a) Based on the following specifications, construct the HTML code to generate the form design as shown in Figure 2. Specification: • • Set the form id and name attribute as "cakeOrder" and the method attribute as "post". The "Cake Type" field is a selection list which consists of 3 options: Black Forest, Lemon Cheese and Chocolate Mousse. • Set the width of the "Quantity" input box to 3 characters. • When the user clicks on the "Add To Cart" button, the user will be automatically directed to the confirmation.html web page. • The "Add To Cart" button is a submit button. -Cake Order Form- Cake Type: Black Forest Size: 1kg 2kg Quantity: Add To Cart
Q: 8) Display the firstname, lastname of the employees and the customerID that the employee served such…
A: Please refer to the following step for the complete solution to the problem above.
Q: Detail the applications of virtualization and cloud computing.
A: In computing, virtualization or is the demonstration of creating a virtual (rather than genuine)…
Q: 6 Supervised learning may be used for? Select one: a. temporal learning b. structural learning…
A: Supervised learning, also known as supervised machine learning, is a subcategory of machine learning…
Q: What are homonyms and synonyms, and why should you avoid using them while creating databases?
A: GIVEN: What are homonyms and synonyms in the context of database design, and why should you avoid…
Q: The question is regarding Modified Booth Algorithm using Verilog. Which approach is best, behaviour…
A: Booth's algorithm gives a way to multiply signed 2-'s complement binary integers using fewer…
Q: Question 4. Draw a DFA and NFA for the language accepting strings ending with 'abb' over input…
A: DFA and NFA All strings of the language end with the string "abb". The possible strings are { abb,…
Q: y type answer
A: I have write a MATLAB code solution:
Q: The focus on software creation is what sets software engineering apart from other branches of…
A: Regarding the software engineering discipline, certain thingsThe concept of "software engineering,"…
Q: ures and functionality of BitLocker Drive Encryption and the Encrypti
A: Introduction: Windows 2000 onward, EFS is accessible in all Windows versions with the exception of…
Q: Ahmed plans to launch a global software company focused on developing innovative banking software…
A: Introduction: Certain Normal Challenges that New Software Engineer Has As a new software developer,…
Q: Consider a public or private organization. You have been hired as a cyber- security…
A: As a cyber-security consultant/analyst, I have been hired to recommend policies and solutions for…
Q: Poor hash mapping means that every value is stored in the same place (that is, they are all in the…
A: Please check the solution below
Q: Users of the Internet have access to two distinct types of software. Differences between these…
A: Introduction: System software and application software are the two most important categories of…
Q: Make a simple five-point criterion to differentiate Computer Abuse from Computer Crimes if you are…
A: Introduction: Computer abuse and computer crime are not the same things. Computer abuse occurs when…
Q: one non linear equations For matlap Numerical method
A: Non Linear Equation: A nonlinear equation has at least one term that is neither linear nor constant…
Q: I was wondering how difficult it was to set up a network for the whole firm. Please provide an…
A: Introduction: Two or more computers are connected together to share resources (such as CDs and…
Q: ohabbat down
A: HTML: The HTML form design: Group the related element of the form by drawing a box around them…
Q: Can a router forward data to certain MAC addresses? If you answered yes, please explain how;…
A: Introduction: Each network-connected device's MAC address is stored in a routing router table. The…
Q: please code in python A local variable in a function is either a parameter or a variable which…
A: Answer: Algorithms: Step1: we have create a power function that takes the arguments as x and n which…
Q: Explain the difference between a static stack and a dynamic stack.
A: Introduction: A Dynamic Stack is a data structure similar to a stack, but its capacity (the maximum…
Q: Describe in depth ring counters and the applications they serve.
A: Ring numerationThis is a shift register application. In a ring counter, the output of the last…
Q: erals to be attached to the central proces
A: Introduction: An expansion card is a printed circuit board that can be plugged into an electrical…
Q: Provide some current, widely-used, and illustrative examples of database connection choices and…
A: The database connection is how application programmes interact with and connect to the data…
Q: 2 Name the worksheel Camper 3. You own the copyrights for a new camper. The copyrights will last 8…
A: The brief introduction to Microsoft Excel: Microsoft Excel is a useful tool for analyzing and…
Q: A discussion of prototyping's goals and use cases in software engineering is in order.
A: Prototyping which it is defined as the process of developing a working replication of a product or…
Q: Create a program that converts military time to a normal standard time using python.
