1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
10

In an event-driven program, you design the screens, define the objects, and define how the screens will connect.

Computers and Technology
1 answer:
Nat2105 [25]3 years ago
3 0

Answer:

True.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

One of the most important steps in the software development life cycle (SDLC) is design. It is the third step of SDLC and comes immediately after the analysis stage.

Basically, the design phase is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.

Hence, in an event-driven program, the software developer design the screens, define the objects to be used, and define how the screens will connect to other sources or resources.

You might be interested in
Why do mosquitoes lay eggs in water​
d1i1m1o1n [39]

Answer: Some species of mosquitoes lay their eggs on water or on vegetation very near to water because their larval instars are aquatic. Thus, when the eggs hatch the first instar larvae will already be in the larval media. Some species of Aedes mosquitoes lay their drought resistant eggs on the soil of dried up playa lake beds. When it rains, the moisture will serve as a hatching stimulus and the eggs will hatch and spend their larval instars in the pools of rainfall. Other mosquito female will lay their eggs in the water of plant axils, tree holes and related plant habitats. In each of these instances, the immature mosquito instars require water in larval development and molt into adult insects.

hope it helps you

3 0
3 years ago
Read 2 more answers
Complete the statement using the correct term.
vladimir1956 [14]

The BODY of the site is what will be displayed on the web page. It contains most of the distinctive content of the web page.

A web page refers to a document exhibited by the browser, which is generally written in the HTML language.

The body of a web page is a big area in the center that contains the most important and distinctive content of a web page.

The body will determine the central content of the HTML document, which will be observable on the web page (e.g., a photo gallery).

Learn more about a web page here:

brainly.com/question/16515023

5 0
3 years ago
The commands available from a menu may change as a result of a user's actions.
kiruha [24]
True. Say we have 3 options and the three options are: create a text file, move the text file and rename the text file. But the user wants to delete the file. But he can't because there is no option for deletion. So his best option is to move the text file to another folder. To at least get it out of the way.
8 0
3 years ago
______ is the software that blocks a user from being able to access your computer.
gavmur [86]
This would be your firewall

3 0
4 years ago
Read 2 more answers
Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
Zanzabum

Answer:

/*

Student: Hugo Meza

Date: February 15, 2019

Description: This program mimic the cat command from Linux. Checks whether the source file

has the right permissions, and then writes in the console its content.

*/

#include <stdio.h>

#include <fcntl.h>

#include <unistd.h>

#include <errno.h>

int hasPermission(char *filepath){

int returnval;

// Check file existence

returnval = access (filepath, F_OK);

if(errno == ENOENT){

printf ("%s does not exist\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n", filepath);

return 0;

}

// Check read access

returnval = access (filepath, R_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

// Check write access

returnval = access (filepath, W_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

return 1;

}

int main(int argc, char* argv[]){

if(!argv[1]){

printf("Error. Specify file to open\n");

return 0;

}

int fd;

char *fp = argv[1], content[fd];

if(hasPermission(fp) == 0)

return 1;

fd = open(fp, O_RDONLY);

int bytes = read(fd,content,sizeof(content)-1);

write(1, content, bytes);

close(fd);

return 0;

}

Explanation:

7 0
3 years ago
Other questions:
  • If people have humility, they don’t tend to see themselves as overly or more important than others. True False
    13·1 answer
  • Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
    5·1 answer
  • In order for you to make a wireless connection it must first find an availble
    8·1 answer
  • g You need to build a circuit to perform parallel data transfers from one set of registers to another. The interconnections betw
    6·2 answers
  • Conduct online research on web authentication and define what it is. Describe different authentication methods
    5·1 answer
  • Where could an identity theft access your personal information?
    9·2 answers
  • Write a c++ application that computes gross salary for Mr.A,given that during the interview session and before started work, it
    5·1 answer
  • Your mom calls you. She is creating a book of poetry. Many of these poems only take up the first half of a document . She asks i
    10·2 answers
  • Can. you please help me with this ​
    12·1 answer
  • Yahoo Messenger is an example of a/an __________ service on the Internet.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!