subject

In this exercise, you modify the History Grade application from this chapter’s Focus lesson. Use Windows to make a copy of the History Solution folder. Rename the copy History Solution-Functions. Open the History Solution. sln file contained in the History Solution-Functions folder. Modify the btnDisplay_Click procedure so that it uses two functions named GetGrade101 and GetGrade201 to get the appropriate grade; the procedure should then display the grade in the lblGrade control. Change the two independent Sub procedures to functions that return the appropriate grade to the statements that invoke them in the btnDisplay_Click procedure. Each function should contain a parameter that accepts the total points passed to it. Save the solution and then start and test the application. Option Explicit On
Option Strict On
Option Infer Off
Public Class frmMain
' Independent Sub procedures.
Private Sub btnDisplay_Click(sender As Object, e As EventArgs) Handles btnDisplay. Click
' Calls independent Sub procedures to display a grade.
End Sub
Private Sub btnExit_Click(sender As Object, e As EventArgs) Handles btnExit. Click
Me. Close()
End Sub
Private Sub txtPoints_Enter(sender As Object, e As EventArgs) Handles txtPoints. Enter
txtPoints. SelectAll()
End Sub
Private Sub ClearGrade(sender As Object, e As EventArgs) Handles txtPoints. TextChanged, radHis101.CheckedChanged, radHis201.CheckedChanged
lblGrade. Text = String. Empty
End Sub
Private Sub txtPoints_KeyPress(sender As Object, e As KeyPressEventArgs) Handles txtPoints. KeyPress
' Accept only numbers and the Backspace key
If (e. KeyChar < "0" OrElse e. KeyChar > "9") AndAlso e. KeyChar <> ControlChars. Back Then
e. Handled = True
End If
End Sub

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 22.06.2019 18:30, ovoxotas
Which of the following commands is more recommended while creating a bot?
Answers: 1
image
Computers and Technology, 23.06.2019 22:20, Izzyfizzy
Read “suburban homes construction project” at the end of chapters 8 and 9 (in the textbook) and then develop a wbs (work breakdown structure) in microsoft excel or in microsoft word (using tables)
Answers: 1
image
Computers and Technology, 24.06.2019 11:00, maddiiie128
Why is it uncommon for users to perform searches directly in database tables? a.)users are discouraged from interacting directly with tables because they might confuse tables with spreadsheets. b.) users are discouraged from interacting directly with tables because this may result in unintended changes to source data. c.)users do not have the technical skills required to perform searches directly in database tables. d.)users do not have the permissions required to perform searches directly in database tables.
Answers: 1
You know the right answer?
In this exercise, you modify the History Grade application from this chapter’s Focus lesson. Use W...

Questions in other subjects:

Konu
Mathematics, 08.11.2019 13:31
Konu
Mathematics, 08.11.2019 13:31
Konu
Mathematics, 08.11.2019 13:31