1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
10

Help plz

Computers and Technology
1 answer:
Sonbull [250]3 years ago
8 0

1.

first = float(input("First Entry = "))

second = float(input("Second Entry = "))

def func(num1, num2):

   return max(num1, num2)

print(func(first, second))

2.

first = input("First Entry = ")

second = input("Second Entry = ")

def func(word1, word2):

   return sorted([word1,word2])[0]

print(func(first, second))

I hope this helps!

You might be interested in
What type of software is responsible for managing processor time and memory allocation?
yKpoI14uk [10]

Answer: Operating system

Explanation:

 The operating system is the type of software that are responsible for manage the processor time and also the memory allocation in the system. The operating system mainly deals with the processor time by scheduling the processor work done in the system.

The OS mainly control the system and then schedule the execution of various types of function by the central processing system (CPU). It also control the memory allocation in the system.

4 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
Which of the following is an example of physical noise?
solniwko [45]
What are the options

6 0
3 years ago
A _______________ is a field that contains data unique to a record.
Andru [333]

A primary key is a field that contains data unique to a record

8 0
3 years ago
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log
klemol [59]

Answer:

Install recommended updates.

Explanation:

To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.

3 0
3 years ago
Other questions:
  • Rags or wipes are considered non-hazardous waste when they are
    15·2 answers
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • What’s the answer to this question?
    15·1 answer
  • Write a Bare Bones program that takes as input two variables X and Y. (Again, assume these values are set before your program be
    10·2 answers
  • What should be used to keep a tablet dry?
    13·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • Which of the following examples can be solved with unsupervised learning?
    8·1 answer
  • Fill this blanks with the given words​
    6·1 answer
  • takes the perspective that a program describes what the solution to a problem is, not how that problem is solved. Select one: a.
    5·1 answer
  • A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 50
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!