1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
3 years ago
12

Briefly explain what are JavaScript librairies​

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
3 0

Answer:

Explanation:

In the spirit of clear definitions:

JavaScript is a scripting language used by front end developers (people who build parts of a website or web app that users see on their screen) to implement and manage dynamic content. There are other scripting languages out there, including Python, but JS is the most commonly used.

Therefore, JavaScript libraries are collections of pre-written code snippets that can be used (and reused) to perform common JavaScript functions.

You might be interested in
How many 16-byte cache blocks are needed to store all 64-bit matrix elements being referenced using matlab's matrix storage?
kenny6666 [7]

answer:

4 16-byte cache blocks are needed.

3 0
3 years ago
The program to check the highEst of n numbercan be done by ......,..
swat32

Answer: Given an array of numbers, arrange them in a way that yields the largest value. For example, if the given numbers are {54, 546, 548, 60}, the arrangement 6054854654 gives the largest value. And if the given numbers are {1, 34, 3, 98, 9, 76, 45, 4}, then the arrangement 998764543431 gives the largest value.

Explanation: If you need more help follow me on istagram at dr.darrien

-thank you

7 0
3 years ago
Design a class named Complex for representing complex numbers and the methods add, subtract, multiply, divide, abs for performin
Tanzania [10]

Answer:

Explanation:

The following code is written in Java, it creates the entire complex class as requested so that it works with the main method that has been provided in the question without having to change anything in the main method. Proof of output can be seen in the attached picture below

import java.util.Scanner;

class Test implements Cloneable{

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the first complex number: ");

       double a = input.nextDouble();

       double b = input.nextDouble();

       Complex c1 = new Complex(a, b);

       System.out.print("Enter the second complex number: ");

       double c = input.nextDouble();

       double d = input.nextDouble();

       Complex c2 = new Complex(c, d);

       System.out.println("(" + c1 + ")" + " + " + "(" + c2 + ")" + " = " + c1.add(c2));

       System.out.println("(" + c1 + ")" + " - " + "(" + c2 + ")" + " = " + c1.subtract(c2));

       System.out.println("(" + c1 + ")" + " * " + "(" + c2 + ")" + " = " + c1.multiply(c2));

       System.out.println("(" + c1 + ")" + " / " + "(" + c2 + ")" + " = " + c1.divide(c2));

       System.out.println("|" + c1 + "| = " + c1.abs());

       Complex c3 = c1;

       System.out.println(c1 == c3);

       System.out.println(c3.getRealPart());

       System.out.println(c3.getImaginaryPart());

   }

}

class Complex implements Cloneable {

   public interface Cloneable { }

   private double realPart;

   public double getRealPart() {

       return realPart;

   }

   public void setReal(double real) {

       this.realPart = real;

   }

   private double imaginaryPart;

   public double getImaginaryPart() {

       return imaginaryPart;

   }

   public void setImaginary(double imaginary) {

       this.imaginaryPart = imaginary;

   }

   public Complex(double a, double b) {

       realPart = a;

       imaginaryPart = b;

   }

   public Complex(double a) {

       realPart = a;

       imaginaryPart = 0;

   }

   public Complex() { }

   public Complex add(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getImaginaryPart();

       double imaginary2 = comp2.getImaginaryPart();

       return new Complex(real1 + real2, imaginary1 + imaginary2);

   }

   public Complex abs() {

       double real1 = Math.abs(this.getRealPart());

       double imaginary1 = Math.abs(this.getImaginaryPart());

       return new Complex(real1, imaginary1);

   }

   public Complex subtract(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 - real2, imaginary1 - imaginary2);

   }

   public Complex multiply(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 * real2, imaginary1 * imaginary2);

   }

   public Complex divide(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 / real2, imaginary1 / imaginary2);

   }

   public String toString() {

       String result;

       result = realPart + " + " + imaginaryPart + "i";

       return result;

   }

}

3 0
2 years ago
What are the four main content questions that need to be answered for every project you work on?
7nadin3 [17]

Answer: 1. What are the major deliverables ?

2. How will you get those deliverables before or by the deadline ?

3. Who is on the on the team and what role will they play ?

4. When will the team meet milestones on when will other members on the team play a role in. Contributing to or providing feedback on those deliverables ?

3 0
3 years ago
Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes equipped with t
Amanda [17]

Answer: True

Explanation:

Chassis intrusion detection is simply a vital security feature which is used typically by large corporate networks. It's simply an intrusion detection method which can be used in alerting a system administrator when there's a situation whereby a person opens a computer case which can then be investigated in order to know if the computer hardware has been tampered with.

It should also be noted that the chassis intrusion detection can then be either enabled or disabled in the BIOS setup utility if a BIOS comes equipped with this feature.

The correct option is True.

6 0
3 years ago
Other questions:
  • Write a function named initialMatch that takes a string parameter, text, that contains only lowercase letters and whitespace. Th
    6·1 answer
  • What is the command to use the memory diagnostics tool?
    11·1 answer
  • Why should you need to have skills and an understanding about programming?
    8·1 answer
  • Reasons why construct is a great beginner game engine
    10·1 answer
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • What is the purpose of the domain name? The domain name is an example of a service provider. The domain name .gov.nz is an examp
    15·2 answers
  • What kind of a bug is 404 page not found
    10·2 answers
  • How do I start conversations with ppl??? If u answer right I will try send u more points... So please help me
    7·1 answer
  • What is the page table mainly for?
    8·1 answer
  • Does anyone have code hs circle pyramid 2.0?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!