Assignment 3 chatbot edhesive

Answers

Answer 1

Answer:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

   print("You are old enough to drive. \n")

else:

   print("Still taking the bus, I see. \n")

   

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

   print("That is good to hear.")

elif(feel == "Sad"):

   print("I'm sorry to hear that. ")

else:

   print("Oh my!")

   

print("Tell me more. \n")

next=input("")

import random

r = random.randint(1, 3)

if(r==1):

   print("Sounds interesting. \n")

elif(r==2):

   print("That's good to hear. \n")

else:

   print("How unusual. \n")

print("Well, " + name1 + ", it has been nice chatting with you.")

Explanation:


Related Questions

What are the disadvantages of batch operation system

Answers

The computer operators should be well known with batch systems.

Batch systems are hard to debug.

It is sometime costly.

The other jobs will have to wait for an unknown time if any job fails.

Explanation:

Answer:

Disadvantages of Batch Operating System:

The computer operators should be well known with batch systems.Batch systems are hard to debug.It is sometime costly.The other jobs will have to wait for an unknown time if any job fails.

Order the steps for accessing the junk email options in outlook 2016

Answers

Answer:

1 Select a message

2 Locate the delete group on the ribbon

3 Click the junk button

4 Select junk email options

5 Choose one of the protection levels

Explanation:  

Correct on Edg 2021

Answer:

In this Order:

Select Message, Locate delete group, click the junk, choose one of the...

Explanation:

Edg 2021 just took test

Which of the following is true about strings?
They cannot be stored to a variable
An input (unless otherwise specified) will be stored as a string
They do not let the user type in letters, numbers and words
They are used for arithmetic calculations

Answers

Answer:

Your answer is option C, or the third option.

They do not let the user type in letters, numbers, and words.

Explanation:

Strings are defined as a sequence of characters literal, constant, or variable. These sequences are like an array of data or list of code that represents a structure. Formally in a language, this includes a finite(limited) set of symbols derived from an alphabet. These characters are generallu given a maximum of one byte of data each character. In longer languages like japanese, chinese, or korean, they exceed the 256 character limit of an 8 bit byte per character encoding because of the complexity of the logogram(character representing a morpheme((which is the simpliest morphological(form or structure) unit of language with meaning)) character with 8 bit (1 byte, these are units of data) refers to cpu(central processing unit) which is the main part of a computer that processes instructions, and sends signals.

What is the best scenario to use a display font?

for quickly read messages, such as a highway sign
for important, dense information, such as a nutrition label
for small type, such as in body copy
for large type, such as a title

Answers

Answer:

For large type, such as a title

Explanation:

i tried all of the answer's til i got the right one

The best scenario to use a display font is that it makes the requirement to type large, such as a title. Thus, the correct option is D.

What is a Display font?

A display font may be defined as the arrangement of words with respect to the requirement that makes the writing more attractive, effective, and understandable.

Display font is utilized in order to determine how a font face is represented based on whether and when it is downloaded and ready to use.

Display fonts generally include large types of texts which are used to frame a title. This makes the title more attractive, effective, and ready to read from a long distance as well.

A title is the main characteristic that influences the readers about the writing.

Therefore, the best scenario to use a display font is that it makes the requirement to type large, such as a title. Thus, the correct option is D.

To learn more about fonts, refer to the link:

https://brainly.com/question/14052507

#SPJ2

The SQL SELECT command is capable of executing ____.

a. only relational Select operations
b. only relational Select and Project operations but not relational Join operations
c. relational Select, Project, and Join operations individually but not in combination
d. relational Select, Project, and Join operations individually or in combination
e. None of the above.

Answers

Answer:

d. relational Select, Project, and Join operations individually or in combination

Explanation:

SQL is short for structured query language. The SQL Select command allows the user to obtain data from a database. After the data is computed, the output is in a tabular form which is known as the result set.

All the queries begin with the Select command. The column and the table names are clearly noted in the instructions. This command can also execute projects and join several operations in combination or individually.

The SAP ERP ____ software module plans and schedules production and records actual production activities.A) project systemB) production planningC) quality managementD) asset management

Answers

Answer:

A) project system

Explanation:

The SAP ERP is a planning software that incorporates the business function of an organization. The business function are Operations, Financials,  Human Capital Management and Corporate Services.

SAP Project System is a tool (functional module) that is integrated with the SAP Enterprise Resource Planning (SAP ERP) system allowing users to direct funds and resources as well as controlling each stage of the project. It also allow users to define start and end date of the project.

Uncontrolled railroad crossing warning signs include _____


A. round black-on-yellow warning signs.


B. red flashing lights.


C. crossing gates.


D. none of the above

Answers

Answer:

letter D

Explanation:

The controlled railroad crossings have red lights and warning signs with railway gates. But if none of those items are present, then it is an uncontrolled railroad crossing.

Uncontrolled railroad crossing warning signs include; D; None of the above

There are two main types of railroad crossings namely;

Controlled railroad crossing warning signs.Uncontrolled railroad crossing warning signs.

     A Controlled railroad crossing has signs such as warning signs, red lights and railway gates.

     However, in uncontrolled railroad crossing, the signs don't include any of the ones listed for controlled railroad crossing signs but instead will have no signs, no signals and no gates.

      Looking at the options, A, B and C represent controlled railroad crossing signs and so the correct answer in none represents uncontrolled railroad crossing signs.

Read more about railroad crossings at; https://brainly.com/question/4360017

Aswer asap

Give two importance of hashing

Answers

1. It’s a secure way to receive data.
2. Hashes aren’t used to encrypt any sort of data.

Network in which every computer is capable of playing the role of the client, server or both at the same time is called *


local area network

dedicated server network

peer-to-peer

wide area network

Answers

Answer:

peer to peer

Explanation:

Here, we want to select which of the options best answer the question.

The answer is peer to peer

The peer to peer network configuration is a type in which each computer can work as a client, a server or both

Thus , in a peer to peer network configuration, we can have the computer systems on this network having the possibility of working as either the client, the server or both of them simultaneously

I need help. People who know computer science. I have selected a word from the first 1000 words in my dictionary. Using the binary search algorithm, how many questions do you have to ask me to discover the word I have chosen?
a. 8 b. 10 c. 12 d. 14

Answers

Answer:

14

Explanation:

Identity management programs often implement a _________system that facilitates the management of user accounts.

Answers

Answer:

single sign-on

Explanation:

Identity management programs in computer operation involve an administrative process that is carried out by implementing a SINGLE SIGN-ON system that facilitates the management of user accounts.

The purpose is to identify, validate, and approve an individual or group of people to have permission to various applications, computer systems, or networks by linking user rights and limitations with created identities.

Hence, in this case, the correct answer is SINGLE SIGN-ON


Match the graphic design tool to its purpose/definition.
-Drawing
-Layers
-Magic Wand
-Lasso
a. You can combine several images to
create one image.
b. You can make selections of irregular
shapes.
c. You can draw rectangles, circles,
and other geometric shapes.
d. You can select areas based on
color.

Answers

Answer:

You can combine several images to

create one image.   -------Layers

You can make selections of irregular

shapes.  ----------- Lasso

You can draw rectangles, circles,

and other geometric shapes.-- Drawing

You can select areas based on

color.------Magic Wand

Explanation:

Graphic design software is used to create, edit, and view graphic art. Graphic design software comes in a wide variety of forms, each with a unique set of tools and features.

What graphic design tool, its purpose?

These software programs allow graphic designers to produce, edit, store, and manage their creative output, including pictures, images, videos, presentations, brochures, and other visual forms.

They can be installed to run from a desktop computer or provided as a cloud-based service. Users can format layouts, generate multimedia, stylize or edit photos, and create graphics, depending on the software.

Therefore, You can combine several images to create one image.   -------Layers. You can choose from a variety of strange shapes. —- Lasso. You can draw rectangles, circles, and other geometric shapes.-- Drawing. Furthermore, you can select areas based on color.------Magic Wand.

Learn more about graphic design tool here:

https://brainly.com/question/9105717

#SPJ5

Write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles.

Use the following approximations:

A kilometer represents 1/10,000 of the distance between the North Pole and the equator.
There are 90 degrees, containing 60 minutes of arc each, between the North Pole and the equator.
A nautical mile is 1 minute of an arc.

An example of the program input and output is shown below:

Enter the number of kilometers: 100
The number of nautical miles is 54

Answers

In python:

kilos = int(input("Enter the number of kilometers: "))

print(f"The number of nautical miles is {round(kilos/1.852,2)}")

I hope this helps!

For an input of 100 kilometers, the program displays "The number of nautical miles is 54.00."

To convert kilometers to nautical miles based on the given approximations.

Here are the simple steps to write the code:

1. Define a function called km_to_nautical_miles that takes the number of kilometers as input.

2. Multiply the number of kilometers by the conversion factor [tex](90 / (10000 \times 60))[/tex] to get the equivalent number of nautical miles.

3. Return the calculated value of nautical miles from the function.

4. Prompt the user to enter the number of kilometers they want to convert.

5. Read the user's input and store it in a variable called kilometers.

6. Call the km_to_nautical_miles function, passing the kilometers variable as an argument, to perform the conversion.

7. Store the calculated value of nautical miles in a variable called nautical_miles.

8. Display the result to the user using the print function, formatting the output string as desired.

Now the codes are:

def km_to_nautical_miles(km):

   nautical_miles = (km * 90) / (10000 * 60)

   return nautical_miles

kilometers = float(input("Enter the number of kilometers: "))

nautical_miles = km_to_nautical_miles(kilometers)

print(f"The number of nautical miles is {nautical_miles:.2f}.")

The output of this program is:

The result is displayed to the user as "The number of nautical miles is 54.00."

To learn more about programming visit:

https://brainly.com/question/14368396

#SPJ4

What is a piece of information sent to a function

Answers

Answer:

the information sent to a function is the 'input'.

or maybe not hehe

Write a function that takes as input two parameters: The first parameter is a positive integer representing a base that is guaranteed to be greater than 1. The second parameter is an integer representing a limit. The function should return a list containing all of the non-negative powers of the base less than the limit (not including the limit). The powers should start at base^0=1 and increase from there until the limit. If the limit is less than 1 the functions should just return an empty list

Answers

Answer:

Written in Python:

def powerss(base, limit):

   outputlist = []

   i = 1

   output = base ** i

   while limit >= output:

       outputlist.append(output)

       i = i + 1

       output = base ** i

   return(outputlist)

Explanation:

This declares the function

def powerss(base, limit):

This creates an empty list for the output list

   outputlist = []

This initializes a counter variable i to 1

   i = 0

This calculates base^0

   output = base ** i

The following iteration checks if limit has not be reached

   while limit >= output:

This appends items to the list

       outputlist.append(output)

The counter i is increased here

       i = i + 1

This calculates elements of the list

       output = base ** i

This returns the output list

   return(outputlist)

Which of the following tasks can you perform using a word processor?
insert a bulleted list in a document
check a document for spelling errors
edit a video for inclusion in a document
create an outline of sections to be included in a document
set a password to restrict access to a document

Answers

Create a outline of sections to be included in a document

The following task can you perform using a word processor is creating an outline of sections to be included in a document. The correct option is c.

What is a word processor?

A word processor is a computer program or device that provides for input, editing, formatting, and output of text, often with additional features.

Simply put, the probability is the likelihood that something will occur. When we don't know how an event will turn out, we can discuss the likelihood or likelihood of several outcomes.

Statistics is the study of events that follow a probability distribution. In uniform probability distributions, the chances of each potential result occurring or not occurring are equal.

Therefore, the correct option is c. create an outline of sections to be included in a document.

To learn more about word processors, refer to the link:

https://brainly.com/question/14103516

#SPJ5

Use the drop-down menu to put the four steps of effective time management in order.

1. Complete the
.

2. Make the
.

3. Prioritize the
.

4. Establish the
.

Answers

Answer:

1. Complete the

✔ study-time survey

.

2. Make the

✔ project schedule

.

3. Prioritize the

✔ tasks

.

4. Establish the

✔ award system

.

Explanation:

brainliest please

The drop-down menu shows effective time management by Completing a study-time survey, making a project schedule, prioritizing tasks, and establishing an award system.

What is effective time management?

Time management is a process organizing and managing time by dividing it into various activities and working smarter not harder.

Effective time management is an art as it includes completing study time a survey, making and scheduling the projects on time, prioritizing the tasks and establishing the system.

Find out more information about time management.

brainly.com/question/24662469

What questions would you ask an employer at a job interview?

Answers

Answer:

8 Questions You Should Absolutely Ask An Interviewer

QUESTION #1: What do the day-to-day responsibilities of the role look like? ...

QUESTION #2: What are the company's values? ...

QUESTION #3: What's your favorite part about working at the company? ...

QUESTION #4: What does success look like in this position, and how do you measure it?

Explanation:

I hope this answer is Wright ,So please mark as brainlist answers

A line drawn around the edges of an element, such as a table or a table call​

Answers

Answer:

It is called Borders..can also be drawn around paragraphs and pages..

Language: C
Introduction
For this assignment you will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The cipher you will write will use a pair of numbers corresponding to each letter in the text. The first number denotes the position of a word in the key text (starting at 0), and the second number denotes the position of the letter in the word (also starting at 0). For instance, given the following key text (the numbers correspond to the index of the first word in the line):
[0] 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe;
[13] All mimsy were the borogoves, And the mome raths outgrabe.
[23] "Beware the Jabberwock, my son! The jaws that bite, the claws that catch!
[36] Beware the Jubjub bird, and shun The frumious Bandersnatch!"
[45] He took his vorpal sword in hand: Long time the manxome foe he sought—
The word "computer" can be encoded with the following pairs of numbers:
35,0 catch
5,1 toves
42,3 frumious
48,3 vorpal
22,1 outgrabe
34,3 that
23,5 Beware
7,2 gyre

Answers

The .cpp code is avaiable bellow

Code:

#include <stdio.h>

#include <string.h>

int main()

{

    char **kW;

    char *fN;

    int nW = 0;

    kW = malloc(5000 * sizeof(char*));

    for (int i = 0; i<5000; i++)

    {

         kW[i] = (char *)malloc(15);

    }

    fN = (char*)malloc(25);

    int choice;

    while (1)

    {

         printf("1) File text to use as cipher\n");

         printf("2) Make a cipher with the input text file and save result as output file\n");

         printf("3) Decode existing cipher\n");

         printf("4) Exit.\n");

         printf("Enter choice: ");

         scanf("%d", &choice);

         if (choice == 1)

         {

             nW = readFile(kW, fN);

         }

         else if (choice == 2)

         {

             encode(kW, fN, nW);

         }

         else

         {

             Exit();

         }

         printf("\n");

    }

    return 0;

}

int readFile(char** words, char *fN)

{

    FILE *read;

    printf("Enter the name of a cipher text file:");

    scanf("%s", fN);

    read = fopen(fN, "r");

    if (read == NULL)

    {

         puts("Error: Couldn't open file");

         fN = NULL;

         return;

    }

    char line[1000];

    int word = 0;

    while (fgets(line, sizeof line, read) != NULL)

    {

         int i = 0;

         int j = 0;

         while (line[i] != '\0')

         {

             if (line[i] != ' ')

             {

                  if (line[i] >= 65 && line[i] <= 90)

                  {

                       words[word][j] = line[i]; +32;

                  }

                  else

                  {

                       words[word][j] = line[i];

                  }

                  j++;

             }

             else

             {

                  words[word][j] = '\n';

                  j = 0;

                  word++;

             }

             i++;

         }

         words[word][j] = '\n';

         word++;

    }

    return word;

}

void encode(char** words, char *fN, int nwords)

{

    char line[50];

    char result[100];

    if (strcmp(fN, "") == 0)

    {

         nwords = readFile(words, fN);

    }

    getchar();

    printf("Enter a secret message(and press enter): ");

    gets(line);    

    int i = 0, j = 0;

    int w = 0, k = 0;

    while (line[i] != '\0')

    {        

         if (line[i] >= 65 && line[i] <= 90)

         {

             line[i] = line[i] + 32;

         }

         w = 0;

         int found = 0;

         while (w<nwords)

         {

             j = 0;

             while (words[w][j] != '\0')

             {

                  if (line[i] == words[w][j])

                  {

                       printf("%c -> %d,%d \n", line[i], w, j);

                       found = 1;

                       break;

                  }

                  j++;

             }

             if (found == 1)

                  break;

             w++;

         }

         i++;

    }

    result[k] = '\n';

}

void Exit()

{

    exit(0);

}

A nutritionist who works for a fitness club helps members by evaluating their diets. As part of her evaluation, she asks members for the number of fat grams and carbohydrate grams that they consumed in a day. Then, she calculates the number of calories that result from the fat, using the following formula: calories from fat = fat grams X 9 Next, she calculates the number of calories that result from the carbohydrates, using the following formula: calories from carbs = carb grams X 4 The nutritionist asks you to write a program that will make these calculations.

Answers

In python:

fat = int(input("Enter the # of fat grams: "))

carbs = int(input("Enter the # of carbohydrate grams: "))

print("The calories from fat are {} and the calories from carbs is {}".format(fat * 9, carbs * 4))

hhhhhh You do not need to tell a teacher you have downloaded anything as long as it did not save to your computer.


Please select the best answer from the choices provided

T
F
nyan...

Answers

Answer: F

Explanation: Have a Great Day!

Answer:

MATERWELON

Explanation:

!!General Chromebook Software Question!!

What types of software applications can a chromebook run?

Answers

Answer:

Explanation:

Google???

Answer: are every files compatible with a windows 10 laptop sir

You can use VMware on Chromebooks to run Windows applications, and there's support for Linux software, too. Plus, current models can run Android apps and there are also web apps that are available through Google's Chrome Web Store. Read more: Best laptops, desktops and tablets for designers and creatives in 2020

Write a program that asks for the names of three runners and the time, in minutes, it took each of them to finish a race. The program should display the names of the runners in the order that they finished.

Answers

Answer:

Written in Python

names = []

times = []

for i in range(0,3):

     nname = input("Name "+str(i+1)+": ")

     names.append(nname)

     time = input("Time "+str(i+1)+": ")

     times.append(time)

if times[2]>=times[1] and times[2]>=times[0]:

     print(names[2]+" "+times[2])

     if times[1]>=times[0]:

           print(names[1]+" "+times[1])

           print(names[0]+" "+times[0])

   else:

           print(names[0]+" "+times[0])

           print(names[1]+" "+times[1])

elif times[1]>=times[2] and times[1]>=times[0]:

     print(names[1]+" "+times[1])

     if times[2]>times[0]:

           print(names[2]+" "+times[2])

           print(names[0]+" "+times[0])

     else:

           print(names[0]+" "+times[0])

           print(names[2]+" "+times[2])

else:

     print(names[0]+" "+times[0])

     if times[2]>times[0]:

           print(names[2]+" "+times[2])

           print(names[1]+" "+times[1])

     else:

           print(names[1]+" "+times[1])

           print(names[2]+" "+times[2])

Explanation:

I've added the full source code as an attachment where I used comments to explain difficult lines

Which of the following best describes open-source code software?
O A. a type of software that is open to the public and can be modified
B. a type of software that is free to download, but cannot be modified
C. a type of software that is locked, but can be modified
D. a type of software that has already been modified

Answers

Answer:

A. a type of software that is open to the public and can be modified.

Explanation:

Open-source refers to anything that is released under a license in which the original owner grants others the right to change, use, and distribute the material for any purpose.

Open-source code software is described as a type of software that is open to the public and can be modified. The correct option is A.

What is open-source code?

Open-source software is computer software that is distributed under a licence that allows users to use, study, change, and distribute the software and its source code to anyone and for any purpose.

Open-source software can be created collaboratively and publicly. Open-source refers to anything that is released under a licence that allows others to change, use, and distribute the material for any purpose.

Therefore, open-source code software is defined as software that is freely available to the public and can be modified. A is the correct answer.

To know more about open-source code follow

https://brainly.com/question/15039221

#SPJ6

Assume you are using an array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements, dequeue 5 elements, and then enqueue 1 more element. Which index of the internal array elements holds the value of that last element you enqueued

Answers

Answer:

The answer is "5".

Explanation:

In the queue based-array, it follows the FIFO method, and in the question, it is declared that a queue has a capacity of 10 elements, and insert the 5 elements in the queue and after inserting it enqueue 5 elements and at the last, it inserts an element 1 more element on the queue and indexing of array always start from 0, that's why its last element index value is 5.

What does the measurement tell you?

Schedule performance index

Answers

Answer:

how close the project is to being completed compared to the schedule/ how far ahead or behind schedule the project is, relative to the overall project

Explanation:

HELLLPPPPPP For each of the following discussion questions, write a response in complete sentences. Your response should be at least one paragraph (5 to 7 sentences). Each discussion response is worth a total of 5 points.

What are three ways that you can protect and care for your camera? Why is taking care of your camera important? I got logged out and it didnt save my work and i need to get done with thissssss

Answers

Answer:

Avoid dirt and sand. Use care when cleaning dirt particles and sand from your digital camera. Do not use canned or pressurized air to clean the sand, as you might just drive the particles into the camera case. Budget-priced camera cases might not be sealed perfectly, making it easier for grit and sand to penetrate the case and cause damage. Gently blow out the grit and sand to avoid this problem. Use care when shooting photos on a windy day at the beach, too, where sand can blow with excessive force. Avoid opening the battery compartment on such days.

Avoid liquids. Keep all liquids away from the camera unless you own a model with a waterproof case.

Avoid touching the lens and LCD. Oils from your skin smudge the lens and LCD, eventually causing permanent damage. Clean the lens and LCD with a microfiber cloth when you see a smudge from your fingertips.

The lens and sun don't mix. Do not point your camera's lens directly at the sun for any length of time, especially with a DSLR camera. Sunlight focused through the lens of the camera could damage the image sensor or even start a fire inside the camera.

Use cleaning liquids with care. Avoid using an excessive amount of cleaning liquid with your camera. In fact, other than stubborn smudges, you should be able to clean the camera with a dry microfiber cloth. If a liquid is needed, place a few drops of the liquid on the cloth, rather than directly on the camera.

Vacuum the bag. Dirt and sand inside your camera bag could damage your camera, so vacuum the bag regularly to keep it clean and protect your camera.

Watch the temperature. Although some cameras are designed to survive harsh temperatures, most cameras are not. Do not leave your camera in a sunny vehicle, where temperatures quickly can exceed 100 degrees Fahrenheit. Avoid leaving the camera in direct sunlight, which can damage the plastic. Finally, avoid extreme cold, too, which could damage the LCD.

Use neck straps and wrist loops. Use neck straps and wrist loops with your camera. If you slip while hiking, or if you lose the grip on your camera near the pool, the straps can save your camera from a potentially disastrous fall.

Store camera properly. If you're not going to use your camera for a couple of months, store it in a low humidity area and out of direct sunlight. Additionally, store the camera without the battery inserted to reduce the risk of corrosion.

Explanation:

:)

Write a function add_spaces(s) that takes an arbitrary string s as input and uses a loop to form and return the string formed by adding a space between each pair of adjacent characters in the string. You may assume that s is not empty.

Answers

Solution:

def add_spaces(s):

   result = ""

   for i in range(len(s)-1):

       result += (s[i]+" ")

   result += s[-1]

   return result

# Testing  

print(add_spaces('hello'))

print(add_spaces('hangman'))

print(add_spaces('x'))

And the output will be

hello

hangman

x

Process finished with exit code 0

Write a method called min that takes three integers as parameters and returns the smallest of the three values, such that a call of min(3, -2, 7) would return -2, and a call of min(19, 27, 6) would return 6. Use Math.min to write your solution.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

 System.out.println(min(3, -2, 7));

}

public static int min(int n1, int n2, int n3){

    int smallest = Math.min(Math.min(n1, n2), n3);

    return smallest;

}

}

Explanation:

*The code is in Java.

Create a method named min that takes three parameters, n1, n2, and n3

Inside the method:

Call the method Math.min() to find the smallest among n1 and n2. Then, pass the result of this method to Math.min() again with n3 to find the min among three of them and return it. Note that Math.min() returns the smallest number among two parameters.

In the main:

Call the method with parameters given in the example and print the result

Methods are named program statements that are executed when called/invoked.

The method in Python, where comments are used to explain each line is as follows:

#This defines the method

def mmin(a,b,c):

   #This calculates the smallest of the three values using math.min

   minNum = min(a,b,c)

   #This prints the smallest value

   return minNum

Read more about methods at:

https://brainly.com/question/14284563

Other Questions
19. One of the jobs a paleontologist performs involves articulating thefossil remains of animals that have been extinct for millennia.*A. fitting togetherB. expressingC. clarifying What is the value of x? Teach me why did the preamble to the constitution begin with the phrase we the people What factors made the Industrial Revolution possible around the world? ____ somos maestras 1) nosotros 2) ellas 3) vosotras 4) nosotras Determine the accelerations that result when a 12-N net force is applied to a 3-kg object and then to a 6-kg object. is 42% bigger than 0.44 To produce anenlarged or reducedmeasure youthescale. Why were the Middle Colonies nicknamed "the breadbasket?"A They milled a lot of grainB They had the best bakeries C They had expert basket-weavers D They consumed the least bread Why is culture sharing important for young learners? Hypnotized by the twirling necklace held in her mother's hand, Becks was transported to another era. She imagined that she could see herself in the 1920s, the period in which the necklace was made. As the necklace danced in front of her, Becks could see what that time would have been like. The women were dressed in fringed dresses and their hair was swept up on one side. The men were wearing pinstriped suits with their hair slicked back. They were all dancing and laughing in a cramped dance room. This is all Becks saw as she gazed intently at the spinning necklace.From which point of view is this passage written?A. The point of view shifts from the third person to the second person. B. first person C. second-person D. third person Does someone know this. (1.2)^2 = 1.44True or False Can someone help me with this question Choose 3 answers there a pictures by the wayYou While on vcacation, kevin and his family visit mount rushmore in south dakota. They watcha movie in the vistor center for 1/2 of an hour. This accounta for 1/4 og the toatl time the spend at mount rushmore. What equation can you use to find the total amount of time t kevin's family spends at mount rushmore 1. PART A: Which of the following best identifies a central idea of this article? A. Inventions are often unpopular before they are improved upon. B. Communication changes as technology advances and improves. C. Technology will keep changing until someone gets it right. D. Bell invented the first means of quickly sending messages to another person. Approximately how many cases of Salmonella poisoning are reported each year to the CDC? Identify the process in which the cell strives to maintain dynamic equilibrium:homeostasisturgor pressurecytolysisplasmolysis You will complete an Informational Research Chart for a problem/solution article by gathering information on an everyday monster.Select the Informational Research Chart.Important: Immediately save the worksheet to your computer or drive.Select one everyday monster to research. You may choose from the vulture, the Komodo dragon, or the jellyfish.Begin your research by using the source provided for your everyday monster.Vulture sourceKomodo Dragon sourceJellyfish source(Optional step) Locate a second online or printed source if you need additional information.Fill out information in each box of your Informational Research Chart.Save your work to your computer or drive.Submit your work in 02.04 Researching and Organizing Information.If you cannot save your worksheet, you can type the information into a document and submit.