You can name layers, hide them so their contents do not appear on the Stage, and lock them so that they cannot be edited.

Answer the following statement true (T) or false (F)


True

Computer Science & Information Technology

You might also like to view...

Which of the following are examples of an illegal search, as defined by the law?

a. Going through the closets in someone's home without a warrant. b. Looking through a suspect's car at the time of an arrest. c. Searching the bedroom of a teenaged boy, with the consent of the parents. *d. Searching a suspect's briefcase after arresting her for DUI.

Computer Science & Information Technology

COGNITIVE ASSESSMENT What does each byte in the ASCII coding scheme represent?

A. multiple characters B. single character C. multiple bits D. single cluster

Computer Science & Information Technology

Power users may work with a high-end desktop, sometimes called a(n) ______, designed to handle intense calculations and sophisticated graphics.

A. workstation B. ultrabook C. supercomputer D. magnapower

Computer Science & Information Technology

Which of the following is not an escape sequence?

a) \a b) \b c) \c d) none of these

Computer Science & Information Technology