A method called when an action is performed is known as a(n) __________ .

a) event listener
b) JButton method
c) event handler
d) action method


C) event handler

Computer Science & Information Technology

You might also like to view...

Describe three methods used by HTTP/2 intended to decrease latency and provide for quicker loading of web pages in browsers.

1. Single Constant Connection. 2. Multiplexing. 3. Prioritization. 4. Compression. 5. Server Push. 6. Binary.

Computer Science & Information Technology

What is an area of space on the desktop called?

A) window B) charm C) directory D) thumbnail

Computer Science & Information Technology

In a table relationship, the ____ option requires Access to change the appropriate foreign key values in the related table when the primary key value is changed in the primary table.

A. Edit Relationships B. Enforce Referential Integrity C. Cascade Delete Related Records D. Cascade Update Related Fields

Computer Science & Information Technology

A value added network can detect and reject transactions by unauthorized trading partners.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology