A setting that refers to the order in which the focus moves from field to field

a. Auto-increment order
b. Tab order
c. Focus order

B

Computer Science & Information Technology

You might also like to view...

____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.?

A. ?List linking B. ?Phishing C. ?E-mail spoofing D. ?419

Computer Science & Information Technology

An instance of _________ describes the errors caused by your program and external circumstances. These errors can be caught and handled by your program.

a. RuntimeException b. Exception c. Error d. Throwable e. NumberFormatException

Computer Science & Information Technology