You can use the ____ component to create check boxes with options that a user can select on a form.

A. Check
B. CheckHere
C. CheckNow
D. CheckBox


Answer: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Program readability can be improved by indenting both the true and false tasks of all if-else statements. 2. An algorithm should be carefully hand traced before it is implemented in C. 3. If the value of control is 5, the following switch statement will cause a run-time error. ``` switch (control) { case 1: printf("one"); break; case 2: printf("two"); break; case 3: printf("three"); break; case 4: printf("four"); } ``` 4. The statements on the left always give p the same value as the code on the right, but the code on the right may execute faster. ``` if (x > 15) if (x > 15) p = p * x; p = p * x; if (x > 30) else if (x > 30) p = 2 * p * x; p = 2 * p * x; ``` 5. C accepts any nonzero value as true.

Computer Science & Information Technology

Risk mitigation involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You are reading a report that shows Company A generated $2,000 last week. This would be ________

A) knowledge B) a competitive advantage C) data D) information

Computer Science & Information Technology

File History supports backing up to external hard drives and USB thumb drives but not to network folders

Indicate whether the statement is true or false

Computer Science & Information Technology