The figure above represents the options for the _____ tool.

A. Lasso
B. Elliptical Marquee
C. Polygonal Lasso
D. Magnetic Lasso


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following tools can be used to deploy operating systems to the point where you do not need to physically touch the computer?

A. Windows System Image Manager (Windows SIM) B. System Center Configuration Manager C. Deployment Imaging Servicing and Management (DISM) D. Windows Imaging and Configuration Designer (Windows ICD)

Computer Science & Information Technology

A(n) ________ contains an expression that generates a calculated result

A) rectangle control B) unbound control C) calculated control D) bound control

Computer Science & Information Technology

Converting a range of cells in a worksheet to an Excel table is done primarily to have a larger selection of styles

Indicate whether the statement is true or false.

Computer Science & Information Technology

A Trojan horse is a program that hides itself by deleting a system file and taking on the system file's name.

True False

Computer Science & Information Technology