Match the following Draw Borders options to their actions:

I. Pen Style A. Changes the color of the line used to draw borders
II. Pen Weight B. Changes the thickness of the line used to draw borders
III. Pen Color C. Activates the Draw Table pointer used to draw table borders
IV. Draw Table D. Activates the Eraser pointer used to erase table borders
V. Eraser E. Changes the style of the line used to draw borders


E, B, A, C, D

Computer Science & Information Technology

You might also like to view...

Which C++ data type was designed to store Unicode characters?

a. char b. long c. wchar_t d. size_t

Computer Science & Information Technology

To correctly uninstall a local application on a Windows computer, it is essential to use a(n) ____.

A. uninstall utility B. local application C. uninstall application D. toolbar

Computer Science & Information Technology

Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Death of the perimeter" is a phrase used by network administrators to convey that ___.

A. creating a 100% secure network is possible B. creating a 100% secure network is impossible C. creating a 50% secure network is impossible D. creating a 50% secure network is possible

Computer Science & Information Technology