You can think of a soft brush as having a ____ edge.

A. feathered
B. broken
C. filed
D. drafting

Answer: A

Computer Science & Information Technology

You might also like to view...

It is best to use printed notes and rehearse before creating a narration recording

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following network access security methods involves the analysis of a physical hardware addresses?

A. IP filtering B. L2TP C. MAC filtering D. RAS

Computer Science & Information Technology