The object in a(n) ____________________ tween must not be a symbol or a grouped object.

Fill in the blank(s) with the appropriate word(s).


shape

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 9-1Tara has just gotten her first computer connected to the Internet. She is very excited to start e-mailing her friends and family. Tara has obtained an e-mail address and is ready to begin sending messages to her family and friends. Her Aunt Jane has just sent her the very first e-mail and she is excited and wants to forward it to her mom. The easiest way for her to forward her message is to ____.

A. simply hit the Forward button and automatically the message will be opened for her to enter her mom's e-mail address B. just call her; e-mail takes too long C. open up a new blank e-mail, enter her aunt's e-mail address, and enter text in the subject line D. copy and paste her e-mail into a blank e-mail

Computer Science & Information Technology

Match the following steps to their processes:

I. Step 1 II. Step 2 III. Step 3 IV. Step 4 V. Step 5 A. Results of processing are stored in RAM B. Processed data is displayed on the monitor or printed C. The user types words, numbers, or commands into the computer D. The data, program, and commands are stored in RAM E. The processor takes data from RAM and processes it according to program instructions and/or user input

Computer Science & Information Technology

Swap images are another way to provide links to multiple related pages.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ force you to practice safe computing and thus prevent a lot of potential problems from affecting a system

A) Keychains B) AUPs C) EFSs D) BitLockers

Computer Science & Information Technology