You are on page 1of 16

ENG : Karem Mohamed 01228712893 01228712893

THEME 2 LESSONS 3  8

FINAL EXAM REVISION

Lessons Contents
1 – Summary on all Lessons from 1  6

2 – Large Exam From 50 degree

3 – Important problems from many resources

The Resources
1 – Egyptian knowledge bank

2 – The ministry Revision questions

3 – Some External books problems


.

NAME :
…….....................................................
#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

FINAL EXAM

Q1 Choose the correct answer


50
1 – To protect your photos share it with …………….
a – Flash memory b – Low resolution c – High resolution

2 – You can navigate and reach different places using ……………………..


a – DSL b – LAN c – URL D - GPS

3 – First step to solve a problem is …………………………………….


a – Search problem b – identify problem c- Try solutions

4 – you can know the scam website by check …………..


a – URL b – buy online things c–a&B

5 – …..…… is a connection between computer and printer or router


a – Wan b – Lan c – Man

6 – The internet is ……………….. Computer Network


a – open b –closed c – public d – a&c

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

7 – You can use ………… to back up the data automatically


a – software problems b – software program c – A&B

8 – the scam websites is operating to get the …………………..


a – PII b – URL c – Facts

9- indicate ………… from the important things when you do a search.


a – reliable sources b – records and archive c – data bases

10– from the properties of Password managers


A - Create strong password C - Tell you if the password is week
B - Different password for each account D – all of them

11 - One of the forms of ............. is a message from an strange person


asking you for your data to get a prize. your account and steal you
a – internet b – Phishing c – password manager

12 –The ………… is a person who Try Obtaining an adult's bank


account number to steal their money
a - Scam websites b - Friends c – Hackers

4. You can use ....... During your trip to learn about the route or
places you want to go to.
a - GPS b – URL c – Fake online shopping

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

14 - fake websites offers you a big prize like thousands of money , car
, iphone or Playstation

a - Fake online shopping b - Scareware Websites c–


Sweepstakes

15. You can create a file by selecting ...........


a - Open Folder b- Frozen Folder c- New Folder

16 – To avoid the scam websites you have to Check for ……. or bad
grammar because real source will be well-written, with almost no
mistakes.
a – prize b – miss balls d– misspelling

17. You can open a file by selecting ...........


a - Open Folder b- Frozen Folder c- New Folder

18 – Bit can only store ………………


a – 1 or 0 b – one letter c – one word

19 – 1 kilo byte = ………..


a – 1024 Mega Byte b – 8 bit c – 1024 Giga Byte

20 - …………. Used to connect the computer to the Router

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

a - Ethernet cable b – Router c – HDMI Cable


21 - ………. Allow to use the phone and the internet at same time
a – dial up connection b – digital subscriber line c – Router

22 – school computer lab Is example of …………………..


a – closed network b – open network c – internet

23 – ……. Is the internet service provide by companies to citizens


a – ISP b – LAN c – WAN d - DSL

24 – The columns in the Excel is arranged in ………… order


a – alphabetical b – numerical c – descending

25 – The rows in the Excel is arranged in …………… order


a – alphabetical b – numerical c – ascending

26 – You can make a division process in the excel cell by enter the …....….
sign in it
a) = b) + c) /

27– when you use an image you don’t have its copyright you have to ………

A - Include the artist r photographer’s name

B - a link to the original image

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

C - what kind of copyright it is protected by

28 – You can write your researches by a proper ways like …………………


a - Take Notes b – paraphrasing c – using quotes d – all of them

29 – when taking a note put …………… on the top of the page


a – your name b – Author name c – Note title

30 - highlighted word or picture you click on to take you to web location


a – hyper link b – perma link c – linked in

Question 2 Put Right ( ) or Wrong ( X )

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

7 - Copyright protects images, music, movies, games, computer programs and


websites. ( )

8 - You should check the sites you visit on the Internet ( )

9 – EKB is from reliable source ( )

10 - To keep your personally identifiable information secure, update your


devices regularly ( )

11 – bit is the smallest measuring unit of data ( )

12 - The operating system does not allow you to add a subfolder inside a main
folder ( )

13 – it’s not good to use Anti-Virus software on your device ( )

14 – you must never share information with your friends ( )

15 – password manager used to generate strong passwords ( )

16 – you must not sign-up in websites ask more PII ( )

17 – its difficult to back up your data from external hard disk drive ( )

18 – the facts is from someone view and his experience ( )

19 – the reliable sources are well written with no grammar errors ( )

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

20 – all websites are scam websites even the online shopping websites ( )

Summary Theme 2 Lesson 3 ( Password security )

 Phishing : is a way of hacking in which the hacker is sending a message


via E-mail or social media applications that looks real, but isn’t

o Example  is a message which says that you have won a prize, but you have to
give your bank account details to get the prize.

o Example  sending file and encourage you to open then once you open the file
the virus is installed to your computer.

 Way to identify the hacking messages :


o include misspelled words,
o include grammar errors
o requests for too much personal data

 Smishing : is same thing , but is a text message instead of an email

 Password managers  program to manage password


o Create strong password
o Different password for each account
o Tell you if the password is week
o Tell you if the password you have stolen before

 Multi factor – authentication :


o It make your password more strength

o identify yourself with Two ways ( sure that no one can hack your account )

o one way by your password or personally identified number ( pin )

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

o And the second way by something you have (one time code)

Summary Theme 2 Lesson 4 (Fake Websites)

 Scam Websites : they are a fake websites asks for your PII to hack your
device or your account and steal your ( username – password – bank account )

EXAMPLES
o Fake online shopping : is a shopping websites that never send you
the correct item you bought

o Scareware Websites : fake websites that say you have a problem


and you need to download something to fix this problem

o Sweepstakes (Prize & reward) : fake websites offers you a big prize
like thousands of money , car , iphone or Playstation

 How Scam Websites operate :


o Try to draw your attention on the site
o Getting your personal information or getting access to your device.
o Exploit the information they have gained about you in a bad way
o Possibility to hack your device to make themselves money.

 How to avoid scam


websites :
o Check that the URL (Uniform Resource Locator) of the website is right.
This is basically the address of the website.

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

o Check for misspelling or bad grammar the real source will be well-
written, with almost no mistakes.

o Do a search online to see if it is a known scam. If something doesn’t


look right, it most likely is a scam website.

Summary Theme 2 Lesson 5 ( Copyrights © )

 Online Content : it is the information on the internet


( E-book - images – videos – audio – games – programs )

 Copyright  the legal right give to the creator to sell , print or


publish the thing he create , the symbol of the copy right is a letter C
inside a circle.

 Things has a Copyright :


o TV episodes on YOU-TUBE
o (Images, music, movies, games, computer software, and websites).

 Things doesn’t have copyright :


o Works in the public domain , Facts or Discoverise.
o official documents such as laws
o creative works whose owner has been dead for 50 years

IMPORTANT NOTE  to use any one work you have to do the following
o ask for a permission from the owner to use his things
o Buy that thing from the owner by giving him a money

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

 Using (Written Content) you don’t have the right to use it


o Use a few words or sentences only
o Use the same words as they are
o Or use your own style and rewrite it
o You have to mention the name of the write

 Using ( images ) you don’t have the right to use :


o Include the artist r photographer’s name
o a link to the original image

o what kind of copyright it is protected by

o If you don’t want to get permission or buy images, you can make or take
your own images instead

Public domain and Creative Commons :


Are the sources on the internet that do not fall under copyright Sources in
the public domain and with Creative Commons reuse licenses can be used
without a creator’s permission.

Summary Theme 2 Lesson 6 ( Digital Sources )

 Uses of online resources :


o Find solution to answer question
o identify solutions to a problem
o conduct study research related to a subject

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

 How to Search Online


o identifying reliable sources enable you to did your research tasks
o go to the site you want by typing the URL
o ask your teacher or a family member for help
o search sites recommended by your teacher or school ( best way )

OPINION FACTS
Based on someone view or experience come from research and observation
Statement can’t be proven statements that can be proven
Can be debated Can’t be debated
Aren’t true foe every one True foe everyone

The Importance of using multiple resources in your search


o good decision to use multiple sources in your research

o helps make sure you know all the important facts about a topic.

o if 2 websites include the same information. It means that the facts are true

o If 2 sources have different information, check that both sites are reliable.

o make sure the information is based on fact instead of opinion.

 Sources help you in your search :


o ( books , articles , notes , letters )
o ( pictures , videos )  visual information
o ( maps , graphs , info graphs )

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

o ( archives , records , data bases )

Summary Theme 2 Lesson 7 ( Advanced Search)

 Specific search terms :


o Use keyword to search
o EX ( Aswan dam ) in the previous topic is the key word
o Use Questions like ( what is the material used in Aswan dam)
o Use Quotation mark to get specific results
o Use synonyms to make your search terms more accurate

 search engines :
o suggest keywords and similar searches. Search engines
o has advanced searching tool  that limit search results

 Search results :
o Scan the summary for each search result

o Look for titles connected to your topic and keywords in bold

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

o Scan for facts that answer your research questions.

o Choose the results that have many of these items

o Then click on each possible source and skim the content

o Look for titles, headers, and keywords match your research topic

o Choose the sources with the best match

Summary Theme 2 Lesson 8 Documenting Information

 Search sources by keyword


o type CTRL + F
o enter the term in the search box
o The keyword will highlighted everywhere it appears on the page

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

 Writing your research in a proper way


1) Take Notes  ‫تدوين المعلومات فى ملحوظات‬
o Add the URL For each source
o The author’s name at the top of your notes
o Reread each note. If information is missing,
o Return to the source and find the missing information
o Use quotation marks to add exact words to your notes.

2) Paraphrasing  ‫تلخيص المعلومات‬

o use your own words to explain the ideas of the writer


‫استخدمك كلماتك الخاصه فى شرح افكار الكاتب‬
o change some of the vocabulary words
‫غير بعد مترادفات الكلمات حسب طريقتك الخاصه‬
o Arrange the order of the ideas and the structure of sentence
‫رتب االفكار و تراكيب الجمل‬
o By paraphrasing, you are showing respect for the author’s work.
‫التلخيص يعرض تقديرك و احترامك ألعمال الكاتب‬

3 ) Using quotes  ‫استخدم اقوال مأثوره‬

o Quotes support your ideas and arguments. When you include a


quote, you state where the quote came from and why you are using
it. You can use sentence starters to share this information.

#FULL_MARK_IS_OUR_TARGET
ENG : Karem Mohamed 01228712893 01228712893

‫االقتباسات تدعم أفكارك عندما تقوم بأقتباس فإنك تذكر من أين جاء االقتباس ولماذا تستخدمه‬

4) Citing sources  ‫األستشهاد بمصادر‬


o At the end of search list all citations on work cited page
‫فى نهاية البحث اذكر المصادر التى استشهدت بها فى صفحة االستشهادات‬

oIf the citation was from online website mention the permalink
‫اذا كان االقتباس من موقع على االنترنت اذكر رابط الموقع‬

o Perma link  is a permanent hyperlink, a highlighted word or picture


you click on to take you to another web location

#FULL_MARK_IS_OUR_TARGET

You might also like