الرئيسية التسجيل التحكم     الرسائل الخاصة البحث الخروج

   
العودة   منتديات مدرسة علي عبدالشكور التعليمية > المرحلة الثانوية > الصف الثاني الثانوي
الصف الثاني الثانوي شرح واسئلة ومراجعات نهائية وتوقعات ونماذج امتحانات
 


تكنولوجيا المعلومات والاتصال الترم الثانى (مذكرة)

الصف الثاني الثانوي


روابط دعائية

إضافة رد
   
 
LinkBack أدوات الموضوع إبحث في الموضوع انواع عرض الموضوع
 
   
قديم 02-11-2017, 08:27 PM رقم المشاركة : 1
معلومات العضو
محمد عيد
مدير عام

الصورة الرمزية محمد عيد
إحصائية العضو







محمد عيد تم تعطيل التقييم
 

محمد عيد غير متواجد حالياً

 


المنتدى : الصف الثاني الثانوي
5555 تكنولوجيا المعلومات والاتصال الترم الثانى (مذكرة)

CHAPTER SIX QUERIES
We use queries to view, change, and analyze data in different ways. You can also use them as a source of records for models, and reports. There are several types of queries in Microsoft Access.
1- Select queries
A select query is the most common type of query. It retrieves data from one or more tables and displays the results in a datasheet where you can update the records (with some restrictions). You can also use a select query to group records and calculate sums, numbers, averages, and other types of totals.
2-Parameter queries
A parameter query is a query that displays its own dialog box promoting for information, such as the criteria for retrieving records or a value you want to insert in a field. You can design the query to prompt for more than a piece of information; for example, you can design it to prompt for two dates. Access can then retrieve all records that fall between those two dates.
3-Cross tab queries
You use cross tab queries to calculate and restructure data for easier analysis of your data. Cross tab queries calculate a sum, average, count, or other types of totals for data that are grouped by two types of information one at the left side of the datasheet and another across the top.
3-Action queries
An action query is a query that causes changes to many records in just one operation. There are four types of action queries:
· Delete Queries:
A delete query deletes a group of records from one or more than a table. For example, you can use a delete query to remove unnecessary products that are no longer used. With delete queries, you always delete entire records, not just selected fields within records.
· Update Queries :
An update query makes global changes to a group of records in one or more than a table. For example, you can raise prices by 10 per cent for all dairy products, or you can raise salaries by 5 per cent for people within a certain job category. With an update query, you can change data in existed tables.
· Append Queries:
An append query adds a group of records from one or more than a table at the foot of the table. For example, suppose that you acquire some new customers and a database containing a table of information on those customers, to avoid typing all this information into your own database, you can append it to your Customers table.
· Make-Table Queries:
(Make-table query) creates a new table from all or from a part of data in one or more than a table. (Make-table queries) are helpful for creating tables to export to another Microsoft Access database or a history table that contains old records. We will concentrate on the select query, as they are the most common types
Creating a query using the wizard or Design View
Chapter Seven Forms
The form is considered a type of database entities. It is used basically for data entry or displays it in a database. You can also use the form to open other forms and reports in the database or as a custom (dialogue box) that accepts the user's entry and implement an order.
Form types
We can determine the types of forms as follows:
1. Display forms - Entry forms.
2. Main switchboard list forms.
3. Dialogue box forms.
Form Properties:
1. The form retrieves and displays its data from the basic record source (Query, Table).
- In (Form design), we can store information about the form such as (The form title and page number).
2. The graphic elements are stored in (Form Design) such as (lines and squares).
3. The account comes from (expression Stored in Form Design).
4. You can create a link between the form and the source of its records using (Control Tools). The most common elements are(Text boxes)
Creating a Form:-
There are many ways to create (Forms) and we will handle the following:
1- Creating forms using (Form Wizard)
According to your answers, the Wizard will ask you some questions and create a form. You can also customize the form in the way you want.
2- Creating forms using ( Design View):
Creating a form using (Design View), looks like sitting at a table surrounded by useful tools to carry out the tasks assigned for you.
Form Sections
The form consists of four basic sections, they are:
· Form Header
It includes the data inserted at the head of the form, such as the company's address, institution or any other statement that clarifies the nature of the data it displays.
· Form Footer
It includes the data inserted at the foot of the form, such as the total of employees and (form conclusion).
· Page Header
It includes data that appear at the head of every page such as (Field Titles)displayed by the form. It includes also the slogan of the company or institution whose data are displayed by the form.
· Page Footer
The page footer includes the data put at foot of every form page such as (Page Number and Date) etc.
Ways of (Form View):
You noticed that it is possible to use more than a way to display (Form View) and to shift these ways, you can select (Form View) as follows:
1- From the toolbar ( Form Design) select one of the three ways of (View)
2)From (View menu) select one of the three ways of( View)
Notice that there is a new way for displaying the form is (Datasheet).
Through (Form View) of "Datasheet" you can display the records in columns and row formats, so you can view many of the records at the same time. Through (Form View), you can go through a single record at a time.
Record Navigation:
In both ways of (Form View) and (Datasheet View), you can navigate across records, add a record, reach to a certain record or view the total number of records in the file of data.
The calculated values in Forms
Frequently, we need to do some mathematical calculations in the form or the report. These calculations sometimes depend on the stored data in the data tables. For example, if data in the fields of the table include the items of the salary for an employee, there is no need after calculating the net salary to store it in table of data
· It is useful here, to calculate the net salary on loading the (Employee Form) in the computer's memory only.
· To calculate the net salary, insert [Textbox] from the [Toolbox] and we insert also the mathematical expression that calculates the net salary
Sub Forms
It is a form inserted in another form (the maim form). We call (The form inside the main form) a (Sub-Form). We refer to it as (Frame Form- or subordinate form) The effectiveness of (Sub Forms) appears when we want to view Data from tables bearing the relationship of (One-Many) for example; you can create a form with a sub-form inside it to view data from (Department-Employee) tables. When we display the name of a certain department, the data of the employees who work in this department appear in this department only but on viewing another department name, data of the employees appear in the second section only. This is only when the relationship is (One to Many) of (Department Table). The primary form clarifies the data of (One) a (linking relation) where as the sub form clarifies the data of (Many) of the same relationship. The main form is linked to the sub form so that the latter can display only the records connected to the present record in the main form. Nested levels:
If you put every sub form in a main form, the main form can include any number of sub forms .With the maximum of seven nested levels of sub forms. This means that you can put a sub form in a main form; and put another sub form inside another sub form and so on. For example, you can make the main form display the clients. While the sub form displays the orders. The sub form displays the last details of requests.
Chapter Eight Reports
A report is considered an effective way to retrieve your data in a printed format. Because of your control over the size and the appearance of everything in the report, you can display the information in the way you like. You can create different types of reports in a quick way using wizards. We can we use "labels wizard" to create "label cards", we can use report wizard to create a standard report and we can use also columnar or tabular wizard to create columnar or tabular wizard. The wizard sets questions and creates reports depending on your answers; then you can customize the report in the way you like in (Design View). You can also create reports "using (Design View).
Types of reports:
You can determine the types of reports as follows:
1. Label cards Reports
2. Standard Reports
3. Columnar and Tabular Reports
Reports properties :
1. Most reports are bound to table(s) in the database. The report record source points to the fields existed in the primary tables and queries.
2. The report does not need to include all the fields from the table(s) or the queries that the table depends on.
3. The bound report gets its own data from the primary record source.
4. Other information about the report is stored, such as the report title, date and page number in (Report Design), as previously studied in the forms.
Notice that you can create a link between the report and its own record source using graphic entities that are called (Control Tools). They can be Textboxes that display names, numbers, and decorated lines that arrange data and make the report more attractive.
Creating a report:
There are a variety of ways to create reports:
1- Creating reports using (Design View)
2- Creating reports using the wizard.
The wizard will ask you some questions and creates a report according to your answers. Then you can customize the reports in the way you like.
Ways of Reports display:
You noticed as before that, we can use two ways to display the report and to navigate between them you can select (View) as follows:
(1)From toolbar(Report Design),select one of the two ways ( Design view- Print Preview) (2) From ( View Menu ) select ( Design View or Print Preview)
· Report Sections:
Report sections look like working with (Form Sections). The report is distinguished from the form because of the existence of their own sections. By using the report sections, you can arrange data as categories'. For example, you can display projects names and the employees working in them. You can also calculate the number of the working hours in the project for each employee and the total of the working hours in all the projects.
- So far, we deduce that the report includes the following sections:
1. Page Header and Footer
2. Report Header and Footer
3. Custom Section
Data and Information Security
As a start , What is Hacking ? How it happened ? Who are Hackers?
Hacking :
It is an attempt to hack into a computer from an unauthorized person with the purpose of
1- Going through data
2- Robbing data
3- Corrupting information
4- Causing disorder in processing Procedures
Hacking Types:
Intended Hacking :
Some people from external sides try to hack into the computer in an unauthorized way for different reasons that may differ according to the nature of the hackers. Hackers are classified as follows:
1- Hackers. 2-Competing sides.
3- Foreign enemies 4- Inner enemies.
Unintended Hacking:
Hacking occurs because there are errors in the computer software that may expose the computer to the same problems that result from the intended dangers .
Who perform hackings:
Professionals:
They are distinguished people with an accurate knowledge of computer software and a high ability in programming
Amateurs :
They are people with relatively limited experience in programming and they search for ready made programs to use in hacking .
Security Concept
Security means protecting sources of data in a correct way:
- Security means also managing and organizing relationships and communications inside the system without an effect on computer users.
- Security does not prevent crime or hacking but when the security system is strong, hacking Data will be
1- Expensive 2- needs a long time 3- Easy to discover
Information Ethics
What is mental property and how to protect it?
When you deal with data, you need software that can help you organize and analyze Data and you need to make the necessary processing to get to the correct information. The owners of these programs must protect their mental property. This is what we call mental property and how to protect it.
We find that computer programs are protected by laws such asPublishing and Copyrights.
Copyrights
Copyrights are given to any person who had mental production and has not published it. Copyrights mean that no one is allowed to copy or publish any part of it. This is considered breaking the laws of Copyrights.
International agreements
These agreements are considered licenses to deal with the programs . The license is an important part that should be enclosed with the programs . It starts with a title of "Giving Licenses " that explains how to use the program and the restrictions imposed on borrowing or hiring programs and also the guarantees defining the program.
Where can we find program licenses?
- When you buy any program, you will find the license agreement in one of the following forms:
- Handouts attached to the product.
-A print out in the user's guide inside the cover.
- A web page from the program
Information negative sides:
Information has a vital role to play in all the sectors especially at the sites of decision making. The power of the information sector became the main criterion for the comprehensive economic power in the society. It is the feedback that helps to achieve the stability of the international system. Information has a positive and important effect on the national security, education, health, economy, the state's policy and on our life in general. We see and hear about satellites for spying that know no limits or privacies for any country. These satellites can hack on the sovereignty of any country. Foreign mass media transmit whatever they like of false information about other countries. The main aim here is economy. We notice that information technology has a great effect on our life and can control our culture and knowledge. The danger of the information technology lies in the fact that it robs the people their identity. This is clear in the book of Cross Roads by Dr. Hussein Kamel Bahaa El-Deen; the Ex-Minister of Education in Chapter Three entitled "The Retreat of the Morals and the Sovereignty of their Material Values"
Examples to show the negative sides of information
The World Wide Web:
The marvelous progress in the fields of communication and internet usage of computer is a great leap in sharing data and information. This helps employees, individuals, institutions and states work smoothly. This is known as the (World Wide Web) or the internet. The international network is called the (World Wide Web) for information. It links many "Wanes" (Wide Area Networks) in most countries of the world. Anyone can browse the internet and can also go through the information or even add to it. Individuals who use the internet should have morals because they will find information that deals with the correct social habits and religious values. It is possible also to find immoral data that penetrate into the country. The internet helps us transmit information in an easy and quick way , not only among individuals but also among institutions and states. The world has become a small village because we can see and know each other inspite of the far distance. For this reason, a new type of computer users who look for information for different reasons have appeared. They try to reach information in all the possible means to erase knowledge or attempt to alter it , using different means through the computer and the internet. These people are called hackers. But how can we protect our data from such
hackers ?
The security dangers that personal computers are exposed to
when connected to the internet:
Security dangers
The internet includes many security dangers that may harm your computer. These dangers can cause problems. These problems result in losing data and information. These types of dangers are considered the common security dangers.
Viruses
Viruses are transmitted to computers in many ways for example, when we use infected CDs. Now, after the breakthrough of using the internet, the (email) became the most wide spread cause for viruses spreading into computers. These viruses may cause harms. The least harm is a damaging a certain program.
- Lack of experience in dealing with some programs:
The wide spread usage of the internet by the non-specialists in this field, leads to updating programs to make them easier to deal with. It became very easy for anybody to log into the internet and reach the information; this makes the connector exposed to different harms.
The inaccuracy and carelessness in using the internet:
In choosing your passwords, they should not be known to others or written on papers and they should not be easy to guess. The technical ways followed in limiting security dangers on the systems and computer nets, occasionally limit the use of some applications and internet services. For example, more security may affect the use of chat or communication through the internet. Therefore, security level is left for the user.
Information filter
It is a procedure taken to prevent the net user from reaching non- secured sites. Any one can determine the type of information he wants to hide.
The importance of information filter:
Information Filter aims at protecting users from harmful and useless sites
Filters:
They are programs that hide the non-secured sites from the users.
There is no filtering program that can prevent completely the non secured sites but they aim at limiting the possibility of reaching such sites.
Precautions taken before dealing with the internet
- Computers should be provided with anti-virus programs to prevent hackers from attacking computers.
These programs should be updated - to get newer versions
- We must know many of the concepts of data, information and their importance. They can help individuals and institutions succeed in their work. Data accuracy leads to correct processing and this leads to correct information.
We must recognize the following:
- Data and information Security
- Using original programs
- Viruses
Data and information security means keeping the secrets of (Data, information, computers and the employees in an organization or institution).
- Protection should be available on :
- Personal computers.
- School computers.
- Computer software.
- If the computers are connected to the internet, don't try to hack into your
friends' sets with the purpose of deleting their files because this is immoral .
Protecting Data and Information:
We also protect data and information through using original programs. This is very important because original programs help us keep data and information and do the correct processing.
Original programs
- To have good protection, you should make sure that the used programs are original. To avoid law questioning, you should have documents to prove that the programs installed are original.
Viruses:
The virus is a small programs that can reproduce rapidly and spread. It contains a group of orders that can destroy, delete programs and data in the computer.
Protection against virus should be on every personal or school computer. You should not log into the internet or make a chat without having a strong updated anti-virus programs. You must make sure that your computer is viruses free. You should not navigate through computers if you doubt that you have a computer virus.
Remember
Data:
Data are what we feel by our senses. They are the primary raw materials for an information.
Information:
It is the outcome of data processing either syntactically or analytically to deduce the contents of data.
Information properties:
It should be precise, plentiful, developing, clear, modern, real, documented , updated, objective and testable.
Mental property:
It means protecting the programs you have designed according to certain
laws:
Copyrights and international agreements .
License agreements:
On buying any programs, you will find the license agreement enclosed with the programs as follows:
* a paper printout.
* a printed page.
* a web page .
- The positive sides of information:
Information has an important and positive effect on the national security, education, health, economy, the state's policy and even on our life in general.
The Negative sides of information:
Information has also a dangerous negative side, for example satellites are used for spying. They know no limits or privacies for nations. They can hack on the sovereignty of nations. The information transmitted by Mass Media, transmit whatever they like of false information about nations and people. They also penetrate the ideas and information into countries and no one can stop or prevent them. The main aim here is economy.
Examples to show the negative sides of information:
- The internet.
- Hacking.
The world Net is called ( World Wide Web) It links and carries data to many countries in the world. Anyone can navigate through the internet easily.
Our computers are exposed to the following dangers when we log into
the internet:
1- Viruses
2- Lack of experience in dealing with the internet
3- Inaccuracy in using the internet.
Ways for avoiding Security dangers:
1- Use anti-virus programs.
2- Use the e-mail carefully.
3- Be careful when you install programs from the internet.
4- Avoid any unknown programs for you or that you lack experience in.
5- You should use very updated filter anti-virus programs in dealing with the internet .
Information filter:
It is a procedure taken to prevent the net users from reaching the non secured sites. Any person can decide what type of information he wants to hide.
The importance of information filter :
It protects the net users from the harmful and useless sites. Protection should be available on the personal computers, school computers and the software in the computers connected to the internet in school laboratories
Data and information Security
Security means keeping the secrets of ( information, Data,
computers and the individuals who work in an organization or an institution.
The elements that should be protected
( Hardware ):
The computer is exposed to many threats such as:
* Misuse
* Disorders
* Intended Corruption
Information Security is interested in the material components of the computer so, we should do the following:
- We should devote a separate room for the computer with safety tools such as fire extinguisher and a stabilizer for the electric current. We should select the individuals who will deal with computers. The places chosen for computers should have fresh air stream.
Data and information:
In using the computer, we should control the following:
* Data Entry
* The flow of Data
* Coding and encoding data
* The nature of the data available for each user.
(Software):
They are groups of orders that help us use the computer - with the purpose of solving a problem or carrying out a task.
These programs help the user in his work. They are the (Operating System and application programs).
Data and Information Security aims at keeping the programs as they help to:
- make sure that the programs used are original.
- control the areas of using the program.
- keep the secrets of data within the programs.
(Computer Users):
The user is one of the primary elements we have to consider in the issue of Data Security especially after the breakthrough in the scope of computer and the wide spread of the internet and the nets. Data Security requires the following:
- Defining the people who will scan data and deal with them.
- The nature of the data for each user.
Keeping Data and Information
There should be a complete awareness of the following:
Data Processing concept.
The concept of the computer crimes.
- How to protect (The operating systems, the application programs and the Databases.
* We should be careful when we choose the people who will deal with the computer data and information
The importance of Data and Information:
To achieve a technological rise and development, we must consider Data and information security as a must. So we have to define the concept of Security.
Using Original Programs
To keep Data and processing them in a correct way in order to be valuable information, we must deal only with original program copies . This is considered one of the elements that help us keep Data and information Security. This gives the user the ability to deal with the advanced facilities of the program. You as a user, has the right to get another copy if there is a problem in the original one. In this case, you will avoid viruses and you will be away from being questioned by law. These programs will help the users achieve their important tasks. These programs are designed by computer experts who have the ability of innovation. There should also be some restrictions in using these programs so as not to attack the Rights of designers . Hence , it is important to know the extent of the danger in using the programs that are not original and are not authorized to copy.
Protecting the rights of the original program designers
To guarantee a protection for the Rights of the program designers ,we have to issue a law for protecting the Copyrights of the mental property. Penalty should be defined and implemented.
-The law of protecting the rights of the program designers.
Now, there is a law to protect the rights of the program designers from illegal users. The law puts conditions for dealing with the programs for
example:
1- Defining an expiry date for the program
2- Preventing total or partial copying for the program without a written permission from the program designer.
3- Preventing the total or partial quoting without an official license from the program designer.
4- The personal user has the right to make a copy for home use only.
Deciding the penalty:
-If the data or the programs are copied for the first time without an official permission, there will be a prison or a fine for those who are responsible for Copyrights protection.
- If Data and information are copied many times without a permission there will be prison and a fine.
Implementing the penalty:
The Police for the artistic works will follow up all the sides to make sure that the programs used are the original and they carry out the penalty.
Remember
Data and Information Security :
The security primary aim is to keep the secrets of data , Information, the used sets, the working individuals in an organization or an institution.
The elements to be protected:
1- The sets and accessories .
2- The data and information
3- The programs
4- The users
Maintaining Data and Information:
-The concept of Data processing
- Computer Crimes.
The importance of Data and Information Security:
Information and Data Security is considered a must. To achieve a technological rise, we must define the concept of security.
The Rights of the program designers should be protected through the following:
* There should be a law to protect the Copyrights for the mental property.
* Penalty should be defined.
* Penalty should be implemented.
Viruses
Viruses are the most dangerous things that threaten Data and corrupt them. This danger can threaten also information and Data safety. This worried computer users because this leads to the loss of important data. We will know in this lesson what a Virus means.
Virus concept
The organic Virus
Viruses are the primary reason for man's infection with diseases.
These Viruses are able to move, spread, reproduce and may cause infection to other persons.
The computer Virus
A little program has the ability to reproduce and spread. It contains a number of orders that destroy or delete the programs or data found on the computer.
- You may have one of these questions:
1- Why have we chosen the organic virus as a name for the computer virus?
2- What are the similarities between the organic and computer viruses?
Organic Viruses
Effect: Changes the functions of the living cells
Reproduction and spreading: Reproduce to destroy other healthy cells
Dormant: Man can carry the virus without symptoms
Computer Viruses
Effect: Changes the functions of some programs
Reproduction and spreading: Reproduces and makes other copies to infect a large number of programs
Dormant: The computer may be infected by the virus but it is inactive
Causes for Virus appearance:
1- Protecting the original programs from copying by illegal users.
2- For trade, as some companies started to produce anti-virus programs.
3- To make propaganda and to advertise for the mental property products.
4- The anti-virus programs show the extent of the program designer
intelligence.
Viruses Properties:
Virus has the following properties:
1- It is dormant. The virus may be existed but not active.
2- It reproduces. The virus is able to reproduce by making another a copy for itself in the memory or in the files.
3- It can move. The virus moves from the corrupted files to other files.
4- It puts signs and marks the infected files.
5- It has the ability of executing . It can execute corrupting orders but with conditions.
6- It has the ability of destruction to be able to cause corruption and disorder.
The places which the virus attacks:
The virus searches for the following files to corrupt:
(System Files)
( Executing Files)
( Files of Data)
Virus Symptoms:
1- The computer is unable to boot or load its operating system.
2- The computer shuts down without reason.
3- The increase or decrease in the size of files without a clear reason.
4- Some files are cancelled without reason.
5- False and unexpected messages are received.
6- Strange letters appeared on pressing the keyboard.
7- The appearance of some strange figures.
8- The computer slows down in a noticeable way.
Ways of carrying computer viruses:
All types of Storing Media are considered the primary causes for spreading the viruses of computer.
- Hard disks, CDs and Flash Memory
Causes of viruses:
- Dealing with the internet
- Downloading files.
- Receiving e-mails.
Virus and ways of protection:
You can protect your computer from virus through the following:
* Take the necessary protections precautions.
* Use anti-Virus programs to scan your computer.
* Remove all viruses quickly
* Protection is better than cure in dealing with viruses.
Precautions for protection:
- Use original copies
- Make spare copies from the original programs and data files.
- Protect the CDs through CDs holes.
- Watch out the file sizes from now and then.
- Watch out the executive files.
- Use anti-virus programs to scan your computer to detect and remove the viruses.
Scan Virus programs:
Anti Virus programs are used to scan the computer (Programs, data files and the stored media available on the set). These programs have the ability to detect viruses if they are found.
Notice
There are many anti-virus programs but a single anti-virus program cannot detect all types of viruses .
We can use more than a program to detect viruses . We must update these programs using updated versions.
- Every computer user should possess updated anti-virus programs.
- The Booting CD should be virus free.
The most famous Anti - Virus programs to detect viruses are:
* Norton
* Mcafee
Some Viruses names:
1- Michel Anglo Virus
2- Israeli Virus.
3- The extended Ball Virus
4- Birthday Card Virus.
5- Char noble Virus
6- Nighthorse virus
7- The middle Night Virus
Remember
Organic Virus definition:
The organic virus is the virus that can infect man and has the ability to move, spread and reproduce .
Computer virus definition :
It is a little program that has the ability to reproduce , spread and it contains a number of orders that destroy or delete the programs or the data found in the computer .
Reasons for the appearance of computer Viruses:
1- Protecting the original programs from copying by users in an unauthorized way.
2- For trade, as some companies specialized in producing anti- virus programs.
3- The anti-virus programs show the extent of intelligence of the program designers.
Virus properties:
Dormant- reproducing - moving- putting marks and signs to carry out its own destructive orders.-
Places that the virus attacks:
Executing Files, System Files and Data files
Virus Symptoms:
1- The computer shuts down without reason.
2- The increase or decrease in the size of files without a clear reason.
3- Strange letters appeared on pressing the keyboard.
4- The appearance of some strange figures or signs.
5- The computer slows down in a noticeable way.
The causes that help in virus spreading:
1- All types of media storing .
- Hard disks - CDs and the Flash Memory
2- Dealing with the internet
- Downloading files. - Receiving e-mails.
Viruses and ways of protection:
1-Taking special precautions for protection against virus .
2- Using detecting virus programs.
3- Remove the virus quickly and make a virus scan regularly .
Special precautions for virus prevention: ( Prevention is better than
cure)
Use original copies for programs.
Make extra copies from the original programs.
Watch the files and their expansion from now and then.
Watch the executive files .
Use anti-virus programs to detect and delete the viruses.
Virus detecting programs:
They are the programs used to scan the computer ( programs- files data- storing media available on the set) They have the ability to detect the viruses if they are found.
Protection against virus
Every computer user should look for updated programs to detect viruses.


