مرحبا بك، اليوم و قبل البدئ في شرح الدوره اردت ان اضع لكم امتحان تجريبي لتقييم قدراتك و لكت تعرف نفسك هل هذه الدوره تحتاجها ام ،هذا الامتحان يتكون من 37 سؤال لذلك اخي/أختي حاول ان تجيب عليها بنفسك دون المساعده هو فقط تقييم مبدئي للمعلومات التي تملكها فقط و الاجابات سوف تكو مرفقه في ملف يمكن تحميله في الاسفل
الاسئله مقدمه من الشركه لذلك سوف تكون باللغه الانجلييزيه
الاسئله
.
1
. Which of the following optical discs will store the most data
. Which of the following optical discs will store the most data
A. CD-ROM
B. DVD-ROM DL
C. DVD-ROM DS
D. RS-ROM
2
. Which of the following devices are used to permanently store user data in a computer
. Which of the following devices are used to permanently store user data in a computer
Choose two
.
A. HDD
B. RAM
C. ROM
D. SSD
3.
Which of the following on your computer is considered firmware
Which of the following on your computer is considered firmware
A. RAM
B. SSD
C. CMOS
D. BIOS
4
. What was the first widely adopted video connector standard
. What was the first widely adopted video connector standard
A. CGA
B. VGA
C. XGA
D. DVI
5
. What type of removable storage is often used in digital cameras
. What type of removable storage is often used in digital cameras
A. Flash drive
B. NAS
C. Memory card
D. Mobile media card
6
. Which of the following devices is considered an input-only device
. Which of the following devices is considered an input-only device
A. Scanner
B. Printer
C. Touchscreen
D. Flash drive
7
. Which operating system named its versions after large cats
. Which operating system named its versions after large cats
A. iOS
B. OS X
C. Android
D. Chrome OS
8
. Your computer has a 64-bit CPU. Which statement is true regarding which operating
. Your computer has a 64-bit CPU. Which statement is true regarding which operating
systems you can install on it
A. 64-bit operating systems only.
B. 64-bit or 32-bit operating systems.
C. 32-bit operating systems only.
D. It depends on how much RAM your system has.
9
. What happens to a file when you move it from one directory to another in Windows on the same hard drive
. What happens to a file when you move it from one directory to another in Windows on the same hard drive
A. It gets erased from the original location and re-created in the new location.
B. It is maintained in the original location and re-created in the new location.
C. Nothing happens to the file; the metadata gets changed pointing to the new directory.
D. Nothing happens to the file
10
. A .flac file is an example of what type of file
. A .flac file is an example of what type of file
A. Image
B. Video
C. Audio
D. Compressed
11
. You are configuring some Windows computers for an office, and the manager tells you that
. You are configuring some Windows computers for an office, and the manager tells you that
employees should not be able to play the games. What should you do
A. Uninstall the games from within Control Panel.
B. Uninstall the games from within Windows Update.
C. In the Start menu, right-click the Games folder and select Delete.
D. Delete and reinstall Windows, and deselect the games upon reinstallation.
12
. A common compression format file extension seen on UNIX and Linux computers is what
. A common compression format file extension seen on UNIX and Linux computers is what
A. .rar
B. .dmg
C. .iso
D. .gz
13
. What type of software is used to create 3-D drawings for construction projects
. What type of software is used to create 3-D drawings for construction projects
A. CAD
B. Graphic design
C. PDF
D. Specialized
14
. You open your web browser and type in www.google.com, but your computer can’t find the
. You open your web browser and type in www.google.com, but your computer can’t find the
website. Your neighbor’s computer finds it just fine. What is most likely the cause
A. Incorrect DNS configuration.
B. Incorrect DHCP configuration.
C. Incorrect WPA2 configuration.
D. The website is down.
15
. Your friend Marcos asks you which of the following is the most secure. What do you
. Your friend Marcos asks you which of the following is the most secure. What do you
tell him
A. 802.11n
B. Infrared
C. Fiber-optic
D. UTP
16
. Your need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement
. Your need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement
A. WPA2
B. WPA
C. NAT
D. WEP
17
. Which of the following types of networks features decentralized security and resourceadministration
. Which of the following types of networks features decentralized security and resourceadministration
A. LAN
B. WAN
C. Peer-to-peer
D. Client-server
18
. You need to install a local storage solution that multiple users can easily access and has its own file-management software. Which option should you choose
. You need to install a local storage solution that multiple users can easily access and has its own file-management software. Which option should you choose
A. NAS
B. DAS
C. Network drive
D. Cloud
19
. Which of the following is an advantage of using a workgroup instead of a homegroup
. Which of the following is an advantage of using a workgroup instead of a homegroup
A. It’s more secure because it requires a password.
B. It has guaranteed compatibility because all computers must be running Windows 7
or newer.
C. It’s more secure because all clients must be on the same local network.
D. It’s more flexible because multiple operating systems can join it.
20
. Angela has an iPhone with a biometric scanner enabled. She powered the device off, and just turned it back on. What methods can she use to unlock her phone
. Angela has an iPhone with a biometric scanner enabled. She powered the device off, and just turned it back on. What methods can she use to unlock her phone
A. Fingerprint only
B. Passcode only
C. Fingerprint or passcode
D. Fingerprint, passcode, or iris scan
21
. You are setting up a new Wi-Fi connection on your iPad. What is the first step in the
. You are setting up a new Wi-Fi connection on your iPad. What is the first step in the
process
A. Enter the wireless password.
B. Verify the Internet connection.
C. Verify wireless capabilities.
D. Locate SSID.
E. Turn on Wi-Fi.
22
. What type of security is involved when pairing two Bluetooth devices together
. What type of security is involved when pairing two Bluetooth devices together
A. SSL certificates are exchanged.
B. A PIN is provided by the Bluetooth device.
C. The Bluetooth security layer negotiates the security mechanism.
D. There is no security involved.
23
. Which of the following are considered physical security risks? (Choose two.
. Which of the following are considered physical security risks? (Choose two.
A. Dumpster diving
B. Phishing
C. Software theft
D. Password cracking
24
. What is the primary difference between a computer virus and a worm
. What is the primary difference between a computer virus and a worm
A. A virus can replicate itself to infect another computer.
B. A worm can replicate itself to infect another computer.
C. Viruses only damage operating systems while worms damage software applications.
D. Viruses can’t cause total system crashes whereas worms can.
25
. You are online and you see a link to a free virus-scanning program appear. You click it, and after a few minutes your computer starts behaving erratically. What happened
. You are online and you see a link to a free virus-scanning program appear. You click it, and after a few minutes your computer starts behaving erratically. What happened
A. The virus scanner found a virus and is deleting it.
B. The link is attempting to crack your password.
C. The link was a phishing attempt.
D. The link was a Trojan horse.
26
. Which of the following are considered device hardening techniques? (Choose two.
. Which of the following are considered device hardening techniques? (Choose two.
A. Disabling Bluetooth
B. Requiring complex passwords
C. Enabling single sign-on
D. Installing antispyware software
27
. For security purposes, which of the following user accounts are disabled by default
. For security purposes, which of the following user accounts are disabled by default
A. Guest
B. Users
C. Power Users
D. Administrator
28
. You are browsing the Internet to purchase a gift for a friend. What two things should you look for to ensure it’s safe to enter your credit card information (Choose two.)
. You are browsing the Internet to purchase a gift for a friend. What two things should you look for to ensure it’s safe to enter your credit card information (Choose two.)
A. Security seal of approval
B. RSA Secure Access symbol
C. A lock symbol
D. HTTPS://
29
. You are helping a friend choose the right laptop for their needs. Which of the following are criteria that should be important for choosing the laptop (Choose two.)
