1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
2 years ago
8

"Use onblur and onfocus to add red borders to the input elements when the user leaves without any input, and a green border if a

value is typed and the user is done with the input element."
Was an instruction in my java assignment, does anyone have an idea on what code is needed to do that?
Computers and Technology
1 answer:
strojnjashka [21]2 years ago
6 0

Answer:

habla en español no te entiendo por favor

You might be interested in
This ingredient is often used as decoration for both hot and cold dessert​
soldier1979 [14.2K]

Answer: cream

Explanation: Cream This ingredient is often used as a decoration or accompaniment for both cold and hot desserts, but may also be used as one of the recipe ingredients.

Please mark as brainliest

8 0
2 years ago
Why do we need to send emails
DiKsa [7]

Answer:

email is the easier way of communicating and fast

5 0
3 years ago
The border that defines the outer boundary of a shape or other object
Over [174]
The answer is outline
8 0
3 years ago
Read the following scenario: A project will require more people than originally estimated. Identify the possible risks to the pr
egoroff_w [7]
A ideas and creativity
8 0
4 years ago
Read 2 more answers
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Other questions:
  • 1. In the.js file, write the JavaScript code for this application. Within the click event handlers for the elements in the sideb
    14·1 answer
  • which software is used to mimic intricate hand drawings into digital paintings? _____ is used to replicate hand drawings into di
    7·1 answer
  • What is an electronic tool that stores large amounts of data in one place in a systematic, logical way? A Database B Platform C
    5·1 answer
  • Professionalism is defined as what?<br> ASAP PLEASE!
    11·1 answer
  • Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
    14·1 answer
  • What is structured​ knowledge?
    10·1 answer
  • Celeste is writing a paper. However, two pages in, her computer shuts down unexpectedly. She never saved her paper, and all her
    12·2 answers
  • What is cyber security ???​
    8·1 answer
  • Thirty percent of a magazine's subscribers are female. A random sample of 50 subscribers Answer the following questions using Ex
    6·1 answer
  • How would you use keywords and Boolean operators to help you with a web search?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!