Question 2
An engineer is writing a web application that requires some user input. The engineer has put a submit button on their page and now needs a way for their program to recognize when the button has been clicked.
The engineer should add a(n) __________ to their JavaScript.
third-party API
event listener
else if statement
for loop

Answers

Answer 1

When the submit button is pressed, the engineer should add an event listener to their JavaScript. A JavaScript method called an event listener watches for a particular event to happen.

Can I add a JavaScript event listener to a button?

Any HTML DOM object, including HTML elements, the HTML document, the window object, and other objects that enable events, such as the xmlHttpRequest object, can have event listeners added using the addEventListener() method.

How can we add an event listener to JavaScript that is running in a browser?

The addEventListener method adds the function or object that implements EventListener to the EventTarget's list of event listeners for the supplied event type ().

To know more about JavaScript visit:-

https://brainly.com/question/28448181

#SPJ1


Related Questions

What are the dangers of having people manage social media accounts for companies? Explain

Answers

Answer:

in simple words having people manage social media accounts are pretty dangerous as we never know who is what and our right to privacy could be harmed by just another curious being

a ________ is also called the brain of the computer.

Answers

Answer:

central processing unit

Explanation:

I am the biggest and most important part of data storage hardware. I am about the size of a small book and store critical things like the OS, software titles, and other files. What am I?

A.
motherboard

B.
central processing unit (CPU)

C.
hard disk drive (HDD)

D.
power supply unit (PSU)

Answers

Answer:

Hard Disk Drive (HDD)

Explanation:

HDDs stores all the digital contents of a computer. These include documents, photos, videos, video games, programs, and software, etc; including the examples that were provided in the question.

can someone help me answer this ASAP. I’ll give a brainliest to whoever can answer correctly. Thanks :)

can someone help me answer this ASAP. Ill give a brainliest to whoever can answer correctly. Thanks :)

Answers

Answer: The correct answer is B




Explanation:

Atomic integers in Linux are useful when A) several variables are involved in a race condition. B) a single process access several variable involved in a race condition. C) an integer variable needs to be updated. D) All of the above.

Answers

Atomic integers in Linux are useful when  an integer variable needs to be updated.

What is an Atomic Integer?

This is known to be an applications that is said to be a form of an atomically incremented counters, and it is one which cannot be used as a kind of replacement for any Integer.

Therefore, Atomic integers in Linux are useful when  an integer variable needs to be updated.

Learn more about Atomic integers from

https://brainly.com/question/20515314

#SPJ1

What does this statement mean: ""The web is a stateless system."" What implications does a stateless system have for database application developers?

Answers

Hi! The statement "The web is a system" means that the web, by default, does not maintain information about users or their interactions between different requests. In a stateless system, each request to the server is treated as an independent transaction, without any knowledge of previous requests.

For application developers, a stateless system has the following implications:

1. Need for maintaining user sessions: Since the web is , developers need to implement mechanisms like cookies, tokens, or sessions to maintain user-specific data across multiple requests.

2. Increased reliance on databases: Stateless systems often rely on databases to store and retrieve user-specific data, as this data is not automatically maintained by the system itself.

3. Data consistency and concurrency: With multiple requests being treated independently, developers need to ensure data consistency and handle concurrent updates to the database effectively.

4. Scalability: systems are inherently more scalable, as they allow for more efficient load balancing and resource allocation. Developers should consider optimizing database operations for performance and scalability.

5. Security concerns: As user sessions and data are maintained through cookies, tokens, or other mechanisms, developers need to ensure the proper implementation of security measures to protect user data and maintain privacy.

Learn more about : https://brainly.com/question/31414764

#SPJ11

Check the devices that are external peripheral devices:

Check the devices that are external peripheral devices:

Answers

Answer:

Mouse, and keyboard

Explanation:

Common Sense

Your computer will organize files into _______ order.

A) Chronological
B) Size
C) No specific
D) Alphabetical
Brainliest for (CORRECT) answer

Answers

Answer:

c is the answer of the question

Answer:

A chronological

I'm sorry if I am wrong

PLZ PLZ PLZ HELP WILL MARK BRAINLIST What are the properties of RAM (Memory, Random Access Memory)?

Low speed, low storage

Low speed, high storage

High speed, low storage

High speed, high storage

Answers

High speed, low storage

Y’all know any movie sites I can go on?

Answers

Answer:

Tinseltown

Explanation:

Uploading Your Work
Assignment Upload: Using PowerPoint
Active
Instructions
Click the links to open the resources below. These resources will help you complete the assignment. Once you have created your
file(s) and are ready to upload your assignment, click the Add Files button below and select each file from your desktop or network
folder. Upload each file separately.
Your work will not be submitted to your teacher until you click Submit.
Documents
Uploading Your Work Directions
Clip Art and Media Clips Student Guide
Animations and Photo Albums Student Guide
Customizing SmartArt Graphics and Tables Student Guide

Don’t know how to do this and could really use some help please!!!!!!!

Answers

Answer:

Easy all you have to do is upload one assignment at a time and follow all the other directions!

Explanation:

_Hope_this_helps! >O<

How many times would the for loop below execute if variable times = 9 % 2?

for (int x=times; x <=times; x++) ?

1
0
2
3

Answers

Answer:

1

Explanation:

9 % 2 = 1

So x = 1

It will execute once

Go to iauditor website ->create username and password ->Create templates -> Filter by industry selection options -> Import and start inspection.
Instructions:
1) Answer yes, No ,N/A
2) Add photos and notes (any picture related you choose industry selection)
3) Add action or media related information
4) Digital Signature
5) Save your report in Pdf

Answers

Once you have created your account, you can then begin creating templates for your inspections. These templates will be used to guide your inspections, and you can create them to fit your specific needs.


To filter your templates by industry selection options, simply click on the “filter” button in the top right corner of the screen. This will bring up a list of all the available industry selection options, and you can select the one that best fits your needs.
In conclusion, the iAuditor website is an easy-to-use platform that allows you to conduct inspections of all types. With its user-friendly interface and advanced features, it is the perfect tool for anyone looking to streamline their inspection process.

To know more about account visit:

https://brainly.com/question/30977839

#SPJ11

an off-by-one error is an example of what type of error in programming? group of answer choices logic error syntax error type error input error

Answers

An off-by-one error is an example of a logic error in programming. A logic error is a mistake that occurs in the code that causes the program to behave unexpectedly.

These types of errors are difficult to find because the code will compile without errors and will often run without crashing. The program's output may not be the expected output, but there will be no obvious reason for the difference. An off-by-one error is a specific type of logic error that occurs when a programmer uses the wrong index value when iterating over an array or list.

Another common type of logic error is the infinite loop. An infinite loop occurs when a loop runs indefinitely because the programmer forgot to include a way to exit the loop. This can cause the program to crash or freeze, and it can be difficult to diagnose the problem because the program will appear to be stuck in an endless loop.

To know more about programming visit:

https://brainly.com/question/14368396

#SPJ11

Convert these denary numbers to binary

I’ll give Brainly please

Convert these denary numbers to binaryIll give Brainly please

Answers

Answer:

17 = 10001 . 62 = 111110      183 = 10110111 .      200 = 11001000

21= 10101 .     49= 110001

Explanation:

tell me if wrong

Please tell me what the mistake in this python code is ?

Birth_Year = input("What is your birth year")

if Birth_Year <= 2000:
print("Wow youre old")

if Birth_Year >= 1999:
print("lol youre still a baby")

Answers

The mistake in this Python code is that the input function returns a string, not an integer. Therefore, when you compare the value entered by the user to an integer (2000 or 1999), it will result in a TypeError.

To fix this, you can convert the input to an integer using the int() function. Here's the corrected code:

Birth_Year = int(input("What is your birth year? "))

if Birth_Year <= 2000:

   print("Wow, you're old.")

   

if Birth_Year >= 1999:

   print("lol, you're still a baby.")

Note that I've also added indentation to the print statements so they are executed only when the condition is true.

Answer:

Set the variable as an integer

Explanation:

You will need to set the question as an integer:

Birth_year = int(input("What is your birth year"))

This will ensure that the number placed in will become an integer, instead of a string

Recommend a minimum of 3 relevant tips for people using computers at home, work or school or on their SmartPhone. (or manufacturing related tools)

Answers

The three relevant tips for individuals using computers at home, work, school, or on their smartphones are ensure regular data backup, practice strong cybersecurity habits, and maintain good ergonomics.

1)Ensure Regular Data Backup: It is crucial to regularly back up important data to prevent loss in case of hardware failure, accidental deletion, or malware attacks.

Utilize external hard drives, cloud storage solutions, or backup software to create redundant copies of essential files.

Automated backup systems can simplify this process and provide peace of mind.

2)Practice Strong Cybersecurity Habits: Protecting personal information and devices from cyber threats is essential.

Use strong, unique passwords for each online account, enable two-factor authentication when available, and regularly update software and operating systems to patch security vulnerabilities.

Be cautious while clicking on email attachments, downloading files, or visiting suspicious websites.

Utilize reputable antivirus and anti-malware software to protect against potential threats.

3)Maintain Good Ergonomics: Spending extended periods in front of a computer or smartphone can strain the body.

Practice good ergonomics by ensuring proper posture, positioning the monitor at eye level, using an ergonomic keyboard and mouse, and taking regular breaks to stretch and rest your eyes.

Adjust chair height, desk setup, and screen brightness to reduce the risk of musculoskeletal problems and eye strain.

For more questions on computers

https://brainly.com/question/24540334

#SPJ8

Question 2 0 / 1 pts What is output by the following code? Select all that apply. c = 2 while (c < 12): print (c) c = c + 3

Answers

Answer:

c = 2

while (c < 12):

 print (c)

 c = c + 3

The output of the following code will be:

2

5

8

11

Explanation:

The code uses a while loop to print the value of the c variable, starting from 2, and then incrementing c by 3 on each iteration. The loop continues until c is greater than or equal to 12, at which point the loop stops and the program ends.

Therefore, the output will be the values of c on each iteration of the loop: 2, 5, 8, and 11. These values will be printed on separate lines.

Why should a user seek support when troubleshooting a computer problem is beyond his or her technical knowledge?.

Answers

Answer:

So as to avoid risk to the user and the machine

Explanation:

Which website most likely offers accurate, unbiased information that is relevant to research about serious efforts to reduce our dependence on foreign oil by addressing the way americans travel?.

Answers

The history of America's Booming Dessert Business; Museum of Culinary Arts; www.SCCuisineInstitute.org is the most likely website about the popularity of doughnuts in the United States.

What is a website?A website seems to be a collection of web pages related content identified by a common domain name and hosted on at least one web server. Websites are usually focused on a single topic or purpose, such as news, education, commerce, entertainment, or social networking.A website is a collection of web pages and associated content and data that is identified by a common place area call and hosted on at least one web server.The website is an internet-connected server where users can find whatever they are looking for. It is used all over the world for financial management, selling products, selling services, saving money, and so on.

To learn more about website refer to :

https://brainly.com/question/28431103

#SPJ4

following statements is true or false?
(1)Let L be a CFL, M a regular language, and w a string. Then the problem of determining
w ∈ L ∩M is solvable
(2) Let L be a CFL, M a regular language, and w a string. Then the problem of determining
w ∈ L ∪M is not solvable.
(3) Let Σ be an alphabet. Then there are only finitely many languages over Σ.
(4) A DFA M accepts the empty string iff its initial state is an accepting state.

Answers

(1) False: The problem of determining whether a string w belongs to the intersection of a context-free language (CFL) L and a regular language M is undecidable in general. The intersection of a CFL and a regular language is not guaranteed to be a CFL. While the intersection of a regular language and a CFL can be a CFL, determining membership in this intersection is not solvable in general.

