CSS2 enabled users to do all of the following EXCEPT ____.
A. design styles for print media
B. control the behavior of cursors
C. control the appearance of scroll bars
D. apply drop shadows to text
Answer: D
You might also like to view...
Which of the following statements will assign the contents of a TextBox control named txtInput into the Text property of a Label control named lblDisplay?
a. txtInput = lblDisplay b. txtInput.Text = lblDisplay.Text c. lblDisplay = txtInput d. lblDisplay.Text = txtInput.Text
A successful IP spoofing attack requires more than simply forging a single header. On the contrary, there must be a complete, sustained dialogue between the machines for a minimum of five packets.?
Answer the following statement true (T) or false (F)
A(n) ____ is a hardware or software device that restricts access between the computer network and the Internet, or between a computer and other computers, protecting the computer behind it.
A. safeguard B. encryptor C. firewall D. SFTP
The Code window contains a hierarchical list of all the objects in open workbooks, including macros, modules, and worksheets
Indicate whether the statement is true or false