To constrain the proportions of the selection so you don’t distort it, press the ____ key while you drag.
a. Ctrl
b. F3
c. Shift
d. Esc
C. Shift
You might also like to view...
Which is better for highly secure environments?Why?
What will be an ideal response?
Which of the following is true of security policies?
A. users will always comply with the policies B. once a policy is in affect, monitoring is not necessary C. policies should not be too restrictive D. users accept that security policies enhance their productivity
Choose the recommended use of tables on web pages
a. Use tables to format the layout of an entire page b. Use tables to organize tabular information c. Use tables to format hyperlinks d. Use tables instead of unordered lists
In an integer overflow attack, an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.
Answer the following statement true (T) or false (F)