You are on page 1of 32

It consumes very large amounts of electricity, occupies a very large space and it needs special cooling

systems that result in huge temperature These characteristics for


Minicomputer
Mainframe Computer
Supercomputer
Microcomputer

is a set of electronic lines through which exchanges are madebetween computer components.....
Function recorders
Arithmetic logic unit
CPU
Buses

The result of converting 50 from decimal to octal is 62


T
F

It is a set of software that controls the operation and management of-computers


System software
Application software
Programming Language
Open source software

The result of converting (3BF) from hexa to binary is 001110111111


T
F

They are the physical devices that are connected to each other to form a computer
Human
Hardware
Microphone

The result of converting this number 42117248 from kb to gb


23
40
41
Input units are responsible to display the information that is stored in the computer
T
F

Human is more accurate comparing to computers


T
F

Microwaves are used in networks:


Wireless media
Wired media
All above answer are correct

It can net eavesdrop and information wes stolen


Twisted Par
Coaxial Cable
Fiber optics

Communication via audio conferencing are of the types:


Synchronous communication
Asynchronous communication
All above answers are false

From closed source antivirus software


Equivalent program.
Microsoft security essential.
Windows Defender.

One of the benefits of using computer networks


Sharing programs, data and information
Sharing devices
All above answers are correct

It work depends on the presence of the main cable


Ring Network
Bus network
Star network
The types of networks In terms of communication media:
Wired and wireless
Private and public networks
Local and Wide area networks

A program that helps in managing, monitoring and evaluating e-learning and training and does not
focus too much on content
Courses Mnagement System(CMS)
Learning Mangement System (LMS)
All above answers are false

The Pascal computational machine for addition and subtraction was developed during . . . stage of
computer development
First
Third
Second

An example of an open source electronic learning management system


Moodle system
Tadarus
Blackboard

Big and Heavy Weight Monochrome Screen:


LCD Screen
CRT Screen
PLASMA Scree

The emergence of multi-core processors in the.....generation


Fifth
Third
Second

Processor speed is measured in multiples of:


Hz
Bit
Byte
AGP slot in the motherboard used for:
Sound card
Screen card
Network card

Arithmetic and logical operations are performed in:


CPU unit
Input unit
Output unit

Networks is appeared in the first time in the... ... generation:


Third generation
Fourth generation
Fifth generation

Is influenced by emotion and external influence


The human
The computer
All about answers are the

Is the types of computers according to the method of processing:


Digital computer
Analog computers
All options are correct

Is influenced by emotion and external influences:


The human
The computer
All above answers are false

..Is an example of input unit


Scanner
Printer
Plotter devices
The decmal system uses the set of numbers
From 0 to9
From 1 to 10
A above answers are talse

Is one component of CPU unit


Arithmatic and logical unit
Input and output unit
All options are correct

A group of software that controls the operation and management of the computer, programs and
peripheral devices:
Application software
Utility software
System software

Is an example of non-conventional input units


Microphone
Light pen
All above answers are true

Among the goals of e-learning:


Increasing opportunities for learning
Enable students to self-learn
All the above answers are correct

The most famous Arab open education platforms:


Whatsapp
Shams
Google

Components that are Required to make a local Network:


Connecting cards
Network Operating System to manage and control devices
All above answers are correct
Is a non-interactive sites:
Static site
Dynamic Sites
All above answers are correct

That program that allows you to view web pages and images over the Internet:
Word processor software
Web browser software
All above answers are correct

Is one of computer units that perform processing:


Input unit
System unit.
Output unit.

The most famous examples of search engine


Google
Amazon
All above answers are correct

An example of asynchronous communication is in e-learning


Video conferencing
E-mail
Audio conferencing

Is a type of wired communication media whereas the weakness of signals is very low:
Fiber Optics
Coaxial Cable
Twisted Pair

It is a protocol that helps the user to transfer files and data on the Internet:
HTTP
FTP
All above answers are correct
When the internet address ends by goV:
Government sites
Commercial sites
Educational sites

...................is a program that translates the source program into a program in machine language,
sentence by sentence to be executable.
Compiler
Interpreter
Assymbilar

E-commerce can be defined, according to the World Trade Organization, as:


"E-commerce" is the process of selling, buying, or exchanging products, services and information
using electronic media such as internal computer networks and the Internet.
E-commerce: includes activities of production, distribution, marketing, sale and delivery of goods and
services to the buyer via electronic media.
All above answers are false

Of the components of the educational content management system:


Learning Object Repository.
Dynamic connection interface.
All above answers are correct

Infects the hard disk and drivers by infecting the boot sector:
File viruses
Boot sector viruses
Mecro viruses

None of methods to get spyware:


Through fiber cables.
Through email.
Through electronic chat sessions.

is a type of search that using different search engines and then displays the results to the user?
Meta-Search Engine
Yahoo.com
Directories search
is not a MALWARE program.
Viruses
Spyware
Worms

From Arab Open Learning Platforms:


Khan
Academy
Edraak

Gamfication is:
Interactive electronic learning.
Supports virtual classes.
All above answers are false.

Is a one of concealment strategy that transforms and rewrites itself at every repeat, making it more
difficult to detect, and working on a strategy that changes its software, and reassembles itself into an
executable form
Polymorphic Virus
Encrypted Virus
Metamorphic Virus

Among of the drivers of penetration:


Obtaining money by stealing bank information
Obtaining personal information for blackmail
All above answers are correct

Is one of output devices only


Touch screen
Printer
All options are correct

Among the advantages of the virtual classroom system on the Blackboard Ultra platform:
There is no need to install the Java program
High quality web conferencing
All above answers are correct
One of the features of the blackboard system
Open source platform
Its integration with Shams platform
All above answers are correct

A computer cannot operate without:


AntiVirus
Application software
Operating system

Computer performance is measured by:


CPU speed
RAM capacity
All above answers are correct

Is one of the main functions of operating system


Operation control
Processor management
All the options is correct

This generation was characterized by the emergence of Fortran and Cobol:


Second generation
Third generation
Fifth generation

One numerical system that used the digits from 0 to 9 and letters from A to F
Binary system
Decimal
Hexadecimal system

Is an example of operating system


Linux
PowerPoint
All options are correct

As computers evolve...
They become faster
Their storage capacity increase
All above answers are true
Headphones is classified as
Conventional (Standard ) output unit
Non Conventional (Non Standard ) output unit
Conventional (Standard ) Input unit

Special temporary storage sites that are used when executing a program:
Registers
Control unit
Arithmatic and logical unit

Laser printers are classified as:


Output unit device only
Input and Output unit device together
Input unit device

One of types of computers commonly used in universities and banks:


Mainframe computers
Micro computer
Supercomputer

Integrated circuits were used in.... generation of computers:


Third
Fourth
First

Is an example of commercial protection protocols


Hypertext Transfer Protocol (HTTP)
First Virtual Holding
All above answers are correct

The buying and selling operations that take place between businesses are one of the e-commerce
classifications according to:
Nature of the activity
The nature of the transactions
All above answers are false
The data inside the computer is represented by encoding ... .. which converts letters and numbers into
pulses:
Binary system 0,1
Hexadecimal system
Decimal system

The unit responsible for managing all computer operations:


Arithmatic and logical unit
Input and Output units
Control unit

Communication throght blogs is a type of:


Asynchronous communication
Synchronous communication
All above answers are false

From the fields of e-commerce according to the nature of the transactions


Business to business
E-marketing
Specialized services

Some of the advantages of e-commerce:


Available anytime and anywhere
Ease of access
All above answers are correct

Payment systems used in e-commerce:


Bank transfers
(Debit Card)
All above answers are correct

Among the features of Windows 10 :


The loading speed
Microsoft stor
All above answers are correct
The document can be saved in MS.Word by pressing:
Ctrl +H
Ctrl +V
Ctrl +S

PowerPoint files extension:


pdf
doc
ppt

You can delete a file in Windows by selecting the file and pressing:
DEL button
CTRL+ C button
All above answers are false

Is an example of cloud computing services


E-mail
Google drive
All above answers are correct

Is type of registrars in which data are deal with in terms of storage, mathematical and logical
operations:
Cases registrars
Address registrars
Data registrars

is a program that aims to collect personal information about an individual or organization without their
knowledge, which may cause data theft and slow down the computer.
Hackers
malicious programs
Spyware.

Among the characteristics of the second generation of computers:


Use of vaccum tubes.
Transistor use.
Use of integrated circuits.
Among the tools of asynchronous communication in e-learning:.
Video conferencing
Conversation.
Wiki.

The first virus to be transmitted via e-mail is:


LOVE Virus
My Doom.
Melissa virus

It is the ability to access information inside the device illegally:


Viruses.
Penetration.
Spyware programs.

One type of wired media that are cheap, easy to install, and the most used media is:
Coaxial Cable
Fiber Optics
Twisted Pair

To copy the format, we use the following icon:

A
B
C
PS / 2 port is used to connect.............
The microphone device.
Computer mouse.
A computer with the network, whether local or global.

E-learning levels at the University of Bisha include


Open e-learning
Free e-learning
Supportive e-learning .

The process of communication between devices in the internet is governed by a protocol


TCP/IP
IGMP
All above answers are false

Of the functions of learning management systems:


Publish the scientific material
Authoring application
Authoring educational programs

One of the computer component is..........


Hardware
Data and information
All options are correct

It can not eavesdrop and information was stolen.


Twisted Pair
Coaxial Cable
Fiber Optics

Computer performance is measured by:


Processor Speed
Capacity and speed of random memory
Speed and size of the hard disk
All answers are correct
E-learning content is given using:
Interactive electronic materials
Electronic simulation
All above answers are correct

Shams platform aims to achieve:


Contribute to the quality of continuing education
Improving the quality and accessibility of teaching resources
All above answers are correct

Payroll, attendance and leave programs are example of:


General purpose applications.
Special purpose applications.
Device Drivers

Is the oldest printer


Ink jet printer
Multi-function printer
Dot matrix printer

One of the characteristics of the second generation of computers:


Use of vacuum tubes
Use of integrated circuits
Use of transistor

It is a special temporary storage unit used when executing a program:


Arithmatic and logical unit
Register unit
Control unit

Is a type of Bus that used to assign addresses different places in the memory or input and output
ports.
Address Bus
Control Bus
Data Bus
Is one of fields that the human distinction on the computer:
Ability to think freely
High speed
Accuracey

One of the advantages of open source software:


It is not free and can be modified on them
Allow addition and modification to it
All above answers are false

The computer displays the information resulting from the processing using:
Output devices
Input unit
Storage unit

It displays the information generated by the processing operations by different ways


Input unit
Output unit
Storage unit

.......was used with first-generation computers.


Machine language
Pascal language
Python language.

One of the oldest types of printers


Dot matrix printers
Inkjet
Laser printer
D Printers 3

:How Many Bit in 5 KB


5x8
5
5x1024x8
5x1024
The Processor speed is measured in a unit called
GHZ
Byte
Bit
All answers are correct

It is Not a Storge Unit


Hard Disk
CD
Flash Memory.
Non of the bove

Microphone is a
Input Unit
Output Unit
Input and Output Togother
Non of the bove

Hard Disk is the example of


Internal Storage
External storage
Output Unit
Input Unit

It is considered the most economical, clear and fast printer:


Ink jets printer
Dot matrix printers
Laser printers

Keep the data of operating system and does not lose its contents when the power is off:
ROM
Register
RAM
Is a forms of micro-computer:
Portable
Super Computer
All above answers are true

This type of computer is used to serve banks and airlines


Microcomputer
Mainframe
Super computero

A temporary memory resides inside the processor called:


Cache
RAM
ROM

ATM networks is an example of:


Wide Area Network
Local Area Network
All above answers are correct

It means all units, devices and accessories that make up the computer
Hardware
Software
Programming Languages
Applications Software

It is a protocol that helps the user to transfer files and data on the Internet:
All above answers are correct
HTTP
FTP

Lost its contents when the power is off


RAM
ROM
Hard Disk
CPU
Unit responsible for all Mathematical Operations
Buses
ALU
Registrars
CU

Of the components of the educational content management system:


Learning Object Repository.
Dynamic connection interface.
All above answers are correct

Among the interactive tools in the virtual classroom are:


Electronic whiteboard
E-mail
All above answers are false

1. Control panel is used for [a]


a) Computer Settings
b) Change Operating system
c) Both a & b
d) none

2. From where we can uninstall the program. [b]


a) Start
b) Control panel
c) Task bar
d) Desktop

3. Recycle Bin is used for [a]


a) Deleted item
b) Store Data
c) View Pictures
d) all of these

4. How many options in shut down button. [d]


a) Logoff
b) Switch user
c) restart
d) all of these
5. How to change the language from desktop English to Arabic [b]
a) Title Bar
b) Task bar
c) Right click desktop
d) all program

6. Shift+Alt is used for [c]


a) Change theme
b) Change Color
c) Change Language
d) Change Settings

7. Win+E is used for [b]


a) Open Document
b) open Computer
c) Close Computer
d) Close Desktop

8. Windows key is used for [a]


a) Open Start programs
b) Close Start programs
c) Show desktop
d) none

9. We can change printer settings from [d]


a) Control panel
b) Devices and Printers
c) Task bat
d) Both a & b

10. How to change desktop background Theme. [d]


a) Desktop –personalize
b) Control panel- personalize
c) Desktop- gadgets
d) both a & b
11. How to change Screen Resolution. [b]
a) Personalize
b) Screen Resolution
c) Start button
d) task bar

1 Which is the input and output units together


A. Touch screen
B. HDD
C. All of the above is true

2 The computer cannot operate without:


A. Operating system.
B. Application software.
C. Protection software.

3 The decimal system uses the set of numbers


A. From 0 to 9
B. From 1 to 10
C. None of the above

4 The emergence of multi-core processors in the generation:


A. II
B. The third
C. Fifth

5 The scanner is one of the following:


A. Input
B. The output
C. Input and output together

6 This system allows one user to run one program or perform one operation at the same time:
A. Single user and multi-tasking systems
B. Single user systems, one task
C. None of the above
7 A program that translates the source program into a sentence to be executable:
A. The compiler
B. The interpreter
C. None of the above

8 Calculators are divided according to size into:


A. Special Calculators
B. Medium Calculators
C. None of the above

9 It displays the information resulting from the processing operations using multiple methods
A. Input units
B. Output units
C. Volumes

10 Processor speed is measured by:


A. Kilobytes KB
B. Terabyte TB
C. Hertz

11 types of calculators according to data type


A. Special Purpose Calculators
B. Calculators with serial processing
C. Analog Calculators

12 has hundreds of thousands of processors working together


A. Large Calculators
B. Medium Computing
C. Supercomputers

13 Arithmetic and logical operations are performed in:


A. CPU
B. The memory unit
C. Output unit
14 The design of the first generation computers was based on:
A. Discharged valves
B. Transistor
C. Integrated circuits

15 The first appearance of ROM and temporary memory was in computers:


A. The third generation
B. The fourth generation
C. Fifth generation

16 CPU components
A. Secondary memories
B. Recorders
C. All of the above is true

17 programming languages close to human are:


A. Low-level languages
B. High-level languages
C. All of the above is true

18 unconventional input modules


A. The microphone
B. The light pen
C. All of the above is true

19 of the oldest types of printers


A. Dot matrix printers
B. Inkjet printer
C. Multifunctional printer

20 cache memory located in the processor called:


A. RAM
B. ROM
C. Cache
Mechanical and electromechanical computers appeared in the ……of computer development:
Second stage
Third stage
First stage

Operating and Managing more than one processor at the same time:
Multiprocessing operating system
Multitasking operating
All about answers are false

Technology used in the first generation computers is ....


Integrated Circuits
Vaccum tube
Transistor

Each alphabetical letter or symbol on the keyboard is represented on the computer by a group
consisting of . when using UNICODE.
Six binary numbers
Eight binary numbers
Foure binary numbers

Once the computer is turned on the operating system loads most of its commands and functions from
……memory:
RAM
ROM
All above answers are false

High-level programming languages such as Lisp and PL /1 have appeared in:


Fourth generation
Third generation
Second generation
One example of Single user-Single task operating system:
Windows.
DOS.
Linux.

Windows operating system is one of the…………


Free operating system
Non-free operating system
All above answers are correct

Is one of free operating system


Windows
Ubuntu
MAC

One example of Shareware is


Adobe Photoshop
LibreOffice.
All above answers are false

Shareware is
distributed for free on a permanent basis
Software that is not protected by copyright law
Programs are distributed free of charge for the purpose of trying them for a specific period of time

It is a not feature of the third generation


Use of vaccum tube
Use of transistor
All above answers are correct

Is one of system software


Utility software
Database
All option are correct
Is an example of application software:
word software
Programming languages
Systems software

Real time operating system is used in....…


Applications for managing and sharing networked devices, data and informati
Industrial, medical and airport control applications.
All above answers are false

Is one of input and output unit


Touch screen
Fingerprint reader.
3D printer.

To protect the computer from the viruses:


Do not use an infected flash memory
Update the operating system
All above answers are correct

It is part of a program that is intentionally hidden inside a desirable program:


E-mail worms
Trojan Horses
All above answers are false

Operating sector viruses are among the types of viruses according to:
Speed of spread
The size of the damage.
Goal based classefication

Non of malware (mulware) programs


Spyware
Viruses
Worms
It is transmitted by TCP / IP protocol.
Worms
Trojan hourses
Viruses

Types of penetration:
Hacking of servers of companies or government agencies through penetrating the government fire
walls.
Hacking personal devices and tampering with the information they contain
All above answers are correct

A component of information security.


