Shapes with ____ fills can take an exceptionally long time to load.

A. color
B. gradient
C. vector
D. Both a and c


Answer: B

Computer Science & Information Technology

You might also like to view...

What practice requires an organization to identify potential attackers and then use knowledge management techniques to document the risks of greatest concern?

A. Security features and design B. Attack models C. Compliance and policy D. Architecture analysis

Computer Science & Information Technology

If you press and hold the ALT key while dragging, you _________________________ or move only a copy of the selected area, effectively copying and pasting the selection.

What will be an ideal response?

Computer Science & Information Technology

Match the following terms to their meanings:

I. Any software that intentionally does harm to computers A. dual core II. Data handling capacity of a PC dealing with data group size B. malware III. Program that records your keystrokes or looks at your hard drive C. architecture IV. A benchmark that measures overall CPU performance D. spyware V. Processor type that has two separate CPU units E. P-rating

Computer Science & Information Technology

A user wants to connect seven PCs together for a game night. Which of the following should the user install to help with this task?

A. Media convertor B. Switch C. Firewall D. Bridge

Computer Science & Information Technology