The gem lapis was ground into what color pigment?

a. red
b. blue
c. violet
d. gold

b. blue

Computer Science & Information Technology

You might also like to view...

The Delete All Comments in Document in Word option is found on the REVIEW tab

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following attacks occur when attackers tamper with hardware or software prior to installation?

A. Distribution Attacks B. Close-in Attacks C. Passive Attacks D. Insider Attacks

Computer Science & Information Technology