1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
13

3.6 Code Practice Edhesive. (PYTHON LANGUAGE)

Computers and Technology
1 answer:
Aleks [24]3 years ago
5 0

i = 0

lst = ([])

while i < 6:

   lst.append(int(input("Enter a number: ")))

   print("Largest: "+str(max(lst)))

   i+= 1

This works for me. Best of luck.

You might be interested in
Riodic Table
Ksenya-84 [330]

Answer:

riodic Table

A museum wants to store their valuable documents in cases that contain a gas that will protect the documents.

She should not choose one of the other gases because they are too

The museum director should choose

Explanation:

I didn't understand

8 0
3 years ago
Porque sophia es un robot mujer?
gregori [183]
Sophia es un robot humanoide (ginoide) desarrollado por la compañía, con sede en Hong Kong, Hanson Robotics. Ha sido diseñada para aprender, adaptarse al comportamiento humano y trabajar con estos satisfactoriamente.
7 0
3 years ago
Who could vote in the first democracy?
zmey [24]
B citizens

in the 4th century there were about 100k citizens. only about 40k could participate in the democratic process ( this is only if the question is referring to ancient democracy )
4 0
3 years ago
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
If the Mona Lisa was in a word document, what would be the orientation
skelet666 [1.2K]
Portrait orientation
8 0
3 years ago
Other questions:
  • If you are trying move a hard drive from a non-working computer to a working computer for the purposes of accessing the data on
    5·1 answer
  • Write a function named delete Letter that has 2 parameters. The first parameter is a string, the second parameter is an integer.
    11·1 answer
  • To add text to a blank slide layout, _____.
    8·2 answers
  • How did the invention of the printing press lead eventually to an increase in the diversity of religious expression?
    7·1 answer
  • Which factor did not contribute to the increase of leisure travel in the early twentieth century in the United States?
    7·2 answers
  • This needs to be written in Java.
    11·1 answer
  • Who invented the machine known as colossus?
    9·2 answers
  • Why is data processing done in computer?​
    14·1 answer
  • Wearables, video playback and tracking devices can help athletes because
    15·1 answer
  • Which part of the brain controls the movement of muscles​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!