To save the position and orientation of an object, Alice provides special invisible objects called ____.

A. shots
B. attributes
C. markers
D. clips


Answer: C

Computer Science & Information Technology

You might also like to view...

If you run a query that shows all customers who have spent more than $500 over the past six months and limit the results to those who were born in the current month, this would be an example of ________

A) data B) information C) a complex query D) knowledge

Computer Science & Information Technology

Which of the following attacks requires the hacker to have the plaintext and the ciphertext of one or more messages?

a. Known plaintext attack b. Ciphertext-only attack c. Chosen plaintext attack d. Chosen ciphertext attack

Computer Science & Information Technology

An alternative approach to the key-exchange problem is to have a central authority, called a_______.

a) key-search area (KSA). b) key-distribution center (KDC). c) key-terminal center (KTC). d) None of the above.

Computer Science & Information Technology

You would click on a(n) ________ to move in small increments within a window

A) scroll arrow B) scroll box C) scroll bar D) new arrow

Computer Science & Information Technology