ✓ 14) ✓ 15) ✓ 16) ✗
17) ✓ 18) ✓ 19) ✗ 20) ✓
21) ✗ 22) ✗ 23) ✗ 24) ✓
25) ✓ 26) ✗ 27) ✗ 28) ✓
29) ✓ 30) ✓ 31) ✗ 32) ✓
33) ✓ 34) ✓ 35) ✓ 36) ✓
37) ✗ 38) ✓ 39) ✓ 40) ✓
41) ✗ 42) ✗ 43) ✓ 44) ✓
45) ✓ 46) ✗ 47) ✗ 48) ✗
49) ✗ 50) ✗ 51) ✓ 52) ✗
53) ✓ 54) ✓ 55) ✗ 56)

51
Model (1)
1) Choose the correct answer:
1- c- Outlook 3- b- eyes 3- b- create a
paragraph
4- b- ROS 5- b- wireless 6- a- One Drive
7- b- back problems

(2) Put (✔) or (✕):


1) ✗ 2) ✓ 3) ✗
4) ✗ 5) ✓ 6) ✓
7) ✗ 8) ✓
Model (2)
1) Choose the correct answer:

1) c- both of them 2) a- One Drive 3) c- data encryption


4) a- A broker 5) a- web pages 6) b- A library catalog
Complete the missing parts using the words between the brackets:
1- Malware
2- Modem
3- HTML
4- Facial Recognition
5- Assistive Technology
Put (✔) or (✕):
1) ✓ 2) ✗
3) ✓ 4) ✗

52

You might also like