To assign an access key to a text box control, you include the ____ in the Text property of the control's identifying label.

A. exclamation mark
B. ampersand
C. asterisk
D. caret


Answer: B

Computer Science & Information Technology

You might also like to view...

________ is the security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

A) System integrity B) Availability C) Accountability D) Confidentiality

Computer Science & Information Technology

The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack

A) would not be disrupted easily B) allows commerce to continue C) provides point to point connections D) would not be easily hacked

Computer Science & Information Technology

________ view is a grid containing fields and records

Fill in the blank(s) with correct word

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. Based on the FAIR framework, the vulnerability level is estimated based on the loss event frequency and threat capability 2. Most standard frameworks share the same 6 common activities. 3. A system that is remotely accessible via VPN is more likely to be compromised by a threat than a system that is Internet accessible 4. An information security officer usually sets the strategy and approach and review the findings at the end of the project. 5. The criticality and importance of a business may increase the integrity and availability impacts of a threat.

Computer Science & Information Technology