1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
2 years ago
15

Can someone pls help fix my code on Project stem. 2.7 Code Practice: Question 1 (Python no Java script)

Computers and Technology
1 answer:
Savatey [412]2 years ago
4 0

The required code which displays the largest of three user supplied integer values written in python is as follows :

num_1 = int(input())

#takes first integer input from user

num_2 = int(input())

#takes second integer input from user

num_3 = int(input())

#takes third integer input from user

def maximum(num_1, num_2, num_3):

#initiates a function named maximum which takes the three user defined inputs

largest = num_1

#sets num_1 as the largest

if (num_2 > num_1) and (num_2 >num_3):

#checks if num_2 is greater than the first and third input

largest = num_2

#if TRUE set the second input as the largest

elif (num_3 > num_1) and (num_3 > num_2):

#checks if num_3 is greater than the first and second input

largest = num_3

#if TRUE, set the third input as the largest

return largest

# return the largest value after evaluation.

print('Largest value is :' + str(maximum(num_1, num_2, num_3)))

#displays the maximum value of the three inputs.

The result of the code processed is attached in the picture below.

Learn more :brainly.com/question/14786286

You might be interested in
The retention of encoded information over time refers to
Crank

It refers to Storage

7 0
2 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
4 years ago
To back up your database, click the _____________to display Backstage view, click the Save & Publish tab in the navigation b
Nuetrik [128]

Answer:

The answer is "File Tab".

Explanation:

In the database, restore is a database recovery process mechanism, that maintains administrative environment, configuration and stored software data. In the case of primary computer crashes, it helps to construct a new instance or to clone the database.

  • In this a file tab is an option, when we click on it is provides a backstage view of the file window, that deals with repositories and feature grades.
  • It helps you to do something in a database when you can make the situation within the database by putting commands on some other tabs on the Ribbon, that's why the file tab is the correct answer.
4 0
3 years ago
Which of the following was the most significant impact the phonograph had on the recording arts industry?
liraira [26]

Answer:

The phonograph led to mass distribution of recordings.

Explanation:

I just took this assignment. :)

4 0
3 years ago
Read 2 more answers
Which internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same
Temka [501]

NIC Ports use which RJ connector? RJ-45 internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same segment.

There's a lot of confusion out there about which NIC ports use which RJ connectors. RJ-45 internetworking devices make computers that are connected to separate segments appear and behave as if they're on the same segment. So, which one do you use?

The answer is actually quite simple. If you're connecting two computers together, you'll need to use an RJ-45 cable. If you're connecting a computer to a modem or router, you'll need to use an RJ-11 cable.

RJ-45 cables are actually quite common and can be found at most electronics stores. If you're not sure which one you need, just ask a sales associate for help.

Learn more on internetworking device here:

brainly.com/question/28342757

#SPJ4

3 0
2 years ago
Other questions:
  • Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
    10·1 answer
  • Flesh out the body of the print_seconds function so that it prints the total amount of seconds given the hours, minutes, and sec
    12·1 answer
  • Which architect designed the Guggenheim Museum in New York?
    6·2 answers
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • What type of chart is good for single series of data​
    15·2 answers
  • Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers know
    7·1 answer
  • Pls help!!!!!!!!!!!!
    13·2 answers
  • Select the correct answer.
    15·1 answer
  • What is the output of this program?
    11·1 answer
  • Online advertising includes: a. All of these are correct. b. ads in print newspapers. c. social media. d. listings on directory
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!