A: Introduction: Thus, 12:00 am equals 0000 hours, 1:00 am equals 0100 hours, etc. If the time is 1:00…
Q: Find the tight bound of function f (n) = n^2 −10 lg(n) using the formal definition of Θ-notation.…
A: The function f is said to be Θ(g), if there are constants c1, c2 > 0 and a natural number n0 such…
Q: Describe the term ' Menu Bar' and explain any two menus with their main features.
A: An operating system is a programme that runs application programmes and serves as a communication…
Q: What is output by the call displayValues(5.44, 123)? function displayValues(tax, total) { try {…
A: Please refer to the following step for the complete solution to the problem above.
Q: There has to be a thorough explanation of the I/O mechanism. Recognize the differences in how…
A: Given that: the issue is subsystem specifics. I/O devices provide interaction with computer…
Q: Consider a set of 4 Lambda functions where each function exchanges data with the Simple Storage…
A: By rearranging the set of 4 web-services so that only one function exchanges data with S3, the…
Q: Which of the following is NOT an issue specific to MariaDB? Substition variables do not…
A: Answer Substition variables do not work(& and &&) Because this is not an issue specific…
Q: What do you think are the most crucial aspects of designing and creating software? Help us refine…
A: Metrics for software development are a crucial part in monitoring the quality, output, and overall…
Q: Describe the 8051 microcontroller's program memory's organization
A: The 8051 microcontroller is an 8-bit microcontroller that was originally developed by Intel in the…
Q: Given the message “ACCBCAAB*”, in which the probabilities of symbols are P(A) = 0.4, P(B) = 0.3,…
A: Given the message "ACCBCAAAB*",P(A)=0.4P(B)=0.3P(C)=0.2P(*)=0.1
Q: re about the trADitiOnAl file processing systEms and how they com
A: Introduction: A file system is physical in nature, whereas a database is more logical in nature.…
Q: When it comes to protecting a network, what function does a firewall do above all others? How should…
A: Answer A firewall is a network security device that monitors incoming and outgoing networks traffic…
Q: I need help with this discussion Discuss with the help of a paper or a diagram or both on:…
A: Let's see the answer:
Q: You and your coworker often take breaks to play a well-known online game. The computer of a friend…
A: There are three dangers included in the game.
Q: When you port scan using "nmap -sS", If you have not received any response back from target, what is…
A: When you port scan using "nmap-sS". If you have not received any response back from the target, what…
Q: ing occasionally become combined into one system? What does the term "thrashing" refer to, exactly?…
A: Given : Why are segmentation and paging sometimes combined into one scheme. What is thrashing?
Q: A Network Security Design is necessary to strengthen protection and security since servers on a flat…
A: Introduction: Demilitarized zones (DMZs) separate secure business networks. These subnetworks…
Q: [Question2]: (Compute the weekly hours for each employee) Suppose the weekly hours for all employees…
A: The JAVA code is given below with output screenshot
Q: What is the most crucial aspect of a data warehouse, and why is it named MetaData?
A: You may think of metadata as information about information. Information that is used to represent…
Q: General Motors' approach for gaining a competitive edge may be identified and defended using Michael…
A: Introduction: To help firms compete and ultimately dominate their industry, the generic competitive…
Q: If primary storage can be generated using semiconductor memory, then why can't secondary storage?
A: INTRODUCTION: A digital electronic semiconductor device used to store digital data, such as in a…
Q: Several advantages may be gained by switching to a hierarchical database structure from a relational…
A: INTRODUCTION: A data model called a hierarchical database model has the data arranged in a tree-like…
Q: provide an explanation of what you mean by the phrase "Digital Transformation."
A: Digital transformation is the process of employing digital technology to create new or change…
Q: Try using the ref or out keyword to pass in an array argument and see what happens.
A: The process of creating a set of instructions that tells a computer how to perform a task is known…
Q: 3. David Bergen, Levi's CIO, put together a cross-functional team of key managers from IT, finance,…
A: Answer
Step by step
Solved in 3 steps with 1 images
- Theme : arithmetic application for primary school students. Write a new HTML form with JavaScript codes that accept the student's name, program, age, gender, and state ( may add other input as well). The HTML page accepts 2 numbers and the user will select one of the buttons to perform the selected function. It will allow user to repeat the task and display all input and result of calculation accordingly. It also allow user to exit the application and allow user to input numbers and select buttons that perform each of the following functions respectively : -Addition, Subtraction, Multiplication, Division, Modulusbloil Q2 Write the necessary HTML & JavaScript code to add three numbers and display the result by using a user defined function namely 'funadd'. Create a button to call the above mentioned function and pass three values while calling. Answer:First function, red and dotted line y = 1- Vx3 + 2x2 + 2x + 4 Second function, yellow and dashed line y = 2(1 – x)ex – 1 Plot the given equations in a single figure in the range between -1 and 1 having at least 100 steps with the given colors and styles, also add a legend to the figure. You can write "first function" and "second function" in the legend. %3D Please attach the code in a doc or docx file! ONLY working codes will be evaluated!
- Web development: Create a simple one page HTML newsletter using HTML and CSS for a fictitious club or a real organization if you so wish. This must be a single page project. As a member you are commissioned to build a one page newsletter. The basic structure should follow the following specifications: Header and footer. A three column main content layout. The columns should be 20%, 60%, 20%. The maximum width of the newsletter must be 1200px. All styling must be included in a single CSS file. Your newsletter must use HTML5 semantic layout convention. You must provide usage of at least two block level elements, three font style elements, and two list elements, at least two images in the documentQ1: Explain the form attributes.Design HTML Form. Javascrapt Apply the data validation so that the number is between 10 and 20 display the message "Input OK"otherwise display the message "Input not valid";
- Scenario Wilson Zoo would like you to implement and test a web application to be used to order drinks at their smoothie and milkshake shack, The Monkey Bar. Basic Application Your web application must have one HTML file and one JS file (no navigation or style is needed) you may use a single style sheet to show and hide elements as per the specification provide suitable form elements to allow the customer to select a drink, by choosing: size, type, ingredients, base and extras, as shown below display the cost of the current drink, for example: provide a button to add the current drink to an order display the full details and cost of all drinks that have been added to the order, for example: display a running total of the cost of the order, for example: provide a button to place the order which simply outputs a message stating the order has been received and resets the screen The customer can pick the following options for their drink: size: small - £2.45 medium…Task 3: Data Form Validation Considering the following Form. Javascript code Write a validation.html and validation.js the data of this form. Create the validate Function calling validate()to check input data when user click on the submit This validate() Function check: If the First Name is Empty, display a message " First name required " in the Error division If the Second Name is Empty, display a message " Second name required " in the Error division If no Error, display the entered data in the searches division. 2. Create the clearAll Function calling clearAll()to clear all input data and the two division in body Error division and searches division.Imagine that an xhtml document contains the following hyperlink tag I am Seven. When the link text (Seven) is clicked, the servlet with the URL pattern /process is called. Rewrite the code to instead use a form that submits to the same servlet to produce the exact same response using hidden form elements for any form parameters. The form should contain a submit button with the button text Seven. The form method should be get (case sensitive answer).
- While examining a web form and the JavaScript source code for it, you notice that a function that changes the text displayed in one part of the page is being executed every time you type or delete a letter or number in a text entry field labeled “Message,” instead of when you press the Tab key to move to the next form field. You correctly guess that _____. a. the function is being triggered when the form element labeled “Message” loses the focus b. the function must be triggered by a change event because input events do not apply to text entry boxes c. anonchangeevent handler has been applied to the form element labeled “Message” d. an event listener for theinputevent is attached to the form element labeled “Message”Write 20 input test scenarios for the below form (I have provided the accompanied image for more context) Create the Following Form Using HTML and Implement Input Validation Using Your PreferredProgramming Language (Do Not Rely on HTML for Input Validation) Example:1. If First Name is set and not empty2. If Password contains at least 8 spaces with at least 1 number, 1 lower case, 1 upper case and 1 special characterTask:1. Create a personal information form using HTML5 that includes fields for various personal details (e.g., name,address, phone number) similar to the slide’s example (you can use any programming language you want)2. Implement input validation using regular expressions for two specific fields: USM ID and USM email.Validation Requirements:• USM Email: The form must validate and only accept USM email addresses in the format user@usm.edu.• USM ID: The form must validate USM IDs in the format W10123456 or w10123456. The USM ID always startswith 'W' or 'w' (one position), followed by 10 (two positions), and any combination of digits (0-9) for the next 6positions.Testing Patterns (USM ID):• Valid:• W10123456• w10123456• Invalid:• abc1012345• A10123456• 9998501234• w999123456• w121234565• W10w12345• Ww85012345• w100ABCDEF• 123456850w