Case Based Critical ThinkingMark's design team has taken on a number of projects that involve display text and gradients. Mark considers typography to be a fine art, and he thinks that gradients are often a very effective component of good Illustrator design, so he is excited to take this opportunity to put his team through typography and gradient boot camp.

One project that the team is working on involves display type that will appear very large on a billboard. Mark tells the team that, of all the ways to modify text in Illustrator, ____ is the most essential for perfecting large display type.

A. horizontal/vertical scaling
B. baseline shift
C. tracking
D. kerning


Answer: D

Computer Science & Information Technology

You might also like to view...

With an overlay system, each geographic region has its own area code.

a. True b. False

Computer Science & Information Technology

What can an attacker use that gives them access to a computer program or service that circumvents normal security protections?

A. adware B. backdoor C. bot herder D. botnet

Computer Science & Information Technology

(Unpacking Characters from Unsigned Integers) Using the right-shift operator, the bitwise AND operator and a mask, write function unpackCharacters that takes the unsigned integer from Exercise 22.11 and unpacks it into two characters. To unpack two characters from an unsigned two- byte integer, combine the unsigned integer with the mask 65280 (11111111 00000000) and right- shift the result 8

bits. Assign the resulting value to a char variable. Then, combine the unsigned in- teger with the mask 255 (00000000 11111111). Assign the result to another char variable. The pro- gram should print the unsigned integer in bits before it’s unpacked, then print the characters in bits to confirm that they were unpacked correctly. What will be an ideal response?

Computer Science & Information Technology

The Internet Explorer 11 feature that you can use to browse the web without storing data about your browsing session is called ________

A) Windows Defender B) Protected mode C) SmartScreen Filter D) InPrivate Browsing

Computer Science & Information Technology