Rather than trying to create a complex stacking order of layers or adjusting an instance's Alpha setting to control what appears on the stage at any given moment, use ____________________ to control visibility.

Fill in the blank(s) with the appropriate word(s).


masks

Computer Science & Information Technology

You might also like to view...

Using __________, an MS-DOS user can change or override the standard input and/or output devices.

a. pipes b. wild card characters c. redirection parameters d. filters

Computer Science & Information Technology

The two background elements of an Excel chart are:

A) plot area and chart area. B) fill and line. C) legend and axis. D) error bars and gridlines.

Computer Science & Information Technology

The element of the LISTEN strategy that enables you to indicate your understanding by repeating, or paraphrasing, or reflecting is _______

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are the three primary goals of network security?

A) Integrity, confidentiality, availability B) Reliability, classified, accessibility C) Integrated, restricted, obtainable D) Veracity, dependability, unrestricted

Computer Science & Information Technology