Excel is probably the most popular spreadsheet software for pcs. why? what can we do with this package that makes it so attractive for modeling efforts?

Answers

Answer 1

Excel is probably the most popular spreadsheet software for pcs because excel has an auto-fill feature that allows users to cleverly drag and extend the selection box, filling the columns and rows.

What is Microsoft Excel?Microsoft Excel is a spreadsheet that is available for Windows, macOS, Android, and iOS. It includes calculators, graphing tools, pivot tables, and the Visual Basic for Applications macro programming language (VBA). Excel exists part of the Microsoft Office program suite. Spreadsheets, such as Microsoft Excel, use a grid of cells arranged in numbered rows and letter-named columns to manage data manipulations such as arithmetic operations. It includes a number of built-in features to address financial, technical, and statistical needs. It also has a limited three-dimensional graphical display and can display data as line graphs, histograms, and charts. Data can be divided into sections to show how various factors affect it from various perspectives.Excel is probably the most popular spreadsheet software for pcs because excel has an auto-fill feature that allows users to cleverly drag and extend the selection box, filling the columns and rows.

To learn more about Microsoft Excel, refer to:

https://brainly.com/question/25863198

#SPJ4


Related Questions

Is there any answer key to this??? ANSWER ASAP
Nobody posts questions like these

Is there any answer key to this??? ANSWER ASAPNobody posts questions like these

Answers

Answer:

nah ion think so

Explanation:

how are newsgroup different from email​

Answers

Answer:

Newsgroups (Usenet) are more like a forum, with all posts being public (some are moderated and/or closed groups). email is personal, to one person or a mailing list.

Explanation:


4. Give four reasons why a laptop computer is more expensive than a desktop computer of the
same specifications.

Answers

ANSWER:The main reason why laptops are more expensive than desktops is in the development costs to create hardware that is compact enough and at the same time meeting an expected level of performance.

And it’s not just performance that is a big challenge. It is also keeping the system cool enough that stability is maintained under most common usage conditions

One of the Internet's most popular services
a TCP/IP
b Internet
c World Wide Web (Web)
d Packet Switching

Answers

The Internet's most popular service is the c World Wide Web (Web).

The World Wide Web (Web) is the most commonly used service on the internet. It is a platform for exchanging information and communicating with others from across the globe. The World Wide Web is a collection of linked documents and resources that are accessed using the internet.The World Wide Web consists of numerous resources that are accessible via URLs. Websites are used to publish and share information with others. Users can search for information using search engines and find information on a wide range of topics.

Packet switching is a way of sending data across the internet. It is a technique for transmitting information across a network using packets. Packets are small units of data that are transmitted across the network to their destination. Packet switching is used by the Internet and other computer networks to transmit data efficiently. Packet switching involves breaking down the data into packets and sending them to their destination, where they are reassembled. So the answer is c World Wide Web (Web).

Learn more about World Wide Web: https://brainly.com/question/13211964

#SPJ11

Identify and explain the major computer programming milestones that occurred in 1801, 1840, 1937, and 1983. Use details to support your answer.

Answers

While working on the Analytical Engine in 1883, Ada Lovelace & Charles Babbage created the first programming language.

Why do people program computers?

Writing code to support certain activities in a computer, application, or software program and giving them instructions on how to do is known as computer programming.

Is a profession in computer programming a worthwhile one?

The US Bureau of Labor Statistics projects a 10% reduction in computer programmer employment between 2021 and 2031. Despite this drop, they predict that 9,600 new positions for computer programmers will open up annually as a result of individuals who will change careers or retire.

To know more about computer programming visit:

https://brainly.com/question/14618533

#SPJ1

Please help me with these short questions >..

Please help me with these short questions >..

Answers

Answer:

bmjcmbbobnkpkkjkbk

Explanation:

vuvkopbbkvkhovjlplbkp

Please help me with these short questions >..

