When you click the Shapes button and start to drag the mouse pointer to create the position of the shape, the mouse arrow changes to a:

A) cross-hair pointer. B) plus sign.
C) double-headed arrow. D) four-headed arrow.


A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Some Internet service providers (ISPs) are deploying proprietary Content Delivery Network (CDN) cache nodes in their networks to improve delivery of video and other high-bandwidth services to their customers. 2. It is likely that over time, SDN and NFV will tightly inter operate to provide a broad, unified software-based networking approach to abstract and pro grammatically control network equipment and network-based resources. 3. Media Access Control (MAC) frame is the basic unit of transmission on Ethernet and Wi-Fi LANs. 4. A VLAN is a broadcast domain consisting of a group of end stations that are not constrained by their physical location and can communicate as if they were on a common LAN. 5. IEEE 802 is a committee of the Institute of Electrical and Electronics Engineers responsible for developing standards for local and metropolitan area networks.

Computer Science & Information Technology

An e-mail ____________________ is divided into fields that contain the sender's e-mail address, the recipient's address, a one-line summary of the message, and the date and time the message was written.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A proprietary model called the __________ represents the position of a product during its life cycle of publicity.

A. Gartner Hype Cycle B. Rogers' bell curve C. product life cycle D. disruptive technology

Computer Science & Information Technology

Examples of restricted________ include .gov, and .edu.

a. domains b. protocols c. TLDs (top-level domains) d. websites

Computer Science & Information Technology