Answer:
The JavaScript statement is
var str1 = "Information Technology";
var result = str1.toUpperCase();
Explanation:
JavaScript is used to validate the client side it means it provide the client side validation.
Following are the function of JavaScript that converted the string into uppercase.
function val()
{
var str1 = "Information Technology ";
var result = str1.toUpperCase();
}
The toUpperCase() function convert the string into uppercase in JavaScript
OUTPUT
INFORMATION TECHNOLOGY
<span>If a attachment is not reliable to open, terrible effects can happen, peradventure it may have a virus or even malware that can destroy a computers software.
To avoid this and stay on the safe side, try the following:-
- Open it in protected view
- Do not save the attachment on your computer
- Look at the author and read the message carefully to make sure it is not biased.
- Open it on a flash-drive </span>
Answer:
a = float(input("Enter Side A: "))
b = float(input("Enter Side B: "))
c = float(input("Enter Side C: "))
d = float(input("Enter Side D: "))
e = float(input("Enter Side E: "))
area1 = 1.0* a * b
area2 = (a - c) * (d - e -b)
area3 = 0.5 * (a - c) * e
print ("Room Area: " + str(area1 + area2 + area3))
Explanation:
happy to help ^3^
The test that a computer needs to pass after a human's conversation with it and not be able to tell if it was a machine or a human is; Turing Test
<h3>Test of Computers</h3>
The correct answer to the blank portion of the question is Turing test. This is because Turing Test is a test of a computer's ability to exhibit intelligent behavior that is equivalent to, or indistinguishable from, that of a human's behavior.
Finally, If the evaluator cannot reliably tell the computer from the human, the machine is said to have passed the test.
Read more about Test of Computer at; brainly.com/question/21283135
Answer:
The answer of the following question is Brute force attack
.
Explanation:
A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.