To zoom in using gestures, the user will ________ the screen
A) pinch
B) click
C) tap
D) unpinch
A
Computer Science & Information Technology
You might also like to view...
A rule that keeps related values synchronized
A) Referential integrity B) Data duplication C) Data redundancy
Computer Science & Information Technology
_________ is a tool used to automatically identify potentially vulnerable programs.
A. Slamming B. Sledding C. Fuzzing D. All the above
Computer Science & Information Technology