Search Header Logo
Domain 1 : Computing Systems and Networks

Domain 1 : Computing Systems and Networks

Assessment

Presentation

Computers

11th Grade

Practice Problem

Medium

Created by

alaa jaber

Used 11+ times

FREE Resource

121 Slides • 117 Questions

1

media

Domain1 : Computing Systems and Networks

2024-2025 Term 1

2

media
media

1.Computer systems

3

media

Objectives:

1.

Identify the hardware components of a given computing system and
describe the function of these components.

2.

Select and operate computing devices that perform a variety of
tasks accurately and quickly based on user needs and preferences.

3.

Explain the functions of common hardware and software
components of computing systems.

4.

Determine potential solutions to solve simple hardware and
software problems using common troubleshooting strategies.

5.

Identify the layers of computer system

4

media
media

5

media

6

Multiple Choice

A _______________________ is a set of integrated devices that input, output, process, and store data and information. Computer systems are currently built around at least one digital processing device. There are five main hardware components in a computer system: Input, Processing, Storage, Output and Communication devices.

1

Computer system

2

Troubleshooting

7

Multiple Choice

___________________is a systematic way to figure out how to fix a problem. The objective is to evaluate why something does not perform as expected and describe how to fix the issue


1

Computer system

2

Troubleshooting

8

media
media

1.1 Computing Systems Hardware:

Is the physical components that a computer system requires to function. It
encompasses everything with a circuit board that operates within a PC or
laptop; including the motherboard, graphics card, CPU (Central
Processing Unit), ventilation fans, webcam, power supply, and so on.

9

media
media
media

1.2 Computing Systems Software:

Controls a computer's internal functioning, chiefly through an operating
system, and also controls such peripherals as monitors, printers, and storage
devices. .

falls into two broad classes:

1-Operating system software

2-application software.

The principal system software is the operating system

10

Multiple Choice

Question image

The following software are :

1

application software

2

Operating system software

11

Multiple Choice

Question image

The following software are :

1

application software

2

Operating system software

12

Multiple Choice

______________Is the physical components that a computer system requires to function.

1

Computing Systems Hardware

2

Computing Systems Software

3

Troubleshooting strategies

13

Multiple Choice

______________ Controls a computer's internal functioning, chiefly through an operating system, and also controls such peripherals as monitors, printers, and storage devices.

1

Computing Systems Hardware

2

Computing Systems Software

3

Troubleshooting strategies

14

media
media

1.3 Computing Systems Troubleshooting:

Troubleshooting is a systematic way to figure out how to fix a problem. The
objective is to evaluate why something does not perform as expected and describe
how to fix the issue

15

media
media

Systematic troubleshooting approach

Step 1: Identify the problem

Step 2: Establish a hypothesis about the cause
Step 3: Propose solution
Step 4: Test the solution
Step 5: Verify and monitor the solution
Step 6: Document the process

16

Multiple Choice

What should be the first step to take when troubleshooting a problem?

1

a. Implement the solution

2

b. Identify the problem

3

c. Identify the cause

4

d. Plan and test the solution

17

media

Step 1: Identify the problem

Gather all the relevant information about the issue; including when it started,
symptoms observed, and any error messages. Check available documentation
and online resources for additional details. Clearly define the problem state

18

media

Step 2: Establish a hypothesis about the cause

Based on the problem identified, list all the probable causes that can lead
to the observed issue. Use trial and error to narrow down the potential
causes. Reduce the problem area by progressively isolating the potential
causes.

19

media

Step 3: Propose solution

Propose solutions based on the hypothesized cause of the issue,
starting from the simplest to the most complex. Solutions should
directly address the probable cause identified and aim to resolve the
issue

20

media

Step 4: Test the solution

Test the proposed solutions to verify if the hypothesized cause is
correct and if the solution resolves the issue. Repeat Step 2 if all
solutions fail. Develop new hypotheses and solutions to test

21

media

Step 5: Verify and monitor the solution

After implementing a verified solution, monitor the system to ensure
no new issues arise and the solution continues to address the root cause

22

media

Step 6: Document the process

Documentation is essential and must be maintained throughout the systematic
troubleshooting of an issue. It involves recording every relevant detail at each step
which helps in resolving the current problem and aids future troubleshooting efforts.
The documentation can use formats like tables, flowcharts, written descriptions, or a
combination of these to capture the end-to-end troubleshooting methodology

23

media

24

Multiple Choice

____________________ means : Gather all the relevant information about the issue; including when it started, symptoms observed, and any error messages.

1

a. Implement the solution

2

b. Identify the problem

3

c. Identify the cause

4

d. Plan and test the solution

25

Multiple Choice

_______________________ based on the hypothesized cause of the issue, starting from the simplest to the most complex.

1

a. Implement the solution

2

b. Identify the problem

3

c. propose the cause

4

d. Plan and test the solution

26

Multiple Choice

It involves recording every relevant detail at each step which helps in resolving the current problem and aids future troubleshooting efforts.and can use formats like tables, flowcharts, written descriptions, or a combination of these to capture the end-to-end troubleshooting methodology.

1

a. Implement the solution

2

Document the process

3

c. propose the cause

4

d. Plan and test the solution

27

media
media

28

media
media

Layers of computing system:

29

media
media

30

media
media
media
media

31

media
media
media
media

32

media
media
media

33

media
media
media

Operating systems are the fourth layer. An operating system determines how users and

hardware interact. Its main job is to manage computer resources such as the keyboard,

monitors, printers, scanners, and cameras. Operating systems help in communicating

with the computer system and managing the interactions between hardware devices,

programs, and data.A few examples of operating systems are windows, Linux, Mac OX,
Android, and 10S.

34

media
media
media
media

Applications are programs written to carry out a specific task. Every program you
run on your computer's operating system is an application program that helps you
accomplish a task or solve a certain problem.

35

media
media
media

Communication layers help to communicate with other computers
for exchanging data.Computer technologies like tools used to send,
receive, and process information are used to communicate.

36

Multiple Choice

In __________________ layer means a collection of data that has a logical meaning.The _______________ layer refers to the way __________________ is represented on a computer. Binary numbers, Os and 1s, are used to manage __________________ on a computer. This means that a binary format is used to represent all______________ that is processed by a computer
such as text, photos, videos, and audio. Therefore, understanding the binary system is
required to know how data is managed inside a computer. (Same word in all blanks)

1

Information

2

Programming

3

Operating system

4

Application

37

Multiple Choice

_____________________ layer refers to the physical components of a computer that allow it to function.
Along with the motherboard and the Central Processing Unit, the ________________ components
also include other devices such as gates and circuits, These devices are made of many
transistors and control the flow of electricity. There are millions of transistors inside the _____________ components of a computer  (Same word in all blanks)

1

Information

2

Hardware

3

Operating system

4

Application

38

Multiple Choice

The _______________ layer is about computer software. Software is a solution, or a set of instructions for the hardware layer to follow. The programs at the __________________ layer use instructions to process data, perform computations and manage data. The main goal of these programs is to solve various problems and perform different tasks. (Same word in all blanks)

1

Information

2

Hardware

3

Programming

4

Application

39

Multiple Choice

__________________ are the fourth layer. A(n) ___________________ determines how users and

hardware interact. Its main job is to manage computer resources such as the keyboard, monitors, printers, scanners, and cameras. _____________s help in communicating with the computer system and managing the interactions between hardware devices,

programs, and data. (Same word in all blanks)

1

Information

2

Operating system

3

Programming

4

Application

40

Multiple Choice

_________________layer are programs written to carry out a specific task. Every program you run on your computer's operating system is an _______________program that helps you accomplish a task or solve a certain problem.. (Same word in all blanks)

1

Information

2

Operating system

3

Programming

4

Application

41

Multiple Choice

_____________________ layers help to communicate with other computers for exchanging data.Computer technologies like tools used to send, receive, and process information are used to communicate. (Same word in all blanks)

1

Information

2

Communication

3

Programming

4

Application

42

Multiple Choice

A few examples of ________________ are windows, Linux, Mac OX, Android, and 10S.

1

Application software

2

Programming

3

operating systems

4

Information

43

media

1.4 Computing Devices and Trends:

Top Computer Science Trends

Artificial Intelligence | Edge Computing | Quantum Computing | Robotics
| Cybersecurity | Bioinformatics

44

media

1.4 Computing Devices and Trends:

Top Computer Science Trends

Artificial Intelligence | Edge Computing | Quantum Computing | Robotics
| Cybersecurity | Bioinformatics

45

media
media

1. Artificial intelligence:

centers on machine coding that mimics human and animal intelligence.
AI professionals develop algorithms and program machines to perform
humanlike tasks. professionals develop algorithms and program machines
to perform humanlike tasks. AI helps detect credit card fraud, identify
disease outbreaks, and optimize satellite navigation.

46

media

2.Edge computing:

In contrast to cloud computing, where data is processed and stored far away from the end
user in large data centers, edge computing puts computer data at "the edge," close to the
end user. Experts do not expect the cloud to disappear completely, but rather work in
tandem with edge computing as it brings processing to users, streamlining anything from
factory production to self driving car response.

Technology like autonomous cars, video conferencing, and augmented reality all benefit
from edge computing. For example,

47

media

3.Quantum computing:

It is uses powerful computers to solve problems at the atomic and
subatomic levels. Unlike classic computers, which perform
calculations and store data in binary code, quantum computers use
quantum bits, also known as qubits. This allows quantum computers
to crunch numbers and solve problems much more quickly than
previously possible.

48

media

4. Robotics:

This field studies and develops robots in the pursuit of make life easier. A
multidisciplinary field, robotics incorporates computer science and electrical
and mechanical engineering. Robotics uses artificial intelligence, machine
learning, and other computer science technologies. Robots aim to increase
safety and efficiency in industries like manufacturing, farming, and food
preparation.

People use robotics technologies to manufacture cars, complete dangerous
tasks like bomb diffusion, and conduct complex surgeries.

49

media

5. Cyber security:

It is focuses on protecting computer systems and networks from
cyberthreats and attacks. As companies continue storing information on
the cloud and conduct operations online, the need for improved
cybersecurity also grows.
Individuals, businesses, and governments experience significant financial
losses due to cyberattacks.

50

media

6. Bioinformatics:

It is professionals study, store, and analyze biological information. A
multidisciplinary subfield combining computer science and biology,
bioinformatics looks for patterns in sequences of genetic material like
DNA, genes, RNA, and protein.

Bioinformatics workers develop the methods and software applications
that accomplish these tasks.

51

Multiple Choice

centers on machine coding that mimics human and animal intelligence. AI professionals develop algorithms and program machines to perform humanlike tasks

1

Edge computing

2

Quantum computing

3

Robotics

4

Cyber security

5

Artificial intelligence

52

Multiple Choice

Technology like autonomous cars, video conferencing, and augmented reality all benefit from __________________

1

Edge computing

2

Quantum computing

3

Robotics

4

Cyber security

5

Artificial intelligence

53

Multiple Choice

It is uses powerful computers to solve problems at the atomic and subatomic levels. Unlike classic computers, which perform calculations and store data in binary code

1

Edge computing

2

Quantum computing

3

Robotics

4

Cyber security

5

Artificial intelligence

54

Multiple Choice

People use __________ technologies to manufacture cars, complete dangerous tasks like bomb diffusion, and conduct complex surgeries.

1

Edge computing

2

Quantum computing

3

Robotics

4

Cyber security

5

Artificial intelligence

55

Multiple Choice

It is focuses on protecting computer systems and networks from cyberthreats and attacks. As companies continue storing information on the cloud and conduct operations online, the need for improved _______________ also grows

1

Edge computing

2

Quantum computing

3

Robotics

4

Cyber security

5

Artificial intelligence

56

Multiple Choice

______________ looks for patterns in sequences of genetic material like DNA, genes, RNA, and protein.


1

Edge computing

2

Bioinformatics

3

Robotics

4

Cyber security

5

Artificial intelligence

57

media
media

2.Design computer

network

58

media

Objectives:

1.

