To zoom in using gestures, the user will ________ the screen

A) pinch
B) click
C) tap
D) unpinch

A

Computer Science & Information Technology

You might also like to view...

A rule that keeps related values synchronized

A) Referential integrity B) Data duplication C) Data redundancy

Computer Science & Information Technology

_________ is a tool used to automatically identify potentially vulnerable programs.

A. Slamming B. Sledding C. Fuzzing D. All the above

Computer Science & Information Technology