1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
9

Write the javascript coding using the conditional statement for the following Scenario

Computers and Technology
1 answer:
Aleksandr [31]3 years ago
8 0

Answ

can ive the website from where u got it

Explanation:

You might be interested in
The intended purpose of the following module is to determine whether the value parameter is within a specified range. The module
BARSIC [14]

The program does not consists of any syntax error but the module contains error in logic especially while placing the condition inside if statement.

Here we are actually planning to check whether the number passed in the “value” variable is within the given lower and upper range which is passed in second and third parameter.

Solution 1:

if value<=lower AND value>=upper Then

Display “The given number is outside the specified range.”

else

Display “The given number is within the specified range.”

End if

Alternate solution:

So for that the condition needs to be value>=lower and value <=lower. so  

if value > lower AND value <upper Then

Display “The given number is within the specified range.”

else  

Display “The given number is within the specified range.”

7 0
4 years ago
Why can videos be streamed from the cloud to a computer with no loss in
mezya [45]
I think the answer is B
3 0
3 years ago
Read 2 more answers
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
A file is to be shared among different processes, each of which has a unique number. The file can be accessed simultaneously by
UkoKoshka [18]

Answer:

monitor fileSharer

{

       enum {THINKING, WAITING, READING} state[N];

       condition self[N];

       int total;

       void open(int i) {

               state[i] = WAITING;

               if (i + total >= N)

               { self[i].wait(); }  // Leaves monitor

               state[i] = READING;

               total += i;

       }

       void close(int i) {

               state[i] = THINKING;

               total -= i;

               // Can signal one waiting proc whose ID won't break bank.

               for (int x = N - total - 1; x >= 0; x--) {

                       if (state[x] == WAITING) {

                               self[x].signal(); break;

                       }

               }

       }

       initialization.code() {

               for (int i = 0; i < N; i++) {

                       state[i] = THINKING;

               }

               total = 0;

       }

}

8 0
4 years ago
What is an lms and how is it used
Georgia [21]
A learning management system (LMS) is a software application for the administration, documentation, tracking, reporting and delivery of educational courses or training programs.
3 0
4 years ago
Read 2 more answers
Other questions:
  • matlab Write a function that iteratively appends random 1's and 0's to an array to form a binary number. The function returns th
    9·1 answer
  • Where is line-of-sight Internet common?<br> In space<br> Outdoors<br> Inside<br> In businesses
    10·1 answer
  • Which is a good guideline to follow for adding animation to a presentation?. A. Use a different animation for each slide.. B. Us
    8·2 answers
  • In wheat, kernel color is determined by additive alleles at two unlinked loci. If two plants, one with dark red kernels (+++– ge
    7·1 answer
  • When two conductors are accidentally connected it is<br> called a
    6·1 answer
  • Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not t
    11·1 answer
  • All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the
    5·1 answer
  • If you delete search results, you will a. clear the history on the computer. b. delete files from our computer. c. modify the re
    14·1 answer
  • How do u type please help
    11·2 answers
  • What is an example of using the internet of things (iot) to deliver innovative cloud-based solutions to customers?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!