1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
12

BRAINLIEST!!! 20 PNTS!!!! HELPP!!!

Computers and Technology
1 answer:
12345 [234]3 years ago
7 0

Answer:

A) Parentheses

Explanation:

Conditional statements control behavior in JavaScript and determine whether or not pieces of code can run.

There are multiple different types of conditionals in JavaScript including:

If” statements: where if a condition is true it is used to specify execution for a block of code.

“Else” statements: where if the same condition is false it specifies the execution for a block of code.

“Else if” statements: this specifies a new test if the first condition is false.

Now that you have the basic JavaScript conditional statement definitions, let’s show you examples of each.

If Statement Example

As the most common type of conditional, the if statement only runs if the condition enclosed in parentheses () is truthy.

EXAMPLE

if (10 > 5) {

     var outcome = "if block";

}

​outcome;

OUTPUT

"if block"

Here’s what’s happening in the example above:

   The keyword if tells JavaScript to start the conditional statement.

   (10 > 5) is the condition to test, which in this case is true — 10 is greater than 5.

   The part contained inside curly braces {} is the block of code to run.

   Because the condition passes, the variable outcome is assigned the value "if block".

You might be interested in
The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
Len [333]

Answer:

a. True                      

Explanation:

  • Euclid's algorithm for finding greatest common divisor of two integers is a very effective method which has importance in cryptography as it is being used in cryptographic schemes and algorithms.
  • This algorithm calculates gcd of  2 integers which is the largest number which divides both the integers.
  • The famous RSA public-key encryption technique also uses extended version of this algorithm to compute modular multiplicative inverse
  • Euclid algorithm is also used in Chinese remainder theorem.
  • This algorithm is not only used in cryptographic algorithm but is also used in breaking these cryptosystems using prime factorization as we know that factorization of large integers is very tough and the security of many cryptography systems depends on this.
5 0
3 years ago
Lifelong learning _____. is only important for professionals with advanced degrees can be formal or informal includes formal cla
iren2701 [21]

Answer:

can be formal or informal

Explanation:

I just took the test!

7 0
3 years ago
Suggest three ways in which celebrating an occasion influences food choices?
Basile [38]

Celebrating influences food in more than 1 way
6 0
2 years ago
Read 2 more answers
Describe your WGU program, including two specific requirements that this degree has for completion.
Pavlova-9 [17]

Answer:

WGU program, including two specific requirements that this degree has for completion is explained below in details.

Explanation:

WGU is an online academy with profession joined bachelor's and master's degrees in—IT, education, marketing, and healthcare—intended to support working professionals fit an online academy learning into their hard-working lives.

As a scholars, graduate pupils must register in at least eight competency units every term, and undergraduate pupils must register in at least twelve competency units respectively term.

3 0
3 years ago
When the binary code is retrieved from ram and moved to the cpu, this stage is known as
vaieri [72.5K]

This stage is known as fetching.

  • Any operation you do in a computer, it runs a lot of codes inside it, and these codes are in binary.
  • For the operation, the computer accesses the RAM memory to gather information about this process, and moves it to the CPU, in a process named as fetching.
  • Thus, the stage asked in this problem is known as fetching.

A similar problem is given at brainly.com/question/21536104

4 0
2 years ago
Other questions:
  • You may be guilty of plagiarism even if
    13·1 answer
  • Suppose that we can improve the floating point instruction performance of machine by a factor of 15 (the same floating point ins
    13·1 answer
  • A word object in an excel worksheet to activate the word features
    9·1 answer
  • 1. Write a query to list the names all products (by product code and name) and the average ordered quantity for each product wit
    9·1 answer
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • . Select the advantages of RAID-5 relative to other RAID schemes. (MAY SELECT MULTIPLE)
    7·1 answer
  • Help please
    13·2 answers
  • Did anyone else remember that Unus Annus is gone? I started crying when I remembered.... Momento Mori my friends.... Momento Mor
    9·2 answers
  • A character that <br>is raised and smaller above the baseline is called​
    6·1 answer
  • you are investigating the use of website and url content filtering to prevent users from visiting certain websites. which benefi
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!