Cloud computing is storing, and accessing, data or programs through the internet.
True
False
Wireless networks they connect devices without wiring using .......
waves
Wi-Fi
cables
internet
The goal of ... is to improve someone’s independence and to be included in society
Hearing aids
Smartgloves
Screen magnification software
cutting-edge assistive technology
......... It refers to works that the createor has allowed to be shared
A stock exchange
Creative Commons
Copyright
Intellectual property rights
....... Cyber criminals pretend to be a business or a known person.
Malware
Hacking
Spoofing
Data Breach it converts data into a code to prevent unauthorized user access
.... It is a database which includes all the items owned by a library
EKB
Library database
general database
Library catalog
........It occurs when unauthorized parties gain access to confidential data and information
Data Breach
Data Encryption
... They empower deaf people to translate their signs in real time to spoken or text output.
Sonar used in car for motion detection
Copyright It includes written, visual, audio, video, and web materials
............ are the most popular software that deal with cloud computing applications
Microsoft 365 and Google Workspace
Microsoft office and Firefox Workspace
Microsoft 365 and windows application
Using secured Wi-Fi can expose you to malware threats
...... It is the on-demand storage and access of data and programs via remote servers on the internet.
Google Drive
Cloud computing
Remote Servers
OneDrive
.... allows investors to make trades independently through websites or apps, providing more independence and user-friendly options
A broker
E-trading
Robo-advisors
Company stocks are called ........
broker
shares
stock exchange
Smart investors
E-trading facilitates easier and faster trading between companies globally
... They are online applications that provide financial guidance and services
........ It provides information and resource related to accessibility for people with disabilities
Bemyeyes.com
yahoo.com
google.com
Accessnow.com
Google Drive it is an application of ..........
Microsoft office
Microsoft 365
Google
AI, AR, and VR are Cutting-edge technologies
... help people search Internet websites based on the keywords and phrases
Search engines
Databases
Mobile operating systems
Operating system
Scareware is a type of malware that pretends to be a virus alert
...... allows you to store, share, and access files from any device. It's very user-friendly.
PowerPoint
Google Workspace
If you click on unsafe links Viruses will be installed on your devices
OneDrive allows You to determine the access level for each person you share with
Examples on ... It can take you to a museum thousands of miles away or to a historical site
AR
VR
VM
VA
........ is the greatest cyber security threat
anti-virus
...... It is the software that manages a computer’s functions
Android
Operating system (OS)
Microsoft Windows
To save a file to OneDrive...
1-Select File > Save a Copy > OneDrive -Personal/Company
2- Select Upload>Files or Upload>Folder
3-Select Enter file name here and type a name
4-Select Save
2-Select Enter file name here and type a name
3-Select Save
1-Select Upload>Files or Upload>Folder
2- Select File > Save a Copy > OneDrive -Personal/Company
.......... Connect users who are not on the local area network (LAN) to access and manage data, files, and applications via the internet
Examples on AI .........
it can take you to a museum thousands of miles away or to a historical site
Writing an article on a topic
in math class, students can project 3-D images like cubes or cylinders onto a flat surface using their smartphones
......Connects a local area network (LAN) to the interne
router
MODEM
SWITCH
........ is the email platform for Microsoft 365.
Yahoo mail
Gmail
Outlook
one of advantages of cloud computing is ....
Data breaches can compromise your user information
it backs up your files
The cloud storage is fee-based
it requires internet to access the files on the cloud
...... It scrambles your information and is accessible only with a password on your device
Multi-factor Authentication
Full Disk Encryption
Passwords
Facial Recognition
EKB is an example of a Search engine
Microsoft 365 includes productivity apps except..
Photoshop
Excel
Word
Teams
......... networks They use cables that are plugged into port
Wireless
Wired
..... It combines the real world with a virtual world by adding images using computers
Artificial Intelligence
Augmented reality
Networks
Virtual reality