1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
3 years ago
11

Whats wrong with my code for .addEventListener

Computers and Technology
1 answer:
Kobotan [32]3 years ago
4 0

Answer:

Java code that is what I think

You might be interested in
Write a short program using Python that will:
Alexxx [7]

Answer:

// program in Python to check perfect number

#function to find number is perfect or not

def is_Perfect_Number(n):

   #total variable

   tot = 1

   i = 2

   #sum of all divisor of number

   while i*i<=n:

       if n%i==0:

           tot = tot + i + n/i

       if tot == n and n != 1:

           return 1

       i = i+1  

   return 0

#read until user enter a perfect number

while True:

   #read integer

   num = int(input("Input an integer: "))

   #call the function

   if(is_Perfect_Number(num)):

       print(num,"is perfect number")

       #if perfect number break

       break

   else:

       print(num,"is not a perfect number")

       #ask again

   print("try again.")

Explanation:

Read number from user and then call the function is_Perfect_Number() with  parameter "num".This will find the sum of all divisor of number.If sum is  equal to number then it will return 1 else return 0.If the number is not  perfect then it will again ask to enter a number until user enter a perfect  number.

Output:

Input an integer: 24

24 is not a perfect number                                                                                                

try again.                                                                                                                

Input an integer: 28                                                                                                      

28 is perfect number

6 0
3 years ago
Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
Katen [24]

Answer:

Spam

Explanation:

If you receive in bulk the unsolicited messages, then that does mean that your inbox is being spammed. This will not harm you but you will lose the Gb that is allocated to your mailbox. And if you will not check then your mailbox will soon be full, and you might not receive some of the important messages that you should reply to immediately.

6 0
3 years ago
Select the best answer from the drop-down menu. ________ networks use cables connected directly to the computer. Signals sent in
LekaFEV [45]

Answer: Wired, Wi-fi, Wi-fi, A wired network, Wi-fi

Explanation:

4 0
3 years ago
Select the correct answer. Marie uses a browser to visit a blog. How is the blog uniquely identified? A. web page B. website C.
damaskus [11]

Answer:

I belive the answer is E

Explanation:

8 0
3 years ago
Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
LiRa [457]

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

4 0
3 years ago
Other questions:
  • An undesirable jagged appearance is referred to as
    7·2 answers
  • An information- and communication-based electronic exchange environment mostly occupied by sophisticated computer and telecommun
    13·1 answer
  • ____________ is a widely accepted international best practices framework for implementing information systems security.
    12·1 answer
  • Please Help!! How to code this in Python?
    11·1 answer
  • Some websites are dedicated to cataloguing information. Since these sites contain so much data, these sites are usually organize
    11·2 answers
  • EASY POINTS what favorate food<br> so easy
    7·2 answers
  • Q1 To remove filter
    15·2 answers
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    6·1 answer
  • PLZ HELP ASAP
    13·1 answer
  • Impacto que ha tenido en la sociedad la educacion virtual​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!