0%

امتحان مهارات حاسوب وتعلم الكتروني – النموذج الثاني

امتحان مهارات حاسوب وتعلم الكتروني هو امتحان تجريبية يشابه امتحان الجامعة من حيث نمط الاسئلة وطبيعة تقديم الامتحان، الأسئلة عليها إجابات قد تحتمل الصواب وقد تحتمل الخطأ فإن أصبنا فما هو إلى توفيق من الله ،وإن أخطأنا فمن أنفسنا والشيطان.

 

معلومات عن الامتحان ||

  • يتكون الامتحان من 30 سؤال.
  • المدة الزمنية لتقديم الامتحان 60 دقيقة.
  • بعد الانتهاء من تقديم الامتحان ستظهر نتيجتك بالإضافة لاجابتك على الاسئلة وستظهر الاجابات الصحيحة للأسئلة ايضاً.

 

لجنة سنافر البوليتكنك تتمنى لكم التوفيق ❤️

1 / 30

Consider a Mesh network,If the number of cables is 6,then how many extra cables are needed if one computer is added?

2 / 30

Which one of the following statements is ?TRUE about a tablet

3 / 30

Phishing is:

4 / 30

which of the following may need to be installed to use certain online collaborative tool

5 / 30

The most important ethical aspect of social media is:

6 / 30

To remove the password from a MS Excel

7 / 30

…is used to refer to the processed data

8 / 30

LMS stands for

9 / 30

Increased use of collatative tools requires sharing information with aipt of people. This creates a risk of sensitive data. what and of risk is that?

10 / 30

The best transmission media for connecting two campuses:

11 / 30

Bluetooth is

12 / 30

Which of the following is NOT an example of the benefits of using online collaboration tool

13 / 30

Which of the following is true regarding secure password

14 / 30

LMS stands for:

 

15 / 30

Which one of the following would most likely provide a free Internet access in cafes

16 / 30

Which of the following is an example of using an online collabotative tool

17 / 30

To compare the wireless connection with internet mobile which of the following statements correct

18 / 30

ICT stands for

19 / 30

is an umbrella term that…………….refers to any malicious software

20 / 30

occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial b benefits.

21 / 30

a group of computers are linked together with equal permissions and responsibilities for processing data this non-hierarchy network is called

22 / 30

Renters password we must

23 / 30

The 8-digit number 02062014 is………before processed

 

24 / 30

The Mobile device

25 / 30

what is the keyword that is used within a post on social media to help those who may be insterested in your topic to be able to find itwhen they search for

26 / 30

occurs when someone uses your……. personal identifying information and pretends to be you in order to commit fraud or to gain .other financial benefits

27 / 30

Training needs to be delivered in as short a time frame as possible with maximum results). This characteristic refers to:

28 / 30

The Internet is:

29 / 30

Persons who use their computer expertise to break through the security levels of a computer system or network

30 / 30

Type of malware caused in high telephone bills

Your score is

0%