1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
2 years ago
9

Define a function FindLargestNum() with no parameters that reads integers from input until a negative integer is read. The funct

ion returns the largest of the integers read
Computers and Technology
1 answer:
Phoenix [80]2 years ago
6 0

The FindLargestNum program is an illustration of function; where its execution is done when its name is called or evoked

<h3>The function FindLargestNum </h3>

The FindLargestNum function written in Python, where comments are used to explain each action is as follows:

#Thie defines the FindLargestNum function

def FindLargestNum():

   #This gets the first input

   num = int(input())

   #This initializes the minimum value

   maxm = num

   #The following is repeated until the user enters a negative input

   while num >= 0:

       #This determines the largest input

       if num > maxm:

           maxm = num

       #This gets the another input

       num = int(input())

   #This prints the largest input

   print(maxm)

Read more about functions at:

brainly.com/question/24941798

You might be interested in
Select the correct answer.
swat32
Answer : C project planning
5 0
3 years ago
Importing data is sending data to a new file.Is this true or false
Kipish [7]

false homie I gotcho


3 0
3 years ago
Read 2 more answers
Why is it not advisable to mark tlc plates with a pen to indicate?
nikitadnepr [17]
The plate can change the function that is in it. If you were to name it wrong, you would have to debug the code and possibly rewrite it.
3 0
3 years ago
What is the difference, if any, between secure HTTP and firewalls?
Jobisdone [24]

Answer:

SSL would simply encrypt whatever request is sent to the server. In order to prevent the execution of such malicious scripts/payloads at the Web application (in other words the Web server), a Web Application Firewall is implemented in place. ... Whereas, HTTPS where SSL comes into picture would have methods such as POST.

in other words its A

5 0
3 years ago
2. A shift register can operate:
Naddik [55]
C. Both serially and Perullo
8 0
3 years ago
Other questions:
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • A powerful computer that acts as a hub for other computers is a called a ______.
    6·2 answers
  • Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha
    12·2 answers
  • Select the correct answer
    11·2 answers
  • Hi! I'm Kayla! I was wondering who does homework on the weekends... anybody?? I guess almost everyone, including me. Anyways, le
    13·2 answers
  • Which of these is an online presentation tool?
    9·2 answers
  • Before measuring resistance of a component, be sure:
    8·1 answer
  • Misspelet errors are displays with a ...<br>.. below them<br>​
    10·1 answer
  • I live in Pennsylvania which observes eastern standard time.
    13·1 answer
  • CLS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!