1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
4 years ago
9

Using only what you have learned in class, create a webpage that has two divs on it: input and output. Only the input div is edi

table. On the webpage state: "You are only allowed to enter 50 characters in the input box.". Above the output div have text that says "Number of characters remaining:" and inside the output div, display the number of characters the user can still enter in the input div. So, at the beginning, the output div would have "50" in it. If the user types in a character in the input div, you should automatically see the output div turn to "49"… If the number of characters left goes to a negative number, change the font color in the output div to red
Computers and Technology
1 answer:
Alexxandr [17]4 years ago
8 0

IdkAnswer:

Explanation:

You might be interested in
In 3-5 sentences describe whether or not files should be deleted from your computer explain your answer
Nata [24]

Answer:

I'm not exacly sure what you mean what type of files?

Explanation:

5 0
3 years ago
Why are id thieves hard to catch?
Paladinen [302]
Because they will change their identity and therefore they will never have the same name for a long period of time . So when they commit a crime , they will be difficult to find and catch
5 0
3 years ago
A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
Sindrei [870]

Answer:

The appropriate response will be "Public key".

Explanation:

  • A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms.
  • Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.
6 0
3 years ago
What is 1 TB equal to ?<br> . 1024 kb<br> .1024 gb <br>. 1024 pb <br>. 1024 mb​
OLEGan [10]

\large \mathfrak{Answer : }

1 TB = 1024 GB

3 0
3 years ago
Read 2 more answers
6. What will be drawn when we call fo?
allochka39001 [22]

Answer:

d, brainly wants this to be long so hdjddjd

4 0
3 years ago
Other questions:
  • Consider the following JavaScript program:
    8·1 answer
  • How do you calculate the total voltage in a series circuit with more than one component?
    13·2 answers
  • Multiple choice
    9·2 answers
  • Paragraph: Read the following two e-mail messages. In a paragraph of no less than 125 words, explain why e-mail B is the more ap
    11·1 answer
  • Can you give me a long list of kid's cartoons
    8·2 answers
  • Hard drive access time is measured in
    11·1 answer
  • A folder has been shared with other users and set to read-only. What does this mean for users?
    12·2 answers
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • ILL GIVE BRAINLIEST TO FIRST ANSWER David is adopting an iOS app from a non-retina screen to a retina screen. The app currently
    13·1 answer
  • Summary about Interface Design in system analysis
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!