A method that executes because it is called automatically when an appropriate event occurs is an event ____. A) Responder B) Listener C) handler D) source

Answers

Answer 1

In programming a typical type of method that executes when an event is trigered is called event handler

C) handler Event Handler

Event Handlers

What are handlers?

Handler are codes that runs on the background thread in a multithreaded programme, the executes series of operation when an events trigers their operations.

Learn more about handlers here:https://brainly.com/question/20028260


Related Questions

which of the following phase change when heat is removed form the material
A. sublimation
B. vaporization
C. Melting
D. Freezing​

Answers

Answer:

It will be D.Freezing

Explanation:

If heat is removed from a substance, such as in freezing and condensation, then the process is exothermic. In this instance, heat is decreasing the speed of the molecules causing them move slower (examples: liquid to solid; gas to liquid). These changes release heat to the surroundings.

GOOD LUCK

Why might a computer calculate a long list of numbers better than a human?

A. Computers can replicate human tasks.
B. Computers can think creatively.
C. Computers must rest every few hours.
D. Computers calculate numbers very quickly.

Answers

Answer: Computers calculate numbers very quickly.

Explanation:

While most of the possible options are accurate, D appears to be your best option. Computers can calculate long, sophisticated numbers in a few seconds while it will (usually) take humans longer.

In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO

Answers

Answer:

Boot loader

Explanation:

This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory

Packet analysis can also help _____ understand protocol and application behavior to see how routines behave, as well as help determine if it is the application OR the network that is causing slow response times.

Answers

Packet analysis can also help developers to understand protocol and application behavior to see how routines behave.

What is the Packet analysis  about?

Packet analysis  is known to be a tool that can help a lot of developers to be able to have a lot gains from understanding protocol and application behavior to see how routines behave.

Conclusively,  Packet analysis can be used to know or determine  when an  application or a given network is having or leading to slow response times.

Learn more about packet analysis from

https://brainly.com/question/6962155

#SPJ1

The way in which information travels on the internet, not as a single piece but in chunks.

Answers

If this is a true or false question then it’s true.

If your asking for what those chunks are then packets. I’m a packet addict.

Which method of funding higher education accrues interest until it is paid back?
A. Scholarships
B. Grants
C. Work-study programs
D. Loans

Answers

Answer:

D. Loans

Explanation:

This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average

Answers

Answer:

d average

Explanation:

The average is the ratio of the sum of the observation to the total number of observations. Then the correct option is D.

What is average?

Average is simply defined as the mean of the given set of numbers. The mean is considered as one of the measures of central tendencies in statistics. The average is said to be an arithmetic mean.

The average is given as

[tex]\rm Average = \dfrac{Sum\ of\ the\ observation}{Total\ number\ of \ observations}[/tex]

This is an example of the average formula.

More about the average link is given below.

https://brainly.com/question/521501

Please help me on this it’s due now

Answers

I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.

Definition:

            Logistics Manager: person in charge of overseeing the purchasing

                                            and distribution of products in a supply chain

            Material Handlers: responsible for storing, moving, and handling

                                            hazardous or non-hazardous materials

            Inventory Managers: oversee the inventory levels of businesses

Hope that helps!

When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET

Answers

When performing forensics on an Apple computer, the operating system are you the most likely to encounter is iOS.

What is operating system forensics?

A Operating System Forensics is known to be a method used for the retrieving of any useful information from the Operating System (OS) of the computer or any kind of mobile device.

Note that the reasons for collecting this information is so as to get all the empirical evidence against any kind of perpetrator.

Learn more about operating system from

https://brainly.com/question/1763761

A _____ is a grid that displays fields as columns and records as rows.

Answers

Answer: it is a datasheet because data is like a a place to keep things in and you can organise that in many different way's

Please help me on this it’s due now

Answers

The answer is both A and B because logistics is the overall process of how things are equipped, stored and taken to their final destination.

How are data organized and manipulated in a database?

Answers

Answer:

What is Data Manipulation? Data manipulation refers to the process of adjusting data to make it organised and easier to read. These commands tell the database where to select data from and what to do with it.

Explanation:

By buying in bulk, Deborah managed to have 6,000 CDs manufactured for $9,000. What was the cost per unit for manufacturing?

Answers

Answer: It would be $1.50 per unit

Explanation

You use trace precedents for a cell containing a formula. What indicates an error in the precedents used?.

Answers

When you use Trace Precedents for a cell containing a formula, an error in the precedents used would be indicated by a red tracer arrow.

What is Trace Precedents?

Trace Precedents can be defined as cells or groups of cells in Microsoft Excel that is used to review and determine which ones affect the value of an active cell.

IGenerally, when you use Trace Precedents for a cell in a spreadsheet document containing a formula, an error in the precedents used would be indicated by a red tracer arrow, which is displayed between the dependent and precedent cells.

Read more on cells here: brainly.com/question/26053797

One way to insert a page break is to choose page break from the Insert tab.

true or false

Answers

true that is a way to insert a page break

How can you open a link in a new tab/browser window?.

