Modify your story.html page so that it uses a function to encapsulate the statements for accessing the words and phrases entered by the user and then displaying the story. The button in the page should call this function when clicked.

What will be an ideal response?


```







Dave's Story Time




Dave's Story Time
















Enter an adjective:
Enter a boy's name:
Enter a color:
Enter a type of animal:
Enter a swear word or exclamation:
Enter a type of building:








```

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors. 2. The principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption. 3. The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. 4. You should allow only specific computers to access your wireless network. 5. Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.

Computer Science & Information Technology

iPad displays are known as multitouch touch screens. This means that they can sense the presence of two or more contact points

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the value of c after the following code executes? a = [10, 20, 30]b = [40, 50, 60]c = a + b

A. [50, 70, 90] B. {[10, 20, 30], [40, 50, 60]} C. [10, 20, 30, 40, 50, 60] D. ([10, 40], [20, 50], [30, 60])

Computer Science & Information Technology

Preparing for incidents is the cornerstone of managing risk.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology