A macro is often associated with an ActiveX ________ control

A) List Box B) Command Button C) Text Box D) Label


B

Computer Science & Information Technology

You might also like to view...

Which is not a log type in Windows Event Viewer?

A) Application log B) Security log C) System log D) Syslog log

Computer Science & Information Technology

If you restrict a user to be unable to make any edits, you have made the document ____.

A. templated B. password-protected C. read only D. unauthorized

Computer Science & Information Technology

Which of the following scanning technique involves resetting the TCP connection between the client and the server abruptly before completion of the three-way handshake signals?

A. Stealth Scan B. TCP Connect Scan C. Inverse TCP Flag Scan D. Xmas Scan

Computer Science & Information Technology

Which of the following statements concerning readability is false?

A. Green text on yellow is considered to be effective. B. Italicized Arial is considered to be the most ineffective. C. Black text on gray is considered to be very readable. D. Arial is more readable than Times New Roman.

Computer Science & Information Technology