1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
4 years ago
10

Write an HTML document which contains two text fields, a button, and a div. The first text field should be labeled “Temperature”

, and the second should be labeled “Wind Speed”. The button should have the text “Wind Chill” written on it. Write two functions with these headers: function compute() function windChill(tempF, speed) The first function (compute) must be called from the onclick attribute of the button and must do the following: get a temperature from the first text field get a wind speed from the second text field call the second function (windChill) store the value returned by windChill in a variable output the value returned by windChill to the div for the user to see The second function (windChill) must take a temperature in Fahrenheit as a parameter take a wind speed in miles per hour as a parameter calculate the wind chill factor as a temperature in Fahrenheit return the wind chill factor in Fahrenheit In other words, the second function (windChill) must not gather any input from a user and must not output anything for a user to see. Instead it must calculate and return the result which makes this second function very reusable in other projects. The formula for computing the wind chill factor is f = 35.74 + 0.6215 t − 35.75 s0.16 + 0.4275 t s0.16 where f is the wind chill factor in Fahrenheit, t is the air temperature in Fahrenheit, and s is the wind speed in miles per hour at five feet above the ground.
Computers and Technology
1 answer:
disa [49]4 years ago
5 0

Answer:

I created a jsfiddle for this: https://jsfiddle.net/tonb/o7uv4cdm/26/

Explanation:

see jsfiddle.

The usual html and body tags are omitted for simplicity. For your stand-alone page you'll have to put them in, as well as additional tags for your inline scripting.

You might be interested in
What's usually kept in database?
Levart [38]
I think this is the answer. I tried. Databases<span> may be </span>stored<span> on a computer and examined using a programs.</span>
7 0
4 years ago
Read 2 more answers
In Windows, which menu allows you to view file characteristics?
Zielflug [23.3K]
A. View Menu
Hope this helps!!! 
6 0
3 years ago
DRIVER ED
julsineya [31]

This is true. Motorcycles are much smaller than cars and therefore more easily can slip into a blind spot. Motorcyclists also have less protection than other drivers and would likely suffer more injury in a collision.

4 0
4 years ago
Read 2 more answers
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
What are the possible consequences of intentional virus setting?
natali 33 [55]

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

3 0
3 years ago
Other questions:
  • What are the two major categories of computer software? word-processing software and spreadsheet software applications software
    13·1 answer
  • ________ is the gathering, organizing, sharing, and analyzing of the data and information to which a business has access.
    6·1 answer
  • What does microsoft recommend for large organizations requiring desktop virtualization for many clients? quizlewt?
    10·1 answer
  • You are the project manger for Xylophone Phonics. It produces children's software programs that teach basic reading and math ski
    11·1 answer
  • Greyer Corp, manufactures surgical instruments. Systems Medico Inc. enters into a contractual arrangement with Greyer that allow
    7·1 answer
  • I just wanna promote my 2 yt channels c: <br> (the channels are in the comments of this question)
    14·1 answer
  • What are some other features of sending attachments in Outlook 2016? Check all that apply.
    9·2 answers
  • How are online sources used? Check all that apply.
    6·2 answers
  • Given a string, an integer position, and an integer length, all on separate lines, output the substring from that position of th
    10·1 answer
  • which type of virtual machine (vm) takes advantage of unused capacity in data centers at a much lower cost than regular vms of s
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!