1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
4 years ago
14

Create an online order form for a car rental store and include the following items: input text box to enter the number of days i

nput text box to enter the vehicle type (car, suv, ...) input text box to enter the number of designated drivers submit button to send form data to a server Note: the submit button is just to create a complete form. You do not have to define form action attribute for this assignment. Submit: HTML file and any other images and/or style sheets used to complete the design.
Computers and Technology
1 answer:
k0ka [10]4 years ago
5 0

Answer:

Explanation:

The following is the barebones HTML code for the form which can be saved as is or implemented into your own site. No styling or images were added since that is done based on the overall styling of the website in which the code is being implemented.

<!DOCTYPE html>

<html>

<body>

<h2>Car Rental Store</h2>

<form action="/action_page.php">

 <label for="fname">Number of Days:</label><br>

 <input type="text" id="fname" name="fname" value="Ex. 20"><br><br>

 

 <label for="lname">Vehicle Type:</label><br>

 <input type="text" id="lname" name="lname" value="Ex. SUV"><br><br>

 

 <label for="lname">Number of Designated Drivers:</label><br>

 <input type="text" id="lname" name="lname" value="Ex. 2"><br><br>

 

 <input type="submit" value="Submit">

</form>  

</body>

</html>

You might be interested in
What is the name of the process that is used to establish whether or not a user’s identity is legitimate?
pogonyaev

Answer:

Authentication

Explanation:

The authentication process is used to check the identification of the particular user or computer system .we can give authentication to any user by the username and password. If a particular user puts the correct username and password into the website then it has the authority to access that particular website.

For example: In the any mail website, if a particular user login with the correct username and password then it has an authenticated user. It means it has the right to access the mail of that account .  

8 0
3 years ago
Catherine purchased dried herbs from the grocery store. Which structure would she use if wanted to create a mixture of powdered
Damm [24]

Answer: C. sequence structure

Explanation:

Catherine would use the sequence structure to achieve her results of powdered herb after pounding the herbs.

In a sequence structure, an action, or event, tends to lead to the next action in an order which has been predetermined. The sequence can contain any number of actions, but no actions can or must be skipped in the sequence.

This means she has to go through the pounding process to achieve the powdered state.

6 0
3 years ago
Read 2 more answers
Why will the standard replacement algorithms (LRU, FIFO, clock) not be effective in handling this workload for a page allocation
dusya [7]

Answer:

These algorithm keeps an eye on which page was used when. LRU assumes that the page that was recently used has more probability  

of being used or requested by the user. Thus, it keeps the pages that were recently used, when a new page is requested. If page  

fault occurs, the requested page is fetched and it replaces the page in cache which was last referenced earlier than any other page  

in the cache (or frame).The LRU associates a time with each page in the memory and the ones with the greatest value are replaced.  

It does not suffer from Belady’s anomaly. The page fault will be referred when 512 page frame are reached. This is the total length of the complete sequence.

FIFO replaces pages that come in cache firstly. FIFO stands for First in first out.  

(b) The FIFO replacement algorithm replaces the page which was first brought into the memory followed by the next and soon.  

This algorithm suffers from Belady’s anomaly. In First In First out (FIFO) page replacement scheme of page replacement, the requests  

are executed as they are received. When a new request is made of a page which is not available in the existing frames, then the requested  

page is acquired from the memory. The page in the first frame is replaced by the requested page. If again a request is made of a page not  

yet available in the frames, it is fetched from the memory and it replaces the second frame's page, and so on.  

There are total 500 frames given. The alternative approach which is better than clock algorithm, FIFO, and LRU is that the pages  

from 0 to 498 are set to the fixed frames. Thus, 499 frames are fixed and only one frame can vary.

Explanation:

6 0
3 years ago
Which view allows you to make changes to the content of your presentation?
Neporo4naja [7]

Answer:

Share your screen and edits the parts you want. What meet are you using, zoom or something else?

6 0
3 years ago
If you embed a Word table into PowerPoint, what happens when you make edits to the embedded data? A. Edits made to embedded data
Nataly [62]

The answer is C. Edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data.

We have to understand that this table has been embedded and not linked. When a table like this is linked to PowerPoint, information can be updated when the source file is modified. On the other hand, when you embed the table without linking it, information in the Word file does not change if you modify both the source file.

4 0
4 years ago
Other questions:
  • In JAVA, answer the following:
    15·1 answer
  • Using a loop, write a program that reads in exactly five integers and outputs the sum.
    11·1 answer
  • What means can a worm use to access remote systems to propagate?
    7·1 answer
  • Why do hard drives tend to slow down over time?
    11·2 answers
  • Which of the following is the most effective password?
    15·2 answers
  • There are n coins, each showing either heads or tails. We would like all the coins to show the same face. What is the minimum nu
    6·1 answer
  • A free open source audio editing software program is
    5·1 answer
  • What type of computer is used in ATM?
    11·2 answers
  • A company wishes to begin the process of implementing a multi-party system and is looking for other companies with similar inter
    10·1 answer
  • Void printInfo()
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!