An imaginary _____________ is used for drawing all shapes on the screen.

(a) bounding box
(b) view port
(c) container
(d) none of the above


(a) bounding box

Computer Science & Information Technology

You might also like to view...

Which of the following is an example of an enterprise level firewall?

A) Sonic Wall B) Check Point 15000 series C) D-Link DFL-2560 D) Norton Firewall

Computer Science & Information Technology

A traditional approach to organizing files is to use a ________ structure that consists of folders and subfolders containing related files

A) non-hierarchal B) newsfeed C) hierarchal D) reading view

Computer Science & Information Technology

Performing a(n) ____________________ is the process of relating tables in a database based on a common field.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) __________ is a plan for conducting a meeting.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology