1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
4 years ago
11

Fill in the missing statements or expressions in the following code that checks to ensure that a user enters an integer value at

the prompt: var purchase = parseInt(prompt("How many do you want?"," ")); var check = __________; while (__________) { purchase = parseInt(prompt("Enter a whole number:", " ")); ___________________; }
Computers and Technology
1 answer:
vitfil [10]4 years ago
5 0

Answer:

The correct fill in the blanks in the given question is given as

var check = num.isInteger(purchase); // giving the input by the user--(1)

      while(!check)  // check the condition .......(2)

      {

check = num.isInteger(purchase);  // taking by the user  in the "num" ..(3)                  

      }

Explanation:

Following are the description of solution

  • In the first statement, we Taking the input in the "check" variable. This statement num.isInteger(purchase); is taking the input and convert this into an "integer" type.
  • The while(!check) is checking and controlling the condition of a while loop.
  • Finally, we taking the input inside the while loop to regulate the condition of while loop.
You might be interested in
What is the target audience for this poster?
bija089 [108]

Answer:

there is no car on a bus a bus is one long vehicle

Explanation:

7 0
3 years ago
Read 2 more answers
Which one of the following UNIX utilities is purpose-built to quickly return the location (filepath) of files by querying a data
Galina-37 [17]

Answer:

a.locate

Explanation:

locate utility in Unix is used to quickly return the filepath of the file searched for.find also used to do the same work but it is not as fast as locate.

locate is faster than find because it does not read the filesystem to search the file infact it refers to the database to search the file and produces it's output and the database is created by updatedb command.

4 0
3 years ago
Summarize who you believe cyber criminals are, and why?
sergij07 [2.7K]

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

  • Internet stalkers
  • Cyber terrorist
  • Identity thieves

5 0
4 years ago
THERES THIS USER ON HERE WHO IS TAKING ALL YOUR POINTS SO I DID THE SAME THING TO HER CUZ SHE DID IT TO ME...SO WHY DONT WE ALL
GaryK [48]

Answer:

That is so low and I don't understand why that's necessary for her to do. Smh.

Explanation:

8 0
3 years ago
Tax preparation software can help prepare and file your taxes by _________.
ludmilkaskok [199]

Answer:

B. Posing questions to collect necessary information

Explanation:

Tax preparation software serves as software that makes filing as well as preparation of tax to be easier.

3 0
2 years ago
Other questions:
  • What is a basic operation of computers
    13·1 answer
  • Max Weber's concept of ________ implies that, in conducting research, social scientists must try to understand others' view of r
    14·2 answers
  • You are assigned to modify an existing Webpage by adding several tables that contain precise wording. The Webpage has had severa
    14·1 answer
  • Nina is 12 years old. She has just changed her password and wants to make sure she has it in case of
    15·2 answers
  • In Paint, what tool should be used to select the red star without selecting the blue circle?
    14·1 answer
  • Which of the following letters do the most reliable websites end in?
    12·2 answers
  • Why is it important to think about the programming language to use?
    8·1 answer
  • Summary about Interface Design in system analysis
    12·1 answer
  • All of the following are personal security safeguards except ________. Select one: A. send no valuable data via email B. Use htt
    12·1 answer
  • A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!