عرض مشاركة واحدة
  #926 (permalink)  
قديم 24-09-2014, 06:03 PM
أخصائية تطبيقات أخصائية تطبيقات غير متصل
عضو جديد
 
تاريخ التسجيل: Jun 2014
المشاركات: 33
معدل تقييم المستوى: 22
أخصائية تطبيقات يستحق التميز

أول شيء قبل الأسئلة - لا تنسوا قراءة أذكاركم - والتوكل على الله - وقراءة سورة يــس لتسهيل الأمور
ثانيا - بطاقة الهوية مهمة لا تنسوها عشان المطابقة ..
ثالثا - بخصوص النتايج برضو زي الأخوان قالو بعد أسبوعين وبعدها إختبار اللغة ..

بالنسبة للأسئلة .. كتبت كل اللي جا فبالي حتى المكرر وأعتذر على الصياغة والإختيارات الناقصة لأني ما أتذكرها بالضبط بس حاولت أجيب اللب المهم .. ممكن بعض الأسئلة فيها اختيار واحد لأنه هو اللي اتذكره فلاتعتمدوه كإجابة لأني مو متأكدة من إجاباتي ..

أخيرا أتمنى أتمنى إذا أستفدتو تذكروني بدعوة في ظهر الغيب ..

دعواتي للكل بالتوفيق والنجاح ..

--------------------------------------------------------------------------------------------------------------------------
[align=left]
1- To connect one application to database server we use :
JDBS and ODBC
HTML
Non of above
all of above

-------------------------------------------------------


2- Which command is not used with file permission :
Stop
Excute
Write
Read

-------------------------------------------------------

3- Malicious attack :
Threat information
Information modification
Non
All

-------------------------------------------------------

4- Most common type of security attack is
Sharing information and permission
Worms
Netbot

-------------------------------------------------------

5- Which one is URL
-------------------------------------------------------
6- Which one is IP address
-------------------------------------------------------
7- Which one of the search engine is developed by Microsoft
Excel
Google
Yahoo
Bing
-------------------------------------------------------
8- Ascii code is set of ------ to represent a single character
Kilobytes
Bits
Bytes
-------------------------------------------------------
9- Firewall is -----
-------------------------------------------------------
10- Which of the following is not object oriented language
JAVA
C#
C++
-------------------------------------------------------
11- What is the node in network
-------------------------------------------------------
12- Dynamic website

Generate same content ----- etc
Run on demand by a programmer or ---- etc
None
All
-------------------------------------------------------
13- Good software attribute
-------------------------------------------------------
14- Which one is not ******* in software process
-------------------------------------------------------
15- Type of attack causes the unavailability of the service
Virues
Denial service attack
-------------------------------------------------------
16- The one who is responsible to structure project database is
Programmer
Designer
Project manager
Database administrator
-------------------------------------------------------
17- Type of memory device made of semiconductor
RAM
Hard disk
CD –
-------------------------------------------------------
18-High speed Ethernet used
Fiber optic
Twisted pair
-------------------------------------------------------
19- Debugging
-------------------------------------------------------
20- ---------- change code form ------- to machine language
Compiler

21- Relational database means more
Tables
Fields
Relations

-------------------------------------------------------

22- the following Pseudo codetype of
{ Get number
While > -----
Add }
Loop
Nested
Decision
Sequence
-------------------------------------------------------
23-WWW
-------------------------------------------------------
24- URL
-------------------------------------------------------
25- RAD
-------------------------------------------------------
26 – when an error accrued in computer the error save in
Log file
-------------------------------------------------------
27-not use for dynamic website
Asp.ne
Php
All
None
-------------------------------------------------------
28- which is not OS from the following
DOS
Windows
MS- word
-------------------------------------------------------
29- Linux is
Operating system
-------------------------------------------------------
30- select * command
-------------------------------------------------------
31- insert command
-------------------------------------------------------
32- Paste shortcut
-------------------------------------------------------
33- Programmer A develop a website using Php , SQL , Html this site is
Static
Dynamic
-------------------------------------------------------
34- two computers on network when
One computer can exchange information with one process in another computer
2 different processor

-------------------------------------------------------
35- private network extends a private network across a public network
VPN -> virtual private network
-------------------------------------------------------
36- Brain of the computer , make all the process and calculation
CPU
-------------------------------------------------------
37- Twitter Hash tag
-------------------------------------------------------
38- Twitter Charters number

[/align]