Download as pdf
Download as pdf
You are on page 1of 32
5 ICT Final Revision MRS . Suzy Atef Toi [lacie Acie ck) Piet me mele ele tLL 4 Read and Choose the Correct answer ) The. ©@ ethernet cable ® HDMI © router cable The smallest unit of data i ©@ bit © byte © megabyte The word "ICT" need . . to represent it in a computer system. ©® 3bits © 3bytes © 8bits is a cable that connects a computer to a router. @ Anethernet cable © HDMI © Aflash memory Networks or the internet speed are measured by @® Guz © Mbps © cB © a. .. Measures the number of cycles your CPU carries out per second. @® Ghz ® Mbps © cB Byte is equal to bit(s). @® 1024 ®1 ©s8 © - .. is one of electronic accessories devices that are used for storage. © Printer © wiFi © Flash Memory ® A/An. is the same as a hard disk drive, but it runs faster. ® external harddisk | @) flash memory © router . is a cable that transfers audio and video to and from devices. @ - .. is a device that connects a computer to the internet via ethernet or Wi-Fi. @® HDMI © Router © Flash memory One of the measurement units is the Megabyte, which is equal to ...........« @® 1,024 bytes © 1,024kilobytes © 1,024 gigabytes are ws I9caiSaai aH? OOO a ier ie BEB wormyer sere raat Toi [lacie Acie ck) i are groups of people, or things are connected to each other. ® Accessories ® Networks © Hardware drives is a network that connects computers from all around the world. ® ® ® Internet © intranet © LAN ® is a device that connects your computer to an ISP. © Flash memory © Router © Ethernet port ® A school computer lab is an example for .. @® open network @® closednetwork © internet ... allows the phone and the internet to be used simultaneously. @® Dial-up internet © Digital subscriber © www connection line The... ... consists of devices linked to the internet via Wi-Fi. @® cpu © loT © pDst To connect your computer to the internet, you need a .. @® HDMI ® gateway © flash memory The web is an example of .. rs @® open networks ® closed networks © LAN is a part of the internet that has web pages and sites that people can visit. @® HpD © www © oT The technology that connects wireless mobile devices over a short range to form a network is called .. nf @® bluetooth © www © internet The connection of the washing machine to an application on the mobile device is called ... @ Internet Gateway @® Internet of Things ©) Bluetooth Organization use computer.......... networks to share private information. ® open ® closed © public Visually impaired people can use . @® WhatsApp © screenreaders © zoom x Ja 0 lassi Sion 00 ei te EXSB ELMotamyez Schoo! sini? Spiatemtoaee tebocees .. for doing their homework. ®®® ®® &©®® ® Toi [lacie Acie ck) @s) The first step to solve any computer problem is ... ® identifying © sharing © leaving You can contact the customer service of your ISP for help when... ® ® internet © Notable to store © anapp doesn't connectiointerrupted files open ‘When the browser is running slow, you have to @ delete unwanted apps ©) check Wi-Fi © change the mouse signal You can use applications to buy anything on the internet. ® loT © braille © ecommerce The problem solution of slowing download is to @ check the internet © delete unwanted © update the app speed app To store and share information and data, we use the .. ®® ® To create a simple formula in a cell, first type the .. this tells Excel you are creating a formula. © sign"=" © sign "x" © sign-+" x Ja 0 lassi Sion 00 ei te EXSB ELMotamyez Schoo! sini? Spiatemtoaee tebocees ® scanner © printer © flash memory @ A used to save images on a computer to use them later. ® scanner © printer © router @) A helps us to access the information by scanning it with a phone camera. @® browser ® ORcode © digital book @ . folders help us to manage files using the information technology. ® Creating © Deleting © Copying @ The first step that helps you to organize data in your computer is .. @® Add sub folder © Typeanamefor © Create the main the folders folder To change the title of a folder, you can use the .. command. @® New ® Open © Rename Network used to share information and less secure is @® Ethernet © internet © intranet Toi [lacie Acie ck) oe . is used to perform simple formulas. @® Excel ® Word © PowerPoint Excel are labeled with letters. ® Toolbars © Columns © Rows The more secure sharing in a closed network is called .... ® intranet © internet © none of them . is a program to create graphs. @® Email ® Word © Excel @® When arranging information alphabetically in Excel, go to the ... ® cells © toolbar © slides @® To perform division in Excel, use the .. Sign. @+ @ = ©/ @ The rows in Excel are labeled with .. = @® numbers © letters © symbols @ The... .. is used to share the information in a private network. @® WAN © internet © intranet When a cell is in column A and the fourth row, the cell is called . @ a4 © 4A © as @ To arrange information alphabetically in Excel, go to the toolbar, and click on Data, then click on... 5 ® Layout ® Format © Sort If you want to sum the values in columns A, B, and C from row 4, the formula is .. . @® C4+B4+A4 @® c4-B4-A4 © A4+B4+C5 . symbol means subtraction in Excel program. ®+ ®/ ©- 69 The one who steals the personal information is called a... ® broker © photographer © hacker You can keep your files from viruses