subject

Name: id: internet and web technologies (csci 355) summer 2019 midterm exam part 2 в n g o 7 22 36 47 70 4 23 35 60 66 1 20 free 49 75 14 19 40 52 69 11 17 43 51 71 14 clcck above is a sample card in the classic game bingo". each card is a 5-by-5 grid with column headings labelled b. i, n, g, o. below the headings, each column contains five random numbers in the respective ranges 1-15, 16-30, 31-45, 46-60, 61-75 in the center however, it says 'free instead of a number, and that spot should be automatically "marked" by shading it yellow. coding tasks use either json or xml to represent the binggo card in a file. 1 use javascript to read your json or xml file 2. 3 use javascript and the dom to insert the html that represents the board, based on the contents of the file. (if desired, this step may be combined with the previous one.) don't forget to pre-shade the center entry. use css, appropriately referenced in the html, to style the board so that it resembles the one above 4 create a textbox and button labelled "check, and add code such that if the user types a number into the textbox and clicks 5. the check button, the code will check whether that number is present in the grid and, if found, will highlight it in yellow. (the example above shows what happens if 14 is entered: it gets shaded yellow in the grid.) your html should be properly formed, beginning with the declaration at the very top of the file and other tags and attributes 6. typically found in the upper part of an html file. scoring rubric each of the six tasks is worth 5 paints, for a total of 30 points. you need at least 25 points to get full credit. read/parse нtml json xml build style board textbox/ тotal representation json xml board button & click foundations

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 15:10
Awould be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.
Answers: 3
question
Computers and Technology, 23.06.2019 15:10
What role did women fill during world war ii?
Answers: 1
question
Computers and Technology, 23.06.2019 21:00
Will this setup result in what kathy wants to print?
Answers: 2
question
Computers and Technology, 23.06.2019 22:00
Technician a says engine assemblies can be mounted longitudinally in a chassis. technician b says engine assemblies can be mounted transversely in a chassis. who is correct?
Answers: 2
You know the right answer?
Name: id: internet and web technologies (csci 355) summer 2019 midterm exam part 2 в n g o 7 22 36...
Questions
question
History, 18.09.2019 21:00
question
Mathematics, 18.09.2019 21:00
question
English, 18.09.2019 21:00
Questions on the website: 13722367