Page 155 - Trackpad_V1_Book 7_Flipbook
P. 155
c. ________________ are the traceable digital activities that we leave behind after surfing
the Internet.
d. The aim of ________________ is to protect public and private infrastructure from
cyber-attacks.
e. ________________ is the fixed values that do not change during the execution of the
program.
f. ________________ is the names given to variables, functions and arrays.
3. Write 'T' for true or 'F' for false.
a. Mobile apps can be used without Internet connectivity.
b. All apps in the Google Play Store are not verified by Google.
c. YouTube is the most widely used video-sharing application.
d. The share button is present on the status of the spreadsheet.
e. Data types are used to define the type of data.
f. Digital footprints are the traceable digital activities that we leave behind after
surfing the Internet.
4. Short answer type questions:
a. Define any one pane of the Project Designer Window of App Inventor.
b. How are Google apps helpful?
c. Define hacking.
d. What do you understand by computer ethics?
e. What is the value operated by the operator called?
5. Long answer type questions:
a. Write steps to delete an app.
b. Define Google Sheets. How can you share and protect data in Google Sheets?
c. What are the Information Technology Amendment Act of 2008?
d. Explain the assignment operators with examples.
e. What are the errors? Explain the types of errors with examples.
152 Trackpad (Version 1.0)-VII Test Sheet 2 153
152
153
2
Sheet
Test
Trackpad (Version 1.0)-VII

