PowerPoint displays the ____________________ when two shapes are aligned precisely.

Fill in the blank(s) with the appropriate word(s).


Smart Guide

Computer Science & Information Technology

You might also like to view...

Describe how using aliases makes it easier to quickly access frequently used files.

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements regarding key performance and risk indicators is NOT true?

A. Key performance indicators allow organizations to determine whether levels of performance are below or above established norms. B. Key risk indicators allow organizations to identify whether certain risks are more or less likely to occur. C. Organizations will have the same risks and how they implement the practices in risk frameworks will remain the same. D. NIST's Framework for Improving Critical Infrastructure Cybersecurity is aimed at reducing and better managing cybersecurity risks and is not a one-size-fits-all approach to managing cybersecurity.

Computer Science & Information Technology

On a personal computer with Windows Vista Premium, the ipconfig command is entered in the ____________________ window.

What will be an ideal response?

Computer Science & Information Technology

A form is a ____________.

a. window in which other controls may be placed b. box that displays text that cannot be changed by the user c. piece of data that determines a characteristic of a control d. control that displays a graphic image

Computer Science & Information Technology