Page 155 - Trackpad_V5_Book 7
P. 155
c. ________________ are the traceable digital activities that we leave behind after surfing the
Internet.
d. The aim of ________________ is to protect public and private infrastructure from
cyber-attacks.
e. ________________ is the fixed value that does not change during the execution of program.
f. ________________ are the names given to variables, functions and arrays.
3. Write 'T' for true or 'F' for false.
a. Mobile apps can be used without Internet connectivity.
b. All apps in the Google Play Store are not verified by Google.
c. YouTube is the most widely used video sharing application.
d. Share button is present on the status of the spreadsheet.
e. Data types are used to define the type of data.
f. Digital footprints are the traceable digital activities that we leave behind after
surfing the Internet.
4. Short answer type questions
a. Define any one pane of the Project Designer Window of App Inventor.
b. How are Google apps helpful?
c. Define hacking.
d. What do you understand by computer ethics?
e. What is the value operated by the operator called?
5. Long answer type questions
a. Write steps to delete an app.
b. What is Google Sheets? How can you share and protect data in Google Sheets?
c. What is the Information Technology Amendment Act of 2008?
d. Explain the assignment operators with example.
e. What are the errors? Explain the types of errors with example?
152 Pro (Ver. 5.0)-VII Test Sheet 2 153
152
153
2
Sheet
Test
Pro (Ver. 5.0)-VII

