The mouse operation of ____ is used to draw pictures.

A. ?free-spinning the wheel
B. ?pressing the wheel
C. ?rotating the wheel
D. dragging


Answer: D

Computer Science & Information Technology

You might also like to view...

A macro troubleshooting technique that runs a macro one action at a time, pausing between actions is known as ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can ________ a video to make it shorter

A) trim B) clip C) crop D) splice

Computer Science & Information Technology

A ____ tracks information using objects, counters, and instances.

A. performance counter set B. data collector set C. performance counter report D. data performance set

Computer Science & Information Technology

Which of the following is NOT a goal that needs to be identified before performing a vulnerability assessment?

A. the cost of the assessment B. the relative value of the information that could be discovered through a compromise C. the specific threats that are applicable to the component being assessed D. Available mitigation strategies that could be deployed

Computer Science & Information Technology