The FontDialog control allows the user to determine the __________.

a. Font
b. Font Style
c. Font Size
d. all of the above

d. all of the above

Computer Science & Information Technology

You might also like to view...

An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

A. DDoS B. Viruses C. Worms D. Man-in-the-middle

Computer Science & Information Technology

A(n) ________ can be used in single-user contiguous memory allocation systems to prevent programs from damaging the operating system’s memory.

a) lock b) protection bit c) boundary register d) semaphore

Computer Science & Information Technology