The animated series of dashed lines or curves created by one of the Marquee Tools shown in the accompanying figure is called a(n) ____.

a. composition
b. marquee
c. index
d. mask


B. marquee

Computer Science & Information Technology

You might also like to view...

When a thread that owns a lock invokes method release, the lock enters the________state.

a) unlocked. b) running. c) ready. d) None of the above.

Computer Science & Information Technology

The Header of the third section can only be linked to the First Page Header

Indicate whether the statement is true or false

Computer Science & Information Technology

Originally, the ____ specification was used to standardize Ethernet communication over fiber.

A. FIROL B. FIOS C. FLIOR D. FOIRL

Computer Science & Information Technology

When using the Governing for Enterprise Security (GES) program, an Enterprise Security Program (ESP) should be structured so that governance activities are driven by the organization's executive management, and so that it selects key stakeholders as well as the ____________.

A. Board Risk Committee B. Board Finance Committee C. Board Ethics Committee D. Chairman of the Board

Computer Science & Information Technology