0%

امتحان مهارات حاسوب وتعلم الكتروني – النموذج الثاني

امتحان مهارات حاسوب وتعلم الكتروني هو امتحان تجريبية يشابه امتحان الجامعة من حيث نمط الاسئلة وطبيعة تقديم الامتحان، الأسئلة عليها إجابات قد تحتمل الصواب وقد تحتمل الخطأ فإن أصبنا فما هو إلى توفيق من الله ،وإن أخطأنا فمن أنفسنا والشيطان.

 

معلومات عن الامتحان ||

  • يتكون الامتحان من 30 سؤال.
  • المدة الزمنية لتقديم الامتحان 60 دقيقة.
  • بعد الانتهاء من تقديم الامتحان ستظهر نتيجتك بالإضافة لاجابتك على الاسئلة وستظهر الاجابات الصحيحة للأسئلة ايضاً.

 

لجنة سنافر البوليتكنك تتمنى لكم التوفيق ❤️

1 / 30

Phishing is:

2 / 30

Renters password we must

3 / 30

To remove the password from a MS Excel

4 / 30

Which of the following is an example of using an online collabotative tool

5 / 30

To compare the wireless connection with internet mobile which of the following statements correct

6 / 30

The Internet is:

7 / 30

what is the keyword that is used within a post on social media to help those who may be insterested in your topic to be able to find itwhen they search for

8 / 30

The Mobile device

9 / 30

Which one of the following would most likely provide a free Internet access in cafes

10 / 30

Training needs to be delivered in as short a time frame as possible with maximum results). This characteristic refers to:

11 / 30

Which one of the following statements is ?TRUE about a tablet

12 / 30

Which of the following is NOT an example of the benefits of using online collaboration tool

13 / 30

is an umbrella term that…………….refers to any malicious software

14 / 30

Which of the following is true regarding secure password

15 / 30

which of the following may need to be installed to use certain online collaborative tool

16 / 30

The most important ethical aspect of social media is:

17 / 30

LMS stands for:

 

18 / 30

The best transmission media for connecting two campuses:

19 / 30

Type of malware caused in high telephone bills

20 / 30

The 8-digit number 02062014 is………before processed

 

21 / 30

Persons who use their computer expertise to break through the security levels of a computer system or network

22 / 30

a group of computers are linked together with equal permissions and responsibilities for processing data this non-hierarchy network is called

23 / 30

occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial b benefits.

24 / 30

Bluetooth is

25 / 30

…is used to refer to the processed data

26 / 30

Consider a Mesh network,If the number of cables is 6,then how many extra cables are needed if one computer is added?

27 / 30

LMS stands for

28 / 30

Increased use of collatative tools requires sharing information with aipt of people. This creates a risk of sensitive data. what and of risk is that?

29 / 30

occurs when someone uses your……. personal identifying information and pretends to be you in order to commit fraud or to gain .other financial benefits

30 / 30

ICT stands for

Your score is

0%