Create ___________ when a user should be able to select only a single menu item at a time.

a) submenus
b) JRadioButtonMenuItems
c) a JColorChooser
d) JCheckBoxMenuItems


b) JRadioButtonMenuItems

Computer Science & Information Technology

You might also like to view...

What is linear probing?

a. It is a form of open addressing. When the hash function causes a collision, the probing searches for the closest following free location and inserts the new key there. b. It is a form of open addressing. When the hash function causes a collision, the probing operates by taking the original hash and adding successive values of an arbitrary quadratic polynomial. c. It's a technique used to resolve collisions. When a hash function causes a collision, we repeatedly step forward by an interval until we find a free location. The interval is decided using a second, independent hash function. d. It's a technique used to resolve collisions. When a hash conflicts with another hash, both the elements are stored in the buckets (linked-lists) stored under the hash code they produced.

Computer Science & Information Technology

As shown in the accompanying figure, a typical ____ displays the name or a description of the command.

A. tab B. tool C. ScreenTip D. menu

Computer Science & Information Technology

On an entity relationship diagram, Composite keys are drawn in a ________ around it

A) diamond with a circle B) triangle with a circle C) diamond with a rectangle D) triangle with a rectangle

Computer Science & Information Technology

The ____________________ Access Controller Access Control System contains a centralized database, and it validates the user's credentials at the TACACS server.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology