select all the correct answers
which two programming languages are most commonly used to write web based software programs?
1. Python
2. C
3. PHP
3. Ada

Answers

Answer 1

Answer:

PythonPHP

Explanation:

Plato Correct!

Answer 2

The two programming languages most commonly used to create software for websites are Python and PHP.

We have,

Python is known for being easy to understand and read, which makes it popular for building web applications.

It has tools and frameworks that help developers create websites quickly.

PHP is a language specifically designed for web development.

It is used to write code that runs on the server and helps create interactive websites.

Many popular websites and content management systems, like WordPress, are built with PHP.

While the C language can also be used for web development, it is not as commonly used as Python and PHP in this context.

Ada is a programming language mainly used in specialized industries like aerospace and defense.

It is not commonly used for creating websites.

Thus,

The two programming languages most commonly used to create software for websites are Python and PHP.

Learn more about programming languages here:

https://brainly.com/question/23959041

#SPJ4


Related Questions

Plz help:(!!!!

Type the correct answer in the box. Spell all words correctly.

Claire wants to use a filter to ensure quality in the software development process and product. What can Claire use for this purpose?

Claire should use_________
as a filter to ensure quality in the software development process and product.

Answers

Answer:

Defect filters

Explanation:

Answer:

"a quality gate" is the correct answer :D

Explanation:

Many applications ask, "Why did you leave your previous position?" Choose the best answer out of the examples below.

Answers

We can't see the examples therefore we can't help you try asking the question again with a picture of the examples

adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf

Answers

Answer:

this belongs on r/ihadastroke

Explanation:

Answer: ok

Explanation:

one day when rahul went to his computer lab and saw that all the computers were connected to a single printer and whoever is giving a command to print, the print out comes from that printer. can you name the concept of communication? class 8 computer one word answer..​

Answers

Explanation:

you can connect multiple PCs to the wireless printer and print your documents from each one of them as long as the printer can be connected to the same network . You need the disc that came with the wireless printer to install the correct drivers on your computers and laptops.

hope it helps ( brainleist please )

technically a coding question utilizing python how would one calculate a square root

Answers

Answer:

import math

math.sqrt( x )

Explanation:

The basic code that can be written to calculate the square root of a number is as follows

import math

math.sqrt( x )

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

Ryan is applying a sort to the data in a table that you have inserted in Word. Which option is important for most tables that have column headings?
• Sort in descending order.
• Sort in ascending order.
• Select the option "My List has Header Row."
• Choose the correct sort field.

Answers

Ryan is applying a sort to the data in a table that you have inserted in Word.By Choose the correct sort field option is important for most tables that have column headings.

What is statistics?

A statistics desk is a number cell wherein you may alternate values in a number of the cells and give you one-of-a-kind solutions to a problem. An appropriate instance of a statistics desk employs the PMT feature with one-of-a-kind mortgage quantities and hobby fees to calculate the low-priced quantity on a domestic loan you can set up in descending, or you may set up in ascending.

And D, has not have anything to do with this requirement. You do not have this feature to be had with you. Select the option, "My listing has header row" isn't always to be had to us. And clearly, you want to pick out the excellent type of discipline first. And then you may set up or type accordingly.

Read more about the column headings:

https://brainly.com/question/1788884

#SPJ2

No links it’s just a normal question about iPhones.
If you have someone in your contacts you talk with a lot but like everyday you delete the conversation multiple times will you stop receiving texts from that person even if you text them and it says delivered?

Answers

Answer:

You will still get the messages. You are just deleting the messages from YOUR device not the other persons, in order to stop recieving messages from the person you block them. In order to stop receving notifications, you put them on DND. But, if you talk to them everyday I would assume you would not want to stop receiving messages from them.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a. She has a home network with smart home devices. b. She dialed into her home modem through the app and sent a command through the router. c. She has installed switches that interact with the installed app on her phone. d. She uses a hub at her home that she connects to through the app.

Answers

A. She has a home network with smart home devices

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. Friend is able to do this by  doing home network with smart home devices. The correct option is a.

What are smart devices?

The devices which are operated using the analog signals which carry information.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone.

Friend is able to do this by doing home network with smart home devices.

Thus, the correct option is a.

Learn more about smart devices.

https://brainly.com/question/17509298

#SPJ2

You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5

Answers

Answer:

Explanation:

The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int[] person = new int[5];

       System.out.println("Enter age of individual 1: ");

       person[0] = in.nextInt();

       System.out.println("Enter age of individual 2: ");

       person[1] = in.nextInt();

       System.out.println("Enter age of individual 3: ");

       person[2] = in.nextInt();

       System.out.println("Enter age of individual 4: ");

       person[3] = in.nextInt();

       System.out.println("Enter age of individual 5: ");

       person[4] = in.nextInt();

       int youngest = person[0];

       for (int x = 0; x < person.length; x++) {

           if (person[x] < youngest) {

               youngest = person[x];

           }

       }

       double discount = 1 - (((double)youngest) / 100);

       double output = 50 * discount;

       System.out.println("Total Price: " + output + " the youngest is " + youngest);

   }

}

This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info

Answers

Answer:

contact their support

Explanation:

Select the correct answer from each drop-down menu.
Complete the following sentences.

_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.

Options for the first box are: managers, A teams, an individuals

Options for the second box are:internal, specific, external

Answers

Answer:

First, A teams, Second ,Specific

Explanation:

Consider the classes below: Which of the following statements is true? Group of answer choices The value of counter will be different at the end of each for loop for each class. The value of j will be the same for each loop for all iterations. Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true. Neither The value of counter will be different at the end of each for loop for each class nor The value of j will be the same for each loop for all iterations is true.

Answers

Answer:

probly

Explanation:

Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true.

(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?

Answers

Answer:

a trade mark is something where someone owns the rights to something in a specific country


What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.

Answers

Answer:

I. You own it.

II. You can edit.

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.

The requirements which are necessary in order for you to share a file are;

I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.

II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.

Identify the characteristics of syntax errors. Choose all that apply.
programmer did not follow the program language conventions
may be highlighted while writing the program
can be caused by mistyping or misspelling while writing the program
does not cause an error message

Answers

Answer:

Explanation:

Identify the characteristics of syntax errors. Choose all that apply.

programmer did not follow the program language conventions

may be highlighted while writing the program

can be caused by mistyping or misspelling while writing the program

Answer:

Its A B C i got it right

Explanation:

What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0]; for (int i = 1; i < numbers.length; i++) { if (numbers[i] < value) value = numbers[i]; } The value variable will contain the highest value in the numbers array. The value variable will contain the sum of all the values in the numbers array. The value variable will contain the average of all the values in the numbers array. The value variable will contain the lowest value in the numbers array.

Answers

Answer:

The value variable will contain the lowest value in the numbers array.

Explanation:

Given

The given code segment

Required

The result of the code when executed

The illustration of the code is to determine the smallest of the array.

This is shown below

First, the value variable is initialized to the first index element

int value = numbers[0];

This iterates through the elements of the array starting from the second

 for (int i = 1; i < numbers.length; i++) {

This checks if current element is less than value.

     if (numbers[i] < value)

If yes, value is set to numbers[i]; which is smaller than value

value = numbers[i];

Hence, the end result will save the smallest in value

How do we know if we can believe the things on the internet?

Answers

Answer:

you have to check for reliability

Explanation:

Answer:

you can't always believe the internet some stuff is false are bended

Explanation:

yea

Kevin is scanning old images from his college library. He might use these scanned images in the college magazine. He might also use them on the college website. What is the best practice for Kevin to follow when scanning the images?
A.
scan the images with 72 DPI
B.
scan only the images that are ideal for a website
C.
scan the images with 150 DPI
D.
scan the images with 600 DPI
E.
scan the images that are ideal for a magazine

Answers

Answer: D. Scan the images with 600 DPI

Explanation:

Answer: D. Scan the images with 600 DPI

Explanation: Correct for Plato/Edmentum

What programs are always running when your computer is turned on? Enter the names of the programs in the space provided. Click the Submit button when you are finished to view the suggested response.

Answers

Answer:

open your task manager

Explanation

right click the toolbar below and click on task manager and you will see what programs are running on your pc

Answer:

Items commonly found in the system tray include antivirus settings; battery status; and volume. Sometimes e-mail programs, printers, or faxes are also present. Your computer may have other items in the system tray too.

Explanation:

I just took  a test on edguenity and that was the correct answer hope this helps

can you help me with my homework what should i do

Answers

Answer:

what is matter and two examples

Which of the following images illustrates safe driving?

Answers

Answer:

bottom left

Explanation:

Answer:

keep your eyes on the road!!!!

You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group

Answers

Answer: Add the Managers group to the GPO's discretionary access control list (DACL).

Deny the apply Group Policy and read permissions to the Managers group.

Explanation:

To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).

Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.

Other Questions
4) Jenee made a 99, 86, 76, and 95 on her first four spelling tests. Her mother told herthat her spelling test average had to be a 91 for Jenee to get a new video game. Whatdoes Jenee need to make on her next test? Cal es el recurso literario de estas oraciones?a)El payaso tena la nariz tan roja como un tomateb)El sol lloraba desconsolado en el cielo azulc)Su piel tan blanca parece leche d) Las flores rean con alegra al sentir la lluvia please Josephine has a glass pitcher in the shape of a rectangular prism. The pitcher dimensions are 5 inches long, 5 inches wide and 7 inches high. She fills 3 inches of the pitcher with sugar. How many cubic inches are left in her pitcher for lemonade? The first Europeans to reach the Americas in the early 11th century were the A vikings B italians C spanish D english Which natural events likely caused Earth's past mass extinctions? Should the Supreme Court set a time frame for a speedy trial? Brenda and Louise are twin sisters who each married 20 years ago. Brenda and her husband run a small piano tuning business. They have had a small, loyal customer base, and their modest but adequate income has not changed over time. Louise and her husband each work for a corporation, and their incomes have steadily increased over the last 20 years allowing them to increase their standard of living. Assuming that Brenda and Louise began their married lives equally happy, and based on their income histories alone, what would you predict about the subjective well-being of Brenda and Louise today what is the surface area of a rectangular prism if the length is 14.5 square inches, the width is 11 square inches, and the height is 2 square inches?PLEASE HELP ITS DUE TODAY 56,252 rounded to the nearst ten thousandths Why was the first Battle of Bull Run important during the Civil War?A.It was the first victory of the Union army on Southern soilB.It was the first major battle between the North and SouthC.It was the first meeting of Robert E. Lee and Ulysses S. GrantDIt was the first time Stonewall Jackson was an acting general,. Very easy answer, I will give Brainliest! What is the name of this process? Click the picture above to view. On Christmas Eve I saw that my mother had outdone herself in creating astrange menu. She was pulling black veins out of the backs of fleshy prawns. Thekitchen was littered with appalling mounds of raw food: A slimy rock cod withbulging fish eyes that pleaded not to be thrown into a pan of hot oil. Tofu, whichlooked like stacked wedges of rubbery white sponges. A howl soaking dried fungusback to life. A plate of squid, their backs crisscrossed with knife markings so theyresembled bicycle tires.Read the following excerpt from Amy Tans Fish Cheeks.1. highlight interesting diction.2. Why did you highlight each word? What connotations do the words have?3. Is there a pattern in the word choice?4. How is the meaning affected by the words? Required information Exercise 10-11 Effects of Changes in Profits and Assets on Return on Investment (ROI) [LO10-1] Skip to question [The following information applies to the questions displayed below.] Fitness Fanatics is a regional chain of health clubs. The managers of the clubs, who have authority to make investments as needed, are evaluated based largely on return on investment (ROI). The company's Springfield Club reported the following results for the past year: Sales $ 780,000 Net operating income $ 17,940 Average operating assets $ 100,000 The following questions are to be considered independently. Assume that the manager of the club is able to reduce expenses by $3,120 without any change in sales or average operating assets. What would be the clubs return on investment (ROI)? (Do not round intermediate calculations. Round your answer to 2 decimal places.) Find the length of each arc. Round your answers to the nearest tenth.A) 127.2 ydC) 102.4 ydB) 7.1 ydD) 56.5 yd Help me answer this question asap A playground merry-go-round has a mass of 120 kg and a radius of 1.80 m and it is rotating with an angular velocity of 0.400 rev/s. What is its angular velocity (in rev/s) after a 22.0 kg child gets onto it by grabbing its outer edge I havent done this since 7th grade sorry I just dont remember What is the range of the function f(x) = 2 2 when the domain is {0, 2, 4}? O {-1, 2, 14} {3, 6, 8} {-2, 2, 6) All real numbers Please answer the following question: Who is the tallest women in the world