The tools you use to add text are called ____ Tools.

a. Additive
b. Editorial
c. Text
d. Type


D. Type

Computer Science & Information Technology

You might also like to view...

Which of the following does not generate GUI events?

a. Typing in a text field. b. Selecting an item from a menu. c. Viewing the text in a label. d. Moving the mouse.

Computer Science & Information Technology

A spin lock (see Bacon [2002]) is a boolean variable accessed via an atomic test-and-set instruction, which is used to obtain mutual exclusion. Would you use a spin lock to obtain mutual exclusion between threads on a single-processor computer?

What will be an ideal response?

Computer Science & Information Technology

The Math. __________ method returns the value of one number raised to power of another number.

a) power b) exponent c) pow d) exp

Computer Science & Information Technology

A corporate user will be using a smartphone to connect to the corporate network. What should the technician check first before configuring this connection?

A) Whether the device has tracking enabled B) Whether the device has unauthorized root access C) Whether the LoJack feature has been enabled D) Whether the TPM chip is installed and enabled

Computer Science & Information Technology