Programming with Microsoft Visual Basic 2015 (MindTap Course List)
Programming with Microsoft Visual Basic 2015 (MindTap Course List)
7th Edition
ISBN: 9781285860268
Author: Diane Zak
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 2.LB, Problem 2E

Explanation of Solution

View the form design in the IDE:

Lock the controls:

  • Right click the form -> click “Lock Controls” to lock the controls.

Assign tab index:

  • Click the “Form” -> Click “View” option in the menu bar -> Click “Tab Order”.
  • Assign the tab order just by clicking the numbers using the mouse in the blue boxes for each control.

Screenshot of show tab order

Assign Access key:

  • Access key can be assigned to any control by including the ampersand (&) before any letter of the control’s text in the text property, to make the letter as an access key.
  • It can be done by clicking the label in the form and changing the text using the property window.
  • The following table displays the list of controls and its access keys.

Table with list of controls and its access keys

txtAnnualThe first letter “a” in the Annual salary: identifying label
lblWeeklyThe first letter “w” in the weekly pay: identifying label
lblBiweeklyThe first letter “b” in the biweekly pay: identifying label
btnCalcThe first letter “c” in the Calculate caption
btnPrintThe first letter “p” in the Print caption
btnClearThe letter “l” in the Clear Screen caption
btnExitThe letter “x” in the Exit caption

Thus, the interface has been designed with access keys and tab order.

Code for Exit button:

  • Code for exit button’s click event procedure to exit the application

Public Class FormMain

Double click on the “Exit” button, and add the following code in the code window:

    Private Sub Button4_Click(sender As System...

Blurred answer
Students have asked these similar questions
Information Security Risk and Vulnerability Assessment 1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software?4- Who ensures the entity implements appropriate security controls to protect an asset?         Please do not use AI and add refrence
Find the voltage V0 across the 4K resistor using the mesh method or nodal analysis. Note: I have already simulated it and the value it should give is -1.714V
Resolver por superposicion
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Text book image
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781305480537
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT