You can hide information entered into a TextBox by setting that TextBox’s property to a character—that character will be displayed for every character entered by the user.

a) PrivateChar
b) Mask
c) MaskingChar
d) PasswordChar


d) PasswordChar

Computer Science & Information Technology

You might also like to view...

The SSF used within BSIMM consists of four domains. Which of the following is not one of the four domains?

A. Governance B. Intelligence C. SSDL Touchpoints D. Development

Computer Science & Information Technology

Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds?

A. systohc --compare B. compare --hw2sys C. hwtosys -c D. hwclock -c

Computer Science & Information Technology

To split a cell horizontally, click the ____ button on the FORM LAYOUT TOOLS ARRANGE tab.

A. Horizontal B. Split Cell C. Divide D. Split Horizontally

Computer Science & Information Technology

The __________ is the human with overall responsibility for setting the security policy of the organization, and, thus, for decisions about deploying and configuring the IDS

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology