The Eraser Tool options bar displays a(n) ____ box in which you can specify the depth of the erasure.

a. Impact
b. Opacity
c. Depth
d. Mode


b. Opacity

Computer Science & Information Technology

You might also like to view...

Which of the following classes of attacks can be used to find the Remote Procedure Call service on a system when using SATAN?

A) Light B) Normal C) Medium D) Heavy

Computer Science & Information Technology

Suppose you define a Java class as follows:

``` public class Test { } ``` In order to compile this program, the source code should be stored in a file named a. Test.class b. Test.doc c. Test.txt d. Test.java e. Any name with extension .java

Computer Science & Information Technology

Identifiers may begin with a $.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A lending officer who works for a small regional credit union is going over a client's records when she stumbles across some transactions that strongly suggest this person is involved in money laundering operations. What is her option under the Right to Financial Privacy Act?

a. There's not much she can do. This person's records are strictly confidential. b. Paragraph C of the act allows her to report suspicious activity to the appropriate law enforcement agency. c. She may file a report with the agency, but she must also notify the customer that she is doing so. d. She must submit a report to her state's Attorney General's Office and wait for them to take the appropriate action.

Computer Science & Information Technology