1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
3 years ago
6

What is python, the coding language

Computers and Technology
2 answers:
nikitadnepr [17]3 years ago
4 0

Answer:

yeah, what the person above me said

Explanation:

Alexandra [31]3 years ago
3 0

Answer:

It is a coding language that you can use to make the computer do lots of different things

Explanation:

You might be interested in
WHAT BIRD IS SHOWN ON THE ARM OF BLOODHOUND?
ruslelena [56]

Answer:

Looks like a raven to me

Explanation:

4 0
4 years ago
Read 2 more answers
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
Clarifying and developing our personal values involves a number of steps including critical thinking
Grace [21]
True. I think we should trust ourselves and interaction with someone including teachers, classmates and parents...We must be developing our critical thinking skills.
8 0
3 years ago
Pam, a senior level IT developer, and Samantha, a summer intern, are working together on a new organization-wide vacation policy
Svetllana [295]

Answer:

B.

Explanation:

Based on the scenario it can be said that in order to efficiently work with Samantha on her laptop during the project, Pam should export her settings to a file for Samantha to import. Doing so will make sure that both individuals have the exact same platform to work on and will make communicating changes and ideas a lot easier and more efficient.

6 0
4 years ago
Which of the following ports would be most likely to allow secure remote access into a system within a data center?A. UDP port 5
Sergeu [11.5K]

Answer:

C. TCP port 443.

Explanation:

TCP (transmission control protocol) is a connectiod oriented protocol, that is unlike UDP (user datagram program) it needs a connection between the source and destination to be successful. Port numbers are used with ip addresses to specify packets meant for a given application.

The tcp 443 represents the HTTPs protocol, used to request and get packets from a remote and secure web server.

With this protocol and port number "TCP 443", a system can request a secure remote access to another system in a data center.

7 0
3 years ago
Other questions:
  • Which of the following software monitors a user's activities and sends the information back to another source without the user k
    11·1 answer
  • Physical parts of components of a computer system is called
    9·1 answer
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    12·2 answers
  • What do you click on to minimize all open windows? the Show Desktop icon the Start menu the system tray the taskbar
    15·2 answers
  • Why was the term personal computer created?
    5·1 answer
  • I’m stuck in a class where i don’t understand anything, it’s only been 3 days.. any tips for learning computer coding?
    12·1 answer
  • Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for
    14·1 answer
  • Answer to this if you have apex legends on either pc xbox one or PS4 for the one that answers and does gets brainliest please do
    7·2 answers
  • 1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
    11·1 answer
  • Which work habits should you follow to increase work efficiency and avoid health issues?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!