You can modify a symbol by placing it in ____________________ mode.
Fill in the blank(s) with the appropriate word(s).
symbol-editing
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT considered to be one of the three basic features of a program?
(A) input (B) processing (C) output (D) store
Computer Science & Information Technology
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
A. virus B. Trojan C. worm D. shell
Computer Science & Information Technology