University 00022
University 00022
1.3 Cables are strands of fiberglass that transmit digital data by pulses of light.
1.5 A four-part number separated by periods used to identify a computer connected to the
internet :
1.6 A separate document that describes rules used to define how the elements of the pages
in a web site will look.
1.7 Data in each database table is split into smaller units contain related information about
one item each of these units is called a
1.9 A network model in which all computers have equal authority and responsibility.
1.12 A small file that is saved to your hard drive when you visit some Web sites, and can be
used to gather data on your browsing and shopping habits is called.
1.13 Which of the following functions is valid for adding two values in Microsoft Excel?
1.14 The computer that provides services to other computers by way of the Internet is called
1.15 A window that makes it easier for users to view, enter and edit data in a database is
called
1.17 The ability of people to tap illegally into computer networks by creating a virus, worm,
or Trojan horse to damage or delete data.
1.18 Using computer code and can carry voice, data, and video on a šingle line is called.
1.21 The filtering system that opens or blocks programs and ports to keep outside data from
entering the network is called.
1.22 The Software has the ability to browse the contents of the web is called
1.23 is similar to Slide Show view, except the slides are not displayed as a full- screen.
A. Normal view B.Slide Sorter view C. Reading view D. Slide Show view
1.24 A mathematical expression in a spreadsheet software that might link numbers in cells is
called :
1.25 Print multiple slides on the same page with a space to write notes is called
Question 2. In the context of your study in this course, answer the following: (8 Marks)
Cybercrime often refers to crimes carried out by means of the Internet. Provide at least four
of Cybercrime Techniques? (2 marks)
scanning or proning
superzapping
spoof
phising
time bomb
scams
social engineering
Google Chrome
Mozilla firefox
Apple Safari
Microsoft Edge
WAN usually private, connection secure, more than browsing Web, provide access to
network resources
Regarding to this website link https://www.moi.gov.sa fill the below table? (2marks)
3.Modem speed is measured in bytes per second,or bps which is the amount of data that
can be sent in one second( F )
5 .You can disable cookies on your web browser for privacy reasons( T )
6. Failure of one Computer Or cable in a star topology brings down the entire network (F)
Question.4 Match the sentences below with letter in the following table (10 Marks):
A B C D E
Trojan horse Blog Exclusion Network Inclusion
Topology
F G H I J
Wiki Html Presentation Spoofing Max
software
K L M N O
Spreadsheet Isp SaaS Web feed Network
Software Traffic
O The electronic pulses of information sent by the network cards to carry data
.through the network wires to its destination
B Type of Web page that people create to share their thoughts and
.opinions
J .Returns the largest value from a set of values in Microsoft Excel
H Allows you to organize and display information visually so it can be viewed
.by a group of people
D Map of a network shows the physical structure of the network, including
.servers, work- stations, and other network devices
E Use plus sign (+) or the word AND to find only pages that contain a match
.for all the specific words
L .A company that provides a link from your computer to the Internet
M .Applications stored on cloud servers and can be accessed on the Internet
I .Use a false Internet Protocol (IP) or e-mail address to gain access
A Piece of software that looks legitimate typically tricked into loading and
.executing it on their computer