Only controls capable of receiving some sort of input, such as _________________, may have the focus.

a. labels
b. text boxes
c. buttons
d. text boxes and buttons

d. text boxes and buttons

Computer Science & Information Technology

You might also like to view...

A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices?

A. WPA2 B. IPv6 C. SNMPv3 D. RIPv2

Computer Science & Information Technology

A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.

A. computer virus B. Trojan C. worm D. rootkit

Computer Science & Information Technology