The gem lapis was ground into what color pigment?
a. red
b. blue
c. violet
d. gold
b. blue
Computer Science & Information Technology
You might also like to view...
The Delete All Comments in Document in Word option is found on the REVIEW tab
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following attacks occur when attackers tamper with hardware or software prior to installation?
A. Distribution Attacks B. Close-in Attacks C. Passive Attacks D. Insider Attacks
Computer Science & Information Technology