Page 79 - ThinkGPT_V2.1_C6_Flipbook
P. 79

B.  Fill in the blanks.
                    1.  The                    chart usually displays the data in the form of vertical bars.

                    2.  The                    area displays a large view of the current slide.
                    3.   The Object button from the                 group under the Insert tab is used to import data from
                        other applications, in PowerPoint.
                    4.  Recognition of biological characteristics is an example of              authentication.

                    5.   In mixed referencing, you can lock either a column or a row by preceding it with a
                        symbol.
                    6.                     are also known as XY scatter plot charts.
                    7.                     is the rectangular area bounded by the two axis.

                    8.  Animation pane shows the number of text or                   with the applied animation effects.
                 C.  State whether these statements are true or false.

                    1.  AVG is a malware program.
                    2.  Combined reference is a type of cell reference.
                    3.  Notes pane is the area where a speaker can write notes for himself.

                    4.   Only one flow line should enter a decision box, but three flow lines should
                        leave the decision box.
                    5.   'My data has headers' checkbox needs to be selected if columns have a heading
                        at the top.

                 D.  Match the following:
                    1.  Area chart                          a. Trends over a period of time


                    2.  Pie chart                           b. Quantitative magnitude of data


                    3.  XY Scatter Plot chart               c. Sector showing relative size of each value


                    4.  Line chart                          d. Correlation between two sets of values
                 E.  Answer the following questions:
                    1.  What are the ways that help us protect our system from Malware attack?

                    2.  Write down the steps to create a chart.
                    3.  What is the use of the action button?

                    4.  Write an algorithm to copy and paste a paragraph in Word.
                    5.  Explain the following malware:
                        a. Trojan Horse

                        b. Adware
                    6.  What is the use of the LEN function? Explain with an example.

                    7.  Write the steps to insert an audio file into a presentation.



                                                                                                Test Sheet 1   77
   74   75   76   77   78   79   80   81   82   83   84