The small squares and circles around a selected graphic, as shown in the accompanying figure, are called ____ handles.

A. sizing
B. shape
C. base
D. dimension

Answer: A

Computer Science & Information Technology

You might also like to view...

What communications technique can a hacker use to identity the product that is running on an open port facing the Internet?

a. Credentialed penetration test b. Banner grabbing c. Intrusive vulnerability scan d. Port scanning

Computer Science & Information Technology

Create a bird's-eye view of an interface you wish to investigate. Focus on detecting inconsistencies and spotting unusual patterns.

What will be an ideal response?

Computer Science & Information Technology