1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
2 years ago
15

How to get a javascript's varible

Computers and Technology
1 answer:
Kamila [148]2 years ago
8 0

Answer:

If you want to use a js variable in a php script you MUST pass it within a HTTP request. There are basically two ways: Submitting or reloading the page.

Explanation:

In programming, just like in algebra, we use variables in expressions (total = price1 + price2). From the example above, you can calculate the total to be 11. JavaScript variables are containers for storing data values. All JavaScript variables must be identified with unique names. These unique names are called identifiers.

You might be interested in
The device used to control a heating system in the home is called a thermostat.
Makovka662 [10]
<span>The device used to control a heating system in the home is called a thermostat.
This is a true statement.
</span>
3 0
4 years ago
Imagine that you have a friend who has expressed interest in designing and programming video games. He loves to play video games
Julli [10]

Answer:

Point out that it takes education in coding and computer programming in order to get to the basis of designing and programming video games, and that it takes weeks, months, if not years to fully complete a game. He would need time and patience in order to work in the video game creation idustry. Schooling for programming computers and apps can take years.

Explanation:

8 0
3 years ago
How does setting user permissions increase the security of a system?
leonid [27]

Answer: This can allow for less hackers to acquire your most essential and private information. It will be kept private to you and only others you share with.

Explanation: For example, if I wanted to edit a document without being given the consent to do so this will breach the security of user permissions, but if the individual was to set the document to view only, I would not have access to edit or even change little aspects of it.

3 0
3 years ago
What is cryptography
deff fn [24]
<span>Cryptography is a science to transform using secret key called conventions, information or clear signals in information or signals unintelligible to third parties not having the knowledge of the secret, or perform the reverse operation through means hardware or software designed for this purpose.

Cryptography is used to detect the loss of integrity of information, contacts authenticate and protect <span>the confidentiality of information</span></span>
6 0
3 years ago
Read 2 more answers
When you press the ____ key without entering any text after the automatic bullet character, Word turns off the automatic bullets
Amiraneli [1.4K]
Enter key it will atumatically bullet
7 0
3 years ago
Other questions:
  • Which options or tools can be used to overlap objects on a slide? Check all that apply.
    13·1 answer
  • What invention was key to computers being moved into homes and personal use?
    10·2 answers
  • Academic databases are the best place to look for
    12·1 answer
  • Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
    6·1 answer
  • What method of technical drawing uses converging lines?
    7·1 answer
  • You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
    10·1 answer
  • What would be the most constructive response
    10·1 answer
  • When investigating the serial position curve, delaying the memory test for 30 seconds
    10·1 answer
  • Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
    7·1 answer
  • Contemporary pc operating systems and application software use a​ ________, which makes extensive use of​ icons, buttons,​ bars,
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!