answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
2 years ago
3

Part 1: Modify code 1. In the.js file, write the JavaScript code for this application. Within the click event handlers for the e

lements in the sidebar, use the title attribute for each link to build the name of the JSON file that needs to be retrieved. Then, use that name to get the data for the speaker, enclose that data in HTML elements that are just like the ones that are used in the starting HTML for the first speaker, and put those elements in the main element in the HTML. That way, the CSS will work the same for the Ajax data as it did for the starting HTML. 2. Don’t forget to clear the elements from the main element before you put the new Ajax data in that element. 3. Verify there are no errors.

Computers and Technology
1 answer:
kykrilka [37]2 years ago
5 0

Answer:

Note: Provided Pham-Activity13.js file only. I did not modifying remaining JSON, HTML and CSS files. You have to put all your JSON, HTML and CSS files in the same folder/directory.

Screenshot of the Java script:  

Pham-Activity13.js: is attached

Explanation:

Code to copy:

Pham-Activity13.js:

$(document).ready(function () {

//on click for <a> element

$("#nav_list li").click(function() {

var title = $(this).children("a").attr("title");

      var filename = title+".json";

consumeJSON(filename);

});

}); // end ready

function consumeJSON(jsonFileURL) {

$.ajax({

url: jsonFileURL,

//handle as text

dataType: "text",

success: function (data) {

//data downloaded + pass data

var json = $.parseJSON(data);

// display results

$("main > h2").html(json.speakers[0].month + "<br/>" + json.speakers[0].speaker);

$("main > h1").html(json.speakers[0].title);

$("main > img").attr("src", json.speakers[0].image);

$("main > p").html(json.speakers[0].text);

}

});

}

You might be interested in
___________ device that uses a light source to read characters, marks, and codes and then converts them into digital data that a
kaheart [24]

Answer: Optical Reader

Explanation:

4 0
2 years ago
Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
VMariaS [17]

Answer:

#include <iostream>

#include <cmath>

using namespace std;

//initialize function quadratic

void quadratic(double, double, double);

int main() {

   //declare double variables a, b and c

   double a,b,c;

   //take input from user

   cin>>a>>b>>c;

   //call function quadratic

   quadratic(a,b,c);

return 0;

}

void quadratic(double a, double b, double  c){

   double root,n;

   //check if variable a is equal to zero

   if(a==0){

       cout<<"no solution for a=0"<<endl;

       return;

   }

   //check if b squared - 4ac is less than zero

   else

   if(((b*b)-(4*a*c))<0){

       cout<<"no real solutions"<<endl;

       return;

   }

   //print the largest root if the above conditions are not satisfied

   else{

       n=((b*b)-(4*a*c));

       root=(-b + sqrt(n)) / (2*a);

       cout<<"Largest root is:"<<root<<endl;

   }

   return ;

}

Explanation:

Read three double variables a, b and c from the user and pass it to the function quadratic. Check if the value of variable a is equal to zero. If true, print "no solution for a=0". If this condition is false, check if b squared - 4ac is less than zero. If true, print "no real solutions". If this condition is also false, calculate the largest solution using the following formula:

largest root = (-b + square root of (b squared - 4ac)) / (2*a)

Input 1:

2 5 3

Output 2:

Largest root is:-1

Input 2:

5 6 1

Output 2:

Largest root is:-0.2

5 0
2 years ago
Jim is writing a program to calculate the wages of workers in a teddy bear factory.
34kurt

Answer:

The algorithm is as follows;

1. Start

2. Input TeddyBears

3. Input Hours

4. WagebyTeddy = 2 * TeddyBears

5. WagebyHour = 5 * Hours

6. If WagebyHour > WagebyTeddy then

6.1 Print WagebyHour

7. Else

7.1. Print WagebyTeddy

8. Stop

Explanation:

The following variables are used;

TeddyBears -> Number of teddy bears made

Hours -> Number of Hours worked

WagebyTeddy -> Wages for the number of teddy bears made

WagebyHour -> Wages for the number of hours worked

The algorithm starts by accepting input for the number of teddy bears and hours worked from the user on line 2 and line 3

The wages for the number of teddy bears made  is calculated on line 4

The wages for the number of hours worked  is calculated on line 5

Line 6 checks if wages for the number of hours is greated than wages for the number of bears made;

If yes, the calculated wages by hour is displayed

Otherwise

the calculated wages by teddy bears made is displayed

3 0
2 years ago
Developed by ibm and refined by symantec, the __________ provides a malware detection system that will automatically capture, an
Nadya [2.5K]
Digital Immune System (DIS)
6 0
2 years ago
Cha’relle works as an editor at a publishing house. She got her position after interviewing another editor and following that ed
yuradex [85]

She used her communication skills meaning the verbal method.

Explanation:

Because she has a natural ability to talk and communicate well with others, offering them insight on any issues they may have or anything they may be lacking or struggling with. She's a natural born healer and giver.

4 0
2 years ago
Other questions:
  • On the Picture Tools Layout tab, you can preview results of the numerous styles, borders, effects, and layouts by _______ comman
    7·2 answers
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • A slide in Blake's presentation contained the following information:
    11·1 answer
  • Select the correct answer. James is a sales analyst of a departmental store chain. He checked the sale records for the past 12 m
    6·2 answers
  • Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
    11·1 answer
  • Consider a one-way authentication technique based on asymmetric encryption: A --&gt; B: IDA B --&gt; A: R1 A --&gt; B: E(PRa, R1
    13·1 answer
  • You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file
    12·1 answer
  • Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
    8·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • In this exercise you will debug the code which has been provided in the starter file. The code is intended to take two strings,
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!