Case B-1Will has been practicing creating basic shapes and is almost ready to work on his first illustration of a flower. Will wants to create an ellipse that is 5 inches wide and 3 inches tall. He should ____.

A. show the rulers, then drag the Ellipse tool and use the rulers for guidance as he draws the shape
B. create an ellipse of any size, then change the width and height of the ellipse to 5 and 3 on the Transform panel
C. show the grid lines, then drag the Ellipse tool and use the grid lines for guidance as he draws the shape.
D. draw the ellipse and use the [shift] key to set the size.


Answer: B

Computer Science & Information Technology

You might also like to view...

All of the following are true about standard modules except __________.

a. A module is a file that contains code such as variable declarations and procedures b. A public variable declared in a standard module may be referenced by methods located anywhere in the application. c. Standard modules may contain event handlers d. Standard modules are not associated with a particular form

Computer Science & Information Technology

Which type of attack refers to the use of human interaction to gain access to a system or to do damage.

A. social engineering B. psychological warfare C. inside attack D. spoofing

Computer Science & Information Technology

Bill leaves Chicago at 4:00 P.M. traveling east on Interstate 90 toward Toledo, 200 miles away. Jim leaves Toledo at the same time, traveling west toward Chicago on the same road. They pass each other at 6:00 P.M. If Bill travels at 55 miles per hour, how fast is Jim traveling?

Solve the following time-rate-distance problems using the IPO method. Ignore time zones.

Computer Science & Information Technology

Which of the following phases is often considered the longest and most expensive phase of the systems development life cycle?

A. investigation B. logical design C. implementation D. maintenance and change

Computer Science & Information Technology