A _____________ is a component in which the user can enter data from a keyboard.

a) JButton b) JTextField
c) JLabel d) None of the above.

b) JTextField

Computer Science & Information Technology

You might also like to view...

Which of the following devices is used to extend the signal strength on a network segment?

A. Repeater B. NIC C. Transceiver D. Modem

Computer Science & Information Technology

The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

A. denial of service B. TCP SYN flood C. IP spoofing D. IP session hijacking

Computer Science & Information Technology