Difference between revisions of "Python"
(→Strengths and Weaknesses of Python) |
(→Strengths and Weaknesses of Python) |
||
Line 3: | Line 3: | ||
==Strengths and Weaknesses of Python== | ==Strengths and Weaknesses of Python== | ||
− | + | Python draws strength from being convenient and simple to write. Many people view it as one of the easiest scripting languages to code in. As such, a common usage for python is to write a 'prototype' of a program before implementing it in a heavier language like C. Furthermore, due to it's interpretive nature, a python script is easily modified - there are no compiled binaries to disassemble and reverse-engineer. | |
+ | |||
+ | However, the language's strengths often become weaknesses. For example, as was noted before, python is not a compiled language. This means that it is very difficult to protect python code - every program is in its raw form, and can be freely edited and reused. There are methods, such as code obfuscation, that can be used to protect code, but these are not foolproof. | ||
+ | |||
+ | to be continued | ||
[[Category:Programming Languages]] | [[Category:Programming Languages]] |
Revision as of 20:17, 22 November 2011
Python is a high-level interpreted language designed around functionality and cleanliness. It is often compared to perl in terms of functionality and usage.
Strengths and Weaknesses of Python
Python draws strength from being convenient and simple to write. Many people view it as one of the easiest scripting languages to code in. As such, a common usage for python is to write a 'prototype' of a program before implementing it in a heavier language like C. Furthermore, due to it's interpretive nature, a python script is easily modified - there are no compiled binaries to disassemble and reverse-engineer.
However, the language's strengths often become weaknesses. For example, as was noted before, python is not a compiled language. This means that it is very difficult to protect python code - every program is in its raw form, and can be freely edited and reused. There are methods, such as code obfuscation, that can be used to protect code, but these are not foolproof.
to be continued