0% found this document useful (0 votes)
10 views4 pages

University 00022

The document contains a series of multiple-choice questions and answers related to computer science and technology concepts, covering topics such as databases, networking, and web browsers. It also includes questions about cybercrime techniques, differences between the internet and WAN, and a matching exercise related to various technology terms. Additionally, there are true/false statements regarding technology concepts and a table to fill out based on a provided website link.

Uploaded by

aay59347
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views4 pages

University 00022

The document contains a series of multiple-choice questions and answers related to computer science and technology concepts, covering topics such as databases, networking, and web browsers. It also includes questions about cybercrime techniques, differences between the internet and WAN, and a matching exercise related to various technology terms. Additionally, there are true/false statements regarding technology concepts and a table to fill out based on a provided website link.

Uploaded by

aay59347
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Question.

1 Choose the Correct Answer (One Answer is Correct) (25 Marks)

1.1 1.2 1.3 1.4 1.5


C C A D C
1.6 1.7 1.8 1.9 1.10
B C A D B
1.11 1.12 1.13 1.14 1.15
C B A D B
1.16 1.17 1.18 1.19 1.20
A A C D B
1.21 1.22 1.23 1.24 1.25
C B C A D

1.1 is an ordered list of selected records and fields in an easy-to-read format in a


database.

A. Table B. Form C. Report D. Query

1.2 A is text or a combination of numbers and text in a spreadsheet software.

A. Formulas B. Value C. Label D. Date

1.3 Cables are strands of fiberglass that transmit digital data by pulses of light.

A. Fiber-optic B. Twisted pair C. Bus D. Star

1.4 High-frequency radio waves signals were used to relay long-distance


telecommunications.

A. Infrared B. Twisted pair C. . Bluetooth D. Microwave

1.5 A four-part number separated by periods used to identify a computer connected to the
internet :

A. ISP B. VIP C. IP address D. HTML

1.6 A separate document that describes rules used to define how the elements of the pages
in a web site will look.

A.CSC B.CSS C.IP D.SSC

1.7 Data in each database table is split into smaller units contain related information about
one item each of these units is called a

A.Fields B. Table c Record. D. Form

1.8 Program allows authorized users to access a network in an emergency situation by


skipping security measures.

A. Superzapping B. Time Bombs C. Scanning D. Scams

1.9 A network model in which all computers have equal authority and responsibility.

A. Client/Server B. DSL C. MAN D. P2P


1.10 The amount of data that can be sent through a modem or network connection.

A. modulation B. Bandwidth C. WAN D. LAN

1.11 A is a collaborative Web page that anyone can edit.

A. Blog B. HTML C. Wiki D. Podcast

1.12 A small file that is saved to your hard drive when you visit some Web sites, and can be
used to gather data on your browsing and shopping habits is called.

A. OS B. Cookie C. Web Page D. Firewall

1.13 Which of the following functions is valid for adding two values in Microsoft Excel?

A. =SUM(A1:A2) B. =count(A1:A2) C. =SUM(A1+A2) D. = ADD(A1+A2)

1.14 The computer that provides services to other computers by way of the Internet is called

A. Internet Client B.DSL C. Gateway D. Internet Server

1.15 A window that makes it easier for users to view, enter and edit data in a database is
called

A. Tables B. Forms C. Label D. Reports

1.16 Sending information over a telephone network is called,

A. Telecommunications B. SAN C. Cloud Computing D. Wireless

1.17 The ability of people to tap illegally into computer networks by creating a virus, worm,
or Trojan horse to damage or delete data.

A. Cybercrimes B. Cookie C. Firewall D. Web Site

1.18 Using computer code and can carry voice, data, and video on a šingle line is called.

A. File extension B. WAN C. Digital connections D. local loop

1.19 Is a wireless technology that works over short distances?

A. Fiber optical B. Bandwidth C. analog system D. Infrared

1.20 Each separate piece of data that is stored in a record is called

A. Table B. field C. Record D. Report

1.21 The filtering system that opens or blocks programs and ports to keep outside data from
entering the network is called.

A. Web Browser B. DSL C. Firewall D. Ethernet

1.22 The Software has the ability to browse the contents of the web is called

. A. PowerPoint B. Web Browser C. DSL D. ISP

1.23 is similar to Slide Show view, except the slides are not displayed as a full- screen.
A. Normal view B.Slide Sorter view C. Reading view D. Slide Show view

1.24 A mathematical expression in a spreadsheet software that might link numbers in cells is
called :

A. Formulas B. Calc C. Functions D. Sheet

1.25 Print multiple slides on the same page with a space to write notes is called

A. Notes B. Normal C. Label D. Handouts

Question 2. In the context of your study in this course, answer the following: (8 Marks)

Cybercrime often refers to crimes carried out by means of the Internet. Provide at least four
of Cybercrime Techniques? (2 marks)

scanning or proning

superzapping

spoof

phising

time bomb

scams

social engineering

Provide two examples of Web Browsers? (2 marks)

Google Chrome

Mozilla firefox

Apple Safari

Microsoft Edge

Whet are the differences between the internet and WAN?(2marks)

Internet Public, and connection not secure

WAN usually private, connection secure, more than browsing Web, provide access to
network resources

Regarding to this website link https://www.moi.gov.sa fill the below table? (2marks)

Domain name WWW.moi.gov


Country SA
Protocol Https
TLD Gov
Question,3 Write(true)if the statement is correct,(false)if the statement is wrong(7marks)

1.Animation can help make a powerpoint presentation more dynamic( T )

2.Database has ons or more tables.( T )

3.Modem speed is measured in bytes per second,or bps which is the amount of data that
can be sent in one second( F )

4. Impress program is an example of spreadsheet software( F )

5 .You can disable cookies on your web browser for privacy reasons( T )

6. Failure of one Computer Or cable in a star topology brings down the entire network (F)

7. The following example is an ascending order of data (A - B - D – E) (T )

Question.4 Match the sentences below with letter in the following table (10 Marks):

A B C D E
Trojan horse Blog Exclusion Network Inclusion
Topology
F G H I J
Wiki Html Presentation Spoofing Max
software
K L M N O
Spreadsheet Isp SaaS Web feed Network
Software Traffic

O The electronic pulses of information sent by the network cards to carry data
.through the network wires to its destination
B Type of Web page that people create to share their thoughts and
.opinions
J .Returns the largest value from a set of values in Microsoft Excel
H Allows you to organize and display information visually so it can be viewed
.by a group of people
D Map of a network shows the physical structure of the network, including
.servers, work- stations, and other network devices
E Use plus sign (+) or the word AND to find only pages that contain a match
.for all the specific words
L .A company that provides a link from your computer to the Internet
M .Applications stored on cloud servers and can be accessed on the Internet
I .Use a false Internet Protocol (IP) or e-mail address to gain access
A Piece of software that looks legitimate typically tricked into loading and
.executing it on their computer

You might also like