Design computer networks based on a given network design requirements and
describe the network organization in term of hardware and software components
and network security.

2.

Differentiate between different types of network types and recommend suitable
network type for a given scenario

3.

Model and describe how people connect to other people, places, information and
ideas through a network.

4.

Examine the scalability and reliability of networks, by describing the relationship
between routers, switches, servers, topology, and addressing.

5.

Differentiate between different types of network types and recommend suitable
network type for a given scenario.

59

media
media

60

Fill in the Blank

A _______________ is created when more than one device is connected together

61

media
media

62

Multiple Select

What is the purpose of network? Choose two answers

1

set of rules that set data transmission so that a particular type of data will be formatted in a certain way


2

communication and collaboration

3

guard against cyber threats

4

sharing information and resources

63

media

64

Multiple Choice

Network enhance many aspects of life and business for individuals and organizations,including, Which of the following is advantages of network?

1

Specialist staff often required

2

Roaming profile

3

Expensive hardware

4

Reliance on networked resources

65

Multiple Choice

Network enhance many aspects of life and business for individuals and organizations,including, Which of the following is disadvantages of network?

1

Communication and collaboration

2

Sharing information and resources

3

Specialist staff often required

4

Saving cost

66

media

67

media

68

media
media

A computer network is a group of computers and/or devices that are
connected with each other for the purpose of communicating data
electronically. Here is an example of a simple computer network:

The most well-known network in the world is the Internet. The Internet is
a global network of networks that connects computer and devices
worldwide.

69

Multiple Choice

The _____________________ is a global network of networks that connects computer and devices worldwide. 

1

Internet

2

Network

3

Computer network

4

e-commerce

70

Multiple Choice

A _______________ is created when more than one device is connected together

1

Internet

2

Network

3

Computer network

4

e-commerce

71

Multiple Choice

A _________________ is a group of computers and/or devices that are
connected with each other for the purpose of communicating data
electronically

1

Internet

2

Network

3

Computer network

4

e-commerce

72

media
media

Computer networks can be used by individuals and businesses for many
applications. They enable communication, exchange of data as well as
providing access to information, resources and services worldwide via the
Internet.

73

media
media

Some applications and services available on computer networks include:

74

media
media
media

There are various types of computer networks. Some are connected
wirelessly, while others are connected through wires. The connection is
within a single room to the millions of computers spread across the globe.
These networks are categorised based on the geographical area covered
and data transfer rate from one device to another.

75

media

76

media

77

media
media

78

media
media
media

local area network (LAN) is a network that is geographically limited to a
single building or location. The organisation owns and maintains the LAN.

Examples include networks at schools, colleges, universities, small
businesses, small organizations, and homes.

79

media
media
media

An extended form of LAN is the Metropolitan Area Network (MAN). It covers a
larger geographical area like a city or a town.

Examples include cable TV networks or cable-based broadband internet services.

80

media
media
media

A wide area network (WAN) spreads over a wide geographical area. It can spread
across a country or even the world. WAN connects more than one site. Examples
include banks, which are connected to more than one branch, using a WAN. The
WAN connects the main headquarters to the sub-offices and branches, allowing
them to communicate and share data. Telephone infrastructures or wireless
transmission are used for communication. Each office or branch has its own LAN
to which the WAN connects.

Another example of a WAN connection is the internet.

81

Multiple Choice

An extended form of LAN is the _________. It covers a larger geographical area like a city or a town. Examples include cable TV networks or cable-based broadband internet services.

1

PAN

2

LAN

3

MAN

4

WAN

82

Multiple Choice

Examples of wired _________ include using USB to connect a mobile phone to a laptop. On the other hand, using Bluetooth technology to connect two smartphones is a form of a wireless ________.

1

PAN

2

LAN

3

MAN

4

WAN

83

Multiple Choice

______________spreads over a wide geographical area. It can spread across a country or even the world. __________ connects more than one site. Examples include banks, which are connected to more than one branch, using a ___________.(Same word in all blanks)

1

PAN

2

LAN

3

MAN

4

WAN

84

Multiple Choice

_________ is a network that is geographically limited to a single building or location. The organisation owns and maintains the ________

Examples include networks at schools, colleges, universities, small businesses, small organisations, and homes.


1

PAN

2

LAN

3

MAN

4

WAN

85

Multiple Choice

Example of a _______ connection is the internet.

1

PAN

2

LAN

3

MAN

4

WAN

86

media
media

87

media

88

media
media

89

media
media

90

media
media

91

media
media

92

media
media

93

Multiple Choice

Question image

Computing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network.it is the most common network setup. What is the topoloy type in the figure below?

1

Bus topology

2

Star topology

3

Ring topology

4

Mesh topology

5

Tree topology

94

Multiple Choice

Question image

Computing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network. What is the topoloy type in the figure below?

1

Bus topology

2

Star topology

3

Ring topology

4

Mesh topology

5

Tree topology

95

Multiple Choice

Question image

Computing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network.Where multiple LANs connected. What is the topoloy type in the figure below?

1

Bus topology

2

Star topology

3

Ring topology

4

Mesh topology

5

Tree topology

96

Multiple Choice

Question image

Computing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network.each device has a unique identity and can detect signals intended for its use. What is the topoloy type in the figure below?

1

Bus topology

2

Star topology

3

Ring topology

4

Mesh topology

5

Tree topology

97

Multiple Choice

Question image

CComputing devices are connected to form a network (LAN, WAN, MAN, PAN), and interconnections of many LAN networks form the internet. Network topology refers to the arrangement of computers and other peripherals in a network.each computer and network device is interconnected with every other device in the network. What is the topoloy type in the figure below?

1

Bus topology

2

Star topology

3

Ring topology

4

Mesh topology

5

Tree topology

98

media
media

Hardware devices that are used to connect computers, printers, laptops
and other electronic devices to a network are called network devices.
Different network devices are required to communicate data in a network.
Let us explore a few of them:

1.

Modem

2.

Network media

3.

Ethernet card

99

media
media
media

Modem stands for MOdulator and DEModulator. It is used for conversion between
analogue signals and digital bits.

100

media
media

101

media
media

102

Fill in the Blank

_____________ stands for modulator and demodulator. It is used for conversion between analogue signals and digital bits.

103

Multiple Choice

__________________ are time separated signals and are denoted by square waves. _________________ use only Os and 1s to represent the information. For example, data transmission during computing and for digital electronics. (Choose one for both blanks)

1

Analogue signals

2

Digital signals

104

Multiple Choice

__________________ are continuous signals and are denoted by sine waves. The __________________ use values that are in a continuous range. For example, for audio and video transmission. (Choose one for both blanks)

1

Analogue signals

2

Digital signals

105

Multiple Choice

Hardware devices that are used to connect computers, printers, laptops and other electronic devices to a network are called_______________

1

Prepherals

2

network devices

3

Input and output devices

4

End devices

5

Network media

106

media

Networks are composed of network media and network hardware.

Network media are the communication channels in network. It is the
actual path over which an electrical signal travel. The signals move from
one component to another. The common types of network media include
twisted-pair cable, coaxial cable, fibre-optic cable, and wireless.

107

Multiple Choice

____________________are the communication channels in network. It is the actual path over which an electrical signal travel.

1

Prepherals

2

network devices

3

Input and output devices

4

End devices

5

Network media

108

media
media

109

media
media

110

media
media

111

Multiple Select

The common types of network media include :_____________

1

twisted-pair cable

2

coaxial cable

3

fibre-optic cable

4

wireless

112

Multiple Choice

________________________ cable is made up of 100 or more very thin strands of glass or plastic . Each strand is capable of transmitting messages which turns into light waves.

1

twisted-pair cable

2

coaxial cable

3

fibre-optic cable

4

wireless

113

Multiple Choice

____________________ cables are used for telephone communications and most modern Ethernet
networks. 

1

twisted-pair cable

2

coaxial cable

3

fibre-optic cable

4

wireless

114

Multiple Choice

___________________ is a common type of shielded data transmission cable. It consists of a hollow outer cylindrical conductor that surrounds a single inner wire made of two conducting elements. One of these elements, in the centre of the cable, is a copper
conductor.

1

twisted-pair cable

2

coaxial cable

3

fibre-optic cable

4

wireless

115

media
media

116

Multiple Choice

______________________ do not use cables to connect and communicate with each other. Waves technology is used to communicate wirelessly between network devices. When there is a situation where cables cannot be extended, or networks do not prefer cables for
communication, then wireless media can be used for sending and receiving data.

1

twisted-pair cable

2

coaxial cable

3

fibre-optic cable

4

wi-fi network

117

media

Bandwidth & Throughput:

Bandwidth: bandwidth is the maximum rate of data transfer across a given path.

Bandwidth may be characterized as network bandwidth, data bandwidth, or digital

bandwidth

Throughput: tells you how much data was transferred from a source at any given
time

118

Multiple Choice

_____________________ is the maximum rate of data transfer across a given path.

1

Bandwidth

2

Throughput

119

Multiple Choice

___________________tells you how much data was transferred from a source at any given time

1

Bandwidth

2

Throughput

120

media
media
media
media

Networks hardware includes hosts (also called end devices) and network devices.

You already know about most end devices because you use them to access
information, resources and services on computer networks. Some examples of
end devices are:

121

Multiple Choice

Personal computers,Laptops,smartphones,Tablets,printers,servers are all called__________________:

1

Prepherals

2

network devices

3

Input and output devices

4

End devices

5

Network media

122

media
media

Network hardware(Cont..)

Network interface cards

The card with a network cable port or radio antenna is known as a network

interface card (NIC). The NIC is used to change data from a host device into a

signal that can be sent over a network. It also changes signals that are received

into data that host devices can understand. Each NIC has a unique identifier

called a MAC address. Here is an example of a network interface card:

123

Fill in the Blank

The NIC card with a network cable port or radio antenna is known as a . The NIC is used to change data from a host device into a signal that can be sent over a network.what is NIC stands for?

124

Multiple Choice

Each NIC has a unique identifier called a _______ address

1

IP

2

MAC

125

media
media

To communicate between end devices, you need to use network devices.

Network devices are used to create connections between end devices.
This enables host devices to communicate, exchange data and access
information, resources and services on a network. Some examples of
network devices include:

1-Hub

2-Switches

3-Routers

126

media

127

Multiple Select

Network devices are used to create connections between end devices. This enables host devices to: (Which of the following are the functions of network devices?)

1

communicate

2

exchange data and access information

3

change data from a host device into a signal that can be sent over a network

4

resources and services on a network

128

media

129

media
media

130

media
media

131

media
media

132

media
media

133

media

134

Multiple Choice

Which one of the following is not from the examples of network devices?

1

Switch

2

Server

3

Hub

4

Router

135

Multiple Choice

Which one of the following is most common network device used to host a network?

1

Switch

2

Hub

3

Router

136

Multiple Choice

Which one of the following is act as a gateway to other network, allow communication  between hosts on a different networks

1

Switch

2

Hub

3

Router

137

Multiple Choice

Switches are smart Hubs but more effective ,higher performance and a more recent technology.

1

True

2

False

138

Multiple Choice

The main difference between switches and Hubs :  is that the Hubs are a dedicated bandwidth while Switches are shared bandwidth

1

True

2

False

139

media

140

media
media

141

media
media

142

Multiple Choice

Google chrome, internet explorer, fire fox, safari are all web browsers and examples on_______________

1

Servers software

2

Clients sofware

3

Network devices

4

Network media

143

Multiple Choice

__________________ are Hosts that have software installed that enable them to provide information, like email or web pages, to other hosts on the networks.

