IT
![]() |
![]() |
![]() |
Title of test:![]() IT Description: يارب يكون امتحان كويس ونعرف نحل |




New Comment |
---|
NO RECORDS |
Which of the following is NOT a common cybersecurity threat. Virus. Trojan horse. FireWall. Worm. What is a DDoS attack?. A type of malware that spreads through email attachments. An attack in which multiple compromised systems are used to flood a target system with traffic. A cryptographic protocol used to secure internet communications. A social engineering attack that targets specific individuals within an organization. Which type of malware is specifically designed to spread across a network and perform automated tasks. Worm. Trojan. Ransomware. Spyware. Which cybersecurity measure can help protect against malware attacks by scanning and filtering network traffic. Firewall. Antivirus software. Intrusion Detection System (IDS). Virtual Private Network (VPN). What is the term used to describe a program that records keystrokes without the user's knowledge. Adware. Spyware. Ransomware. Rootkit. What is the primary goal of a DDoS attack?. To disrupt the availability of a service or website. To steal sensitive information. To encrypt files and demand ransom. To spread malware. What is the purpose of a rootki?. To encrypt files and demand ransom. To steal sensitive information. To slow down computer performance. To gain unauthorized access and hide malicious activity. Which network topology offers the highest level of redundancy. Mesh. Star. Bus. Ring. Which network topology provides better security and easier troubleshooting due to its centralized structure. Star. Ring. Bus. Mesh. In a mesh topology with n devices, how many links are required for full connectivity. n. n-1. 2n. n(n - 1) / 2. In a client-server network, what role does the client typically play. It stores data and provides services to other clients. It manages shared resources and provides services to the server. It requests services or resources from the server. It acts as a mediator between multiple servers. In a client-server network architecture, which component manages shared resources and provides services to clients. Client. Server. Router. Switch. Which branch of AI focuses on developing algorithms that enable computers to learn from data and improve over time. Machine Learning. Expert Systems. Natural Language Processing. Computer Vision. Which of the following is NOT a typical component of an IoT system. Sensors. Actuators. Drones. Gateways. What is the primary goal of an attacker in a phishing attack. To gain unauthorized access to a network by exploiting software vulnerabilities. To steal sensitive information such as login credentials or financial data. To launch a denial-of-service (DoS) attack to disrupt services. To intercept and decrypt encrypted communications. Which cybersecurity measure helps protect against malware by detecting and removing malicious software. Intrusion Detection System (IDS). Antivirus software. Firewall. Virtual Private Network (VPN). What is the name of the test proposed by Alan Turing to determine a machine's ability to exhibit intelligent behavior equivalent to that of a human. The Logical Reasoning Test. The Turing Test. The AlphaGo Challenge. The Watson Test. All generated AI tools have the same functions and act like each other. True. False. What happens if a device fails in a tree topology. The entire network becomes inoperable. Only the failed device is affected, and other devices continue to function. Data transmission speed decreases. The network automatically reconfigures itself to bypass the failed device. In a local network, if a device sends a message to all devices in the same subnet, what type of addressing is being used. Unicast. Multicast. Broadcast. Anycast. ICT is refered to. information and communication technology. information and computers technology. introduction and communication technology. none. Embedded system device is a type of computer devices. True. False. One of the advantages of computer network is high cost installation. true. false. In ----- mode of communication, only one node can send data. half-duplex. full-duplex. simplex. duplex. In--------both devices can send data at a time. full-duplex. half-duplex. simplex. duplex. Which of the following is an example of cloud storage service. Microsoft Excel. Adobe Acrobat. Notepad. One Drive. Broadcast refers to transmitting the same message or packets to multiple devices at the same time in the network. true. false. Which of the following accurately describes a tree topology. Each device is connected to a central backbone cable. Devices are connected in a circular loop. Devices are connected in a linear fashion, one after the other. Devices are connected in a hierarchical structure with a root node and multiple levels of branches. Which network architecture involves a