The document appears to be an exam for a computer technology course containing 90 questions to be completed within 120 minutes. It provides instructions noting the use of calculators is allowed and that the exam can receive negative marks. The exam then lists the subject, number of questions, and range of question numbers for each subject area to be tested.
This document discusses statistical spam filtering techniques. It describes decoding, tokenizing emails, building a decision matrix based on probability and interestingness. It discusses Bayesian filtering and challenges with accuracy when filtering a large number of emails versus an individual's emails. Machine learning techniques like training on large datasets are mentioned. Blacklists, whitelists and "honeypot" email addresses to identify spammers are also summarized.
The document discusses event-driven simulation using VHDL. It explains that event-driven simulation only considers signals that are actively changing, making it more efficient than other approaches. The key aspects are:
1) Changes in input and output signals occur at specific simulation times as events are processed from a time-sorted queue.
2) Gates are evaluated when input signals change, with the simulator scheduling new output change events using timing models.
3) An example simulation is shown step-by-step to illustrate how events are processed and new times are scheduled as the model progresses.
The Ring programming language version 1.5.2 book - Part 36 of 181Mahmoud Samir Fayed
This document provides documentation on Ring's standard library classes including Math, DateTime, File, System, Debug, DataType, Conversion, ODBC, MySQL, and SQLite classes. It lists the key methods of each class and provides examples of their usage and output. Various mathematical, date/time, file handling, system information, debugging, data type checking, conversion, and database related functions are demonstrated.
Parallel R in snow (english after 2nd slide)Cdiscount
This presentation discusses parallelizing computations in R using the snow package. It demonstrates how to:
1. Create a cluster with multiple R sessions using makeCluster()
2. Split data across the sessions using clusterSplit() and export data to each node
3. Write functions to execute in parallel on each node using clusterEvalQ()
4. Collect the results, such as by summing outputs, to obtain the final parallelized computation. As an example, it shows how to parallelize the likelihood calculation for a probit regression model, reducing the computation time.
In this Dagstuhl talk, I presented my current research on cloud auto-scaling and component connector self-adaptation and how I employed type-2 fuzzy control to tame the uncertainty regarding knowledge specification.
This document discusses statistical spam filtering techniques. It describes decoding, tokenizing emails, building a decision matrix based on probability and interestingness. It discusses Bayesian filtering and challenges with accuracy when filtering a large number of emails versus an individual's emails. Machine learning techniques like training on large datasets are mentioned. Blacklists, whitelists and "honeypot" email addresses to identify spammers are also summarized.
The document discusses event-driven simulation using VHDL. It explains that event-driven simulation only considers signals that are actively changing, making it more efficient than other approaches. The key aspects are:
1) Changes in input and output signals occur at specific simulation times as events are processed from a time-sorted queue.
2) Gates are evaluated when input signals change, with the simulator scheduling new output change events using timing models.
3) An example simulation is shown step-by-step to illustrate how events are processed and new times are scheduled as the model progresses.
The Ring programming language version 1.5.2 book - Part 36 of 181Mahmoud Samir Fayed
This document provides documentation on Ring's standard library classes including Math, DateTime, File, System, Debug, DataType, Conversion, ODBC, MySQL, and SQLite classes. It lists the key methods of each class and provides examples of their usage and output. Various mathematical, date/time, file handling, system information, debugging, data type checking, conversion, and database related functions are demonstrated.
Parallel R in snow (english after 2nd slide)Cdiscount
This presentation discusses parallelizing computations in R using the snow package. It demonstrates how to:
1. Create a cluster with multiple R sessions using makeCluster()
2. Split data across the sessions using clusterSplit() and export data to each node
3. Write functions to execute in parallel on each node using clusterEvalQ()
4. Collect the results, such as by summing outputs, to obtain the final parallelized computation. As an example, it shows how to parallelize the likelihood calculation for a probit regression model, reducing the computation time.
