FIGURE 5-2____ detection was used in Figure 5-2 above to remove the full colors of the original image to uncover the outlines of the objects represented in the image.

A. Line
B. Edge
C. Luminance
D. Color


Answer: B

Computer Science & Information Technology

You might also like to view...

802.1X utilizes EAP.  Which is a correct statement about EAP?

A. EAP is one of the strongest encryption protocols B. EAP is used by WEP2 to resolve some of WEP2's weaknesses C. EAP uses two types of packets to perform authentication D. EAP is a framework for transporting authentication protocol

Computer Science & Information Technology

Since Windows Vista uses partial matching by default when you execute a search, you can not search by whole words only

Indicate whether the statement is true or false

Computer Science & Information Technology

On the ribbon, a ________ refers to a set of related commands for a specific task

Fill in the blank(s) with correct word

Computer Science & Information Technology

If a Sub procedure has more than one argument, the variables are passed in the same order in which they appear in the procedure call statement.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology