Case Based Critical ThinkingKatie wants to be sure that her designers are using InDesign as effectively as possible. Though she doesn't want them to rush through their jobs, she does want them to utilize the software to its fullest effect.

Katie's team is working on a layout for a page in which animal images are on the bottom layer on the Layers panel. On the top layer are images of trees, and the layout calls for all the animals to be hiding behind the trees. The client would like only the horse image to appear in front of the trees. The designer selects the horse image then applies the Bring To Front command, and is then confused because the image is still behind the trees. This designer is confused by which component of working with layered artwork?

A. The Bring To Front command vs the Send To Back command
B. The Stacking Order vs the order of layers on the Layers panel
C. Working with locked layers
D. Working with hidden layers


Answer: B

Computer Science & Information Technology

You might also like to view...

When you add a new slide following the title slide, PowerPoint uses the ____ slide layout for the new slide.

A. Title Only B. Title and Content C. Comparison D. Blank

Computer Science & Information Technology

_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content.

A. ?Cybersailing B. ?Cyberstalking C. ?Cybersquatting D. ?Cyberbonding

Computer Science & Information Technology

The ____________________ property measures the height of the entire line of text, including the text.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In an effort to test the effectiveness of an organization's security awareness training, a penetrator tester crafted an email and sent it to all of the employees to see how many of them clicked on the enclosed links. Which of the following is being tested?

A. How many employees are susceptible to a SPAM attack B. How many employees are susceptible to a cross-site scripting attack C. How many employees are susceptible to a phishing attack D. How many employees are susceptible to a vishing attack

Computer Science & Information Technology