1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ratelena [41]
2 years ago
13

Prompt

Computers and Technology
1 answer:
madam [21]2 years ago
3 0

Have you ever tried to learn a new language or do you have friends who've had that experience?

Yes, I tried to learn Python and I even managed to do two Discord bots which are (somewhat) functional, but I'm far to say that I've managed to lean the language completly. There are lots of things to learn on a language as Python.

I also leant PHP on my own and managed to do a website (somehow) functional.

What are some of the  steps you would take to learn a new language, and what are some challenges that might arise?

The first steps in learning any computer language is learning the syntax. If you manage to do that, with the experience you gained from previous projects/languages you might be able to create something working. At times you might feel down if the project doesn't work as expected.

What are some things that  can help make the process easier?

Video tutorials, experiments and searching questions and problems on Google is a very important resource.

You might be interested in
As it relates to confidentiality, data may be classified in three ways. Match each data classification below to its definition.
Delicious77 [7]

Answer:

 According to the confidentiality, the data are classified into the three ways that is confidential, public and controlled and it the data classification are matched according to to its particular definition are as follows:

Confidential  = (C) Cannot be released without owner's consent.

Public = (A) Accessible to everyone

Controlled = (B) Not public but can be released without owner's consent

 The confidentiality of the data is basically known as protecting the data from the unauthorized and unlawful access. The data confidentiality is the set of the rules which limit the unauthorized access to the confidential information and it is only available to the authorized people with the reliable access to the data.

5 0
3 years ago
What is the practical application of the information acquired by science.
mrs_skeptik [129]

Answer:

Technology

Explanation:

The correct answer is - Technology

Reason -

Technology is the sum of techniques, skills, methods, and processes that are used in the production of goods or services or in the accomplishment of objectives, such as scientific investigation.

5 0
3 years ago
How will advertising and communications change as technology improves?????? HELP PLEASE :0 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
drek231 [11]

Technology changes advertising and communications by increasing the outreach of people that will get the message, and increasing the speed at which they get the message. Which in turn makes the advertising more relevent because they can release more product to a wider audience during a specific time period.


6 0
3 years ago
An open intersection is one that
alekssr [168]

 open intersection is one without traffic control signs or signals. When you enter one, you must yield the right-of-way if: A vehicle is already in the intersection. You enter or cross a state highway from a secondary road. hope this helped


4 0
3 years ago
Read 2 more answers
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
Other questions:
  • Consider the following implementation of a class Square:
    12·1 answer
  • Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre
    8·2 answers
  • People use a computer connected to the internet to manage financial accounts
    15·1 answer
  • What information medium is used to access information from the Internet in the form of HTML pages?
    12·1 answer
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • Testing a function or program using test values that are at or near the values that change the outcome of the program is known a
    13·1 answer
  • In general, the farther you are from other road users, the A. lower your crash risk B.higher your crash risk C. slower they are
    6·1 answer
  • Suppose that a server sends four packets of audio data, in 15 seconds each. The first is sent by the server exactly at noon (12:
    14·1 answer
  • What is a fire wall and how does it work
    6·1 answer
  • Convertbinary(111100)to decimal​​​​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!