1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nastasia [14]
3 years ago
10

Write a program in python to accept three numbers and print the largest of the three

Computers and Technology
1 answer:
Anika [276]3 years ago
8 0

Answer:

num1 = int(input("Enter number 1: "))

num2 = int(input("Enter number 2: "))

num3 = int(input("Enter number 3: "))

print(max(num1,num2,num3))

Explanation:

Python 3

You might be interested in
Which of the following is a variable expense for many adults?
IRINA_888 [86]
<span>C. Their monthly rent payment.</span>
7 0
3 years ago
Read 2 more answers
Microwaves are used
Phoenix [80]
D) both a and b
Microwaves are used to heat foods in ovens. We all know that. They are also used for data and information transfer. Microwaves are used in wifi, gps, and radio astronomy. 
6 0
2 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
2 years ago
Which statement best describes the role of computing in entrepreneurship? Entrepreneurs can only be successful with modern compu
kykrilka [37]
Well according to e2020 the answer would be A. "Entrepreneurs can only be successful with modern computing technology."
5 0
3 years ago
When operating a user interacts with
forsale [732]

Answer:

The operating system

Explanation:

8 0
2 years ago
Other questions:
  • 1. Write the name of the tab, command group, and icon that is used to sort information in a Word document.
    12·2 answers
  • What is wrong with my code?
    7·1 answer
  • Which of the following instruments are used when performing a high-rate discharge test on a storage battery
    7·1 answer
  • ____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
    7·2 answers
  • Which of the given original work is protected by the copyright law?
    5·1 answer
  • Which of the following can ensily reverse motion and are better at varying speeds than electrical motors?
    10·1 answer
  • A _______ read inputs the first data item from a file. It typically appears immediately before the loop that processes the data
    5·1 answer
  • Hard disk works on the following technologies: (i) Technology used within the hard drive to read &amp; write data to the drive a
    11·1 answer
  • Use the drop-down menus to explain what happens when a manager assigns a task in Outlook.
    6·2 answers
  • 8. SQL, Oracle Report, and Visual Basic are all examples under the
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!