........ is the email platform for Microsoft 365.

سؤال 1
الدرجة 1.00

....  It is a database which includes all the items owned by a library

سؤال 2
الدرجة 1.00

Copyright  It includes written, visual, audio, video, and web materials

سؤال 3
الدرجة 1.00

one of  advantages of cloud computing is ....

سؤال 4
الدرجة 1.00

........It occurs when unauthorized parties gain access to confidential data and information

سؤال 5
الدرجة 1.00

Microsoft 365 includes productivity apps except..

سؤال 6
الدرجة 1.00

Wireless networks they connect devices without wiring using .......

سؤال 7
الدرجة 1.00

E-trading facilitates easier and faster trading between companies globally

سؤال 8
الدرجة 1.00

............ are the most popular software that deal with cloud computing applications

سؤال 9
الدرجة 1.00

...... It is the software that manages a computer’s functions

سؤال 10
الدرجة 1.00

Google Drive  it is an application of ..........

سؤال 11
الدرجة 1.00

........ It provides information and resource related to accessibility for people with disabilities

سؤال 12
الدرجة 1.00

... They empower deaf people to translate their signs in real time to spoken or text output.

سؤال 13
الدرجة 1.00

... help people search Internet websites based on the keywords and phrases

سؤال 14
الدرجة 1.00

Sonar used in car for motion detection

سؤال 15
الدرجة 1.00

........ is the greatest cyber security threat

سؤال 16
الدرجة 1.00

......... networks They use cables that are plugged into port

سؤال 17
الدرجة 1.00

To save a file to OneDrive...

سؤال 18
الدرجة 1.00

AI, AR, and VR are Cutting-edge technologies

سؤال 19
الدرجة 1.00

.....  It combines the real world with a virtual world by adding images using computers

سؤال 20
الدرجة 1.00

If you click on unsafe links  Viruses will be installed on your devices

سؤال 21
الدرجة 1.00

.......... Connect users who are not on the local area network (LAN) to access and manage data, files, and applications via the internet

سؤال 22
الدرجة 1.00

 ...... allows you to store, share, and access files from any device. It's very user-friendly.

سؤال 23
الدرجة 1.00

Data Breach it converts data into a code to prevent unauthorized user access

سؤال 24
الدرجة 1.00

......Connects a local area network (LAN) to the interne

سؤال 25
الدرجة 1.00

...... It is the on-demand storage and access of data and programs via remote servers on the internet.  

سؤال 26
الدرجة 1.00

Using  secured Wi-Fi can expose you to malware threats

سؤال 27
الدرجة 1.00

EKB is an example of a Search engine

سؤال 28
الدرجة 1.00

Cloud computing is storing, and accessing, data or programs through the internet. 

سؤال 29
الدرجة 1.00

Examples on AI .........

سؤال 30
الدرجة 1.00

.......  Cyber criminals pretend to be a business or a known person.

سؤال 31
الدرجة 1.00

......... It refers to works that the createor has allowed to be shared

سؤال 32
الدرجة 1.00

...... It scrambles your information and is accessible only with a password on your device

سؤال 33
الدرجة 1.00

...  They are online applications that provide financial guidance and services

سؤال 34
الدرجة 1.00

OneDrive allows You to determine the access level for each person you share with

سؤال 35
الدرجة 1.00

The goal of ... is to improve someone’s independence and to be included in society

سؤال 36
الدرجة 1.00

Examples on ... It can take you to a museum thousands of miles away or to a historical site

سؤال 37
الدرجة 1.00

.... allows investors to make trades independently through websites or apps, providing more independence and user-friendly options

سؤال 38
الدرجة 1.00

Company stocks are called ........

سؤال 39
الدرجة 1.00

Scareware is a type of malware that pretends to be a virus alert 

سؤال 40
الدرجة 1.00