Page 142 - Chinmaya_C7_flipbook
P. 142
c. ________________ is the act of copying information from the Internet and using it in one’s
projects or work without crediting the original creator.
d. The aim of ________________ is to protect public and private infrastructure from
cyber-attacks.
e. ________________ is the act of copying somebody's information or projects without crediting
the original creator.
f. ________________ are rules that govern our actions when we use computers and the
Internet.
3. Write 'T' for true or 'F' for false.
a. Google Contacts is an important app that is available with Gmail services.
b. You cannot embed Google Slides presentations in blogs and websites.
c. YouTube is the most widely used video sharing application.
d. Share button is present on the status of the spreadsheet.
e. Hacking is the illegal practice of obtaining sensitive information through e-mails.
f. Digital footprints are the traceable digital activities that we leave behind after
surfing the Internet.
4. Short answer type questions:
a. Define any one pane of the Project Designer Window of App Inventor.
b. How are Google apps helpful?
c. Define hacking.
d. What do you understand by computer ethics?
e. Which technique reduces congestion of traffic in cities?
5. Long answer type questions:
a. Write steps to delete an app.
b. Define Google Sheets. How can you share and protect data in Google Sheets?
c. What is the Information Technology Amendment Act of 2008?
d. What do you mean by a smart AI-enabled home?
e. Write any two future prospects of AI.
140 Premium Edition-VII Test Sheet 2 PB