1

Clients

2

Network devices

3

Routers

4

Servers

144

media

145

media
media

146

Multiple Choice

_____________________provides a service that controls
access to separately stored files as part of a
multiuser system. (service povided by server)

1

directory service

2

Dynamic Name Service (DNS)

3

File Server

4

Index/Search Service

147

Multiple Choice

_________________________is an Internet service that translates a domain name into an IP address. For example, the IP address 198.105.232.4 might translate to wwiw.example.com (service povided by server)

1

directory service

2

Dynamic Name Service (DNS)

3

File Server

4

Index/Search Service

148

Multiple Choice

A ______________________ is the software system
that stores, organizes, and provides
access to information in a computer
operating system's directory (service povided by server)

1

directory service

2

Dynamic Name Service (DNS)

3

File Server

4

Index/Search Service

149

Multiple Choice

________________________inventories all files
on a sever or network and organizes
them in such a way that they can be
easily located by executing a search
query. (service povided by server)

1

directory service

2

Dynamic Name Service (DNS)

3

File Server

4

Index/Search Service

150

Multiple Choice

______________________provides a sevice for hosting and
managing Websites. (service povided by server)

1

Email Service

2

Database Service

3

Proxy Server

4

Web Server

151

Multiple Choice

_______________________provides users with
the ability to send, receive, and review
email from their web browsers or email
client, such as Outlook.  (service povided by server)

1

Email Service

2

Database Service

3

Proxy Server

4

Web Server

152

Multiple Choice

 __________________provides service for information that
is organized so that it can easily be accessed,
managed, and updated.  (service povided by server)

1

Email Service

2

Database Service

3

Proxy Server

4

Web Server

153

Multiple Choice

 _______________________is a hardware or software system that acts as an intermediary between an endpoint device and another server from which that device is requesting a service.  (service povided by server)

1

Email Service

2

Database Service

3

Proxy Server

4

Web Server

154

Multiple Choice

 Some server platforms provide a _______________ that turns the server into a security apparatus for the network. This type of ________________ uses a series of preconfigured rules, and monitors and blocks any inappropriate traffic.  (service povided by server)

1

Management Server

2

Virtualization Service

3

Proxy Server

4

Print service

5

Firewall Service

155

Multiple Choice

__________________ allows multiple instances of a server application to be run on a single physical system. (service povided by server)

1

Management Server

2

Virtualization Service

3

Proxy Server

4

Print service

5

Firewall Service

156

Multiple Choice

Most enterprise server solutions contain a series
of tools that allow an administrator to monitor
and resolve any performance or stability issues with the server.  (service povided by server)

1

Management Server

2

Virtualization Service

3

Proxy Server

4

Print service

5

Firewall Service

157

Multiple Choice

_____________________allows multiple employees to access a single printer. A _______________ will generally administer more than one printer.  (service povided by server)

1

Management Server

2

Virtualization Service

3

Proxy Server

4

Print service

5

Firewall Service

158

media
media

A Protocol is a set of rules that set data transmission so
that a particular type of data will be formatted in a certain way
Network Protocol is a formal standards and policies comprised of rules ,
procedures and formats that define communication between two or more devices
over a network
Network and internet standards ensure that all devices connecting to the network
implement the same set of rules or protocols in the same manner

159

Multiple Select

Which of the following is the definition or function of newtowrk protocol?

1

set of rules that set data transmission so that a particular type of data will be formatted in a certain way

2

is a formal standards and policies comprised of rules , procedures and formats that define communication between two or more devices over a network

3

ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner

160

Multiple Choice

_____________is a set of rules that set data transmission so that a particular type of data will be formatted in a certain way.

1

Network

2

TCP

3

Protocol

4

IP address

161

media
media

TCP is used to create a connection between host devices on a network
for data exchange. TCP is also used to break data into packets for
transmission on the network and accepting packets and reassembling
data when receiving it from a network.

A real-life analogy of TCP is a delivery service. For example, the service
would choose the route to deliver your packages to your home address
and decide how many packages the courier can deliver per shipment.

162

media
media

Internet protocol is used to deliver data packets from the source host to the

destination host on a network using IP addresses in data packet headers. IP

also defines the methods used to label the data with source and destination

Information.

A real-life analogy of IP could be map co-ordinates. For example, you could give

map co-ordinates of your home address to a delivery company but co-ordinates

are not easy to remember.An example of aV4 IP address is 172.16.32.77.

163

Multiple Choice

________is used to create a connection between host devices on a network for data exchange. ______ is also used to break data into packets for transmission on the network and accepting packets and reassembling data when receiving it from a network.

1

Network

2

TCP

3

Protocol

4

IP address

164

Multiple Choice

A real-life analogy example of ______ is a delivery service.The service would choose the route to deliver your packages to your home address and decide how many packages the courier can deliver per shipment.

1

Network

2

TCP

3

Protocol

4

IP address

165

Multiple Choice

A real-life analogy of _____ could be map co-ordinates. For example, you could give map co-ordinates of your home address to a delivery company but co-ordinates are not easy to remember.An example of _____ address is 172.16.32.77.


1

Network

2

TCP

3

Protocol

4

IP address

166

Multiple Choice

__________is used to create a connection between host devices on a network for data exchange.

1

IP

2

TCP

3

Protocol

4

IP Address

167

Fill in the Blank

TCP is stands for ___________

168

Multiple Choice

__________is used to deliver data packets from the source host to the

destination host on a network using IP addresses in data packet headers.


1

TCP

2

Internet Protocol

3

IP address

4

Router

169

media
media

Communication protocols (Cont..)

TCP and IP are used in combination to enable connections and data exchange

between host devices on networks. Other protocols in the TCP/IP suite rely on

these foundational protocols to work. Some commonly used protocols in the

TCP/IP suite are:

170

media
media
media

A domain name service (DNS) is used to allow people to request resources such as web
pages using a uniform resource locator (URL). When you request a webpage with a URL
such as www.google.ae, a request is made from your device to a DNS. A DNS keeps a
list of URLs and IP addresses. When a DNS receives a request, it finds the IP address of
the device hosting the resource and sends the IP address back to your device.

