1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
7

Event-driven GUI programs sometimes require fewer coded loops than their counterpart console applications because some events ar

e determined by the ____ when the program is running.
Computers and Technology
1 answer:
Westkost [7]3 years ago
5 0

Answer:

User-action

Explanation:

In some cases, an event can be as a result of a user action, such as when the user clicks the mouse button, types a character, or clicks a button.

The program might respond to a mouse-click on a canvas by drawing a shape, to a typed character by adding the character to an input box, or to a click on a button by clearing a drawing.

You might be interested in
Which of the following statements is true of a time management plan? It is work in progress that need to be altered many times?
marusya05 [52]
Cake cake cake cake
3 0
3 years ago
Cd-roms typically use the _______ filesystem type.
marissa [1.9K]
CD-<span>ROMs typically use the ____ filesystem type</span>
8 0
3 years ago
Whats worth more in adopt me- A Mega Owl or a Mega Frost Dragon?
serg [7]

Answer:

I think mega frost dragon i d k

Explanation:

6 0
2 years ago
Read 2 more answers
an ssl client has determined that the certificate authority (ca) issuing a server's certificate is on its list of trusted cas. w
TEA [102]

The next step in verifying the server's identity is:

  • The CA's public key need to validate the CA's digital signature found on the server certificate.

<h3>What is SSL client?</h3>

Secure Sockets Layer (SSL) is known to be a kind of PKI protocol that helps to  authenticate a user's identity and it is one that often encrypt the communication that takes place between the client and the server.

Note that  in the above, the next step in verifying the server's identity is:

  • The CA's public key need to validate the CA's digital signature found on the server certificate.

Learn more about SSL client from

brainly.com/question/14425531

#SPJ11

8 0
2 years ago
Which of the following would NOT be considered an agricultural pest?
Komok [63]
A dog laying amongst the crops would not be a pest, so the correct choice would be the first one.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Electronic files created on a computer using programs such as word software are considered to be
    15·1 answer
  • Please help
    14·1 answer
  • Which education and qualifications are most helpful for Law Enforcement Services careers? Check all that apply.
    15·1 answer
  • The ability to anticipate and determine upcoming driving hazards and conditions are adversely affected
    14·1 answer
  • Consider a binary-search method in an array that reports whether an object is in the array. The documentation indicates that the
    11·1 answer
  • g Define memory hierarchy. A. The rate at which information can be transferred from one place to another. B. Ordering storage sy
    8·1 answer
  • Two system administrators who work in two different buildings for the same company want to open a communication channel between
    8·1 answer
  • Lori Redford, who has been a member of the Project Management group, was recently promoted to manager of the team. She has been
    12·1 answer
  • What would be the total width of the div in the code below?
    11·2 answers
  • Is spin to win paying or is a scam app​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!