. You are helping a friend choose the right laptop for their needs. Which of the following are criteria that should be important for choosing the laptop (Choose two.)
A. Display size
B. Weight
C. CPU speed
D. Memory
30
. Your office recently purchased five new workstations, and you are responsible for setting them up properly. After unpacking them, what is the next step you should perform
. Your office recently purchased five new workstations, and you are responsible for setting them up properly. After unpacking them, what is the next step you should perform
A. Configure the Internet connection.
B. Configure localization settings.
C. Power on the computer.
D. Plug in the cables.
31
. You are setting up a workstation for your neighbor. After following the operating system setup wizard, what is the next step to take in the setup process
. You are setting up a workstation for your neighbor. After following the operating system setup wizard, what is the next step to take in the setup process
A. Configure peripherals.
B. Create user accounts.
C. Install security software.
D. Uninstall unneeded software.
32
. You just installed a new HP printer on your Dell computer, and it’s not printing. What is the first source to check for information on the problem
. You just installed a new HP printer on your Dell computer, and it’s not printing. What is the first source to check for information on the problem
A. Dell’s website
B. HP’s website
C. Google search
D. Internet technical community groups
33
. When configuring a backup solution for your computer, you decide that speed is the most important factor. Which storage option should you choose
. When configuring a backup solution for your computer, you decide that speed is the most important factor. Which storage option should you choose
A. Locally attached storage
B. Network attached storage
C. Cloud storage
D. Offline storage
34
. You have just completed a backup of your PC onto an optical disc. What is the next step you need to take
. You have just completed a backup of your PC onto an optical disc. What is the next step you need to take
A. Store the backup in a secure location.
B. Burn the disc to ensure the data is saved.
C. Test the backup to verify it works.
D. Copy the backup data to a cloud.
35
. You are conducting an ergonomic assessment of your working environment. What should be true of the monitor placement
. You are conducting an ergonomic assessment of your working environment. What should be true of the monitor placement
A. The bottom of the monitor should be level with your eyes.
B. The top of the monitor should be level with your eyes.
C. The center of the monitor should be level with your eyes.
D. Monitor position does not matter in ergonomic assessments.
36
. At home, you are walking across a carpeted floor and touch a door handle. The handle shocks you and it stings a little. What caused this shock
. At home, you are walking across a carpeted floor and touch a door handle. The handle shocks you and it stings a little. What caused this shock
A. RoHS
B. EMI
C. ESD
D. UPS
37
. You need to purchase a device for your desktop computer so that if you lose power in your house, the computer can still operate until you shut it down safely. What do you need
. You need to purchase a device for your desktop computer so that if you lose power in your house, the computer can still operate until you shut it down safely. What do you need
A. Surge suppressor
B. Power replicator
C. Power strip
D. UPS
الاجابة
1
1. C. A double-sided DVD-ROM can store more data than a dual-layer DVD-ROM, and
both can store much more than a CD-ROM. There is no RS-ROM.
يمكن لـ DVD-ROM على الوجهين تخزين بيانات أكثر من قرص DVD مزدوج الطبقة ، و
كلاهما يمكن تخزين أكثر بكثير من قرص مضغوط CD-ROM
A, D. Hard disk drives (HDD) are used to permanently store user data. Solid state drives
SSD) are one type of hard drive.
تستخدم محركات الأقراص الصلبة (HDD) لتخزين بيانات المستخدم بشكل دائم. محركات الأقراص الصلبة
(SSD) هي نوع واحد من محركات الأقراص الصلبة
3
D. The Basic Input/Output System (BIOS) is fi rmware. It's stored on a fl ash memory chip (sometimes referred to as CMOS
نظام الإدخال / الإخراج الأساسي (BIOS) هو rmware. يتم تخزينها على شريحة ذاكرة flirc (يشار إليها أحيانًا باسم CMOS
4
B. VGA was the fi rst widely used video connector standard, and it was released in 1987
. VGA كان أول معيار موصل فيديو يستخدم على نطاق واسع ، وتم إصداره في عام 1987
5
C. Digital cameras use memory cards. The most popular form of memory card in the
market today is the SD card. MMC (Multi Media Card) is a variant of SD cards but there is no such thing as a “Mobile Media Card.”
