You are on page 1of 7

Cairo Governorate Nasr City East Directorate Manaret El-Eman Language Schools Computer department

Revision 2nd prep 2012/2013 Put () in front of the right sentence and () in front of the wrong one:

1. Upload is transferring files from the internet to your

own computer. ( ) 2. Internet site is the address of the place where site pages are stored on. ( ) 3. Hyperlink may be in the form of a graphic when you click it, you move to another place. ( ) 4. Protocol "IP" is responsible for files transfer from and to the internet. ( ) 5. The Web site could be defined as a set of pages of the information and files connected together and sorted on the web server computer and it's used for viewing certain information. ( ) 6. The blank page of the site is the first page the browser views when connecting a site on the internet. ( ) 7. The abbreviation (org) in the site address is used to refer to commercial organizations. ( )
8. The icon

is used to move to the site home page.

( ) 9. Protocol HTTP is responsible for files transfer from and to the internet. (
10.

) WWW is the abbreviation of World Wide Web. ( )

11.

Tool is used to stop loading the page. ( )

12. There is no difference in the search conditions from one site to another. ( ) 13. In the search results the site address and a summary below it showing its contents appear to indicate whether this address is suitable to the required search subject or not. ( ) 14. Searching subject is written between [ ] to narrow search result. ( ) 15. It is preferred to select unique words and have direct relation to the subject in the search subject. ( ) 16. It is preferred when writing the search subject to use key words instead of using one word. ( ) 17. We can not send an E-mail to more than one person at the same time. ( )
18.

Mario@yahoo.com is a correct E-mail address. ( ) 19. More than one person could have the same E-mail address. ( ) 20. Sign out used to create a new E-mail address. ( ) 21. The creation of an E-mail address differs from one site to another. ( ) 22. When sending an e-mail message, at the end, a confirmation appears to indicate that message has arrived successfully. ( ) 23. The password is not less than (6) letters in many sites. ( ) 24. You can send electronic message for one person or more. ( )
2

25.

www.hotmail.com is an E-mail address. ( ) 26. E-mail elements are the same as the usual post elements. ( ) 27. All internet sites offer E-mail service. ( ) 28. E-mail address may have just letters, numbers, dot and hyphen commas. ( ) 29. The password of your e-mail can't be changed. ( ) 30. "Inbox" contains the messages that are sent by E-mail. ( ) 31. "Addresses" contains sites addresses for creating Email. ( ) 32. If you close the mobile, we lost SMS from a mobile to another. ( ) 33. GPRS can send and receive SMS. ( ) 34. We can send and receive long message and sound files through SMS. ( ) 35. Internet sites of the mobile called web sites. ( ) 36. When sending an e-mail from the computer to the mobile, the message letters may be more than 160 letters. ( ) 37. The drawing and tones could be displayed through WAP entry. ( ) 38. We can connect to the internet anytime by GPRS. ( ) 39. "MMS" is a service which allows sending and receiving data as packets. ( ) 40.When the photos in the web pages aren't displayed, this results in loading the site faster. ( )
3

41.To change the default home page of the browser, go to "Advanced". ( ) 42.When the photo and drawing don't appear in the Internet pages, the photos appear empty. ( ) 43.Designers are persons who break into computers and computer networks. ( ) 44.We shouldn't open spam (unknown e-mails). ( ) 45.Firewall is short for malicious software. ( ) 46.Password shouldn't be easy to guess by other people.

Complete:

1. From the most famous programs which are used as a browser , , 2. The page appears each time we open IE program. 3. Address bar is responsible for 4. Status bar will show Is used for 6. has a measurement which shows gradually the rate of the information page download. 7. Is used in viewing the invisible parts of the web pages. 8. After writing the URL address which we want to visit in the address bar, the site could be opened by : A) B) 9. Is a protocol used in viewing the WebPages. 10. Internet page contains , , , 11. WWW is an abbreviation for

5.

12. Internet page contains ,, and 13. WWW is a brevity for 14. is a text or a photo when you click on it, you will move to another place on the same page. 15. To save a photo from a web page choose from the shortcut menu when you click it with the right click of the mouse. 16. To save a web page with all its contents, open menu, then, select 17. is the language that used to design the web page. 18. is the term that used to browse web pages, you write it in the explorer address bar. 19. To view the different types of the available information in the internet sites we use 20. they are tools on the internet in order to search for sites containing "Search text" that you have inserted in search box. 21. The search results appear in the form of set of in each web page. 22. Sites that can create new E-mail address are : and 23. E-mail elements are: ,, and 24. When we click the received messages appear. 25. When we click the E-mail address will open. 26. When we click new message window is opened 27. When we click the selected messages are deleted.
5

28. Internet sites of the mobile called 29. SMS is sent from a mobile to another by 30. Convert SMS to an E-mail. 31. We can download drawing texts and sounds from the internet to the mobile through Service. 32. You can open internet options from menu. 33. We use "Use current" button 34. You can make the default page of the explorer a blank page through button. 35. You can cancel "Show pictures" in the site from the tab in internet options window, remove the check mark beside so appears instead of pictures. 36. is small Harmful software program that are designed to spread from one computer to another and it might corrupt or delete data on your computer. 37. Dont chat with unknown persons over the Internet it is one of the rules of 38. means keep your information under your control, such as passwords and credit card information, and prevent others from accessing it. 39. is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. 40. To protect your computer you might have an and it's not confidential to know by others.

Q1:
1. 6.

Answe rs
2. 7. 13. 18. 23. 3. 8. 11. 14. 19. 24.
6

4. 9. 15. 20. 25.

5. 10. 16. 21. 26.

12. 17. 22.

27. 31. 32. 37. 42.

28. 33. 38. 43. 34. 39. 44.

29. 35. 40. 45.

30. 36. 41. 46.

Q2: 1. 2. 3. 4.

Internet Explorer Firefox Google Chrome. Default Home page of IE. Writing the site address that you want to browse. Site address that will be loaded. 5. To reload the current page data. 6. Status Bar. 7. Scroll Bar. 8. A) Clicking "GO" in Address Bar. B) Pressing "Enter" in the keyboard. 9. HTTP. 10.Texts, Photos, Sounds and video. 11.World Wide Web. 12.Texts, Photos, Sounds and Videos 13.WWW 14.Hyperlink 15.Save picture as 16.File - Save 17.HTML 18.URL 19.Browser 20.Search Engines 21.10 sites 22.www.yahoo.com and www.hotmail.com 23.Mail address, Mail box, Sender details, Receiver details and Message 24.Inbox 25.Sign in 26.New 27.Delete 28.Web site 29.Message center 30.Gateway service 31.Web 32.Tools 33.To make the current page is the default home page of the browser 34.Use blank 35.Advanced, Show pictures, blank spaces. 36.Virus 37. Safe use of the Internet 38. Information Security 39. Spyware 40. ID

You might also like