To resize a bounding box proportionally ____.

a. SHIFT+drag a sizing handle
b. double-click
c. click a sizing handle
d. drag the boundary line


a. SHIFT+drag a sizing handle

Computer Science & Information Technology

You might also like to view...

It is in the ____________________ stage that the actual security functionality and properties are realized in some tangible form.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Windows XP performs file encryption using reparse points. The file is piped through the Encrypting File System filter, which does all of the encryption and decryption.Windows XP allows an application to ignore a reparse point and access the file directly.Does this compromise the security of encrypted data?Why or why not?

What will be an ideal response?

Computer Science & Information Technology

Suppose process A requests a new page from disk. However, the Zeroed Page List and the Free Page List are empty.One page frame originally belonging to process B is in the Standby Page List, and one page frame belonging to process A is in the Modified Page List.Which page frame will the system take and what will happen to that page frame?What are the pros and cons of taking the other page frame?

What will be an ideal response?

Computer Science & Information Technology

A USB port that can charge an attached device even when the computer is in a reduced state is known as a sleep-and-charge port

Indicate whether the statement is true or false

Computer Science & Information Technology