كلمات البحث

اختبارات ، شرح، نماذج، امتحانات ، أسئلة








التوقيع

مدرسة علي عبدالشكور الرسمية للغات

من مواضيع محمد عيد

رد مع اقتباس
روابط دعائية
 
إضافة رد
   

مواقع النشر (المفضلة)
 
   
الكلمات الدليلية (Tags)
(مذكرة), المعلومات, الثاني, تكنولوجيا, والاتصال
 

روابط دعائية

أدوات الموضوع إبحث في الموضوع
إبحث في الموضوع:

البحث المتقدم
انواع عرض الموضوع

ضوابط المشاركة
لا تستطيع إضافة مواضيع جديدة
لا تستطيع الرد على المواضيع
لا تستطيع إرفاق ملفات
لا تستطيع تعديل مشاركاتك

كود [IMG]متاحة
كود HTML معطلة
Trackbacks are متاحة
Pingbacks are متاحة
Refbacks are متاحة


المواضيع المتشابهه
الموضوع كاتب الموضوع المنتدى مشاركات آخر مشاركة
الملغي في مواد الترم الثاني محمد عيد الصف الثالث الابتدائي 0 04-26-2017 11:13 PM
مذكرة مراجعة الهندسة الترم الثاني+نموذج الاجابة محمد عيد الصف الثاني الاعدادي 0 02-15-2017 07:39 PM
مذكرة مراجعة الجبر الترم الثاني محمد عيد الصف الثاني الاعدادي 0 02-15-2017 07:34 PM
مذكرة Science الترم الثانى 2017 محمد عيد الصف الرابع الابتدائي 0 02-13-2017 09:45 PM
منهج family and friends الترم الثانى محمد عيد الصف الرابع الابتدائي 1 12-01-2016 11:18 AM

Bookmark and Share

RSS RSS 2.0 XML MAP HTML

Loading...

أقسام المنتدى

المرحلة الابتدائية | الصف الاول الابتدائي | الصف الثاني الابتدائي | الصف الثالث الابتدائي | الصف الرابع الابتدائي | الصف الخامس الابتدائي | الصف السادس الابتدائي | المرحلة الاعداية | الصف الاول الاعدادي | الصف الثاني الاعدادي | الصف الثالث الاعدادي | المرحلة الثانوية | الصف الاول الثانوي | الصف الثاني الثانوي | الصف الثالث الثانوي | منتديات أدارية | للشكاوي والاقتراحات | أرشيف المنتدي | مدرسة علي عبدالشكور الرسمية للغات | أخــــــــــبارنا | اخبار التعليم بمصر | جنة علي عبدالشكور للغات | kG alyabdelshakour | فديوهات ومناسبات المدرسة | الترم الاؤل | الترم الثاني | الترم الاؤل | الترم الثاني | أعــــــــلانات المدرسة | قسم الجداول المدرسية | اجتماعيات طالب | جماعة الارشاد النفسي | الركن الاسلامي | حى على الفلاح | الحضارة الاسلامية | منتديات متنوعة | منتدى الكمبيوتر والبرامج | تعلم الانجليزية | رمضانيات على عبدالشكور لغات |


   
 

Powered by vBulletin™ Version 3.8.7
Copyright © 2017 vBulletin Solutions, Inc. All rights reserved.
SEO by vBSEO منتديات
Developed By Marco Mamdouh
 
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39