When importing data using the Get External Data tools on the Data tab, what wizard is automatically
started after selecting the file you want, to help import the data?
Text Import Wizard
Excel Data Wizard
Import Wizard
Text Wrap Wizard

Answers

Answer 1

Answer: text import wizard

Explanation:


Related Questions

U6L1 - Algorithms Solve Problems
I'm just really stuck on this and have no clue what to do.

Answers

Answer:

1. Left hand picks up card on position 1

2. Assume position 2 as the "working position"

3. Free hand picks up card on working position.

4. Compare two cards, put back the largest card on working position.

5. Increase working position by 1.

6. Go to step 3 if there is a card at the new working position.

7. Smallest card is in your hand.

Last one, this is fashion marketing and I need to know the answer to get the 80%

Answers

Answer:

D. It requires that each item of stock is counted and recorded to determine stock levels

Explanation:

A perpetual system of inventory can be defined as a method of financial accounting, which involves the updating informations about an inventory on a continuous basis (in real-time) as the sales or purchases are being made by the customers, through the use of enterprise management software applications and a digitized point-of-sale (POS) equipment.

Under a perpetual system of inventory, updates of the journal entry for cost of goods sold or received would include debiting accounts receivable and crediting sales immediately as it is being made or happening.

Hence, an advantage of the perpetual system of inventory over the periodic system of inventory is that, it ensures the inventory account balance is always accurate provided there are no spoilage, theft etc.

The following are the characteristic of a perpetual inventory system;

I. It is the most popular choice for modern business.

II. Inventory is updated in near real-time.

III. It provides up-to-date balance information and requires fewer physical counts.

Sophisticated modeling software is helping international researchers

Answers

Answer:

A. increase the pace of research in finding and producing vaccines.

Explanation:

These are the options for the question;

A. increase the pace of research in finding and producing vaccines.

B. analyze computer systems to gather potential legal evidence.

C. market new types of products to a wider audience.

D. create more intricate screenplays and movie scripts.

Modeling software can be regarded as computer program developed in order to build simulations as well as other models. modelling software is device by international researchers to make research about different vaccines and other drugs and stimulants to combat different diseases. It helps the researcher to devoid of details that are not necessary and to deal with any complexity so that solution can be developed. It should be noted that Sophisticated modeling software is helping international researchers to increase the pace of research in finding and producing vaccines.

Consider the following class definition.
public class Tester
{
privtae int num1;
private int num2;
/missing constructor /
}
The following statement appears in a method in a class other than Tester. It is intended t o create a new Tester object t with its attributes set to 10 and 20.
Tester t = new Tester(10,20);

Which can be used to replace / missing constructor / so that the object t is correctly created?

Answers

Answer:

Explanation:

The following constructor needs to be added to the code so that the object called t can be created correctly...

public Tester(int arg1, int arg2) {

    num1 = arg1;

    num2 = arg2;

}

This basic constructor will allow the object to be created correctly and will take the two arguments passed to the object and apply them to the private int variables in the class. The question does not state what exactly the Tester constructor is supposed to accomplish so this is the basic format of what it needs to do for the object to be created correctly.

Do you think it is acceptable to copy and paste material from a web page into a term paper?​

Answers

Answer:

Possibly, if it is a small quote from a factual and reliable site which properly cited, allowed, and being used to prove an idea or as support for a claim. You can also paraphase. However, if it is a large piece of material in which no effort is needed for the person submitting the paper, then no. Copy and paste is generally only saved for quoting something direct, such as results from scientific reasearch. You really need to be careful not to plagarise; so, for a term paper, it may be a better idea to stay clear of copy and paste if you are unsure.

Answer:

C. No, because you should not pass other people’s work off as your own.

Explanation:

Key Categories: more libraries and thousands of functions


Select one:


a. Power


b. Practicality


c. Possibility


d. Price

Answers






b. power
YOUR WELXOME



Key Categories: more libraries and thousands of functions is Practicality. Hence, option B is correct.

What is Practicality?

the ability to perform something or put something into action: Bankers expressed dissatisfaction with the new rules' viability as workable answers to challenging issues. He believes that wind energy can be a useful renewable energy source. For the majority of residential residences, the equipment is too large to be useful. Although the shoes are attractive, they are not particularly useful. The book is a helpful manual for maintaining cars.

tailored or created for actual use; beneficial: useful guidelines. interested or skilled in practical application or work: a pragmatic politician with a record of enacting significant legislation.

The definition of practical thinking is "examining ways to adapt to your surroundings or change your environment to fit you" in order to achieve a goal. Practicality is a term that is used occasionally.

Thus, option B is correct.

For more information about Practicality, click here:

https://brainly.com/question/24313388

#SPJ5

Online privacy and data security are a growing concern. Cybercrime is rampant despite the various security measures taken.

-Mention five tools to safeguard users against cybercrime. How do these tools help decrease crime?
-Provide the details of how each of these tools work.
-Describe how these tools are helping to restrict cybercrime.

Answers

Answer:

The SANS Top 20 Critical Security Controls For Effective Cyber Defense

Explanation:

Password/PIN Policy

Developing a password and personal identification number policy helps ensure employees are creating their login or access credentials in a secure manner. Common guidance is to not use birthdays, names, or other information that is easily attainable.

Device Controls

Proper methods of access to computers, tablets, and smartphones should be established to control access to information. Methods can include access card readers, passwords, and PINs.

Devices should be locked when the user steps away. Access cards should be removed, and passwords and PINs should not be written down or stored where they might be accessed.

Assess whether employees should be allowed to bring and access their own devices in the workplace or during business hours. Personal devices have the potential to distract employees from their duties, as well as create accidental breaches of information security.

As you design policies for personal device use, take employee welfare into consideration. Families and loved ones need contact with employees if there is a situation at home that requires their attention. This may mean providing a way for families to get messages to their loved ones.

Procedures for reporting loss and damage of business-related devices should be developed. You may want to include investigation methods to determine fault and the extent of information loss.

Internet/Web Usage

Internet access in the workplace should be restricted to business needs only. Not only does personal web use tie up resources, but it also introduces the risks of viruses and can give hackers access to information.

Email should be conducted through business email servers and clients only unless your business is built around a model that doesn't allow for it.

Many scams and attempts to infiltrate businesses are initiated through email. Guidance for dealing with links, apparent phishing attempts, or emails from unknown sources is recommended.

Develop agreements with employees that will minimize the risk of workplace information exposure through social media or other personal networking sites, unless it is business-related.

Encryption and Physical Security

You may want to develop encryption procedures for your information. If your business has information such as client credit card numbers stored in a database, encrypting the files adds an extra measure of protection.

Key and key card control procedures such as key issue logs or separate keys for different areas can help control access to information storage areas.

If identification is needed, develop a method of issuing, logging, displaying, and periodically inspecting identification.

Establish a visitor procedure. Visitor check-in, access badges, and logs will keep unnecessary visitations in check.

Security Policy Reporting Requirements

Employees need to understand what they need to report, how they need to report it, and who to report it to. Clear instructions should be published. Training should be implemented into the policy and be conducted to ensure all employees understand reporting procedures.

Empower Your Team

One key to creating effective policies is to make sure that the policies are clear, easy to comply with, and realistic. Policies that are overly complicated or controlling will encourage people to bypass the system. If you communicate the need for information security and empower your employees to act if they discover a security issue, you will develop a secure environment where information is safe.

Answer:

anyone know if the other answer in right?

Explanation:

PLEASE HELP
Which of the following best describes the existence of undecidable problems?

Answers

Answer:

D.

Explanation:

Its the exact definition of an undecidable problem. Plus I have my notebook open next to me and that's what it says, trust bro.

An undecidable problem is a problem for which no algorithm can be constructed that always produces a correct output. The correct option is D.

What is undecidable problem?

Problems that cannot be solved by an algorithm are known as undecidable problems since no computer program can come up with a solution that works for every scenario.

This is a key drawback of computing systems, and it has been analytically shown that some issues are intractable from the start.

Decision issues that lack an algorithmic solution are referred to as undecidable.

A issue that cannot be solved by a computer or computer software of any type has never been solved by a computer. There is no such thing as a Turing machine that can solve an insoluble problem.

Thus, the correct option is D.

For more details regarding undecidable problems, visit:

https://brainly.com/question/30187947

#SPJ6

Edhesive 1.7 code practice question 2

Answers

Answer:

num = int(input("Enter a number: "))

print ("Answer= "+ str(num * 12))

Explanation:

Consider the following code segment.

int[] arr = {1, 2, 3, 4, 5};

Which of the following code segments would correctly set the first two elements of array arr to 10 so that the new value of array arr will be {10, 10, 3, 4, 5} ?

a. arr[0] = 10;
arr[1] = 10;

b. arr[1] = 10;
arr[2] = 10;

c. arr[0, 1] = 10;

d. arr[1, 2] = 10;
e. arr = 10, 10, 3, 4, 5;

Answers

Answer:

A.)

arr[0] = 10;

arr[1] = 10;

Explanation:

Given the array:

arr = {1,2,3,4,5}

To set the first two elements of array arr to 10.

