____ is the prepress activity of calculating an intentional compensation for misregistration.

a. Bleeding
b. Spreading
c. Trapping
d. Choking


c. Trapping

Computer Science & Information Technology

You might also like to view...

As with other variables, an array declared as a class-level variable is visible to all procedures within the class.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

One of the disadvantages of the infix notation is that _____.

A. it is hard for humans to understand B. some expressions can evaluate to two different values C. not all algebraic expressions can be represented with it D. we need to use parentheses to control the evaluation of the operators

Computer Science & Information Technology

The ____________________ is a summary of information needs of the functional areas and of the organization as a whole.

A. application portfolio B. IT environment C. mission D. objective of the IT function

Computer Science & Information Technology

Mandatory vacation, job rotation, and separation of duties policies all enhance the overall security posture by doing which of the following?

A. Making it more convenient to review logs for malicious activity B. Making it more difficult to hide malicious activity by insiders C. Reducing risks associated with viruses and malware D. Reducing risks associated with Internet attacker

Computer Science & Information Technology