centralized server that stores data and responds to requests from clients. Client-server network. Peer-to-peer network. Mesh network. Hybrid network. Which of the following is NOT a characteristic of cloud computing. On-demand self-service. Broad network access. Limited scalability. Resource pooling. Which service model provides users with virtualized hardware resources over the internet. Infrastructure as a Service (IaaS). Platform as a Service (PaaS). Software as a Service (SaaS). Function as a Service (FaaS). Which cloud computing characteristic refers to the ability to rapidly and elastically provision and release resources. On-demand self-service. Resource pooling. Rapid elasticity. Measured service. Google is one of cloud computing service providers. true. false. Which cloud deployment model involves using a combination of public and private clouds. Public cloud. Private cloud. Hybrid cloud. Community cloud. Which cloud computing characteristic ensures that users only pay for the resources they consume. On-demand self-service. Broad network access. Measured service. Rapid elasticity. Which cloud deployment model is characterized by a dedicated infrastructure maintained for a single organization. Public cloud. Private cloud. Hybrid cloud. Community cloud. What is a blockchain. A type of cryptocurrency. A distributed ledger technology. A centralized database. An online gaming platform. What is a block in a blockchain. A group of transactions. A digital signature. A type of cryptocurrency. A network of computers. Which of the following statements about blockchain technology is true. Transactions on a blockchain are reversible. Blockchain is only applicable to the financial sector. Once a transaction is added to the blockchain, it cannot be altered. Blockchain technology requires a central authority for validation. What is a smart contract in the context of blockchain technology. A legally binding document. A computer program that automatically executes the terms of a contract. A type of cryptocurrency. A blockchain wallet. What is the metaverse. A virtual reality headset. An augmented reality application. A collective virtual shared space, created by the convergence of virtually enhanced physical reality and physically persistent virtual spaces. A video game. How does the metaverse differ from traditional virtual reality environments. The metaverse is exclusively accessible through gaming consoles. The metaverse is not immersive. The metaverse is a shared, persistent virtual space where users can interact with each other and digital objects. The metaverse is limited to a single platform. Which company has announced significant investments in developing the metaverse. Amazon. Google. Meta (formerly Facebook). Microsoft. What role might blockchain technology play in the development of the metaverse. Enabling decentralized governance and ownership of virtual assets. Enhancing virtual reality hardware. Regulating virtual currency exchange. Providing faster internet connectivity. ..... are software tools which help those who are creating new software. productivity tools. development tools. os tools. sw tools. ..... is the small software that performs only one task. share sw. closed sw. embedded software. OS. any device having .... is classified as a computing device. a) processor. b)Memory. c)both a & b. d) neither a nor b. you can't see the code of .. any software. open source software. closed source code. all. Which of the following is hardware. Monitor. Program. Operating System. Microsoft Office. Which of the Following is not a main computer component. RAM. keyboard. power supply. all. ... it defines the way how network devices are arranged. Topology. netword. Process. Protocol. the interconnection between two computers can occur without. NIC. Router. Cable. Protocol. .... is the study or use of systems for storing ,retrieving and sending information. Information technology. computer network. software. all. Turing test is created in. 1950. 1960. 1990. 1945. Self-Driving Cars are one of the best examples of. strong Ai. limited memory. theory of mind. selfawareness. .... said the term Robotics. John McCarthy. Isaac Asimov. Alan Turing. What is Cloud Computing. Cloud Computing means providing services like storage ,servers ,database , networking etc. you can obtain cloud services without the internet. Cloud computing is a tool used to create an application. None. Which of the following is a type of cloud computing service. service as a server (SAAS). software as a software (SAAS). software as a service (SAAS). software and a server (SAAS). which of the following is not correct statement about cloud computing. Cloud computing has 4 models public , private , hybrid and community. Cloud computing services can operate without the internet. you can obtain any hardware or software services with