In this Dagstuhl talk, I presented my current research on cloud auto-scaling and component connector self-adaptation and how I employed type-2 fuzzy control to tame the uncertainty regarding knowledge specification.
Autonomic Resource Provisioning for Cloud-Based SoftwarePooyan Jamshidi
This document proposes using fuzzy logic and type-2 fuzzy sets to develop an autonomous resource provisioning system for cloud-based software. Current auto-scaling solutions have limitations including requiring deep application knowledge and performance modeling expertise from users. The proposed system would use fuzzy inference to map monitored performance data to scaling actions, eliminating the need for users to specify scaling parameters or policies. It would incorporate uncertainty into the modeling and use expert knowledge from multiple users to develop robust and adaptive provisioning behavior.
This document provides an overview of Python memory management concepts through examples. It discusses:
- How Python stores variables and objects in memory locations using pointers and references.
- Immutable objects like integers, strings and tuples are stored in fixed memory locations, while mutable objects like lists allow their contents to be changed.
- Strings that are short and contain common characters may be stored in interned, fixed locations, while longer or modified strings are stored in new locations.
- Elements of immutable objects stored within mutable containers like tuples cannot be directly changed, but the mutable container itself can be modified.
The document contains questions about Java programming concepts like operators, conditional statements, Boolean expressions, and formatting output. It asks the reader to evaluate code snippets, rewrite code using different structures like switch statements, and explain the behavior of code based on different inputs. Several questions also ask the reader to write code to solve problems using concepts like random number generation and conditional logic.
The Ring programming language version 1.5.4 book - Part 25 of 185Mahmoud Samir Fayed
This document describes various file handling functions in Ring programming language including Read(), Write(), Dir(), Rename(), Remove(), Fopen(), Fclose(), Fflush(), Freopen(), Tempfile(), Tempname(), Fseek(), Ftell(), and provides examples of how to use each function to read, write, modify and get information about files. It also covers opening and closing files, seeking to different positions in a file, generating temporary file names and more.
The document discusses Java 8's new date and time API (JSR 310). It provides examples of using the new classes like LocalDate, LocalTime, LocalDateTime and Instant that model dates, times and timestamps without time zones. It also covers formatting and parsing dates and times, working with time zones using ZoneId and ZonedDateTime, durations using Duration, and periods of time using Period. The document compares the new API to the legacy Date and Calendar classes and notes improvements like immutability and removal of bugs in the previous implementation.
Computer fandamental bangla by soikot pdfShifat Ahmed
This document provides an overview of computer fundamentals and components. It discusses the basic parts of a computer including the central processing unit, memory, input and output devices. It also covers different types of computers, memory, computer characteristics, and the history of computers from the abacus to modern software. Additionally, it defines common units of storage like bits, bytes, kilobytes, megabytes, and discusses different numbering systems such as binary, octal, hexadecimal and how to convert between them. The document concludes with sections on the internet, email addressing, and an introduction to common Microsoft applications like Word, Excel, PowerPoint, and Access.
The document discusses various concepts related to abstraction in software development including project architecture, code refactoring, enumerations, and the static keyword in Java. It describes how to split code into logical parts using methods and classes to improve readability, reuse code, and avoid repetition. Refactoring techniques like extracting methods and classes are presented to restructure code without changing behavior. Enumerations are covered as a way to represent numeric values from a fixed set as text. The static keyword is explained for use with classes, variables, methods, and blocks to belong to the class rather than object instances.
Fast, stable and scalable true radix sorting with Matt Dowle at useR! AalborgSri Ambati
This document discusses the history and implementation of radix sorting in R. It begins by describing how Tom Short proposed using sort.list(x, method="radix") in 2009 to speed up sorting in data.table. This led to Matt Dowle implementing a true radix sorting algorithm called forderv() in data.table. Radix sorting provides dramatically faster sorting for large integer vectors compared to the default R sorting methods. The document then provides technical details on how radix sorting works and how it was optimized in data.table to support larger vectors and data types. In the end, it encourages testing the forderv() radix sorting function in data.table.
As the leap second approaches, there is no better time to reflect on our misconceptions about time and numerals, past catastrophes and possible mitigation techniques.
This document discusses self-learning cloud controllers that can dynamically scale cloud resources. It notes that current auto-scaling approaches require deep application knowledge and expertise to determine scaling parameters and policies. The paper proposes a type-2 fuzzy logic approach called RobusT2Scale that uses fuzzy rules and monitoring data to determine scaling actions. It aims to handle uncertainty in elastic systems and accommodate different user preferences through fuzzy reasoning over workload and response time data. The approach pre-computes scaling decisions to enable efficient runtime elasticity control. It is evaluated based on its ability to meet an SLA target response time compared to over- and under-provisioning approaches.
This document discusses algorithms and analysis of algorithms. It covers key concepts like time complexity, space complexity, asymptotic notations, best case, worst case and average case time complexities. Examples are provided to illustrate linear, quadratic and logarithmic time complexities. Common sorting algorithms like quicksort, mergesort, heapsort, bubblesort and insertionsort are summarized along with their time and space complexities.
This document provides information about functions in Excel including mathematical, text, logical, and information functions. It includes examples of functions such as SUM, AVERAGE, LEFT, RIGHT, UPPER, LOWER, and TRIM with explanations and sample formulas. The document also demonstrates formatting cells, entering data in a table according to specified formatting, and using functions to analyze and summarize data in the table.
Where the wild things are - Benchmarking and Micro-OptimisationsMatt Warren
You don’t want to prematurely optimise, but sometimes you want to optimise, the question is - where to start? Profiling and Benchmarking can help you figure out what your application is doing and where performance problems could arise - allowing you to find (and fix!) them before your customers do.
If you aren’t already benchmarking your code this talk will offer some starting points. We’ll look at how to accurately benchmark in .NET and things to avoid. Along the way we’ll also discover some surprising code optimisations!
Detecting Misleading Headlines in Online News: Hands-on Experiences on Attent...Kunwoo Park
This slide is used for the tutorial in Deep Learning Summer School, held in IBS, Daejeon. Based on the recent effort on detecting misleading headlines through deep neural networks (Yoon et al., AAAI 2019), it explains how RNN and Attention mechanism works for text. Moreover, implementations based on TensorFlow 1.x are introduced.
Here are the answers to the checkpoint questions:
1. The three expressions that appear inside the parentheses of a for loop are:
A) Initialization expression
B) Test expression
C) Update expression
2. A) i = 0
B) i < 50
C) i += 1
D) for i in range(0, 50, 1):
print("I love to program!")
3. A) 0, 2, 4, 6, 8, 10
B) 20, 18, 16
4. A while loop is best when you don't know how many times the loop needs to run up front. A for loop is best when you need to iterate a specific number of times
Here are the values of some pointer expressions using a and p:
p: Points to the first element of a, which is 10
*p: 10 (the value at the address p points to)
p+1: Points to the second element of a, which is 20
*(p+1): 20
&(p+1): Points to the address of p+1
p-1: Not valid, as p is pointing to the first element already
This document provides an overview and agenda for a presentation on development tools including Subversion (SVN) for version control, Apache Ant for build automation, JUnit for testing, and ticketing systems. It discusses hands-on examples for using these tools on a sample project called ZooZooPet, including branching, tagging, merging, writing JUnit tests, and setting up an Ant build file. Testing techniques like test-driven development are explained. Debugging strategies and the importance of continuous integration are also covered.
