1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Julli [10]
3 years ago
14

You want to add the same functionality to various web sites you have created for your school district without having to add the

script to each html page. where should you place your javascript code to accomplish this in the most efficient manner
Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
3 0
You should place your javascript in a separate file and name it appropriately, e.g. script.js.

Then you should call for your script using the HTML:

<script src="script.js" type="text/javascript"<span>></script></span>
You might be interested in
WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME
pishuonlain [190]

Answer:

Best free virus removal and free malware removal tools

Avira Free Antivirus – Offers a larger package of free security tools than most competitors, including real-time AV, malware removal, and a VPN. Bitdefender Antivirus Free Edition: Award-winning free version

8 0
3 years ago
Read 2 more answers
Why am i doing the investigation​
juin [17]
Because it’s your interest
6 0
3 years ago
_______ technology is used in many hospitals to verify that the correct medication is being dispensed to the applicable patient.
Zepler [3.9K]
Barcode hospital operating suites, cardiac and intensive care units.
8 0
3 years ago
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
You are creating a Web document on a mobile device and will be out of your Internet Service Provider's coverage range for the re
koban [17]
a, canvas yuh yuh yuh
3 0
3 years ago
Read 2 more answers
Other questions:
  • When your tire blows out in the middle of a drive, you should _____. A. let go of the steering wheel B. pump the brakes immediat
    13·2 answers
  • Sara is writing a program to input her monthly phone bills and output the month name and amount for the month with maximum amoun
    7·1 answer
  • Charles sends Julia text messages every morning insulting her appearance and threatening to hurt her. He writes unflattering des
    5·2 answers
  • 1. What does a transistor do?
    6·1 answer
  • How many license plates are there if a license plate contains 3 letters from the 26 available in the English alphabet followed b
    15·1 answer
  • Which flowchart symbol indicates the start or the end of a process?
    8·1 answer
  • What is output? Select all that apply. c = 3 while (c &lt; 10): c = c + 2 print (c)
    6·1 answer
  • A External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints v
    11·1 answer
  • According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
    7·2 answers
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!