When you ____ a selection, you surround it with a colored outline.

a. stroke
b. color
c. outline
d. none of the above


a. stroke

Computer Science & Information Technology

You might also like to view...

What is the value of choice after the following statements?

void getChoice(int& par_choice, in par_count); int choice, count=3; getChoice(choice, count); void getChoice(int& par_choice, in par_count) { if(par_count<0) par_choice =0; if(par_count = 0) par_choice=-1; else par_choice=99; return; } a. 3 b. 0 c. –1 d. 99

Computer Science & Information Technology

What does the following code snippet do?

``` . What does the following code snippet do? Circle myCircle = new Circle(50, 50, 25); TranslateTransition rtrans = new TranslateTransition(new Duration(5000), myCircle); ``` a. It creates a circle with center point (50, 25), radius = 50, and duration = 5000 seconds. b. It creates a circle with center point (50, 50), radius = 25, and duration = 5 seconds. c. It creates a circle with center point (25, 50), radius = 25, and duration = 5 seconds. d. It creates a circle with center point (50, 25), radius = 50, and duration = 50 seconds.

Computer Science & Information Technology

Outlook allows you to create the equivalent of paper notes using the ____________________ feature.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which attack attempts to steal information from victims by tricking them into visiting false or fake Web sites using a spoofed email communication that seems to originate from a legitimate source?

A. Botnet B. Pharming C. Phishing D. Hijacking

Computer Science & Information Technology