1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
2 years ago
15

“Click” is a type of user input the onEvent code checks for in order to perform actions like going to another screen. List at le

ast 3 other user inputs onEvent can check for.
Computers and Technology
1 answer:
Sidana [21]2 years ago
5 0

Answer:

typing, commands, scrolling. hope this helps

You might be interested in
No production Web application, whether it resides inside or outside of the firewall, should be implemented without:
Alona [7]

Answer:

Stay ahead of threats with machine learning-based WAF protection! Learn more today. Integrate application security and application delivery to protect your network. 100% Privacy. Keep Costs Down. Business Continuity. Maximum Productivity. Types: DDoS Protection

WELCOME

5 0
3 years ago
Let x = ["Red", 2.55,"Green", 3,"Black","false"], then solve the following:
blagie [28]

Answer:

  • Print(x) would be directly calling the x variable so it would print everything but the []
  • Print(x[10]) is calling the number 10 which results in E
  • 2 + d= 2d

3 0
3 years ago
A _____ is a network that uses multiple access points to link a series of devices that speak to each other to form a network con
morpeh [17]
I think the answer is WAN (wide area network)
6 0
3 years ago
Explain the concept of risk management, including risk identification, assessment, and control.
abruzzese [7]

Answer:

Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .

  • Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
  • Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
  • Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.  

7 0
3 years ago
Which is NOT a way the network operating sys-
irakobra [83]

Answer: A user authentication

3 0
3 years ago
Other questions:
  • Assume that getPlayer2Move works as specified, regardless of what you wrote in part (a) . You must use getPlayer1Move and getPla
    14·1 answer
  • How many people watch Anime in the world?
    15·2 answers
  • You will write a program that reads a binary file that contains records of creatures. Each record can be stored in a Creature st
    10·1 answer
  • 1. Which plot element is typically the turning point and the most intense moment of a story? (1 point)
    11·2 answers
  • What is the relationship between ionic bonds and cleavage
    13·1 answer
  • Your program is going to compare the distinct salaries of two individuals for the last 5 years. If the salary for the two indivi
    15·1 answer
  • . Which of the following is NOT an option for increasinghard drive storage space?
    6·1 answer
  • List the five parts of a system.describe them.
    13·1 answer
  • Which term describes a visual object such as a picture a table or text box
    15·2 answers
  • Es costoso construir un robot
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!