Page 162 - 2633 Trackpad Pro V5.1 Class 7
P. 162

test sheet 2


                                 test sheet 2                                                   (Based on chapters 7 to 11)







                  1.  Tick ( ) the correct option.

                     a.  Which Google app is used for video conferencing?

                         (i)  Google Meet                            (ii)  Google Drive

                       (iii)  Google Docs                           (iv)  Google Maps

                     b.  Which of the following acts refers to sending unwanted e-mails repeatedly?

                         (i)  Phishing                               (ii)  Hacking


                       (iii)  Spamming                              (iv)  Plagiarism

                     c.  Which year did the National Cyber Security Policy come into effect in India?

                         (i)  2000                                   (ii)  2008

                       (iii)  2013                                  (iv)  2015

                     d.  Electrical signal 1 stands for              and 0 stands for                  .

                         (i)  OFF, ON                                (ii)  ON, OFF

                       (iii)  NO, YES                               (iv)  EVEN, ODD

                     e.  Compute x // y if x=15 and y=4.

                         (i)  3.75                                   (ii)  3.5

                       (iii)  3                                     (iv)  4

                     f.  Which technology can potentially replace credit cards according to the text?

                         (i)  Facial recognition                     (ii)  Voice-enabled digital assistants

                       (iii)  Robotics Process Automation           (iv)  Social media intelligence


                  2.  Fill in the blanks.


                     a.   Google Earth provides detailed geographic information using _______________ photography
                        and satellite images.

                     b.  Unauthorised copying or stealing of software is known as  ____________.

                     c.  _______________ errors in Python are related to the logic of the program and do not typi-
                        cally cause the program to crash.


                     d.   An identifier in Python must start with a letter or an _______________.



                                                                                                                                                                                                                                             161
                  160   Premium   Edition-VII                                                                                                                                                                                    Test  Sheet  2  161
                  160
                                                                                                                                                                                                                                 Test Sheet 2
                        Premium Edition-VII
   157   158   159   160   161   162   163   164   165   166   167