الكاميرات الرقمية تستخدم بطاقات الذاكرة. الشكل الأكثر شعبية لبطاقة الذاكرة في
السوق اليوم هو بطاقة SD. إن بطاقة الوسائط المتعددة (MMC) هي نوع من بطاقات SD ، لكن لا يوجد شيء اسمه "بطاقة الوسائط المتنقلة" Mobile Media Card
6
A. Scanners are input devices. Printers produce output. Touchscreens and fl ash drives are both input and output devices
الماسحات الضوئية هي أجهزة الإدخال. الطابعات تنتج الانتاج. تعد شاشات اللمس ومحركات أقراص الرماد من أجهزة الإدخال والإخراج
7
B. Apple’s OS X was named for large cats. Now versions are named after locations in
California
تم تسمية Apple OS X للقطط الكبيرة الان تسم ببعض اسماء المواقع في كاليفورنيا
8
B. A 64-bit processor can handle 32-bit or 64-bit OSs. It is a waste of power to use a 32-bit OS on it, but it will work
يمكن للمعالج 64 بت معالجة أنظمة تشغيل 32 بت أو 64 بت. لكنه إهدار للطاقة لاستخدام نظام تشغيل 32 بت عليه ، ولكنه سيعمل
9
C. Moving a fi le is analogous to a cut and paste. It takes the fi le from one folder and places it in another within Windows. However, on the hard drive the only thing that happens is the fi le gets associated with a new folder. It does not physically move
نقل الملف مشابه لقطع ولصق. يأخذ الملف من مجلد واحد ويضعه في مجلد آخر داخل Windows. ومع ذلك ، فإن الشيء الوحيد الذي يحدث على القرص الصلب هو أن الملف يرتبط بحافظة جديدة. لا يتحرك جسديا
10
C. The .flac extension is for audio fi les
ملحق .flac للملفات الصوتية
11
A. Games and other software components can be added and removed from within Control Panel
يمكن إضافة الألعاب ومكونات البرامج الأخرى وإزالتها من داخل لوحة التحكم
12
D. The .gz extension is used by gzip, which is a UNIX- and Linux-compatible compression utility
يتم استخدام الامتداد .gz بواسطة gzip ، وهي أداة ضغط متوافقة مع UNIX و Linux
13
A. Computer Aided Design (CAD) software is designed to create 2-D and 3-D drawings
for construction projects. CAD is a type of specialized software
تم تصميم برنامج التصميم بمساعدة الكمبيوتر (CAD) لإنشاء رسومات ثنائية وثلاثية الأبعاد
لمشاريع البناء. CAD هو نوع من البرامج المتخصصة
14
A. DNS servers resolve host names to IP addresses. It’s possible that your computer has the wrong address for the DNS server. DHCP automatically confi gures TCP/IP clients, and WPA2 is a security protocol. If the website was down, your neighbor would not be able to access it either
خوادم DNS تحول أسماء المضيفين إلى عناوين IP. من الممكن أن يكون جهاز الكمبيوتر الخاص بك لديه عنوان خاطئ لخادم DNS. يقوم بروتوكول DHCP تلقائيًا بالاعتراض على عملاء TCP / IP ، و WPA2 هو بروتوكول أمان. إذا كان موقع الويب معطلاً ، فلن يتمكن جارك من الوصول إليه أيضًا
15
C. Wired connections are more secure than wireless ones. Fiber-optic cable is also immune to wiretaps, which makes it more secure than UTP
الاتصالات السلكية هي أكثر أمانًا من الاتصالات اللاسلكية. كابل الألياف الضوئية هو أيضا محصن ضد التنصت ، مما يجعله أكثر أمنا من UTP
16
A. WPA2 is the most secure wireless security protocol in use today
. WPA2 هو أكثر بروتوكول أمان لاسلكي مستخدمة في الوقت الحالي
17
C. A peer-to-peer network is one where all computers are equals. Each one is responsible for setting its own security and resource sharing
