1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
6

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment met

hod. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?
a.JavaScript
b.HTML
c.CSS
d.Python
Computers and Technology
1 answer:
aksik [14]3 years ago
6 0

Answer:

a.JavaScript

Explanation:

<em>Form validation</em> is adopted to prevent the abuse of web form by malicious users, data that are not properly validated causes or leads to security vulnerabilities, thereby making a website to be at a risk of being attacked by malicious users.

<em>Validation rules</em> checks that the data a user enters in a record meets the specify standards before the user is allowed to save the record, a validation rule evaluates the data in one or more fields and return it as true or false.

<em>JavaScript form validation  can be used to check all required fields, the steps are adopted are:</em>

<em>i) Basic validation − The form is first checked to make sure that all the mandatory fields are filled.</em>

<em>ii) Data format validation −The data that is entered is then checked for correct form and value before allowing to proceed, submit or save the record.</em>

You might be interested in
A byte in memory is identified by a unique number called its
Murrr4er [49]
It is identified by its address number.
4 0
3 years ago
Pleas help I will give brainiest
stellarik [79]
1) A
2)D
3)C
4)A
5)D
Hope this will help u
5 0
3 years ago
Read 2 more answers
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?Ethical Decision
ratelena [41]

Answer:

Explanation:

1. Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?

Answer:

Before the discussion, Fred, Gladys, and Charlie focused on other ends in regards to information security. Fred was more concerned with adding additional software to fix the malware issues when clearly there were easier steps that need to be taken

2. How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?

Answer:

Gladys’s performance should be based on the new security measures and protocol that she has in place for the organization. This of course, is putting a lot of trust into Charlie’s performance as she was the one to introduce Charlie with his new plan on the organization’s new security. She practically had him nominated for CIO.

3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?

Answer:

Before considering outside threats, internal threats should be looked into early in the planning process. Internal threats does not necessarily mean that the employees have malicious intent, but the case of human error and failure can also be a negative contribution to cyber security. Creating a security program and education end users by creating a security policy guidance is one of the the best ways to prevent simple cyber security issues from starting

Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer.

Answer:

Absolutely not! By hiring an unexperienced family member over a trained professional, Fred is letting his emotions get the better of him. Fred should consult with Gladys on whether his son-in-law is good candidate for the position or not. Rather than sacrifice company security, Fred could possibly find his son-in-law a position in the companies’ financial or human resources departments.

8 0
3 years ago
a _____ is a recreation of a thumbnail in a desktop publishing software, also known as a "rough". a. proof b. digital draft c. l
Dmitrij [34]
D. It’s a sketch. That is, if you talking about, an art piece.
6 0
3 years ago
Change the screen resolution so you can view more information on your screen. Use the resolution that enables you to fit the mos
Gennadij [26K]

Answer:

If you are on Windows 10, all you need to do is to right-click on the desktop, and finally select the "Display Settings". And over there you will be able to view various attached displays, and the resolution that you require is going to be exactly here, and as an example, the best resolution for your monitor is 3840 x 2160.

Explanation:

Please check the answer section.

7 0
3 years ago
Other questions:
  • Once you have selected the range of cells for your table data, from which tab can you open the Insert Table dialog box?
    6·2 answers
  • Show the subnet address, subnet mask in slash notation, broadcast address, number of addresses, first valid host address, and th
    13·1 answer
  • Choose the risks from the options below to presenting yourself differently online than offline?
    12·1 answer
  • Plot element is typically the turning point in the most intense moment of a story
    8·1 answer
  • Peace is a fruit of the Spirit that comes from _______ .
    11·1 answer
  • To ensure rapid recovery and security of data, backup data should be ________.
    11·1 answer
  • Which of the following examples can be solved with unsupervised learning?
    8·1 answer
  • A ________ is an input device that responds to finger touch.
    8·2 answers
  • An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
    10·1 answer
  • When you connect to an Access database, which entities are shown in the Navigator window?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!