1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
14

The ListCell subclass’s ________ method creates the custom presentation. This method is called by the ListView’s cell factory wh

en a ListView cell is required—that is, when the ListView is first displayed and when ListView cells are about to scroll onto the screen.
a. update
b. updateItem
c. newPresentation
d. None of the above.
Computers and Technology
1 answer:
Vlada [557]3 years ago
7 0

Answer:

A

Explanation:

Update

The listview can be called an arbitrary amount of times, different items may be passed and the cell can go from empty to non-empty and the other way round. ListView creates about as many cells as you see on screen and fills them with items. E.g. scrolling or modifications of the items list or resizing of the ListView can result in updates.

You might be interested in
You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use?
sweet-ann [11.9K]

Answer: NTP ( Network time protocol)

Explanation:

Network time protocol is the time server which basically works in the TCP and IP network. It rely on the UDP ( User data-gram protocol) at port 123.

NTP server is the dedicated network time protocol devices which basically use for synchronize the network.

It is basically design to synchronize the clock in the computer and across the internet network and local area network. NTP server basically maintain the quality of the reference clock time.

4 0
3 years ago
At the moment i am tackling the cs50x projects and i need a little bit of help with problem set 1, the 'greedy algorithm'. I am
mars1129 [50]
That you have to multiply first and then divide
6 0
3 years ago
Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
nadya68 [22]

Answer:

Use a password manager

Explanation:

It is a disadvantage to use usernames and passwords for account authentication is a fundamentally defective security mechanism.

Your pet's name and other nomenclatures are very easy for hackers.

Advantages of a password manager:

  • Most password managers use multifactor authentication.
  • The information is stored, in encrypted form, on the servers operated by the providers; This is a strong enough security.
  • Examples of password managers LastPass, 1Password, Bitwarden, RoboForm, Intuitive Password, Dashlane, RoboForm etc.
5 0
4 years ago
Which class members should be declared as public?
yawa3891 [41]

Answer:

B. Methods and occasionally final attributes

Explanation:

In Computer programming, class members can be defined as the members of a class that typically represents or indicates the behavior and data contained in a class.

Basically, the members of a class are declared in a class, as well as all classes in its inheritance hierarchy except for destructors and constructors.

In a class, member variables are mainly known as its attributes while its member function are seldomly referred to as its methods or behaviors.

One of the main benefits and importance of using classes is that classes helps to protect and safely guard their member variables and methods by controlling access from other objects.

Therefore, the class members which should be declared as public are methods and occasionally final attributes because a public access modifier can be accessed from anywhere such as within the current or external assembly, as there are no restrictions on its access.

6 0
3 years ago
Which of the following commands would I use to begin a new presentation?
ki77a [65]

Answer:

begin >new

Explanation:

just trust me ok hehe

7 0
4 years ago
Other questions:
  • Why when i click home on iphone i still at my grandma house
    11·2 answers
  • Because it takes time to change an organization’s culture, the ISO must continually monitor security policy compliance. The ISO
    9·1 answer
  • As a general rule, the number of bullet points on a slide should not exceed _____. a.2 b.4 c.8 d.10
    9·1 answer
  • Which of the following was the primary purpose of muckraking, sensationalism, and yellow journalism in the early 1900s?
    11·1 answer
  • Viruses which activate themselves after a specific time is called
    10·2 answers
  • What is the output by the code system.out.print(8-4+2);
    13·1 answer
  • Which type of document should Omar print?
    5·2 answers
  • Describe the plot of the Matrix
    9·1 answer
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!