ALTAHADDI INTERNATIONAL SCHOOL -KGS |
2021 |
Name:…………………………………………………………………………………………
Q: One: Use the spreadsheet (data table) below to store the following data then write output information under:
Students data :
Name: Ali – date of birth=1989 – grade = seven – place=Sudan
Name: Rawia– date of birth=2000 – grade = two – place=Egypt
Name: Omer – date of birth=2001 – grade = three – place=London
Name: Reem – date of birth=2004– grade = four – place=India
Name: Qusay– date of birth=2010– grade = five – place=Sudan
Title: ……………………………………………………………………………..
|
|
|
|
|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
5 |
|
|
|
|
Output for every student individually :
1- ( )
2- ( )
3- ( )
4- ( )
4- ( )
Q: Two: Answer the following questions:
1- What do we mean by Cyber - crimes?
………………………………………………………………………………………………………………………………………………………………………………………………………………
2- Hacking is………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………………………………………………………………
3- How do we protect our data from hacking?
a-…………………………………………………………………………………………………
b-…………………………………………………………………………………………………
4- What is the function of the server?
………………………………………………………………………………………………………………………………………………………………………………………………………………
5- What do we mean by information security?
………………………………………………………………………………………………………………………………………………………………………………………………………………
6- What do we mean by operating systems?
………………………………………………………………………………………………………………………………………………………………………………………………………………
7- Describe hacking attack?
………………………………………………………………………………………………………………………………………………………………………………………………………………
8- A programmer is………?
………………………………………………………………………………………………………………………………………………………………………………………………………………
9- What do we mean by software systems?
………………………………………………………………………………………………………
………………………………………………………………………………………………………
10- What is different between server and client?
………………………………………………………………………………………………………………………………………………………………………………………………………………
Q: Three: Define the following:
1- Data
………………………………………………………………………………………………………………………………………………………………………………………………………………
2- Data table
………………………………………………………………………………………………………………………………………………………………………………………………………………
3- Field
………………………………………………………………………………………………………………………………………………………………………………………………………………
4- Records
………………………………………………………………………………………………………………………………………………………………………………………………………………
5- Network
………………………………………………………………………………………………………………………………………………………………………………………………………………
6- Server
………………………………………………………………………………………………………………………………………………………………………………………………………………
7- Client
………………………………………………………………………………………………………………………………………………………………………………………………………………
8- IP
………………………………………………………………………………………………………………………………………………………………………………………………………………
9- Local area network
………………………………………………………………………………………………………………………………………………………………………………………………………………
10- Platforms
………………………………………………………………………………………………………………………………………………………………………………………………………………
Q: Four: Give two examples:
Cyber - crimes
1- ....................................................................................................
2-.....................................................................................................
Information system elements
1- ....................................................................................................
2-.....................................................................................................
Data encoding
1- ....................................................................................................
2-.....................................................................................................
Risks of using internet
1- ....................................................................................................
2-.....................................................................................................
Operating systems
1- ....................................................................................................
2-.....................................................................................................
ليست هناك تعليقات:
إرسال تعليق