(2) False: The problem of determining whether a string w belongs to the union of a CFL L and a regular language M is solvable. The union of a CFL and a regular language is always a CFL. To determine if w belongs to L ∪ M, we can simply check if w is accepted by either the CFL L or the regular language M.

(3) False: There are infinitely many languages over any non-empty alphabet Σ. The set of all possible subsets of Σ, including the empty set and the set containing all elements of Σ, forms an infinite collection of languages. Additionally, for any language L over Σ, the complement of L (the set of all strings over Σ that are not in L) is also a language over Σ. Therefore, the set of languages over Σ is infinite.

(4) True: A deterministic finite automaton (DFA) accepts the empty string (ε) if and only if its initial state is an accepting state. The DFA starts in its initial state and reads the empty string. Since there are no input symbols to process, the DFA remains in its initial state. If the initial state is an accepting state, then the empty string is accepted; otherwise, it is not accepted. This property holds for all DFAs.

Learn more about Context-Free Language :

https://brainly.com/question/29762238

#SPJ11

Edhesive 4.2 question 2 answers

Answers

Answer:

total=0

pet=input("what pet do you have? ")

while pet!= "rock":

   total=total+1

   print("you have a "+pet+" with a total of "+ str(total)+ " pet(s)")

   pet=input("What pet do you have? ")

Explanation: Just copy and paste above again just copy and paste this will get you a 100 percent i made another account just to give yall edhesive answers if yall need help with any edhesive just comment below

uses of Hexadecimal numbers.​

Answers

Explanation:

Hex codes are used in many areas of computing to simplify binary codes. It is important to note that computers do not use hexadecimal - it is used by humans to shorten binary to a more easily understandable form. Hexadecimal is translated into binary for computer use.

32.
are also known as cyber burglars.
a. Hackers
b. Programmers
c. Software Engineers d. Crackers.
Page 3 of 4​

Answers

Answer:

a

Explanation:

hackers access your system unauthorized

______ is a human-readable text format for data interchange that defines attributes and values in a document.

Answers

Answer:

JavaScripts Object Notation (JSON)

Explanation:

Linux operating systems should not be modified once the installation is complete.

Answers

Linux operating systems are designed to be highly customizable and flexible, allowing users to tailor their system to their specific needs. However, it is generally not recommended to modify the core components of the operating system once the installation is complete. This is because any modifications to the system can potentially introduce instability or security vulnerabilities, and can also make it more difficult to receive updates and support from the Linux community.

Instead, users should focus on installing additional software packages or customizing the user interface without making fundamental changes to the underlying operating system. It is also important to keep the system up-to-date with security patches and software updates, which can help to mitigate any potential vulnerabilities or issues. Overall, while Linux offers a high degree of flexibility, it is important to use caution when making modifications to ensure the stability and security of the system.

It's important to clarify that the statement "Linux operating systems should not be modified once the installation is complete" is not entirely accurate. In fact, Linux systems are designed to be flexible and customizable, allowing users to modify, update, and enhance them as needed. This can be done through package management systems, software updates, security patches, and system configuration adjustments, all of which contribute to the ongoing maintenance and improvement of a Linux operating system.

To know more about Linux operating systems visit:-

https://brainly.com/question/29798420

#SPJ11

Which computing component is similar to the human brain

Answers

THE CPU ,THERE IS WERE ALL THE INFORMATION IS.

Describa la clasificación de los recursos educativos digitales abiertos. vea este video, para hacer eso

Answers

hola una pregunta dónde está el vídeo ?

hola una pregunta dónde está el vídeo ?

Is the logical value true treated the same as a text string true?

Answers

No, the logical value true is not treated the same as a text string true. A logical value true is a boolean value which indicates a strong affirmative answer or a state of being true.

What is  boolean value ?

A Boolean value is a type of data which can take one of two possible values, either TRUE or FALSE. It is usually used to represent binary states, such as whether a certain condition is true or false. Boolean values are often used in programming languages to determine if something is true or false, and to control the flow of a computer program. Boolean values are also used in databases and other applications to determine whether certain criteria have been met. Boolean values are essential in creating logic in computer programs and in developing algorithmic solutions to various problems.

A text string true is simply a string of text that says the word "true." The two values are not interchangeable and have different meanings.

To learn more about boolean value
https://brainly.com/question/26041371
#SPJ4

Match each of the following terms to its definition:
I. field
II. database
III. record
IV. table
V. primary key
A. a group of related fields
B. a category of information in a database
C. a collection of related data that can be stored, sorted, organized, and queried
D. a field that has a value unique to each record
E. a group of related records

Answers

I. field - B. a category of information in a database

II. database - C. a collection of related data that can be stored, sorted, organized, and queried

III. record - E. a group of related records

IV. table - A. a group of related fields

V. primary key - D. a field that has a value unique to each record

Match the following terms to their definitions: I. field, II. database, III. record, IV. table, V. primary key.

I. field - B. a category of information in a database

A field refers to a category of information in a database. It represents a specific attribute or data element within a record. For example, in a database of employee records, fields could include attributes like employee ID, name, age, and department.

II. database - C. a collection of related data that can be stored, sorted, organized, and queried

A database is a structured collection of related data that can be stored, managed, and accessed. It provides a systematic way of organizing and storing information, allowing for efficient data retrieval, sorting, and querying.

III. record - E. a group of related records

A record is a collection of related data items or fields that are grouped together. It represents a complete set of information about a particular entity or object. In a database, multiple records make up a table, and each record contains specific data values for each field.

IV. table - A. a group of related fields

A table is a structured representation of data in a database. It consists of rows and columns, where each row represents a record, and each column represents a field or attribute. Tables are used to organize and store data in a tabular format, making it easy to manage and retrieve information.

V. primary key - D. a field that has a value unique to each record

A primary key is a field or combination of fields that uniquely identifies each record in a table. It ensures that each record has a unique identifier, and no two records can have the same primary key value. Primary keys are used to establish relationships between tables and maintain data integrity.

Therefore, the matching definitions are:

I. field - B

II. database - C

III. record - E

IV. table - A

V. primary key - D

Learn more about database

brainly.com/question/30163202

#SPJ11

Other Questions
The coordinates of point P are =???? Help plsI need the slope of the line 1 and 2 why was the supreme courts decision in the case of plessy v. ferguson important? which of the highlighted answers are true The _______ can determine whether the president exceeded the scope of inherent powers. A specimen suspected of containing which organism may be cultured by placing it on an agar plate with an overlay growth of Escherichia coli?A. Entamoeba coliB. Schistosoma japonicumC. Acanthamoeba speciesD. Taenia species HELP PLSA) 16B) -4C) -16 I need to find the area please help What tools would u bring if u were lost in forest to survive? Element x decays radioactively with a half life of 12 minutes. if there are 580 gramsof element x, how long, to the nearest tenth of a minute, would it take the element todecay to 68 grams? What is the required length for the documented summary?100-150 words200-250 words300-350 words400-450 words the obstetrical nurse is caring for a client who has been treated for gestational diabetes. when teaching the client about the causes of gestational diabetes, the nurse should include which risk factor in the teaching? What, in your view, was the most important reform made by Ataturk? Explain why. Which of the following evidence was used by the american temperance society in the excerpt to explain why people would join the temperance movement?. A high efficiency furnaces main burner shuts off after initial ignitionWhich part should be tested?Flame sensorExpansion valveSolenoid valveGas valveA toilet is cycling on and off, and the tank is refilling every few minutes. What should you check first?1) flush valve2) fill valve3) flapper4) handle5) overflow tube Is it possible that assignment of observations to clusters does not change between successive iterations in k-means if f(x)=^2-81andg(x) helena has been particularly resistant to the new restructuring where she works. her department is now slightly smaller than it was before, and she feels that this will give her less influence in the company. helena's resistance is based on . a.threatened self-interest b.different perceptions c.feelings of loss d.uncertainty Polygon ABCD has vertices A(1,3), B(1,6), C(4,6), and D(5,2) The graph of a function f is shown below.Find one value of x for which f(x) = 1 and find f(-1)