1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
10

I'm programming in javascript, I tryed to put a code like this, but it doesn't work. could someone help me?

Computers and Technology
1 answer:
VMariaS [17]3 years ago
6 0

Answer:

Your computer does not support this code because you have put spaces in between the code, or maybe that is how you have written the question.

You might be interested in
Write a recursive method to form the sum of two positive integers a and b. Test your program by calling it from a main program t
77julia77 [94]

Answer:

see the code snippet below writing in Kotlin Language

Explanation:

fun main(args: Array<String>) {

   sumOfNumbers()

}

fun sumOfNumbers(): Int{

   var firstNum:Int

   var secondNum:Int

   println("Enter the value of first +ve Number")

   firstNum= Integer.valueOf(readLine())

   println("Enter the value of second +ve Number")

   secondNum= Integer.valueOf(readLine())

   var sum:Int= firstNum+secondNum

  println("The sum of $firstNum and $secondNum is $sum")

   return sum

}

5 0
3 years ago
Samuel received an email that looked like it came from his bank. The email told him to click a link that opened an official look
GalinKa [24]

Answer:

The answer is "Option b".

Explanation:

Phishing is used by hackers to get sensitive data. It is a software tool, that offers online mail to use we can track the users. It also known as a state, in  which clients will have to re-enter id and pass codes to validate themselves due to some changes to the system, and incorrect option can be defined as follows:

  • In option a, It is used to attack on user system.
  • In option c, It is used to provides unauthorized access.
  • In option d, It is also known as malware, which is installed in user smartphones.

8 0
3 years ago
Some help me with this I’ll mark brainleist
garri49 [273]

Answer:

made by apple - final cut studio

sound editing software compatible with both windows and mac - audacity

simple too - garage band

Explanation:

5 0
3 years ago
Read 2 more answers
Why is project scope management so challenging in IT projects? What suggestions do you have for preventing scope creep in projec
seropon [69]

Answer:

Explanation:

<u>Ways to Avoid Scope Creep</u>

Scope creep is what happens when changes are made to the scope of a project without any control. Changes happen to projects all the time without been notify ontime as a project manager. It is that very rare project that ends up delivering exactly what was asked for on the first day. However, without there being some control over the changes, a project manager has little chance of keeping on top of the work and managing the project effectively.

Generally, scope creep is when new requirements are added after the project has commence. These changes are not properly reviewed. The project team is expected to deliver them with the same resources and in the same time as the original scope.

On the other hand, as a project manager you could end up with a project with lots of approved, considered changes, that never ends because every time you think you have finished a new requirement arrives in your inbox and you have to make more changes.

The following are five ways to keep control of your project.

<em>1-Document the Requirements</em>

<em>2-Set up Change Control Processes</em>

<em>3-Create a Clear Project Schedule</em>

<em>4-Verify the Scope with the Stakeholders</em>

<em>5-Engage the Project Team</em>

6 0
3 years ago
Which shortcut key is used to make a duplicate of a slide?<br><br><br>​
Rudiy27
Ctrl+D to duplicate
6 0
3 years ago
Other questions:
  • You suspect the hard drive is corrupted. Which window do you open to repair the drive?
    10·1 answer
  • Does group policy management matter without a server environment?
    7·1 answer
  • Write the definition of a method named add that receives a reference to a Scanner object associated with a stream of input consi
    13·1 answer
  • Which THREE devices can perform both input and output operations?
    8·2 answers
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    11·1 answer
  • c++ Project 6: Buoyancy. Buoyancy is the ability of an object to float. Archimedes’ principle states that the buoyant force is e
    13·1 answer
  • A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used?
    11·2 answers
  • Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false​
    5·1 answer
  • What is an input and output device? Give examples.​
    8·1 answer
  • _____is used to organize and modify the properties of the current selection.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!