N Sistema tecnológico es: * A). Es un sistema que se usa solo en computadoras B) Es todo lo referente a tecnología como computadoras y celulares C) Es un conjunto de elementos y procesos que interactúan entre sí, para lograr la fabricación de un producto o servicios y que a su vez satisface necesidades sociales. D )Elaborar un producto con materiales Resistentes para las personas.

Answers

Answer:

C) Es un conjunto de elementos y procesos que interactúan entre sí, para lograr la fabricación de un producto o servicios y que a su vez satisface necesidades sociales.

Explanation:

Un sistema tecnológico se define como un conjunto de elementos y procesos que interactúan entre sí, para lograr la fabricación de un producto o servicio y que a su vez satisface necesidades sociales.

Por lo tanto, todos los dispositivos y máquinas que utilizamos para lograr varios fines pueden clasificarse como dispositivos tecnológicos.

Por ejemplo, un teléfono inteligente es un ejemplo típico de un sistema tecnológico.

Answer:

c

Explanation:

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

when discussing ethernet standards, what does the xbasey terminology refer to? a. the length or type of cabling, the transmission speed, and the type of transmissions b. the transmission speed, the length or type of cabling, and the type of transmissions c. the length or type of cabling, the type of transmissions, and the transmission speed d. the transmission speed, the type of transmissions, and the length or type of cabling

Answers

When discussing Ethernet standards, the xBASEy terminology refers to b. the transmission speed, the length or type of cabling, and the type of transmissions.

Ethernet is a network protocol that is commonly used for LANs (Local Area Networks). It uses a wired connection to connect devices to a network. The main objective of Ethernet is to facilitate communication between different devices on a network.

The ethernet standards are a set of rules and specifications for implementing Ethernet networking solutions. These standards specify the data transmission speed, cabling, and type of transmission. Ethernet standards are denoted using the xBasey terminology. Here, x is the data transmission speed in Mbps (megabits per second), and y represents the type of transmission and the length or type of cabling used. Therefore, the correct option is B

Know more about Ethernet here :

https://brainly.com/question/1637942

#SPJ11

Jeson will download a file of 10 MB, he has internet plans of 10 Mbps speed. How much total time does Jeson require to download his 10 MB file in his computer, explain your answer.

Answers

Answer:

8 seconds

Explanation:

8 Mbps (Megabit / sec) = 1 MBps (Megabyte / sec)

Therefore 10 Mbps = 1.25 MBps

Now divide the file 10MB by his download speed of 10Mbps (which is 1.25 MBps) and you can get 8 seconds.

Answer:

8 seconds

Explanation:

8 Mbps (Megabit / sec) = 1 MBps (Megabyte / sec)

Therefore 10 Mbps = 1.25 MBps

Now divide the file 10MB by his download speed of 10Mbps (which is 1.25 MBps) and you can get 8 seconds.

11.6% complete question an attacker escalated privileges to a local administrator and used code refactoring to evade antivirus detection. the attacker then allowed one process to attach to another and forced the operating system to load a malicious binary package. what did the attacker successfully perform?

Answers

The attacker successfully performed a privilege escalation attack, code refactoring to evade antivirus detection, process attachment, and binary package exploitation, which resulted in the execution of a malicious payload on the target system.

What does detection mean?

Detection refers to the process of discovering or identifying something that is hidden or difficult to find, often through the use of specialized tools or techniques. In the context of cybersecurity, detection refers to identifying and analyzing potential security threats, such as malware or unauthorized access attempts, before they can cause significant harm to a computer system or network.


The attacker successfully performed privilege escalation, code refactoring, antivirus evasion, process injection, and binary planting. By escalating privileges to a local administrator, the attacker gained higher-level access to the system. Using code refactoring, the attacker altered the code to avoid detection by antivirus software. Then, by allowing one process to attach to another, the attacker performed process injection, which is the act of injecting malicious code into a running process. Finally, the attacker forced the operating system to load a malicious binary package, which is known as binary planting or DLL hijacking.


To know more about cybersecurity visit:
https://brainly.com/question/30162937
#SPJ1

Computerized machines have taken the place of most __________.
A.
teachers
B.
IT specialists
C.
order clerks
D.
graphic designers

Answers

Answer:

B??

Explanation:

I feel like B. is the correct answer.

If i'm wrong plz let me know :>

Answer:

B

Explanation:

how will search engines deal with a poor site structure? The search engines will rearrange the poor site structure into a better structure,
The search engines will not recommend the site to other users.
The search engines will dig deeper until they understand the site structure.
The search engines will continue coming back to the site in the event the site structure is fixed.

Answers

Search engines play a crucial role in determining whether your site is accessible to users, and they have specific criteria for ranking websites.

Poor site structure impacts search engines by making it difficult to navigate and search engine spiders to crawl and index the website. Search engines respond to poor site structure in several ways.

They are as follows:

1. The search engines will not recommend the site to other users.

If the site structure is terrible, search engines will not suggest it to users searching for related content.

This means that the website will have less traffic and may result in a loss of revenue.

2. The search engines will dig deeper until they understand the site structure.

Poor site structure makes it difficult for search engines to understand how the pages on the site relate to one another.

Search engines will try to crawl the website, but it may take them longer to find the content they're looking for.

3. The search engines will rearrange the poor site structure into a better structure.

Search engines are always looking for ways to enhance the user experience, and they will alter the site structure if it improves the user's experience.

4. The search engines will continue coming back to the site in the event the site structure is fixed. Once search engines have crawled your site, they will continue to return and update their index if changes are made to the site structure.

This means that if you improve your site structure, your website's search engine ranking may improve, resulting in increased traffic and revenue.

Know more about Search engines here:

https://brainly.com/question/512733

#SPJ11

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

How would you feel if the next version of windows become SaaS, and why

Answers

Any transition to a SaaS model would require careful consideration and addressing of these concerns to ensure it meets the diverse needs and expectations of Windows users.

I would have mixed feelings if the next version of Windows becomes a Software-as-a-Service (SaaS). While it can bring benefits such as regular updates and improved security, it also raises concerns about ongoing costs and potential loss of control over the operating system.

Transitioning Windows into a SaaS model would mean that instead of purchasing a one-time license for the operating system, users would pay a recurring subscription fee to access and use Windows. This approach offers some advantages. **Regular updates** would ensure users have the latest features and security patches, reducing the risk of vulnerabilities. Additionally, **compatibility** could be improved as developers could target a single version of the operating system, leading to a more streamlined experience.

However, there are also valid concerns associated with a SaaS model for Windows. One major consideration is the **cost**. While a subscription model may be suitable for some users, it may not be affordable or desirable for others, particularly those who prefer a one-time payment. Additionally, relying on a SaaS model could result in a loss of **control** for users. With a traditional Windows license, users have more autonomy over when and how they update their operating system. With a SaaS model, updates may be mandatory and potentially disruptive.

Furthermore, there are potential **privacy** and **data security** concerns with a SaaS-based Windows. Users might worry about their data being stored in the cloud or the need for an internet connection to access their operating system. These concerns would need to be addressed to ensure user trust and confidence.

In conclusion, while a SaaS version of Windows has its benefits in terms of regular updates and improved compatibility, the shift raises concerns about cost, loss of control, privacy, and data security. Any transition to a SaaS model would require careful consideration and addressing of these concerns to ensure it meets the diverse needs and expectations of Windows users.

Learn more about SaaS model here

https://brainly.com/question/31441174

#SPJ11

How do you use the find command to add read permission for the group and others to all regular files containing the string cat in file directory, the home directory, and all sub-directories below it?

Answers

To add read permission for the group and others to all regular files containing the string "cat" in the file directory, home directory, and its sub-directories, you can use the find command with the -type f and -exec options:

find /home -type f -name "*cat*" -exec chmod go+r {} \;

How does   this work?

This   command searches for regular files (-type f) withnames containing the string "cat" (-name "*cat*") in the /home directory and its sub-directories.

The -exec option executes the  chmod command to add read permission for the group and others (go+r) to   each found file.

Learn  more about command  at:

https://brainly.com/question/25808182

#SPJ4

College is considered _____ education. Please type the correct answer in the following input field, and then select the submit answer button or press the enter key when finished.

Answers

Answer:

Postsecondary education 

Explanation:

How are desktop and mobile operating systems similar?

Answers

Answer:

An operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it. False. Caps Lock is a toggle key. your welcome

Why do cooler substances have a tendency to sink?

Answers

Answer:

Explanation:

the molecules to slow down and they get closer to together.

:)

Convection

Convection happens in fluids (liquids & gases). The heat energy moves through the material as the particles in the material move through the material.

Hot liquids and gases rise because when they are heated they expand and become less dense. The less dense warm liquid or gas then floats up through the more dense cold liquids and gases.

Cold liquids and gases sink because when cooled they contract and become more dense. The more dense cold liquids and gases sink down through the less dense warm liquids and gases.

These changes in density cause the convection currents in the liquid or gas.
Why do cooler substances have a tendency to sink?

Customer Service. Is an organization's ability to _______ customers

Answers

Answer:

Serve

Explanation:

Customer Service

Answer:

At its most basic level, customer service is an organization's ability to supply their customers' wants and needs. But this definition leaves out the transactional nature of customer service, and it's this transactional aspect that drives customer loyalty.

Explanation: Hope this helps!

which invention allowed computers to become smaller in size?

Answers

computers got smaller because one of its main components the valve – was replaced by the much smaller transistor.

The invention that allowed computers to become smaller in size is the integrated circuit (IC) or microchip.

Before the development of integrated circuits, computers relied on individual transistors, resistors, and capacitors that were large and bulky. The invention of the integrated circuit in the late 1950s and its subsequent refinement made it possible to integrate multiple electronic components onto a single chip.

An integrated circuit is a small semiconductor device that contains a complex network of electronic components, such as transistors, diodes, and resistors, all etched onto a single piece of semiconductor material.

Today, advancements in integrated circuit technology, such as the development of microprocessors and System-on-Chip (SoC) designs, continue to drive the miniaturization of computers, enabling the creation of increasingly smaller and more powerful devices.

Learn more about Generation of Computer here:

https://brainly.com/question/30719841

#SPJ6

Explain the reason why you may categorize Oracle, a database management system as either an operating system, application program or middleware

Answers

Oracle, a database management system (DBMS), can be categorized as an application program and middleware, but not as an operating system.

Application Program: Oracle DBMS is primarily designed to manage and store data. It provides a set of software tools and services that allow users to create, organize, and retrieve data efficiently. It enables users to perform various database-related tasks, such as creating tables, executing queries, and managing data integrity. As an application program, Oracle serves as a software solution that runs on top of an operating system, providing specific functionality for database management.Middleware: Oracle DBMS can also be considered middleware because it acts as an intermediary layer between the operating system and applications.

learn  more about database here :

https://brainly.com/question/30163202

#SPJ11

Define bit, nibble, byte, binary

Answers

Answer: , a group of 4 bits is called a nibble

Explanation:

To include a table into a document, a user will need to navigate to the _____
tab.

Answers

Answer:

Insert Tab

Explanation: Hope this helps you :D

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

an independent path of execution, running concurrently (as it appears) with others within a shared memory space is:

Answers

An independent path of execution, running concurrently with others within a shared memory space, is referred to as a "thread."

A thread is a unit of execution within a process that enables concurrent execution of multiple tasks or operations. Threads share the same memory space, allowing them to access and modify shared data, variables, and resources. Each thread has its own program counter, stack, and execution context, which gives it the appearance of running concurrently with other threads. Threads are commonly used in multi-threaded programming to achieve parallelism and improve the performance and responsiveness of applications. By dividing a task into multiple threads, different parts of the task can be executed simultaneously, taking advantage of multi-core processors and maximizing system resources.

Threads can communicate and synchronize with each other through mechanisms such as locks, semaphores, and message passing to ensure proper coordination and avoid conflicts when accessing shared resources. Overall, threads provide a powerful means of achieving concurrency and parallelism in software development, allowing efficient utilization of system resources and enabling more responsive and scalable applications.

Learn more about  operations here: https://brainly.com/question/30415374

#SPJ11

Solve the following recurrence relations. Show your work.
(a) g0= 3, g1 = 6 and gn= gn-1 + 6gn-2 for n ≥2.
(b) g0= 0, g1 = 1, g2 = 2 and gn= 3gn-1 −4gn-3 for
n ≥3.
(c) g0= −11/8, g1 = 25/8, and gn= 6gn-2 −gn-1 + 2n
for n ≥2.

Answers

(a) The characteristic equation is r^2 - r - 6 = 0, which factors as (r - 3)(r + 2) = 0. Therefore, the general solution to the recurrence relation is gn = c1(3^n) + c2((-2)^n) for some constants c1 and c2. Using the initial values, we can solve for c1 and c2 to get the specific solution gn = (3^n)/5 + (2^n)/5.

(b) The characteristic equation is r^3 - 3r^2 + 4 = 0, which has one real root r = 1 and a pair of complex conjugate roots. Therefore, the general solution to the recurrence relation is gn = c1 + c2(1^n) + c3(r^n) + c4(conj(r)^n) for some constants c1, c2, c3, and c4. Using the initial values, we can solve for c1, c2, c3, and c4 to get the specific solution gn = (3/2)(n^2) - (3/2)n + 1.

(c) The characteristic equation is r^2 - 6r + 1 = 0, which has roots r = 3 + 2sqrt(2) and r = 3 - 2sqrt(2). Therefore, the general solution to the recurrence relation is gn = c1((3 + 2sqrt(2))^n) + c2((3 - 2sqrt(2))^n) for some constants c1 and c2. Using the initial values, we can solve for c1 and c2 to get the specific solution gn = [(3 + 2sqrt(2))^n - (3 - 2sqrt(2))^n]/(4sqrt(2)) - (n^2)/2 - (3n)/8 - (3/16).

Recurrence relations are equations that define a sequence of values recursively in terms of one or more of the previous values in the sequence. To solve a recurrence relation, we need to find a formula that expresses the nth term of the sequence in terms of n and the initial values of the sequence. This can be done by finding the characteristic equation, which is the equation obtained by replacing gn with r^n and solving for r. The roots of the characteristic equation can then be used to find the general solution to the recurrence relation, which is a formula that expresses gn in terms of n and the initial values. Finally, the specific solution can be obtained by using the initial values to solve for the constants in the general solution.

Learn more about recurrence relation: https://brainly.com/question/31384990

#SPJ11

Which CPU characteristic when enabled, doubles the number
of instructions which can be processed at once?

Answers

Answer:

A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s. Traditionally, the term “CPU” refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.

The form, design and implementation of CPUs have changed over the course of their history, but their fundamental operation remains almost unchanged. Principal components of a CPU include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that fetches instructions from memory and “executes” them by directing the coordinated operations of the ALU, registers and other components.

Most modern CPUs are microprocessors, meaning they are contained on a single integrated circuit (IC) chip. An IC that contains a CPU may also contain memory, peripheral interfaces, and other components of a computer; such integrated devices are variously calledmicrocontrollers or systems on a chip (SoC). Some computers employ a multi-core processor, which is a single chip containing two or more CPUs called “cores”; in that context, single chips are sometimes referred to as “sockets”. Array processors or vector processors have multiple processors that operate in parallel, with no unit considered central.

Write a program that prompts the user to enter two characters and displays the major and status represented in the characters.

The first character indicates the major and the second is number character 1, 2, 3, 4, which indicates whether a student is a freshman, sophomore, junior, or senior. Suppose the following characters are used to denote the majors: M: Mathematics C: Computer Science I: Information Technology Samples: Enter two characters: M1 (Press Enter) Result: Mathematics Freshman Samples: Enter two characters: C3 (Press Enter) Result: Science Junior Samples: Enter two characters: T3 (Press Enter) Result: Invalid Major Samples: Enter two characters: M8 (Press Enter) Result: Invalid status code.

Answers

For this purpose, the Java programming language has a wrapper class that "wraps" the char in a Character object. A single field with the type char is present in an object of type Character.

The four fundamental arithmetic type specifiers in the C language are char, int, float, and double, along with the modifiers signed, unsigned, short, and long. Unicode, Latin 1, and International EBCDIC are a few examples of character sets. Based on the necessary letters and symbols, character sets are determined. Character sets are identified by their names or by a coded character set identification, which is an integer (CCSID). A bit (binary digit) is a single switch that may be turned on or off, zero or one. ASCII is a 7-bit code. In the US, character sets are typically 8-bit sets with 256 characters, which effectively doubles the ASCII set. There are two alternative states for one bit.

To learn more about Java click the link below:

brainly.com/question/29897053

#SPJ4

ced-vfrj-yiu
ev.eyo.ne joi.n.thro.ugh goog.le m.eet​

Answers

Answer:

n.o

Explanation:

n.o.

Other Questions
Explain your answer !! Have a nice day Will give braisnlt Which organism belongs to the Kingdom Eubacteria?A. ParameciumB. ThermophileC. AlgaeD. Cyanobacteria LIST and support your argument with supporting details [reasons, examples, facts, testimony, descriptions, illustrations, or explanations]. ALL responses must be cogent [clear, logical, convincing] and well argued.Why do you think the United States of America still view Native Americans or "Indian" Americans as second-class citizens in a second-class system?Prior to reading this discussion board, what was your view of Native Americans? (Be honest)With a bit more knowledge, what is your perspective now?How can Americans become more conscious of the inequality of this indigenous group of American people? how does the incidence of type 2 diabetes among native americans (especially those in the plains and southwest) compare to that of the general population? Please help need the answer fast the nurse reviews the medical record of a client with terminal cancer and notes the presence of a do-not-resuscitate (dnr ) order the order was written with the client's admission orders . the nurse recalls that which factor is relevant to the legal aspects of the dnr order ? A square garden has an area of 100ft^2. What is the perimeter of the garden? Which of the following could be used to describe a cell that comes from an animal?autotrophicheterotrophicprokaryotic Explain how people-specific church plantingefforts can lead toward reconciliation andunity (Essay) Compare and contrast Bullhead City and The Slabs in Into the Wild. Remember to smile and have a good day PLEASE HELP QUICK 100 POINTS!!The length of the longest item that will fit in the shipping box is 26.3 inches. Now Use complete sentences to explain the process you would use to find the volume of the shipping box. What can you infer on the passage of Linda and Nina Determine the monthly payment of a loan for $3,000 at 7. 5% interest compounded monthly for 36 months. A. $93. 32 b. $95. 40 c. $211. 33 d. $253. 60. The perfection obtained by filing a financing statement lasts for ______. A. five (5) years, and is renewable. B. five (5) years, and is non-renewable. C. ten (10) years, and is renewable. D. ten (10) years, and is non-renewable. What is the pH of a 0.350 M solution of NaHCO3 , given that the Kb of HCO3 is 2.3108 ? 10.5 8.4 11 9.9 The graph below shows the amount of water used at a campground based on the number of people staying at the campground.What is the average amount of water used per person?A. 10 gallonsB. 12.5 gallonsC. 20 gallonsD. 22.5 gallons The nurse is caring for a client who is diagnosed with a complete small bowel obstruction. Forwhat priority problem is this client most likely at risk?a. Abdominal distentionb. Nauseac. Electrolyte imbalanced. Obstipation Explain Why would communication skill be important inleadership? Provide the answer in 3-4 Paragraphs. Is the following statement true or false?Every line segment has a length.