An imaginary _____________ is used for drawing all shapes on the screen.
(a) bounding box
(b) view port
(c) container
(d) none of the above
(a) bounding box
Computer Science & Information Technology
You might also like to view...
Which of the following is an example of an enterprise level firewall?
A) Sonic Wall B) Check Point 15000 series C) D-Link DFL-2560 D) Norton Firewall
Computer Science & Information Technology
A traditional approach to organizing files is to use a ________ structure that consists of folders and subfolders containing related files
A) non-hierarchal B) newsfeed C) hierarchal D) reading view
Computer Science & Information Technology
Performing a(n) ____________________ is the process of relating tables in a database based on a common field.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) __________ is a plan for conducting a meeting.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology