You can modify a symbol by placing it in ____________________ mode.

Fill in the blank(s) with the appropriate word(s).

symbol-editing

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT considered to be one of the three basic features of a program?

(A) input (B) processing (C) output (D) store

Computer Science & Information Technology

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A. virus B. Trojan C. worm D. shell

Computer Science & Information Technology