A real-life analogy of DNS is your home address. For example, a courier could put your
home address into a map application and the map would find

The co-ordinates of your home. A home address is easier to

remember than map co-ordinates.

171

media
media
media

Hypertext Transfer Protocol (HTTP) is used to transmit web pages and media

used in them from the worldwide web. Host devices with web browser software

use HTTP to send requests to web servers for the resources needed to load

webpages. Requests happen when a user enters a URL or clicks a hyperlink.

Web servers hosting webpages send the resources to fulfil requests.

172

media
media
media

Simple Mail Transfer Protocol (SMTP) is used for sending and receiving e-mail between
host devices on a network. Though it is normally used with POP3 (Post Office Protocol)
or IMAP (Internet Message Access Protocol), that let users store messages in a mailbox
and download them as needed from the mail server.

When a host device wants to send an email first, an e-mail server uses
SMTP to send a message from the device to the sender’s e-mail server. The
senders e-mail server uses SMTP to send the e-mail to the receiver's e-mail
server. The receiving server uses a mail client to store incoming mail in the
receivers mailbox using POP3 or IMAP.

173

media
media
media

File Transfer Protocol (FTP) is used for transmitting files between host devices on
a network. FTP uses two communications channels between a client and a server.
a channel for control and a data channel for transmitting file content.

A user would usually need to log in to access a server for file
transfers. The client device can then start communication with the
file server. The client device can then perform file operations on the
server such as uploading, downloading, deleting, renaming, moving
and copying.

174

Multiple Choice

_______is used to allow people to request resources such as web pages using a uniform resource locator (URL). When you request a webpage with a URL such as www.google.ae, a request is made from your device to a_______

1

HTTP(Hyper Text Transfer Protocol)

2

DNS (Domain Name Service)

3

FTP (File Transfer Protocol)

4

SMTP(Simple Mail Treansfer Protocol)

175

Multiple Choice

_______is used to transmit web pages and media used in them from the worldwide web. Host devices with web browser software use ______ to send requests to web servers for the resources needed to load webpages.

1

HTTP(Hyper Text Transfer Protocol)

2

DNS (Domain Name Service)

3

FTP (File Transfer Protocol)

4

SMTP(Simple Mail Treansfer Protocol)

176

Multiple Choice

_____________is used for sending and receiving e-mail between host devices on a network. Though it is normally used with POP3 (Post Office Protocol) or IMAP (Internet Message Access Protocol).

1

HTTP(Hyper Text Transfer Protocol)

2

DNS (Domain Name Service)

3

FTP (File Transfer Protocol)

4

SMTP(Simple Mail Treansfer Protocol)

177

Multiple Choice

___________is used for transmitting files between host devices on a network.

1

HTTP(Hyper Text Transfer Protocol)

2

DNS (Domain Name Service)

3

FTP (File Transfer Protocol)

4

SMTP(Simple Mail Treansfer Protocol)

178

Multiple Choice

A real-life analogy of _____ is your home address. For example, a courier could put your home address into a map application and the map would find The co-ordinates of your home.

1

HTTP(Hyper Text Transfer Protocol)

2

DNS (Domain Name Service)

3

FTP (File Transfer Protocol)

4

SMTP(Simple Mail Treansfer Protocol)

179

media
media

180

media
media

The Internet Protocol (IP) controls how data is sent between different networks. A
computer using the Internet Protocol to communicate needs an IP address to send
and receive data packets. An example of an IP address is 172.16.32.77. It provides
the location of a computer on the internet. It is like a person's home address.

The Internet Protocol allows computers to send data packets to each device on the

network.

181

media
media

Each MAC address is a 12-digit hexadecimal number (48 bits in length).

The first six digits (24 bits) is the device manufacturer's ID, also known as the
Organisational Unique identifier(OUI).

The next six digits (24 bits) represent the unique serial number assigned to the card
by the manufacturer.

A sample MAC address is FC: C8: AE: CE: 5B:23. Here FC: C8: AE is the organisational

unique identifier, and CE: 5B:23 is the unique serial number.

182

media
media

183

media
media

Internet Protocol (IP) address is a unique address that can be used to
uniquely identify each device in a network. If a computer's IP address is
known, then that computer can be communicated from anywhere in the world.
However, unlike MAC address, IP address changes if the network is changed.

184

media

185

media

186

Multiple Choice

Each MAC address is a ________digits hexadecimal number

1

48

2

12

3

24

4

32

187

Multiple Choice

Each MAC address is a 12-digit hexadecimal number (_____ bits in length).

1

48

2

12

3

24

4

32

188

Multiple Choice

The first six digits (_____bits) of MAC addess is the device manufacturer's ID, also known as the Organisational Unique identifier (OUI).

1

48

2

12

3

24

4

32

189

Multiple Choice

The next six digits (24 bits) represent the:

1

Organisational Unique identifier (OUI)

2

unique serial number assigned to the card by the manufacturer

190

Multiple Choice

The first six digits (24 bits) is the device manufacturer's ID, also known as the:

1

Organisational Unique identifier (OUI)

2

unique serial number assigned to the card by the manufacturer

191

Multiple Choice

An ______ address is represented by eight groups of hexadecimal (base-16) numbers separated by colons.

1

IPv4

2

IPv6

192

Multiple Choice

The initial IP address, version  (_____), is a 32-bit numeric address. The IP address is
written as four 8-bit decimal numbers separated by periods. Each 8-bit field can take any value from 0 to 255

1

IPv4

2

IPv6

193

Multiple Choice

The initial IP address, version 4 (IPV4), is a 32-bit numeric address. The IP address is written as four 8-bit decimal numbers separated by _____periods. Each 8-bit field can take any  value from 0 to 255

1

8

2

4

3

3

4

12

194

Multiple Choice

Due to the increasing number of devices connected to the internet, the 32-bit IP address (IPV4) was no longer sufficient, as it can offer less than a billion unique addresses.
Therefore, a __________ bits IP address, known as IP version 6 (IPV6) was introduced. An IPV6 address is represented by eight groups of hexadecimal (base-16) numbers separated by colons.

