Deck 1: Introduction to the World of Computers

ملء الشاشة (f)
exit full mode
سؤال
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
سؤال
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen / stylus or touch input.
سؤال
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
سؤال
There are application programs that help users write their own programs using a programming language.
سؤال
Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network-usually the Internet.
سؤال
Once you have an Internet connection, you are ready to begin programming the Web-that is, using a Web browser to view Web pages.
سؤال
Small office networks enable workers to access company records stored on a network server.
سؤال
A computer does not always do whatever the instructions, or program, tell it to do.
سؤال
Computer literacy is knowing about and understanding computers and their uses.
سؤال
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
سؤال
Systems analysts design computer systems to be used within their companies.
سؤال
  The accompanying figure shows a notebook computer.<div style=padding-top: 35px>
The accompanying figure shows a notebook computer.
سؤال
Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of information.
سؤال
The external hardware components are located inside the main box or system unit of the computer.
سؤال
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
سؤال
The slide rule is considered by many to be the earliest recorded calculating device.
سؤال
Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
سؤال
Wireless networking allows the use of computers in virtually any location. _________________________
سؤال
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
سؤال
<strong>  As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.</strong> A) bar codes B) virtual reality glasses C) collaboration systems D) authentication systems <div style=padding-top: 35px>
As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.

A) bar codes
B) virtual reality glasses
C) collaboration systems
D) authentication systems
سؤال
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
سؤال
In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security numbers or other information needed for identity theft. _________________________
سؤال
A user inputs data into a computer, and then the computer processes it. _________________________
سؤال
In addition to the four primary computer operations, today's computers typically also perform ____ functions.

A) calculations
B) communications
C) sorting
D) programming
سؤال
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

A) design appliances
B) smart computers
C) home computers
D) smart appliances
سؤال
Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network. _________________________
سؤال
Computer programmers are the people who use a computer to obtain information. _________________________
سؤال
In the early 1980s, ____ were invented and computer use increased dramatically.

A) Printers
B) Networks
C) Microcomputers
D) Computers
سؤال
An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
سؤال
In cloud worlds, online users can explore anonymously. _________________________
سؤال
Mobile Tablets are extremely powerful computers used for complex computations and processing. _________________________
سؤال
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
سؤال
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop. _________________________
سؤال
Fifty years ago, computers were used primarily by researchers and ____.

A) musicians
B) scientists
C) writers
D) designers
سؤال
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.

A) hotspots
B) hotpoints
C) com spots
D) com points
سؤال
The ISP is the largest and most well-known computer network in the world. _________________________
سؤال
A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data, presents the results, and can store the data or results as needed. _________________________
سؤال
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules. _________________________
سؤال
Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today. _________________________
سؤال
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.

A) processor
B) microcomputer
C) microchip
D) small processor
سؤال
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people.

A) Computer addresses
B) Machine IDs
C) Domain IDs
D) Internet addresses
سؤال
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

A) two months
B) four years
C) two and a half years
D) six years
سؤال
When data is processed into a meaningful form, it becomes ____.

A) information
B) code
C) a program
D) a database
سؤال
____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.

A) Cloud storage
B) HTML
C) Java Script
D) Application software
سؤال
To contact people using the Internet, you most often use their ____.

A) domain names
B) e-mail addresses
C) usernames
D) passwords
سؤال
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

A) hardware
B) port
C) software
D) adapter
سؤال
Common input devices include the keyboard and ____.

A) printer
B) mouse
C) speaker
D) monitor
سؤال
<strong>  The accompanying figure corresponds to the ____ style for desktop PCs.</strong> A) all-in-one case B) tower case C) desktop case D) sub case <div style=padding-top: 35px>
The accompanying figure corresponds to the ____ style for desktop PCs.

A) all-in-one case
B) tower case
C) desktop case
D) sub case
سؤال
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.

A) Address bar
B) Domain bar
C) Address button
D) Name button
سؤال
<strong>  The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.</strong> A) command B) toolbox C) general menu D) desktop <div style=padding-top: 35px>
The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

A) command
B) toolbox
C) general menu
D) desktop
سؤال
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

A) computer bank
B) database
C) data bank
D) computer network
سؤال
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

A) search sites
B) domain identifications
C) domain sites
D) Internet repositories
سؤال
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.

A) mainframe computer
B) midrange server
C) mobile device
D) personal computer
سؤال
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny silicon chip, allowed computers to be even smaller and more reliable than earlier computers.

A) second-generation computers
B) third-generation computers
C) fourth-generation computers
D) fifth-generation computers
سؤال
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.

