Page 77 - Computer Genius Class 06
P. 77

B.  Fill in the blanks.
                    1.  The                    chart usually displays the data in the form of vertical bars.

                    2.  The                    area displays a large view of the current slide.
                    3.   The Object command from the                    group under the Insert tab is used to import data
                        from other applications, in PowerPoint.
                    4.                     is defined  as  the  step-by-step plan  to  solve the  problem  for  a  given problem
                        statement.
                    5.   In mixed referencing, you can lock either a column or a row by preceding it with a
                        symbol.

                    6.                     are also known as XY scatter plot charts.
                    7.                     is the rectangular area bounded by the two axis.
                    8.  It shows the number of text or                  with the applied animation effects.

                 C.  State whether these statements are true or false.
                    1.  AVG is a malware program.

                    2.  Combined reference is a type of cell reference.
                    3.  Notes pane is the area where a speaker can write notes for himself.
                    4.   'My data has headers' checkbox needs to be selected if columns have a heading
                        at the top.

                 D.  Match the following:
                    1.   rea chart                          a. Trends o er a period o  time


                    2.   ie chart                            .  uantitati e magnitude o  data


                     .      catter  lot chart               c.  ector sho ing relati e si e o  each  alue


                     .   ine chart                          d.  orrelation  et een t o sets o   alues
                 E.  Answer the following questions:

                    1.  What are the ways that help us protect our system from Malware attack?
                    2.  Write down the steps to create a chart.
                    3.  What is the use of the action button?

                    4.  Write the name of any two programming languages.
                    5.  Explain the following malware:

                         i   Tro an  orse
                         ii   d are

                    6.  Write a pseudocode to check for a prime number.
                    7.  Write the steps to insert an audio file into a presentation.






                                                                                                Test Sheet 1  75
   72   73   74   75   76   77   78   79   80   81   82