A method that executes because it is called automatically when an appropriate event occurs is an event ____. A) Responder B) Listener C) handler D) source

Answers

Answer 1

In programming a typical type of method that executes when an event is trigered is called event handler

C) handler Event Handler

Event Handlers

What are handlers?

Handler are codes that runs on the background thread in a multithreaded programme, the executes series of operation when an events trigers their operations.

Learn more about handlers here:https://brainly.com/question/20028260


Related Questions

Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?

a. Each person needs to send email with his/her part of the project individually every day

b. Each person should be on a cloud folder and sync their files as they are working through their project

c. Each person needs to send a group email to the team as soon as any updates are completed

d. Each person should post their updated information on a team website so it is available for anyone to see

Answers

The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.

What is cloud computing?

Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.

In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.

Read more on cloud computing here: https://brainly.com/question/19057393

Please help me on this it’s due now

Answers

I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.

Definition:

            Logistics Manager: person in charge of overseeing the purchasing

                                            and distribution of products in a supply chain

            Material Handlers: responsible for storing, moving, and handling

                                            hazardous or non-hazardous materials

            Inventory Managers: oversee the inventory levels of businesses

Hope that helps!

A cybersecurity specialist facilitates penetration testing by using functional exercises. The specialist decides to use a war game approach and create teams. Which team operates the security system

Answers

The team that should operates the security system is the blue team.

What is war gaming strategy?

In a war game approach, the teams of the senior managers of a  firm is said to often play their own firm, and they do make selection of any group of its competitors and marketplace.

Note that this form of exercise is said to help simulates a composition of business conditions and gives a lot of lessons and guidance for the main thing. Note also that the blue team do defend the system against and responds to any form of attack from the red team.

Learn more about cybersecurity from

https://brainly.com/question/26260220

which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website

Answers

Hello!
Answer: B. Library.

I hope this helps you!

a customer willl borrow

Answers

Answer: C. the PC

Explanation: The motherboard is not included in the passage

A construction company is in charge of building a house for a client. The construction company completes the project, and then invites the client to take a look at the house. The client looks at the house and is unhappy with the final outcome and wants it redone. What could the construction company have done better?”

Answers

Answer: The construction company could have drawn a 3D model on a CAD app.

Explanation: This would help the blueprints look more realistic and easy to measure the leangths.

Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas

Answers

Answer:

The answer is ( D ) I hope this answers your question

Time machine could not create a local snapshot to back up from

Answers

Answer:

Time machine could not create a local snapshot to back up from Disk Error.

A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.

Which options should they choose during their evaluation process? Check all that apply.

a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated

Answers

A professor who publishes world population research in a journal

Answer:

b,c,d

Explanation: i took the test and bc im awsome

The way in which information travels on the internet, not as a single piece but in chunks.

Answers

If this is a true or false question then it’s true.

If your asking for what those chunks are then packets. I’m a packet addict.

The following flowchart symbol is used to repeat instructions:

A. Rectangle
B. Square
C. Circle
D. Hexagon

Answers

d

Explanation:

⇛σ=

n

∑f(x−

x

)

2

Find f(x-x^-)²

It's

313.29+806.45+474.32+72.9+58.19+532.9+605.16+0+497.29

3360.5

Now

\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{\dfrac{3360.5}{50}\end{gathered}

\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{67.21}\end{gathered}

⇛σ=

67.21

\begin{gathered}\\ \rm\Rrightarrow \sigma=8.2\end{gathered}

⇛σ=8.2

In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO

Answers

Answer:

Boot loader

Explanation:

This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory



Differentiate between
Operating system and
language translator

Answers

It is a program or a series of programs which provides communication between the user and the computer hardware. Translators are programs which convert instructions in assembly language or high level languages into machine languages because computer can only understand machine language.

Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.

Answers

The answer is D
Ik this cause I took the test

Answer:

B

Explanation:

The reason I say "D" is not the answer because I put the answer in and it was wrong.

Which service works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends

Answers

The service that works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends is target tracking.

How can I employ Predictive Scaling with target tracking?

Predictive Scaling works is known to be one that works in line with target tracking. They both help to make one's EC2 capacity to change more better to one's incoming application traffic.

Note that target tracking scaling policies is one where a user has to select a scaling metric and set a target value.

Learn more about Autoscaling  from

https://brainly.com/question/17661222

define a touch-sensitive pad and state one use​

Answers

Answer:

A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.

Explanation:

[C Pointer] Not all arithmetic operations may be performed on pointers. For example, you cannot ________ or _______ a pointer.

Answers

It is not all arithmetic operations may be performed on pointers. For example, you cannot multiply or divide a pointer.

What arithmetic operations cannot be done on pointers?

We cannot carry out all type of arithmetic operations with the use of the pointers.

Note that the Pointer arithmetic is said to be a little bit different from arithmetic we normally use and as such, the only used arithmetic operations applicable on pointers are known to be the addition of numbers.

Learn more about arithmetic operations  from

https://brainly.com/question/4721701

Which of the following is NOT a correct flowchart shape?

A. Parallelogram
B. Oval
C. Diamond
D. Rectangle
E. Star

Answers

I think the answer is star because in a flowchart, the most common shapes are a parallelogram, ovals, diamonds, and rectangles. Stars aren’t used in flowcharts.

Hope this helps :)

Answer: Star

Explanation:

When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?.

Answers

You did not post the full question but if there is one called “hyper visor” or “Xen” or something to do with that, it’s probably the answer.

Linux provides technology that allows the user to remotely view a graphical user interface and control mouse and keyboard events.Which of the following technologies establishes a connection with a remote computer using a viewer on one end and a server on the remote end? XRDP VNC SPICE

Answers

Answer:

I think it would probably be VNC

Explanation:

I have a linux, and it doesn't have the other two, and VNC is all about connections between computers.

How do we ensure that future technologies are fair to society? IT professionals and governments must follow ethical principles in the creation of new technology. IT professionals and governments must follow ethical principles in the creation of new technology. It is not possible to utilize ethical principles when creating new technology. It is not possible to utilize ethical principles when creating new technology. Allow the IT industry to regulate itself. Allow the IT industry to regulate itself. Encourage IT professionals to apply current laws and regulations.

Answers

To ensure that future technologies are fair to society, IT professionals and governments must follow ethical principles in the creation of new technology and also apply current laws and regulations.

What is technology promotion?

The use of technology is one that can promote student zeal by given them a form of positive experiences.

Note that to make sure that future technologies are fair to society, IT professionals and governments have to follow all ethical principles in the development of new technology and also they should use the current laws and regulations that are governing IT technologies.

Learn more about technologies from

https://brainly.com/question/25110079

_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.

Answers

Answer:Encryption

Explanation:I took my test for CIS 110 and guessed and got this question right.

The master program that manages how other software can use the computer hardware is called the:.

Answers

the master program that manages how other softwares use the computers hardware is called the bios

You can access elements in a list by using an index the same way that you can index a character from a.

Answers

One can access elements in a list by using an index the same way that you can index a character from indexing into the string.

What is String Indexing?

Strings are known to be a form of ordered method of character data, 00:15 and the specific characters of a string.

They can be accessed straight through the use of  numerical index. String indexing in Python is known to be a kind of zero-based in nature.

Learn more about indexing from

https://brainly.com/question/4692093

Which ready-to-use features do WYSIWYG editors offer?
A.
meta tags
B.
database
C.
HTML tags
D.
web host
E.
image gallery

Answers

Answer:

C. HTML tags

Explanation:

In computing, WYSIWYG, an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed.

C-13 You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-service attacks against other students from your shared network segment. You know you are not doing this, but you are unsure about your roommate. How can you tell if this accusation is true or not

Answers

Answer:

take a subtle aproach

Explanation:

Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS.

Answers

The relative advantages of an embedded OS based on an existing commercial OS is known to be a lot and it is given below.

What are the Advantages of an embedded OS based on the above scenario?

The embedded OS is known to be gotten from a commercial general-purpose OS and as such, it is often  based on a composition of familiar interfaces, that boast portability.

Note that  It is very fast and can be predict a lot  when compared to the purpose-built embedded OS that is often used in an embedded system.

Disadvantages of an embedded OS based on  based on the above scenario?

This general-purpose OS is known to be not optimized in terms of real-time thing and in terms of embedded applications.

Based on this a lot of modification is often needed  to achieve good performance.

Learn more about commercial OS from

https://brainly.com/question/3837126

Dose brainly give you notifications on you're phone when you go into the site

Answers

Answer:

Yep it does ^_^

write a program to calculate sum of first ten natural numbers​

Answers

Answer:

Explanation:

total = 0

i = 0

while i<=10:

   total = i +total

print(total)

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Answers

Answer:

class Foo:

   def F(self, n):

       if n == 1:

           return 1

       return self.F(n - 1) + 3 * n - 2

Explanation:

This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.

def F(n):

   if n == 1:

       return 1

   return F(n - 1) + 3 * n - 2

Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!

Other Questions
Who was the first to write down the original story ofGreek mythology, and when was this done? Which phrase describes the heating element of a toaster oven?1 a conductor surrounded by an insulator2 an insulator, which stops the flow of electricity3 a resistor, which converts some electric energy to thermal energy4 a conductor, which carries electric currents Why do some animals migrate in and out of the coniferous forest?. How do you think Americans would react today to propaganda that said our leader is always right? Explain why people would react that way. Someone please help!! How moles of Cl' are in a 45 mL of 1,4 M solution of NaCl? Which of the ff. is/are downside(s) of data presented in narrative form?- More details are given- Too lengthy and wordy- Sometimes can be boring- Requires time to comprehend What happens to the temperature of a gas when it is compressed?. Fill in the blanks with the correct world/s to complete the statement. write your answer on a separate sheet of paper Question 9 of 10People who think their beliefs and opinions are facts areO A. unscrupulousB. conciliatoryO c. fallaciousO D. dogmaticSUBMIT Why did Charles J. Guiteau assassinate the President? why does strong emotions interfer with your actions 50 POINTS! PLEASE HELP ME! ILL GIVE BRAINLIEST!2. Please complete both Parts A, B, & C below.a. These triangles are proportional. Identify the corresponding sides for all three sides.b. Set up fractions with your corresponding sides to show proportionality. Make sure to show your work for all three side pairs demonstrating that the fractions are proportional.c. Are the triangles similar? If so explain why. If not, explain why not. Your work from Part A & B may help with this.3 PARTS! Answer all or get deleted Which statement best describes the process of "gathering sources for a research project?A. Go to the library and find a book on your topic.B. Think about where you may be able to find information about your topic.C. Follow your research plan to locate sources of information about your topic.D. Ask people whether they know anything about your topic. Evaluate A)9B)-9c) 729d) -729 What is the difference between being polite and being passive? Give some example What kind of interventions can young people use to prevent or stop bullying? List three things you could do to diffuse a bullying situation. Help me please !!!!!! How do plants help the environment? By blocking sunlight to aquatic life By growing roots deep in the ground By providing food and shelter for animals By producing vines that cover other plants X+6Given f(x) =x2 - 9x +18which of the following is true? 2. A 0.2719 g sample containing CaCO3 reacted with 20.00 mL of 0.2254 M HCl. Given that HCI was excess. The excess HCl required exactly 20.00 mL of 0.1041 M NaOH to reach the end-point using phenolphthalein indicator. Determine percentage purity of CaCO3 in the sample. The reraction involved is CaCO3(s) + 2HCl(aq) CaCl(aq) + 2HO(l) The titration reaction is HC(aq) + NaOH(aq) NaCl(aq) + HO(1)