The FontDialog control allows the user to determine the __________.
a. Font
b. Font Style
c. Font Size
d. all of the above
d. all of the above
Computer Science & Information Technology
You might also like to view...
An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?
A. DDoS B. Viruses C. Worms D. Man-in-the-middle
Computer Science & Information Technology
A(n) ________ can be used in single-user contiguous memory allocation systems to prevent programs from damaging the operating system’s memory.
a) lock b) protection bit c) boundary register d) semaphore
Computer Science & Information Technology