1

48

2

128

3

64

4

32

195

Multiple Choice

The initial IP address, version 4 (IPV4), is a 32-bit numeric address. The IP address is written as four 8-bit decimal numbers separated by eight periods. Each 8-bit field can take any  value from 0 to ______

1

48

2

128

3

64

4

255

196

Multiple Choice

Due to the increasing number of devices connected to the internet, the 32-bit IP address
(IPV4) was no longer sufficient, as it can offer less than a billion unique addresses.
Therefore, a 128 bits IP address, known as IP version 6 (IPV6) was introduced. An IPV6 address is represented by eight groups of hexadecimal (base-16) numbers separated by_____________.

1

colons

2

periods

197

media

Cyber security and Cyber threats

198

media
media

Cybersecurity is a process to protect Individuals, organisations and governments from
digital attacks In this process, the networked systems and data are protected from
attackers. Data needs to be protected at three levels:

At a personal level, there is a need to protect one’s identity, data and computing
devices from cybercriminals, as they will invade privacy and damage peoples
reputations.

At the organisational level, there is a need to protect the organisation's data from
cybercriminals,

At the government level, there is a need to protect data where national security,
economic stability and wellbeing of people are at risk.

199

Multiple Choice

Cybersecurity is a process to protect ________________ from
digital attacks In this process, the networked systems and data are protected from
attackers.

1

Individuals

2

organisations

3

governments

4

All

200

Multiple Choice

At the ________________________, there is a need to protect data where national security, economic stability and wellbeing of people are at risk.

1

personal level

2

organisational level

3

government level

201

media
media

Cybersecurity threats are malicious activities by an individual or
organisation to steal or damage the data. gain access to a network
system. and disrupt digital life. The following are the threats available
today:

A.

Malware

B.

Social engineering

C.

Denial-of-service

D.

Wi-Fi password cracking

202

media
media

A. Malware:

Malware is software written to harm or cause issues with a computer, This is also called
malicious code. This code comes in several forms and either harm or steals data from
a computer system. Cybercriminals use many different types of malware or malicious
software to carry out their activities.

203

media

1-Spyware

Spyware is a type of malware that is designed to spy on a computer system. It
secretly collects the activities on a computer system and then sends the
collected data to another person without the awareness of the computer
system owner.

A computer can become infected with spyware in many methods, including:

·accepting a prompt or pop-up without reading it first.

·downloading software from an unreliable source.

·opening email attachments from unknown senders.

204

media

Spyware (Cont..)

What can spyware be used for?

·Monitoring online activities

·Logging every key pressed on a keyboard as a keylogger

·Capturing all the personal data like passwords or bank details

Spyware can join itself with legitimate software or Trojan horses. Anti-spyware
software is available to detect and remove unwanted spyware programs.

205

Multiple Select

A computer can become infected with spyware in many methods, including:

1

accepting a prompt or pop-up without reading it first.

2

·downloading software from an unreliable source.

3

·opening email attachments from unknown senders.

4

keep updating the anti virus or anti spyware

206

Multiple Select

What can spyware be used for?

1

Monitoring online activities

2

hijacks the data on a computer system by encrypting it and then demands the owners to pay money for the data to be decrypted.

3

Logging every key pressed on a keyboard as a keylogger

4

Capturing all the personal data like passwords or bank details

5

attackers gain access to remote resources to modify the system files, system investigating files, and monitoring tools.

207

media
media

2.Viruses

A virus is a type of malware that infects a computer when executed and
then replicates itself to pass to another computer. Most viruses are spread
by USB drives, optical disks, network shares or email.

Anti-virus software is available to detect and remove viruses. Anti-virus
software is a collection of known viruses. Therefore, if a program is suspected
of being virus-infected, the anti-virus software will warn the user and store it
separately until it is confirmed that it is safe to use.

208

media
media

3.Trojan horse

This malware is named after the Greek myth of the Trojan horse. Trojans exploits
user privileges and are often found in image files, audio files or games.

Unlike viruses, Trojans do not self-replicate but carry out malicious operations by
hiding their purpose. Trojans appears genuine, but it is very dangerous. Anti-virus
software is available to remove the trojans.

209

media
media

4.Worms

This is malware replicates itself in order to spread from one computer to
another. After the host gets infected by a worm, it does not require any user's
participation.It can run by itself and spread very quickly over the network.
Worms can exploit the system vulnerabilities and can move themselves to cause
damage to computer systems or networks. Installing good anti-virus software can
protect computer systems or networks from getting infected with worms.

210

media
media

5.Adware

Adware is a type of malware installed with some software versions and
designed to deliver advertisements to a user on a web browser automatically.

It causes pop-up ads on the screen and is sometimes difficult to close. It is
common for adware to come with spyware. Anti-virus or anti-adware software are
available to detect and prevent adware from infecting a computer system.

211

media
media

6.Ransomware

Ransomware is a type of malware that hijacks the data on a computer
system by encrypting it and then demands the owners to pay money for the
data to be decrypted.

Ransomware is often spread through phishing emails that encourages a user to
download a malicious attachment. Anti-virus software is available to prevent the
computer system from ransomware attacks.

212

media
media

7.Backdoor

A backdoor malware works in the background of a computer system and is
difficult to detect.

Backdoor malware gains unauthorised access to a system by bypassing the
normal authentication procedures. After a backdoor attack, hackers can remotely
access the resources through system commands.

213

media
media

8.Scareware

Scareware is a type of malware that uses 'scare' tactics to take a specific
action.

Scareware usually consists of operating system style windows that pop up to warn
the user that the system is at risk and needs to run a specific program for it to
return to normal operation. If the user gets scared and accepts executing that
specific program, the computer system will become infected with Scareware
malware.

214

media
media

9.Rootkit

Rootkit malware is like backdoor malware and is designed to modify the
operating system.

