1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
4 years ago
9

What is wrong with my code...

Computers and Technology
1 answer:
stiv31 [10]4 years ago
3 0
I'm not sure of the problem that you had in the first place, but I can point out that in your "bigger" method, if a number is greater than one then it is bigger, however the else statement says that the number *can* also be equal[==] to the second argument, so for example bigger(1,1) it would check if 1 > 1 and return false, so it will return that b[the second 1] is bigger! Hope this helps :D
You might be interested in
Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as we
kicyunya [14]

Answer:

i will help you waiting

Explanation:

4 0
3 years ago
Why are the relational operators called relational?
Pie
If you think about it, all "relational operators" are used to test some kind of relationship between two objects or entities. :)
3 0
4 years ago
Read 2 more answers
"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
alexdok [17]

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

3 0
3 years ago
Why did some people not like the arrival of machines?
Ahat [919]
People are concerned about losing their jobs. The industrial revolution introduced machines that removed the need for humans to be involved in highly repetitive tasks.
3 0
4 years ago
If you want to use your computer for recording your band, you would benefit most from a(n)
notka56 [123]
A. MIDI interface.
RAID is a set of strategies for using more than one drive in a system.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What type of devices are a keyboard and a mouse?
    7·1 answer
  • Jessica wants to purchase a new hard drive. She wants a drive that has fast access because she will use it to edit videos on her
    12·1 answer
  • a certain battery can supply 6 J of energy to every coulomb of charge moving through a circuit. if the circuit consists of two i
    13·1 answer
  • Hich of the following usually indicates that there is no moreinput to be read by a program?
    14·1 answer
  • A ____ is used to perform a forward-only (sequential) access of the data in the data source while a ____ is used to populate a d
    11·1 answer
  • 19. Fair use applies to which of the following situations?
    14·1 answer
  • 2. Which of the following statements describes a need or problem that can be solved using the technology design process.
    14·1 answer
  • Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
    9·1 answer
  • Trade Periodicals are usually highly scholarly resources<br> True<br><br> False
    5·1 answer
  • A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the subs
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!