1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
3 years ago
6

If totalMonths has a string value of "13", what does the code that follows display?var years = parseInt ( totalMonths / 12 );var

months = totalMonths % 12;if ( years == 0 ) {alert ( months + " months.");} else if ( months == 0 ) {alert ( years + " years");} else {alert ( years + " years, and " + months + " months.");
}a) 1 years, and 1 monthsb) 1 year, and 1 monthc) 1 yearsd) 1 year
Computers and Technology
1 answer:
TEA [102]3 years ago
6 0

Answer:

The answer to this question is "Option a".

Explanation:

The description of the JavaScript code as follows:

  • In the code, there is two variable defined that are "years and months". The years convert string value in number and calculate years and holds value in years variable and months variable calculate the moths and holds value in months variable.
  • Then we use conditional statements in this statement we use two if blocks. In first if block we check that years variable value is equal to 0. if this condition is true. it will print months in the alert box.
  • In second if block we check that if months variable value is equal to 0. if this condition is true. it will print years in the alert box.
  • In else block, we use an alert box that prints years and months.

You might be interested in
Assume that x is a string variable has been given a value. Write an expression whose value is true if and only if x is an hexade
Lady bird [3.3K]

Answer:

import string

all(c in string.hexdigits for c in s)

Explanation:

The hexadecimal number system, often abbreviated as "hex", is a numeral system which consist of 16 symbols (base 16). The standard numeral system we are all use to, called decimal (base 10) and utilizes ten symbols: 0,1,2,3,4,5,6,7,8,9.

Using python programming language

import the  string module

the second expression iterate through the digit in s and confirm if they all are within the rage of 0 -9 ad A -F. If yes , it returns True and else, it returns false

6 0
3 years ago
You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c
sergejj [24]

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

4 0
3 years ago
What is the name of the FOLDER in which the file named "script" is contained?
yulyashka [42]

Answer:

The default location for local logon scripts is

  • the Systemroot\System32\Repl\Imports\Scripts folder

5 0
3 years ago
In Joan Woodward's study of the relationship between technology and structure, the structure that was the most technically compl
Arturiano [62]

Answer:

<em>Continuous Process Production</em>

Explanation:

In a study on the relationship between  industrial structure and performance, conducted by <em>Joan Woodward</em> from 1950 to 1959,  

she classified technology into <em>three groups</em>:  

  1. <em>Small batch and Unit technology  </em>
  2. <em>Large batch and Mass production </em>
  3. <em>Continuous process production </em>

She came to a  conclusion that the <em>continuous process production was the most complex</em> and  unit technology as the least.

4 0
3 years ago
What is a URL (Please explain)?
GalinKa [24]
Definition

URL a.k.a uniform resource locater, is simply the address of a World Wide Webpage.

Sentence example:

"Type a URL into a browser's address bar."
5 0
3 years ago
Other questions:
  • WILL DO A BRAINLY! help pls.
    15·1 answer
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • Put these steps for managing your study time in chronological order. 1 set aside the same time each day 2 Identify the best time
    14·1 answer
  • Select a cybersecurity career that interests you. Describe the job duties and identify the skills required to excel in that care
    15·1 answer
  • 3.2 lesson practice edhesive ​
    6·1 answer
  • Design and implement an algorithm that gets a list of k integar values N1, N2,...Nk as well as a special value SUM. Your algorit
    10·1 answer
  • NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
    7·1 answer
  • What will be the output of the following code? &lt;?php $foo = 'Bob'; $bar = $foo; $bar = "My name is $bar"; print $bar; print $
    8·2 answers
  • How many binary digits does a single hexadecimal digit represent?
    13·1 answer
  • What happens when you restrict someone on messenger?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!