Pattern Matching: - Create HTML page that: o display a log in form asking for user name, create a password and confirm the password. o Validate Password validation calling validation function from an external JavaScript file. - Create external JavaScript file for Password validation using pattern matching (search or match) as follows:
Q: Select two algorithm from the following list of algorithms. Explain, how does it work? Give an examp...
A: INTRODUCTION: Here we need to choose two algorithm and explain about their working and also give exa...
Q: 3. Change the following IPV4 addresses from binary notation to dotted decimal notation. [ a. 1000001...
A: We have 2 IPv4 addresses given in binary notation. We need to convert these addresses from binary to...
Q: What are the advantages and disadvantages of utilizing robots in the industrial industry? What will ...
A: utilizing robots in the industrial industry
Q: i need code for face detection using CNN user defined and face recognition using svm clasifier from ...
A: CNN - It is a deep learning algorithm that takes an image as an input and assign some features to va...
Q: SOP of the following minterms: F(V,W,X,Y,Z) = Σm(0,2,4,6,7,8,10,11,12,13,14,16,18,19,29,30
A: Solution:-
Q: This question is about sparse and dense indexes. Suppose blocks either hold up to 30 records or 200 ...
A: Solution :: Lets see first what is dense index and sparse index called ? Answer :: Dense Index: It h...
Q: Define data mining as an enabling technology for corporate intelligence, as well as the applications...
A: Definition Data mining is defined as a process that analyzes the data from various sources and summa...
Q: For each of the following tasks, describe (briefly) what, if anything, you would need to do to the a...
A: The most important elements in a computer proposal: Ai Technology (AI), Insights, and Predictive Ana...
Q: Given the instruction: j Finish where its 32-bit format is 0x08100008 and its address in text segmen...
A: As mentioned above the user is using the Mips language, and in the pseudo direct addressing which us...
Q: I'm stuck on this problem, and here's what I'm stumped on: Meadowdale Dairy Farm sells organic brow...
A: Approach to Programming: Importing the required packages Making a major class Identifying the primar...
Q: Construct a PDA that matches all strings in the language over {x,y} such that each string has at lea...
A: Initial state = q0 Final state = qF Strings accepted = xyyy, xxyyyy,...................................
Q: CODE USING C++ Can you identify if Cody's name is spelled right? If so, then make a program that ac...
A: PROGRAM INTRODUCTION: Include the required header files. Start the definition of the main function....
Q: Discuss and explain the importance of new cloud computing technologies that enable scalability.
A: Introduction: Cloud Computing: Customers can use cloud computing to obtain comparable programs throu...
Q: What are the most significant factors to consider while designing a physical database?
A: Introduction: This topic focuses on the most critical factors to consider while creating a physical ...
Q: ops are very useful in creating lists and tables. In this PHP exercise, you will use a loop to creat...
A: Lets see the solution.
Q: Describe five benefits and five drawbacks of building prototypes.
A: Five Benefits: 1) Provide Functionality and interactions- static high fidelity and wireframe are una...
Q: Data warehouses in retail are dominated by
A: Data warehouse in education are influenced by: Option(A) Large, geographically distributed organizat...
Q: 3. Change the following IPV4 addresses from binary notation to dotted decimal notation. [ a. 1000001...
A: a. 10000010 00001111 01010001 00010100 Decimal value of 10000010 is as follows: 1*2^7 + 0*2^6 + 0*2...
Q: To Clean a form from any texts and shapes, The Script is: CLS Form1.caption=" " Form1.hide O list1.c...
A: Find the answer with reason given as below :
Q: Q3.Answer the following : a.convert hexadecimal number (fle516) to binary number. b.convert decimal ...
A: 3. a. Given hexadecimal number (f0e5)16 Hexadecimal to Binary: Hex Binary 0 0000 1 0001 2 0...
Q: Writes a MIPS assembly language program that reads an input string, reverses the order of its charac...
A: .model stack .stack 200h .data msg1 db 10, 13, "Enter a string (at most 18 characters) : ", 10, 13,'...
Q: When a social engineering hacker attempts to obtain knowledge about a user's login id and password, ...
A: Given: When a social engineering hacker attempts to obtain knowledge about a user's login id and pas...
Q: Determine T(n) and the time complexity of the function below. Explain why.
A: Here, Determine T(n) and the time complexity of the function given below. Explain why.
Q: In C++, how you can handle files.
A: Introduction: Files are used to store data on a storage device indefinitely. File handling is a meth...
Q: What governance mechanisms need to be put in place to ensure common customer data and a shared custo...
A: Let's see the solution in the next steps
Q: s there anything new in IT infrastructure or information systems in the recent year?
A: Introduction: Application creation, maintenance, testing, quality analysis, and even recruiting proc...
Q: Based on the maturity of the testing process, write a short essay on three testing goals.
A: Using a testing maturity model offers the twin role of detecting existing maturity levels and establ...
Q: Describe the CRISP-DM approach's "Modeling" phase by outlining the related tasks, activities, and ou...
A: CRISP-DM stands for cross-industry process for data mining. The CRISP-DM methodology provides a stru...
Q: Explain clearly and state TWO reasons why writing user-defined functions is a good idea while design...
A: INTRODUCTION: A function is a code block that does a certain purpose. User-defined functions are fu...
Q: What is data mining and what sorts of information may be obtained from it?
A: Data mining: Data mining is considered as one type of process which is used to analyze the big amoun...
Q: Process ID Arrival Time Burst Time P1 P2 P3 3. Given the above process arrival and burst times, what...
A: In non-preemptive Shortest Job First scheduling,once the CPU cycle is allocated to process,then proc...
Q: For Questions 1 and 2, manually enter the word Score into cell A1, and manually enter 87 into cell B...
A: VBA is abbreviated as Visual Basic for Applications which is a coding language of Excel and other Of...
Q: click on Submit, Using javascript you will print a message: Thank you "first name" "last name " for ...
A: code : <form action="/action_page.php" method="get" name="myForm"> <label for="fname">F...
Q: arts by choosing a value x, as a first estiman cond, more accurate solution x, can be ca thich is th...
A: The code is shown as,
Q: What are the parts of a computer that allow it to function?
A: Introduction: A computer system is made up of a number of hardware devices that, with the aid of sof...
Q: What are the four primary kinds of NoSQL database management systems?
A: Answer: Four main types of NoSQL database management systems:- Key-value store Document store Colu...
Q: 4) For each of the following, list if it is a characteristic of a) Interpreted languages, b) Compile...
A: Solution :: I am answering question number (5) please find the answer below :: Answer : OWASP actu...
Q: write matlab co square matrix ar main diagonal va
A: given - write matlab code to build square matrix and exchange main diagonal value with zero value th...
Q: Explain how deadlock can be solved in the resource allocation graph below. PA PC 面個囱回 R2| R3 R4 PD (...
A: The system is deadlocked
Q: Error getting list on sites from the target environment, domain could not be contacted". How to fix ...
A: Domain controller - A domain controller is a kind of server that verifies users on computer network...
Q: between a
A: given - What is the difference between a member of a protected class and a member of a private class...
Q: Assume you have a one-to-one adviser connection. What additional restrictions must the relation advi...
A: Cardinality restrictions are specified, generalized, and used to simplify design, enhance maintenanc...
Q: CODE USING C++ We've already tried comparing 3 numbers to see the largest among all, so let's try a ...
A: The question is to write C++ code for the given problem.
Q: Describe the notion of completeness of R in layman's term
A: Describe the notion of completeness of R in layman's term
Q: Question 1 For the problem represented by the graph below, A start state. G Goal state. Let us defin...
A: Let's see the solution in the next steps
Q: What is wrong with these designs in terms of cohesion, and how might they be improved?
A: Introduction: In terms of cohesiveness, their designs are flawed.
Q: Recognize and discuss some of the difficulties connected with the development of an information syst...
A: There are several obstacles to overcome while constructing an information system's architecture, whi...
Q: Write a program in C++ to define a class distance with necessary data members and member function.th...
A: #include <iostream>using namespace std; class Distance { private: int feet; ...
Q: loop: and $t0, $s3, $s2 ori $t0, $t0, Ox1234 Iw $t1, 24($s0) sub $t3, $t1, $s1 slti $t9, $t3, 234 bn...
A: 2. loop: and $t0,$s3,$s2 $t0 = $s3 & $s2 R type InstructionInstruction format of R-type instruct...
Q: What exactly is content validity?
A: Introduction: The extent to which the items on a test are reasonably reflective of the full area the...
Step by step
Solved in 2 steps with 1 images
- Design HTML Form in javascriptApply the data validation :1. Mobile number field data must be a numeric data and not less than 8 digits,2. The email field must accept the data which must contain the character '@' and dot (.). Andthe character @ must not be the first character and the last dot must at least be onecharacter after the @.On submitting the form, If all these validations are followed, another Html page.A file called "Index.html" is noteworthy for a variety of reasons.Use HTML , JAVASCRIPT AND CSS WITH OUTPUT SEND Create a Application that allows the user to customize the web page. Your design must include CSS. The application should consists of three files as follows a. Ask the user to login and read form the database to determine the authentication. If the user is not known, the second file is loaded asking the user to fill up the form to store personal data b. Write a Java script to check the user is known user c. Use cookies for storing the user details and display the user name when the user moves on the next page.
- Lab 02: Splitting a URL into pieces URLS are composed of five pieces: The scheme, also known as the protocol The authority (may further be divided into the user info, the host, and the port) The path The fragment identifier, also known as the section or ref The query string Read-only access to these parts of a URL is provided by nine public methods: getFile(), getHost(), getPort(), getProtocol(), getRef(), getQuery(), getPath(), getUserinfo(), and getAuthority(). Write a Java program which uses these methods to split URLS entered on the command line into their component parts.JavaScript triggers? It has a "onclick" function.The filename index.html is significant for many reasons.
- A Radio Button is a way to restrict users to having only one choice. Examples are: Male/Female, Yes/No, or answers to surveys and quizzes Write a script using HTML form elements and PHP codes that will return the value a Radio Button that has a value of "Male" and a second Radio Button has a value of “Female”. A code should be added to detect if the user clicked the Submit buttonA02-02 Create a webpage A2-Task2.html. The webpage is displaying one image. Each time the user moves the mouse out of the image, the image is changed to another one and one more 'sun' emoji is displayed under the image. When the number of 'suns' reaches seven (7), all suns are deleted (reset) and start to be displayed again. For example, the 8th time user moves the mouse out of the image, one 'sun' is shown, the 9th time - two 'suns', and so on. Note: - You should use two images. Each time the user moves the mouse out of the image, the image is changing. If an image of "Winter" is displayed it will change to "Summer", and opposite, if an image of "Summer" is displayed it will change to "Winter". The special character code for the 'sun' is "☀". - Put the source code of your website A2-Task2.html here. Make sure you also upload the A2-Task2.zip of all files below.Edit the existing code to add an admin account that is seperate from the regular user accounts. When logging in using the admin account, the page should redirect you to sales.html Existing code: login.js function Login() {window.location.href = window.location.href.substring(0, window.location.href.lastIndexOf('/')) + "/Login.html"} function ResetPassword() {window.location.href = window.location.href.substring(0, window.location.href.lastIndexOf('/')) + "/resetpassword.html"} function LoginUser() {var userName = document.getElementById("txtUserName").value;var password = document.getElementById("txtPassword").value; var user = JSON.parse(localStorage.getItem("user")); var storedUserName = user.email;var storedPassword = user.password; if (storedUserName && storedPassword) { if (userName.length > 0 && password.length > 0) { if (userName == storedUserName && password == storedPassword) {alert("Logged In");} else {alert("username or password does not match…
- variants/3212612/take/5/ CATEGORY Sort the items into whether they are benefits or risks of a search engine keeping a record of your search history. To place a category, press the item in the answer box, then press the box under the corre- sponding category. benefits Add an answer item! Answer Bank risks Add an answer item! You can refer back to information you read earlier. You can see which search result links you have not yet pressed. A friend may see an embarrassing web search. A family member may see an ad for a gift you secretly bought for them. A related search will auto-complete so you do not need to type the whole thing. Someone with access to search cata could create a scam related to your interests.In javascript Create and design any web page of your choosing. You must use the following methods to select elements on your webpage and dynamically change one of their style settings: getElementsByTagName() getElementsByClassName() querySelector() querySelectorAll() You must use the following functions to demonstrate creating elements dynamically. These elements must be visible in the web browser. createElement() appendChild() cloneNode() with no children cloned cloneNode() with children cloned insertBefore() You must dynamically remove a node that you added to the original html file. You must dynamically set at least three windows object properties: You must add a button that when clicked calls the window object open function and opens a link to another page such as Amazon or CNN. You must add another button that when clicked calls the window object open function using at least 5 of the options for the open function and opens a link to another page such as Amazon or CNN.…Write an HTML file that creates the following online Registration form. Be noted that the gender field has Male and Female items. Important notes: You should copy and paste the "HTML script" to answer this question. DON’T take screenshots for your HTML script. It must be an editable script. Take a screenshot of your output web page and paste it as a part of your answer.