Rootkit malware is hard to detect as the attackers gain access to remote resources
to modify the system files, system investigating files, and monitoring tools.
Therefore, a computer infected with rootkit malware is completed wiped, and
software programs are reinstalled

215

Multiple Choice

___________________________is a type of malware that is designed to spy on a computer system. It secretly collects the activities on a computer system and then sends the collected data to another person without the awareness of the computer
system owner.

1

Spyware

2

Virus

3

Trojan horse

4

Worm

216

Multiple Choice

This is malware replicates itself in order to spread from one computer to another. After the host gets infected by a _________________, it does not require any user's participation.It can run by itself and spread very quickly over the network.

1

Spyware

2

Virus

3

Trojan horse

4

Worm

217

Multiple Choice

This malware is named after the Greek myth of the _______________. it exploits user privileges and are often found in image files, audio files or games.

1

Spyware

2

Virus

3

Trojan horse

4

Worm

218

Multiple Choice

A ________________ is a type of malware that infects a computer when executed and then replicates itself to pass to another computer.

1

Spyware

2

Virus

3

Trojan horse

4

Worm

219

Multiple Choice

_______________is a type of malware installed with some software versions and designed to deliver advertisements to a user on a web browser automatically.

1

Ransomware

2

Adware

3

Backdoor

4

Scareware

5

Rootkit

220

Multiple Choice

________________________is a type of malware that hijacks the data on a computer system by encrypting it and then demands the owners to pay money for the
data to be decrypted.

1

Ransomware

2

Adware

3

Backdoor

4

Scareware

5

Rootkit

221

Multiple Choice

____________________ usually consists of operating system style windows that pop up to warn the user that the system is at risk and needs to run a specific program for it to return to normal operation.

1

Ransomware

2

Adware

3

Backdoor

4

Scareware

5

Rootkit

222

Multiple Choice

_____________ malware is like backdoor malware and is designed to modify the operating system. _____________ malware is hard to detect as the attackers gain access to remote resources to modify the system files, system investigating files, and monitoring tools. Therefore, a computer infected with ________________malware is completed wiped, and software programs are reinstalled.(Same word for all blanks)

1

Ransomware

2

Adware

3

Backdoor

4

Scareware

5

Rootkit

223

Multiple Choice

A ________________________ malware works in the background of a computer system and is difficult to detect.__________________ malware gains unauthorised access to a system by bypassing the normal authentication procedures. After a ________________ attack, hackers can remotely access the resources through system commands.(Same word for all blanks)

1

Ransomware

2

Adware

3

Backdoor

4

Scareware

5

Rootkit

224

media

B.Social engineering:

Social engineering is a kind of cyber attack involving psychological
manipulation techniques that exploit human error to access confidential
information. It is like a trick to gain people's confidence, to gather information and
gain unauthorised access to the computer system.

For example, an attacker. will call an authorised employee with an urgent
problem that requires immediate network access: The attacker will try using
techniques to gain the employee's trust and tries to access confidential data:

225

media

Social engineering (Cont..):

Phishing is a common social engineering attack. The attackers contact a
target through email, phone, or text message to click a link-This link will
redirect the targets to fraudulent websites to provide confidential data like
personal information, banking and credit card information, usernames,
and passwords.

226

media

C.Denial of Service (DoS):

Denial-of-Service (DoS) attacks are a type of network attack that results.in some sort of
interruption of network service to users, devices, or applications.

An overwhelming quantity of traffic is a type of DoS attack in a network where an
enormous amount of data is sent to the host at a rate it cannot handle. This kind of attack
causes a slowdown in transmission or response or cause a device or service to crash.

The maliciously formatted packet is a type of DoS attack. When a maliciously formatted
packet (collection of data) is sent, the receiver cannot identify the application and will be
unable to handle it. As a result of this, the system will run very slowly.

227

media

D.Wi-fi Password cracking

One of the most common methods of authenticating to a website is by entering a
username and password. As a result, revealing your password is a simple way for
cybercriminals to gain access to your most sensitive information.

228

Multiple Choice

_______________ is a common social engineering attack. The attackers contact a target through email, phone, or text message to click a link-This link will redirect the targets to fraudulent websites to provide confidential data likepersonal information, banking and credit card information, usernames, and passwords.

1

Denial of Service (DoS)

2

Rootkit

3

Phishing

4

Ransomware

229

Multiple Choice

_____________________ is software written to harm or cause issues with a computer, This is also called malicious code. 

1

Malware

2

Social engineering

3

Denial-of-Service (DoS)

4

Wi-fi Password cracking

230

Multiple Choice

_____________________attacks are a type of network attack that results.in some sort of interruption of network service to users, devices, or applications. An overwhelming quantity of traffic is a type of DoS attack in a network where an enormous amount of data is sent to the host at a rate it cannot handle. This kind of attack causes a slowdown in transmission or response or cause a device or service to crash.

1

Malware

2

Social engineering

3

Denial-of-Service (DoS)

4

Wi-fi Password cracking

231

Multiple Choice

___________________________ is a kind of cyber attack involving psychological manipulation techniques that exploit human error to access confidential
information. It is like a trick to gain people's confidence, to gather information and gain unauthorised access to the computer system.

1

Malware

2

Social engineering

3

Denial-of-Service (DoS)

4

Wi-fi Password cracking

232

Multiple Choice

An attacker. will call an authorised employee with an urgent problem that requires immediate network access: The attacker will try using techniques to gain the employee's trust and tries to access confidential data:

1

Malware

2

Social engineering

3

Denial-of-Service (DoS)

4

Wi-fi Password cracking

233

media
media

Organisations can guard against cyber threats if few safety measures
are taken. For example:

1.

Update the operating system on a regular basis

2.

Use anti-virus software

3.

Use strong passwords

4.

Do not open email attachments from unknown senders

5.

Do not click on links in emails from unknown senders/unfamiliar website

6.

Avoid connecting to unsecured Wi-Fi networks in public places

234

media
media
media
media
media

235

media
media
media
media

236

media
media
media
media

237

media
media
media
media

238

media
media
media
media
media

Domain1 : Computing Systems and Networks

2024-2025 Term 1

Show answer

Auto Play

Slide 1 / 238

SLIDE