Paul Dix [InfluxData] The Journey of InfluxDB | InfluxDays 2022InfluxData
The document summarizes the evolution of InfluxDB from its initial version 1.0 in 2013 to the current version 2.0 called IOx. It started as a time series database that stored time series data and associated metadata. Over time it incorporated features like tags, line protocol, TSM storage engine, and an inverted index to improve querying capabilities. Version 2.0 refocused it as an all-in-one platform with a new query language called Flux, and aims to be cloud-first. The latest version IOx leverages a columnar database and federated architecture to solve challenges of scale, providing SQL support and the ability to deploy on cloud or edge environments.
In this paper, we present a complete digital signature message stream, just the way the RSA digital
signature scheme does it. We will focus on the operations with large numbers due to the fact that operating
with large numbers is the essence of RSA that cannot be understood by the usual illustrative examples with
small numbers[1].
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
More Related Content
Similar to سوالات تئوری سیزدهمین دوره مسابقات علمی عملی بهمن 1394 مرحله استانی_هماهنگ کشوری
Autonomic Resource Provisioning for Cloud-Based SoftwarePooyan Jamshidi
This document proposes using fuzzy logic and type-2 fuzzy sets to develop an autonomous resource provisioning system for cloud-based software. Current auto-scaling solutions have limitations including requiring deep application knowledge and performance modeling expertise from users. The proposed system would use fuzzy inference to map monitored performance data to scaling actions, eliminating the need for users to specify scaling parameters or policies. It would incorporate uncertainty into the modeling and use expert knowledge from multiple users to develop robust and adaptive provisioning behavior.
This document provides an overview of Python memory management concepts through examples. It discusses:
- How Python stores variables and objects in memory locations using pointers and references.
- Immutable objects like integers, strings and tuples are stored in fixed memory locations, while mutable objects like lists allow their contents to be changed.
- Strings that are short and contain common characters may be stored in interned, fixed locations, while longer or modified strings are stored in new locations.
- Elements of immutable objects stored within mutable containers like tuples cannot be directly changed, but the mutable container itself can be modified.
The document contains questions about Java programming concepts like operators, conditional statements, Boolean expressions, and formatting output. It asks the reader to evaluate code snippets, rewrite code using different structures like switch statements, and explain the behavior of code based on different inputs. Several questions also ask the reader to write code to solve problems using concepts like random number generation and conditional logic.
The Ring programming language version 1.5.4 book - Part 25 of 185Mahmoud Samir Fayed
This document describes various file handling functions in Ring programming language including Read(), Write(), Dir(), Rename(), Remove(), Fopen(), Fclose(), Fflush(), Freopen(), Tempfile(), Tempname(), Fseek(), Ftell(), and provides examples of how to use each function to read, write, modify and get information about files. It also covers opening and closing files, seeking to different positions in a file, generating temporary file names and more.
The document discusses Java 8's new date and time API (JSR 310). It provides examples of using the new classes like LocalDate, LocalTime, LocalDateTime and Instant that model dates, times and timestamps without time zones. It also covers formatting and parsing dates and times, working with time zones using ZoneId and ZonedDateTime, durations using Duration, and periods of time using Period. The document compares the new API to the legacy Date and Calendar classes and notes improvements like immutability and removal of bugs in the previous implementation.
Computer fandamental bangla by soikot pdfShifat Ahmed
This document provides an overview of computer fundamentals and components. It discusses the basic parts of a computer including the central processing unit, memory, input and output devices. It also covers different types of computers, memory, computer characteristics, and the history of computers from the abacus to modern software. Additionally, it defines common units of storage like bits, bytes, kilobytes, megabytes, and discusses different numbering systems such as binary, octal, hexadecimal and how to convert between them. The document concludes with sections on the internet, email addressing, and an introduction to common Microsoft applications like Word, Excel, PowerPoint, and Access.
The document discusses various concepts related to abstraction in software development including project architecture, code refactoring, enumerations, and the static keyword in Java. It describes how to split code into logical parts using methods and classes to improve readability, reuse code, and avoid repetition. Refactoring techniques like extracting methods and classes are presented to restructure code without changing behavior. Enumerations are covered as a way to represent numeric values from a fixed set as text. The static keyword is explained for use with classes, variables, methods, and blocks to belong to the class rather than object instances.
Fast, stable and scalable true radix sorting with Matt Dowle at useR! AalborgSri Ambati
This document discusses the history and implementation of radix sorting in R. It begins by describing how Tom Short proposed using sort.list(x, method="radix") in 2009 to speed up sorting in data.table. This led to Matt Dowle implementing a true radix sorting algorithm called forderv() in data.table. Radix sorting provides dramatically faster sorting for large integer vectors compared to the default R sorting methods. The document then provides technical details on how radix sorting works and how it was optimized in data.table to support larger vectors and data types. In the end, it encourages testing the forderv() radix sorting function in data.table.
As the leap second approaches, there is no better time to reflect on our misconceptions about time and numerals, past catastrophes and possible mitigation techniques.
This document discusses self-learning cloud controllers that can dynamically scale cloud resources. It notes that current auto-scaling approaches require deep application knowledge and expertise to determine scaling parameters and policies. The paper proposes a type-2 fuzzy logic approach called RobusT2Scale that uses fuzzy rules and monitoring data to determine scaling actions. It aims to handle uncertainty in elastic systems and accommodate different user preferences through fuzzy reasoning over workload and response time data. The approach pre-computes scaling decisions to enable efficient runtime elasticity control. It is evaluated based on its ability to meet an SLA target response time compared to over- and under-provisioning approaches.
This document discusses algorithms and analysis of algorithms. It covers key concepts like time complexity, space complexity, asymptotic notations, best case, worst case and average case time complexities. Examples are provided to illustrate linear, quadratic and logarithmic time complexities. Common sorting algorithms like quicksort, mergesort, heapsort, bubblesort and insertionsort are summarized along with their time and space complexities.
This document provides information about functions in Excel including mathematical, text, logical, and information functions. It includes examples of functions such as SUM, AVERAGE, LEFT, RIGHT, UPPER, LOWER, and TRIM with explanations and sample formulas. The document also demonstrates formatting cells, entering data in a table according to specified formatting, and using functions to analyze and summarize data in the table.
Where the wild things are - Benchmarking and Micro-OptimisationsMatt Warren
You don’t want to prematurely optimise, but sometimes you want to optimise, the question is - where to start? Profiling and Benchmarking can help you figure out what your application is doing and where performance problems could arise - allowing you to find (and fix!) them before your customers do.
If you aren’t already benchmarking your code this talk will offer some starting points. We’ll look at how to accurately benchmark in .NET and things to avoid. Along the way we’ll also discover some surprising code optimisations!
Detecting Misleading Headlines in Online News: Hands-on Experiences on Attent...Kunwoo Park
This slide is used for the tutorial in Deep Learning Summer School, held in IBS, Daejeon. Based on the recent effort on detecting misleading headlines through deep neural networks (Yoon et al., AAAI 2019), it explains how RNN and Attention mechanism works for text. Moreover, implementations based on TensorFlow 1.x are introduced.
Here are the answers to the checkpoint questions:
1. The three expressions that appear inside the parentheses of a for loop are:
A) Initialization expression
B) Test expression
C) Update expression
2. A) i = 0
B) i < 50
C) i += 1
D) for i in range(0, 50, 1):
print("I love to program!")
3. A) 0, 2, 4, 6, 8, 10
B) 20, 18, 16
4. A while loop is best when you don't know how many times the loop needs to run up front. A for loop is best when you need to iterate a specific number of times
Here are the values of some pointer expressions using a and p:
p: Points to the first element of a, which is 10
*p: 10 (the value at the address p points to)
p+1: Points to the second element of a, which is 20
*(p+1): 20
&(p+1): Points to the address of p+1
p-1: Not valid, as p is pointing to the first element already
This document provides an overview and agenda for a presentation on development tools including Subversion (SVN) for version control, Apache Ant for build automation, JUnit for testing, and ticketing systems. It discusses hands-on examples for using these tools on a sample project called ZooZooPet, including branching, tagging, merging, writing JUnit tests, and setting up an Ant build file. Testing techniques like test-driven development are explained. Debugging strategies and the importance of continuous integration are also covered.
Paul Dix [InfluxData] The Journey of InfluxDB | InfluxDays 2022InfluxData
The document summarizes the evolution of InfluxDB from its initial version 1.0 in 2013 to the current version 2.0 called IOx. It started as a time series database that stored time series data and associated metadata. Over time it incorporated features like tags, line protocol, TSM storage engine, and an inverted index to improve querying capabilities. Version 2.0 refocused it as an all-in-one platform with a new query language called Flux, and aims to be cloud-first. The latest version IOx leverages a columnar database and federated architecture to solve challenges of scale, providing SQL support and the ability to deploy on cloud or edge environments.
In this paper, we present a complete digital signature message stream, just the way the RSA digital
signature scheme does it. We will focus on the operations with large numbers due to the fact that operating
with large numbers is the essence of RSA that cannot be understood by the usual illustrative examples with
small numbers[1].
Similar to سوالات تئوری سیزدهمین دوره مسابقات علمی عملی بهمن 1394 مرحله استانی_هماهنگ کشوری (20)
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
13. ﻋﻤﻠﻲ ﻋﻠﻤﻲ ﻣﺴﺎﺑﻘﺎت دوره ﺳﻴﺰدﻫﻤﻴﻦ-اﺳﺘﺎﻧﻲ ﻣﺮﺣﻠﻪ ﻋﻠﻤﻲ ﺑﺨﺶ)ﻛﺸﻮري ﻫﻤﺎﻫﻨﮓ(
13
درس ﻋﻨﻮان:ﺗﺨﺼﺼﻲ زﺑﺎن
71) What's the meaning of: workstation?
1)a computer or terminal that is part of a network
2)a application for calculating
3) a network card
4) a place for working at
72) Decide which of following sentences is true (T) ?
1)A computer can make any type of decision by itself.
2) TVs and VCRs use chip technology.
3) Human beings can work much faster than computers if they want to.
4) A computer can do something without a person tells it what to do.
73)Decide which of following sentences is true (T) ?
1) RAM, ROM, and secondary storage devices are components of the main memory.
2)“Permanent” storage of information is provided by RAM.
3)The most common output devices are the mouse and the keyboard.
4)It can be said that the CPU is the brain of the computer
74) A ……….. stores data on tape cartridges. It's used for backup Purposes.
1)Portable Hard Drive 2) Flash Memory Card
3) Tape Drive 4) magnetic tape
75)This OS, designed by Bell Laboratories for minicomputers and workstations.
1)Linux 2) win XP 3) UNIX 4) OS/2 warp
76)Decide which of following sentences is false (F) ?
1) My Network Places: this lets users see other computers connected to the PC.
2) Recycle Bin: When you delete files they go here.
3) System Tray: This box normally displays the current time, but it can also display other
information
4) My Document: This lets you browse the drives and files stored on your PC.
77) A/An ………….. is the distance between the beginning of a line and the left
margin, or the end of a line and the right margin.
1)Indent 2) justification 3) Alignment 4) format
78) DTP is stands for:
1) Data type process 2) Desktop publishing
3) Data Base prepear4) Digital processing
79)Decide which of following sentences is true (T) ?
1) You don’t need to have a sound board on your PC to hear speech and music.
2) digitalcameras store photos in a roll of film.
3) The most common extensions for text files are .txt, .pdf, .doc, and .htm ).
4) MP3 files are much bigger than WAV files.
80)Decide which of following sentences is false (F) ?
1) Computers understand human languages.
2)BASIC and Pascal are high-level languages.
3)The compiler converts source programs into a lower-level language.
4)The CPU can only process binary codes.