A video ____ occurs when the viewer's image lightens or darkens to or from a solid color.
A. fade
B. wipe
C. jump cut
D. close-up
Answer: A
You might also like to view...
If malware is installed and then run on your computer, your computer is said to have a(n):
A) security hole B) infection C) hive D) cookie
In Microsoft Access, the field used to uniquely identify a record is called a ________
A) field B) relationship C) record D) primary key
What specific algorithm does DFS replication use to replicate only the changes made in files?
A. proportional integral derivative B. Dijkstra's C. integer factorization D. remote differential compression
Which of the following is the BEST explanation of why control diversity is important in a defense-in-depth architecture?
A. Social engineering is used to bypass technical controls, so having diversity in controls minimizes the risk of demographic exploitation B. Hackers often impact the effectiveness of more than one control, so having multiple copies of individual controls provides redundancy C. Technical exploits to defeat controls are released almost every day; control diversity provides overlapping protection. D. Defense-in-depth relies on control diversity to provide multiple levels of network hierarchy that allow user domain segmentation