0%

امتحان مهارات حاسوب وتعلم الكتروني – النموذج الثاني

امتحان مهارات حاسوب وتعلم الكتروني هو امتحان تجريبية يشابه امتحان الجامعة من حيث نمط الاسئلة وطبيعة تقديم الامتحان، الأسئلة عليها إجابات قد تحتمل الصواب وقد تحتمل الخطأ فإن أصبنا فما هو إلى توفيق من الله ،وإن أخطأنا فمن أنفسنا والشيطان.

 

معلومات عن الامتحان ||

  • يتكون الامتحان من 30 سؤال.
  • المدة الزمنية لتقديم الامتحان 60 دقيقة.
  • بعد الانتهاء من تقديم الامتحان ستظهر نتيجتك بالإضافة لاجابتك على الاسئلة وستظهر الاجابات الصحيحة للأسئلة ايضاً.

 

لجنة سنافر البوليتكنك تتمنى لكم التوفيق ❤️

1 / 30

To remove the password from a MS Excel

2 / 30

occurs when someone uses your……. personal identifying information and pretends to be you in order to commit fraud or to gain .other financial benefits

3 / 30

Renters password we must

4 / 30

Which of the following is an example of using an online collabotative tool

5 / 30

which of the following may need to be installed to use certain online collaborative tool

6 / 30

occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial b benefits.

7 / 30

LMS stands for

8 / 30

ICT stands for

9 / 30

Which of the following is NOT an example of the benefits of using online collaboration tool

10 / 30

The best transmission media for connecting two campuses:

11 / 30

what is the keyword that is used within a post on social media to help those who may be insterested in your topic to be able to find itwhen they search for

12 / 30

Phishing is:

13 / 30

The Mobile device

14 / 30

Which one of the following statements is ?TRUE about a tablet

15 / 30

LMS stands for:

 

16 / 30

Which of the following is true regarding secure password

17 / 30

Type of malware caused in high telephone bills

18 / 30

is an umbrella term that…………….refers to any malicious software

19 / 30

Bluetooth is

20 / 30

…is used to refer to the processed data

21 / 30

a group of computers are linked together with equal permissions and responsibilities for processing data this non-hierarchy network is called

22 / 30

The Internet is:

23 / 30

Which one of the following would most likely provide a free Internet access in cafes

24 / 30

Persons who use their computer expertise to break through the security levels of a computer system or network

25 / 30

The 8-digit number 02062014 is………before processed

 

26 / 30

Consider a Mesh network,If the number of cables is 6,then how many extra cables are needed if one computer is added?

27 / 30

To compare the wireless connection with internet mobile which of the following statements correct

28 / 30

Training needs to be delivered in as short a time frame as possible with maximum results). This characteristic refers to:

29 / 30

Increased use of collatative tools requires sharing information with aipt of people. This creates a risk of sensitive data. what and of risk is that?

30 / 30

The most important ethical aspect of social media is:

Your score is

0%