1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
6

The set of Visual Basic instructions that tells an object how to behave after an action by the user (such as clicking a button)

is referred to as a(n) _________.
Computers and Technology
1 answer:
alexdok [17]3 years ago
7 0

Answer:

Event procedure

Explanation:

Whenever a user perform certain action, such as press a button on the keyboard or click the mouse, etc. such action are called an event. when an event occurs, Visual Basic looks for BASIC instructions to tell the object in the program how to behave to the user event. The Visual Basic instructions that responds to this specific event is called an event procedure.

You might be interested in
Which of the following is an example of batch processing?
9966 [12]

Answer:

several personnel accessing the registration system

Explanation:

batch processing is all about multiprogramming so I think the first answer is the best as it is not based on one person .I know the last answer might be almost close but on a closer look it is not the answer as it is single based as written a file

7 0
3 years ago
Drag each tile to the correct box.
Arte-miy333 [17]

Answer:

Explanation:

web server= stores text, images, and other media that make up a website

email server= stores and exchanges messages

Proxy server= filters content and stores data for faster access

FTP server= stores and provides files for download

7 0
2 years ago
Read 2 more answers
How to get administrator privileges on windows 7?
Phoenix [80]
If you are on the admin account, you will already have them, but if you are on a different account, it's pretty impossible But you can get through by using command prompt.
4 0
3 years ago
One of the ways attackers can access unencrypted data being transmitted on your network is by
nikdorinn [45]
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
5 0
2 years ago
________ is the information about a file.
GalinKa [24]
Properties is the information about the file
4 0
2 years ago
Other questions:
  • A set of communication rules for the computer to follow is called, what?
    10·2 answers
  • How can investors receive compounding returns? A: by selecting a savings account that has a higher interest rate B: by investing
    9·2 answers
  • List at least three benefits of automated testing?
    13·1 answer
  • Describe five different ways databases can be processed
    14·1 answer
  • Which decimal number is equivalent to this hexadecimal number?<br> F8
    6·2 answers
  • To provide for unobtrusive validation, you can install the ____________________ package for unobtrusive validation.
    11·1 answer
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • Compare gigabytes GB, kilobytes and terabytes.​
    11·1 answer
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    8·1 answer
  • If a while loop iterates forever,what is the most likely cause?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!