Integrity
Risks
Threats

From commercial electronic learning management systems


Tadarus
Moodle
All above answer are correct

The boot sector viruses is:


These are viruses that infect the basic boot program on the disk
These are viruses that infect the basic boot program on the memory
All above answers are correct

From mechanisms of viruses


The execution phase
The propagation phase
All above answers are coorect

From computer ethics


Ethics of using a computer between a person and himself
Ethics of using a computer between a person and a third party
All above answers are correct
Non of the ways to present e-learning content:
Interactive electronic materials that include text and animation.
Electronic Simulation.
Virtual classes.

Works with Windows 8 and above:


Windows Defender Program
Microsoft Security Essentials
All above answers are correct

Networks are classified based on:


Geographic network coverage
How to connect network components together
All above answers are correct

The most important reasons to infection with viruses:


File backup
Download secure file
Open Email from unknown and virus-infected emails

It is not a type of non-synchronous e-learning:


Wiki.
Forum / Discussion Board.
Video Conference

Is an example of open source E-learning systems:


ATUTOR
Tadarus
Blackboard

Safety is defined as:


It is the provision of protection to ensure the user's safety from exploitation or extortion.
Providing protection to ensure the security of information, data and personal privacy.
All above answers are correct
Types of networks according to connection method:
Local area networks
Wide area networks
Ring networks

Is one example of anti-viruses programs


MS Word
Photoshop
All above answers are false

Are a group of equivalent devices directly connected to each other


Peer to Peer networks
All above answers are correct
Client and Server Network

Non of the ways to present e-learning content:


Virtual classes.
Electronic Simulation.
Interactive electronic materials that include text and animation.

Green Icon in Microsoft Security Essentials indecate that:


The situation is not protected
The computer is in a very dangerous
The computer's security condition is

Viruses are:
Small program programmed to damage a computer.
Part of a program that is intentionally hidden within a desirable program segment.
Programs that reproduce themselves but do not contaminate other programs.

Computer specialists or experts in illegal activities:


Ckracks
Hackers
From scan options in Windows Defender are:
Quick scan
Full scan
All above answers are correct

Dynamic websites are classified into types of websites according to:


Interact with the user
Only the owner of the site
All above answers are false

From symptoms of infection with viruses


Some files are damaged
Save files automatically
All above answers are false

Computer is a
a) Mechanical device
b) Electronial devce
c) Electrical device

Which one is read only memory


a) RAM
b) ROM
c) Hard disk

choose the odd one


a) flash
b) touch screen
c) mouse

which is input and output unit to gather


a) Mouse
b) Printer
c) Camera

Perform all arithmetical and logical operation


a) Control unit
b) Printer
c) ALU
It’s a protocol that helps the user to transfers files and data on the internet
ATP
TCP / IP
all about answers are correct

………is an example of a program that allows free use for a specified trial period After the period ends
the trial program will stop working fully or partially
Filzip
Adobe photoshop
LipreOffoce application

In Excel , the AVERAGE function is used to find


Average values for a group of cells
Sum of the values of a group of cells
All about answers are false

……it is a type of computing in which operations are performed on a number of different computers
located anywhere, as needed, over the internet
Cloud computing
Grid computing
All about answers are correct

Among the commercial security protocols related to networks security:


Net cach protocol
SSL protocol
All about answers are correct

Of the payment system in e-commerce


The traditional payment method
Bank debit card
All about answers are correct

Wired communication not including……….?


Optical fiber
Coaxial cable
Microwave
Used to record audio material from an external device for a computer:
VGA port
Audio in
All about answers are false

From Excel features:


Display tabular date
Create accurate graphs
All about answers are correct

Is a type of main memory that is programmable and erasable memory


ROM
EPROM
EROM

OER is a type of:


Open source systems
Open Educational resources
Educational contact management system

……is a one of the viruses mechanisms


Execution phase
Dormant phase
All about answers are correct

Computer performance is measured by:


Display screen size
Printer speed
All about answers are false

Software that allows adding and modifying software are:


Open source software
Free software
Sharing software

Among the basic functions of the operating system:


Operating monitor
Processor management
All about answers are correct

You might also like