Vii Term-II Computer Qpaper 2024-25
Vii Term-II Computer Qpaper 2024-25
ROLLNO: NAME:
(2) On the left of screen of App Inventor, there is a __________from where we can select components
like buttons, images and other functions required for our app.
(3) ____________is a free online word processing program provided by Google.
(4) To gain access of all the Google services, we must have our email account with __________.
(5) Google has developed a several web-based applications that are collectively known as
_____________.
(6) ____________is the illegal practice of obtaining sensitive information through emails.
(7) The word_________denotes the culture of computers, information technology and virtual reality.
(9) __________are the special symbols used in programming language to perform specific operations
on operands and give a meaningful result.
(10) ________is the place where we code the components added in the Design Window of App
Inventor
Q.2 MARK AS TRUE OR FALSE 5
(2) The Block editor view of the App Inventor contains all the components required to design an
application.
(3) Event Handler block that will handle what happens when the button on your app is clicked in App
Inventor.
(4) Google Drive gives unlimited storage free of cost.
1
(5) Google Translate is a language translation service which supports only 10 languages.
(8) Smart cities can reduces inconvenience and improve economic growth.
(10) AI enabled CCTV can help in building surveillance to keep a check on potential criminal incidents.
2
(5) Unauthorised copying or stealing of software, movies, music and making these copies available on
the internet is called ____________
[A] Plagiarism [B] Digital footprints
(6) _____________is the free and secure educational app developed by Google.
(7) ___________are the traceable activities that we leave behind after surfing the Internet.
(8) Blank space, Horizontal tab, carriage return are the examples of _____________ in Python.
(9) Which wave of AI was brought about by expert systems like Eliza and IBM Watson?
(10) What will help us in getting instant alerts in case of any security breaches in our house?
3
Q.4 MATCH COLUMN “A” WITH COLUMN ”B” 5
COLUMN A COLUMN B
(1) Write two points of explanation about the use of Google Contacts.
(2) Mitesh has written one program in Python to perform addition of two numbers which are 4 and 5.
After execution of the above program he is getting 20 as output instead of 9. Which type of error
he might have created in his code?
(3) What would be the output of the following Python statement typed in interactive mode?
>>> print(2<5)
(4) Aryan wants to save some important documents which he needs next year, but he is not sure about
where he can keep those documents safely. Suggest him the way to save these documents safely by
4
using Google. Where and How?
(5) Raj was working on application where he wanted to divide the two number (A and B), he has
written the expression as C = A/B, on execution he entered 30 and 7 and expected answer was 4
i.e. only integer part not in decimal, but the answer was 4.285 approx., help Raj to correct his
expression and achieving the desired output.
(6) Punita wants her photos to be backed up automatically and also wants them to be accessible from
anywhere. Which Google app should she use for this?
(7) What would be the output of the following Python program?
a= 8
b=a
print(“a=”,a,”=b”)
(8) Sarika is using Android based mobile phone. Her friend has suggested one mobile application to
remember chemical equations easily.
1. Name the store from where she search and download this application.
2. Her friend is using this application in offline mode. Name the type (category) of this
application.
(9) Your science teacher wants to keep track of all your upcoming science exam dates. Which google
apps can help her to do so? Also suggest Google app where she can distribute notes and assignment
with all the students.
(10) Ankit, a new student has joined your school after half yearly exam. He has prepared a project
report for science subject on the topic “Gravitational Force”. He has used many images from
internet. He has copied some written points in his project without making any changes. He has not
given credit in the form of acknowledgment to the creator or the website in his project report. What
type of illegal practice/Cybercrime/illegal act he did?