In a keyboard event handler, the ________ argument references the object that raised the event.

a) sender
b) source
c) control
d) eventSender
e) eventSource


a) sender

Computer Science & Information Technology

You might also like to view...

Which of the following statements about peer-to-peer applications is false?

a) Centralized P2P applications follow the client/server relationship. b) In pure P2P applications, it is difficult to determine who is on the network. c) Centralized P2P applications simply management tasks, such as monitoring user access. d) All file-sharing applications are pure P2P applications.

Computer Science & Information Technology

Adobe Dreamweaver and Microsoft Expression Web are expensive professional programs used to create ________ pages

Fill in the blank(s) with correct word

Computer Science & Information Technology

When you ____ an image, you import a copy of the image file that is still linked to the original.

a. position b. link c. place d. transform

Computer Science & Information Technology

This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.

A. authentication B. hash C. encryption D. nonrepudiation

Computer Science & Information Technology