To edit a form, use

datasheet view.
design view.
layout view.
layout view or design view.

Answers

Answer 1

Answer: Design view

Explanation:

 We use design view for editing and modifying the forms. The design view is basically used to create the form and then also edit the form structure. It is also capable for reducing the scope in the particular structure.

In the design view, we can use the property sheet for modifying the properties in the form and also control its features in the particular section of the form structure.

It basically provide the wide variety of comprehensive form structure and it basically helped to organize the proper information in the form.  

Answer 2

Answer: layout view

Explanation; on edge


Related Questions

What are the benefits of using an ordered list vs. an unordered list? What are the costs?

Answers

Answer:

The main benefit of the ordered list is that you can apply Binary Search( O( n log n) ) to search the elements. Instead of an unordered list, you need to go through the entire list to do the search( O(n) ).

The main cost of the ordered list is that every time you insert into a sorted list, you need to do comparisons to find where to place the element( O( n log n) ). But, every time you insert into an unsorted, you don't need to find where to place the element in the list ( O(1) ). Another cost for an ordered list is where you need to delete an element, you have an extra cost rearranging the list to maintain the order.

A circuit-switching scenario in which Ncs users, each requiring a bandwidth of 10 Mbps, must share a link of capacity 150 Mbps. What is the maximum number of circuit-switched users that can be supported?

Answers

17
Find y if the line through (5,3) and (-3, y) has a slope m = -

Why do we need to pass a size as well as the array to any function/procedure where we want it to use this array?

Answers

Explanation:

In C++ or C we don't have a function which tells us the size of array which is required.So it is necessary to pass the size of the arrays in the function.At the time of declaration we declare the size of the array more than we need.Then we store the elements upto the size which is necessary.So the actual size of the array is larger than the size we needed.So hence it is necessary to pass the size of the array.

A standard group of eight bits makes up a byte.

True

False

Answers

Think the answer is false

Answer:

false

Explanation:

i agree with top

What does the metric column in a routing table do?

Answers

Answer:

 The metric column basically indicate the cost of the route in the routing table and also decide correct route in the routing table.

In the routing table, the lowest metric route is more preferable route as compared to others. In the networking, the routing table is basically used to store the data or information in the form of table in the router.

In the computer network, the routes are listed for the particular destination in which the routes are basically associate that particular routes.

With the help of a for-loop, write a C++ program to input and display any multidimensional matrix.

Answers

Answer:

// here is code in C++ to demonstrate a 2-dimensional array.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

int r,c;

cout<<"enter the number of row:";

// read the value of row

cin>>r;

cout<<"enter the number of column:";

// read the value of column

cin>>c;

// create a 2-d array

int arr[r][c];

// read the value of array

cout<<"enter the elements of array:"<<endl;

for(int a=0;a<r;a++)

{

   for(int b=0;b<c;b++)

   {

       cin>>arr[a][b];

   }

}

cout<<"elements of the array are:"<<endl;

// print the array

for(int a=0;a<r;a++)

{

   for(int b=0;b<c;b++)

   {

       cout<<arr[a][b]<<" ";

   }

   cout<<endl;

}

return 0;

}

Explanation:

Here we have demonstrate a 2- dimensional array. In which, how to read the elements and how to print elements of array.Read the value of row and column from user.Create a 2-d array of size rxc. then read the elements of array either row wise or column wise. Then print the elements.To print the elements, we can go either row wise or column.

Output:

enter the number of row:3

enter the number of column:3

enter the elements of array:

1 2 3

9 8 7

2 4 6

elements of the array are:

1 2 3

9 8 7

2 4 6

Write a recursive function using pseudocode or C/C++.

Answers

Answer:

long fact(int n)

{

   if(n<=1)//base case

   return 1;  

   long p=fact(n-1);//recursive call.

   return n*p;//returning the factorial.

}

Explanation:

Above written function is written in C++ language.It is a recursive function to find the factorial of the function.

If we enter a number  equal to  or  less than  1  then the function returns 1. Then the recursive call  is made  and it is stored  in the long  variable  p and  the result is returned as n*p.

As the period of a sine wave decreases, the frequency __________________ .

a. decreases b. increases c. remains the same d. doubles

Answers

Answer:

b. increases

Explanation:

As the time period of a sine wave decreases, the frequency increases.

Frequency and time period follow an inverse relationship. Larger the time period, lower is the frequency and vice versa. Frequency measure the number of repetitions of the wave per unit time. Time period measures the time taken to complete one cycle of the sine wave. So larger the time to complete one cycle, smaller will be the number of cycles completed in unit time.

As the period of a sine wave decreases, the frequency **increases**. So, the answer is **b. increases**.

As the period of a sine wave decreases, it means that each cycle of the wave takes less time to complete. Frequency is the number of cycles of a wave that occur in a unit of time.

Therefore, when the period decreases, more cycles occur in the same amount of time, leading to an increase in frequency. Mathematically, frequency (f) is the reciprocal of the period (T), so as T decreases, 1/T increases, resulting in an increase in frequency.

This relationship is described by the equation f = 1/T. Hence, as the period decreases, the frequency of the sine wave increases. Therefore, option **b. increases** is the correct choice.

python programming The jackpot of a lottery is paid in 20 annual installments. There is also a cash option, which pays the winner 65% of the jackpot instantly. In either case 30% of the winnings will be withheld for tax. Design a program to do the following. Ask the user to enter the jackpot amount. Calculate and display how much money the winner will receive annually before tax and after tax if annual installments is chosen. Also calculate and display how much money the winner will receive instantly before and after tax if cash option is chosen.

Answers

Answer:

#here is code in python

#read the jackpot amount

amount=float(input("please enter the jackpot amount:"))

#read choice of payment

user_choice=input("enter your choice of payment(1 for cash, 2 for installments):")

#if choice is cash

if user_choice=='1':

#instant amount before tax

   b_tax=amount*.65;

#instant amount after tax

   a_tax=(amount*.70)*.65;

   print("instantly received amount before tax : ",b_tax)

   print("instantly received amount after tax : ",a_tax)

#if choice is installment

elif user_choice=='2':

#installment amount before tax

   b_tax=amount/20;

#installment amount after tax

   a_tax=(amount*.70)/20;

   print("installment amount before tax : ",b_tax)

   print("installment amount before tax : ",a_tax)

Explanation:

Read the jackpot amount from user.Next read the choice of Payment from user. If user's choice is cash then calculate 65% instantly amount received by user before and after the 30% tax.Print both the amount.Similarly if user's choice is installments then find 20 installments before and after 30% tax.Print the amount before and after the tax.

Output:

please enter the jackpot amount:2000

enter your choice of payment(1 for cash, 2 for installments):2

installment amount before tax :  100.0

installment amount before tax :  70.0

The MAC address is a _____ bit number.

Answers

Answer:

48.

Explanation:

MAC addresses are 48 bits or 6 bytes or 12 digit hexadecimal numbers.There are three formats of writing the MAC address which are as following:-

MM-MM-MM-SS-SS-SS

MMM.MMM.SSS.SSS

MM:MM:MM:SS:SS:SS

MAC address also called the physical address is a binary number which is used to  uniquely identify the computer network adapters.MAC address is assigned to the system at the time of manufacturing.

Answer: 48 bits

Explanation:MAC (Media Access control) address is the the unique identity provided to the device in a particular network. The communication taking place in a networking is done by the MAC address .

MAC address is a hexadecimal value of 12 digit which is found on the network interface card (NIC). The address is of 6 bytes which is equals to 48 bits.

Example of MAC address- 00:0b:95:9a:62:15

 

Write a java program that will take 2 String inputs and perform the following operation on them: a) Show length of the strings b) Concatenate two strings c) Convert those two strings to uppercase.

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

   // main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

 // scanner object to read input from user

Scanner scr=new Scanner(System.in);

 // string variables

String st1,st2;

System.out.print("enter the first string:");

 // read the first string

st1=scr.nextLine();

System.out.print("enter the second string:");

 // read the second string

st2=scr.nextLine();

// part (a)

 // find length of each string

System.out.println("length of first string is: "+st1.length());

System.out.println("length of second string is: "+st2.length());

//part(b)

 // concatenate both the string

System.out.print("after Concatenate both string: ");

System.out.print(st1+st2);

// part(c)

 // convert them to upper case

System.out.println("first string in upper case :"+st1.toUpperCase());

System.out.println("second string in upper case :"+st2.toUpperCase());

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read two strings st1 and st2 with scanner object.In part a, find the length of each string with the help of .length() method and print the length.In part b, concatenate both the string with + operator.In part c, convert each string to upper case with the help of .toUpperCase()  method.

Output:

enter the first string:hello

enter the second string:world!!

length of first string is: 5

length of second string is: 7

after Concatenate both string: hello world!!

first string in upper case :HELLO

second string in upper case :WORLD!!

Describe what a relational database is and why relational databases are needed.

Answers

Answer:

 The relational database is basically used as the set of the table in which the data can be easily accessible without any re-organizing the table in the database.

In the structured query language (SQL), the relational database is used as the standard users and API ( Application programming interface).

Relational database is basically needed to store the information or data in the form of tables. Due to the relational database, we can easily compare the data or information because the data are arranged in the form of columns.

A(n) ____ can be a spreadsheet showing all the costs to be incurred by the system and all the benefits that are expected from its operation.

Answers

Answer: Cost or benefit analysis

Explanation: Cost or benefit analysis is the technique that is carried out in the business organization for the evaluation and testing of the decision, process and functioning. This method helps in the calculation of the benefits regarding the cost.

Cost analysis can evaluate the benefit of the cost as well as the deduction of the cost from benefits gained.It is used for making the decision related with finance in a particular organization.

If you declare a variable as an instance variable within a class, and you declare and use the same variable name within a method of the class, then within the method, a) the variable used inside the method takes precedence b) the class instance variable takes precedence c) the two variables refer to a single memory address d) an error will occur

Answers

Answer:

Option(a) is the correct answer for the given question.

Explanation:

If we declared a variable with the same name in class and method both then the variable which is declared inside the method overrides the definition of variable which is declared in class .It means the variable which is used inside the method takes precedence.

For example:

public class Main

{

int c=90; // class varaible or instance varaible

void sum1()

{

   int c=4; // method having same name as class varaible name

   c=c+10;

   System.out.println(c);

}

public static void main(String[] args)

{

 Main ob=new Main();

 ob.sum1();

}

}

Output:

14

In this example the variable 'c' is declared in both class and function but variable c takes the precedence inside the method sum1() and display 14.

Final answer:

When a variable is declared as an instance variable within a class and the same variable name is declared and used within a method of the class, the variable used inside the method takes precedence over the class instance variable.

Explanation:

When a variable is declared as an instance variable within a class, and the same variable name is declared and used within a method of the class, the variable used inside the method takes precedence over the class instance variable. This is because local variables within a method have higher priority than instance variables in terms of accessing and modifying their values. The local variable and instance variable are separate and refer to different memory addresses.

When you open a stream for both reading and writing files, what must you always remember to do at the end?

Answers

Answer:

When you open a stream for both reading and writing you must always remember to close the stream.

Explanation:

There are three basic steps to follow to read and write data from stream.

Steps to read data from the stream

1) Open the stream

2) Read the data from the stream

3) Close the stream

Step to write data to the stream

1) Open the stream

2) Write the data to the stream

3) Close the stream

If variable x has value 2 and y has value 2, what is the value of the following Jack expression?

(x + 3) / (4 - y)

Answers

Answer:

The value of the following expression is "2".

Explanation:

Here x has value 2 means x=2,and y has value 2 means y=2.

so (x+3)/(4-y)

  (2+3)/(4-2)

5/2 it gives 2 because /(slash) operator gives the quotient part .The slash    operator divide the left hand operand by the right hand operand.On dividing 5/2 it returns integer value i.e 2.

-What is/are the goal/s of Business Intelligence systems?

Answers

Answer: Business intelligence system is a system that is used in the field of business and organizations for generations of the strategy and plans to make decision. This system consist of the business intelligence(BI) tools. It creates a connection in the different information/data and takes them to the business organization.

Business intelligence system has goals like:-

Increasing daily salesFast the growth rate of the businessimproving the rental performanceGaining more profit

In Windows, the only was to start/stop MySQL Server is from the Command Prompt.
(a) True
(b) False

Answers

Answer:

False

Explanation:

There is a way to start/stop MySQL server using the Services application, with the following steps:

1. Open Run Window by Winkey + R

2. Type services.msc

3. Search MySQL service based on version installed

4. Click on stop, start, or restart the service on the right side of the panel

On Windows 10, steps 1 and 2 can be replaced by simply going to the start menu and type services, the services application will appear as first option.

