1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
7

Answer the following questions:

Computers and Technology
1 answer:
victus00 [196]3 years ago
3 0

Answer:

The answer to the following questions can be given as:

Question: 1

value of foo is = 1020

Question: 2

Output of the code is = false

Question: 3

function add(a, b)

{

 return a && b ? a + b : function (c) { return a + c; };

}

var a=add(2,5);

var x=add(2)(5);

print(a);

print(x);

output:  

7

7

Question: 4

"goh angasal a m'i"

Question: 5

In this we check that if in the window a foo function exists. otherwise we set windows.foo to bar.

Question: 6

first alert shows the value "Hello World";

second alert shows value ReferenceError, In this bar not defined.

Question: 7

The value of foo.length is  2

Question: 8

The value of foo.x is undefined

Question: 9

Function print = "one", "three", "two" .

Question :10

It is difficult to define because doSomethingElse() function is not defined.

Explanation:

In question 1 the value of the foo variable is 1020 because we perform the string concat operation.

In question 2 Output of the code is false because float value keeps in binary and when we convert 0.1 or 0.2 to binary so it is not the same.

In question 3 the output of both functions is 7.

In question 4 the output is goh angasal a m'i because In this code we use the reverse() function, split() function and join() function. Reverse function reverses the value. split function splits the value and join function join all the value of the string in a line.

In question 5 we check the value.

In question 6, the first output is Hello World and second is ReferenceError.

In question 7, the value of foo.length is 2 because this foo array we insert only 2 values.

In question 8, the value of foo.x is undefined because in the variable we reset the value of foo all together, so foo.x value is undefined.

In the question 9 function print "one",  

"three",  

"two" because In the function first, we print the message that is "one" then we define a function in this function we print the value  

"two" but before creating object we call the "three" so the print value is "one",  

"three",  

"two".

In question 10 function, the output of this function is undefined.

You might be interested in
Which type of data is is usually collected as numerical data that can be presented in a graph or chart?
Natali5045456 [20]

Answer:

Quantitative data

Explanation:

Quantitative data is information about quantities; that is, information that can be measured and written down with numbers. Some other aspects to consider about quantitative data: Focuses on numbers. Can be displayed through graphs, charts, tables, and maps.

8 0
3 years ago
Construct a group frequency distribution for the following data: 18, 22, 15, 12, 18, 22, 22, 24, 21, 19, 13, 13, 17, 18, 20, 12,
Y_Kistochka [10]

Answer:

uhebcuwcih

Explanation:

iqic c .j .c h de c veo  dnjen jndc j .ececiibbec .cecinineijc    

4 0
4 years ago
Read 2 more answers
A power supply unit for a computer converts:
ss7ja [257]
I would go with answer choice A).
5 0
3 years ago
Can someone answer these for me real quick I have to bring up my grade please and thank you​
stealth61 [152]

I'm hoping this hasn't already been answered, am sure I saw a similar post.

12.Noise

13. Wow.... that is worded so awkwardly. Am assuming it's terminator, because it's the only option there that is a physical device.  

14.Terminator

4 0
3 years ago
Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
sergiy2304 [10]

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

6 0
3 years ago
Other questions:
  • Use the script below as a starting point to create a Rectangle class. Your rectangle class must have the following methods;A con
    12·1 answer
  • What web 2.0 features allows users to subscribe to a data plan that charges for the amount of time spent on the internet?
    9·1 answer
  • Electric Bill Problem 3.0 (20 Points) What is the total cost of using the following at /kWh? a. 1600 W air conditioner for 6h b.
    11·1 answer
  • List five things that could cause premature bearing failure
    11·1 answer
  • Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
    13·1 answer
  • Mason is part of a project team that is creating a television advertisement. List one risk the team faces and a strategy for min
    5·1 answer
  • How does the action affect the end result of what you want to accomplish?
    14·1 answer
  • What are two software tools for bank account reconciliation?
    8·2 answers
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • your sales operations group would like to perform monthly analyses on large amounts of sales activity. they want to be able to r
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!