1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
6

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment met

hod. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?
a.JavaScript
b.HTML
c.CSS
d.Python
Computers and Technology
1 answer:
aksik [14]3 years ago
6 0

Answer:

a.JavaScript

Explanation:

<em>Form validation</em> is adopted to prevent the abuse of web form by malicious users, data that are not properly validated causes or leads to security vulnerabilities, thereby making a website to be at a risk of being attacked by malicious users.

<em>Validation rules</em> checks that the data a user enters in a record meets the specify standards before the user is allowed to save the record, a validation rule evaluates the data in one or more fields and return it as true or false.

<em>JavaScript form validation  can be used to check all required fields, the steps are adopted are:</em>

<em>i) Basic validation − The form is first checked to make sure that all the mandatory fields are filled.</em>

<em>ii) Data format validation −The data that is entered is then checked for correct form and value before allowing to proceed, submit or save the record.</em>

You might be interested in
Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
inessss [21]

Answer:

People

Explanation:

Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.

8 0
4 years ago
Marie can now edit her photos, send them in emails, print them on a printer, and use them as wallpaper on her computer. This is
AVprozaik [17]

I could be wrong, but I believe this one would be JPG files.

4 0
4 years ago
Read 2 more answers
Sal Kan earned $3,000.00, But he is only getting $1,585.00 on his pay check to
svetlana [45]

Answer:

Usually, it's because of taxes and insurance.

3 0
4 years ago
Smart art is considered a​
mina [271]

Explanation:

visual representation of information and ideas, and a chart is a visual illustration of numeric values or data. Basically, SmartArt graphics are designed for text and charts are designed for numbers. Use the information below to decide when to use a SmartArt graphic and when to use a chart.

4 0
3 years ago
What is meaning of geo and bio​
Aleks [24]

Answer:

GEO. genetically enhanced organism. Medical, Health, Healthcare.

The word biology is derived from the greek words /bios/ meaning /life/ and /logos/ meaning /study/ and is defined as the science of life and living organisms. An organism is a living entity consisting of one cell e.g. bacteria, or several cells e.g. animals, plants and fungi.

Hope it helps

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Ill give Brainliest!!!!! I REALLYYY NEED HELP
    14·2 answers
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • What's is the contribution of technology to the country?
    15·1 answer
  • Cloud computing service providers manage different computing resources based on the services they offer. Which resources do IaaS
    10·1 answer
  • What is a relationship between a object and a class?
    7·1 answer
  • Technician A says that oil for the rod bearings comes from splash off the crankshaft. Technician B says that lubrication to the
    14·1 answer
  • Which of the following characteristics differentiates PCM from BWF audio
    15·2 answers
  • Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be
    12·1 answer
  • Which of the following statements about security in the network is true?
    15·1 answer
  • The US government appropriates less than one million dollars in funding each year to STEM education programs. True False
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!