Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
(d) Which tool is used for drawing freehand shapes or paths?(i) Rectangle Tool(ii) Pencil Tool(iii) Line Tool
Home
Education
(d) Which tool is used for drawing freehand...
asked
Dec 1, 2021
in
Education
by
JackTerrance
(d) Which tool is used for drawing freehand shapes or paths? (i) Rectangle Tool (ii) Pencil Tool (iii) Line Tool (iv) Ovey Tool Select the correct answer from above options
computer-science-interview-questions
computer-science-questions
1
Answer
0
votes
answered
Dec 1, 2021
by
JackTerrance
Best answer
Answer: (ii) Pencil Tool Explanation: pencil tool is used to draw free hand drawing in computer.
Related questions
0
votes
Q: (a) Which tool is used for creating preset drawing effects?(i) Deco Tool(ii) Pencil Tool(iii) Fill Tool
(a) Which tool is used for creating preset drawing effects? (i) Deco Tool (ii) Pencil Tool (iii) Fill Tool (iv) Brush Tool Select the correct answer from above options...
asked
Nov 30, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (e) Which of the following is the mode for Pencil tool?(i) Smooth(ii) Straighten(iii) Both (a) and (b)
(e) Which of the following is the mode for Pencil tool? (i) Smooth (ii) Straighten (iii) Both (a) and (b) (iv) Curve Select the correct answer from above options...
asked
Dec 1, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (b) Which tool is used to select irregular shapes?(i) Selection tool(ii) Lasoo Tool(iii) Pen Tool
(b) Which tool is used to select irregular shapes? (i) Selection tool (ii) Lasoo Tool (iii) Pen Tool (iv) Pencil Tool Select the correct answer from above options...
asked
Dec 1, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: ______tool is used to draw a circle. (I). filter. (ii). ellipse. (iii). rectangle. gūys jaldi answer do exam chl rha hai! please!
______tool is used to draw a circle. (I). filter. (ii). ellipse. (iii). rectangle. gūys jaldi answer do exam chl rha hai! please! Select the correct answer from above options...
asked
Dec 14, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (d) Which of the following is used to turn off the word wrapping?(i) valign(ii) wrap(iii) align(iv) nowrapg
(d) Which of the following is used to turn off the word wrapping? (i) valign (ii) wrap (iii) align (iv) nowrap g 00 Select the correct answer from above options...
asked
Nov 29, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (C)Which tool is used to navigate the stage?(i) Zoom Tool(ii) Hand Tool(iii) Select Tool
(C) Which tool is used to navigate the stage? (i) Zoom Tool (ii) Hand Tool (iii) Select Tool (iv) Text Tool Select the correct answer from above options...
asked
Nov 30, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (d) Which animation changes a shape into another over the period of time?(i) Shape Tween(ii) Motion Tween(iii) Shape Motion
(d) Which animation changes a shape into another over the period of time? (i) Shape Tween (ii) Motion Tween ... (iv) Tween Motion Select the correct answer from above options...
asked
Dec 1, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (b) Which tool allows you to remove the drawings and text written on the stage?(i) Pen Tool(ii) Eraser Tool(iii) Rubber Tool
(b) Which tool allows you to remove the drawings and text written on the stage? (i) Pen Tool (ii) Eraser Tool ... Tool (iv) Lasso Tool Select the correct answer from above options...
asked
Nov 30, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Which of the following refers to a technique used to gain unauthorized access to a computer system or network?(i) cracking(ii) spamming(iii) phishing
Which of the following refers to a technique used to gain unauthorized access to a computer system or network? (i ... (iv) hacking Select the correct answer from above options...
asked
Dec 24, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: $(a) Which of the following is used to change the color of hyperlink from blue to anyother color?(i) Link(iii) IFRAME00(ii) <H2>(iv) none of these
$ (a) Which of the following is used to change the color of hyperlink from blue to any other color? (i) Link ... (iv) none of these 00 Select the correct answer from above options...
asked
Nov 30, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: numbers.4. (a) When running a particular program with Nmemory accesses, a computer with a cacheand paged virtual memory generates atotal of M cache misses and F page faults.Ti is the time for a cache hit; T2 is thetime for a main memory hit and T3 is thetime to load a page into main memoryfrom the disk.(i) What is the cache hit ratio ?(ii) What is the main memory hit ratio ?That is, what percentage of mainmemory accesses do not generate apage fault?(iii) What is the overall effective accessOtime for the system ?
numbers. 4. (a) When running a particular program with N memory accesses, a computer with a cache and paged ... the system ? cribe Select the correct answer from above options...
asked
Dec 6, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: numbers.4. (a) When running a particular program with Nmemory accesses, a computer with a cacheand paged virtual memory generates atotal of M cache misses and F page faults.Ti is the time for a cache hit; T2 is thetime for a main memory hit and T3 is thetime to load a page into main memoryfrom the disk.(i) What is the cache hit ratio ?(ii) What is the main memory hit ratio ?That is, what percentage of mainmemory accesses do not generate apage fault?(iii) What is the overall effective accessOtime for the system ?
numbers. 4. (a) When running a particular program with N memory accesses, a computer with a cache and paged ... the system ? cribe Select the correct answer from above options...
asked
Nov 26, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: ii. Using LOGO Programming draw the following shapes.a) Square of 150 units/cm
ii. Using LOGO Programming draw the following shapes. a) Square of 150 units/cm b) Equilateral Triangle of 100 units/cm. Select the correct answer from above options...
asked
Dec 12, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (c) Which of the following specifies that the table has no border?(i) border = “2”(ii) border = “1”(iii) border = “none”(iv) border=”0″
(c) Which of the following specifies that the table has no border? (i) border = 2 (ii) border = 1 (iii ... none (iv) border= 0″ 00 Select the correct answer from above options...
asked
Nov 29, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: WHICH TYPE OF CHART IS USED FOR REPRESENTING HUGE AMOUNT OF DATA.(i) BAR(ii) LINE
WHICH TYPE OF CHART IS USED FOR REPRESENTING HUGE AMOUNT OF DATA. (i) BAR (ii) LINE (iii) SCATTER Select the correct answer from above options...
asked
Dec 28, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
...