The ____ can be used to move around in a photo if the photo has been magnified to be larger than the document window.
a. Rulers
b. Zoominator
c. Hand Tool
d. Guides
c. Hand Tool
Computer Science & Information Technology
You might also like to view...
Of the following types of mobile phone technology, which are most often seen in the field?
A. Code Division Multiple Access B. Integrated Digital Enhanced Network C. Universal Mobile Telecommunications System D. Time Division Multiple Access
Computer Science & Information Technology
It's best to avoid starting a question with "why."
Indicate whether the statement is true or false
Computer Science & Information Technology
____ is the policy of allowing only one process to have access to a dedicated resource.
A. No preemption B. Circular wait C. Resource holding D. Mutual exclusion
Computer Science & Information Technology
Which protocol is represented by the packet capture below? UDP 0.0.0.0:68 -> 255.255.255.255:67
A. DHCP B. FTP C. SNMP D. DNS
Computer Science & Information Technology