A) universal resource identifier (URI)
B) Web ID (WID)
C) uniform resource locator (URL)
D) Web resource identifier (WRI)
سؤال
A(n) ____ is a medium-sized computer used to host programs and data for a small network.

A) mainframe computer
B) super server
C) midrange server
D) Internet server
سؤال
Two of the most common types of communications hardware are ____ and network adapters.

A) ports
B) slide rules
C) monitors
D) modems
سؤال
Conventional PCs are often referred to as ____ because the complete computer system fits on or next to a desk.

A) desktop computers
B) laptop computers
C) super computers
D) processor computers
سؤال
Ultraportables conforming to Intel's standards can be marketed as ____.

A) IntelBooks
B) Ultrabooks
C) hybrids
D) smallframe computers
سؤال
____ is typically free and provided by virtually all ISPs used with personal computers.

A) Short Message mail
B) Web-based e-mail
C) Web-com
D) Program-based e-mail
سؤال
Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries, and ticketing systems.
سؤال
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.

A) Spammer
B) Snopes
C) Phisher
D) Identifier
سؤال
____________________ are computer professionals whose primary job responsibility is to write the programs that computers use.
سؤال
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

A) Spams
B) Phishes
C) Emoticons
D) Trojan horses
سؤال
Typically, individual users connect to the Internet by connecting to servers belonging to a(n) ____________________.
سؤال
____________________ is an alternative to traditional classroom learning that allows students to participate from their current location, instead of physically going to class.
سؤال
____ refers to typing your entire e-mail message or discussion group post using only capital letters.

A) Spamming
B) Phishing
C) Calling
D) Shouting
سؤال
An emerging payment option is the use of ____________________ payment systems-systems that allow individuals to pay for products and services via a mobile phone or other portable device.
سؤال
The ____________________ being used with a computer determine the tasks the computer is able to perform.
سؤال
The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle.
سؤال
____ refers to guidelines for online behavior.

A) Net rules
B) Web etiquette
C) Internet Rules
D) Netiquette
سؤال
One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.

A) identity duplication
B) domain theft
C) identity theft
D) phishing
سؤال
HTML is called a(n) ____________________ or scripting language.
سؤال
One common opinion is that fifth-generation computers will be based on ____________________, allowing them to think, reason, and learn.
سؤال
One trend involving servers today is ____________________, which means creating virtual (rather than actual) versions of a computing resource.
سؤال
The first computers were powered by thousands of ____________________ that needed replacing constantly, required a great deal of electricity, and generated a lot of heat.
سؤال
The physical parts of a computer are collectively referred to as ____________________.
سؤال
____________________-technically an input or output operation, depending on which direction the information is going-is increasingly considered the fifth primary computer operation.
سؤال
____________________ are regular appliances with some type of built-in computer technology.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/90
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to the World of Computers
1
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
False
2
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
True
3
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen / stylus or touch input.
True
4
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
5
There are application programs that help users write their own programs using a programming language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
6
Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network-usually the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
7
Once you have an Internet connection, you are ready to begin programming the Web-that is, using a Web browser to view Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
8
Small office networks enable workers to access company records stored on a network server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
9
A computer does not always do whatever the instructions, or program, tell it to do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
10
Computer literacy is knowing about and understanding computers and their uses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
11
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
12
Systems analysts design computer systems to be used within their companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
13
  The accompanying figure shows a notebook computer.
The accompanying figure shows a notebook computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
14
Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
15
The external hardware components are located inside the main box or system unit of the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
16
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
17
The slide rule is considered by many to be the earliest recorded calculating device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
18
Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
19
Wireless networking allows the use of computers in virtually any location. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
20
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
21
<strong>  As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.</strong> A) bar codes B) virtual reality glasses C) collaboration systems D) authentication systems
As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.

A) bar codes
B) virtual reality glasses
C) collaboration systems
D) authentication systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
22
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
23
In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security numbers or other information needed for identity theft. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
24
A user inputs data into a computer, and then the computer processes it. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
25
In addition to the four primary computer operations, today's computers typically also perform ____ functions.

A) calculations
B) communications
C) sorting
D) programming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
26
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

A) design appliances
B) smart computers
C) home computers
D) smart appliances
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
27
Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
28
Computer programmers are the people who use a computer to obtain information. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
29
In the early 1980s, ____ were invented and computer use increased dramatically.

A) Printers
B) Networks
C) Microcomputers
D) Computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
30
An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
31
In cloud worlds, online users can explore anonymously. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
32
Mobile Tablets are extremely powerful computers used for complex computations and processing. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
33
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
34
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
35
Fifty years ago, computers were used primarily by researchers and ____.

