The ____ filters use many techniques including overlapping lines, dry media imitation, pencil, pen, and watercolor simulations.

a. Distort
b. Stylize
c. Sketch
d. Artistic

c. Sketch

Computer Science & Information Technology

You might also like to view...

Wired Equivalent Privacy (WEP) was the first security measure used with 802.11

Indicate whether the statement is true or false.

Computer Science & Information Technology

If a query includes columns from multiple tables that have the same name, the statement must precede those column names with _________.

a. their database names. b. their database names and a dot. c. their table names and a dot. d. their table names.

Computer Science & Information Technology