The ____ filters use many techniques including overlapping lines, dry media imitation, pencil, pen, and watercolor simulations.
a. Distort
b. Stylize
c. Sketch
d. Artistic
c. Sketch
Computer Science & Information Technology
You might also like to view...
Wired Equivalent Privacy (WEP) was the first security measure used with 802.11
Indicate whether the statement is true or false.
Computer Science & Information Technology
If a query includes columns from multiple tables that have the same name, the statement must precede those column names with _________.
a. their database names. b. their database names and a dot. c. their table names and a dot. d. their table names.
Computer Science & Information Technology