1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
4 years ago
10

1. You can use this method to make a text field read-only. a. setReadOnly b. setChangeable c. setUneditable d. setEditable

Computers and Technology
1 answer:
marusya05 [52]4 years ago
4 0

It's either a or c I feel like for word it is possible to set to read only but I'm not sure for anything else

You might be interested in
If you get your foot stuck in a cloud how many colors can you smell with you ears
suter [353]

Answer: 42 is the answer to everything and just remember, Don,t panic.

For i am the hitch hikers guide to the galaxy.

 

Explanation:

7 0
3 years ago
What happens when text is added to grouped objects that is larger than an object ?
Elodia [21]

Answer:

You have to select the picture and pick the text at first.

Then press context menu key on a keyboard or right mouse button and choose group/ungroup point.

Choose group.

And finally you can select and resize the object and text simultaneously.

6 0
3 years ago
Read 2 more answers
Types of lines in dressmaking
Shtirlitz [24]

Answer:

table of contents/ straight line/horizontal line/diagonal line/zigzag line/curved line(softly)  curved line(fully)  thin line

Explanation:

your welcome

5 0
4 years ago
In your email software the address book allows you to​
olga55 [171]

To put it simple, an Address Book is basically where you can store peoples names, addresses and most importantly emails so you can easily contact them. Its pretty much like your contacts on your phone.

7 0
3 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Other questions:
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • Which of the following would allow for more data to be stored on a CD?
    11·2 answers
  • A computer ____ is the amount of data (measured in bits or bytes) that a cpu can manipulate at one time
    8·1 answer
  • Which field data type would you use if you'd like to store videos in that field a text b memo c Boolean D binary object E null
    11·2 answers
  • Write a function all_cats that consumes a comma-separated string of animals and prints whether all of the animals have "cat" in
    12·1 answer
  • In database transaction concurrency, the lost update anomaly is said to occur if a transaction Tj reads a data item, then anothe
    6·1 answer
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • A ? is the desired value where a process should be maintained. The value may be manually set, automatically set, or programmed.
    13·1 answer
  • Read two numbers from user input. Then, print the sum of those numbers. Hint - Copy/paste the following code, then just type cod
    9·1 answer
  • Write a C++ function, smallestIndex, that takes as parameters an int array and its size and returns the index of the first occur
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!