تعد شبكة peer-to-peer واحدة حيث تكون جميع أجهزة الكمبيوتر متساوية. كل واحد مسؤول عن تحديد الأمن ومشاركة الموارد الخاصة به
18
A. Network attached storage (NAS) is an external hard drive (or multiple hard drives)
complete with its own fi le management and sharing software
التخزين الشبكي المرفق (NAS) هو محرك أقراص ثابت خارجي (أو عدة محركات أقراص ثابتة)
مع برنامج الإدارة والمشاركة الخاص بها
19
D. Homegroups require their clients to be running Windows 7 or newer, and they are
more secure than workgroups because a password is needed to join. An advantage of a
workgroup is that multiple client OSs can participate, such as OS X
تطلب مجموعات Homegroups من عملائها تشغيل Windows 7 أو الأحدث ، وهم
أكثر أمانًا من مجموعات العمل الاخري لأن هناك حاجة إلى كلمة مرور للانضمام. ميزة من
مجموعة العمل هي أنه يمكن للعديد من أنظمة تشغيل العميل المشارك بين بعضها من ملفات و بيانات
، مثل OS X
20
B. With biometrics enabled, you can use either the passcode or your fi ngerprint to access a locked device. However, if it was just powered off, the only option is to enter the passcode
مع تمكين القياسات الحيوية biometrics enabled ، يمكنك استخدام إما رمز المرور أو قرص الفيديو الخاص بك للوصول إلى جهاز مقفل. ومع ذلك ، إذا تم إيقاف تشغيله ، فإن الخيار الوحيد هو إدخال رمز المرور
21
C. The proper steps in order are to verify wireless capabilities, turn on Wi-Fi, locate SSID, enter the wireless password, and verify the Internet connection
لخطوات الصحيحة بالترتيب هي التحقق من القدرات اللاسلكية وتشغيل شبكة Wi-Fi وتحديد موقع SSID وإدخال كلمة المرور اللاسلكية والتحقق من اتصال الإنترنت
22
B. When pairing two Bluetooth devices, you need to enter the PIN into your mobile device that allows it to connect to the Bluetooth device
عند إقران جهازي Bluetooth ، يجب عليك إدخال رقم PIN في جهازك المحمول الذي يسمح له بالاتصال بجهاز Bluetooth
23
A, C. Examples of physical security risks include hardware damage and theft, software and license theft, shoulder surfi ng, and dumpster diving
أمثلة من المخاطر الأمنية المادية تشمل أضرار الأجهزة والسرقة والبرمجيات وسرقة الترخيص
24
B. Viruses and worms are similar in the damage they do. The major difference is that while a virus needs a host to replicate and spread, a worm can replicate itself and spread without user intervention
الفيروسات والديدان worms متشابهة في الضرر الذي تسببه. الاختلاف الرئيسي هو أنه في الوقت الذي يحتاج فيه الفيروس إلى مضيف لتكراره وانتشاره ، فيمكن لدودة worm أن تكرر نفسها وتنتشر دون تدخل المستخدم
25
D. The link was most likely a Trojan horse, which pretends to be a benefi cial program but then does damage to your computer. It most likely installed malware on your system
كان الرابط على الأرجح حصان طروادة ، الذي يدعي أنه برنامج مستفيد ولكن بعد ذلك يلحق الضرر بجهاز الكمبيوتر الخاص بك. على الأرجح أنها قامت بتثبيت برامج ضارة على نظامك
26
A, D. Device hardening makes it harder for attackers to gain access to your system by
reducing the potential areas of attack. Two examples of device hardening are disabling
unused or unneeded services and installing antimalware
تصلب الجهاز يجعل من الصعب على المهاجمين الوصول إلى النظام الخاص بك عن طريق
تقليل المناطق المحتملة للهجوم. هناك مثالان لتصلب الجهاز يعطلان
الخدمات غير المستخدمة أو غير الضرورية وتثبيت antimalware
27
A. The Guest account is disabled by default and should remain disabled if it is not being
used
يتم تعطيل حساب Guest بشكل افتراضي ويجب أن تظل معطلة إذا لم تكن موجودة
او يتم استخدامها حاليا
28
C, D. Secure websites will start with HTTPS:// instead of HTTP://. In addition, there will
be a lock symbol near the address in the address bar
ستبدأ مواقع الويب الآمنة بـ HTTPS: // بدلاً من HTTP: //. بالإضافة إلى ذلك ، سيكون هناك
يكون رمز القفل بالقرب من العنوان في شريط العنوان
29
A, B. Processor speed and memory are important for all computers. The display size
and weight are considerations that are more specifi cally related to laptops than desktop
سرعة المعالج والذاكرة مهمة لجميع أجهزة الكمبيوتر. حجم العرض
والوزن عبارة عن اعتبارات تتعلق بشكل أكثر تحديدًا بالكمبيوترات المحمولة مقارنةً بالكمبيوتر المكتبي
30
D. The fi rst step in setting up a workstation is to plug in the cables
الخطوة الأولى في إنشاء محطة عمل هي توصيل الكبلات
31
C. After performing the initial setup of the operating system, the next step is to install
security software. The security software is the second most important piece of software on the computer, so it should be taken care of immediately after the OS setup
بعد تنفيذ الإعداد الأولي لنظام التشغيل ، فإن الخطوة التالية هي التثبيت
برنامج الأمان. يعد برنامج الأمان هو ثاني أهم البرامج على الكمبيوتر ، لذا يجب الاهتمام به فورًا بعد إعداد نظام التشغيل
32
B. Always check the manufacturer’s website fi rst. Since it’s an HP printer, check their site and not Dell’s
تحقق دائمًا من موقع الشركة المصنعة على الويب أولاً. نظرًا لأنها طابعة من HP ، تحقق من موقعها وليس من Dell
33
A. When choosing a backup solution, know that locally attached storage devices will
always be faster than network storage or cloud-based solutions
عند اختيار حل النسخ الاحتياطي ، يجب ان
تعرف أن أجهزة التخزين المرفقة محليًا سوف
تكون دائمًا أسرع من تخزين الشبكة أو الحلول المستندة إلى التخزين السحابي
34
C. After completing a backup, you should verify that the backup is working properly
بعد إكمال نسخة احتياطية ، يجب عليك التحقق من أن النسخة الاحتياطية تعمل بشكل صحيح
35
B. When placing a computer monitor, the top of the monitor should be at or slightly below
eye level for the user
عند وضع جهاز كمبيوتر ، يجب أن يكون الجزء العلوي من الشاشة عند أو أسفل قليلاً
مستوى العين للمستخدم
36
C. The shock is caused by static electricity, which is also known as electrostatic discharge (ESD)
تحدث الصدمة بسبب الكهرباء الساكنة ، والتي تُعرف أيضًا باسم التفريغ الكهروستاتيكي (ESD)
37
D. An uninterruptable power supply contains batteries that allow your computer to operate even if there is no power coming to it
يحتوي مصدر الطاقة غير المنقطعة على بطاريات تسمح للكمبيوتر الخاص بك بالعمل حتى في حالة عدم وجود طاقة قادمة إليه
ارجو ان تضعو لنا بكل صدق عدد الاسئله الصحيحيه كي نعرف كم من فرد سوف يستنفع بهذه الدوره