1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
6

Write a javascript program that reads three integers named start, end, and divisor from three textfields. your program must outp

ut to a div all the integers between start and end, inclusive, that are evenly divisible by divisor. the output integers must be separated by spaces. for example, if a user entered 17, 30, and 5, your program would output "20 25 30" (without the quotes) because those are the only integers between 17 and 30 (including 17 and 30) that are evenly divisible by 5.

Computers and Technology
2 answers:
Karolina [17]3 years ago
7 0
Please take down this question.  It is a test question and posting it on this forum is considered cheating.
BartSMP [9]3 years ago
6 0

Answer:

The program to this question can be given as:

Program:

Code is given in image

Explanation:

The description of the above JavaScript program can be given as:

  • In the above program, we define a function that is "divide". Inside a function, several variables is define that is "n1,n2,n3, div, and i".
  • The n1, n2, and n3 variables are used for taking input from text-fields and use a for loop for calculating the range between n1 to n2 variable.
  • Inside a for loop we use if block that checks the range value is evenly divisible by 5.
  • After calculating value we use the div variable that prints value in div section which is used in HTML.

You might be interested in
According to your textbook, the three major criteria against which to test documents that you locate on the Internet are authors
pantera1 [17]

Answer:

The following statement is False.

Explanation:

Because asper textbook there are only one main criteria against the test documents that find on the internet i.e., authorship. So, that's why the following given statement is false. The graphic and the interactivity depends on the quality of the document this options do not come under the criteria to test the document.

6 0
3 years ago
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
alisha [4.7K]

Answer:

Detection vs Prevention

Explanation:

  • A Network Intrusion Detection System as the name suggests it "detects" the attackers / vulnerabilities existed in the network system / infrastructure.
  • A Network Intrusion Prevention Detection System as the name suggests it "prevents" the attackers from hacking the system. While a detection just detects the abnormalities where as a prevention system can prevent them.
  • The detection system detects the vulnerabilities, security threats and the attackers in the system through the web traffic analyzers and security analyzers.
  • The prevention system prevents the network from being compromised. It tries to regain the access if already compromised.
  • Both the NIDS and NIPS have to be coordinated for the full protection of the network.
8 0
3 years ago
LIST THE 7 BEST COMPUTER SCIENCE MOVIES.
Serggg [28]

The Pirates of Silicon Valley.

Tron

Hackers

Antitrust

The Social Network

The Internship

The Imitation Game

5 0
3 years ago
G The method of mapping where each memory locationis mapped to exactly one location in the cache is
Otrada [13]

Answer:

Direct Mapped Cache

Explanation:

Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.

It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.

Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"

4 0
3 years ago
Can anyone help me<br> I will make you a brainalist
Ulleksa [173]

Answer:

Explanation:

Exercise A:

1. A table.

2. Categorical.

3. Access.

4.Queries.

5.ACCDB extension.

Exercise B:

1. Insert Tab.

2. DoCmd.Quit method.

3.Navigation Pane.

4. Modify table data.

5.The top pane and the bottom pane.

Hope this helped you!

4 0
3 years ago
Other questions:
  • Choose the correct sequence for classifier building from the following.
    7·1 answer
  • Fundamental types of data, such as strings, integers, and real numbers, are known as
    5·1 answer
  • Which of the following software programs provides for e-mail communication?. A. Access. B. Word Perfect. C. Outlook. D. Excel
    15·2 answers
  • Which system utility can you use to troubleshoot a computer that's slow to start by enabling or disabling startup programs?
    7·2 answers
  • A national tax preparation firm is accessing industry-specific productivity applications in the cloud; many other tax preparatio
    13·1 answer
  • Which of the following was the primary purpose of muckraking, sensationalism, and yellow journalism in the early 1900s?
    11·1 answer
  • Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document .
    12·1 answer
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    15·1 answer
  • Describe a new career in computer science that may be created in the future
    11·1 answer
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!