Which of the following is NOT a way to build on your strengths?
A.
eating a healthy, well-balanced diet
B.
only participating in sports you are good at
C.
learning as much as possible about the sport
D.
studying and learning from other players

Answers

Answer 1

Answer: the answer is B

Explanation: You can't raise your strengths if you only do sports you are good at:)

Answer 2
The answer of this question is B.

Related Questions

define the computer with its workintg principple

Answers

Explanation:

Computer is an electronic device that is designed to work with information.

WORKING PRINCIPLE OF COMPUTER

a.It accepts data and instructions by way of input,

b.It stores data,

c.It can process data as required by the user,

d.It gives result in the form of output,

e.It controls all operations inside a computer.

I hope it will help you

ILL GIVE BRAINLIEST HELLP.
in windows 8, the _____ manager is the app that allows you to manage your hardware drivers on your computer .
a. device
b. drivers
c.system
d.utilities

Answers

Answer:

Device Manager

Explanation:

The Device Manager is used to check for hardware that have been installed on your system such as RAM, CPU, GPU etc. However, it has the option to update drivers for any hardware that you such desire.

¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal

Answers

A medida que crece un árbol, la mayoría de las células de madera se alinean con el eje del tronco, la rama o la raíz. Estas células están compuestas por haces largos y delgados de fibras, aproximadamente 100 veces más largas que anchas. Esto es lo que le da a la madera su dirección de grano.

La madera es más fuerte en la dirección paralela al grano. Debido a esto, las propiedades de resistencia y rigidez de los paneles estructurales de madera son mayores en la dirección paralela al eje de resistencia que perpendicular a él

what are the key features of the point-to-point protocol (ppp)? (choose three) can authenticate devices on both ends of the link. can be used on both synchronous and asynchronous serial links. establishes, manages, and tears down a call. does not carry ip as a payload

Answers

C, a replacement for the programming language B, was initially created by Ritchie at Bell Labs between 1972 and 1973 to create utilities for Unix.

Thus, It was used to re-implement the Unix operating system's kernel. C increasingly gained popularity in the 1980s.

With C compilers available for almost all current computer architectures and operating systems, it has grown to be one of the most popular programming languages.

The imperative procedural language C has a static type system and supports recursion, lexical variable scoping, and structured programming. It was intended to be compiled, with minimal runtime assistance, to offer low-level memory access and language constructs that easily map to machine instructions.

Thus, C, a replacement for the programming language B, was initially created by Ritchie at Bell Labs between 1972 and 1973 to create utilities for Unix.

Learn more about C, refer to the link:

https://brainly.com/question/30905580

#SPJ4

A(n) ____ is system software. Group of answer choices word processing program presentation graphics program operating system spreadsheet program

Answers

An operating system is a system software.

What is a System software?

A Systems software are programs that provide  resources to manage the computer  by providing a platform to run its  hardware and application programs.

Types of System software includes:

application programsdevice driversoperating systems.

An Operating system, (OS) is a system software that controls the  computer hardware and  software programs by  directing the processing of programs within a platform.

Learn more on Operating systems:https://brainly.com/question/4926335

At the lowest level, what is all digital data represented by?
a. Objects
b. Bits
c. Hexadecimal color formatting
d. Alphanumeric characters

Answers

At the lowest level, all digital data represented by Bits. The correct option is B.

Digital data is represented by a series of 0s and 1s, which are called bits. Each bit represents a single piece of information and can have two possible values - either 0 or 1. These bits are then used to represent different types of data such as text, images, audio, and video.

Digital data is stored and processed using binary code, which is a system of representing information using only two digits - 0 and 1. Each digit is known as a bit, and a group of eight bits is called a byte. The combination of these bits and bytes is used to represent all kinds of digital information.

To know more about data visit:-

https://brainly.com/question/30051017

#SPJ11

write a function named distance that takes two floating point numbers as parameters representing the (x, y) coordinates of a point in a 2d space. define your distance method to return the euclidean distance between the input point and the point (14.8, 13.2).

Answers

A function named distance that takes two floating point numbers as parameters representing the (x, y) coordinates of a point in a 2d space. is given below:

What is function?

A function is a block of code that performs a specific task. It is self-contained, reusable and can be called from anywhere in a program. Functions are fundamental to the programming language, allowing code to be organized into smaller, more manageable pieces. Functions can take parameters, which are values passed to them for processing. They can also return values, which can be used by other parts of the program.

def distance(x, y):

 # Euclidean distance formula is used to calculate the distance between two points.

 # The formula is based on the Pythagorean theorem, which states that the square of the hypotenuse (the longest side of a right triangle) is equal to the sum of the squares of the other two sides.

 return ((x - 14.8)**2 + (y - 13.2)**2)**0.5

# The distance function takes two floating point numbers as parameters representing the (x, y) coordinates of a point in a 2d space.

# The function returns the euclidean distance between the input point and the point (14.8, 13.2).

To learn more about function
https://brainly.com/question/179886
#SPJ1

Find solutions for your homework
Find solutions for your homework
engineeringcomputer sciencecomputer science questions and answersthe goal of this assignment is to write an alternative implementation of the list abstract data type: the linked list. your implementation will support all of the same functionality as the arraylist implemented in class 1) begin by creating a new class, linkedlist, that implements the generic list interface that was created in class. your new class must
Question: The Goal Of This Assignment Is To Write An Alternative Implementation Of The List Abstract Data Type: The Linked List. Your Implementation Will Support All Of The Same Functionality As The ArrayList Implemented In Class 1) Begin By Creating A New Class, LinkedList, That Implements The Generic List Interface That Was Created In Class. Your New Class Must
The goal of this assignment is to write an alternative implementation of the List abstract data
type: the Linked List. Your implementation will support all of the same functionality as the
ArrayList implemented in class
1)
Begin by creating a new class, LinkedList, that implements the generic List interface that was created in class. Your new class must also be fully generic. For now, just stub out all of the methods.
2. LinkedList class will not use arrays in any way. Instead, you will store values in a linked sequence of nodes. Use the same generic Node class that was used in the NodeQueue created in class. Add the following fields to your class:
a. A head Node.
b. A tail Node.
c. The current size of the list.
3. Create a parameterless constructor that initializes all three fields. The head and tail
should both initially be null, and the size should be 0.
4. The easiest method to implement is size(); simply return the current size of the list.
5. The next easiest method to implement is the append(E value) method.
a. Create a new Node to hold the new value.
b. If the size of the list is 0, the new Node becomes both the head and tail of the list.
c. Otherwise, the new Node becomes the new tail. (Remember to set the new Node as the current tail's next Node before changing the tail)
d. Increment size.
6. The get(int index) method is slightly more complex to implement than the other methods that you will have implemented so far. This is because a linked sequence of nodes does not support random access - there is no way to jump directly to a specific node in the sequence. Instead, you need to "walk the list" by starting at the head and counting nodes until you arrive at the correct index.
You can accomplish this by creating a counter that starts at 0 and, beginning at the head, moving from one node to the next. Each time you move to the next node, increment the counter. When the counter is equal to the index, you have found the right node. If you reach the end of the list first, you should throw a java.lang.IndexOutOfBoundsException.
7. Implement the set(int index, E value) method. You will use an algorithm very similar to the one in the get(int index) method. Note that you will need to modify the Node class so that you can change the value stored in the Node

Answers

To implement the LinkedList class, follow the steps provided:

1. Create a new class called LinkedList that implements the generic List interface.

2. Define generic type parameters for the LinkedList class.

3. Create two instance variables: `head` and `tail` of type Node<T>, and `size` of type int. Initialize `head` and `tail` as null, and `size` as 0 in the parameterless constructor.

4. Implement the `size()` method to return the current size of the list (i.e., the value of `size`).

5. Implement the `append(E value)` method:

  a. Create a new Node<T> with the given value.

  b. If the size of the list is 0, set both `head` and `tail` to the new Node.

  c. Otherwise, set the current `tail`'s next Node to the new Node and update `tail` to the new Node.

  d. Increment `size`.

6. Implement the `get(int index)` method:

  a. Check if the index is within valid bounds (0 <= index < size). If not, throw an IndexOutOfBoundsException.

  b. Create a variable `current` and set it to `head`.

  c. Iterate through the list using a loop, incrementing a counter until reaching the desired index or the end of the list.

  d. If the desired index is found, return the value of the `current` Node.

  e. If the end of the list is reached before the desired index, throw an IndexOutOfBoundsException.

7. Implement the `set(int index, E value)` method:

  a. Follow the same steps as the `get(int index)` method to validate the index.

  b. Once the desired index is found, update the value of the `current` Node to the given value.

For more such questions LinkedList,click on

https://brainly.com/question/12949986

#SPJ8

which one is not true? in the modeling phase of a dm process, a proper algorithm is selected based on: group of answer choices available data analysts' skills the available computational time the type and nature of data the type of problem we aim to solve

Answers

The option that is not true  in the modeling phase of a dm process, a proper algorithm is selected based on option available data analysts' skills.

What does modeling DM's phase entail?

Six phases make up the life cycle model, and arrows show the most significant and common dependencies among them. There is no set order to the phases. In actuality, projects frequently switch back and forth between phases as needed. The CRISP-DM paradigm is adaptable and simple to adjust.

When describing the procedures used to address a specific problem, modeling is a phrase that is frequently used in machine learning (ML).

Therefore, Specific modeling algorithms are chosen and applied to the data during the project's modeling phase. Based on the nature of the question and the desired outputs, specific algorithms are chosen for use in the data mining process.

Learn more about  data analyst from

https://brainly.com/question/28788002
#SPJ1

Two common AAA server solutions are RADIUS and TACACS+.
Match the AAA server solutions on the left with the appropriate descriptions on the right. (Each server solution may be used more than once.)

a. RADIUS
b. TACACS+
c. RADIUS
d. TACACS+
e. TACACS+
f. RADIUS

Answers

RADIUS and TACACS+ are two popular methods for AAA servers. integrates authorization, identification, and accounting: Using TCP port 49 is RADIUS TACACS+.

combines accounting, authorization, and identification: RADIUS

TACACS+ uses TCP port 49.

between the client and the server, does not send passwords in clear text:

RADIUS

three protocols, one for each of authentication, authorization, and accounting are provided: TACACS+

the entire packet content is encrypted, not just the authentication packets: TACACS+

use UDP ports 1812 and 1813, which makes it susceptible to buffer overflow attacks: RADIUS

An enterprise's authentication, authorization, and accounting (AAA) needs are met by a AAA server, a server application that manages user requests for access to computer resources.

The AAA server often communicates with gateway and network access servers, as well as databases and directories containing user data. The current protocol for interacting with a AAA server is called Remote Authentication Dial-In User Service (RADIUS).

Learn more about AAA servers here:

https://brainly.com/question/14642412

#SPJ4

Which item best describes the world wide web consortium (w3c)? the group that owns the internet a web content rating organization the group that invented the internet a web standards organization.

Answers

The item that best describes the world wide web consortium  is option b: a web content rating organization.

What is the purpose of the W3C World Wide Web Consortium?

In order to create Web standards, member organizations, a full-time staff, and the general public collaborate inside the World Wide Web Consortium (W3C). W3C's goal is to guide the Web to its full potential under the direction of CEO Jeffrey Jaffe and Web creator and Director Tim Berners-Lee.

Hence, Global Web Consortium (W3C) an international group that creates open standards to guarantee the web's long-term expansion. internet browser enables access to the World Wide Web for users (URL)

Learn more about world wide web consortium from

https://brainly.com/question/11397745
#SPJ1

what is an example of an absolute cell reference​

Answers

Answer:

Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.

Explanation:

write a brief note on computer monitor

Answers

Answer:

A computer monitor is an electronic device that displays digital images generated by a computer's graphics card. It is one of the essential components of a computer system, allowing users to interact with the computer and view its output. Monitors come in various sizes, resolutions, and display technologies such as LCD, LED, OLED, and CRT.

Modern computer monitors usually have a flat-panel display, which is thinner and consumes less power than the older CRT (cathode ray tube) monitors. Monitors can be connected to the computer through various interfaces, such as VGA, DVI, HDMI, and DisplayPort, and some models have built-in speakers or USB ports for added functionality.

The resolution of a monitor determines the number of pixels it can display horizontally and vertically, with higher resolutions providing more screen real estate and sharper images. Refresh rate is another important factor, with higher refresh rates allowing for smoother motion and reducing eye strain.

In summary, a computer monitor is an essential component of a computer system that displays visual output to the user, and choosing the right monitor for your needs depends on factors such as size, resolution, display technology, and connectivity options.

The two primary methods of programming in use today are:________
a. desktop and mobile
b. procedural and object-oriented
c. practical and theoretical
d. hardware and software

Answers

The two primary methods of programming in use today are: b. Procedural and object-oriented.

What are the two primary methods of programming?

The procedural programming means a linear approach where instructions are executed in order while object-oriented programming is an approach that focuses on objects and their interactions to solve a problem.

Both methods have their strengths, weaknesses and the choice of method depends on the task at hand and the preferences of the programmer. Understanding both approaches is essential for any programmer to write efficient and effective code.

Read more about programming

brainly.com/question/23275071

#SPJ1

T or F: While a computer or mobile device is running, the operating system remains in memory.

Answers

While a computer or mobile device is running, the operating system remains in memory. It is true. The operating system is responsible for managing the computer's hardware, software, and resources, so it needs to be constantly available to perform these tasks.

During the operation of a computer or mobile device, the operating system remains in memory, ensuring efficient management of hardware, software, and resources.

It acts as an intermediary between hardware and software components, abstracting complexities for software applications. The operating system handles tasks such as resource allocation, multitasking, user interface, and error handling.

It provides various services like file management, networking, and security. In memory, the operating system can quickly respond to user and software needs, allocating resources and performing system operations.

While in sleep mode or turned off, the operating system is inactive until powered on again. Its continuous presence in memory is vital for the proper functioning and performance of the device.

Learn more about operating system:

https://brainly.com/question/6689423

#SPJ11

What is a semiconductor

Answers

A semiconductor material has an electrical conductivity value falling between that of a conductor, such as metallic copper, and an insulator, such as glass. Its resistivity falls as its temperature rises; metals behave in the opposite way. I hope this helps and have a great day! (Also brainliest would be appreciated but you don’t have to) :)

Answer:

Explanation:

Semiconductors are materials which have a conductivity between conductors  and nonconductors or insulators.

Semiconductors can be pure elements

Consider the following pairs of items: a. Smartphones and chargers b. MP3 players and earphones c. Regular bikes and electric bikes d. beef and pork e. air-travel and salt Which of the pairs listed will likely have a positive cross-price elasticity? a and b only c and d only e only a,b, and c only

Answers

The pairs that are likely to have a positive cross-price elasticity are a) smartphones and chargers, b) MP3 players and earphones, and c) regular bikes and electric bikes.

Cross-price elasticity measures the responsiveness of demand for one good to changes in the price of another good. A positive cross-price elasticity indicates that the two goods are substitutes, meaning that an increase in the price of one good lead to an increase in the demand for the other good.

a) Smartphones and chargers: These goods are complementary, as smartphones require chargers for operation. When the price of smartphones increases, the demand for chargers is also likely to increase, leading to a positive cross-price elasticity.

b) MP3 players and earphones: MP3 players and earphones are typically used together, and an increase in the price of MP3 players may lead to an increase in the demand for earphones. Thus, there is a positive cross-price elasticity between these two goods.

c) Regular bikes and electric bikes: Regular bikes and electric bikes serve a similar purpose, and consumers may choose between these two.

To learn more about MP3 visit:

brainly.com/question/14588170

#SPJ11

A program is designed to determine the minimum value in a list of positive numberscalled numlist. The following program was writtenvar minimum = MISSING CODEfor(var i = lo; i < numlist.length; i++){if (numList[1] < minimum)minimum = numList[1];console.log("The minimum is" - minimum);Which of the following can be used to replace ISSING CODE> so that the program works as intended for every possible list of positive numbers?

Answers

The code var minimum = numList[0] can be used to replace MISSING CODE so that the program works as intended for every possible list of positive numbers.

The following code can be used in place of MISSING CODE to find the least value in numlist, a list of positive numbers, so that the programme operates as intended for every conceivable list of positive numbers:

MAX VALUE;

The biggest positive number that JavaScript may represent is indicated by the Number MAX VALUE property. The programme will guarantee that any positive number in numlist that is smaller than minimum will be appropriately assigned as the minimum value by initialising the minimum variable with this value. The Number.MAX VALUE property displays the greatest positive number that can be represented in JavaScript. Every positive integer in numlist that is smaller than minimum will be correctly allocated as the minimum, the software will ensure.

For more questions like value visit the link below:

https://brainly.com/question/30089001

#SPJ11

we consider vsfs. we assume that the starting affress of the inode region is 54kb and inode object size is 512b. for inode 74, what is its physical address in terms of byte position.

Answers

The physical address, expressed in bytes, is 5,44,512 according to the stated assertion.

Address and data: what are they?

When referring to a decentralised or other intranet or database, a data address is a series of alphanumeric characters that can only be accessed with the knowledge of or custody of a private key in order to enable for transaction data on the network or database.

An addressing in a memory is what?

A memory is a name to something like a particular memory region used by hardware and software at varying scales in computing. Memory addresses are remedied digit sequences that are often represented and used as unsigned integers.

To know more about Address visit:

https://brainly.com/question/29506804

#SPJ4

The complete question is-

We consider vsfs. We assume that the starting address of the inode region is 512KB and inode object size is 256B. For inode 79, what is its physical address in terms of byte position? Fill in the blank with an integer value.

There are 3 types of relationships between classes: pure association (dependence), aggregation and generalization. (10) indicate type of relationship the definitions of classes are described (10) draw class diagram . class K class D: public K (float s: (int t public: public: class M

Answers

The relationship between classes K and D can be described as generalization where class D inherits from class K. The relationship between classes D and M can be described as pure association as there is a relationship between the two classes but no ownership or containment involved.

What are the types of relationships between classes K, D, and M?

In object-oriented programming, relationships between classes can be categorized into different types. In the given scenario, the relationship between classes K and D is one of generalization.

The relationship between classes D and M is a pure association or dependence. This type of relationship indicates that there is a connection or interaction between the two classes, but no ownership or containment is involved.

Read more about relationships

brainly.com/question/10286547

#SPJ4

Classify the following skills: communication, creativity, and independence.

Hard skills
Interpersonal skills
People skills
Soft skills

Answers

Answer:

Communication, creativity, and independence are people skill

Explanation:

Soft skills depict the quality of a person and classify his/her  personality trait or habit.

Communication - Interpersonal skill

Interpersonal skill allows one to interact and communicate with others effortlessly.

Both soft skill and interpersonal skill comes under the umbrella term i.e people skill.

Hence, communication, creativity, and independence are people skill

Answer:

It's not people skills I got it wrong on my test

Explanation:

Which Creative Commons license type allows others to use and build upon work non-commercially, provided that they credit original author and maintain the same licensing?

Answers

Answer:

Creative Commons license type allows others to use and build upon work non-commercially, provided that they credit original author and maintain the same licensing is described below in detail.

