Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following algorithm. There is no need to create a class similar to how Java works.

3.1. User enters the first number.
3.2. User enters the second number.
3.3. If the first number is less than, greater than, or equal the second number, a message is displayed.

Please Help me. Thank You!
Marry Christmas!​

Answers

Answer 1

x = int(input("Enter first number\n"))

y = int(input("Enter second number\n"))

if x > y:

   print(x, "is greater than", y)

elif x < y:

   print(x, "is less than", y)

else:

   print(x, "is equal to", y)

i'm not the greatest coder, but it works :)


Related Questions

Please debbug this code for me

public class SavingAccount { // interest rate for all accounts private static double annualInterestRate = 0; private final double savingsBalance; // balance for currrent account // constructor, creates a new account with the specified balance public void SavingAccount( double savingsBalance ) { savingsBalance = savingsBalance; } // end constructor // get monthly interest public void calculateMonthlyInterest() { savingsBalance += savingsBalance * ( annualInterestRate / 12.0 ); } // end method calculateMonthlyInterest // modify interest rate public static void modifyInterestRate( double newRate ) { annualInterestRate = ( newRate >= 0 && newRate <= 1.0 ) ? newRate : 0.04; } // end method modifyInterestRate // get string representation of SavingAccount public String toString() { return String.format( "$%.2f", savingsBalance ); } // end method toSavingAccountString } // end class SavingAccount

Answers

Answer:

/

Explanation:

The internet advertisement below is known as a __________. CSS tag web banner title sequence hotspot

Answers

The internet advertisement that is illustrated in the image attached below is known as a: B. web banner.

An internet advertisement can be defined as a promotional multimedia message (information) that is designed and developed with the intention to make products or services that are offered by a business firm to become known and familiar to all of its customers and potential customers over the Internet.

Generally, there are various techniques used by web developers for internet advertisements and these include:

CSS tagTitle sequenceHotspotWeb banner

A web banner is a form of advertising which embeds an advertisement that is delivered by a web server into a webpage over the Internet or the World Wide Web (www).

In conclusion, the internet advertisement that is illustrated in the image attached below is known as a web banner.

Read more on web banner here: https://brainly.com/question/10196860

A new printer has recently been installed in the office, but it does not print. What is the first source to check for information about the problem? *

The manufacturer's website
Tech support forums
The OS website
POST card

Answers

Hi hi hi hi hi hi hi hi hi

Internet privacy refers to the level of information sharing on the web collected through web cookies, caches, and browsing history true or false

Answers

The level of information sharing on the web that are mainly collected through web cookies, caches, and browsing history of a web browser is referred to as Internet privacy: True.

A web browser can be defined as a software program that is typically designed and developed for viewing a HTML document or browsing the Internet.

An Internet privacy refers to the level of privacy protection an end user has while browsing the Internet, especially with reference to the vast range of protocols, technologies, and frameworks (concepts) that are deployed.

This ultimately implies that, Internet privacy relates to the level of information sharing on the web that are mainly collected on a web browser through the following means:

Web cookiesCachesBrowsing history

Read more: https://brainly.com/question/3840341

how many MB are there in 1000 KB?

Answers

Answer:

1 megabyte

Explanation:

Ok so there should be 1

1. Import it into Eclipse. Open the file in Eclipse 2. Edit the file to add comments to identify the instance variables, constructors headings and method headings 3. Edit the file to build and add the UML in the Header comment of the code. You must do a very thorough job and be sure to pay attention to the details. 4. Save your Flower.java file. 5. Upload your updated Flower.java file here.package during_class_session;public class Flower{private String NameofFlower;private double PriceofFlower;public Flower() {this.setNameofFlower("No name yet");this.setPriceofFlower(0.0);}public Flower(String nameofFlower_initial, double priceofFlower_initial) {this.setNameofFlower(nameofFlower_initial);this.setPriceofFlower(priceofFlower_initial);}public String getNameofFlower() {return NameofFlower;}public void setNameofFlower(String nameofFlower) {NameofFlower = nameofFlower;}public double getPriceofFlower() {return PriceofFlower;}public void setPriceofFlower(double priceofFlower) {PriceofFlower = priceofFlower;}}

Answers

Answer:

/

Explanation:

what is office course
how to learn office course

Answers

Answer:

It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .

Hope this helps you XD ✌️

Yvonne is matting a series of photos as an anniversary gift for her parents. She hopes that they will cherish this gift for years to come but is concerned because she can’t afford the really nice mat board. What is Yvonne MOST LIKELY worried about?

A.
that the mat will turn black

B.
that the mat will take over the picture

C.
that the mat will disintegrate

D.
that the mat will discolor and deteriorate

Answers

Answer:

That the mat will discolor and deteriorate

Explanation:

D

Yvonne will most likely worry that the mat will discolor and deteriorate. The correct option is D.

What is matting in photos?

Matting is a decorative border that surrounds the artwork. It is typically built of mat board, a type of board designed specifically for this purpose. After cutting the mat board to size, one or more holes (entries) are cut in the mat board to act as windows for displaying art.

Matting is the technique of separating an image's foreground and background components. Typically, the photos are of a frame or a video file. It adds a decorative edge to the print and a mechanism for hanging the photo.

Matting involves using a front or window mat to separate the image from the frame's glass and to give an extra border around the photo.

Therefore, the correct option is D. that the mat will discolor and deteriorate.

To learn more about matting in photos, refer to the link:

https://brainly.com/question/28279935

#SPJ2

Complete the sentence based on the given information.

______ are responsible for analyzing the client business model, whereas _____ are responsible for identifying errors in the software product to confirm that it meets the client model.

Answers

Answer:

blank answer so brainly doesnt delete your question.

Explanation:

13) You notice that the row labels in your spreadsheet are 1, 2, 3, 8, 9.
Row labels 4 through 7 are missing. What could cause this?

Answers

Possible reasons for missing out row 4 to 7 are as follows,

Chance of rows from 4 to 7 contain incorrect/ non formatted data.Chance of rows from 4 to 7 are in hidden state.Chance of rows from 4 to 7 are assigned to some other user which does not belongs to your current user.Chance of rows from 4 to 7 were deleted from the sheet.

These are all the possible reasons for missing of row 4 to 7.

Learn more:  https://brainly.com/question/24504878

Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software development methodology is used by the Game Changer teams

Answers

The software development methodology used by the Game Changer teams is called; Prototyping

We are given that;

- Game changer technologies has four software teams

- Each of the teams develops 4 different examples of the new game app.

Now, since each of them is developing four four different examples of its new game app, the method being used is called prototyping. This is because prototyping is referred to as the early approximation of the final system of a product whereby such a product is built, tested and rebuilt if required until an acceptable prototype is achieved.

When the acceptable prototype is gotten, then it will be used to develop its final game app.

Read more about prototype at; https://brainly.com/question/25824140

in which country was Abacus build
if ur smart don't searh​

Answers

Answer:

Abacus many be built first in China

Explanation:

I know Abacus ^o^

Answer:

Hewo There!!!!

__________________

China- i thinkkk maybe?

__________________

“Hold fast to dreams,

For if dreams die

Life is a broken-winged bird,

That cannot fly.”

― Langston Hughes

__________________

Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn

Tim Berners-Lee cultivated a way to interconnect and self-index data. He made a major contribution to the development of the Internet by creating _____.
A. graphic data
B. emoticons
C. the hyperlink
D. digital data

Answers

Answer: D. Digital data

displaying advertisements specific or users internet based on their buy preference is called ._________.​

Answers

Targeted advertising       hope it helps

RAM or RIM is correct?

Answers

RAM is the correct answer

employees information system source code ..please ​

Answers

Answer:

def greetuser(username)

What was the main limitation of computer networking that the invention of the Robert website of the 1990s

Answers

Answer:

The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another.

x = 9 % 2

if (x == 1):
  print ("ONE")
else:
  print ("TWO")

Answers

The output will be : ONE

Answer:

Hewo There!!

_______________________

Simplify  9 %  ⋅  2 .

x = 0.18

_______________________

“One’s life has value so long as one attributes value to the life of others, by means of love, friendship, indignation and compassion.” — Simone De Beauvoir

_______________________

Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn

Complete the statement using the correct term.
The [blank] of the site is what will be displayed on the web page.

answer is Body

Answers

The BODY of the site is what will be displayed on the web page. It contains most of the distinctive content of the web page.

A web page refers to a document exhibited by the browser, which is generally written in the HTML language.

The body of a web page is a big area in the center that contains the most important and distinctive content of a web page.

The body will determine the central content of the HTML document, which will be observable on the web page (e.g., a photo gallery).

Learn more about a web page here:

https://brainly.com/question/16515023

What is property in educational technology

Answers

1. It is based on scientific and technological advancements.
2. It is more a practical discipline and less a theoretical one.
3. It is a fast growing modern discipline.
4. It makes use of the research findings of psychology, sociology, engineering, sciences and social psychology etc., and applies the same to the field of education.
5. It brings pupils, teachers and technical means together in an effective way.
6. It is the science of techniques and methods. It locates the problems in the field of education, remedies them and ultimately aims at improving the education system.
7. It is bound to improve the teacher, the learner and the teaching learning process.

"""
Multiply.py - This program prints the numbers 0 through 10 along
with these values multiplied by 2 and by 10.
Input: None.
Output: Prints the numbers 0 through 10 along with their values multiplied by
2 and by 10.
"""
head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.
print("0 through 10 multiplied by 2 and by 10" + "\n")
# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
print(head1 + str(numberCounter))
print(head2 + str(byTwo))
print(head3 + str(byTen))
# Next number.
Summary
In this lab, you use a counter-controlled while loop in a Python program. When completed, the program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. The data file contains the necessary variable declarations and output statements.
Instructions
Make sure the file Multiply.py is selected and opened.
Write a counter-controlled while loop that uses the loop control variable (numberCounter) to take on the values 0 through 10.
In the body of the loop, multiply the value of the loop control variable by 2 and by 10. Remember to change the value of the loop control variable in the body of the loop.
Execute the program by clicking the "Run Code" button at the bottom of the screen.

Answers


head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.

print("0 through 10 multiplied by 2 and by 10" + "\n")

# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
x = 0
while(x<11):
print(head1 + str(x))
print(head2 + str(x*2))
print(head3 + str(x*10))
x += 1
# Next number.

A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network

Answers

The tool that the technician should use is TRACERT. It is a network diagnostic command for tracing the path of an Internet Protocol packet to its corresponding destination.

The Internet Protocol is the network protocol on the Internet, which is used for relaying data across network boundaries.

TRACERT is a network diagnostic command used to trace the path of an Internet Protocol packet to its corresponding destination.

This tool (TRACERT) is useful for defining response delays and routing loops in a network pathway across different nodes.

Learn more about TRACERT here:

https://brainly.com/question/5699061

What is it called when a unique letter is assigned to a shared drive

Answers

Answer:

Assigning a drive letter to a network drive is called mapping the drive, or linking the drive, by network nerds.

Explanation:

You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store. This would be an example of a(n):

Answers

Shoplifting! Did he pay for those?!?!

The given situation is an example of shoplifting.

What is hardware?

All the mechanical components made of simply plastic or metal used in houses or industries are termed as hardware.

You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store.

This gives an idea of the shoplifting, as he hold the account with them. He doesn't need to pay every time he buys anything.

This, this would be an example of shoplifting.

Learn more about hardware.

https://brainly.com/question/15232088

#SPJ2

how to set brainlyest

Answers

Yeah he or she is right

Filtering is a function of _____.

Answers

The answer is: switches.

Explanation:

Filtering is a function of switches.

A Product Manager has been given responsibility for overseeing the development of a new software application that will be deployed to a group of Accenture clients.

What would be the most time-saving and cost-effective way for the Product Manager to address the new application’s security considerations?


Utilize a DevSecOps approach to incorporate security into the development process from the beginning.


Schedule development of security features after the application’s initial release.


Design the application’s security features after the application’s initial build is complete.


Contract with an external vendor to develop a security solution separately from the main application.


I don't know this yet.

Answers

There are different software that has been developed today. The most time-saving and cost-effective way is to Design the application’s security features after the application’s initial build is complete.

Accenture is known for their work in improving business needs. They are constantly shifting to a new method of delivering information technology.

They are known to embed security into the product development life cycle helps secure the business and also keeping speed and assisting to remove friction.

Learn more about Accenture from

https://brainly.com/question/25737623

Every device connected to the public Internet is assigned a unique number known as: a. an Internet Protocol (IP) addres

Answers

Answer:

yes

Explanation:

its the number used to identify the devise connected to the internet

Explain if a company is responsible for using computer components manufactured using fair trade practices. [9 marks]

Answers

Answer:

Fair trade practices aims at promoting the fair relationships between the buyers and producers. It is a kind of a social movement that makes the producers to provide the better conditions and humane working environment in case of developing countries.

• It also favors and supports the proper and substantial payment to the manufacturers and wages to the labors.

• It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.

Explanation:

can you mark me as brainlist

Answer:

It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.

Why linked list is better than an array?

Answers

In conclusion there are many different data structures. Each data structure has strengths and weaknesses which affect performance depending on the task. Today, we explored two data structures: arrays and linked lists. Arrays allow random access and require less memory per element (do not need space for pointers) while lacking efficiency for insertion/deletion operations and memory allocation. On the contrary, linked lists are dynamic and have faster insertion/deletion time complexities. However, linked list have a slower search time and pointers require additional memory per element in the list. Figure 10 below summarizes the strength and weakness of arrays and linked lists.
Other Questions
What are the gas laws? (Include Boyle's law, charles's law, gay lussac's law, an avogadro's law) Could someone please summarize these for me ples? Brainliest answer also yes why did the pilgrims start with two ships and come back with one Hi! I'm looking for some proficient actually (accurate) responses. depending on the responses ill probably give brainliest to the most accurate one. What does eight divided by 4/5 equal Who was William Harvey and what were his accomplishments and contributions solve for x & yplease and thank you [tex]3^{2x+1} -4.9^{x} =-9[/tex] Please answer my question 5. What are the slope and y-intercept of the graph of y= 30 + 5? Ben has agreed to play fewer video games and spend more time studying. He has agreed to play less than 10 hours of video games each week. On Monday through Thursday, he plays video games for a total of 5 1/2 hours. For the remaining 3 days, he plays video games for the same amount of time each day. Ben plays less than ____ hood of veido games each of the three days ? sign of \dfrac{23}{45} + \left(-\dfrac{23}{45}\right) 4523 +( 4523 )start fraction, 23, divided by, 45, end fraction, plus, left parenthesis, minus, start fraction, 23, divided by, 45, end fraction, right parenthesis PLS ANSWER, ALL THE QUESTIONS IN THE PICTURE. ITS DUE SOON PLS HELP, SHOW WHO U SET UP EACH PROBLEM . please help i only have a few minutes!! what are the measures of 1 and 2? The average diameter of a red blood cell is 0.000007m. calculate the radius. (Use formula: Radius= Diameter/2) Thank you in advance:)) 4000 families were randomly selected for a survey. 50% of them read the newspaper in nepali language, 45% read it in English language and 25% read in neither of these languages. How many families read the newspaper in both the languages? Also find the number of families who read exactly one of these papers. I have an Energy and temperature activity and I have questions to answerI do not understand this question:"Within a 24-hour period, at what three points should the temperature be taken? Why?"Can somebody help me!!! Who is Abraham? William's friend William's parrot William's boss. Write the missing volues to make these equivalent fractions correct.2/3 = 4/ = /12 Which of the following equations has no solution? 3x + 1 = 3x + 13x+1= 3x + 2 3x+1= 2x + 1 What process primes a molecule to change in a way that increases its activity, produces motion, or does work