A) musicians
B) scientists
C) writers
D) designers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
36
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.

A) hotspots
B) hotpoints
C) com spots
D) com points
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
37
The ISP is the largest and most well-known computer network in the world. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data, presents the results, and can store the data or results as needed. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
39
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
40
Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
41
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.

A) processor
B) microcomputer
C) microchip
D) small processor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
42
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people.

A) Computer addresses
B) Machine IDs
C) Domain IDs
D) Internet addresses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
43
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

A) two months
B) four years
C) two and a half years
D) six years
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
44
When data is processed into a meaningful form, it becomes ____.

A) information
B) code
C) a program
D) a database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
45
____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.

A) Cloud storage
B) HTML
C) Java Script
D) Application software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
46
To contact people using the Internet, you most often use their ____.

A) domain names
B) e-mail addresses
C) usernames
D) passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
47
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

A) hardware
B) port
C) software
D) adapter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
48
Common input devices include the keyboard and ____.

A) printer
B) mouse
C) speaker
D) monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
49
<strong>  The accompanying figure corresponds to the ____ style for desktop PCs.</strong> A) all-in-one case B) tower case C) desktop case D) sub case
The accompanying figure corresponds to the ____ style for desktop PCs.

A) all-in-one case
B) tower case
C) desktop case
D) sub case
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
50
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.

A) Address bar
B) Domain bar
C) Address button
D) Name button
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
51
<strong>  The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.</strong> A) command B) toolbox C) general menu D) desktop
The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

A) command
B) toolbox
C) general menu
D) desktop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
52
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

A) computer bank
B) database
C) data bank
D) computer network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
53
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

A) search sites
B) domain identifications
C) domain sites
D) Internet repositories
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
54
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.

A) mainframe computer
B) midrange server
C) mobile device
D) personal computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
55
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny silicon chip, allowed computers to be even smaller and more reliable than earlier computers.

A) second-generation computers
B) third-generation computers
C) fourth-generation computers
D) fifth-generation computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
56
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.

A) universal resource identifier (URI)
B) Web ID (WID)
C) uniform resource locator (URL)
D) Web resource identifier (WRI)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
57
A(n) ____ is a medium-sized computer used to host programs and data for a small network.

A) mainframe computer
B) super server
C) midrange server
D) Internet server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
58
Two of the most common types of communications hardware are ____ and network adapters.

A) ports
B) slide rules
C) monitors
D) modems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
59
Conventional PCs are often referred to as ____ because the complete computer system fits on or next to a desk.

A) desktop computers
B) laptop computers
C) super computers
D) processor computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
60
Ultraportables conforming to Intel's standards can be marketed as ____.

A) IntelBooks
B) Ultrabooks
C) hybrids
D) smallframe computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
61
____ is typically free and provided by virtually all ISPs used with personal computers.

A) Short Message mail
B) Web-based e-mail
C) Web-com
D) Program-based e-mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
62
Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries, and ticketing systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
63
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.

A) Spammer
B) Snopes
C) Phisher
D) Identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
64
____________________ are computer professionals whose primary job responsibility is to write the programs that computers use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
65
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

A) Spams
B) Phishes
C) Emoticons
D) Trojan horses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
66
Typically, individual users connect to the Internet by connecting to servers belonging to a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
67
____________________ is an alternative to traditional classroom learning that allows students to participate from their current location, instead of physically going to class.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
68
____ refers to typing your entire e-mail message or discussion group post using only capital letters.

A) Spamming
B) Phishing
C) Calling
D) Shouting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
69
An emerging payment option is the use of ____________________ payment systems-systems that allow individuals to pay for products and services via a mobile phone or other portable device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
70
The ____________________ being used with a computer determine the tasks the computer is able to perform.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
71
The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
72
____ refers to guidelines for online behavior.

A) Net rules
B) Web etiquette
C) Internet Rules
D) Netiquette
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
73
One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.

A) identity duplication
B) domain theft
C) identity theft
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
74
HTML is called a(n) ____________________ or scripting language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
75
One common opinion is that fifth-generation computers will be based on ____________________, allowing them to think, reason, and learn.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
76
One trend involving servers today is ____________________, which means creating virtual (rather than actual) versions of a computing resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
77
The first computers were powered by thousands of ____________________ that needed replacing constantly, required a great deal of electricity, and generated a lot of heat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
78
The physical parts of a computer are collectively referred to as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
79
____________________-technically an input or output operation, depending on which direction the information is going-is increasingly considered the fifth primary computer operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
80
____________________ are regular appliances with some type of built-in computer technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.