Choose the graphic format that can be made transparent

a. jpg
b. gif
c. bmp
d. tif


b

Computer Science & Information Technology

You might also like to view...

Why is inheritance a form of software reuse?

What will be an ideal response?

Computer Science & Information Technology

Identify two examples of natural and surrogate keys in the property sales DM and discuss the benefits associated with using surrogate keys in general.

What will be an ideal response?

Computer Science & Information Technology

What type of information can be gathered from encrypted network traffic?

A. Information transmitted during an SSL session B. No information can be gathered C. The sender’s IP address, receiver’s IP address, the DNS request to resolve the host name and the port numbers used D. Private encryption keys

Computer Science & Information Technology

If you want to change something posted on a wiki, you typically select an Edit button or link and then make the change so other users can see it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology