Holding the ____ key as you drag constrains the shape to a perfect circle.

a. CTRL
b. F8
c. ESC
d. SHIFT


d. SHIFT

Computer Science & Information Technology

You might also like to view...

In one approach to anomaly detection, objects are represented as points in a multidimensional space, and the points are grouped into successive shells, where each shell represents a layer around a grouping of points, such as a convex hull. An object is an anomaly if it lies in one of the outer shells.

(a) To which of the definitions of an anomaly in Section 10.1.2 is this defi- nition most closely related? (b) Name two problems with this definition of an anomaly.

Computer Science & Information Technology

Give an example of a common use of a dialog box.

What will be an ideal response?

Computer Science & Information Technology

Static variables are often used:

a. in arithmetic expressions b. to communicate between objects c. within looping structures d. all of the above

Computer Science & Information Technology

A CD containing back issues of TIME magazine would be an example of a free-form spreadsheet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology