Fill in the code in the underlined location to display the mouse point location when the mouse is pressed in the pane.

```
import javafx.application.Application;
import javafx.scene.Scene;
import javafx.scene.layout.Pane;
import javafx.stage.Stage;

public class Test extends Application {
@Override // Override the start method in the Application class
public void start(Stage primaryStage) {
Pane pane = new Pane();
______________________________________

Scene scene = new Scene(pane, 200, 250);
primaryStage.setTitle("Test"); // Set the stage title
primaryStage.setScene(scene); // Place the scene in the stage
primaryStage.show(); // Display the stage
}

/**
* The main method is only needed for the IDE with limited JavaFX
* support. Not needed for running from the command line.
*/
public static void main(String[] args) {
launch(args);
}
}
a. pane.setOnMouseClicked((e) -> System.out.println(e.getX() + ", " + e.getY()));
b. pane.setOnMouseReleased(e -> {System.out.println(e.getX() + ", " + e.getY())});
c. pane.setOnMousePressed(e -> System.out.println(e.getX() + ", " + e.getY()));
d. pane.setOnMouseDragged((e) -> System.out.println(e.getX() + ", " + e.getY()));
```


```
c. pane.setOnMousePressed(e -> System.out.println(e.getX() + ", " + e.getY()));
```

Computer Science & Information Technology

You might also like to view...

Which of the statements below will create the String r1 = "JAVA: How to Program"?

Consider the statements below: ``` String a = "JAVA: "; String b = "How to "; String c = "Program"; ``` a. String r1 = c.concat(b.concat(a)); b. String r1 = a.concat(b.concat(c)); c. String r1 = b.concat(c.concat(a)); d. String r1 = c.concat(c.concat(b));

Computer Science & Information Technology

The Office Clipboard is a temporary storage area

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following commands is used for a DHCP server to list the configured range of IP addresses and statistics for the number of leased addresses?

A) show ip dhcp binding B) show ip dhcp pool C) show ip dhcp network D) show ip dhcp range

Computer Science & Information Technology

The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:

A. business continuity planning B. disaster planning C. business management planning D. enterprise disaster planning

Computer Science & Information Technology