If you want to print on a page you can use
document.write();
If you want to write in console then there are multiple options
console.log() - to log information
console.error();- to log errors
console.warn(); - to log warning message
If you want to popup some information the you can use -
alert(message);
there are also various options present in alert.
or
print() essentially just calls up the native print dialog for a given window.
But as you're are thinking, it will work on any window or (i)frame.
thus if you write content to a frame, you can then call this to print it.
window.frameName.print();
note the only drawback (and its a big one), is that this calls up the print dialog... not the print preview window... thus the user doesn't really get a chance to see what they are printing and/or scale it to fit their printer/paper.
I personally wish that all browsers would implement the following to handle the above issue.
window.printPreview();
Hope this will help !!!
Answer:
Just add "document.wright();" to print text.
How many bits are reserved for the Transmission Control Protocol (TCP) flags?
Students who respond promptly to e-mails are following which netiquette rule?
A. keeping content appropriate
B. assessing an online environment
C. respecting everyone’s time
D. practicing ethical behaviors
Answer:
respecting everyone's time
Explanation:
they don't make people wait for a response
What benefits does the Domain Name System (DNS) provide? Check all that apply.
Network Address Translation (NAT)
Ease of address memorization
Assigning Internet Protocol (IP) addresses
Easy mapping to a new Internet Protocol (IP) address
Answer:
Option C (Assigning Internet Protocol (IP) addresses) is the correct choice.
Explanation:
DNS is a centralized process for resolving as well as continuing to give IP addresses for something like a specified domain name, a method that allows you to search a site via your web browsers whenever you tab or switch on any web server (Internet Explorer, chrome, respectively.).This helps everyone to still have throughput mostly on the network although one of the databases becomes offline for maintenance.All other options are not relevant to the situation in question. It is the right answer to all of the above.
Answer:the TCP
Explanation:
When does the VB.NET programming environment start to operate?
A. once a VB.NET project is compiled
B. once a VB.NET project is created in the Microsoft Visual Studio environment
C. once a VB.NET project is debugged
D. once a VB.NET project folder is opened
E. All of the above are correct
Answer:
B. once a VB.NET project is created in the Microsoft Visual Studio environment.
Explanation:
Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.
What is the outside of an iPhone called?
Sam card tray is the answer
Which example of IT lifelong learning is most likely to lead to a promotion
Answer:
A supervisor learns about personal finance.
Hope the above answer helps u...
If my answer helped u mark me as brainlist..!
Follow me...✌
Answer:
A supervisor learns about personal finance.
Explanation:
5. Which one of the following best defines a network server?
O A A type of network system that provides resources to network clients
B A type of system where all devices on the network are clients
C A type of network with one server and multiple clients
O D A type of device that connects all all other network devices together
Answer:
i thank it is B for the answer
Clicking and double-clicking are two of the five
Answer:
The correct answer is events
$8.25/hour; _____$/year, when working 40 hours a week.
Proper numeric keyboarding technique includes all of these techniques except
O keeping your wrist straight
O resting your fingers gently on the home keys
O looking at the keys
O pressing the keys squarely in the center
Answer: Its the 1st choice, 2nd choice, and the final one is the 4th one. (NOT the third answer choice)
Explanation: (I just took the test)... Hopefully this helps and good luck.
When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of your computer becoming infected?
A. Printing to the same printer as infected computer
B. Accepting email attachments sent from an infected computer
C. Sharing Word documents with an infected computer
D. Sharing removable disks with an infected computer
Answer:
d
Explanation:
The correct option is D: Sharing removable disks with an infected computer
Removable disks are disks that use to keep data as well transfer data or information from one computer to another computer.
With Removable disks a computer infected with a virus cannot infect another Computer as the what the user does is to simply insert the USB port of the Removable disks into the computer which inturn enable the transfer of data to the computer to take place .
Learn more about Removable disks here:
https://brainly.com/question/4327670
C++ code pls write the code
Answer:
Following are the code to this question:
#include<iostream>//defining header file
using namespace std;
class vec//defining class vec
{
int x, y, z; //defining integer varaible x, y, z
public: // using public access specifier
vec() //defining default constructor
{
x = 0; //assign value 0 in x variable
y = 0; //assign value 0 in y variable
z = 0;//assign value 0 in z variable
}
vec(int a, int b , int c) //defining parameterized constructor vec
{
x = a; //assign value a in x variable
y = b; //assign value b in y variable
z = c;//assign value c in z variable
}
void printVec() //defining a method printVec
{
cout<<x<<","<<y<<","<<z<<endl; //use print method to print integer variable value
}
//code
vec& operator=(const vec& ob) //defining operator method that create object "ob" in parameter
{
x=ob.x; //use ob to hold x variable value
y=ob.y;//use ob to hold y variable value
z=ob.z;//use ob to hold z variable value
return *this;//using this keyword to return value
}
};
int main()//defining main method
{
vec v(1,2,3);//calling parameterized constructor
vec v2; //creating class object to call method
v2=v; //creatring reference of object
v2.printVec(); //call method printVec
return 0;
}
Output:
1, 2, 3
Explanation:
In the above-given code part, a method "operator" is defined, that accepts an object or we can say that it is a reference of the class "ob", which is a constant type. Inside the method, the object is used to store the integer variable value in its variable and use the return keyword with this point keyword to return its value.
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?
Answer:
Redundant networks are generally more reliable.
Explanation:
The complete question is in this brainly link;
https://brainly.com/question/18302186
This is based on knowing the importance of a redundant network.
C. Redundant networks are more reliable
A redundant network is one that helps to increase the reliability of a computer system. Now, this is possible because the more critical the ISP NETWORK is, the more important it will be for the time it takes to resolve from a fault would be reduced. This implies that, by adding one redundant device to their connection, the time it will take to resolve from a fault would be drastically reduced and this will lead to a far more reliable system.Thus, redundant networks are more reliable.
Read more at; brainly.com/question/17878589
What device to use when downloading a large file?
One of the simplest and best known polyalphabetic ciphers is _________ cipher. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.
Answer:
Vigenere
Explanation:
Vigenere Cipher is an encryption method of alphabetic symbols that utilizes an easy form of polyalphabetic exchange which is carried out through Vigenere table.
Hence, in this situation, the correct answer is VIGENERE Cipher because it is the form of cipher whereby the set of related monoalphabetic substitution rules comprises of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is indicated by a key letter which is the ciphertext letter that substitutes for the plaintext letter.
Which of the following is used to encrypt web application data?
a. MD5
b. AES
c. SHA
d. DHA
Answer:
b. AES
Explanation:
AES is an acronym for Advanced Encryption Standard and it is a cryptographic or symmetric block cipher that is based on a substitution-permutation network (SPN) used for the encryption of sensitive data over the internet or web. AES uses a key length of 128, 192 or 256 bits and a block length of 128 bits to encrypt data on web applications.
It is an encryption standard of the government of the United States of America and is supported by the National Institute of Standards and Technology (NIST).
Hence, AES is used to encrypt web application data and it uses an algorithm developed by Vincent Rijmen and Joan Daemen, known as the Rijndael algorithm.
Question #1
What do you use to navigate through a file by moving the view
up and down or side to side?
O Title bar
O Ribbon
O Document area
O Scroll bar
Answer:
Answer is the Scroll Bar
Explanation:
When you are in a document, the way you move around or navigate in it is by dragging the scroll bar that is to the left of your screen or at the bottom of your screen. Hope this helps!
The question is in the picture
Answer:
nordthaf
Explanation:
nofth
what is ovoviviparous?
Answer:
o·vo·vi·vip·a·rous
Explanation:
(of an animal) producing young by means of eggs which are hatched within the body of the parent, as in some snakes.
Suppose you have a class Ship, which was written by another programmer who used to work for your employer. Ship is used in several different applications. Ship contains a public method called getBearing() that consults gyroscopes and a compass to determine the direction in which the ship is moving and returns a Location object. You need to refactor the code to use a GPS receiver instead. You should
Answer:
Research of the GPS features and the modules and packages needed by the programming language to implement and receive data from a GPS tracker.
Explanation:
The Ship class is a blueprint that holds a data structure of a ship's location in coordinates. The location variable can be changed using the getBearing method and an instance of the ship class can be made several times for different ships in the harbor. This class depicts the power of object-oriented programming.
Refactoring is a concept in software engineering where source codes are modified to achieve code efficiency and speed. All programming language source code should be refactored where needed with the right packages or modules.
What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Something else? Discuss this question and provide support for your answer.
Answer:
The single greatest physical threat to information systems is:
Sabotage
Explanation:
Sabotage describes the efforts of internal persons to ensure that a system does not operate as intended or is destroyed. Among the threats to information systems, this is the greatest. The problem with sabotage is that the operators are internal, they know the system very well. They understand the weak points and the strengths of the system. They are internal terrorists to any information system. These internal saboteurs are capable of using any means to achieve their purpose. Therefore, it is necessary to scrutinize employees from time to time to discover internal risks.
What will be the result from running the following program? print grades print 92 print 80print total print 92+80
Answer:
Grades
92
80
Total
92 + 80
Explanation:
When utilizing quotations, you enable to code to print what wrote, as it is. So, instead of adding the 92 + 80, it's printed out.
I hope this helped!
Good luck <3
Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, search for, and process information? MP3 player. Hard drive. Flash drive. Personal computer.
Answer:
It's personal computer
Explanation:
I got it right on my assignment
What is true about connectionless packet switched networks? a. each datagram must contain both source and destination addresses b. without a connection, datagrams may not arrive in sequential order at the destination c. establishment of a connection between communicating points is not required prior to exchanging datagrams, thus reducing overhead communications d. all of the above are true
Answer:
d. all of the above are true
Explanation:
Connectionless Packet Switching is a term that is used in computer networking operations to describe the breaking of information exchange path into a various packet of small sizes acquired and refined over network switches and routers, which is then transferred from one subsequent node to the other. It is sometimes referred to as Datagram Networks
However, during this operation, Connectionless Packet Switching must satisfy the following amongst others:
1. each datagram must comprise both source and destination addresses
2. without a connection, datagrams may not come in sequential order at the destination
3. establishment of a connection between communicating points is not needed prior to exchanging datagrams, thus reducing overhead communications
Therefore, considering the available options, the correct answer is option D
For what purpose are high-level programming languages used for
1. Give control over the hardware to execute tasks quickly
2. Provide code that controls the computers hardware
3. Translate low-level programming languages into machine code
4. Write programs for general applications
Answer:
To speed up the compiler during run time
Explanation:
Write a MATLAB function named average_of_scores_with_drops The function will have two inputs and two return values. The first input will be a list of scores. The second input will be a postive integer representing the number of scores to drop. It will not be larger than the length of the list. Your function should determine the average of the scores after dropping the specified number of lowest scores. The first return value must be a real number equal to the average score. The second return value must be the number of items that were averaged. Notes: Example Test Case: SCORES
Answer:
-%Define the function.
function [avg, ele_left] = average_of_scores_with_drops(input_list, drop_element)
%Sort the list.
input_list = sort(input_list);
%Compute the length of the list.
len_list = length(input_list);
%Declare and initialize the variable.
sum = 0;
%Increase the element to be drop by 1.
i = drop_element + 1;
%begin the for loop.
for k = i : length(input_list)
%Add the elements.
sum = sum + input_list(k);
%End of the for loop.
end
%Compute the elements left after dropping the dropped element.
ele_left = length(input_list) - drop_element;
%Compute the average of the elements left.
avg = sum/ele_left;
%End of the function defined.
end
%Run the following code in the command prompt.
%Call the function and return the average
%score and the number of elements
%whose average is computed.
[average_score , number_of_items] = average_of_scores_with_drops([8 6 1 2 3 5 10], 2)
SAMPLE OF OUTPUT
average_score = 6.40000000000000
number_of_items = 5
How has technology influenced space exploration?
Answer:
One of the biggest benefits of machine learning when it comes to space exploration is that programs can sift through the available data more easily than humans, which increases the chance of finding planets just by looking at datasets. It's even thought that AI could be instrumental in locating extra-terrestrial life.
Explanation:
Which of these browsers was the first widely adopted?
1. Internet Explorer
2. Chrome
3. Firefox
4. Netscape
Answer:
netscape
Explanation:
Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.
Answer:
Vulnerability of.
Explanation:
In this scenario, your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a vulnerability of the network software.
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Recursion is a natural use for a _____ (stack or queue)
Answer:
Stack
Explanation:
Any function that call itself can be regarded as recursive function, it should be noted that Recursion is a natural use for a stack, especially in the area of book keeping.
Recursion is very important because some of problems are usually recursive in nature such as Graph and others, and when dealing with recursion , only base and recursive case is needed to be defined.
Some areas where recursion is used are in sorting and searching.