or loss by making ... ©@ tur off device © backup © shopping x ss lassi 600 ‘nacnamanreciet tay EXD cimotamyersenoo ah ei Toi [lacie Acie ck) includes your name, address date of birth, and passwords. ® Personal information © Publicinformation (©) Personal computer Passwords must be... for each website you register on. ® ® ® ® ® same © different © weak ... use the internet to break into a computer system. @® Teachers @® Students © Hackers Backup copies of files are created on. @ flash memory © a Reel hard © both of them Hackers can send... to your computer. ® virus © antivirus © backup . is consider a weak password. ® 112024 ® ss37@6%m25 © mot@myezs To keep your data safe, use .. . software. @® MS Excel ® browser © The strong password should contain ®@ lettersand numbers ©) special signs © allthe previous Your name, address date of birth, and passwords is called @ rc ® urL © mu The hard disk is usually space than the flash memory. ® more © less © the same You should protect your files from dangers, such as viruses and .. ® software problems (©) human errors © bothaandb ©® ® ® © ® © The... . has more space than the flash memory. ® router © hard disk © keyboard Hybrid is a safer way to @® backup files © delete files © lock files To keep you Pll safe, you should ... .. your device regularly. @® access ® update © signup x ss lassi 600 ‘nacnamanreciet tay EXD cimotamyersenoo ah ei Toi [lacie Acie ck) Hybrid is a safer way to... ® backup files © store files © bothaandb By using ® similar © different © short can send a virus to all the email addresses in your email account. © Sellers @® Programmers © Hackers The hard disk drive and the flash memory are used for .. @ different @® the same © the opposite If the website asks you to enter much personal information, you should .. Passwords for each website, you can keep your Pl safe. . purpose. @ access this website | © ignore the © avoid using this warning website personal information. ® protect © steal © improve Hackers use the internet to a computer. @® break into @® buy © protect Dropping and breaking your laptop is from fou should protect files from. Hackers use the internet to @ software problems ©) human errors © viruses Smishing is the same thing as phishing, but it is sent by... ® email @® text message © Facebook One of the forms of . is the arrival of a message from an unknown person asking you for your data to obtain a prize. ® phishing © the bullying © databases ... Means you provide at least two ways of identifying yourself. @® MFA ® Password manager ©) PIN is sending a fake message via email or social media that looks real. © Smishing ® Phishing © antivirus . tells you if one of your passwords has been stolen online. @® Muttifactor @® Passwordmanager (©) Antivirus authentication When you open a phishing file, data-stealing software is ... on your PC, QO. Or, © O.S'@ ® ® updated © deleted © installed x ys Ula lai Sion 00 ane eh EXSB ELMotamyez Schoo! sini? Spiatemtoaee tebocees Toi [lacie Acie ck) 9 Passwords can be strengthened using .. multifactor ® personal © browsers authentication information Phishing messages can be identified by containing .. @ trusted information ©) spelling errors © bothaandb ® © You will receive a code for ... when you log into a game website from a different PC. @ ashort period of time © along period of © twotimes time A text message encourages you to act quickly is a type of ... ® phishing © smishing © emails creates a strong, unique password for each of your ® ® accounts. ® Phishing ® Scam © Password manager .. tells you if the passwords you already have are too weak or if you've reused them. @® Password manager ©) PIN © pu The phishing message can be identified by ... © ® phishing © smishing © bothaandb Data-stealing software is installed on your computer, when you attachment of phishing. @® delete ® open © block To avoid fake websites, you must check the presence of... ® correct grammar © correct spelling © spelling errors is an abbreviation for Personal Identification Number. @® PEN © Pl © PIN MFA provides at least ways of identifying yourself . @ two © three © four Phishing message includes ® correct grammar © right spelling © grammar errors @ Hackers can get your password by ® ®@ spelling errors © spelling accuracy ©) reliable content x 000 dg sa Sie, aaa Ta ete anode a El.Motamyez.Schoo! min atop go taps ekce Toi [lacie Acie ck) offer you a prize that you never get. ® © Online shopping ® Scareware © Sweepstakes ites websites contain fake warnings that you need to download a program. ® Online shopping © Scareware © Sweepstakes sites websites The Uniform Resource Locator (URL) begins with the ® protocol ® resourcename ©) file path in URL indicates who owns this site. ® protocol © resourcename ©) file path Anon-reliable source will have ® good design © spelling accuracy © spelling errors You can check websites by which is the address of the website. ® opinion © uri © blog If you exposed to... , you have to contact the Child Helpline. ® @® scam websites ® government © educational websites websites The international symbol for copyright is letter ... .. With a circle around it . @kR @c ©m Copyright protects all the following things, except .. @ | ® discoveries © books © websites means that the creator has given permission for his work to be used anytime and anywhere. ® Creative commons — ® Public domain © Discoveries and reuse license facts . protects creators work. @® Copyright © Internet © Images sources do not fall under copyrights. © Creativecommon © Animage . law protects printed and digital content. ©) The... ® copyright ® hacker © internet x Ja 0 lassi Sion 00 ei te EXSB ELMotamyez Schoo! Taitpnteaa a cae Toi [lacie Acie ck) (os) When a creator gives a permission for their work to be used anytime and anywhere, this is called ... discoveries facts creative commons ® ® © reuse license When using copyrighted content, you should @ askforpermission © credit thecreator ©) both of them (03) Using multiple sources during your research is a/ an. decision. @® unhelpful ® wrong © good You can go to the site you want by typing the in the search engine. ® email ® uRL © text message You can store suggested websites in the .. bar in your browser ® Tools ® bookmark © task . source. @) The Egyptian Knowledge Bank is a . ® reliable © false © bad @) . are true for everyone. ® Opinions © Facts © Opinions and facts @ A/an . results from research and observation, and can be proven. ® opinion © fact © blog @) If two online sources have .... information, it often means the information is true. © different © The same © questionable @) You should include your the end of your research. ® content © citation © introduction (ne) Some online sources include a .... to use it as the websites may change. ® special message © special character © permalink @) To search for an online resource keyword, press @ Alt + Ctrl +Del © ceri+F © F5 @) You must add the URL and the author's name at the ... ©@ top ® middie © end ae 600 gnu ct der oe gt EL.Motamyez.Schoo! "atsieggtlela gees see eae Toi [lacie Acie ck) To move directly to the site, you have to .. @® click onthe hyperlink ® createanemail © create a document (a0) _ When citing a YouTube video, use the . . as the author of the video. @® uploader ® email © blog his text. @ You have to show your respect for the author's work by. @ deleting ® copying © paraphrasing put “ true " or “ false ) Ethernet cables connect computers to the router. An Ethernet cable transmits audio and video to and from devices. Kilobyte = 1,024 bytes. A bit is the smallest unit of data. Megabits per second is used to measure network or connection speed. The higher the network speed, the slower internet connection. {J HDMI is a wire that connects a computer or laptop with the ty router. Wi-Fi is more stable and faster than Ethernet. () HDMI transmits audio and video to and from devices. yy} To solve the poor video-conference connection, try an Ethernet (- connection. External hard drive like an HDD but much faster. (hy Closing some programs is a solution of the home internet te connection does not work. The word “Apple” requires 5 bits. To connect a computer to the internet, you need a router. WW/W is a short form for the World Wide Web. Hotspot appeared after the year 2000. A local computer network (LAN) is a network that connects computers from all over the world. The internet is a private network that is restricted tosome people. ( | ALAN is a wide area network. av) The World Wide Web is a part of internet network. ~ ) x ys Ula lai Sion 00 rae ear ie rate EXSB ELMotamyez Schoo! init SpnkemiaSeboce @@O®O © ©OOH B © © OO © © © OOOO Toi [lacie Acie ck) Hotspot allows you to access the internet anywhere from your (4 smartphone. Ina dial-up connection phone and internet are used ( ) simultaneously. Bluetooth is a network technology that works overlongranges. ( ) To connect a computer to the internet, a gateway must be used. ( | Digital washing machine is an example to the IOT. ( J The Intranet is not different from the Internet. (yA () People of determination cannot communicate and follow their lesson online. Always ask permission from your parents before buying anything ( | @ online. @8) Braille makes it more difficult to read for people of determination. ( ) © Identifying the problem is the last step in solving computer (et problems. @ It’s important to check regularly for software updates to avoid i) problems. @ Restarting the router is one of the ways to solve the slow () download problem. ® One of the possible reasons for slow downloads is the internet ( 3 speed. @ We use a scanner to save images on the computer to use them mH } later. QR code is used to get information quickly and easily. ta) We can use OR code to transfer and share files. (J @ A printer is used to save images on the computer to use them (>) } later. @8) Technological tools help us to manage digital files. (es) @9) You can add a main folder inside sub-folders to manage files. os) © To create a main folder, press the left button of the mouse then (39) select New, then select folder. @) The main folder contains sub folders and files. (oJ @ We can give aname toa folder by right-clicking and then (54) renaming it. @) Data must be organized on the computer for easy retrieval. (4) 4) You can add or subtract any data using Microsoft Excel. (4 8) The internet is used to share over the web and is more secure. ( ) g 600 dg sa Sie, aaa Ta ete anode a El.Motamyez.Schoo! Malina spaalcas detailed case Toi [lacie Acie ck) The cell in the Excel program can contain only numbers. (4 You can share information using an intranet or the Internet. yy) The intranet is used to share the information in an open network. ( — } The internet is more secure and private than intranet. ( # To create a simple formula, we select the cellandthentypea“+" (_—) sign. You can add or subtract any numeric data using Microsoft Excel. The data in cells cannot be arranged alphabetically. To create a formula in Excel, we use a “=” sign. The intranet is used to share over the web and is less secure. Rows in Excel are labeled with letters. Columns in Excel are labeled with numbers. The cell AS is located in column (5) and row (A). We can arrange the information alphabetically in Excel using the Sort property. In MS Excel, the rows are labeled with numbers, while the (, 3 columns are labeled with letters. Antivirus software shouldn't be installed on your computer. Hackers use the internet to break into a computer system. Hybrid backup is a safer way to back up and store files. You shouldn't sign up to a website that asks for a lot of personal data. Strong passwords contain letters and numbers only. You should limit the personal information you share online. Files are stored using a flash memory. Websites that ask for too much personal information are safe. Hard disks always have less space than flash memories. An anti-virus helps you keep your personal data safe. Both hard disks and flash memories are used for the same purpose. Strong passwords must contain letters, numbers, and special (fee) signs. Sign up for a website if it asks for too much personal information ( to protect your personal data online. Hackers can send a virus to all the email addresses inyouremail ( |} account. x 600 dg sa Sie, aaa Ta ete anode a El.Motamyez.Schoo! Malina spaalcas detailed case ® ® © BOOOOHHD OOOHD © QBOOHDOOHOO OOOOO Toi [lacie Acie ck) There are several ways to back up data, suchas flash drivesand ( hard drives. Some apps and software programs can back up data ( ) automatically. Use anti-virus software on all your devices and update your device ( ) regularly to protect your files. The flash memory is better to store large files than the external ( ) hard drive. All software programs back up data automatically. {(O ) One way to back up the data is using a data storage device. {J The only way to make hybrid backup is automatically backupby ( ) apps and software programs. Password managers create a unique password. () Phishing messages are free from grammar errors. Ca A password manager software is used to create strong passwords. We don't need strong passwords to protect our personal data. ig 7 Smishing is sending a scam message via text messages instead of ( ) an email. Phishing is one of the ways that hackers use to get your password. ® @ @) @9 @) Antivirus can tell you if one of your passwords has been stolen {J online. Phishing messages can't be recognized. (te) Hackers use phishing to steal your password. =) MFAis an abbreviation for multi-factor authentication. ()) Multi-factor authentication requests one way of identifying C7 yourself. Data-stealing software may ask you to enter your bank account (— |} details. Smishing is a text message that looks real, but it isn't. (od There are only one-way hackers can get your password. (fee) You need strong passwords to help protect your personal data to) from hackers. PIN is an abbreviation for Personally Identifiable Information. io) Password manager provides at least two ways of identifying (4 yourself. x 600 dg sa Sie, aaa Ta ete anode a El.Motamyez.Schoo! Malina spaalcas detailed case Toi [lacie Acie ck) A form of phishing is a message telling you that youhavewona = ({_— prize, but you have to give personal details. Data-stealing software is installed on the person's computer when ( )} they open a link containing phishing. Password manager can't tell you if you have reused the password. ( )} You should avoid accessing scam websites. { ) The website address (URL) enables you to access the site you want. @OO OOO ® ® You must check the sites you visit on the internet. re ) To avoid scam websites, you should check the URL of websites. {J The protocol in a URL determines how the information is () transferred. Scareware websites offer you a prize that you never get. (od Scam websites usually have misspelled words or bad grammars. (429 If you fall a victim to a scam website, you should not tellatrusted ( |} adult. If you fall a victim to a scam website, you should report it. (44 Scareware websites say your computer has a problem and you ig") need to download something. All online shopping sites send you the correct items you bought. Discoveries and facts are not covered by copyright. You can paraphrase others’ writings when using them. Creative commons are not covered by copyright. You should use others’ work and attribute it to yourself. Copyright law protects both printed and digital content. Copyright for a website is usually at the top of the home page. Creative works become public domains when the creator dies @) @) @) @) @) ® @ @ ® @ immediately. The copyright law does not protect images and artworks. (4 It is not necessary to ask for permission before using any EY | copyrighted content. It is recommended to use multiple sources in your research. (

You might also like