Write a method maxmagnitude() with three integer parameters that returns the largest magnitude value. Use the method in the main program that takes three integer inputs and outputs the largest magnitude value.

Answers

Answer 1

Answer:

def maxmagnitude(a, b, c):

   return max(abs(a), abs(b), abs(c))

   

a = int(input("Enter an integer: "))

b = int(input("Enter an integer: "))

c = int(input("Enter an integer: "))

if a < 0 or b < 0 or c < 0:

   print("Largest magnitude:", -maxmagnitude(a, b, c))

else:

   print("Largest magnitude:", maxmagnitude(a, b, c))

since you didnt mention what program youre using im going to answer using python. if you would like me to amend please let me know!


Related Questions

which of the following classifications of method behavior produces acceptable side effects? group of answer choices any method that changes another object. any method that changes an explicit parameter. mutator methods that do not change explicit parameters. accessor methods that do not change explicit parameters.

Answers

The following classifications of method behaviour produces acceptable side effects is Mutator methods that do not change explicit parameters.

How do I use Java's mutator methods?

Accessible methods for mutators must be declared. Although, there is no return type for Mutator methods. However, depending on the information type of the residential variable, they may accept a parameter. Then, it will use the keyword this to acquire the private variable and set its value to the parameter's value.

What names should mutator methods have?

Now let us start with the names that mutators are given. The method has to return void and be public. In addition, the keyword set should start the method name in lowercase. the class variable name, starting with a capital letter.

To know more about  Mutator methods visit:

https://brainly.com/question/29852600

#SPJ4

In CANTRAC, what functionality portion of CeTARS is where course data is initially input and updated, this data is automatically updated in CANTRAC?

Answers

Answer:

Discoverer

Explanation:

You have an azure subscription that includes the following web apps: webapp1, which runs code in a windows operating system. Webapp2, which runs code in a linux operating system. Webapp3, which runs in a docker container on windows. Webapp4, which runs in a docker container on linux. From which web apps can you use webjobs?.

Answers

We can see here that the web apps that you can use for WebJobs are: D. WebApp1, WebApp2, WebApp3 and WebApp4.

What is a web app?

A web app is actually known as a web application. It is a application software that is accessed with use of a web browser. In other words, web application used a browser interface. It is used in web services.  

We see that the frontend of a web application are usually created using languages. An Azure subscription can be used to access web apps as shown above.

Below is the complete part of the question:

From which web apps can you use WebJobs?

Select only one answer.

A. WebApp1 only

B. WebApp1 and WebApp2 only

C. WebApp1 and Web3 only

D. WebApp1, WebApp2, WebApp3 and WebApp4

Learn more about web application on https://brainly.com/question/28565122

#SPJ1

How would you describe the game Space Invaders?

A.
a modern-day shooter-style game created in the year 2000

B.
a classic type of shooter game created in the 1970s

C.
an educational game about space

D.
a modern, puzzle-style game

Answers

One can describe the game Space Invaders as: "a classic type of shooter game created in the 1970s" (Option B).

What is space invaders?

Space Invaders is a stationary shooter in which the player moves a laser gun across the bottom of the screen and fires at aliens above. The aliens begin in five rows of eleven, moving left and right as a group, changing lower whenever they hit a screen boundary.

Prior to Space Invaders, music and sound effects were essentially afterthoughts in game design, serving as supplemental features that had little bearing on gameplay. Space Invaders was the first game to have ongoing music that played as the player moved.

Given the intentionality of the low-pixel feel of the above-named, game, one can rightly say that is is a classic type of shooter game.

Learn more about Space Invaders:
https://brainly.com/question/10941943
#SPJ1

Rabia is new to game design in Scratch, and she wants to know how to create levels in her game. Which of the following phrases should she search for on the internet?

A.
how to add sprites to your game

B.
how to add different backdrops to your game

C.
how to animate a sprite

D.
how to set up a score variable

Answers

Since Rabia is new to game design in Scratch, and she wants to know how to create levels in her game, the phrase which she should search for on the internet is: B. how to add different backdrops to your game.

What is a search engine?

In Computer technology, a search engine simply refers to a software program (application) that is designed and developed to search the world wide web (WWW) or various websites on the internet, and identify items that correspond to the keywords (string of characters) and phrases, which must be specified by an end user.

In this scenario, the phrase "how to add different backdrops to your game" should be entered into a search engine over the internet in order to see a list of results on how to create levels in Scratch game.

Read more on search engine here: brainly.com/question/27965856

#SPJ1

Answer:

your answer would be how to add different backdrops to your game

Explanation:

According to the cloud computing trends for 2020 video case, what term is used to describe a distributed computing model where information is processed closer to its source?.

Answers

Answer:      Public cloud providers have begun to distribute their services to different geographical locations, becoming known as the distributed cloud. In this way, the cloud is broken up into multiple smaller datacenters in different locations rather than just one large datacenter.

Explanation:

what career cluster allows you to act direct or produce

Answers

Answer:

finance analyst, treasurer, economist, bank worker, debt counselor or insurance professional.

Explanation:

Passwords should be less than 6 digits

True
False

Answers

Solution:

False

Explanation:

It should be as long as possible to decrease the chances of someone logging in.

Hope that helps!

2.Avoid stepping on__________________________or any other computer cable.

(1 Point)

a electrical wires

b computer cord

c internet cable

d thernet cable
3.Do not touch, connect or disconnect any ________________without your _________________ permission.

(1 Point)

a. computer buttons, mother's

b. plugs, principal's

c cables, teacher's

d controller cable, mother's

Answers

Answer:

2. A

3. C

I think. They can be multiple answers so it really depends on the subject matter.

Explanation:

you want to be able to identify the services running on a set of servers on your network. which tool would best give you the information you need? answer port scanner protocol analyzer network mapper vulnerability scanner

Answers

Services running on a set of servers on your network. the tool would best give you the information you need  vulnerability scanner

What is mean by  vulnerability scanner?A vulnerability scanner is a piece of software created to examine networks, applications, and machines for vulnerabilities. These scanners are employed to identify a system's vulnerabilities. They are used to identify and find vulnerabilities in network-based assets like firewalls, routers, web servers, application servers, etc. that result from incorrect setups or poor programming. Both authenticated and unauthenticated scans are possible with contemporary vulnerability scanners. Modern scanners are frequently offered as SaaS (Software as a Service); they are delivered online and are shown as web applications. The installed software, open ports, certificates, and other host data that can be queried as part of its workflow can all be customised by the modern vulnerability scanner, as well as vulnerability reports.

To learn more about   vulnerability scanner refer to:

https://brainly.com/question/29534018

#SPJ4

A Title slide should always be your first slide.

True
False

Answers

True: A title slide should always be your first slide no matter what.

Answer:

True because it can't be false

you are the network administrator for stellacon corporation. users in the sales department have been complaining that the sales application is slow to load. using performance monitor, you create a baseline report for one of the computers, monitoring memory, the processor, the disk subsystem, and the network subsystem. you notice that the disk subsystem has a high load of activity. what other subsystem should you monitor before you can know for sure whether you have a disk subsystem bottleneck?

Answers

Memory. Check the memory counters, please. Insufficient memory might result in excessive paging, which might be viewed as a disk subsystem bottleneck.

What is disk bottleneck?In computing, data storage bottlenecks occur when the resources or storage architecture are insufficient to enable the efficient handling of the available data. To remove storage bottlenecks, the appropriate storage tools and IT know-how are needed.However, because of the imbalanced strain the application environment places on the storage systems, it is frequently not a disk capacity issue but a storage I/O bottleneck problem that might arise in a storage environment. The performance of storage systems is influenced by many factors.

To learn more about Memory refer,

https://brainly.com/question/27266144

#SPJ4

What is a PivotTable?

Answers

You use it to analyze numerical data

Answer:

A PivotTable is a tool in a spreadsheet program, such as Microsoft Excel, that allows you to organize and summarize large amounts of data. PivotTables allow you to quickly create reports and view your data from different perspectives. You can use PivotTables to create calculations, compare data, and find trends and patterns. PivotTables are a useful tool for data analysis and can help you make better decisions based on your data.

To add a design to your PowerPoint, you should look under the ______ tab.

Design
Home
Insert
All of the above

Answers

To add a design to your PowerPoint you would look under the design tab.

Managers and executives are commonly information ______________, because they use information created by IT developers and analysts.

Answers

Answer:

consumers

Explanation:

the file owner: a. is the user who cannot change the file attributes, but can execute the file. b. is the user who can change the file attributes and grant access to the file. c. is the user who can change the file attributes, but cannot grant access to the file. d. is the only user who can execute the file.

Answers

The file owner is the user who can change the file attributes and grant access to the file.

In most operating systems, the file owner is the user who created the file or who has been assigned ownership of the file. As the owner of a file, the user has the ability to change the file's attributes, such as its name, location, and permissions.

The file owner also has the ability to grant access to the file to other users on the system. This may involve setting the file's permissions to allow read, write, or execute access to specific users or groups.

Therefore, option B (the user who can change the file attributes and grant access to the file) is the correct answer. Options A and C are incorrect, as the file owner does have the ability to change the file attributes and grant access to the file. Option D is also incorrect, as the file owner is not the only user who can execute the file. Other users with the appropriate permissions may also be able to execute the file.

Using while loop, write a C++ program that will compute and display the square roots of the first 25 odd positive integers starting from 1.

Answers

Answer:

#include <iostream>

#include <cmath>

using namespace std;

int main()

{

   int i = 1;

   while (i <= 25)

   {

       cout << i*i << endl;

       i += 2;

   }

   return 0;

}

when you create a section name in a man page, such as the description section, what tag should you use just before the section name?

Answers

Answer: The answer is .SH

Explanation: Hope this was helpful

Question 2 of 25
What is the best definition of a programming language?
A. The internal language a computer uses to communicate with
other computers and devices
OB. A language that instructs a computer how to carry out functions
OC. A complex thought process that breaks down difficult problems to
find their solutions
OD. The language that developers use to communicate with one
another about software design
SUBMIT

Answers

Answer:

A language that instructs a computer how to carry out functions

Explanation:

The definition of computer programming is the process of writing code to facilitate specific actions in a computer, application or software program, and instructs them on how to perform.

This is a longer answer to the question just without "language" in it.

Answer:

B. A language that instructs a computer how to carry out functions

Explanation:

A computer language designed to provide standardized commands is known as a programming language. These instructions can be translated into a machine-readable code.

what is the name of the type that denotes whole numbers? group of answer choices whole int double integer

Answers

Defaulting to a 32-bit signed two's complement integer, the int data type has a range of values between -231 and 231-1.

What does the kind that represents whole numbers go by?

An integer, pronounced "IN-tuh-jer," is a whole number that can be positive, negative, or zero and is not a fraction. Integer examples include -5, 1, 5, 8, 97, and 3,043.

A double data type: what is it?

Double: A double-precision 64-bit IEEE 754 floating point is the double data type. The Java Language Specification's Floating-Point Types, Formats, and Values section contain information about its range of values, which is outside the purview of this discussion. This data type is typically the default option for decimal values.

to know more about whole numbers here:

brainly.com/question/29766862

#SPJ4

what filmmaking technique does the final shot of the low road use to communicate the character’s intentions?

Answers

Every choice as a filmmaker must be in service to main characters and their story-focus on character's reaction to things-story must be clear are used to the low road use to communicate the character’s intentions.

What is film critic?

The different components of a movie, such as character and story development, acting, cinematography, directing, editing, and screenplay, are viewed and examined by movie critics. A film reviewer is another name for a film critic. A cinema critic might routinely write editorial criticism for newspapers and other well-known mass media. He or she might write journal-published academic critique that is influenced by film theory. They watch the many aspects of the movie, such as the plot and character development, and then they write about the acting, directing, cinematography, and plot. A film critic needs writing skills to convey the film's elements to the general public and will work to make the review both enjoyable and educational.

To know more about film critic visit:

https://brainly.com/question/29060496

#SPJ1

the following are two different images that are encoded using the same algorithm. the images are each in a 5 by 5 grid of pixels where each pixel is black, white, red, green or blue. the image on the left gets encoded and compressed down to 21 digits while the image on the right gets compressed down to 25 digits. although the same algorithm was used to encode and compress these images, why are the end results a different length?

Answers

a. The amount of size reduction from compression depends on the amount of redundancy in the original data. that is why  the end results a different length.

What is a succinct definition of pixel?

A pixel is the smallest component of a digital display. Millions of pixels or more may be present in a picture or video that is seen on a device's screen. Each of a pixel's subpixels contributes to the red, green, and blue (RGB) colors, which are shown in a range of intensities.

Do more pixels imply higher quality?

Higher resolutions provide images with more pixels per inch (PPI), more pixel information, and a clear, sharp appearance. Low-resolution images contain fewer pixels, and if those few pixels are excessively big (often when a picture is stretched), they can be seen, as in the illustration below.

To know more about pixel visit

brainly.com/question/15189307

#SPJ4

The options in the question are,

a. The amount of size reduction from compression depends on the amount of redundancy in the original data.

b. The algorithm was probably used improperly in the image on the right, causing it to be a longer length than it should have been.

c. The image on the right uses more colored squares and therefore requires more digits to represent the pixels.

d. Because this is a lossy compression, sometimes information is lost during the compression.

major, large city newspaper endorsements often carry important weight, especially in down ballot races for local offices.

Answers

Answer:

Explanation:

because they have the most electoral college votes up for grabs.

It is true that major, large city newspaper endorsements often carry important weight, especially in down ballot races for local offices.

What is endorsement?

Endorsements are public statements of support or approval made by an individual, group, or organisation for a specific person, product, or service.

Endorsements are especially important in politics during elections because they can influence voters' opinions and decisions.

In down ballot races for local offices, major, large city newspaper endorsements can carry a lot of weight.

This is due to the fact that these newspapers frequently have a large readership and a reputation for publishing well-researched and informed opinions.

Voters who are undecided or have limited information about a particular candidate or race may find these endorsements useful in making their decision.

Thus, the given statement is true.

For more details regarding endorsements, visit:

https://brainly.com/question/13582639

#SPJ2

she is developing access policies based on personnel security principles. as part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. what practice is she developing?

Answers

The right response is a direct assault. An immediate attack is a type of chance where a threat is actively pursued and compromised by a group of people.

What is assault?In general, an assault is defined as an intentional act that causes another person to reasonably fear harmful or offensive contact will occur soon. No actual harm must be done to the victim, but the actor must have intended to make an offensive or harmful contact with them, and the victim must have been made aware of this intention immediately.In the context of an assault, "intention" denotes that the action was not accidental; the motive, however, is irrelevant.It doesn't matter if the tortfeasor just wanted to scare the victim or if they were making a joke about it.It is sufficient for the tortfeasor to have intended the actual contact without regard to whether it was harmful or offensive.

To learn more about intention refer https://brainly.com/question/29613124

#SPJ4

Which behavior listed below has a negative impact on productivity

Answers

Answer:

Becoming distracted.

Explanation:

Becoming distracted is a bad habit that can negatively affect productivity. Nevertheless, distractions can come in many forms.

Why do games usually have rules?

A.
to make them less fun

B.
to provide structure so that the game objective can be achieved

C.
so that they can be broken

D.
because it’s easier to program rules into a game

Answers

Answer:

B

Explanation:

Part B

Which it job designs parts of applications that complies with the head application developer’s design principles?.

Answers

Answer:

Application Architects

Explanation:

Select the instance when you would use a while loop instead of a for loop.

Printing out a range with a specified starting and end value
Repeating an action as long as a condition is true
Adding up the values in a specified range
Locating a value in a specified range

Answers

Answer: Repeating an action as long as a condition is true.

Explanation:

6. the wait until next ms multiple function: a. begins timing at program start and completes upon a multiple of the pc timer b. begins timing after the code in the loop has completed and expires when the multiple of the (user) input time expires c. begins timing after the code in the loop has completed and expires when the (user) input time completes d. begins timing at program start and waits until the code in the loop has completed

Answers

The wait until next ms multiple function is:

a. begins timing at program start and completes upon a multiple of the pc timer

About Timer in Program:

A server-based timer, the Timer component raises an Elapsed event in your application after the amount of milliseconds specified in the Interval parameter has passed. Using the AutoReset property, you may set the Timer object to raise the event either once or repeatedly. For as long as it is required, a Timer object is typically specified at the class level. After that, you can handle its Elapsed event to offer routine processing.

About wait until next ms multiple function:

Watches until the millisecond timer's value reaches the desired millisecond multiple. Utilize this feature to time your actions. To manage the speed at which a loop executes, you can invoke this method within the loop. On the other hand, the initial loop duration could be brief. The current thread must give up CPU control if the milliseconds multiple input is wired with a value of 0.

The nodes themselves operate synchronously, however this function makes asynchronous system calls. As a result, it doesn't finish running until the allotted amount of time has passed.

To learn more about timer visit:

https://brainly.com/question/13154395

#SPJ4

Visit a shoot location for any video or film and observe the ongoing activities. Based on your observation, answer the following questions. If you’re unable to visit an actual shoot location, you can perform online or offline resources to answer the questions below.

What was the approximate size of the crew on the shoot? (Alternatively, what is the average crew size on a film shoot?)
What is the role of the director?
What is the role of a cameraman or cinematographer?
What is the role of the light technicians and assistants?
What does the makeup man do?
Was there a stylist on the shoot? What did he or she do?

Answers

Finding actual sites to act as the imaginary locations mentioned in a film's screenplay is known as location scouting. The correct setting aids the story and contributes to the creation of a believable world in films.

What does filming on location entail?

Location filming is simply shooting outside of a studio in the actual location where the story takes place. A soundstage is a space or building that is soundproof and utilized for the creation of movies and television shows.

How can I locate my shooting location?

For assistance, get in touch with the film commission or your local government office. They can aid in locating potential shooting sites for your movie. For a list of locations that are offered to filmmakers, you may also check out location-scouting websites.

to know more about shooting here:

brainly.com/question/10922117

#SPJ1

Other Questions
what popular late 1960s-early-1970s style resulted from a blend of r and b, country, blues, and gospel mixed with the aggression of hard rock? Instead of conducting laboratory experiments to generate data to test their theories, economists a, ask winners of the Nobel Prize in Economics to evaluate their theories. b. argue that data is impossible to collect in economics. c. gather data from historical episodes of economic change. d. assume that data would support their theories. upon reaching what point in the nephron is reabsorption (1) dependent upon the body's needs at the time and (2) regulated by hormones? Who were the Bourgeoisie?They were the first group of the Third Estate and were bankers, factory owners, merchants, professionals, and skilled artisans. Often, they were well educated and believed strongly in the Enlightenment ideals of liberty and equality. Some of the Bourgeoisie were as rich as nobles, but lacked privileges. Many felt that their wealth entitled them to a greater degree of social status and political power. At a grocery store, the price of a watermelon is determined by how many pounds the watermelon weighs. The price of a watermelon that weights 9.3 pounds is $6.51. Write an equation that can be used to determine the price, p, in dollars, of any watermelon based on the number of pounds, w, the watermelon weighs. Explain the process you used to determine the equation. in the emergency department you carefully assess and observe the client. which finding would be most concerning? a. urine output of 20ml/hr b. edema formation in the upper airway c. pulmonary embolism resulting from inhalation injury d. development of hypothermia What stereoisomers are obtained from each of the following reactions? (Do not use stereochemistry if the product doesn't have stereocenters.) Draw the molecules. Show the appropriate stereochemistry by choosing the dashed or wedged buttons and then clicking a bond on the canvas. Which one of the following is the preferred method of evaluating interest rate risk on mortgage bonds?a.PSA ratingb.modified durationc.Macaulay durationd.effective duratione.postponed duration Use the quadratic formula to find the solutions to the quadratic equation below .2x^2 +7x -14=x^2+4 in an average verbal behavior style program, what percentage of trials should include verbal responses? fill in the blank so that the equation is a prefect square trinomial Mary earns $28 000 a year. One week she grossed $658. 0. She had sold $1673. 19 worth of merchandise. What is the rate of her commission?. For a cell with diploid number of 6, how many sister chromatids are present at prophase? In a section through a plant, a student found a group of long, microscopic structures. The structures lacked end walls, cytoplasm and nuclei.Which identification and reason best matches the students observations? How does Saki use pacing and order to create tension and surprise in the end? Use specific examples from the story. In Coyote Finishes His Work, what role does Old Man give Coyote?Answer question in detail, using complete sentences If you have 6 cups of flour for each recipe, how muchsugar would you need to make Juliana's and Emiliano'sbrownies? Label this diagram ASAP pls! The third step of the Career Planning Process is: A. matchingB. Self assessment C.OptionsD.Action A diver starts out at 426 feet below the surface (or -426 feet). She then swims upward 212 feet. Use a signed number to represent the diver's current depth