In the accompanying figure, item 2 points to the ____.

A. gradient tool
B. gradient picker
C. linear gradient
D. radial gradient

Answer: A

Computer Science & Information Technology

You might also like to view...

The __________ attack typically works by prematurely terminating a text string and appending a new command.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The MPDU exchange for distributing pairwise keys is known as the _______.

A. pseudorandom function B. cryptographic function C. nonce D. 4-way handshake

Computer Science & Information Technology