You can transform an object or objects on a layer using one of 11 transform commands on the ____________________ menu.

Fill in the blank(s) with the appropriate word(s).


Edit

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) An indirect method of deadlock prevention is to prevent the occurrence of a circular wait. 2) If access to a resource requires mutual exclusion then mutual exclusion must be supported by the OS 3) The OS may preempt the second process and require it to release its resources if a process requests a resource that is currently held by another process. 4) Deadlock avoidance requires knowledge of future process resource requests. 5) An unsafe state is one in which there is at least one sequence of resource allocations to processes that does not result in a deadlock.

Computer Science & Information Technology

Computers process data under the control of sets of instructions called ___________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can change Access options to automatically open a form

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following does the "A" in "CIA" stand for when relating to IT security? (Select the best answer.)

A. Accountability B. Assessment C. Availability D. Auditing

Computer Science & Information Technology