1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
14

write an algorithm that reads two values determines the largest value and prints the largest value with an identifying message i

n Python​
Computers and Technology
1 answer:
Greeley [361]3 years ago
8 0

Answer:

a = int(input("Input your first number: "))

b = int(input("Input your second number: "))  

maximum = max(a, b)

print("The largest value: ", maximum)

Explanation:

The function max() can be used to find the maximum of two values

You might be interested in
(Java) Write a program that accepts a number of minutes and converts it both to hours and days. For example, 6000 minutes is 100
iogann1982 [59]
Import java.util.Scanner;
public class MinutesConversion {
private static Scanner inputDevice;
public static void main(String[] args) {
int minutes, hours;
float days; // float for decimal point

inputDevice = new Scanner(System.in);
System.out.println("Please enter minutes for conversion >> ");
minutes = inputDevice.nextInt();
hours = minutes / 60;
days = hours / 24.0f;


System.out.println(+ minutes + " minutes is " + hours + " hour(s) or" + days " days");
}
}
6 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
Which relationship is possible when two tables share the same primary key?
patriot [66]

When two tables share the same primary key, they share a

A. one-to-one relationship.

Explanation:

  • One-to-one relationship is a type of cardinality that refers to the relationship between two entities A and B in which one element of A may only be linked to one element of B, or the opposite way.
  • A one-to-one relationship in a relational database occurs when one parent record or field has either zero or one child record only.
  • These relationships are the easiest to represent in databases because both the parent and child records may be in the same table.
  • One-to-one relationships associate one record in one table with a single record in the other table.
  • These relationships are frequently used to indicate critical relationships so you can get the data you need to run your business.
  • A one-to-one relationship is a link between the information in two tables, where each record in each table only appears once.
8 0
4 years ago
Which of the following areas of study have been instrumental in shaping the development of HCT?
Ivan

Answer:

Cognitive Science and Graphic Design.

and hence D and E options are correct.

Explanation:

By HCT we mean Home and Community-based Treatment. This is, in fact, a home-based behavioral health-related service for the young people and all families which seek a better treatment plan, that is more advanced apart from an emergency therapy. And as far as the HCT's are concerned, they have well trained in quite a good number of treatment procedures like Cognitive Science related procedures. trauma centric cognitive treatment. However, a little bit of Arts and creativity is also required, and hence, you should know about the graphic design also.

8 0
3 years ago
In HTML, what is an element?
Dima020 [189]

Answer:

An markup language component is a private element of associate degree HTML (Hypertext Markup Language) document or web content. markup language consists of a tree of HTML nodes, like text nodes. Nodes may have content, as well as alternative nodes and text. several markup language nodes represent linguistics, or meaning.

Explanation:

Hope this help!

5 0
3 years ago
Read 2 more answers
Other questions:
  • You just realized the turn signal on your vehicle is broken,
    15·1 answer
  • If someone receives a shock, or a piece of equipment is throwing sparks or arcing you should try to pull them away from the sour
    7·1 answer
  • _____ is the standard that enables wireless devices to access web-based information and services. world wide web tcp/ip ethernet
    5·1 answer
  • To display a pop-up form for a control, such as account number in a datasheet create a user interface (UI) macro that is associa
    12·1 answer
  • Once a table is inserted into a publication, which two tabs become available?
    5·1 answer
  • Moving read emails to a folder is a great way to stay organized. <br> A) True <br> B) False
    7·2 answers
  • Why do filmmakers release trailers?
    5·2 answers
  • Hello can you please help with this if you want to thank you!
    15·2 answers
  • Rafter type and Truss type?
    5·1 answer
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!