........ is the greatest cyber security threat

سؤال 1
الدرجة 1.00

...... It is the on-demand storage and access of data and programs via remote servers on the internet.  

سؤال 2
الدرجة 1.00

.... allows investors to make trades independently through websites or apps, providing more independence and user-friendly options

سؤال 3
الدرجة 1.00

Microsoft 365 includes productivity apps except..

سؤال 4
الدرجة 1.00

Sonar used in car for motion detection

سؤال 5
الدرجة 1.00

OneDrive allows You to determine the access level for each person you share with

سؤال 6
الدرجة 1.00

E-trading facilitates easier and faster trading between companies globally

سؤال 7
الدرجة 1.00

............ are the most popular software that deal with cloud computing applications

سؤال 8
الدرجة 1.00

... help people search Internet websites based on the keywords and phrases

سؤال 9
الدرجة 1.00

Data Breach it converts data into a code to prevent unauthorized user access

سؤال 10
الدرجة 1.00

Examples on AI .........

سؤال 11
الدرجة 1.00

Wireless networks they connect devices without wiring using .......

سؤال 12
الدرجة 1.00

Scareware is a type of malware that pretends to be a virus alert 

سؤال 13
الدرجة 1.00

Examples on ... It can take you to a museum thousands of miles away or to a historical site

سؤال 14
الدرجة 1.00

one of  advantages of cloud computing is ....

سؤال 15
الدرجة 1.00

....  It is a database which includes all the items owned by a library

سؤال 16
الدرجة 1.00

Copyright  It includes written, visual, audio, video, and web materials

سؤال 17
الدرجة 1.00

.......  Cyber criminals pretend to be a business or a known person.

سؤال 18
الدرجة 1.00

The goal of ... is to improve someone’s independence and to be included in society

سؤال 19
الدرجة 1.00

Cloud computing is storing, and accessing, data or programs through the internet. 

سؤال 20
الدرجة 1.00

Company stocks are called ........

سؤال 21
الدرجة 1.00

 ...... allows you to store, share, and access files from any device. It's very user-friendly.

سؤال 22
الدرجة 1.00

...... It scrambles your information and is accessible only with a password on your device

سؤال 23
الدرجة 1.00

.......... Connect users who are not on the local area network (LAN) to access and manage data, files, and applications via the internet

سؤال 24
الدرجة 1.00

.....  It combines the real world with a virtual world by adding images using computers

سؤال 25
الدرجة 1.00

Google Drive  it is an application of ..........

سؤال 26
الدرجة 1.00

......Connects a local area network (LAN) to the interne

سؤال 27
الدرجة 1.00

......... It refers to works that the createor has allowed to be shared

سؤال 28
الدرجة 1.00

......... networks They use cables that are plugged into port

سؤال 29
الدرجة 1.00

...  They are online applications that provide financial guidance and services

سؤال 30
الدرجة 1.00

If you click on unsafe links  Viruses will be installed on your devices

سؤال 31
الدرجة 1.00

Using  secured Wi-Fi can expose you to malware threats

سؤال 32
الدرجة 1.00

........ is the email platform for Microsoft 365.

سؤال 33
الدرجة 1.00

... They empower deaf people to translate their signs in real time to spoken or text output.

سؤال 34
الدرجة 1.00

AI, AR, and VR are Cutting-edge technologies

سؤال 35
الدرجة 1.00

...... It is the software that manages a computer’s functions

سؤال 36
الدرجة 1.00

........It occurs when unauthorized parties gain access to confidential data and information

سؤال 37
الدرجة 1.00

EKB is an example of a Search engine

سؤال 38
الدرجة 1.00

To save a file to OneDrive...

سؤال 39
الدرجة 1.00

........ It provides information and resource related to accessibility for people with disabilities

سؤال 40
الدرجة 1.00