The __________ command is used to remove unwanted portions of a picture inserted in a document.

A. Cut
B. Compress Picture
C. Sizing
D. Crop


Answer: D

Computer Science & Information Technology

You might also like to view...

WEP is a stronger form of security than WPA

Indicate whether the statement is true or false

Computer Science & Information Technology

On a social network, ________ is the measure of how frequently and deeply users interact with one another on the site

Fill in the blank(s) with correct word

Computer Science & Information Technology

A catch block can catch how any types of Exception?

A. An unlimited number of Exception types. B. Only one can be caught. C. As many as can be matched. D. Two, after which the program ends.

Computer Science & Information Technology

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure?

A. The user is in a new OU and lacks log on permissions to the computer used. B. The user's account has been locked due to frequent failed password attempts. C. The computer is having issues communicating with the domain and is attempting to use cached credentials. D. The global catalog server has not replicated the user's account information to the rest of the domain.

Computer Science & Information Technology