1) (Copyright) does not conflict with Egyptian law. a) Right b) Wrong 2) Anti-virus software must be installed on your device a) Right b) Wrong 3) "bit" is the smallest unit of measurement for storing data on storage units a) Right b) Wrong 4) You must check the website you visit a) Right b) Wrong 5) The Egyptian Knowledge Bank is one of the reliable sources a) Right b) Wrong 6) It is preferable not to share your information with your college in Class a) Right b) Wrong 7) It is not recommended to use anti-virus software on your devices a) Right b) Wrong 8) It is difficult to back up your photos with an external hard drive. a) Right b) Wrong 9) You should be careful when interacting with new people online a) Right b) Wrong 10) All websites are fake, including online shopping sites a) Right b) Wrong 11) To keep your personally identifiable information safe, keep your devices updated. a) Right b) Wrong 12) You cannot create backups of files a) Right b) Wrong 13) The password must be strong a) Right b) Wrong 14) There is a law for intellectual protection a) Right b) Wrong 15) To protect your photos from being shared, use...... a) low resolution b) high resolution c) flash memory 16) You can navigate and access the different places using …………………… a) GPS positioning system b) pictures c) mail 17) The government protect ……… of all kinds in all fields. a) some areas b) Intellectual property rights c) photos 18) Hackers can send....... a) a gift b) viruses c) an award 19) The first steps to solve the problem are ....................... a) Define the problem b) Think of the solutions c) Pregnancy study 20) If you have fallen victim to a phishing website, you should……………………………………….. a) Reporting the matter b) give your personal data c) Give the parents data 21) …………………….of electronic accessories for computers, which are used in storage a) the printer b) Wi-Fi c) Flash Memory 22) ……………… must be set to protect images from copyright infringement. a) a phonetic sign b) a watermark c) Delete the tag 23) Which network are you using? To share information and be less secure. a) Mail b) the Internet c) the intranet 24) Backup copies of the files are created a) Flash b) external hard disk c) both 25) The program…………………………is used to create mathematical tables and graphs. a) Excel program b) Power Point program c) Word program 26) To present the research results in an interesting way, use …………….. a) WhatsApp b) power point c) excel 27) The Internet is a/an …………………….. computer network a) Limited b) open c) private 28) He ……… tries to obtain the bank account number of an adult to steal his money a) generalized b) the hacker c) a family member 29) phishing websites work to obtain ………… a) Your personal information b) Uniform Resource Locator (URL) c) opinion 30) One of the forms of…………………..is the arrival of a message from an unknown person asking for your data to obtain a prize. a) The Internet b) Phishing c) Managing passwords

ICT Grade 5

аутор

Табела

Визуелни стил

Поставке

Промени шаблон

Врати аутоматски сачувано: ?