Modify your story.html page so that the labels and text boxes for the words/phrases align in columns.

What will be an ideal response?


```







Dave's Story Time



Dave's Story Time
















Enter an adjective:
Enter a boy's name:
Enter a color:
Enter a type of animal:
Enter a swear word or exclamation:
Enter a type of building:


onclick="adjective = document.getElementById('adjectiveBox').value;
boy = document.getElementById('boyBox').value; color = document.getElementById('colorBox').value; animal = document.getElementById('animalBox').value; swear = document.getElementById('swearBox').value;
building = document.getElementById('buildingBox').value;
document.getElementById('outputDiv').innerHTML=
'

It was a ' + adjective + ' kind of day when ' + boy +
' walked out into the street. The sky was a deep ' + color +
' and ' + boy + ' was walking his pet ' + animal + '.

' +
'

' + swear +', exclaimed ' + boy + ' as he stepped off' +
' the curb and into a large pile of ' + animal + ' excrement.' +
' Disgusted, he returned to his ' + building +
' and went back to bed.

'; " />





```

Computer Science & Information Technology

You might also like to view...

Which of the following statements is NOT true?

A) Radio buttons are round and check boxes are square. B) Radio buttons are often grouped together and are mutually exclusive; Check boxes are not. C) Radio buttons and check boxes both implement the ActionListener interface. D) They are all true.

Computer Science & Information Technology

Anonymity, control resources, and many other features make the ________ the criminals' conduit for coordinating and carrying out an agenda

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) _____ workstation has at least one operating system in its own VM that is separate from the host operating system

Fill in the blank(s) with correct word

Computer Science & Information Technology

A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. What is the next step in this investigation?

A. Preservation B. Collection C. Examination D. Identification

Computer Science & Information Technology