A(n) ____ gradient style shades from the starting point to the ending point in a circular pattern.

a. Normal
b. Radial
c. Angle
d. Circular


b. Radial

Computer Science & Information Technology

You might also like to view...

Which of the following belongs to a specific object?

a. Local variable b. Parameter variable c. Class-Level variable d. World-Level variable e. None of these

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) The security of modern cryptosystems lies in the secrecy of the algorithm. 2) Increasing the security of a network often decreases its functionality and efficiency. 3) Firewalls are the single most effective way to add security to a small computer network. 4) Kerberos is an authentication protocol that is used over TCP/IP networks. 5) SSL can connect a network of computers over the Internet.

Computer Science & Information Technology

When you click on a chart, the three Chart Tools contextual tabs display: a Design tab, a Layout tab, and a ________ tab

A) Edit B) Style C) Insert D) Format

Computer Science & Information Technology

How many tracks does the Track Matte effect need? Which track does it get applied to?

What will be an ideal response?

Computer Science & Information Technology