Programming with Microsoft Visual Basic 2015 (MindTap Course List)
Programming with Microsoft Visual Basic 2015 (MindTap Course List)
7th Edition
ISBN: 9781285860268
Author: Diane Zak
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 1.LB, Problem 3E

Explanation of Solution

Create a Visual Basic Windows Application

  • Open “Microsoft Visual Basic 2010”.
  • Click “File” Menu -> “New Project”.
  • In the New Project pop-up window, select the Windows Forms Application and give the name as “Penguin Project”; and specify the location as \VB2015\Chap01\ and the solution name as “Penguin Solution”.

Screenshot of creating a Visual Basic Windows Application for Penguin Solution

Step 1:

  • Add a label box to the form from Toolbox.
  • Add a picture box to the form from Toolbox.
  • Add a command button to the form from Toolbox.
  • Set the “Font” -> “Segoe UI” with “9” points for the form.

Screenshot to set the font of the form

Step 2:

  • Set the “Text” -> “Penguin Grille” for the form.

Step 3:

Set the “Font” -> “Segoe UI” with style as “Italic” and “14.25” points and then “Text” as “Your Hometown Restaurant” for the “lblName” control.

Screenshot to set the font of the label

Step 4:

  • Set the form “StartPosition” as “CenterScreen”, so that the form appears centered on the screen while running the program...

Blurred answer
Students have asked these similar questions
1.[30 pts] Answer the following questions: a. [10 pts] Write a Boolean equation in sum-of-products canonical form for the truth table shown below: A B C Y 0 0 0 1 0 0 1 0 0 1 0 0 0 1 1 0 1 0 0 1 1 0 1 0 1 1 0 1 1 1 1 0 a. [10 pts] Minimize the Boolean equation you obtained in (a). b. [10 pts] Implement, using Logisim, the simplified logic circuit. Include an image of the circuit
In the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using Javascript  The cipher should be able to perform the following tasks: generate keys encrypt a given plaintext message with a key selected from the list of keys generated decrypt a given ciphertext message with a known cipher key
List reasons why teachers should and shouldn’t be replaced by computers? State your response in a descriptive context. Provide five references from the with internet with your answers.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage