In order to use modifier keys you should:
a) use the ModifierKey event.
b) use the KeyData property.
c) use the ModifierKeyHandler.
d) modifier keys have to be dealt with manually.
b) use the KeyData property.
Computer Science & Information Technology
You might also like to view...
Which of the following is best described as when certificate keys are held in the case that third parties such as government or other organizations need access to encrypted communications?
A. Key escrow B. CRL C. CA D. RA
Computer Science & Information Technology
A group whose membership is controlled dynamically by Windows and doesn't appear as an object in Active Directory Users and Computers or ADAC; can be assigned permissions by adding it to resources' DACLs
What will be an ideal response?
Computer Science & Information Technology