1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
10

What is the difference between coding with html and coding with python

Computers and Technology
1 answer:
dsp733 years ago
5 0

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

You might be interested in
"a router interface has been assigned an ip address of 172.16.192.166 with a mask of 255.255.255.252. to which subnet does the i
baherus [9]
An interface with an address of 172.16.192.166/30 has only 2 hosts per subnet. 172.16.192.166 and 172.168.192.169 are those hosts.
This configuration is usually only assigned to serial links with one source and one destination address like a T1/3.
3 0
4 years ago
You approach a railroad crossing with a cross buck sign that has no light or gates . What should you do ?
Sergio039 [100]
You should probably slow down, make sure no trains are coming (and listen for any train sounds!) before proceeding to cross and go about your way :)
6 0
4 years ago
The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
kipiarov [429]

<span>The asthenosphere is a part of the upper mantle just below the </span>lithosphere<span> <span>that is involved in </span></span>plate tectonic movement<span> <span>and </span></span>isostatic<span> <span>adjustments. The lithosphere-asthenosphere boundary is conventionally taken at the 1300 °C </span></span>isotherm<span>, above which the mantle behaves in a rigid fashion and below which it behaves in a </span>ductile<span> fashion. a</span><span>nd </span>flows very slowly, in a manner<span> similar to the ice at a bottom of a glacier.</span>

5 0
3 years ago
Read 2 more answers
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
klasskru [66]

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

7 0
3 years ago
Which is a good guideline to follow when looking for research material on the Internet?
labwork [276]
Hello,

The answer is option A p<span>ay attention to URL endings, such as .gov and .com.

Reason:

Its A because its a very important guideline to make sure you look for the root words .gov and .com to make sure its professional. Its not option B because using search engines can cause viruses. Its also not option C because anything can look professional just by how the website looks and says.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit</span>
5 0
4 years ago
Read 2 more answers
Other questions:
  • n the declaration: string color = "blue"; A. the string literal color is assigned to the string reference "blue" B. the string r
    11·2 answers
  • You have a hard disk that is formatted with the fat32 file system. you would like to implement file and folder permissions on th
    10·1 answer
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • Workstation control standards institute security requirements to harden end user devices. For example, a Malicious Code Protecti
    10·1 answer
  • BRAINLIEST AND A LOT OF PTS Which line of code will only allow a symbol to be stored in a variable?
    12·2 answers
  • PLEASE HELPP!!!!!
    14·1 answer
  • A router is a peripheral that may need troubleshooting if the network goes down.
    12·2 answers
  • Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of ol
    8·1 answer
  • How many passes will it take to find the 20 in this list? (python)
    11·2 answers
  • Which feature helps an edit-test-bug cycle work faster in the python programming language?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!