When a picture is chosen as a Shape Fill option, the picture ________

A) is inserted after the shape
B) fills the shape with the picture without altering the shape size
C) is inserted before the shape
D) replaces the shape


B

Computer Science & Information Technology

You might also like to view...

The ________ function can help businesses determine the future return on an investment

A) FV B) NPV C) PV D) PMT

Computer Science & Information Technology

Which of the following tools enables the technician to trace cables in multiple pair wiring?

A. Cable tester B. Multimeter C. Butt set D. Toner probe

Computer Science & Information Technology

When filtering ____ connections, static packet filters allow some control on the direction of the connection.

A. UDP B. TCP C. FTP D. ICMP

Computer Science & Information Technology

Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.

1. Per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access) 2. Per-object access control list (that is, one list for each object tells all the subjects who have access to that object) 3. Access control matrix 4. Capability

Computer Science & Information Technology