To notify the browser that we have JavaScript code, we should use .............

Answers

Answer 1

Answer:

almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console


Related Questions

The hard disk that is mounted inside the system unit sometimes is called a(n) ____________________ disk because it is not portable.

Answers

Answer:

Permadisk

Explanation:

A two-dimensional array arr is to be created with the following contents. Boolean[][] arr = {{false, true, false}, {false, false, true}};

Answers

The code segment that can be used to correctly create and initialize arr  is:

boolean arr[][] = new boolean[2][3];arr[0][1] = true;arr[1][2] = true;

What is two-dimensional array?

A two-dimensional array is known to be very similar to one-dimensional array.

It  is one that can be visualized as a grid or table that is made up of rows and columns.

Note that in the above statement, The code segment that can be used to correctly create and initialize arr  is:

boolean arr[][] = new boolean[2][3];arr[0][1] = true;arr[1][2] = true;  is correct.

See full question below

A two-dimensional array arr is to be created with the following contents. Boolean[][] arr = {{false, true, false}, {false, false, true}};

Which of the following code segments can be used to correctly create and initialize arr ?

boolean arr[][] = new boolean[2][3];

arr[0][1] = true;

arr[1][2] = true;

Learn more about  two-dimensional array  from

https://brainly.com/question/26104158

#SPJ1

The code section that may be used to successfully create and initialize arr is:boolean arr[][] = new boolean[2][3]; arr [0][1] = true . arr[ 1][2]=true;

What is a two-dimensional array?

A two-dimensional array is understood to be very much like a one-dimensional array. It is one that may be visualized as a grid or desk this is made of rows and columns.

Note that withinside the above statement, The code section that may be used to successfully create and initialize array is:

boolean arr[][] = new boolean[2][3];arr[O][1] = true Irr[1][2] = truue

Read more about the array :

https://brainly.com/question/24275089

#SPJ4

What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service

Answers

Answer:

code injection

Explanation:

Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.

Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)

Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)

Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests

Type the correct answer in the box. Spell all words correctly.
What text results in variable whitespace?
[blank] text results in variable whitespace

Answers

The option that explains the term above is that Fully justified text results in variable whitespace.

What is meant by whitespace?

The Definition of the term white space is known to be the areas or parts of a page that do not have print or pictures.

Therefore, we can say that The option that explains the term above is that Fully justified text results in variable whitespace.

Learn more about whitespace from

https://brainly.com/question/11902037

#SPJ1

A friend of Alex has gifted a movie collection, and Alex is excited to watch them all as quickly as possible. The duration of the movies is given in array durations[n], where n is the number of movies, and each movie duration lies between 1.01 and 3.00 units of time (up to two decimal places). Every day, Alex wants to spend no more than 3.00 units of time watching the movies but also wants to complete the movies in the least number of days possible. Alex does not leave a movie in between. That is, if Alex has picked up a movie, Alex watches the complete movie on the same day. Find the minimum number of days needed to watch all the movies.

Answers

To find out the duration of alex's movies, you can use the code in C++ to make this calculation, where you will only need the number of movies and their duration, as well:

Writing code in C++:

#include<bits/stdc++.h>

using namespace std;

struct Movie {

  int timeBegin, duration, timeEnd;

  bool operator<(const Movie& another) const {

     return timeEnd < another.timeEnd;

  }

};

struct Festival {

  int count;

  vector<Movie> movies;

};

Festival* initialize(int timeBegin[], int duration[], int count) {

  Festival* filmFestival = new Festival;

  filmFestival->count = count;

  for (int i = 0; i < count; i++) {

     Movie temp;

     temp.timeBegin = timeBegin[i];

     temp.duration = duration[i];

     temp.timeEnd = timeBegin[i] + duration[i];

     filmFestival->movies.push_back(temp);

  }

  return filmFestival;

}

int solve(Festival* fest) {

  int res = 0;

  sort(fest->movies.begin(), fest->movies.end());

  int timeEnd = -1;

  for (int i = 0; i < fest->count; i++) {

     if (fest->movies[i].timeBegin >= timeEnd) {

        res++;

           timeEnd = fest->movies[i].timeEnd;

     }

  }

  return res;

}

int main(int argc, char *argv[]) {

int timeBegin[] = {1, 3, 0, 5, 5, 8, 8};

int duration[] = {3, 2, 2, 4, 3, 2, 3};

Festival * fest;

fest = initialize(timeBegin,duration, 7);

cout << solve(fest) << endl;

return 0;

}

See more about C Code at brainly.com/question/17544466

#SPJ1

which is a key component to participating in a school-to-work program?

Answers

The key component to participating in a school-to-work program is known as Job shadows.

What are job shadows?

Job shadowing is known to be a kind of on-the-job training that gives room for an interested employee to follow closely an see or analyze another employee carrying out the work.

Therefore, one can say that the key component to participating in a school-to-work program is known as Job shadows.

Learn more about School from

https://brainly.com/question/2474525

#SPJ1


What is the best approach when time is a constraint in a project?

Answers

Answer:

Time: The schedule for the project to reach completion Basically, the Triple Constraint states that the success of the project is impacted by its costs, time, and scope. As a project manager, you can keep control of the triple constraint by balancing these three constraints through trade-offs.

Explanation:

Which example best demonstrates an impact of computers on the economy?

Answers

Due to the student bulling another student on social media. social media has to do with computing

Explanation:

bad eyesight

students distraction

lack of concentration

A user in a small office environment explains to you that his office implements a small Microsoft workgroup. Users commonly share folders with each other. Which access control model is represented in this example

Answers

65 DAC is the access control model is represented in the example where a user explains to you that his office implements a small Microsoft workgroup.

What is DAC?

DAC is a Microsoft dynamic access control is a tool for governing data in Windows server 2012. It helps in administering the access control settings of the device.

Thus, 65 DAC is the model that is used to represent the example in which a user explains to you that his office implements a small Microsoft workgroup.

Learn more about DAC

https://brainly.com/question/20216206

#SPJ1

Who invented Napier's Bones and when? Write its functions. field of comm​

Answers

Explanation:

Napier's Bone was invented by Scottish mathematician John Napier in 1617 AD.... It's function is that it was very useful for finding multiplication at that time...

Write a one register parameter procedure that converts an ASCII digit in AL to its corresponding binary value. If AL already contains a binary value (00h to 09h), then leave AL unchanged. In either case the procedure clears the zero flag. If the value in AL is neither an ASCII digit nor a binary digit then the procedure sets the zero flag.Write a program to test the procedure.

Answers

Using the parameter to convert a digital ASCII code into AL we have that it will be necessary to recognize this code and the input values, in this way:

Writing this code, we have:

data segment

”ENTER ANY VALUE”

start:

movah,9

int21h

movah,4ch

int21h

movah,1

subal,30h

endstart

In this case the values ​​that must be put in this code are:

enter any ASCII value will be 5

See more about ASCII at brainly.com/question/17147612

#SPJ4

The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a

Answers

The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.

What is TCP/IP protocol suite?

The TCP/IP protocol suite is known as the Internet Protocol Suite (IPS), this is because it is said to receives from the layer above in form of data, and places its own header in front  of it.

Therefore, The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.

Learn more about Internet Protocol from

https://brainly.com/question/17820678

#SPJ4

Which statement best describes the Tell Me feature in PowerPoint 2016?
OIt is primarily used to locate options in the menu.
OIt provides detailed information about particular tasks within the program.
O It automatically sets up new slide templates that are commonly used.
O It opens a search field that can be used to look up old versions of presentations.

Answers

A statement best describes the Tell Me feature in PowerPoint 2016 is that: D. it opens a search field that can be used to look up old versions of presentations.

What is PowerPoint 2016?

PowerPoint 2016 refers to a software application that was designed and developed by Microsoft Inc., so as to avail its end users the ability to create various slides which can be used during a presentation.

In PowerPoint 2016, the Tell Me feature is a tool which opens a search field that can be used by end users to look up or search old versions of presentations.

Read more on PowerPoint here: https://brainly.com/question/26404012

#SPJ1

Which is a best practice that can prevent viruses and other malicious code from being downloaded.

Answers

A best practice that can prevent viruses from being downloaded is by not clicking on links in graphic email messages

How to prevent virus or malicious codes?

Virus and malicious codes can be installed on a computer through several ways, which include:

Not using an antivirus on the computerClicking on untrusted links in graphic email messagesInsecure downloads

The above can be prevented by

Installing a genuine antivirusNot clicking on trusted linksAccessing sites with secured downloads

Read more about virus at:

https://brainly.com/question/12543839

#SPJ1

A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.

Answers

The option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

What is OSPF about?

The OSPF is known to be called an open Shortest Path First protocol.

It belongs to the family of IP Routing protocols as it serves as  Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

See full question below

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.

Shared data

Low overhead, fast convergence

Stability

Multi-vendor routers

Learn more about OSPF  from

https://brainly.com/question/14604232

#SPJ1

Complete the sentence.
_____storage is not recommended for long-term archiving because the storage media can degrade over time.
Optical
P/E
Hard drive
RAID

Answers

The Hard drive storage is not recommended for long-term archiving because the storage media can degrade over time.

What is Long-term archiving?

Long-term archiving is known to be the act of  getting data, that are long-term in terms of accessibility and intelligibility.

Therefore, The Hard drive storage is not recommended for long-term archiving because the storage media can degrade over time.

Learn more about  Storage from

https://brainly.com/question/24227720

#SPJ1

The direction of a ratchet is reversed by _______________________.

Answers

Answer:

You can reverse the direction of a ratchet by hitting with an equal or higher amount of force it came at you with.

Explanation:

84.6% complete question a network administrator is installing a device that uses redundant array of independent disks (raid) technologies for redundancy and provides employees remote access so that files can be accessed anywhere. the device does not require licensing and stores data at the file level. which device is the employee likely installing in the infrastructure

Answers

The device that this network administrator is most likely installing in the infrastructure is a Network Attached Storage (NAS).

What is a Network Attached Storage (NAS)?

A Network Attached Storage (NAS) can be defined as a file-dedicated storage device that is designed and developed to enable multiple end users and other heterogeneous client devices to store, share and retrieve data anywhere from a centralized disk, especially through a network.

In this context, we can infer and logically conclude that a Network Attached Storage (NAS) is the device that this network administrator is most likely installing in the infrastructure because it doesn't require licensing and the data stored on it at the file level can be accessed anywhere.

Read more on Network Attached Storage here: https://brainly.com/question/14456295

#SPJ1

4. fill in the empty function so that it returns the sum of all the divisors of a number, without includi
a number that divides into another without a remainder.
def sum_divisors (n):
sum = 0
# return the sum of all divisors of n, not including
return sum
print (sum_divisors (0))
# 0
8
print (sum_divisors (3)) # should sum of 1
# 1
i
10
print (sum_divisors (36)) # should sum of 1+2+3+4+6+9+12+18
11
# 55
12
print (sum_divisors (102)) # should be sum of 2+3+6+17+34+51
# 114
13
14
12345678

Answers

Using the python language we have that it will be possible to write a code that sums all possible divisors of a number.

Writing the code we have;

def sum_ divisors(n):

  s = 0

  for i in range(1, n):

       if n%i == 0:

           s += i

  return i

See more about python at brainly.com/question/18502436

#SPJ1

One of your team members works long hours and behaves very formally, especially when the manager is around. this
team member is likely to be from . select 2 options.
-the united states
-norway
-sweden
- china
-japan

Answers

Based on the given scenario, team member is likely to be from:

ChinaJapan

What is a formal behavior?

A Formal speech or behavior is known to be a  very serious one instead of one been relaxed or friendly.

Note that this is often used in official situations and Based on the given scenario, team member is likely to be from China and Japan because their way of life and relating to business conduct is always straight to the point, serious and no jokes.

Learn more about formal behavior from

https://brainly.com/question/8838403

#SPJ2

You are running a Python script that is supposed to write data to an open file, but discover that the file contents are not updating even after the script finishes. What is most likely the issue

Answers

Based on the Python script the most likely the issue is that The file was not closed using the close() method.

What is the close() method?

The close() method is known  to be a kind of Reader Class that is seen in Java.

Note that it is one that is used to enclose  any stream and bring out the resources that are said to be busy in the stream.

Therefore, Based on the Python script the most likely the issue is that The file was not closed using the close() method.

Learn more about Python script from

https://brainly.com/question/26497128

#SPJ2

You saved your style options as "webstyle.css" in a subfolder called "styles."

what line do you include in the head section of your html file to use your styles?







Answers

A line which should be included in the head section of a html file to use these styles is link rel="stylesheet" type="text/css" href="styles/webstyle.css"

What is HTML?

HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language that is used for designing, developing and creating websites or webpages.

In Cascaded style sheet (CSS), a line which should be included in the head section of a html file to use these styles is given by:

link rel="stylesheet" type="text/css" href="styles/webstyle.css"

Read more on HTML here: https://brainly.com/question/4056554

#SPJ1

The function ____ can check whether an expression meets the required conditions; if the conditions are not met, it terminates the program.

Answers

Answer:

assert()

Explanation:

The assert function takes a boolean as an input, and when true, it just continues the flow, however if false it prints an error and calls exit.

The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.

Answers

Answer:

As far as i know, it is Virtual Local Area Network (VLAN). You can read more about this here: https://en.wikipedia.org/wiki/VLAN

What is the acronym of COMPUTER​

Answers

Answer:

See Explanation

Explanation:

Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. So, in simple words you can say that computer is an electronic device which is used for fast calculation.

What does playstation network is currently undergoing maintenance?.

Answers

Answer:

it means it's being fixed and you need to wait till its done

Explanation:

Hope this helps

Pedro has written a program in a high-level language to do some calculations for a friend. His friend needs to use the program immediately on his laptop. Pedro does not know what software is available on the laptop. Also, his friend's internet connection is very slow. Explain which type of translator Pedro should use for his program. Give reasons why this is the best choice in this case.​

Answers

In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Why do you need to translate a program written in a high-level language into machine language?

Programming languages are known to be easy for humans to read and understand.

Note that The program (source code) need to be translated into machine language so that the computer can be able to carryout the program.

Therefore, In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Learn more about machine language from

https://brainly.com/question/23275071

#SPJ1

What type of computer should you consider purchasing if you want a portable system that is good for students and on-the-go professionals who want to create content and be productive, in addition to consuming content

Answers

Answer:

laptop

Explanation:

,.....................

C provides a data structure, the ___________, which stores a fixed-size sequential collection of elements of the same type.

Answers

Answer:

Array

Explanation:

The array is a data structure in C that can hold a predefined quantity of the same type of element in an ordered fashion, and can be defined with the following syntax: type name[amount] = {elements}; where type is the type (like int), amount is the capacity it should be defined at, name is what you want to name the array, and elements are a comma separated list of elements to initialize the array with. You can also change the values of elements by using this syntax: name[index] = newelement; where index is which index to change, and new element is what to set it to.

Which type of computer is used microprocessor​

Answers

Assuming you mean which type of computer uses a microprocessor the answer would be: A pc and/or microcomputer which use a single chip which is a microprocessor for their CPU (central processing unit)
Other Questions
what was the Internet ? when was it invented ? why is this such an important invention ? what was life like before it?help I will give brainlist Brainlist to the right answer :) calculate 20% of R400 In any triangle ABC, if c=30,b= 4, a=2 find A and B. Part g consider the melting points of sugar and salt, as well as the states of sugar, salt, and oil at room temperature. what can you conclude about the attractive forces between particles in the three substances? 2 cm enzyme enzyme bolled enzyme 1 1 pH 2 pH 7 pH 8 pH 11 of enzyme was added to test tube A, how much enzyme must added enzyme D Substratum is an open-source network that allows anyone to allocate spare computing resources to support the foundation of the decentralized web. SUB is the cryptocurrency that supports this network. On the 10th of January 2018, the price of SUB was $2.88 and on the 5th of April 2019 the price was $0.02. When rounded to one decimal place, which of the below gives the percentage decrease of the price of SUB from the 10th of Jan 2018 to the 5th of April 2019? Determine if the function is an even function, an odd function or neither. > = 6x 5x 2 even neither odd PLEASE HELP ASAP!Show how the length of day changes with latitude by plotting the following points. Use the table below as a graph and place an X in the box where you want to plot a data point. For example, if you find that a day is 10 hours long at 30 N latitude, represent this data with an X in the box where 10 hours meets 30 degrees. (You may use a graphing program like Excel if you prefer.) (on the grap the numbers going down on both sides are from, 24-0, at the bottom of both graphs it says, Latitude (in degrees) with the numbers, (0), (15), (30), (60),(75),(90)Please don't answer unless you have the FULL answer, do not answer just to answer, unless you actually know the answer. How much energy is wasted by a 10% efficient filament bulb with 5 J of input? Which of the events happened first?A. the founding of the Jamestown colonyB.Europeans using both tobacco and potatoesC.thousands of Native Americans dying from new diseasesD.Columbus landing in Hispaniola According to ________ theory, competence, autonomy, and relatedness are the primary motivations for behavior. Select the correct answer from each drop-down menu. y = f(x) = (1/2) ^ 5 Consider the function The value of f(- 7) is The value of f(5) rounded to the nearest ten thousandth, is A crane does exactly 1800 J of work to lift a steel beam from the ground. The beam is accidentally dropped and falls back to its starting position in 0.9 s. What is the mass of the beam At the stadium, there are eight lines for arriving customers, each staffed by a single worker. The arrival rate for customers is 190 per minute and each customer takes (on average) 2 seconds for a worker to process. The coefficient of variation for arrival time is 1.2 and the coefficient of variation for service time is 1.5. (1) How much time (in seconds) will an average customer spend in queue Read the dialogue from Act II, scene iv of Romeo and Juliet.Romeo: Thou wast never with me for anything when thou wast not here for the goose.Mercutio: I will bite thee by the ear for that jest.Romeo: Nay, good goose, bite not.Mercutio: Thy wit is a very bitter sweeting; it is a most sharp sauce.Romeo: And is it not then well served in to a sweet goose?reader understand the mood of the scene?bitter, because this is an angry conversationjest, because this is a teasing conversationserved, because this is a loving conversationbite, because this is a frightening conversation What happened to Robert Kennedy in Los Angeles? It is generally considered safe for a fetus in a woman who is pregnant to consume _______ oz. of alcohol per day. Will give brainliest if correct Mickey drew a scale drawing of the room in his junior high building using the scale 1 centimeter (cm) - 1.5 meters (m). the office in his scale drawing measured 2.6 cm * 3.2 cm. what are the actual dimensions of the office? 2.6 m x 3.2 m 1.7 m x 2.1 m 3.9 m x 4.8 m 4.1 m x 47 m