1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
2 years ago
6

Which of the following is not a language commonly used for web programming? PHP Assembly Java Python

Computers and Technology
2 answers:
Nataly [62]2 years ago
7 0

Answer:

If you’re a software developer, then you probably—every now and then—feel overwhelmed by the super-fast pace at which our industry evolves, and that’s fine. I certainly feel that way sometimes, especially when trying to keep up with the latest trends.

But it’s possible to be well-informed about what’s going on out there, and use that information to your advantage, by being economical about your learning.

Sure, there are lots of programming languages. Sure, new ones keep being created every week—and don’t even get me started on JavaScript frameworks.

Do you need to learn all of them? Of course not.

First, learn about a number of the most popular programming languages. Then, narrow that list down, by picking the ones that make the most sense for your current knowledge level, employment status and other criteria that might make sense for your scenario.

For instance, if you intend to learn the functional paradigm, then pick a functional language from the list. Rinse and repeat.

That’s what this post is about. We’ve done the legwork for you, compiling a list of five of the most popular programming languages for 2019. Now you only have to read it and put it to good use.

(Hope this helped if not i am so so sorry hope you have a blessed day goodbye)

Alina [70]2 years ago
4 0

Answer:

Hypertext Preprocessor, better known under the old acronym PHP, is a scripting language based on C and Perl. It is mainly used for programming dynamic websitesweb applications. PHP is considered to be beginner-friendly and can be integrated integrated into HTML

Java is the most popular web programming language. It is used to develop website content, games, apps, and software.

You might be interested in
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, w
enot [183]

Answer: The user had a mandatory profile.

Explanation:

A user profile is considered mandatory and such profile is known as pre-configured roaming user profile that only administrators can use to make precise settings for clients. In this type of profile, one can adjust his or her desktop settings, the adjustment are temporarily stored after logging off from the profile.

8 0
3 years ago
Randomly choose rock, paper, or scissors for the computer
Pepsi [2]

import random

computer_choice = random.choice(["rock", "paper", "scissors"])

user_choice = input("rock, paper, or scissors? ")

if computer_choice == user_choice:

   print("It's a draw!")

elif user_choice == "rock" and computer_choice == "scissors":

   print("You win!")

elif user_choice == "paper" and computer_choice == "rock":

   print("You win!")

elif user_choice == "scissors" and computer_choice == "paper":

   print("You win!")

else:

   print("The computer wins!")

I wrote my code in python 3.8. I hope this helps.

8 0
3 years ago
En un grupo de estudiantes el 60% son mujeres.Si por todos son 45 ¿cuantos hombres y mujeres son?
enot [183]
27 mujeres
18 hombres

Mira:
60% * 45 = 2,700
2,700/100= 27

Si el 60% son mujeres, entonces
45-27=18 hombres
7 0
3 years ago
A(n) ________ is software and/or hardware that monitors system and network resources and activities and notifies network securit
enyata [817]

Answer:

intrusion detection system

Explanation:

intrusion detection system

IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.

5 0
3 years ago
Can some one answer this
andreev551 [17]
SUP THANKS FOR THE FREE POINTS
7 0
2 years ago
Other questions:
  • The pseudoinstructions that are available in an assembly language programming environment usually found in the Select one: a. CP
    6·1 answer
  • In Java, a char variable is capable of storing any Unicode character. Write a statement that assigns the Greek letter ^ to a cha
    7·1 answer
  • Find the 65th percentile from the data. The data consist of class interval from 0-10, 10-20, 20-30, 30-40, 40-50, 50-60 and freq
    8·1 answer
  • You want to use a wireless keyboard and mouse with your laptop computer. which method should you use
    11·1 answer
  • To connect a peripheral device to a computer to exchange data, find the appropriate ________ for the device.
    7·1 answer
  • My pc suddenly freezes and i can't open any apps or task manager. Apps do not open at all and if i restart from the start it get
    9·1 answer
  • Free points,
    15·2 answers
  • __________for about 10 minutes in between each repetition session helps you to remember the information better. a. Reading c. Sl
    5·2 answers
  • What is the best wi-fi name you have ever seen?
    10·1 answer
  • A network consists of 75 workstations and three servers. The workstations are currently connected to the network with 100 Mbps s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!