1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
3 years ago
11

Personal Web Page Generator Write a program that asks the user for his or her name, then asks the user to enter a sentence that

describes himself or herself. Here is an example of the program's screens: Enter your name: Describe yourself: Once the user has entered the requested input, the program should create an HTML file, containing the input, for a simple Web page. python
Computers and Technology
1 answer:
Fudgin [204]3 years ago
7 0

Answer:

see explaination

Explanation:

The following code is in python 3.5 and above:

# Create a main method

def main():

# Accept name from the user

name = input("Enter your name: ")

# Accept describe yourself from the user.

describe = input("Describe yourself: ")

# Create a file object

f = open('person.html','w')

# Creat a string to store the html script.

message = """<html>

<head>

</head>

<body>

<center>

<h1>"""+name+"""</h1>

</center>

<hr/>"""+describe+"""<hr/>

</body>

</html>"""

f.write(message)

f.close()

main()

You might be interested in
Anisha was learning ‘for’ and ‘while’ loop. Help her understand why for and while loops are called entry controlled loops.
Andrew [12]

Entry controlled loop - <u>The loop which has a condition check at the entrance of the loop, the loop executes only and only if the condition is satisfied is called as entry control loop.</u>

So, for and while loops are its examples.

6 0
3 years ago
Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An at
Elza [17]

Answer:

A. An attacker could potentially perform a downgrade attack.

E. The IPSec payload reverted to 16-bit sequence numbers.

Explanation:

When both strong and weak ciphers are configured on a VPN concentrator, the following are likely to occur;

An attacker could potentially perform a downgrade attack

The IPSec payload reverted to 16-bit sequence numbers

3 0
3 years ago
Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tes
KengaRu [80]

Answer:

Explanation:

A tester has to evaluate, test and find errors, in this job you have to provide all the analysis and improve the software.

A tester has to evaluate:

  • Interact with buttons
  • Enter data
  • design for multiple situations

A tester must have these abilities:

  • The ability to work calmly under pressure.
  • Organizational capacity .
  • Logical thinking.
  • Ability to plan future work.
  • Pay attention to the details.

7 0
3 years ago
The ability to create slide shows is a major advantage of word processing software.
Gennadij [26K]
The correct answer is false
8 0
3 years ago
Which of the following would a cyber criminal most likely do once they gained access to a user id and password
Bogdan [553]

Answer:

do something wrong as you

3 0
3 years ago
Other questions:
  • Utilities software and word processing software are both eamples of
    10·1 answer
  • write a c++program that allows the user to enter the last names of fivecandidates in a local election and the number of votes re
    15·1 answer
  • The organization wants you to avoid situations that make you choose between its overall benefit and your
    13·1 answer
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • Does anyone know the answers to the AR test on Gathering Blue by Lois Lowery?
    10·1 answer
  • Which of the following is the core communications protocol for the internet? telnet ftp tcp/ip ssl
    11·1 answer
  • Computer design replaced ______________
    6·1 answer
  • If a fire should break out in your building, which of the following actions is NOT recommended?
    10·2 answers
  • Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
    12·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!