Page 77 - CG_v2.1_flipBooks_class_6
P. 77

B.  Fill in the blanks.
                    1.  The                    chart usually displays the data in the form of vertical bars.

                    2.  The                    area displays a large view of the current slide.
                    3.   The Object command from the                    group under the Insert tab is used to import data
                        from other applications, in PowerPoint.
                    4.                     is defined  as  the  step-by-step plan  to  solve the  problem  for  a  given problem
                        statement.
                    5.   In mixed referencing, you can lock either a column or a row by preceding it with a
                        symbol.

                    6.                     are also known as XY scatter plot charts.
                    7.                     is the rectangular area bounded by the two axis.
                    8.  Animation pane shows the number of text or                   with the applied animation effects.

                 C.  State whether these statements are true or false.
                    1.  AVG is a malware program.

                    2.  Combined reference is a type of cell reference.
                    3.  Notes pane is the area where a speaker can write notes for himself.
                    4.   'My data has headers' checkbox needs to be selected if columns have a heading
                        at the top.

                 D.  Match the following:
                    1.  Area chart                          a. Trends over a period of time


                    2.  Pie chart                           b. Quantitative magnitude of data


                    3.  XY Scatter Plot chart               c. Sector showing relative size of each value


                    4.  Line chart                          d. Correlation between two sets of values
                 E.  Answer the following questions:

                    1.  What are the ways that help us protect our system from Malware attack?
                    2.  Write down the steps to create a chart.

                    3.  What is the use of the action button?
                    4.  Write the name of any two programming languages.
                    5.  Explain the following malware:

                        (i)  Trojan Horse
                        (ii) Adware

                    6.  What is the use of the LEN function? Explain with an example.
                    7.  Write the steps to insert an audio file into a presentation.






                                                                                                Test Sheet 1  75
   72   73   74   75   76   77   78   79   80   81   82