1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
14

Trebuie sa scrii niște instrucțiuni în JavaScript care adaugă în DIV lungimea HTML-ului din interiorul tag-ului cu ID​

Computers and Technology
1 answer:
Sphinxa [80]3 years ago
7 0

Answer:

let paragrafExemplu = document.getElementById('exemplu').innerHTML

document.getElementById('output').innerHTML = paragrafExemplu.length;

Explanation:

You might be interested in
When you connect several home devices using a wireless router, what network topology are you using? A. bus B. mesh C. star D. ri
bonufazy [111]

Answer:

Star Topology

Explanation:

Because the definition of Star Topoplogy is: In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device.

3 0
3 years ago
Mi laptop dice the computer restarted unexpectedly or encountered an unexpected error.Windows installation cannot procced.To ins
borishaifa [10]

Answer:

Explanation:

There are two reasons as to what could have happened with your laptop. The first one is that your laptop was installing a critical windows update which got corrupted when the laptop's battery died causing windows itself to become corrupted. In this case, you would need to format the hard drive and reinstall windows. The second reason could be that your hard drive is failing and not allowing Windows to load or properly be installed on it. In this second scenario you would need to buy and replace the hard drive.

4 0
3 years ago
In your own words, what is your definition of cybercrime and computer forensics?
mr_godi [17]

Answer:  

Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.

To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.

Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.

The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.

7 0
3 years ago
Use the five-step decision-making process discussed in Chapter 1 to analyze the following situations and recommend a course of a
RideAnS [48]

Answer:

The responses to this question can be defined as follows:

Explanation:

Yeah, their numerous sponsorships brands have potential. Every business does have its Trademarks for a commodity, that distinguishes others. It's an infringement for trademarks, it has only provided to those trivialities, which success and if I would plan this for my friend. I would never list or show those points of his accomplishments I never would Numerous sponsors. This should include all its information using its trademarks as well as other Site partners are excluded even though they are or are browsing their trademarks where the law is prohibited.

7 0
3 years ago
Although a variety of different styles of documentation exist for report preparation, each style requires the same basic informa
BARSIC [14]
I would say the statement given above is true. <span>Although a variety of different styles of documentation exist for report preparation, each style requires the same basic information. Hope this answers the question. Have a nice day.</span>
3 0
4 years ago
Other questions:
  • Why is timbre an important musical element?
    7·2 answers
  • The network of satellites monitoring continental movement is referred to as
    7·1 answer
  • Does anyone know how to execute this assignment on Scratch?
    8·1 answer
  • Fedora operating system
    9·1 answer
  • What is an objective of state-sponsored attackers?
    11·1 answer
  • A storyboard is an example of an implementation tool.
    8·1 answer
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • Because people can easily upload information and share online, they tend to:
    15·1 answer
  • Jill is configuring the AutoArchive feature in Outlook 2016. What is the default setting in relation to when AutoArchive
    8·1 answer
  • This unintelligent brain of mine decided to charge my phone overnight thinking that nothing bad will happen ;-; the next morning
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!