The ____ can be used to move around in a photo if the photo has been magnified to be larger than the document window.

a. Rulers
b. Zoominator
c. Hand Tool
d. Guides


c. Hand Tool

Computer Science & Information Technology

You might also like to view...

Of the following types of mobile phone technology, which are most often seen in the field?

A. Code Division Multiple Access B. Integrated Digital Enhanced Network C. Universal Mobile Telecommunications System D. Time Division Multiple Access

Computer Science & Information Technology

It's best to avoid starting a question with "why."

Indicate whether the statement is true or false

Computer Science & Information Technology

____ is the policy of allowing only one process to have access to a dedicated resource.

A. No preemption B. Circular wait C. Resource holding D. Mutual exclusion

Computer Science & Information Technology

Which protocol is represented by the packet capture below? UDP 0.0.0.0:68 -> 255.255.255.255:67

A. DHCP B. FTP C. SNMP D. DNS

Computer Science & Information Technology