A ___________ provides a group of related commands for your applications.

a) separator bar
b) hot key
c) menu
d) margin indicator bar

c) menu

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about enterprise computing and metrics?

A) Metrics can be financial based, customer service based, or performance based. B) In enterprise computing, implementation of the system is not the end of the process. You have to evaluate whether your choices were the best or whether additional changes are needed. C) Performance metrics measure an organization's activities and performance. D) Successful metrics will provide feedback on five different criteria: time, cost, resources, quality, and actions regarding your product or project.

Computer Science & Information Technology

The system must control applets' accesses to sensitive system resources, such as the file system, the processor, the network, and internal state variables. But the term "the file system" is very broad, and useful applets usually need some persistent storage. Suggest controls that could be placed on access to the file system. Your answer has to be more specific than "allow all reads" or "disallow

all writes." Your answer should essentially differentiate between what is "security critical" and not or "harmful" and not. What will be an ideal response?

Computer Science & Information Technology