Page 54 - 2619_PlusGPT V2.1_C-8
P. 54

B.  Fill in the blanks.

                     1.  ____________ can be either horizontal or  vertical lines.
                     2.  A program file infecting virus is also known as a _______________.

                     3.  ____________ is a protocol used to send e-mail messages over the Internet.

                     4.  ____________ shows the meaning of symbol and colours used in a chart.

                     5.  ____________ chart shows only one data series at a time.

                     6.  ____________ refers to the safety practices followed to prevent theft of personal information.

                     7.  Web addresses that start with ____________ also signify that the website is secure.

                     8. ____________ is a networking  device  used  to  connect  and facilitate  transfer  of information

                        between two networks.

                  C. Write ‘T’ for true and ‘F’ for false.

                     1.  We cannot create Bar chart in Excel.                                            ____________

                     2.  Data representation using charts is quite inefficient.                          ____________

                     3.  You can arrange data in ascending order only.                                   ____________
                     4.  Chart area includes all objects and elements in a chart.                        ____________

                     5.  You should keep same password for all your online accounts.                     ____________

                     6.  Modulation is the process of converting  digital signals to analog signal.      ____________

                     7.  A program file infecting virus is also known as a ‘File Injector’.              ____________

                     8.  Internet security leads to reduction of data loss, theft and damage.            ____________

                  D. Answer the following:

                     1.  Describe LAN and MAN.

                     2.  What is the need for Internet security?

                     3.  Explain different kinds of online threats.
                     4.  What is a computer network? Write its advantages.

                     5.  What is the difference between sorting data and filtering data?

                     6.  What is spyware? How you can prevent the attack of spyware?

                     7.  What are the differences between line chart and XY scatter chart?

                     8.  Write few tips for having a strong password.








                  52    Premium Edition-VIII
   49   50   51   52   53   54   55   56   57   58   59