Kindly note that ; index numbering if array elements starts from 0

First element of the array has an index of 0

2nd element of the array has an index of 1 and so on.

Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.

arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1

arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2

Consider the decision version of the Binary Search algorithm, which takes an array a of integers of size n, an integer x to be found, and gives a boolean result. Which of the following statements corresponds to a pair of valid Pre- and Post-conditions?
Note: Assume issorted() implies ascending numeric order:______.
A) PRE:n > 1
POST: result == x E a A is Sorted (a)
B) PRE: True
POST:isSorted(a) An > 1 C) PRE:n > 1A is Sorted (a). 10 sxs a[n-1]
POST: result == x E a vissorted(a)
D) PRE:n 1 An == size (a) A is Sorted (a) A a [0] SX Sa(n-1)
POST: result == XE a
E) PRE:n > i^n -- size (a) ^ a[0] 5 x 5 a (n-1]
POST: result = X Ea

Answers

Answer:

B

Explanation:

I am not for sure

PRE: True POST: is Sorted(a) An > 1 C) PRE : n > 1A is Sorted (a). 10 sxs a[n-1] POST: result == x E a vissorted (a).

What is computer programming?

Computer programming is defined as the process of carrying out a specific computation, typically through creating an executable computer program. Computer programmers create code and scripts, modify them, and test them to make sure that software and applications function as intended. They convert the blueprints made by engineers and software developers into computer-readable instructions.

The algorithm determines whether the key the number you're looking for and the array's middle value are equal. If so, the key is in the middle and the search is complete. The program then determines if the key is larger or less than the middle value if it isn't.

Thus, PRE: True POST: is Sorted(a) An > 1 C) PRE : n > 1A is Sorted (a). 10 sxs a[n-1] POST: result == x E a vissorted (a).

To learn more about computer programming, refer to the link below:

https://brainly.com/question/3397678

#SPJ2

According to the vulnerability assessment methodology, vulnerabilities are determined by which 2 factors?

Answers

Answer:

3 and 60!

Explanation:

Write a function species_count that returns the number of unique Pokemon species (determined by the name attribute) found in the dataset. You may assume that the data is well formatted in the sense that you don't have to transform any values in the name column. For example, assuming we have parsed pokemon_test.csv and stored it in a variable called data:

Answers

Answer:

Escribe una función species_count que devuelva el número de especies de Pokémon únicas (determinadas por el atributo de nombre) que se encuentran en el conjunto de datos. Puede suponer que los datos están bien formateados en el sentido de que no tiene que transformar ningún valor en la columna de nombre. Por ejemplo, suponiendo que analizamos pokemon_test.csv y lo almacenamos en una variable llamada datos:

Explanation:

If you are writing an algorithm and you aren’t confident that you understand the problem, what can you do?

Answers

Answer:

divide it into smaller pieces

Explanation:

Usually, the main reason a programmer does not understand a problem fully is that there is too much information. The best way to try and fully understand a problem is to divide it into smaller pieces. Start off by answering the question what is the expected output for an input. Then divide each individual issue within the problem. This will allow you as a programmer/developer to create an individual solution for each individual issue within the problem and then test to make sure that the input gives the correct output.

what is a computer modem?​

Answers

Answer:

A modem modulates and demodulates electrical signals sent through phone lines, coaxial cables, or other types of wiring.

Where does the revolver get the IP address of a site not visited before?


the file server


the print spooler


the IP provider


the name server

Answers

Answer:

The name server

Explanation:

The correct answer is name servers because on the internet, they usually help web browsers and other services to access the records of the domain name system(DNS) by direction of traffic through connection of the domain name with the IP address of the web server.

Consider the following statement, which is intended to create an ArrayList named a to store only elements of type Thing. Assume that the Thing class has been properly defined and includes a no-parameter constructor.
ArrayList a = /* missing code */;
Which of the following can be used to replace /* missing code */ so that the statement works as intended?
A: new Thing()
B: new ArrayList()
C: new ArrayList(Thing)
D: new ArrayList()
E: new ArrayList<>(Thing)
Consider the following statement, which is intended to create an ArrayList named numbers that can be used to store Integer values.
ArrayList numbers = /* missing code */;
Which of the following can be used to replace /* missing code */ so that the statement works as intended?
new ArrayList()
new ArrayList
new ArrayList()
A: III only
B: I and II only
C: I and III only
D:II and III only
E: I, II, and III

Answers

Answer:

B: new ArrayList()

Explanation:

When dealing with Java syntax you always need to initialize an ArrayList object with its constructor. From the options listed the only correct option would be B: new ArrayList(). This would correctly initialize the ArrayList object but is not necessarily the recommended way of doing this. The truly recommended way would be the following

ArrayList<Thing> a = new ArrayList<Thing>()

ArrayLists are simply resizable array.

The statement that can replace the missing code is (b) new ArrayList();The statements that can replace the missing code is (c) I and III only

The syntax to create an ArrayList is:

ArrayList<Type> str = new ArrayList<Type>();

Another possible syntax is:

ArrayList var_name= new ArrayList();

The above declarations mean that: the statement that can replace the missing code is (b) new ArrayList();

While the statements that can replace the missing code is (c) I and III only

Read more about ArrayLists at:

https://brainly.com/question/18323069

Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per second. (a) (7 Points) How long in (days or years) would it take for you to find the key on the average to a code that used 112-bit key on average

Answers

Answer:

8.22 × 10²⁰ years

Explanation:

Given that:

Total frequency = 100 million per record

The length of the key used for the encryption = 112 bit key

To calculate the number of seconds in  a year, we have:

= 365 × 24 × 60 × 60

= 3.1536 × 10⁷ seconds

Thus, on average, the number of possible keys that is required to check for the decryption should be at least  2¹¹¹ keys.

[tex]\mathbf{ = \dfrac{2^{111} \times 10^6}{3.1536 \times 10^7} = 8.22 \times 10^{20} \ years}[/tex]

Thus, it will take a total time of about 8.22 × 10²⁰ years on average.

Please select the word from the list that best fits the definition Asking for review material for a test

Answers

Answer:

B

Explanation:

Answer:

B is the answer

Explanation:

PHP is based on C rather than ______.


Select one:


a. PEARL


b. JAVA


c. PERL


d. COBOL

Answers

Answer:

The answer is "option b and option d"

Explanation:

In this question, both choice "b and c" is correct because Java is compiled and run on a JVM  and it uses the byte code. On the other hand, PHP has interpreted language, that compiled into the bytecode after that the output engine interpreted. Similarly, the COBOL is used for enterprise, finance, and administrative systems, and PHP is used in web creation.

most of the answers for this test is wrong.

Answers

Answer: C, Showing professional behavior.

Explanation:

The Clean Air Act Amendments of 1990 prohibit service-related releases of all ____________. A) GasB) OzoneC) MercuryD) Refrigerants

Answers

Answer:

D. Refrigerants

Explanation:

In the United States of America, the agency which was established by US Congress and saddled with the responsibility of overseeing all aspects of pollution, environmental clean up, pesticide use, contamination, and hazardous waste spills is the Environmental Protection Agency (EPA). Also, EPA research solutions, policy development, and enforcement of regulations through the resource Conservation and Recovery Act .

The Clean Air Act Amendments of 1990 prohibit service-related releases of all refrigerants such as R-12 and R-134a. This ban became effective on the 1st of January, 1993.

Refrigerants refers to any chemical substance that undergoes a phase change (liquid and gas) so as to enable the cooling and freezing of materials. They are typically used in air conditioners, refrigerators, water dispensers, etc.

Answer:

D

Explanation:

instructions and programs data are stored in the same memory in which concept

Answers

Answer:

The term Stored Program Control Concept refers to the storage of instructions in computer memory to enable it to perform a variety of tasks in sequence or intermittently.

company gives the following discount if you purchase a large amount of supply. Units Bought Discount 10 - 19 20% 20 - 49 30% 50 - 99 35% 100 40% If each item is $4.10. Create a program that asks the user how many items they want to buy, then calculates the pre-discount price, the amount of discount and the after discount price. So for example if order 101 items, I should see something similar to the following: With your order of 101 items, the total value will be $414.10 with a discount of $165.64 for a final price of $248.46. Your output should be very well organized, and use the correct formatting. (Including precision)

Answers

Answer:

In Python:

order = int(input("Order: "))

discount = 0

if(order >= 10 and order <20):

    discount = 0.20

elif(order >= 20 and order <50):

    discount = 0.30

elif(order >= 50 and order <100):

    discount = 0.35

elif(order >= 100):

    discount = 0.40

price = order * 4.1

discount = discount * price

print("With your order of "+str(order)+" items, the total value will be $"+str(round(price,2))+" with a discount of $"+str(round(discount,2))+" for a final price of $"+str(round((price-discount),2)))

Explanation:

This prompts the user for number of orders

order = int(input("Order: "))

This initializes the discount to 0

discount = 0

For orders between 10 and 19 (inclusive)

if(order >= 10 and order <20):

-----------discount is 20%

    discount = 0.20

For orders between 20 and 49 (inclusive)

elif(order >= 20 and order <50):

-----------discount is 30%

    discount = 0.30

For orders between 50 and 99 (inclusive)

elif(order >= 50 and order <100):

-----------discount is 35%

    discount = 0.35

For orders greater than 99

elif(order >= 100):

-----------discount is 40%

    discount = 0.40

This calculates the total price

price = order * 4.1

This calculates the pre discount

discount = discount * price

This prints the report

print("With your order of "+str(order)+" items, the total value will be $"+str(round(price,2))+" with a discount of $"+str(round(discount,2))+" for a final price of $"+str(round((price-discount),2)))

Create the logic for a program that prompts a user for 12 numbers and stores them in an array. Pass the array to a method that reverses the order of the numbers. Display the reversed numbers in the main program.

Answers

Answer:

Explanation:

The following program is written in Python. It first creates a method that reverses the array using the built in reverse function. Then it creates the array, creates a loop to ask the user to enter 12 numbers while passing each input into the array. Finally, it passes that array into the previously created reverse method and prints out the new array.

def reverse(num_arr):

   num_arr.reverse()

   return num_arr

num_arr = []

for x in range(12):

   num = input("Enter a number")

   num_arr.append(num)

print(reverse(num_arr))

A mom is planning a theme park trip for her husband, herself, and their three children. The family has a budget of $500. Adult tickets cost $25 each, and child tickets cost $25 each. Which Excel formula should be entered in cell B5

Answers

Complete question :

Sue is planning a theme park trip for her husband, herself, and her three children. She has a budget of $500. Adult tickets cost $55 each, and child tickets cost $25 each. Which formula should go in cell B4?

Answer:

=E1B1+E2B2

Explanation:

Cost of adult ticket = $55

Child ticket = $25

Number of adult = 2

Number of children = 3

Assume :

Cost of adult ticket = $55 = E1

Child ticket = $25 = E2

Number of adult = 2 = B1

Number of children = 3 = B2

The formula that should go into cell B5 in other to calculate total amount :

Total should be :

($55*2) + ($25*3)

=E1B1+E2B2

5. All sites are required to have the following reference materials available for use at VITA/TCE sites in paper or electronic format: Publication 17, Publication 4012, Volunteer Tax Alerts (VTA), and Quality Site Requirement Alerts (QSRA). AARP Foundation Tax Aide uses CyberTax Alerts in lieu of VTAs and QSRAs. What other publication must be available at each site and contains information about the new security requirements at sites

Answers

Answer:

Publication 5140.

Explanation:

The acronym VITA stands for Volunteer Income Tax Assistance and TCE stands for Tax Counseling for the Elderly. VITA/TCE is a certification gotten from the Internal Revenue Service in which the holders of such certification are trained on how to help people that have disabilities or that their incomes earners that are low. These volunteers help these set of people to prepare for their tax return.

In order to make the volunteers to be able to perform their work with high accuracy, the Department of Treasury, Internal Revenue Service gave out some aids for Quality Site. One of the aids which is the one contains information about the new security requirements at sites is given in the Publication 5140.

Hardware Name:
Description:
Picture:
1. Motherboard





2. Power Supply



3. CPU (Central Processing Unit)



4. Random Access Memory (RAM)



5. Hard Disk Drive/Solid State Drive



6. Video Card



7. Optical Drives



8. Input and Output Devices

Answers

Answer:

I think 2.power supply yaar

b) Develop a truth table for expression AB+ C.

Answers

It will become c-ab :)

Write a program that plays the popular scissor-rockpaper game. (A scissor can cut a paper, a rock can knock a scissor, and a paper can wrap a rock.) The program randomly generates a number 0, 1, or 2 representing scissor, rock, and paper. The program prompts the user to enter a number 0, 1, or 2 and displays a message indicating whether the user or the computer wins, loses, or draws. Here are sample runs:

scissor (0), rock (1), paper (2): 1
The computer is scissor. You are rock. You won
scissor (0), rock (1), paper (2): 2
The computer is paper. You are paper too. It is a draw

Answers

Answer:

import random

computer = random.randint(0, 2)

user = int(input("scissor (0), rock (1), paper (2): "))

if computer == 0:

   if user == 0:

       print("The computer is scissor. You are scissor too. It is a draw")

   elif user == 1:

       print("The computer is scissor. You are rock. You won")

   elif user == 2:

       print("The computer is scissor. You are paper. Computer won")

elif computer == 1:

   if user == 0:

       print("The computer is rock. You are scissor. Computer won")

   elif user == 1:

       print("The computer is rock. You are rock too. It is a draw")

   elif user == 2:

       print("The computer is rock. You are paper. You won")

elif computer == 2:

   if user == 0:

       print("The computer is paper. You are scissor. You won")

   elif user == 1:

       print("The computer is paper. You are rock. Computer won")

   elif user == 2:

       print("The computer is paper. You are paper too. It is a draw")

Explanation:

*The code is in Python.

Import the random to be able to generate number number

Generate a random number between 0 and 2 (inclusive) using randint() method and set it to the computer variable

Ask the user to enter a number and set it to the user variable

Check the value of computer the computer variable:

If it is 0, check the value of user variable. If user is 0, it is a draw. If user is 1, user wins. If user is 2, computer wins

If it is 1, check the value of user variable. If user is 0, computer wins. If user is 1, it is a draw. If user is 2, user wins

If it is 2, check the value of user variable. If user is 0, user wins. If user is 1, computer wins. If user is 2, it is a draw

Other Questions
How does using list make a program easier to develop and maintain please help! this is timed! There is not a lot of _____ in Eastern EuropeA. Limestone and Marble B. Gas and oil C. Nickle, and silver WHOEVER ANSWERS FIRST GETS BRAILIEST!!Earth has 24 time zones spread over its 360 circumference. Each time zone is 15 wide. Boston is close to longitude 71 W; Honolulu is close to longitude 158 W.How many time zones apart are Boston and Honolulu? A. They are 6 time zones apart because 6. B. They are 5 time zones apart because 5. C. They are 4 time zones apart because 4. D. They are 2 time zones apart because 2. WILL GIVE BRAINLIEST A 5.7 kg particle starts from rest at x = 0 and moves under the influence of a single force Fx = 4.5 + 13.7 x 1.5 x 2 , where Fx is in Newtons and x is in meters. Find the work done by this force on the particle as the particle moves from x = 0 m to x = 1.9 m. Answer in units of J. please help for gods sake:( PLEASE HELP ILL GIVE BRAINSLIEST OUT :D Ugh these are hard questions Target due:All change3. Why would there sometimes be a third political party involved in the government?The population grew.O There may be a large number of candidates.O Someone might want to be different.Someone's views may not fit into either of the two main political parties. A school librarian ordered new books for the library. Of the new books ordered 1/3 are science and 2/5 are biography, and the rest of the books are friction. What fraction of the book ordered are friction? Cite particularly the difference in the synthesis of the two biomolecules in animals and plants. PLZ HELP WILL GIVE BRAINLIESTThe United States severed diplomatic relation with Cuba in 1961 for all the following reasons exept ( there can be more than one answer and I highly doubt there is only one)1. Cubans seized American-owned businesses2. Cuba kept the soviet-made missiles3. Cuba became a Communist country 4. Cuba was receiving aid from the Soviet Union What is a coefficient? Give me an example. PLEASE ANSWER QUICKWhat can an individual do to prevent a possible health concern when exercising outdoors?Question 1 options:Regularly buy new workout clothes.Add workout songs to an MP3 player.Read reviews of elliptical machines.Apply sun screen before going out. Which option uses parentheses correctly?A. Mark Twain whose (real name) was Samuel Langhorne Clemens isa famous American author.B. Mark Twain whose real name was Samuel Langhorne Clemens isa (famous) American author.C. (Mark Twain) whose real name was Samuel Langhorne Clemens isa famous American author.D. Mark Twain (whose real name was Samuel Langhorne Clemens) isa famous American author. PLEASE HELP AND BE FRFR Ihmani is going to the state fair. Each ticket for carnival games is $0.50, but she has to pay a $10 admission fee. Plot this scenario on the graph below. Does it show a proportional relationship? Why or why not? Maggie stacked a box that was 83 centimeters (cm) tall on top of a box that was 128 centimeters. How tall was the stack of boxes in meters and centimeters? Ms. Anderson deposits $7,000 into a savings account that pays a simple interest of 2% per year. Which of the following would be the total amount in her savings account at the end of 3 years?