Explanation:

Attribution-Non financially-ShareAlike

This permission lets others adapt, remix, and develop upon your work non-financially, as long as they charge you and license their new inventions under identical times. There are six separate license classes, scheduled from most to least licensed. the material in any mechanism or arrangement, so long as attribution is given to the originator.

32. Describe how symmetric encryption and decryption works.

Answers

Symmetric encryption and decryption is a type of cryptography in which the same key is used to both encrypt and decrypt data.

The process involves taking plain text or unencrypted data and using a symmetric algorithm to transform it into ciphertext or encrypted data. The key used to encrypt the data is also used to decrypt it, which means that both parties must have access to the same key in order to securely communicate. The symmetric key is kept secret to prevent unauthorized access to the data. When the encrypted data is received, the receiver uses the same key to decrypt it back into plain text. This process ensures that only the intended recipient can access the original message or data. Overall, symmetric encryption and decryption provides a secure method of communication and data transfer.

learn more about Symmetric encryption here:

https://brainly.com/question/15187715

#SPJ11

Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is this? A. NIC B. hub C. modem D. switch E. bridge

Answers

Answer:

B. hub

Explanation:

Hub is a device that connects two or more computers together to make a Local Area Connection (LAN). It receives message and sends it to every computer on the network through a hub cables plugged into it from each computer. It enables each individual computer to partake in the message transfer process and each users can listen to the information. It is typically used at the centre of a star network and it is mostly regarded as an unsecured network.

Answer:

b

Explanation:

Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo

Answers

Answer:

Una red informática es una fusión de varios sistemas electrónicos técnicos, principalmente independientes que permite que los sistemas individuales se comuniquen entre sí. El objetivo aquí es el intercambio de recursos como impresoras de red, servidores, archivos y bases de datos.  

La estructura de red más conocida es Internet, y los protocolos a través de los cuales se transmite la información más conocidos son el TCP (Protocolo de control de transmisión) y el IP (Protocolo de Internet), pero varios otros protocolos también desempeñan funciones importantes en Internet. Internet en sí no es una red homogénea, sino que consta de un gran número de subredes, algunas de las cuales tienen diseños muy diferentes, que solo tienen en común las capas de protocolo superiores y que manejan la transmisión de datos de usuario en las capas de protocolo inferiores en muy diferentes caminos.

what can accommodate most file formats? btw there are no answer choices

Answers

Answer:.doc and .docx - Microsoft Word file.

.odt - OpenOffice Writer document file.

.pdf - PDF file.

.rtf - Rich Text Format.

.tex - A LaTeX document file.

.txt - Plain text file.

.wpd - WordPerfect documen

Explanation:

a bubble sort is being used to arrange the following set of numbers in ascending order: 7 5 3 9 2 6 after the first pass of the sort is completed, what order will the data be in?

Answers

After the first pass of the Bubble Sort algorithm, the largest number in the set will "bubble" up to the end of the list.

Here's the step-by-step process of the first pass:

Compare 7 and 5. Since 7 is greater than 5, swap them: 5 7 3 9 2 6

Compare 7 and 3. Since 7 is greater than 3, swap them: 5 3 7 9 2 6

Compare 7 and 9. Since 7 is smaller than 9, no swap is needed: 5 3 7 9 2 6

Compare 9 and 2. Since 9 is greater than 2, swap them: 5 3 7 2 9 6

Compare 9 and 6. Since 9 is greater than 6, swap them: 5 3 7 2 6 9

After the first pass, the largest number (9) has moved to the end of the list. The order of the data will be: 5 3 7 2 6 9During the first pass of the Bubble Sort algorithm on the given set of numbers (7, 5, 3, 9, 2, 6), adjacent pairs of numbers are compared and swapped if necessary. After the first pass, the largest number "bubbles" up to the end of the list. In this case, 9 is the largest number, and it moves to the end. The resulting order after the first pass is 5, 3, 7, 2, 6, 9. Bubble Sort continues with subsequent passes until the entire list is sorted in ascending order.

Learn more about bubble sort here : brainly.com/question/30395481
#SPJ11

which of the following is true about the difference between a worm and a virus?

Answers

A worm is a standalone malware program that can replicate itself and spread across networks without requiring a host program or user action, while a virus is a malware program that attaches itself to a legitimate program or file and requires a host program or user action to replicate and spread.

There are several differences between a worm and a virus:

Method of propagation: A worm is a standalone program that can spread independently over a network or through various communication channels, such as email or instant messaging. In contrast, a virus needs a host file or program to attach itself and requires user action, such as opening an infected file or executing a program, to spread.

Self-replication: Worms have the ability to self-replicate and spread automatically, often without the user's knowledge. Viruses, on the other hand, rely on the user's actions to propagate by infecting files or programs and spreading when those files or programs are shared or executed.

Payload and behavior: Worms primarily focus on spreading themselves and creating network-based disruptions. They often exploit vulnerabilities in operating systems or network protocols. Viruses, on the other hand, typically have a specific payload or malicious code attached to them.

Detection and removal: Due to their self-replicating and spreading nature, worms are usually easier to detect and remove. Antivirus software and network security measures can often identify and block known worm signatures. Viruses can be more challenging to detect and remove, as they can hide within legitimate files or programs and may require specialized antivirus tools or manual removal procedures.

Overall, the key differences lie in their methods of propagation, self-replication abilities, payloads, and impact on systems. Understanding these distinctions helps in implementing appropriate security measures and response strategies to mitigate the risks associated with worms and viruses.

The correct question should be :

What are the differences between a worm and a virus?

To learn more about virus visit : https://brainly.com/question/26128220

#SPJ11

here is something cool

Answers

cool beans s s s s s s s s

Answer:

Ok

Explanation:

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Other Questions
Depending on the study, it is sometimes necessary for psychologists to be deceptive. which describes the missouri comprimise (comprimise of 1820) and the comprimise of 1850 had in common I'm being timed hurry please!Thank u! Organic material provides nitrogen for plants. Which soil component contributes the most nitrogen to plants? O clay O humus O sand O slit Which structure does the author use for the passage? A. example B. cause and effect C. compare and contrast D. sequence of events A _____ is an attempt to directly measure whether the independent variable manipulation has the intended effect on research participants Which of the following ergogenic aids increases the risk for acromegaly?(A) HMB(B) creatine(C) octacosanol(D) human growth hormone what is xml, and why is it important? provide an example of how xml might be used that is different from the book. How can you identify pesticides in food?. planning photogenic and interesting events and granting favors to reporters are part of political campaigns' efforts to do which of the following? Find the value of x 116 degrees and 33 degrees How did trade impact the development of the West African kingdoms? Check all that apply.West Africa had rich resources of gold and salt.West African rulers taxed all trade caravans crossing their territories.The Islamic faith was introduced to the region by Arab traders.Europeans had little interest in West African trade goods, hurting African economies.Arab traders refused to travel to West Africa, preferring to stay north of the Sahara. 1.Which of these expressions is equivalent to 3(x - 2)?A.3x 6B.3x2C.3x + 2D.3x + 6 how many hydrogens are three bonds away from ha in structure 1 Let A = {0, 1, 2, 3 } and define a relation R as followsR = {(0,0), (0,1), (0,3), (1,0), (1,1), (2,2), (3,0), (3,3)}.Is R reflexive, symmetric and transitive ? Use bond enthalpies (Table 8.4 in the textbook) to estimate the enthalpy change for each of the following reactions.H2C=O(g)+HCl(g)H3COCl(g)H2O2(g)+2CO(g)H2(g)+2CO2(g)3H2C=CH2(g)C6H12(g) A family spends 3/7 of their monthly incomeon food,5/14on clothing and 1/5on rent.What fraction of the family's income isspent on other things? If in a particularmonth, the family spends GH&2,400 onother things, how much did the familyspend on clothing? What was the family'sincome for the month. Both Thank You, Mam and The Strangers That Came to Town are stories that deal with compassion. Which statement best explains how compassion is treated the two texts?A. In Thank You, Mam, Mrs. Jones chooses to be understanding toward Roger. In The Strangers That Came to Town, the community recognizes how it has misjudged the Duvitch family. B. In Thank You, Mam, Mrs. Jones forgives Roger. In The Strangers That Came to Town, the Duvitch family refuses to forgive the community.C. In Thank You, Mam, Mrs. Jones reprimands Roger. In The Strangers That Came to Town, the community shuns the Duvitch family. D. In Thank You, Mam, Mrs. Jones is kind to Roger. In The Strangers That Came to Town, the children in the community bully the Duvitch children.Thank you for helping me :P DUKE Manufacturing is preparing its master budget for the first quarter of the upcoming year. The following data pertain to DUKE Manufacturings operations:Current Assets as of December 31 (prior year)Cash$4,500Accounts receivable, net$50,000Inventory$15,000Property, plant, and equipment, net$122,500Accounts payable$42,400Capital stock$126,000Retained earnings$22,920Actual sales in December were $70,000. Selling price per units is projected to remain stable at $10 per unit throughout the budget period. Sales for the first five months of the upcoming year are budgeted to be as follows:January8,300February9,200March9,400April9,700May8,900DUKE Manufacturing has a policy that states that each months ending inventory of finished goods should be 25% of the following months sales.Two pounds of direct material is needed per unit at $2 per pound. Ending inventory of direct materials should be 10% of next months production needs.Most of the labor at the manufacturing facility is indirect, but there is some direct labor incurre The direct labor hours per unit is 0.02. The direct labor rate per hour is $10 per hour. All direct labor is paid for in the month in which the work is performed.Monthly manufacturing overhead costs are $5,000 for factory rent, $1,000 for depreciation, and $2,000 for other fixed manufacturing expenses, and $1.20 per unit for variable manufacturing overhead.Non-manufacturing expenses are budgeted to be $1 per unit sold plus fixed operating expenses of $1,400 per month.Sales are 30% cash and 70% credit. All credit sales are collected in the month following the sale.Of each months direct material purchases, 10% are paid for in the month of purchase, while the remainder is paid for in the month following purchase.All manufacturing overhead and non-manufacturing expenses are paid in the month in which they are incurred, except for depreciation.Computer equipment for the administrative offices will be purchased in the upcoming quarter. In January, DUKE Manufacturing will purchase equipment for $6,200 (cash), while Februarys cash expenditure will be $12,000 and Marchs cash expenditure will be $16,800.Depreciation on the building and equipment for the general and administrative offices is budgeted to be $2,700 for the entire quarter, which includes deprecation on new acquisitions.DUKE Manufacturing has a policy that the ending cash balance in each month must be at least $4,000. It has a line of credit with a local bank. The company can borrow in increments of $1,000 at the beginning of each month, up to a total outstanding loan balance of $160,000. The interest rate on these loan is 2% per month simple interest (not compounded). DUKE Manufacturing would pay down on the line of credit balance if it has excess funds at the end of the quarter. The company would also pay the accumulated interest at the end of the quarter on the funds borrowed during the quarter.The companys income tax rate is projected to be 30% of operating income less interest expense. The company pays $11,000 cash at the end of February in estimated taxes. construct the 80% confidence interval for the average amount spent by 8 to 11 year olds on a trip to the mall. assume the population is approximately normal. step 3 of 4: find the critical value that should be used in constructing the confidence interval. round your answer to three decimal places. In the U.S. in the 1830s, ________ miles of track had been laid. By the 1860s, ___________ miles of track had been laid.a.40,000 and 30b.30,000 and 30c.40 and 30,000d.400 and 40,000