____ are objects that can be manipulated with primitive methods, like move, turn, and roll, as well as with user-created methods.

A. Breakpoints
B. Billboards
C. Dialog balloons
D. Thought bubbles


Answer: B

Computer Science & Information Technology

You might also like to view...

When you use easing, you may have to experiment with different values to get the effect you want.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

IPv6's address space makes hackers' address-scanning programs _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Client/server architecture does involve performance issues that relate to the separation of server-based data and networked clients that must access the data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Social networking users are prone to _____.

a. cyberethics b. advanced persistent threat c. identity theft d. cyberterrorism

Computer Science & Information Technology