When obtaining the coordinates of the mouse they

a) are always taken from the main form of the program
b) are relative to the control that caused the event
c) are taken from the center of the form
d) none of the above


b) are relative to the control that caused the event

Computer Science & Information Technology

You might also like to view...

__________ is the use of a trusted third party to assure certain properties of a data exchange.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If the file is stored in the wrong folder, you should use the application's search feature to find the desired file by ____.

A. name only B. date it was created only C. name, date, or file type D. only by file type

Computer Science & Information Technology

Systems software consists of _____.

A. ?the operating system and utility programs that control a computer B. ?productivity programs such as Microsoft Office C. ?interface programs that allow users to interact with electronic devices D. ?only those programs that operate enterprise-class servers

Computer Science & Information Technology

A(n) ________ data table uses two inputs

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology