Shapes drawn in ____ mode can be used to destroy the underlying pixels.

a. merge
b. destructive
c. object drawing
d. selection


a. merge

Computer Science & Information Technology

You might also like to view...

The ____________________ function joins two or more text strings into one.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ is a threat-rating system developed by Microsoft and is used to assess risk with great granularity.

A. Qualitative assessment B. DREAD C. Quantitative assessment D. Risk-scaling

Computer Science & Information Technology

Which of the following would be used to correct a ghost image on a laser printer?

A. Replace the drum B. Replace the fuser C. Clean the printhead D. Replace the cartridges

Computer Science & Information Technology

The binary search

a. Starts with the first element of an array and searches each element until the correct one is found. b. Starts with the middle element and tests to see if the number is larger or smaller that that element and continues in the same manner until the element is found. c. Does not have to have the array in order. d. Is another name for a sequential search.

Computer Science & Information Technology