Answers

Answer:

Press the + at the top of your brower, or New Tab button.Copy-paste it into the top of the browser, the main search bar.

                                     [tex]Steps~also~in~pictures~below.[/tex]

Which tab can help start a query? Create External Data File Home

Answers

The Create, External Data, File and Home tabs are in Microsoft Office Access

The Create tab can help to start a query

How to determine the tab?

There are several tabs in Microsoft Office Access.

Of all these tabs, the Create tab is used to help the user to start a query and return the required data of the query.

The other tabs such as file and home are used to perfom other tasks which include open files, save query, etc.

Read more about database at:

https://brainly.com/question/518894

Answer:

Its A Your Welcome

Explanation:

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

Answers

Answer:

Brute force

Explanation:

Brute force means forcing your way into logging into an account.

This is done by trying all kinds of passwords, starting from something like "123456" to your birthday and getting increasingly complex passwords in the hope that the account has a weak password

Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 KB, 4 KB, 20 KB, 18 KB, 7 KB, 9 KB, 12 KB, and 15 KB. Which hole is taken for successive segment request of

Answers

Answer:

um uwu

Explanation:

When did time begin?
Did we invent math or did we discover it?
Where does a thought go when it's forgotten?
Do we have free will or is everything predestined?
Is there life after death?
Is it really possible to experience anything objectively?
What are dreams?
What is the goal of humanity?

Answers

I love Rakshya please accpect ma propoese

Eric just signed up for his first college class after being out of school for nearly a
decade. He goes to the bookstore the week before class starts to get his book, and
he's surprised to learn that he only needs an access card. How will Eric be
accessing the course material for his college class?

Answers

The way Eric can access the course material for his college class is to use the LMS also known as course management system (CMS)

What are course material?

Course Materials are known to be the courses, documentation, educational materials needed for a specific course.

Conclusively, The LMS is the known to be the background into which instructors often input course content and when Eric access it, he can be able to get the course content.

Learn more about course material from

https://brainly.com/question/4371674

Edhesive Assignment 8: Personal Organizer.

I keep getting a bad input message on my line 52. Any tips on how to fix this?
I've included photos of my code.

Answers

In this exercise we have to use the knowledge in computational language in python to write the following code:

What is input?

Python's input function takes a single parameter which is a string. This string is often called a prompt because it contains informational text that tells the user to type something. For example, you can call the input function as follows:

So in an easier way we have that the code is:

eventName = []

eventMonth = []

eventDay = []

eventYear = []

def addEvent():

userEventName = input("What is the event: ")

userEventMonth = int(input("What is the month (number): "))

userEventDay = int(input("What is the date: "))

userEventYear = int(input("What is the year: "))

userEventMonth = validateMonth(userEventMonth)

userEventDay = validateDay(userEventMonth, userEventDay, userEventYear)

eventName.append(userEventName)

eventMonth.append(userEventMonth)

eventDay.append(userEventDay)

eventYear.append(userEventYear)

def validateMonth(month):

if month >= 1 and month <= 12:

return month

else:

return 1

def validateDay(month,day,year):

if day < 1 or day > 31:

return 1

if month == 2:

isleap = False

if year%4 == 0:

if year%100 == 0:

if year%400 == 0:

isleap = True

else:

isleap = True

if isleap:

if day <30:

return day

else:

return 1

else:

if day < 29:

return day

else:

return 1

if month in [1,3,5,7,8,10,12]:

return day

if month in [4,6,9,11] and day < 31:

return day

else:

return 1

def printEvents():

print("EVENTS")

months = ['January', 'February', 'March', 'April', 'May', 'June', 'July', 'August', 'September', 'October', 'November', 'December']

for index in range(len(eventName)):

print(eventName[index])

print("Date: "+months[eventMonth[index] -1]+ " " + str(eventDay[index]) + ", " + str(eventYear[index]))

userChoice = "yes"

while userChoice.upper() != "NO":

addEvent()

userChoice = input("Do you want to enter another event? NO to stop: ")

printEvents()

See more about python at brainly.com/question/18502436

what is the impact of ict on school policy

Answers

Answer:

It improves the effectiveness of education. It aids literacy movements. It enhances scope of education by facilitating mobile learning and inclusive education. It facilitates research and scholarly communication.

Explanation:

Answer:

Hello FluffyStrawberry here~

Your answer is

It improves the effectiveness of education. It aids literacy movements. It enhances scope of education by facilitating mobile learning and inclusive education. It facilitates research and scholarly communication
hope it’s helps you

Explanation:

~FluffyStawberry

Sonya wants to add a hyperlink to her new e-mail message. Her computer screen is shown.


Which tab should Sonya click in order to find the Hyperlink option?

Insert
File
Options
Review

Answers

Sonya should click insert because that is where the hyperlink button is.
Answer insert

A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.

Which options should they choose during their evaluation process? Check all that apply.

a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated

Answers

A professor who publishes world population research in a journal

Answer:

b,c,d

Explanation: i took the test and bc im awsome

Complete the sentence.

When sensitive information is sent over the internet, it should be
.

Answers

Answer:

encrypted

Explanation:

to prevent others from viewing it

Answer:

Your answer is encrypted

Explanation:

This will keep your information secure whilst sending it.

This means to:

convert (information or data) into a cipher or code, especially to prevent unauthorized access

So your info is safe

Pls mark brainliest <3

Hope this helps :)

`

`

`

Tori

Time machine could not create a local snapshot to back up from

Answers

Answer:

Time machine could not create a local snapshot to back up from Disk Error.

Isabela wants to edit a presentation for her science class. she is in the main view of the powerpoint application. how can she access her presentation? go to the backstage view, and click options. click the file tab, and click the open option. click the quick access toolbar, and click the open option. type in the name of the file in the search field, and click open.

Answers

The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

What is power point presentation?

Power point presentation is a softwere which display the data with the help of collection of slides.

Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.

Form the main view to access her presentation, Isabela need to follow the following steps-

Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.

Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

Learn more about the power point presentation here;

https://brainly.com/question/24653274

Answer: It’s B, Click the File tab, and click the open option

Explanation:

just got it right on edge

You are pricing out a new laptop for a user. You decided to go with a traditional hard disk that has a cache of flash memory. Which type of disk are you purchasing

Answers

Answer:

A hybrid drive

Explanation:

Its called a hybrid drive because it combines two different kinds of storage, SSD and HDD. SSD is a solid state drive and it has no moving parts. It is much faster than a HDD and is more reliable but these benefits come at a trade off of a higher price per gigabyte. HDD is a hard disk drive and works by reading a spinning disk to get information. This kind of disk is usually used because of its low price/gb. This makes it an excellent option for getting lots of storage at a cheap price. A hybrid drive combines the best of both worlds by using a small SSD as a boot drive to start up a computer because it is much faster, and uses an HDD as the main storage drive with lots of space.

In a typical information security program, what is the primary responsibility of information (data) owner

Answers

The typical responsibility of the information that an owner is to determine the level of sensitivity or classification level.

What is an information security program?

The information security program is a set of activities, projects, and initiatives that help an organization IT framework and help the organization meet all the business goals leading to corresponding to the benchmarks. The main duty of the data owner is to determine the level of sensitivity of the data.

Find out more information about information security.

brainly.com/question/25226643

Other Questions
find x for -3+x=2(x+3) How Is Rebecca most likely feeling in the first paragraph of this excerpt?OA. lonelyOB. frightenedO c. overwhelmedResetNext meStandard 12: Students understand and interpret written and spoken language on a variety of toples, DOK 1, 2dulesElige. Kate and Catalina are going through their normal morning routine. Select the word or phrase that best completes each sentence.adesllaborations1. Kate y Catalinaa las 7:00 a.m.atse acuesta - se despiertan - se viste -- se levantaogle Driveadges2. KatebienearPodse siente -- te sientes -- nos sentimos - se sientenonnectEDNew AnalyticsDiscoveryEducation3. Catalinamuy temprano-MH Textbookse despiertan -- nos despertamos -- se despierta -- me despiertoThinkCentralFlipgrid4. Despus de cepillarse los dientes, Kate y Catalinacon faldas largas y blusas.Canva forEducationse viste me visto - te vistes - se vistenIXL LearningNewsels5. Catalina siempre le dice 3 kate:frutasComa msCome msComas msComen ms If the supplier perceives a buyer-supplier relationship is in the desirable region on the purchaser-supplier satisfaction matrix, but there are problems, the supplier is most likely to: how can we slow down sea level rise Question 5 of 5Which phrase best completes this list?Effects of the Industrial RevolutionNew job opportunitiesMore efficient production of goodsGrowth of cities?A. Lower prices on goodsB. Fewer job opportunities for womenC. Greater value placed on handmade goods pls helpp What is price-fixing? To administer back blows what position should a person be in? Kira ran 8 1/5 miles in 69 7/10 minutes. What is Kiras average time per mile? Where is the post office? It is _____ there.atoverbyfrom Which steps could be part of the process in algebraically solving the system of equations, y 5x = x2 10 and y = 4x 10? select two options. y = x2 5x 10 y 5x = x2 10 4x 10 0 = x2 9x 0 = x2 9x 20 one x-value of a solution to the system is 4. Please help me????22pts Using scale, which map shows the most area per inch? a. 4a c. 4c b. 4b d. they are the same Please select the best answer from the choices provided A B C D 5:8:12 of 1,220,000organize in least to greatest1.2.3. Unit 7: Right Triangles and Trigonometry Homework 2: Special Right Triangles What over the counter medicine is good for inflammation?. 10 men can do the work in 8 days. how many men should be reduced to finish the work in 10 days Use the data and what you have learned about evolution to explain how mutation is a random process, but natural selection is not random. What is an externality whats reciprocal of 4 1/4