Only controls capable of receiving some sort of input, such as _________________, may have the focus.
a. labels
b. text boxes
c. buttons
d. text boxes and buttons
d. text boxes and buttons
Computer Science & Information Technology
You might also like to view...
A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices?
A. WPA2 B. IPv6 C. SNMPv3 D. RIPv2
Computer Science & Information Technology
A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.
A. computer virus B. Trojan C. worm D. rootkit
Computer Science & Information Technology