In a keyboard event handler, the ________ argument references the object that raised the event.
a) sender
b) source
c) control
d) eventSender
e) eventSource
a) sender
You might also like to view...
Which of the following statements about peer-to-peer applications is false?
a) Centralized P2P applications follow the client/server relationship. b) In pure P2P applications, it is difficult to determine who is on the network. c) Centralized P2P applications simply management tasks, such as monitoring user access. d) All file-sharing applications are pure P2P applications.
Adobe Dreamweaver and Microsoft Expression Web are expensive professional programs used to create ________ pages
Fill in the blank(s) with correct word
When you ____ an image, you import a copy of the image file that is still linked to the original.
a. position b. link c. place d. transform
This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.
A. authentication B. hash C. encryption D. nonrepudiation