The month of February normally has 28 days. But if it is a leap year, February has 29 days. Write a program that asks the user to enter a year. The program should then display the number of days in February that year. Use the following criteria to identify leap years: 1. Determine whether the year is divisible by 100. If it is, then it is a leap year if and only if it is also divisible by 400. For example, 2000 is a leap year, but 2100 is not. 2. If the year is not divisible by 100, then it is a leap year if and only if it is divisible by 4. For example, 2008 is a leap year, but 2009 is not.

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

public class Main

{

// main method of the class

public static void main(String[] args) {

    // scanner object to read input from user

    Scanner s=new Scanner(System.in);

      // ask user to enter year

       System.out.print("Enter the year:");

       // read year

      int inp_year=s.nextInt();

      // check the leap year

      if(((inp_year % 4 == 0) && (inp_year % 100!= 0)) || (inp_year%400 == 0))

      {

      // print the day in the February of leap year

          System.out.println("Year "+inp_year+" has 29 days in February.");

      }

      else

      System.out.println("Year "+inp_year+" has 28 days in February.");

}

}

Explanation:

Read year from user and assign it to variable "year" with scanner object. Check the entered year is a leap year or not. A year is divisible by 100 and then check if it divisible by 400. If both condition is true then year is leap year.If year is not divisible by 100 and divisible by 4 then also it is a leap year. if year is leap then there will be 29 days in February of that year. Else there will 28 days in the February.

Output:

Enter the year:2000

Year 2000 has 29 days in February.

Enter the year:2002

Year 2002 has 28 days in February.

Final answer:

To check if a year makes February have 29 days, you must evaluate if it is divisible by 4 but not 100, unless it's also divisible by 400. A programming example demonstrates how to calculate this in Python.

Explanation:

The Gregorian Calendar is what we use today, which has 28 days in February unless it's a leap year. To determine if it's a leap year, you must check if the year is divisible by 4 but not 100, unless it's also divisible by 400. Here's a straightforward way to write a program in Python that calculates this:

year = int(input('Enter a year: '))
if year % 100 == 0:
   if year % 400 == 0:
       print('February has 29 days.')
   else:
       print('February has 28 days.')
else:
   if year % 4 == 0:
       print('February has 29 days.')
   else:
       print('February has 28 days.')

This condition checks for the criteria set forth to determine if February in the input year would have 28 or 29 days.

what are indexes in a database?

a Indexes are locations of tables within a database.

b Indexes are the quick references for fast data retrieval of data from a database.

c Indexes are the slow references for fast data retrieval of data from a database.

d Indexes are the quick references for fast data inserts of data.

Answers

Answer: A) Indexes are locations of tables within a database.

Explanation: The index of a database is a data structure that improves the speed of operations, by means of a unique identifier of each row of a table, allowing rapid access to the records of a table in a database. It has an operation similar to the index of a book, keeping pairs of elements: the element to be indexed and its position in the database.

Which of the following is the best reason to use a macro?: *
a. You want to send a personalized form email to many people
b. You want to correct the citations in a research paper
c. You want to automate a repetitive task to save time
d. You want to build a table based on an Excel spreadsheet

Answers

Answer:c)You want to automate a repetitive task to save time

Explanation: Macro is the program that is utilized when there is a requirement of a task or operation to be repeated in a automatic way.This helps in saving the time without commanding the same operation to take place manually.

This program works by taking the into and generating the preset output sequence. Other options are incorrect because it does not help in email functions, correction of the citation in documents or generation of the table.Thus, the correct option is option(c).

The use of macros is best suited for automating repetitive tasks, which saves time and increases efficiency, especially in applications like Excel. C is correct.

The best reason to use a macro is to automate a repetitive task to save time. Macros are used to streamline activities such as data entry in Excel, through repetitive tasks like keyboard shortcuts or Automatic Completion. These utilities are designed for users to quickly navigate worksheets and automate tasks; thus, eliminating the need to perform monotonous actions.

Automation in general allows you to focus on more important activities rather than getting bogged down with tedious tasks. For instance, you might use macros to write little programs for formulas you use frequently, adding efficiency to your workflow.

Who distributes IP Address?

Answers

Answer:

 The IP address is the internet protocol address that is basically assign to every device that is particularly connected to the network of the computer. The internet protocol is basically useful for the communication.

The main function of the IP address is that:

Used in the location addressingFor the network and host interface identification.

The IP address is basically distributed by the IANA ( Internet assigned number authority) and the main responsibility of the internet protocol is to distribute the IP address with the help of the RIR (Regional internet registries).

How can hidden terminals be detected in 802.11?

Answers

Answer:

Hidden terminal are basically known as hidden node that are out of the range in the network. The hidden terminal are basically detected by the receiver and sender according to the potential colliding of the packets. In the wireless network 802.11 we can easily detect the hidden node or terminal by using two main mechanism that are:

Active detectionPassive detection

Active Detection:

In the active detection, the hidden terminal firstly generated a request in the hop which is known as "Detection request" and then all the given terminal received the request for sending the sequence of packet on the hop. In the 802.11 wireless network, terminal 0 is known as the detection terminal.

Passive detection:

In the passive detection, there is detecting terminal node interface is set in the promiscuous mode in which all the packets are process in the detecting terminal.

It is basically depend upon the CTS or RTS that is used for the transmitting the neighboring node or terminal.    

Why is wider channel bandwidth good?

Answers

Answer:

The wider channel bandwidth is efficient and good as it help in increasing the speed of the transmission. Due to the wider channel of the bandwidth it also lead to consuming less energy of the battery and make cost effective.

Due to the wider bandwidth, the number of clients can easily share and transfer the data in the channel and also make the transmission complete.

If the channel of the bandwidth is double then, the single transmission can easily carry more data. Hence, it also lead to double the speed of the transmission.

What is CSMA/CD and how does it work?

Answers

Answer:

Carrier Sense Multiple Access / Collision Detection abbreviated as CSMA/CD, is known as a set of rules that determines how a network devices tends to respond when devices attempt to use data channel simultaneously. It tends to work by detecting a collision in the medium and backing off as necessary. Consider a LAN with several hosts. When one of them transmits a frame, it tends to listens on medium in order to check whether medium is busy.

Constructors are special methods included in class definitions. a. What is a constructor used for? b. How do constructors differ from other methods in a class?

Answers

Answer:

(a)A constructor is a special method which is used the initialize the class that means the initialize the object of a class.

(b)There is the following difference between constructor and method in a class.

1. Constructor name has the same name as the class name we do not give any other name to the constructor, on the other hand, it is possible in function to giving any name to function.

2. The constructor does not have return type such as int, void, etc on the other hand function must have a return type.

3.constructor does not return any value on the other hand function are returning the value.

Explanation:

Following are the program of constructor in c++

#include <iostream> // header file

using namespace std; // namespace

class constructor1

{

   public:

   constructor1() // default constuctor

   {

       cout<<" hello brainly:"<<endl;  

   }

void fun() // fuuction

{

cout<< "function:";

}

};

int main() // main function

{

constructor1 ob; // creating object it call default constructor

ob.fun();//  calling the function fun()

  return 0;

}

Output:hello brainly:

function:

In this program, we create a class and create a function "fun" and "default "constructor "from the main function we create the object of a class which calls the default constructor and with the help of object we call the function fun.

Final answer:

Constructors are special methods for initializing new objects in a class. They differ from other methods by being called automatically during object creation, having no return type, and generally sharing the class name.

Explanation:

Constructors are special methods included in class definitions whose primary role is to initialize new objects of that class. Unlike regular methods, a constructor is called automatically when an instance of the class is created. They are unique in that they don't have a return type, not even void, and they often have the same name as the class in many programming languages.

Constructors may include parameters that allow for the setting of instance variables when an object is instantiated. This ensures that the new object starts with a valid state. In languages such as Python, the constructor method is defined using the special name __init__. This method enables coders to carry out any initialization, such as setting default values for instance variables or performing operations vital to the object's use.

While other methods in the class can be invoked using the object's reference and can have any return type or none, the constructor is unique in that it doesn't need to be called directly; it's invoked when the object comes into existence and cannot be called again unless a new object is created.

One advantage of using a security management firm for security monitoring is that it has a high level of expertise.

True

False

Answers

Answer: True

Explanation: Security management firm is the organization that provides protection to the system, functions,data, people etc of any particular business organization.They are highly capable of the problem avoidance, management of risk and other such issues.

The monitoring of the security done by the people and devices of the security management firm are more reliable and assured due to the expert skill they persist in the security field. Thus, the given statement is true.

Answer:

The correct answer to the following question will be True.

Explanation:

Security management firm is the organization that provides security to any particular business organization's network, processes, records, people etc.They are highly capable of avoiding the problem, handling the danger and other such problems.

Communicate to workers that maintaining the network is in the best interests not only of the company but also of consumers.Raise knowledge of security issues amongst workers.Provide appropriate training for the health of employees.Track user behavior to determine implementation of the protection.

The security monitoring performed by the security management firm's people and equipment is more accurate and confident due to the experience they retain in the field of security. Therefore, the statement given is valid or True.

. A database management system (DBMS) is general purpose software that _____________________ and _______________________ a database.

Answers

Answer: Creating and managing

Explanation:

 A database management system (DBMS) is basically the general purpose software that helps in creating and managing  the database system. The database management system basically provide the systematic way for creating, updating and managing the data for the users.

The DBMS basically make possible to the end users to read, create, delete and also update the given data in the database system.  

Final answer:

A database management system (DBMS) is a software that enables the creation, storage, and manipulation of large datasets. It allows users to easily manage databases and perform complex queries to retrieve specific data.

Explanation:

A database management system (DBMS) is a general-purpose software that allows for the creation, storage, maintenance, manipulation, and retrieval of large datasets distributed over one or more files.

For example, Microsoft Access and Oracle are commercial software packages that provide DBMS functionality. With a DBMS, users can easily create and manage databases, perform complex queries to retrieve specific data, and ensure the security and integrity of the stored information.

A sine wave has a period of 5 msec. What is the frequency?

Answers

Answer:

200 Hz

Explanation:

The period of a sine wave is 5 milliseconds.

That means the each cycle in the wave takes up 5 milliseconds.

So the frequency of the wave is the inverse of the time period, namely, 1/(5 * 10 ^ -3)

=1000/5 = 200 per second or 200 Hertz.

So the frequency of the wave will be 200 Hertz which means that the wave will complete 200 cycles per second. Larger the time period, lower is the frequency and vice versa.

Final answer:

The frequency of a sine wave with a period of 5 msec (milliseconds) is 200 Hz, meaning it oscillates 200 times per second.

Explanation:

A sine wave with a period of 5 msec (milliseconds) is being discussed. The frequency, which is the measure of how many times a cycle of the wave occurs in one second, can be calculated using the relationship where frequency (f) is the inverse of the period (T). Given f = 1/T, and understanding that 1 millisecond (msec) is equal to 0.001 seconds, a period of 5 msec converts to 0.005 seconds.

Therefore, the frequency of the sine wave is calculated as 1 / 0.005 s = 200 Hz. This means the sine wave oscillates 200 times per second.

Discuss the purpose of these Windows CLI commands

Answers

Answer:

 The window CLI command in the computer is basically stand for the command line interface. The command line interface is basically define as interacting with the various computer programs where the users use the command in the program by using various command lines.

The basic purpose of the CLI commands is that it takes less resources of the computer system. In earlier year of the computing this command used as a standard way for interacting with the computer other than mouse.

The command line interface (CLI) is basically handle the interface of the program. It is also known as command line processor.

Other Questions
What led to the development of slave codes? 14. CELL PHONES Gabriel pays $40 a month for basic cell phone service. In addition,Gabriel can send text messages for $0.20 each. Write and solve an equation to find the totalamount Gabriel spent this month if he sends 40 text messages. Please help I need to get this done ASAP.1. Read the paragraph from the section "Cuzco." The Inca capital was called Cuzco, from qosqo, meaning "dried-up lake bed," or perhaps derived from cozco, a particular stone marker in the city. It was the religious and administrative center of the empire and had a population of up to 150,000 at its peak. It was dominated by the sacred gold and emerald Coricancha complex, or Temple of the Sun. The whole capital was laid out in the form of a puma. Incorporating vast plazas, parkland, shrines, fountains and canals, the splendor of Inca Cuzco, unfortunately, survives only in the eye-witness accounts of the first Europeans who marveled at its architecture and riches.Which idea is BEST supported by the above paragraph? A. Cuzco was built on a high mountain peak where gold and emeralds were plentiful. B. The name Cuzco proves to historians that the Inca capital was once built near a dried-up lake bed. C. Cuzco was primarily built as a place to pay honor to the Temple of the Sun. D. The wonders of Cuzco were documented by early European explorers who visited the city.2.The author states that the Incas lived in a "harsh" mountain environment.Which sentence from the article BEST supports this idea? A. Their spectacular adaptation of natural environment with terracing, highways and mountaintop settlements continues to impress modern visitors at sites like Machu Picchu. B. Local communities were expected to help build and maintain such projects as the road system that stretched across the empire. C. The Incas imposed their religion and administration on conquered peoples and extracted tribute. D. The Inca religion was preoccupied with controlling the natural world and avoiding such disasters as earthquakes, floods and drought.3. Which of the following topics is emphasized in the article but is NOT reflected the accompanying maps and images? A. the Incas' connection to their gods B. the Incas' ability to construct large buildings using stone C. the extent of the Inca Empire D. the diseases that contributed to the end of the Inca Empire4. Which answer choice BEST explains how the image in the section "Collapse" emphasizes a shift that occurred in the Inca Empire? A. The image shows how the Inca rulers began to use force to maintain the empire. B. The image indicates that the Inca rulers became very unpopular among their subjects. C. The image illustrates how civil unrest and colonization incited the Incas' loss of power over their empire. D. The image depicts the beginning of the unsuccessful Inca rebellion against the first Spanish conquistadors. All of the cartilage of the larynx are composed of hyaline cartilage except for this structure that is composed of elastic cartilage because it must be flexible enough to close and open over the glottis_______________ i need your help with a math problem it says three good friends are in the same algebra class. Their scores on a recent test are three consecutive even integers whose sum is 264. Find each score. Describe the three ideals of American democracy Christian and Domonic are shooting baskets at the basketball court in the park. They track their ratios of baskets made to baskets missed. Christian's ratio is 3:4, and Domonic's ratio is 5:2. Which statements are true based on the boys' ratios? Choose all that are correct. For every 3 baskets he misses, Christian makes 4 baskets. For every 3 baskets he makes, Christian misses 4 baskets. For every 2 baskets he misses, Domonic makes 5 baskets. For every 2 baskets he makes, Domonic misses 5 baskets. When Domonic has missed 4 baskets, he will have likely made 7 baskets. When Christian has missed 8 baskets, he will have likely made 6 baskets. from where do many of the united states key ideas for government come What is the length of the side opposite of angle b Kyla is buying clothes. She can choose between blue jeans, khaki pants, and black jeans. She doesn't like black jeans, and after some thought, she chooses blue jeans. What is the opportunity cost of this choice? Simplify the following Boolean expressions using algebraic manipulation.a. F(a,b) = ab + ab + ab'b. F(r,s,t) = r + rt + rs + rstc. F(x,y) = (x + y)(x + y)d. F(a,b,c) = b'+ bc + ab + a'bc'e. F(a,b,c,d) = ac + b'd + a'bc + b'cd' Scientists estimate that by the year 2025 the worlds population will reach Write down symbols for the alleles. (These may be given in the problem.) When represented by single letters, the dominant allele is uppercase and the recessive is lowercase. How are transfusion reactions type II responses? What happens in a transfusion reaction? Which is the moral theory that the truth of moral claims and which values people should adopt vary across cultures divided by times and places. What is morally permissible in one culture may be morally wrong in another culture? How is a suspension different from a colloid? What is the theoretical yield of bismuth when 198 g of Bi2O3 reacts with excess carbon as shown below? Bi2O3 C(s)>Bi(s) + CO(g) (not balanced) four times a number plus three is the same as five plus the number equation A systems flowchart:Select one:a. must always contain on-page connectors.b. includes physical as well as electronic flows.c. requires more than one entity.d. must always have a data store if there are paper documents involved.e. must be balanced. Which character in American Born Chinese is an example of a foil?OA. Suzy NakamuraO B. Wei-ChenO c. Jin WangO D. The Monkey King