1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
13

3.6 Code Practice Edhesive. (PYTHON LANGUAGE)

Computers and Technology
1 answer:
Aleks [24]3 years ago
5 0

i = 0

lst = ([])

while i < 6:

   lst.append(int(input("Enter a number: ")))

   print("Largest: "+str(max(lst)))

   i+= 1

This works for me. Best of luck.

You might be interested in
What is a megavirus in computing
g100num [7]

Answer:

tbh I have no clue.

Explanation:

8 0
3 years ago
Read 2 more answers
How to recover permanently deleted files from drive
HACTEHA [7]
Go into your trash bin in your computer.
7 0
3 years ago
List any two characteristics of ASCC.​
ladessa [460]

Answer:

spirit of cooperation, collective responsibility

Explanation:

i had that question before

3 0
3 years ago
Read 2 more answers
Some systems provide file sharing by maintaining a single copy of a file. Other systems maintain several copies, one for each of
Natalka [10]

Answer:

Explanation:

When you have a single copy, a large number of concurrent updates that are supposed to go to a file may result in the user obtaining incorrect information. This incorrect information obtained them leads to the file being left in an incorrect state. When you have a lot of or multiple copies, then storage waste exist and the various copies might happen not to be consistent with respect one other. In summary, what happens is that

a) Using one copy saves space, but also the change might have an effect on all the users.

b) Using multiple copies avoids eliminates the change problem, while creating its own problems, using more space.

3 0
3 years ago
Which of these is the best example of an asset?
ArbitrLikvidat [17]

I believe it's the second answer:

The antique diamond necklace someone is wearing

5 0
3 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • Ming is building an inexpensive computer to use for her online classes, and needs to purchase Windows. What is the most cost-eff
    8·1 answer
  • Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th
    11·2 answers
  • Select four programs that make up system software.Select four programs that make up system software.
    8·1 answer
  • How many people employed in the United States work in a job related to digital media?
    12·1 answer
  • Create and Provide complete program that includes a comments header with your name, course, section and other program details an
    9·1 answer
  • What is the output?
    12·1 answer
  • I am trying to code a lifting simulator game on ro-blox. These problems listed in the third picture tells you the problems. If y
    9·1 answer
  • Please help with question
    14·1 answer
  • During the maintenance phase of the sdlc, the team must _____ if a system's objectives are not being met
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!