The application in the accompanying figure produces ____ wireframes.
A. high-resolution
B. low-fidelity
C. high-fidelity
D. indexed
Answer: C
Computer Science & Information Technology
You might also like to view...
Realistic ________ should be assigned to each step of the plan
A) backups B) stakeholders C) software D) time limits
Computer Science & Information Technology
Privacy is only important if you have something to hide.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology