a. Configure an alert message to pop up using Javascript when the page is displayed in the browser. Edit the body tag as follows: . The onload event handler in this case pops up an alert message. b. Add a script block to the head section as follows:
Q: Show how a decision table is used to make test cases.
A: A decision table is a tool used in both software testing and system analysis. It helps in modeling…
Q: Is StuffDOT working on anything new to make their site more user-friendly?
A: User-friendly design is essential for any website. This typically involves making the website easy…
Q: Possible benefits to functionality and reach are discussed. Provide an explanation that…
A: When discussing the possible benefits to functionality and reach of a project, it's important to…
Q: Does Direct Memory Access (DMA) lead to greater system concurrency? Is there an impact on the…
A: Direct Memory Access (DMA) is a technique that allows specific hardware subsystems in a computer to…
Q: Understanding system processor interactions helps find multiprocessor architectures.
A: The Answer is in given below steps
Q: What precautions could be taken to mitigate the hazards associated with corporate networking?…
A: In this question we have to understand What precautions could be taken to mitigate the hazards…
Q: Scalar and superscalar CPUs are examples. Processing superscalar data is time-consuming. The…
A: The statement you provided seems to be a combination of unrelated information about scalar and…
Q: Asynchronous or synchronous CPU/memory bus? 24/7 bus? Explain.
A: The CPU/memory bus refers to the communication pathway between the central processing unit (CPU) and…
Q: How has the technology that supports networking gear evolved, and what are the benefits and…
A: Equipment was rudimentary in the nascent networking stages, typically confined to LAN (Local Area…
Q: Throughout the course of the semester, we studied SDLC and methodological variations. What does the…
A: The Software Development Life Cycle, sometimes known as the SDLC, is a cycle framework that…
Q: Comparing software testing techniques to determine their advantages and disadvantages. Can software…
A: Software difficult techniques ensure software application functionality is correct and performs as…
Q: Is there a tried-and-true method for securing dependable API software licenses? You must provide…
A: Securing dependable API software licenses is crucial for businesses to ensure legal compliance,…
Q: To simply call a variable a "type" is not sufficient. Data types are one of the distinguishing…
A: Your answer is given below.
Q: There are two ways in which operating systems will be impacted by resource virtualization.
A: In this question we have to understand and explain two ways in which operating systems will be…
Q: 1. Given the BST tree below, fill in the values in the table. 0002 0005 0005 Height of tree 0017…
A: We are given a BST (Binary Search Tree) tree and we are asked few questions related to it.In BST,…
Q: 2. Explain to your boss in detail how to create a disk mount named /data with 2TB of disk space…
A: The first step in create a disk mount name /data with 2TB of floppy space is partitioning the…
Q: Prior studies are evaluated using SLRs. There is a need for methodical research, analysis, and…
A: Systematic Literature Reviews (SLRs) have emerge as a powerful tool in evidence-based research.…
Q: A "multifactor authentication" system must elucidate its function. What level of protection does it…
A: Multifactor authentication (MFA) is a security measure that adds an extra layer of protection to the…
Q: Physical presence is a defining feature of offline communities. Which areas do you find to be the…
A: Offline communities are marked by their inherent physicality, presenting distinctive features that…
Q: Who first considered employing computers everywhere?
A: The concept of using computers everywhere, known as ubiquitous computing or pervasive computing, has…
Q: Identify and describe the risks associated with the online library construction for the software…
A: The online library construction for a software engineering project brings numerous benefits, such as…
Q: 1: There are common attributes and methods between the three types of transactions. What is the best…
A: It is crucial to carefully consider the design and implementation of codes for common attributes and…
Q: Company papers should be encrypted, although it's optional.
A: In today's digital age, companies handle a significant amount of sensitive information, including…
Q: Which parts of the application do the black box tests look at? Check everything twice. Utilization…
A: The answer for the above question is given in the following step.
Q: Provide an example of a scenario involving registration administration. As many distinct…
A: In the context of online course registration administration, let's consider a scenario where a…
Q: Employ information technology once you have figured out how to use it to give yourself and your…
A: In sequence Technology (IT) is a dangerous tool for ornamental one's position in the commercial…
Q: Is there a method to prevent the transmission of a virus over an organization's intranet, and if so,…
A: Firstly, it's crucial to understand the basics of net security. The intranet is a private net…
Q: Draw Database Design (ERD & Related Notation) for car rental website as shown in the pictures
A: The Car Rental website consists of four main entities:Cars: These entities have attributes such as…
Q: I have only a limited comprehension of multifactor authentication. How does it therefore prevent the…
A: Multifactor authentication (MFA) is a security method that requires users to provide multiple types…
Q: How can you tell if someone has tampered with a laptop's operating system, and what are the most…
A: Detecting tampering with a laptop's operating system can be challenging,but there are several…
Q: 00 words to summarize a.NET security concepts. OWASP GitHub, Microsoft.NET security, and others are…
A: .NET security is an essential aspect that ensures the safety and protection of applications…
Q: What are the advantages of cloud storage over the alternatives?
A: Cloud storage has revolutionized the way we store and manage data, offering numerous advantages over…
Q: What are the best ways to protect against sixth-generation cyberattacks?
A: Sixth-generation cyber attacks represent the most superior and sophisticated shape of cyber…
Q: You'll need to draft some Java Script code to make a unit converter that can flip an input value…
A: We have to write a some Java Script code to make a unit converter that can flip an input value from…
Q: Exist any implementations of multifactor authentication? What are some advantages of using strong…
A: MFA stands for "multifactor authentication," a security solution requiring verification from…
Q: Using a computer network, describe dependability and availability. Network HUBs degrade and become…
A: Using a computer network, describe dependability and availability. Network HUBs degrade and become…
Q: Its primary functions are long-term data storage and surplus program execution: Disc drives,…
A: The statement mentions various storage components in a computer system that serve different…
Q: A BMI calculator function calculates the BMI taking as the input two variables which are height (in…
A: Certainly! Equivalence classes allow for the grouping of inputs or test cases based on similar…
Q: Can someone explain a few things about the code below? 1.The tools, libraries, and APIs utilized…
A: The program is a combination of a simple neural network and an A* search algorithm. The neural…
Q: I am unfamiliar with the concept of "multifactor authentication." The query is how it prevents…
A: Multi-factor authentication (MFA) is a security measure that strengthens the authentication process…
Q: You use Microsoft Excel more than any other spreadsheet program, therefore I was hoping you could…
A: Excel is a powerful spreadsheet program developed by Microsoft. It is widely used for various…
Q: An interactive Google search script written in Python. The best Google results are shown.
A: Here's an example of an interactive Google search script written in Python using the…
Q: How do you log in if your computer's fingerprint sensor doesn't work?
A: Computer security refers to the practice of protecting computer systems, networks, and data from…
Q: The role of the Internet of Things in the construction of smart homes. Give some examples.
A: Internet of things involves some latest achievements in the field of technology advancements like…
Q: Look at the many methods that individuals might disobey the law without facing major repercussions.…
A: It is important to emphasize that engaging in activities that disobey the law is not recommended or…
Q: 1: There are common attributes and methods between the three types of transactions. What is the best…
A: When it comes to designing and writing code for transactions, there are multiple factors to consider…
Q: List and discuss the key.NET security components. OWASP's GitHub, Microsoft.NET Security, and other…
A: Security components within the .NET framework are crucial in safeguarding applications from threats…
Q: Which transport layer protocol enables logical connections between computers?Which transport layer…
A: The transport layer protocol that enables logical connections between computers is the Transmission…
Q: Which firewall architecture is most suitable for a contemporary business? Why? Explain.
A: In this question we have to understand Which firewall architecture is most suitable for a…
Q: Which two are the most compelling arguments in favor of layered protocols?
A: In computer science, layered protocols are a fundamental concept in network architecture. They…
6a. Configure an alert message to pop up using Javascript when the page is displayed in the browser. Edit the body tag as follows: <body onload="alert ('Today only-10% off on a weekend- coupon code ZenTen');"> . The onload event handler in this case pops up an alert message.
b. Add a script block to the head section as follows:
<script> function validateForm () { if (document.forms [0]. myEmail. value== "") {
(alert (Pleade enter an e-mail address."); return false // end if return true; } end function validateForm
</script>
Many thanks for your time! .
Step by step
Solved in 7 steps with 4 images
- Hands-On Project 1-5Learning to locate and fix errors is an important skill for anyone programming in JavaScript. You have been given a web page containing several errors that need to be fixed. When fixed, the page will display the content shown in Figure 1-27. Do the following:1. Use your code editor to open project01-05_txt.html from the HandsOnProject_01 folder. Enter your name and the date in the comment section of the document and save it as project01-05.html.2. In the head section of the document there is a script that declares and initializes the reopenDate variable. There are two errors in this code. Fix both errors.3. Scroll down to the script embedded within the article element. The code contains a total of four errors. Locate and fix the errors.4. Save your changes to the file and then open the file in your web browser. Verify that the page resembles that shown in Figure 1-27. <!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8" /> <meta…You are going to add some javascript to your webpage to greet the user. All the below instructions can be found with further explanations in the Javascript lectures. Don not only give me the html code, i need javascript If you do not already have them, add two <h1> title tags so they display at the top of your webpage The first tag should have the contents: “Welcome” The second tag should have an id='username' and contents: “Placeholder” All Javascript must go in a file with the extension “.js”, such as “main.js” or “script.js”. Create a file to hold your javascript if one is not already there. Add a script tag at the end of your body tag that includes your javascript file. In your script tag, use the javascript prompt command to save input from the user into a variable Ask the user their name in the prompt command You can name the variable whatever you like Change the second <h1 id=’username’> contents to the name entered by the user it should be stored in the…Create an HTML form that has a number of textboxes write a javascript code that verifies all textboxes have been filled. if it is empty. popup at least indicating which textbox is empty.
- In Javascript, Create a mouseOver event function, that will change the colour of an HTML item (i.e. a button or a list item) to green, then to black after 5 secondsOn the index page, add a link that says "Subscribe To Our Marketing List". Clicking the link should take the user to another page that contains a signup form. The form should contain a subscribe button and the following text fields: Email Address, Re-enter Email Address, First Name. Using java create a script called subscribe.js, In the subscribe.js script, it should add an event for the subscribe button that listens for the onclick event. When the onclick event occurs, it should validate that the email text matches the re-enter email text and that the first name textbox is not empty. If the validation fails for either, display the appropriate error message beside the textbox. For example, This entry must equal the first entry, This field is required. If validation is successful, display an alert that says thanks for joining our list and remember to include your script on the page.Q2: Write a JavaScript code to change the background color of a Webpage on the click of a button “change Color”.
- Create a web page that contains three buttons and two images. To meet the requirements follow the instructions given below by writing JavaScript and jquery: When user clicks the “Hide Images” button, both images should be vanished (jquery). When user clicks the “Show Images” button, both images should be appeared again (jquery). When user clicks the swap button, the height of both images should be swapped (JavaScript).In a HTML5 document, code the followings: • Using an onload event, trigger a pop-up window showing the message «This was triggered by an event!» when the document has been loaded. • Create a button and, using an onclick event, trigger a pop-up window showing the message « Wow! This works! ». • Insert an image and then use an onmouseover event to trigger a pop-up window showing the message «This is a rollover ». 2.)Create a program that will display a message adapted to the user input data based on its age range: Age range Comment example 1 to 17 You're not major yet. 18 to 49 You are major, but not senior yet.2 50 to 64 You are senior, but not retired yet. Program's flow: • User loads the pages • User is asked to supply its age • The proper comment is displayedCreate an HTML form to allow the user to enter student names, one at a time, and displays all the names entered in a text area. Each time, the user types a name into a text box, and then presses the ENTER key to add the name in the text box to an array. The array is then sorted in alphabetical order and text area is updated with the new content in the array. Hints: you may use use keypress event. The event handler can take a parameter event. When the Enter key is pressed, the corresponding event.keyCode would be equal to 13.
- Create a new webpage called "activity5.html". This new page must include the following: Write a variable text, "Hello Rasmussen Students!" into an HTML page and include HTML tags to make this text appear as a header. Create an alert box with the onload event that displays a popup that says, "Welcome, Rasmussen Students!" Create a second activity page called "activity5b.html" and save it to the activities folder. For this file, link it to an external JavaScript file called, "myfirst.js". The JavaScript file should display, "This is my first external JavaScript test!"JavaBeans and JDBC The exercises listed below are intended to provide an instructive way to get used to JavaBeans and JDBC. Complete all three exercises. Exercise 1 – JavaBeans, Self-Call a) Write a page “MiniAdd.jsp” that carries out simple additions of two numbers. The JSP should: present a form where the user can specify two numbers, contain a submit button that posts back to the same page (i.e. “miniadd.jsp”), show the result of the requested addition, and also show the sum of all the additions carried out by the user so far. Create and use a JavaBean (“SumBean”) to validate user input and to perform the addition. The same bean should also be used to store the sum of all additions. (Consider that the page does not receive input parameters when it is called the first time.) b) Add a “Reset Button” to the page with which the user can reset the sum of all additions.Instruction : Please add some css on the alert boxes. Change the color. Thank you! The HTML code with javascript is already provided. You just need to customize the alert prompt. Thanks! CODE: <!DOCTYPE html> <html lang="en"> <head> <title>Applying Javascript in HTML</title> <script> function userPrompt() { var lastName = prompt("Enter your Last name:"); var firstName = prompt("Enter your First name:"); alert("Hello " + lastName + ", " + firstName + "!"); const number1 = parseInt(prompt("Enter your 1st number:")); const number2 = parseInt(prompt("Enter your 2nd number:")); const sum = number1 + number2; alert("The sum is: " + sum); confirm(lastName + ", " + firstName + " you have added the numbers: " + number1 + " & " + number2 + " and got the sum: " + sum + "."); } </script> </head> <body onload='userPrompt()'>…