subject

1. first, declare a variable named myarray and assign it to an empty array.2. great! now populate myarray with two strings. put your full name in the first string, and your skype handle in the second.3.next, declare a function named cutname. it should expect a parameter name.4. cutname should return an array by breaking up the input string into individual words. for example "douglas crockford" should be returned as ["douglas", "crockford"]5. declare a new variable named myinfo and assign it to an empty object literal.6. add the following three key-value pairs to myinfo: a. key: fullname value: the result of calling cutname on the name string within myarray. b. key: skype: value: the skype handle within myarray. c. key: github value: if you have a github handle, enter it here as a string. if not, set this to null instead.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 12:50
You have just been hired as an information security engineer for a large, multi-international corporation. unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. the other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks.requirementswrite a brief description of the case study. it requires two to three pages, based upon the apa style of writing. use transition words; a thesis statement; an introduction, body, and conclusion; and a reference page with at least two references. use a double-spaced, arial font, size 12.
Answers: 1
question
Computers and Technology, 23.06.2019 18:00
Apunishment or the threat of punishment used to enforce conformity. select the best answer from the choices provided t f
Answers: 1
question
Computers and Technology, 23.06.2019 23:00
Lucas put a lot of thought into the design for his company's new white paper. he made sure to include repeating design elements such as color schemes and decorative images. his goal was to a.add symmetry b.create a unified publication c.provide consistency d.save money
Answers: 1
question
Computers and Technology, 24.06.2019 09:10
  to change the number of rows and columns displayed by the excel object a. select the object and drag a size handle on the active object. b. deselect the object and drag a size handle of the object. c. deselect the object and drag a row or column divider of the object. d. select the object and drag a row or column divider on the active object.
Answers: 2
You know the right answer?
1. first, declare a variable named myarray and assign it to an empty array.2. great! now populate m...
Questions
question
Mathematics, 07.06.2021 23:10
question
Mathematics, 07.06.2021 23:10
question
History, 07.06.2021 23:10
Questions on the website: 13722361