The item marked 1 in the accompanying figure is the icon for the ____ tool.

a. Move
b. Brush
c. Help
d. Shape

a. Move

Computer Science & Information Technology

You might also like to view...

________ is the real-time communication between two or more participants over the Internet.

a. Instant messaging b. tMessaging c. iMessaging d. Text messaging

Computer Science & Information Technology

What is the best safeguard against zero-day attacks?

A. Enable auditing. B. Regularly inspect all logs. C. Update the hardware and software as soon as new updates are released. D. Implement backups.

Computer Science & Information Technology