GT101_TU170_الكويز_الأول_أستاذ_خالد.pdf
Document Details
Uploaded by OutstandingNonagon
Arab Open University
Tags
Related
- George Reynolds - Ethics in Information Technology-Course Technology (2014)-63-87.pdf
- Des Plaines Police Department Information Technology Use PDF
- E-Book : Information And Communication Technology (English).pdf
- Copy of Information Technology EOY_CSEC .pdf
- gate-computer-science-and-information-technology-2019-9789352868469-9789353061166-9352868463_compress-1-578.pdf
- Ethics for the Information Age Chapter 3
Full Transcript
+965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات +965 50 51 52 37 : للتواصل- املذكرة من مذكرات األستاذ خالد ومن إعداده 1. Unsolicited email is called ------------- a. Spam b. Blog c. Casting d. Wiki 2. Verification of...
+965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات +965 50 51 52 37 : للتواصل- املذكرة من مذكرات األستاذ خالد ومن إعداده 1. Unsolicited email is called ------------- a. Spam b. Blog c. Casting d. Wiki 2. Verification of a login name and password is known as: a. Accessibility b. Configuration c. Integrity d. Authentication 3. During classes, asking questions and expressing ideas are an important part of the learning process which communication is skilled would you be using for each of these activities? a. Reading b. Listening c. Speaking d. Writing 4. Laptops are classified as --------- a. Midrange computer b. Supercomputers c. Mainframe computers d. Personal computers 5. When evaluating a website’s content, whether the author have a bias is considered part of the ------------ element a. Currency b. Authority c. Accuracy d. Objectivity 6. Application software does not include: a. Games b. Browsers c. Utilities d. Word processors 7. Which of the following are tips to deal with spam? Click all that apply a. Use a shorter password so it's easy to remember b. Frequently change your password c. Use the same password for every program d. Never respond to emails asking for personal or financial information e. Consider using two email addresses 2 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 8. ----------- computing provides access to software, programs, and data from anywhere through an Internet connection. a. Cloud b. Service provider c. Three-way d. Client 9. The continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet a. IoT b. Web 3.0 c. IoW d. Cloud 10. Identify the four basic categories of hardware in a personal computer System. a. system unit, input/output, secondary storage, and primary storage b. hard disk, input/output, secondary storage, and display devices c. System unit, input/output, secondary storage, and communication d. hard disk, modem, RAM and microprocessor 11. Which of the following are tips to help you get the most from a search on the Internet? a. Type different search terms into a new window b. Type 10 to 15 words into the search engine c. Rely on Wikipedia d. Determine what it is that you want answered e. Use your favorite search engine 12. A ------------ is an example of an IoT device a. Bicycle b. railway car c. land line telephone d. Fitbit 13. A(n) --------- publishes short sentences that only take a few seconds to write, rather than long stories or posts a. Microblog b. Webcast c. Podcast d. Email 14. The web was introduced in -------------- a. 1976 b. 1991 c. 1998 d. 2004 3 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 15. ------------- files are typically used to store students records, including Name ID numbers, and other related information. a. Worksheet b. Presentation c. Document d. Database 16. Desktop, laptop, and tablet computers, and mobile devices are classified as a. Midrange Computers b. Personal Computers c. Mainframe Computers d. Supercomputers 17. A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch sensitive screen, is called a a. Tablet b. Desktop c. Laptop d. Subnotebook 18. When evaluating a website's content, whether or not the information is up to date is considered part of the element a. Objectivity b. Currency c. Authority d. Accuracy 19. Which of the following is not one of the three basic components of cloud computing? a. Service Providers b. The Internet c. Wireless Connectivity d. Clients 20. Which of the following are examples of poor netiquette? (SELECT THAT APPLY) a. Turning off your cell phone in formal situations b. Checking your phone while someone is talking c. Posting to your discussion board without proofreading d. Using headphones connected to your laptop e. Avoiding the temptation to surf the web while you’re working on assignments 21. Which of the following will enhance and reinforce your listening skills ? a. Lacking knowledge of the subject matter b. Worrying about an upcoming event c. Asking questions to clarify points d. Lacking vocabulary 4 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 22. This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an Internet service provider a. FTP b. SSP c. Bit-torrent d. Dropbox.com 23. Which of the following is not a well-known web browser a. Google Chrome b. Apple Safari c. Windows Explorer d. Microsoft Edge 24. Which of the following communication skills are used when you listen to instructions and ask questions for clarification ? a. Reading and writing b. Listening and speaking c. Listening and reading d. Listening and writing 25. ---------- is the component of the information system that is described as the equipment that processes data to create information a. Programming b. System software c. Hardware d. Compiler 26. ------------ allows users to shift their desktop computing activities to computers on the Internet a. Distributed databases b. Solid state storage c. Cloud computing d. Handheld computers 27. Special web browsers, called -------- browsers, are designed to run on portable devices such as smartphones and tablets a. Mobile b. Cloud c. Web-based d. Client-based 28. An Internet ------------ is a collection of utility programs designed to maintain your security and privacy while you are on the web a. Plugin suite b. File transfer set c. Filter set d. Security suite 5 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 29. A web page typically contains -----, which contains the formatting instructions for displaying the web page a. Hyperlinks b. Hypertext Markup Language (HTML) c. Top-level domain (TLD) d. Uniform resource locators (urls) 30. Which of the following is the reason why physical distractions are usually easier to prevent in a listening or speaking situation ? a. In a listening or speaking situation, the receiver is never expected to provide feedback to the sender b. In a listening or speaking situation, the listener has little control over his or her surroundings c. In a listening or speaking situation, the sender is never required to develop error free messages d. The surroundings of a listening or speaking situation can often be change 31. Software that helps the computer manage its own internal resources is called ------ a. Application software b. Desktop c. Shareware d. System software 32. The protocol ---------- is used for web traffic and is one of the most 35 widely used Internet protocols a. Css b. TLD c. URL d. Https 33. References and --------- connect to other documents or web pages containing related information a. Hotspots b. Hyperlinks c. Markups d. Resource locators 34. ------------ are special programs continually look for new information and update the databases used by search services a. Spiders b. Web crawlers c. Hits d. Bugs 6 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 35. Which of the following behaviors will help you get the most out of a distance learning course? Check All That Apply a. Check in frequently b. Check in any time you have a few minutes c. Have a plan in case you cannot use your computer d. Trust your electronics—you don't need paper copies of the work that you submit e. Find a cyberbuddy 36. Which communication skill broadens your knowledge and understanding of the world and actually makes you a more interesting person in your social life a. Reading b. Writing c. I - attitude d. Speaking 37. Which of the following computers is also referred to as a server and is used to support end users for things such as retrieving data from a database or providing access to application software a. Mainframe b. Microcomputer c. Supercomputer d. Midrange 38. In an information system, the rules or guidelines for people to follow are called a. Data processing b. Compiling c. Database management d. Procedures 39. ------------ Software is a collection of programs that helps the computer manage its own resources and enables application software to interact with computer hardware a. Application b. System c. Operating d. Database management 40. --------- email systems do not require an email program to be installed on your computer a. Microblog b. Podcast c. Client-based d. Web-based 7 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 41. The component of the information system that is described as raw unprocessed facts, is called ---------- a. Cloud computing b. Data c. Software d. The internet 42. System software includes all of the following except a. Browsers b. Standalone operating systems c. Utilities d. Realtime operating systems 43. Which of the following is a website specially designed to allow visitors to use their browser to add, edit, or delete the site's content a. Microblog b. Wiki c. Blog d. Webcast 44. According to the psychologist Abraham Maslow, esteem needs are satisfied a. By providing security against mental abuse b. Through food, shelter, and clothing c. Through feelings of self importance or prestige d. By providing security against physical abuse 45. The most widely used handheld computers are ---------- a. Smartphones b. Laptops c. Tablets d. Notebooks and laptops 46. ---------- messaging is the process of sending short electronic messages using a wireless network a. Webcast b. Text c. Podcast d. Email 47. Antivirus programs protect your computer system from viruses or malicious programs. This is an example of which type of software a. Operating system b. Browser software c. Application software d. Utilities 8 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 48. Employee records, including names, social security numbers, and related information, would typically be stored in what type of data file a. Document b. Database c. Worksheet d. Presentation 49. The Internet is a --------- made up of wires, cables, satellites and rules for exchanging information between computers connected to the network a. Virtual network b. Multimedia interface c. Domain name d. Physical network 50. Parents can use this type of program to block access to selected websites a. Spider b. FTP c. Filter d. Bittorrent 51. A financial budget would typically be created in what type of data file a. Database b. Worksheet c. Document d. Presentation 52. In your educational life, asking questions, summarizing information and expressing ideas are an important part of the learning process. Which communication skill would you be using for each of these activities a. Listening b. Reading c. Writing d. Speaking 53. Unsolicited email is called - a. Blog b. Spam c. Casting d. Wiki 54. Which of the following is the most popular social networking site is ? a. Twitter b. Google c. Wiki d. Facebook 9 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 55. Which of the following statements is true about the different types of communication? a. In written communication, immediate feedback may not always be possible. b. Written communication does not provide proof that the information was exchanged. c. Nonverbal communication is communication with words. d. Oral communication is communication without words 56. ------------- is the component of the information system that is described as the instructions that tell the computer how to do its work, is called a. Data b. Cloud computing c. Software d. The Internet 57. Which of the following computers is most widely used type of computers? a. Mainframe b. Midrange c. Personal Computer d. Supercomputer 58. System software includes: a. Utilities b. Games c. Word processors d. Browsers 59. Which of the following communication skills are used when you listen to instructions and ask questions for clarification ? a. Reading and writing b. Listening and writing c. Listening and speaking d. Listening and reading 60. The Internet is a ----------- made up of wires cables satellites and rules for exchanging information between computers connected to the network. a. Physical network b. Domain name c. Multimedia interface d. Virtual network 61. -------- is the physical objects with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet. a. Cloud b. Web 3.0 c. Iot d. Iow 10 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 62. According to the psychologist Abraham Maslow, self-actualizing needs are met through a: a. Sense of achievement, competence, and creativity. b. Feeling of belonging to a group. c. Feeling of self-importance, prestige, or recognition. d. Sense of security from physical harm and mental abuse. 63. Which of the following computers is most powerful type of computers? a. Personal Computer b. Midrange c. Supercomputer d. Mainframe 64. In your educational life, wring reports and participating in discussion forums are an important part of the learning process. Which communication skill would you be using for each of these activities? a. Reading b. Speaking c. Listening d. Writing 65. Tablet computers and mobile devices are classified as ---------- a. Mainframe computers b. Supercomputers c. Personal computers d. Midrange computers 66. Which of the following behaviors will help you get the most out of a distance learning course? Select all that apply. a. Check in your email frequently b. Trust your electronics—you do not need paper copies of the work that you submit. c. Find an online colleague. 67. ---------- software is a collection of programs that enables computer programs to interact with computer hardware. a. System b. Application c. Database management d. Operating 68. --------------- are destructive programs are usually attached to some emails. a. Computer viruses b. Spams c. Unsolicited emails d. Utilities 11 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 69. A teachers lecture would typically be created in what type of data file a. Database b. Worksheet c. Document d. Presentation 70. Apple’s watch is what type of computer a. Tablet b. Wearable c. Smartphone d. Laptop 71. Windows 10 is considering ------------- a. Hardware b. Application software c. Procedures d. None of them 72. Which of the following could be a correct email address? a. [email protected] b. @aou.edu.kw c. Ahmad#aou.edu.kw d. Ahmad&aou.edu.kw 73. Which of the following is a Web-based email? a. [email protected] b. [email protected] c. All answers are correct d. [email protected] 74. The purpose of software is to convert information into data a. True b. False 75. System software might be described as end user software. a. True b. False 76. Application software is the software which helps the computer manage its Own internal resources. a. True b. False 77. Highly structured and organized data is stored in database files a. True b. False 12 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 78. Airline companies are most likely to use personal computers to process information about millions of flights a. True b. False 79. A presentation software is an example of system software a. True b. False 80. A presentation software is not an example of system software a. True b. False 81. Antivirus software is a Windows utility that is unnecessary as long as you are careful browsing the Internet a. True b. False 82. The parts of an information system are: people, procedures, software, hardware, data, and the Internet a. True b. False 83. The parts of an information system are: people, procedures, software, hardware, data, and the web c. True d. False 84. The purpose of software is to convert data into information a. True b. False 85. Smartphones are a type of handheld computer that do not need input, output, processing, or storage a. True b. False 86. Smartphones are a type of handheld computer that have input and output a. True b. False 87. Four common types of files are document files, worksheet files database files, and presentation files a. True b. False 13 +965 50 51 52 37 :هذه املذكرة لألستاذ خالد – للتواصل واالستفسارات 88. A presentation software is an example of application software. a. True b. False 89. The purpose of software is to convert information into data. a. True b. False 90. Application software might be described as end-user software. a. True b. False 91. The parts of an information system are: people, procedures, software, hardware, data, and the network. a. True b. False 92. Four common types of files are document files, worksheet files, database files, and power files. a. True b. False 93. In analyzing worldwide weather patterns, personal computers are used. a. True b. False 94. Highly structured and organized data is stored in presentation files. a. True b. False 95. System software are also described as end-user software. a. True b. False 14