1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
10

execute or non-execute some of Javascript statements according to condition expression result.................​

Computers and Technology
1 answer:
AnnyKZ [126]3 years ago
4 0

Answer:

execute

Explanation:

You might be interested in
How can you best explain server side caching with web pages​
maksim [4K]

Answer:

Server side web caching typically involves utilizing a web proxy which retains web responses from the web servers it sits in front of, effectively reducing their load and latency.

Explanation:

4 0
3 years ago
Determine the efficiency and big-O notation for the following algorithm:
Anon25 [30]

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

8 0
3 years ago
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a pr
madreJ [45]

Answer:

Visual.

Explanation:

Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called visual programming.

A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and can be defined as a programming tool that avails programmers the ability to develop software programs (applications) using graphical elements and figures rather than texts alone.

Some examples of visual programming language are executable UML, Blockly, Kodu, Alice, Lego mindstorms, Gamemakers etc.

6 0
3 years ago
The part of the computer that provides access to the Internet is the
andrew11 [14]

Answer:

MODEM

Explanation:

5 0
3 years ago
A new network administrator has been asked to verify the metrics that are used by EIGRP on a Cisco device. Which two EIGRP metri
ICE Princess25 [194]

Answer:

C & E

Explanation:

Metric are parameters used in a dynamic routing protocol to determine a network path. Dynamic routing protocols are protocols configured to a router to enable dynamic learning of network paths in interconnected networks.

There are various types of dynamic routing protocols, they are, RIP, EIGRP, OSPF, IS-IS, BGP etc.

The EIGRP uses various metrics to determine network paths, they are bandwidth, delay, load, Reliability etc.

The reliability and load metrics values are dynamically updated over a period of time, while the bandwidth and delay are static values, but the MTU is not a metric used in EIGRP.

4 0
4 years ago
Other questions:
  • When a typist changes from a conventional typewriter to a word processor, his typing schema will have to _____ to incorporate th
    12·1 answer
  • Can any existing directory beneath the system root directory be used as a mount point?
    9·1 answer
  • Describe the effect of a pull up resistor
    7·1 answer
  • Now imagine that we have a list of 5 employees who have each worked 45, 15, 63, 23, and 39 hours. We'll fix rate_of_pay at 10. P
    10·1 answer
  • Consider a system that contains 32K bytes. Assume we are using byte addressing, that is assume that each byte will need to have
    10·1 answer
  • A(n) _____ is a network confined to sites on internal web servers and only available to individuals within an organization.
    11·1 answer
  • A key tactic that is used in many attacks, but very frequently in CEO Fraud, is creating a sense of what?
    15·2 answers
  • Explain the iterative nature of the database requirements collection, definition, and visualization process.
    14·1 answer
  • Test unit 8 edhesive answers ​
    15·1 answer
  • Which method can be used for making a robot perform a different set of functions?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!