cloud computing. Cloud computing is built on virtualization. ... is focused on one narrow task. Strong Ai. Normal Ai. Super Ai. Weak Ai. .... is the set of principles and practices designed to protect our computing resources and online information against threats. AI. Cloud Computing. Cyber Security. Network. Which of the following refers to the violation of the principle if a computer is no more accessible. Access Control. Confidentiality. Availability. All. In the CIA Triad , which one of the following is not involved. Availability. Confidentiality. Authenticity. Integrity. Data Communication system spanning large area but not the whole world is. PAN. WAN. MAN. NONE. C++ progamming language is the ..... language. low level. high level. machine. HW. ....... is the software that can manage the computer hardware. OS. shareware. productivity. antivirus. TEMP AND HUMIDITY MODULE is used to. measure the temperature only. input the temperature. measure the temperature and humidity. output light. ... is used to detect the fire. Nicla vision. Flame sensor. Nano 33. ultrasonic. Arduino uses .... microcontroller. ATmega328. Atmega382. AVR. AVR328. Management information system is one of the ... shareware SW. Open SW. Closed SW. Business SW. Arduino is. a)open-source. b)closed source. c)embedded system. A and C. an embedded system has .... components. hardware. software. operating system. all. .... refers to transmitting the same message or packets to multiple devices at same time. Unicast. multicast. one cast. simple cast. in ..... topology , every device has a dedicated point to point link to every other device. Mesh. star. ring. all. .... are used for collecting information. sensor and actuator. sensors. actuators. none. Personal identity information violation is an example of .... violation. integration. availability. integrity. confidentiality. Deep Blue is a computer chess-playing system designed by. CISCO. IBM. APPLE. HUAWI. Chess is one of the best examples of. self awareness. limited memory. strong Ai. Theory of mind. Microsoft office 365 is .... as a service. infrastructure. software. platform. operating system. All of the following are the features of cloud computing except. Service Level Agreement. Availability. Scalability. All of the Mentioned. in ..... topology , any fault that occurs to any connected computer will drop the entire network. Star. Tree. Ring. ALL. Switch operates in which layer of OSI Reference Model. Layer2 data link layer. layer4 transport layer. layer3 network layer. layer7 application layer. With .... , users can rent the software services. SAAS. IAAS. PAAS. DAAS. which of the following is a property of cloud computing. elasticity. composability. partition ability. all of the mentioned. .... is one of the cloud computing technologies. programming language. virtualization. python. all. .... is the cloud computing model that authorized user can access its data. public model. private model. hybrid model. community model. When you change television channels by infrared remote control , you are estabilshing a ... connection between the remote control and the television's control system and the mode of communication is ...... point to point/ half-duplex. multi-point / simplex. multi-point/half-duplex. point to point / simplex. Broadcast refers to transmitting the same message or packets to all devices at the same time. true. false. in multicasting , what is an advantage compared to broadcasting ?. Reduced network bandwidth usage. simplicity in implementation. faster data transmission. greater reachability to all devices. Mesh uses multipoint connection type. true. false. Which Network architecture involves devices sharing resources and services without a dedicated central server. Client server network. peer to peer network. Mesh Network. Hybrid Network. What does the acronym "ML" stand for in the context of Ai. Maching Language. Managed Learning. Multiple Layers. Machine Learing. in 1997 , IBM's Deep Blue made history by defeating the world chess champion , who is the world chess champion at that time. Garry Kasparov. Bobby Fischer. Anatoly Karpow. Viswanathan Anad. What is the turing test used for in the context of AI ?. To determine if a machine exhibits intelligent behavior equivalent to that of a human. to evaluate the performance of machine learning algorithms. to access the accuracy of natural language processing models. to measure the computational complexity of AI systems. What does IOT stand for. Internet of Technologies. Internet of Things. internet of telecommunication. integrated online technology. which wireless technology is commonly used for short - range communction in IOT. BlueTooth. Wi-Fi. LTE. Zigbee. which of the following is not a characteristic of cloud computing. on-demand self-service. Limited scalability. Resource Pooling. Broad network access. |