Forms can inherit:

a) methods
b) variables
c) controls
d) All of the above


d) All of the above

Computer Science & Information Technology

You might also like to view...

A(n) ________ chart has an appearance with height, width, and depth

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is not true about protecting your electronic profile?

A) Every time you provide information to a company, that company may enter the information into a database. B) If nothing else, your name, address, and telephone number are available online for others to see. C) One way to keep yourself safe is to set up an alternate e-mail that you only use when you sign up for promotions or website access. D) Filling out forms online gives the recipient more information than you intend.

Computer Science & Information Technology

A UNIX/Linux ____________________ consists of lines of commands that are executed when you run the script, similar to the use of scripts in Windows Server 2008.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A Trojan horse is a self-replicating program that masks itself as a useful program but is actually a type of malware.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology