Description
Unformatted Attachment Preview
Java Script Activity D
Objectives:
Money Conversions
Estimated time:
60 minutes
To demonstrate skills:
• Designing a form utilizing text and prompt boxes
• Creating functions to calculate US dollar to foreign exchange values
• Using CSS to format web page
Instructions:
1) Create a site that asks for the user name.
a. A prompt message will welcome them and direct them to click on a calculation
b. After clicking okay, the user will be able to insert a dollar amount and find the
exchange rate in six different currencies of your choice.
c. The results should be rounded off to no more than two places
d. The currency should print out with the appropriate symbol
2) Include comments indicating
a. The source of the money exchange rate and currency symbols
b. Name, date and period
c. Function purposes
3) Save the lab as Money Conversions in the LAB folder.
4) Validate HTML and CSS.
5) Call over instructor when done. Be ready to show site off with pride.
6) Print out copy of code as instructed.
DO NOT WRITE ON THIS SHEET
TURN IT IN AT THE END OF CLASS
Name:
Lab: Money Converter
QA Student:
Date:
LAB RUBRIC
0
Aesthetics
First Impression
Design
Images. Color. Fonts.
Script
Accepts prompt and responds.
Script
Calculates and displays values.
CSS Code
Validation check
HTML
Validation check
1
2
3
So, this is
cheap work?
Back to the
drawing table.
This is
FUBAR.
Whoa! You’re not
converting my stash!
What the hell
is this?
You work for
Microsoft?
4
5
SCORE
Designer
Tester
This blows
my mind!
Awesome.
Sweet!
Million
dollar baby!
Wow! How did
you do that?
Got them
all fixed!
TOTAL POINTS
Additional comments or suggestions from quality assurance tester
Answer the following questions:
1. What difficulties did you encounter with your code or design?(2)
2. What did validation report about the code? If errors, explain what you did to fix them.(2)
3. What is an event handler and how was it used? (4)
4. How were string operators and concatenation used? (2)
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really great stuff, couldn't ask for more.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
4 pages
How Can U.s. Companies Protect Their Digital Assets Overseas 1 .edited
Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas? Technology growth has enabled small business ...
How Can U.s. Companies Protect Their Digital Assets Overseas 1 .edited
Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas? Technology growth has enabled small businesses to grow beyond the USA ...
Access, computer science assignment help
1Start Access. Open the downloaded Access file named exploring_a01_grader_h2.2Create a new table in Design view. Add the f ...
Access, computer science assignment help
1Start Access. Open the downloaded Access file named exploring_a01_grader_h2.2Create a new table in Design view. Add the field name AgentID. Change the Data Type for AgentID to AutoNumber and set AgentID as the Primary key for the table.3Add the following field names to the table: FirstName, LastName, and Title (in that order). Accept Short Text as the data type for all fields. Save the table as Agents.4Switch to Datasheet view and add the following records letting Access assign the AgentID number: FirstName LastName Title Guillaume Picard BrokerKeith Martin AgentUsa-chan Yang AgentSteven Dougherty Agent in TrainingRajesh Khanna Agent in TrainingJuan Rosario President5Sort the Agents table by the LastName field in ascending order.6Apply a selection filter so that everyone with a title other than Agent in Training displays. Save the changes to the table design and close the Agents table.7Open the Properties table in Design View. Change the Data type for the following fields to the listed Data Type:Field Name Data Type DateListed Date/TimeListPrice CurrencySqFeet NumberBeds NumberBaths NumberAgentID NumberSave the changes to the design of the table and then view the table in Datasheet View.8Sort the records in the Properties table by the ListPrice field from largest to smallest. Save and close the table.9Click Relationships in the Relationships group on the DATABASE TOOLS tab and then add both tables to the Relationships window. Close the Show Table dialog box.10Drag the AgentID field from the Agents table and drop it onto the AgentID field in the Properties table. (Hint: Resize the Properties table so that all fields display.) Enforce Referential Integrity and create the relationship. Save changes to the layout and close the relationships window.11Open the Properties table. Use Filter by Form to create a filter that will identify all properties with a list price less than $300,000 with two bedrooms. Apply the filter and preview the filtered table. Close the table and save the changes.12Close all database objects. Close the database and then exit Access. Submit the database as directed.
w1identifying risk
W1 LabIdentifying RisksThe task of identifying risks in an IT environment can become overwhelming. Once your mind starts a ...
w1identifying risk
W1 LabIdentifying RisksThe task of identifying risks in an IT environment can become overwhelming. Once your mind starts asking “what if...?” about one IT area, you quickly begin to grasp how many vulnerabilities exist across the IT spectrum. It may seem impossible to systematically search for risks across the whole IT environment.Thankfully, a solution is at hand that simplifies identifying threats and vulnerabilities in an IT infrastructure. That method is to divide the infrastructure into the seven domains: Wide Area Network (WAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Local Area Network (LAN), Workstation, User, System/Application, and Remote Access. Systematically tackling the seven individual domains of a typical IT infrastructure helps you organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.In this lab, you will identify known risks, threats, and vulnerabilities, and you will organize them. Finally, you will map these risks to the domain that was impacted from a risk management perspective.Learning ObjectivesUpon completing this lab, you will be able to:Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure.Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure.Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective.Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure.DeliverablesUpon completion of this lab, you are required to provide the following deliverables to your instructor:1. Lab Report file;2. Lab Assessments file.Evaluation Criteria and RubricsThe following are the evaluation criteria for this lab that students must perform:1. Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure. – [25%]2. Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure. – [25%]3. Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective. – [25%]4. Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure. – [25%]
4 pages
Info Tech In A Global Economy
Global information technology report 2016 is an article authored by Baller, Dutta, and Lanvin in 2016. The article focuses ...
Info Tech In A Global Economy
Global information technology report 2016 is an article authored by Baller, Dutta, and Lanvin in 2016. The article focuses on the changes that have ...
Data Visualization Computer Science Question
Select any example visualization or infographic and imagine the contextual factors have changed:
If the selected projec ...
Data Visualization Computer Science Question
Select any example visualization or infographic and imagine the contextual factors have changed:
If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to work on both mobile/tablet and desktop?
If the selected project was an interactive work, what ideas do you have for potentially deploying the same project as a static work? What compromises might you have to make in terms of the interactive features that wouldn’t now be viable?
What about the various annotations that could be used? Thoroughly explain all of the annotations, color, composition, and other various components to the visualization.
What other data considerations should be considered and why?
Update the graphic using updated data, in the tool of your choice (that we’ve used in the course), explain the differences.
8 pages
Final Bsa425r1 Wk2 Project Plan Draft
As networks expand in size, overseeing the network configuration also multiplies Cybersecurity Issues as the perimeter of ...
Final Bsa425r1 Wk2 Project Plan Draft
As networks expand in size, overseeing the network configuration also multiplies Cybersecurity Issues as the perimeter of the current network is ...
Similar Content
Microsoft Access Homework
A_CH01_GOV1_A3_Instructions.docxgo_a01_grader_a3_Open_Houses.accdb go_a01_grader_a3_Departments.xlsx go_a01_grad...
mobile enterprise network, computer science homework help
please i need the answer meet the point given for each qutions. i need them technicaly not like big pargraphes. i want the...
Mobile Device Forensics Discussion
I need help with Mobile Device Forensics assignment, please see attachment for more information about this assignment....
KBC High School Cryptographic Algorithms and Techniques Question
There are three main types of cryptographic algorithms: (1) secret key, (2) public key, and (3) hash functions. Pick an al...
New England College PCI Compliance & Database Administrator Discussion Board
In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences ...
UMKC Computer Science Vision Image Recognition Histogram Project
Computer Vision
It must be done through Matlab or Python.
#1 - let us just take the first 15 classes (shown above) {airpla...
Stage 2....revised
IT infrastructure is the technology avenue that will help mark his business's growth. Components are parts that, when conn...
Ui Architec
Every organization needs to consider the issue of information security. As a UI architect, my work will be designing tools...
Information System Security.edited
Information security has become a primary concern for many organizations. As threats on data continue to rise, in conjunct...
Related Tags
Book Guides
Mockingjay
by Suzanne Collins
Les Miserables
by Victor Hugo
The Remains Of The Day
by Kazuo Ishiguro
The Turn of the Screw
by Henry James
Slaughterhouse Five
by Kurt Vonnegut
Sounds Like Titanic
by Jessica Chiccehito Hindman
The Mayor of Casterbridge
by Thomas Hardy
Where the Crawdads Sing
by Delia Owens
Normal People
by Sally Rooney
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
4 pages
How Can U.s. Companies Protect Their Digital Assets Overseas 1 .edited
Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas? Technology growth has enabled small business ...
How Can U.s. Companies Protect Their Digital Assets Overseas 1 .edited
Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas? Technology growth has enabled small businesses to grow beyond the USA ...
Access, computer science assignment help
1Start Access. Open the downloaded Access file named exploring_a01_grader_h2.2Create a new table in Design view. Add the f ...
Access, computer science assignment help
1Start Access. Open the downloaded Access file named exploring_a01_grader_h2.2Create a new table in Design view. Add the field name AgentID. Change the Data Type for AgentID to AutoNumber and set AgentID as the Primary key for the table.3Add the following field names to the table: FirstName, LastName, and Title (in that order). Accept Short Text as the data type for all fields. Save the table as Agents.4Switch to Datasheet view and add the following records letting Access assign the AgentID number: FirstName LastName Title Guillaume Picard BrokerKeith Martin AgentUsa-chan Yang AgentSteven Dougherty Agent in TrainingRajesh Khanna Agent in TrainingJuan Rosario President5Sort the Agents table by the LastName field in ascending order.6Apply a selection filter so that everyone with a title other than Agent in Training displays. Save the changes to the table design and close the Agents table.7Open the Properties table in Design View. Change the Data type for the following fields to the listed Data Type:Field Name Data Type DateListed Date/TimeListPrice CurrencySqFeet NumberBeds NumberBaths NumberAgentID NumberSave the changes to the design of the table and then view the table in Datasheet View.8Sort the records in the Properties table by the ListPrice field from largest to smallest. Save and close the table.9Click Relationships in the Relationships group on the DATABASE TOOLS tab and then add both tables to the Relationships window. Close the Show Table dialog box.10Drag the AgentID field from the Agents table and drop it onto the AgentID field in the Properties table. (Hint: Resize the Properties table so that all fields display.) Enforce Referential Integrity and create the relationship. Save changes to the layout and close the relationships window.11Open the Properties table. Use Filter by Form to create a filter that will identify all properties with a list price less than $300,000 with two bedrooms. Apply the filter and preview the filtered table. Close the table and save the changes.12Close all database objects. Close the database and then exit Access. Submit the database as directed.
w1identifying risk
W1 LabIdentifying RisksThe task of identifying risks in an IT environment can become overwhelming. Once your mind starts a ...
w1identifying risk
W1 LabIdentifying RisksThe task of identifying risks in an IT environment can become overwhelming. Once your mind starts asking “what if...?” about one IT area, you quickly begin to grasp how many vulnerabilities exist across the IT spectrum. It may seem impossible to systematically search for risks across the whole IT environment.Thankfully, a solution is at hand that simplifies identifying threats and vulnerabilities in an IT infrastructure. That method is to divide the infrastructure into the seven domains: Wide Area Network (WAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Local Area Network (LAN), Workstation, User, System/Application, and Remote Access. Systematically tackling the seven individual domains of a typical IT infrastructure helps you organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.In this lab, you will identify known risks, threats, and vulnerabilities, and you will organize them. Finally, you will map these risks to the domain that was impacted from a risk management perspective.Learning ObjectivesUpon completing this lab, you will be able to:Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure.Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure.Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective.Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure.DeliverablesUpon completion of this lab, you are required to provide the following deliverables to your instructor:1. Lab Report file;2. Lab Assessments file.Evaluation Criteria and RubricsThe following are the evaluation criteria for this lab that students must perform:1. Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure. – [25%]2. Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure. – [25%]3. Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective. – [25%]4. Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure. – [25%]
4 pages
Info Tech In A Global Economy
Global information technology report 2016 is an article authored by Baller, Dutta, and Lanvin in 2016. The article focuses ...
Info Tech In A Global Economy
Global information technology report 2016 is an article authored by Baller, Dutta, and Lanvin in 2016. The article focuses on the changes that have ...
Data Visualization Computer Science Question
Select any example visualization or infographic and imagine the contextual factors have changed:
If the selected projec ...
Data Visualization Computer Science Question
Select any example visualization or infographic and imagine the contextual factors have changed:
If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to work on both mobile/tablet and desktop?
If the selected project was an interactive work, what ideas do you have for potentially deploying the same project as a static work? What compromises might you have to make in terms of the interactive features that wouldn’t now be viable?
What about the various annotations that could be used? Thoroughly explain all of the annotations, color, composition, and other various components to the visualization.
What other data considerations should be considered and why?
Update the graphic using updated data, in the tool of your choice (that we’ve used in the course), explain the differences.
8 pages
Final Bsa425r1 Wk2 Project Plan Draft
As networks expand in size, overseeing the network configuration also multiplies Cybersecurity Issues as the perimeter of ...
Final Bsa425r1 Wk2 Project Plan Draft
As networks expand in size, overseeing the network configuration also multiplies Cybersecurity Issues as the perimeter of the current network is ...
Earn money selling
your Study Documents