1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
3 years ago
14

You can use a(n) to call a function in response to an event?

Computers and Technology
1 answer:
uranmaximum [27]3 years ago
6 0

Answer:

Simply put: A callback is a function that is to be executed after another function has finished executing — hence the name 'call back'. ... Functions that do this are called higher-order functions. Any function that is passed as an argument is called a callback function.

Explanation:

You might be interested in
Which of these monitor connector types is the oldest and least desirable to use?
ella [17]

Answer:

DVI is the oldest out of the four.

Explanation:

DVI and VGA are the oldest, but DVI is oldest and least desirable to use since it is outdated.

5 0
3 years ago
Read 2 more answers
tion. 6. A step occasionally required to repair damaged relationships is O A. looking at the problem from the other person's poi
Marta_Voda [28]
The answer to this question is b that's the answer
5 0
3 years ago
Write three guidelines to help you keep track of your behavior as you use different apps with
Gala2k [10]

Answer:

A basic guideline plan to help me track my behavior consist of the following:

How much time do I use each element?

Have I experienced anxiety after using them?

Have I experienced anxiety while using them?

Have I changed my day to day routine by using them?

Explanation:

The reasons to back my answer are the following. First of all, dependency can be measured in time spent and anxiety developed after the use of the element. Thus, we need to explore if the source of media has originated anxiety while using it or after using t to spot if we are suffering an addictive pattern. Also, generally addictive elements create anxiety while using it and it increases after stop using them. Therefore, if we find that we have experienced both types of anxiety we are in an addictive cycle.

4 0
3 years ago
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message
Lynna [10]

Answer:

I think that part A is correct option

6 0
3 years ago
Write a Python script to input time in minutes , convert and print into hours and minutes.
cluponka [151]

Answer:

Following are the Python program to this question:  t=float(input("Enter time value in seconds: "))#input time in seconds by user

d = t // (24 * 3600) #calculate day and store in d variable  t= t % (24 * 3600)#calculate time and store in t variable  h = t // 3600#calculate hour and store in h variable  t %= 3600#calculate time and store in t variable  m=t // 60#calculate minutes and store in m variable  t%= 60#calculate time and store in t variable  s = t#calculate second and store in s variable  print("day:hour:minute:second= %d:%d:%d:%d" % (d,h,m,s))#print calculated value

Output:

Enter time value in seconds: 1239876

day:hour:minute:second= 14:8:24:36

Explanation:

Description of the above can be defined as follows:

  • In the above Python program code an input variable "t" is declared, which uses the input method to input value from the user end.
  • In the next step, "d, m, and s" is declared that calculates and stores values in its variable and at the last print, the method is used to print its value.
7 0
3 years ago
Other questions:
  • Emily is an aspiring lyricist. She wants to make a demo tape to send to recording companies. Which input device can she use to r
    5·1 answer
  • b. Suppose instead that Miller had written a routine to constantly change his assigned IP address to other addresses used by his
    8·1 answer
  • Information permanently stored on a hard disk, diskette, cd-rom disk, or tape, is called ________ storage.
    8·1 answer
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • How can you put a logo on html without breaching the copyright, design and patents act
    12·1 answer
  • What is the sum of each pair of binary integers? (assuming 8-bit register is used)
    5·1 answer
  • Over the last few years, security cameras and other devices have become more common. Some people argue that these measures viola
    14·2 answers
  • Which of the following is part of the cycle of dating violence
    8·1 answer
  • An automatic transmission is a mechanism that _
    7·1 answer
  • A group of students take hundreds of digital photos for a science project about weather patterns. Each photo file contains data
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!