an event handler is..

a. a word that is open for interpretation.
b. a sentence that provides information.
c. a procedure that occurs as a result of a users action or another source.

Answers

Answer 1
The answer here is C
Answer 2

Answer:

The correct answer is:

Option c. a procedure that occurs as a result of a users action or another source.

Explanation:

First of all, let us define what an event is.

An occurrence that is caused by any external user or entity towards a software or a website is called an event i.e. click from mouse, key pressed from keyboard.

When an event occurs, the software or functionality of the website has to respond to the event. An event handler is a function or procedure that contains the code which has to be run when the event occurs.

When the event occurs, the event handler for particular event is executed.

So from the given options,

The correct answer is:

Option c. a procedure that occurs as a result of a users action or another source.


Related Questions

If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
a. someMethod(someThing);
b. someThing.someMethod( );
c. someMethod.someThing() ;
d. someThing = someMethod( );

Answers

Answer:

C) someThing.someMethod( )

Explanation:

The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.

In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.

what is the operating system on an IBM computer?​

Answers

Answer:

OS/VS2 and MVS

Explanation:

IBM OS/2, is full International Business Machines Operating System/2, an operating system introduced in 1987 IBM and the Microsoft Corporation to operate the second-generation line of IBM personal computers, the PS/2 (Personal System/2.) hope this helps! Pleas mark me as brainliest! Thank you! :))

Is it important to use varied methods when creating digital media presentations? Why or why not?


Yes, because no one method is capable of adequately delivering the information.

No, because using more than one method is confusing to the audience.

No, because the different methods are incompatible with each other.

Yes, because it makes the presentation more interesting for the audience.

Answers

The answer is yes becuase no one method is capable one becuase I took the test on edge

Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?

Answers

Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.

The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing

Answers

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

help please with the question in the photo

Answers

Answer:

A

Explanation:

A because, why would someone want to listen to your own interests?

g A CPU is equipped with a cache; Accessing a word takes 20 clock cycles if the data is not in the cache and 5 clock cycles if the data is in the cache. What is the effective memory access time in clock cycles if the hit ratio is 90%

Answers

Answer:

6.5

Explanation:

The formula to calculate the efficiency is;

= (cache-click-cycle x hit ratio) + ( memory-clock-cycle x 1 - hit ratio)

= (5 x 0.9) + ( 20 x 0.1)

= 4.5 + 2

= 6.5

In this exercise we have to use the knowledge of efficiency, in this way, using the data already informed, we can say that the result of this is:

6.5 effective memory

In this exercise, it was informed that some conditions must be established, that is:

Hit radio: 90%Memory: 20Cache: 5

The formula to calculate the efficiency is;

[tex]efficiency= ((cache-click-cycle)(hit \ ratio)) + ( (memory-clock-cycle)(1 - hit \ ratio))[/tex]

Substituting the known values ​​in the formula above, we find that:

[tex]= (5)(0.9) + ( 20)(0.1)\\= 4.5 + 2\\= 6.5[/tex]

See more about efficiency at brainly.com/question/6672666

Is anyone else having an issue with brainly mobile, where they don't let you watch ads? If so, what do you do to fix it?​

Answers

Answer:

no im not

Explanation:

but i sorry that you are

what is spread sheet software?​

Answers

Answer:

The answer to this question is given in the explanation section.

Explanation:

This is a type of software which show us data in tabular form. These software can easily store, analyze and organize data.

They are divided in rows and columns. They are mainly used for accounting and book keeping.

The commonly used spread sheet software in the market are MS Excel by Microsoft, Calc by libre office.

Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?

Answers

Answer:

120

Explanation:

This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.

5 permutation of 4

To find permutation, we use the formula

P(n, r) = n! / (n - r)!

Where

n is the size of the shirts available, 5

r is the color of each shirt available, 4

P(5, 4) = 5! / (5 - 4)!

P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!

P(5, 4) = 120 / 1

P(5, 4) = 120

Therefore, the total number of shirts available is 120

Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.


religion

product or service

governmental policy

idea

Answers

Answer:

product or service

Explanation:

Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.

Answer:

A.) Product or service

Explanation:

Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.

Which important aspect of the Roman Empire did the barbarians destroy?

Answers

Answer:

centers of learning

Explanation:

Under the leadership of Emperor Valens, Rome was already having financial hardships. This meant that it didn't have enough money left to repair its empire nor to strengthen it against invaders. Soon, the barbarians such as the Franks, Huns, Saxons, etc. started attacking Rome. They spent a lot of time destroying the outer regions of the empire because they were also at war with each other. They penetrated Rome and it soon fell. The barbarians didn't only destroy the cities but they also destroyed the "centers of learning." Roman people were known to value education. With the fall of the Roman Empire, so did education and sophisticated architectures follow.  

Answer:

i dont know but them barbs are crazy can't believe they were a thing back then

Explanation:

lol

Even with a quality burglary-resistant chest on the premises, special function locks may be appropriate because:________.
a. A dishonest worker might open the safe at night .b. A burglar may force a worker to open the safe during working hours.c. Without special locking devices, workers may be tempted to leave the safe unlocked for easy access during the day.d. All of the above

Answers

Answer:

d ) all of the above

Explanation:

is the correct answer

Why are people's visions of utopias and dystopias subjective?
A. Because the vision one person has of paradise will likely match
the vision most people have of a utopia
B. Because only certain technologies make things better and
different ones make things worse in a dystopia
C. Because all technology is dangerous and can lead to the downfall
of all societies, resulting in dystopia
D. Because the technology needed for one person's utopia may be
what creates disaster for another person's dystopia

Answers

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia are people's visions of utopias and dystopias subjective. Thus option D is correct.

What are utopias and dystopias?

Speculative fiction categories that study social as well as political structures include utopian and dystopian literature. In order to pique readers' interest, utopian fiction often depicts a world that adheres to the author's ethics and has many elements of a different reality.

Ultimately, it all varies depending on who you ask. A person's dystopia may be another person's utopia. We don't all have the same notions regarding what a utopia would look like, which is, in my opinion, one of the grounds why people don't live in one. Therefore, option D is the correct option.

Learn more about utopias and dystopias, Here:

https://brainly.com/question/905235

#SPJ2

does anyone know how to code

Answers

Answer:

no

Explanation:

i do not know how to code

Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
files.

Answers

Explanation:

Most presentation programs allow you to save presentations so they can be viewed online by saving them as html

files.

Most presentation programs allow you to save presentations so they can be viewed online by saving them as html files.

g Assume that this program is run on a processor with data cache of size big enough that the entire array arr can fit in the cache. (a) How many paths does the function foo of this program have

Answers

Answer:

A. 2

Explanation:

The food function in the C source code uses two for loop statements to fill and array of size 100 with 100 values ranging from 1 to 100 and the second to get the total sum to the values in the array. With this, two program paths are created.

You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.

Answers

The answer is the 2 one becuase I took the test

The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False

Answers

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.

Answers

Answer:

D) Software problem

Explanation:

plz give me brainliest

D

edge2021      YWWWWWWWWWWWWWWWWWWWWW                                  

What is the name for non-paid active links returned by an Internet search engine in the search results?
O sponsored links
O organic links
O dead links
O relevant links

Answers

Answer: b

Explanation:

Should video gaming be considered a school sport?

Answers

Answer:

I believe it should be in higher grades such as high school or college so people don't abuse it like little kids might.

Answer:

No because the defininition of sports is an activity involving physical exertion and Video games don't involve physical extertion.

Question # 6
Dropdown
Choose the correct ending to the sentence below.


The function localtime() _____________________

Answers

Answer:

returns a different value every time you use it

Explanation: :)

What is the purpose of a Hyperlink

Can you answer both

Answers

Answer:

Number 16 is A Or B And Number 17 is B I think

Explanation:

The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cycle if at least one edge can still be relaxed after performing nm times of relaxations. The algorithm, however, does not specify which cycle is a negative cycle. Design an algorithm to report one such cycle if it exists. You should make your algorithm runs as fast as possible.

Answers

Answer:

- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.

- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".

- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.

- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.

Explanation:

The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.

Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!

Answers

The answer is the first number line.

30/150 = 1/5 = 20%

Answer:

20%

Convert fraction (ratio) 30 / 150 Answer: 20%

The first one.

Please I need one more braniest for 'expert' may I get it?

Explanation:

why does this site suck so much?
Like why do I have to pay MONEY to get answers?

Answers

Answer:

you can answer ppl question to get points to ask questions

Explanation:

thats what i do and its free

Answer:

Money :))

They get revenue off of ads and that cash from your purchases to keep the site and themselves running.

AND REMEMBER: NOTHING IS FREEEEEEE

Designing the right elements for the tasks that the user is attempting to perform is called ________.

Answers

Answer:

Interface design

Explanation:

INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.

8. Write the examples of freeware and Shareware softwares ?

Answers

Explanation:

People use freeware software because it is available free of cost and it can be distributed free of cost, that is why it is called FREEware.

Freeware software:

Adobe PDF

yahoo messenger

Go.ogle Talk

MSN messenger

People use shareware software because it helps them to know about the product more before buying it and this software is available free of cost.

Shareware software:

Adobe acrobat 8 professional

Winzip

Getright

having a bad day? enjoy this front view of phinias (can't spell his name)​

Answers

Answer:

ouch what happened to him

congrats you ruined my childhood

(thanks for the free points!!)

Other Questions
what does quotation best represents the religious views of PLEASE ANSWER, TAKING THE EXAM REVIEW ON EDGEPull factors are __________.A.reasons to leave a placeB.pieces of culture that spread from place to placeC.reasons to go to a new placeD.forces that make a person move involuntarilyPlease select the best answer from the choices providedABCD Asset C3PO has a depreciable base of $16.5 million and a service life of 10 years. What would the accumulated depreciation be at the end of year five under the sum-of-the-years'-digits method?A. $ 4.5 million.B. $8.25 million.C. $ 12 million.D. None of these is correct. Pig Latin is ______ and fits very naturally in the pipeline paradigm while SQL is instead declarative. a) functional b) procedural c) declarative d) all of the above Which is the correct equation for the force applied by a spring? The Big Bang Theory explains that approximately 14 billion years ago an infinitesimally small, dense something rapidly expanded, creating all of the matter and energy in the Universe. Explain how the evidence of red shift (Doppler effect), distance between objects, cosmic microwave background radiation, and the relative abundance of elements in the Universe supports this scientific theory. Explain Mamas reaction as she is handed the insurance check. Why is she receiving the check? What can you infer from her reaction, and how does it differ from the reaction of others? Include one quote that captures her response and use specific quotes from the text. What is the answer to this problem:Richard is given a stuffed giraffe for his birthday. He knows a giraffes neck is 72 inches long in real life. He measures his stuffed giraffes neck and finds its 3.6 inches long. What is the scale? Which of the following describes a voluntary ethnic group Tim rarely spends more than 30 minutes watching TV in the afternoon if Tim begin watching TV at 4 p.m. would you expect him to still be watching tv at 5:00pm explain Keep calm and carry on wants to design a bag for a new 4 book cases weigh the same amount and the total for all of them is 134 lbs how much does each bookcase weigh? please help me .... The computer club has a budget of $80 for a pizza party club can get large pizzas for $10 in cases of soda for five dollars the club like to buy at least five large pizzas and at least three cases of soda The spinal cord runs down the back from the base of the____ and ends just below___ levelA. head... chestB. brain... waistC. neck... hipD. skull . stomachwaist Write a static method that implements a recursive formula for factorials. Place this method in a test program that allows the user to enter values for n until signaling an end to execution. When building electric circuits,_______ flow along the path ( wires, energy source, and resistor(s)).-neutrons-matter-electrons-protons Which is an equation of the line with a slope of 1/3 and a y-intercept of -2? 35 x { -6] PLEASE HELP ASAP!!! WILL MARK BRAINLIEST Pls help for final!!! In the rectangle below, AC has a length of 28 units. What is the length of DE? DE.ABA. 56 unitsB. 14 unitsC. 21 unitsD. 28 unitsunts