1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
3 years ago
6

Which of the following JavaScript expressions is equivalent to the given HTML code? ​ a. Document.getelementbyId("menu1").menu=

"class"; b. Document.getelementbyId(menu1= "class name".menu); c. document.getElementById("menu1")."menu"; d. document.getElementById("menu1").className = "menu";
Computers and Technology
1 answer:
LenKa [72]3 years ago
8 0

Answer:

Option (D) is the correct answer to the following question.

Explanation:

In the following question there is some information is missing a line of code which is '<div id="menu1" class="menu">'.

The following option is correct because in the following code the id name is "menu1" and the class name is "menu" and in the option D the id is "menu1" and the class name is "menu". So, that's why this option is correct.

'document.getElementId()' is used to take input from the user or take elements from the document.

Option A is incorrect because there is no menu attribute inside the <div> tag.

Option b is incorrect because inside the parentheses "menu1" is not the class or it inside it, it is not written in that manner.

Option C is incorrect because the name of the class is not written like this at the place of the "className"

You might be interested in
A certain string-processing language offers a primitive operation which splits a string into two pieces. Since this operation in
Nostrana [21]

Answer:

Explanation:

First we define define cost(i,j) to be the cost of cutting the string from index i to j. Then,

cost(i,j) = min {length of substring + cost(i,k) + cost(k,j) where i < k < j}

void  s_cut()    

 {

   int l,p;

   int temp=0;

   //ArrayList<Integer> al = new ArrayList<Integer>();

   int al[];

   Scanner s=new Scanner(System.in);

   int table[][];

   ArrayList<Integer> values[][];

   int low=0,high=0;

   int min=0;

   l=s.nextInt();

   p=s.nextInt();

   System.out.println("The values are "+l+"  "+p);

   table= new int[l+1][l+1];

   values= new ArrayList[l+1][l+1];

   al= new int[p];

   for(int i=0;i<p;i++)

   {

       al[i]=s.nextInt();

   }

   for(int i=0;i<=l;i++)

   for(int j=0;j<=l;j++)

       values[i][j]=new ArrayList<Integer>();

   System.out.println();

   for(int i=1;i<=l;i++)

       table[i][i]=0;

   //Arrays.s

   Arrays.sort(al);

   for(int i=0;i<p;i++)

   {

       System.out.print(al[i]+ "  ");

   }

   for(int len=2;len<=l;len++)

   {

       //System.out.println("The length is  "+len);

       for(int i=1,j=i+len-1;j<=l;i++,j++)

       {

           high= min_index(al,j-1);

           low= max_index(al,i);

           System.out.println("Indices are "+low+"  "+high);

           if(low<=high && low!=-1 && high!=-1)

           {

           int cost=Integer.MAX_VALUE;;

           for(int k=low;k<=high;k++)

           {

               //if(al[k]!=j)

               temp=cost;

               cost=Math.min(cost, table[i][al[k]]+table[al[k]+1][j]);

               if(temp!=cost)

               {

                   min=k;  

                   //values[i][j].add(al[k]);

                   //values[i][j].addAll(values[i][al[k]]);

                   //values[i][j].addAll(values[al[k]+1][j]);

                   //values[i][j].addAll(values[i][al[k]]);

               }

               //else

               //cost=0;

           }

           table[i][j]= len+cost;

           values[i][j].add(al[min]);

           //values[i][j].addAll(values[i][al[min]]);

           values[i][j].addAll(values[al[min]+1][j]);

           values[i][j].addAll(values[i][al[min]]);

           }

           else

               table[i][j]=0;

           System.out.println(" values are "+i+"  "+j+"  "+table[i][j]);

       }

   }

   System.out.println(" The minimum cost is "+table[1][l]);

   //temp=values[1][l];

   for(int e: values[1][l])

   {

       System.out.print(e+"-->");

   }

8 0
4 years ago
. Service recovery refers to A. the ability to quickly restore service following a service failure and provide compensation. B.
san4es73 [151]

Answer:

A. the ability to quickly restore service following a service failure and provide compensation.

Explanation:

Systems like servers are bound to fail at some point. This is because, it either has running parts or electronic components that could overheat or get shorted due to external or internal malfunction.

The ability of system to quickly restore services and operation after it experiences a total system failure is called system recovery.

7 0
3 years ago
Dsl is an example of what type of internet access?.
iVinArrow [24]
Answer: Digital Subscriber Line (broadband connection)
8 0
2 years ago
I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
Ilia_Sergeevich [38]
Your answer is D.

Hope this helps and if you could answer the question I just uploaded titled giving brainliest that would be great. Basically, what you have to do is research why the book titled the list of things that will not change and explain why it’s your favorite book based on the message it tells you! Go to my profile and go to questions.
7 0
3 years ago
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
Other questions:
  • What interprets software instructions and literally tells the other hardware devices what to do, based on the software instructi
    12·1 answer
  • Which tool is used to view stars in galaxies far from the Milky Way?
    10·1 answer
  • What advantage does digital storytelling have over oral storytelling traditions?
    6·1 answer
  • What strategies do you use to better understand difficult reading material? Check all that apply.
    5·1 answer
  • A small company with 100 computers has hired you to install a local area network. All of the users perform functions like email,
    9·1 answer
  • Hello everyone. New ppl on Ro.blox? I want to play sometime.
    11·1 answer
  • Im going to find where u live and bring a doctor to give u a tetnus shot
    8·1 answer
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • Why isn't image display working on wacom tablet.
    8·1 answer
  • How to tell if your cell phone is being tracked tapped or monitored by spy software?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!