CSS2 enabled users to do all of the following EXCEPT ____.

A. design styles for print media
B. control the behavior of cursors
C. control the appearance of scroll bars
D. apply drop shadows to text


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following statements will assign the contents of a TextBox control named txtInput into the Text property of a Label control named lblDisplay?

a. txtInput = lblDisplay b. txtInput.Text = lblDisplay.Text c. lblDisplay = txtInput d. lblDisplay.Text = txtInput.Text

Computer Science & Information Technology

A successful IP spoofing attack requires more than simply forging a single header. On the contrary, there must be a complete, sustained dialogue between the machines for a minimum of five packets.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ is a hardware or software device that restricts access between the computer network and the Internet, or between a computer and other computers, protecting the computer behind it.

A. safeguard B. encryptor C. firewall D. SFTP

Computer Science & Information Technology

The Code window contains a hierarchical list of all the objects in open workbooks, including macros, modules, and worksheets

Indicate whether the statement is true or false

Computer Science & Information Technology