What are the properties exposed by activex controls, Computer Engineering

Assignment Help:

An ActiveX control has four types of properties:

1. Stock:-> These are standard properties supplied to each control, such as font / color. The developer must activate stock properties, but there is little or no coding involved.

2. Ambient:-> These are properties of the environment that surrounds the control -properties of the container into which it has been placed. These can't be changed, but the control can use them to adjust its own properties. For example, it can set the control's background color to match the container's background color.

3. Extended:-> These are properties that the container handles, mainly involving size and placement onscreen.

4. Custom:-> These are properties added by the control developer.            

 

 


Related Discussions:- What are the properties exposed by activex controls

Explain potential of parallelism, Potential of Parallelism Problems in ...

Potential of Parallelism Problems in the actual world differ in respect of the amount of inherent parallelism intrinsic in respective problem domain. Some problems can be easil

Explain chaining method, Chaining: In this method, instead of hashing func...

Chaining: In this method, instead of hashing function value as location we use it as an index into an array of pointers. Every pointer access a chain that holds the element having

Explain register indirect addressing, Q. Explain Register Indirect Addressi...

Q. Explain Register Indirect Addressing? In this addressing technique the operand is data in memory pointed to by a register. Or we can say in other words that the operand fie

Explain the technique used in asymmetric key cryptography, Explain the tech...

Explain the technique used in the asymmetric Key Cryptography. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound

Rsa encryption function- cryptography, The general method for constructing ...

The general method for constructing the parameters of the RSA cryptosystem can be described as follows: Select two primes p and q Let N = pq and determine ∅ (N) = (p - 1

Keys, why impotant keys

why impotant keys

Demux., Implement the full substractor using 8:1demux

Implement the full substractor using 8:1demux

Recursive binary search, The implementation of a (non-recursive) binary sea...

The implementation of a (non-recursive) binary search of an array. The assumption is that a given array is sorted. We want to see if a particular value, that we'll call the target

Show the classification of printers, Q. Show the Classification of Printers...

Q. Show the Classification of Printers? Printers can be classified on following bases: a) Impact: Impact printers print by impact of hammers on ribbon (for example Dot-Matri

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd