how to use chatgpt to help me with beahvior interview questions like give me an example of a time when you were data-driven

Answers

Answer 1

ChatGPT is a conversational AI platform that can help you practice your answers to behavioral interview questions.

How to use ChatGPT

To use it, you would simply type in your question, such as "Give me an example of a time when you were data-driven," and it will generate a response for you. From there, you can continue the conversation, asking follow-up questions or clarifying points as needed.

ChatGPT can also help you craft an answer to the question from scratch, providing you with prompts and suggestions to help you organize and explain your thoughts.

You can then continue the conversation, ask follow-up questions, or use it to craft an answer from scratch with prompts and suggestions.

Learn more about ChatGPT here:

https://brainly.com/question/30947154

#SPJ1


Related Questions

Does Your company utilize an ERP system or the Cloud in any way? Be sure to read the supplemental material on Hubstor and cloud storage. If so, which one? Is it easy to use? share your real world experience. If your company does not utilize an ERP system or the Cloud do you think an ERP system or Cloud Computuing would be useful in your company? Why?

Answers

Yes, our company utilizes a cloud-based ERP system for efficient and streamlined operations.

In today's digital age, businesses are increasingly relying on technology to enhance their productivity and streamline their operations. Our company recognizes the importance of leveraging technology to stay competitive, and therefore, we have implemented a cloud-based ERP system.

An ERP system, which stands for Enterprise Resource Planning, integrates various core business functions such as finance, human resources, inventory management, and customer relationship management into a centralized system. By utilizing a cloud-based ERP system, our company benefits from several advantages.

Firstly, the cloud-based nature of our ERP system provides us with the flexibility to access critical business data and functions from anywhere, at any time. This enables our employees to work remotely and collaborate seamlessly, improving overall productivity and efficiency.

Secondly, the cloud-based ERP system eliminates the need for extensive hardware infrastructure and maintenance costs. We no longer need to invest in expensive servers or worry about software updates and backups, as these responsibilities are handled by the ERP system provider.

This allows us to allocate resources to other areas of our business, ultimately improving our bottom line.

Furthermore, the cloud-based ERP system offers scalability, allowing us to easily adapt to the changing needs of our business. As we grow and expand, we can effortlessly add new users, modules, or functionalities to the system, ensuring that our ERP system remains aligned with our business requirements.

In terms of user experience, our cloud-based ERP system has proven to be intuitive and user-friendly. The interface is designed to be easily navigable, and the system provides comprehensive training and support to ensure smooth adoption and utilization by our employees.

Overall, the implementation of a cloud-based ERP system has greatly enhanced our company's operational efficiency, collaboration, and cost-effectiveness. It has empowered us to make data-driven decisions, streamline our processes, and focus on delivering value to our customers.

Learn more about ERP system

brainly.com/question/30158517

#SPJ11

a software application will not allow a sale to be processed if a customer is over its credit limit. this is an example of:

Answers

A parentive control is an example of software application will not allow a sale to be processed if a customer is over its credit limit.

What do you mean by software application?

An application programme (also known as a software application, application, or app for short) is a computer programme that is meant to perform a specific task that is not related to the operation of the computer itself, and is typically used by end-users. Examples include word processors, media players, and accounting software. All applications are referred to collectively by the collective noun "application software." The other major types of software are system software, which is related to computer functioning, and utility software ("utilities"). Applications can be packed with the computer and its system software or released separately, and they can be written in proprietary, open-source, or project-based code. Typically, the term "app" refers to apps for mobile devices such as phones.

To learn more about software application
https://brainly.com/question/26790316

#SPJ4

Tabs you see at the bottom of your workbook file, labeled Sheet 1, Sheet 2, and so on. You can rename the tabs.
They represent worksheets within the workbook.
File
Function
Heading
Sheet Tab

Answers

I believe the answer is Sheet Tab

I hope that helped!

What are the three most important tasks accomplished at a party’s national convention are nominating the party’s?

Answers

The  three most important tasks are:

The selection and naming the party's presidential and vice-presidential candidatesThe act of promoting party unityThe  adopting of the party's platform.

What is the task of a national convention?

The formal aim of such a convention is to take the party's nominee for any popular election such as the President and also to adopt a idea of party principles and goals.

Hence, the  three most important tasks are:

The selection and naming the party's presidential and vice-presidential candidatesThe act of promoting party unityThe  adopting of the party's platform.

Learn more about  national convention from

https://brainly.com/question/2199497

#SPJ1

Fill in the blanks to complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0. Complete the code so that a function call like “countdown(2)” will return the numbers “2,1,0”.

Answers

Answer:

Check the code down below

Explanation:

You can use this code:

for i in range(5,-1,-1):

print(i)

This will print:

5

4

3

2

1

0

5 is changeable by the way!

The complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0 is in the explanation part.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Here is the code to complete the “countdown” function:

def countdown(start):

   for i in range(start, -1, -1):

       print(i, end=",")

The countdown function takes an integer start as an argument and counts down from start to 0 using a for loop.

The range function is used to generate an integer sequence from start to 0, with a step size of -1. (i.e., counting backwards).

Thus, each integer in the sequence, separated by commas, is printed using the print function.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

How does scarcity influence the price of a product?
A)
It causes inflation.
B)
It causes deflation.
C)
It causes a recession,
D)
It does not impact the price.

Answers

Answer:

A

Explanation:

As a product becomes more scarce (less abundant), its value increases. Inflation is described as an increase in price and a decrease in value of money. An item naturally becomes more costly as its exclusivity grows.

The answer is a










Bsajsjahjssjs

How has technology effected the way we communicate?

Answers

Indeed it has.

Advancements in technology and changes in communication generally go hand in hand. Landlines displaced the telegraph and cell phones replaced landlines. The arrival of the internet opened new doors of personal communication. E-mails replaced postal mails and social media took the place of text messages.

Communication technology, such as mobile phones, email, text messaging, instant messaging and social networking have had a profound effect on nearly everyone's business and personal lives. While technology makes communications faster and easier, at times it can also be intrusive and misinterpreted.

Increased isolation, reduced social interaction and social skills, and increased human-to-machine interactions are all a result of an overuse of technology, which has created a wall between many people globally.

Technology has the ability to enhance daily living from appliances to mobile devices and computers, technology is everywhere. ... In the rise of digital communication, technology can actually help communication skills because it allows people to learn written communication to varying audiences.

-Astolfo

g i r l s o n l y j o i n
id= ons jcuv jke

Answers

at least 20 characters long

All variables are----------------------------------------------- help please

Answers

Answer:

variables are any characteristics that can take on different values, such as height, age, species I think

Answer

A variable basically works as a "placeholder" for anything that might change a majority of the time.

Examples

In science one may call a factor in a experiment that is subject to change a variable.

In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.

In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.

in each of the code snippets replace the ? character with the correct boolean operator, for instance <,>,

Answers

using the appropriate Boolean operator, such as,>,==,not, or not in. Each code block must run properly. Before going on to the next code snippet, run the task associated with the previous one to make sure you passed.

A code snippet is a piece of reuseable code. To maintain track of good code that might be used again in the future, such blocks of code are preserved. Think of a code snippet as a passage from a book that you occasionally wish to store for later (to quote, use the data, etc.). Place the cursor where the snippet should go in the code window, right-click to see the context menu, and choose Insert Snippet, or press CTRL + K, then X. You may then select the required snippet from the Code Snippet Picker that is presented. Press the Esc key to exit the Code Snippet Picker.

To learn more about code  click the link below:

brainly.com/question/17204194

#SPJ4

read-only memory (rom) chips have information stored in them by the manufacturer. group of answer choices true false

Answers

True: Read-only memory (rom) chips have information stored in them by the manufacturer

Read-only memory (ROM) chips are semiconductor devices that store data and instructions permanently. The information stored in ROM chips is programmed during the manufacturing process and cannot be modified or erased by normal computer operations. This means that the data contained in ROM chips remains intact even when the power supply is turned off.

ROM chips are used to store firmware, which is a type of software that is embedded in electronic devices. Firmware contains instructions and data that are essential for the device's operation. Since ROM chips are non-volatile, meaning they retain their data even without power, they are an ideal storage medium for critical system instructions and data that should not be altered.

Manufacturers program the ROM chips with the necessary information before they are incorporated into electronic devices. This information can include boot instructions, system configuration data, and pre-installed software or firmware. Once the data is written to the ROM chip, it cannot be modified by the end-user.

ROM chips come in different variants, including mask ROM, programmable ROM (PROM), erasable programmable ROM (EPROM), and electrically erasable programmable ROM (EEPROM). Each variant has its own characteristics and level of permanence or modifiability.

Learn more about Read-only memory (rom)

brainly.com/question/29518974

#SPJ11

Consider the following code segment.
int num = 5;
num *= 2;
num %= 6;
What is the value of num after the code segment is executed?
a. 1
b. 2
c. 4
d. 6
e. 10

Answers

Answer:

C. 4

Explanation:

First we are given that num=5 ...(1)

-num value is 5

num =num*2 which is [5*2] = 10 ... (2)

-num value is now (10)

num =num-6 which is [10-6] =4 ... (3)

So the final answer is 4

Steve wants to publish a portfolio online. He use Mozilla Firebug. What will it help him do?

Steve wants to publish a portfolio online. He use Mozilla Firebug. What will it help him do?

Answers

Mozilla Firebug is a web development tool used to inspect, edit, and debug HTML, CSS, and JavaScript in real-time. It is an extension of the Mozilla Firefox web browser and allows users to analyze and modify web page content on the fly.

For Steve, Firebug can be an extremely useful tool in creating and publishing his portfolio online. By using Firebug, he can inspect the HTML and CSS of his portfolio website to identify any errors, bugs, or issues that may be affecting its functionality or appearance. Additionally, he can edit the code directly within Firebug to test out new changes and see how they affect the website in real-time.

Overall, Firebug is a powerful tool for web developers like Steve who want to ensure that their website is functioning optimally and delivering the best possible user experience.

For more questions on HTML:

https://brainly.com/question/4056554

#SPJ11

____ describes the concept of spreading applications over more than one computer system. Group of answer choices

Answers

Answer:

Distributed Computing.

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task. It can be classified into the following categories;

I. Autonomic computing: it comprises of systems which are self-managed. It is similar in operations with the autonomic nervous system in humans and is used in assembly lines for optimum automated production.

II. Grid computing: it is a collection of connected computing systems that function to achieve a common goal and are mainly located at various locations. It is commonly used for seismic analysis and weather forecasting.

III. Green computing: it is a programming concept that is based on the creation and use of technology in an environmentally friendly manner, thus, it focuses on the use of recyclable resources, power and resource management and energy efficiency management.

IV. Distributed Computing: it describes the concept of spreading applications over more than one computer system.

Use the following data to answer the question. The advantage for iPhones belongs to and the advantge for iPads belongs to comparative; Gustavo; comparative; Enzo absolute; Enzo; absolute; Enzo absolut

Answers

The provided data seems to contain a list of advantages for iPhones and iPads, along with the names of individuals associated with each advantage. However, the data seems to be incomplete and contains some errors.


To answer the question accurately, we need more information or clarification on what exactly we are being asked. The data provided is not sufficient to determine the advantages for iPhones and iPads or their association with specific individuals.

It is important to have complete and accurate data to provide a clear and concise answer. If you can provide more information or clarify the question, I would be happy to assist you further.

To know more about individuals visit:

https://brainly.com/question/32647607

#SPJ11

Which of these are considered I/O devices? Check all that apply.

Answers

Answer:

Hard disk drives; Any devices that receive input or send out output are considered I/O devices. I/O devices such as speakers, web cams, and monitors.

Explanation:

The hardware used to interact with a machine by a human operator or other systems is an input/output device. As the name implies, input/output devices have the ability to provide data that is output to a computer and receive data that is input from a computer.

A hard drive is a need for all computers; they would not work without one. These days, the majority of computers contain input/output devices like a CD-RW or DVD-RW drive, a network card, and a sound card or inbuilt sound on the motherboard.

when choosing to order by, you do not need to specify desc, because it is implied. (True or False)

Answers

It is true that you do not need to explicitly state desc when selecting to sort by because it is implicit.

Is DESC the ORDER BY default?

Data is sorted using ORDER BY by default in ascending order. The keywords DESC and ASC can be used to sort the data in descending order and ascending order, respectively.

If the ASC or DESC option is not supplied with the ORDER BY command, what order of the results is displayed by default?

ASC is the default if the order is not provided. specifies that descending order should be used for the results to be returned. Declares that NULL values must be returned before non-NULL values. the order in which non-NULL values should be returned, after NULL values.

To know more about desc visit:-

https://brainly.com/question/30010549

#SPJ1

an example of a(n) ________________ protocol is smtp.
a. Internet
b. Application
c. Transport
d. Network interface

Answers

The correct option is b. An example of a(n) application protocol is smtp.

The Simple Mail Transfer Protocol (SMTP) is an example of an application protocol. It is specifically designed for the transmission of email messages over the internet. SMTP defines the rules and formats for communication between mail servers and enables the sending and receiving of emails.

Application protocols operate at the highest layer of the TCP/IP protocol stack, known as the application layer. They provide specific functionalities and services for applications to communicate with each other. SMTP, in particular, is responsible for the transfer of email messages between mail servers, facilitating the exchange of information across different email systems and networks.

SMTP works on a client-server model, where the sending mail server acts as the client and the receiving mail server acts as the server. When an email is sent, the client establishes a connection with the server and initiates a conversation using SMTP commands and responses. These commands and responses dictate the flow of information, including the sender's and recipient's addresses, the subject, and the content of the email.

In conclusion, SMTP is an application protocol that plays a crucial role in the transmission of email messages. It enables seamless communication between mail servers, allowing individuals and organizations to send and receive emails across different networks and email systems.

Learn more about smtp

brainly.com/question/32806789

#SPJ11

you're planning to install linux on a system that you've built out of spare parts. several components in the system aren't listed on your distribution's hcl. this system will be used by your team's administrative assistant to manage employee schedules, send and receive e-mail, and track employee hours. what should you do?

Answers

Each system has three components: input, process, and output. Each system contains three components in its most basic form.

What's a hardware store mean?

The physical elements or delivery mechanisms of the computer are referred to as hardware. They are what the software uses to store and execute the written instructions. The device's intangible component—its software—allows the user to communicate with its hardware and give it instructions on how to carry out particular activities.

A computer system is made up of five major hardware parts: input, processing, storage, output, and communication devices.

According to our statistics, hardware shops typically sell for between 0.37 and 0.74 times their income. Add the revenue or sales a firm generates to the valuation multiple to get the value of the company.

Each system has three components: input, process, and output. Each system contains three components in its most basic form. Input, Process, Output is what I'll refer to as this as.

Therefore, the answer is Replace the incompatible parts with supported hardware.

To learn more about hardware refer to:

https://brainly.com/question/28558426

#SPJ4

Which application would be the best choice for creating a resume?A. word processor
B. open source
C. query
D. open source

Answers

Answer: A

word processor

Explanation: :)

it’s open source . D

Your organization is in the process of negotiating an interoperability agreement (IA) with another organization. As a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and vice versa. As a security administrator, which tasks should you complete during this phase

Answers

Answer: 1. Identify how data ownership will be determined.

2 Identify how data will be

Explanation:

Following the information given in the question, as a security administrator, the tasks which should be completed during this phase are

• Identify how data ownership will be determined.

• Identify how data will be shared.

It should be noted that at this stage, resetting all passwords won't be determined yet.

Loren Truesdale
List Operations
Jan 06, 8:31:34 AM
Determine what is printed by the following code.
1
2.
3
4
values - [9, 11, 0, 12, 9, 4]
fred - 0
FOR EACH value IN values
{
if( value = 9)
{
fred - fred + value
5
on
6
7
8
9
3
DISPLAY( fred)
10

Loren TruesdaleList OperationsJan 06, 8:31:34 AMDetermine what is printed by the following code.12.34values

Answers

The output printed by the code is 18

The Code Analysis

The flow of the program is as follows:

The first line initializes a list of numbers named valuesThe second line initializes fred to 0The third line is an iteration that is repeated for all numbers in the listThe next statement is a conditional statement that ensures that all 9's in the list are added, and saved in fred

The Code Computation

Recall that, the initial value of fred is 0, and there are 2 9's in the list.

So, the computation is:

\(fred=0 + 9 + 9\)

\(fred=18\)

This means that, the last instruction on line 10 will display 18, as the output

Hence, the output printed by the code is 18

Read more about algorithms at:

https://brainly.com/question/11623795

which type of nat maps a single inside local address to a single inside global address?

Answers

The type of NAT that maps a single inside local address to a single inside global address is known as static NAT.

Static NAT establishes a permanent mapping between a private (inside local) IP address and a public (inside global) IP address. This mapping remains constant, allowing incoming traffic to be directed to a specific internal host based on the configured translation.

Static NAT is commonly used in scenarios where a particular internal resource, such as a server or a device, needs to be accessible from the external network with a dedicated public IP address. By using static NAT, a one-to-one correspondence is maintained between the internal and external addresses, ensuring that each internal address is consistently translated to a specific external address.

Static NAT is beneficial for applications or services that require a fixed, publicly accessible IP address, as it enables direct communication without any translation or sharing of IP addresses.

To learn more about static NAT visit : https://brainly.com/question/30074661

#SPJ11

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.

A ________ network has no central computer.

Answers

Answer:

Ring Networks

Explanation:

They do not have a central computer system controlling the operation of the entire network. Instead, the various computers in the network are arranged around a ring, and each computer may communicate with any other computer in the ring.

They lack a centralized computer system in charge of managing the entire network. Instead, the network's many computers are placed in a ring, and any one of them is free to speak with any other computer in the ring.

What role of ring network in central computer?

When a straightforward network is required, ring network topologies are used. They are appropriate for places that do not require particularly fast data transmission rates and where it is unlikely that the network's size or structure will change.

The data move in the shape of a ring from one node to the next. If computer A wants to transfer information to computer D, the information is first put in the packet.

Therefore, A tiny office with only a few nodes, for instance, might employ a ring network design.

Learn more about ring network here:

https://brainly.com/question/15837844

#SPJ2

Use the tracert command from er1 to answer the following questions: How many routers are in the path between er1 and er3? What is the default gateway address for er1?

Answers

The tracert command from er1 indicates that there are 4 routers in the path between er1 and er3. The default gateway address for er1 is 192.168.1.1.

When executing the tracert command from er1 to er3, the output provides a list of routers along the path. Each router is identified by its IP address. By counting the number of routers listed in the output, we can determine how many routers are in the path between er1 and er3.

Additionally, to find the default gateway address for er1, we can check the network settings of er1. The default gateway is the router's IP address that er1 uses to forward network traffic to destinations outside its own network.

Based on the tracert command output, there are 4 routers in the path between er1 and er3. This implies that the network traffic traverses 4 intermediary routers before reaching er3. The default gateway address for er1 is 192.168.1.1, which is the IP address of the router that er1 uses to send data outside of its network.

To know more about tracert command, visit

https://brainly.com/question/29568110

#SPJ11

What is the significance of XML tags?
A.) They are self-descriptive.
B.) They are predefined.
C.) They are only computer readable.
D.) They are only human readable.

Answers

Answer:

your answer would be to ur question would be B

Answer:

It is self-descriptive

Explanation:

Plato Users

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

HELP I HAVE A D RN PLEASE
Use the drop-down menus to describe how to encrypt a database with a password.

1. In Access, click Open on the File tab.

2. Select the database.

3. Click the drop-down arrow to the right of Open, and click
.

4. Click the File tab.

5. Click
, and select Encrypt with Password.

6. Enter a password when you are prompted
. Click OK.

7. Close and reopen the database.

8. To open the database again, you will need to
.

Answers

Answer:

1. Open Exclusive

2. Info

3. twice

4. enter a password

Explanation:

In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password

Which view is opened when File tab is clicked?

The Backstage View is said to be opened. Note that one can use the Backstage through the clicking of the "File" tab that can be found on the top-left hand side of the system application window.

Note that In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password.

Learn more about password from

https://brainly.com/question/17174600

#SPJ2

In the worksheet below, you want to use Data > Subtotal to show a subtotal value per sport. What must you do BEFORE applying the Subtotal function? Sort by the data in Column E.

Answers

What Must You Do Before Applying Subtotal?

Before applying the Subtotal function in the worksheet, you must first organize the data in the worksheet by the sport. This will allow the Subtotal function to group the data by sport and calculate the subtotals for each group.

How To Organize The Data?

To organize the data by sport, you can follow these steps:

Select the data range in the worksheet that you want to subtotal by sport.Go to the Data tab in the ribbon, and click on the Sort & Filter button.In the Sort & Filter menu, select the Sort A to Z option. This will sort the data alphabetically by sport.Alternatively, you can click on the Custom Sort option in the Sort & Filter menu. In the Custom Sort dialog box, select the Sport column as the column to sort by, and choose the A to Z sort order. Click on the OK button to sort the data by sport.

After organizing the data by sport, you can then apply the Subtotal function to show the subtotal values for each sport. To do this, follow these steps:

Select the data range in the worksheet that you want to subtotal by sport.

Go to the Data tab in the ribbon, and click on the Subtotal button.

In the Subtotal dialog box, select the Sport column as the column to subtotal by, and choose the function that you want to use to calculate the subtotals (e.g. SUM, AVERAGE, etc.). Click on the OK button to apply the subtotals to the data.

After applying the Subtotal function, the worksheet will display a subtotal value for each sport, along with the individual data values within each sport group. This will allow you to quickly see the total value for each sport, as well as the individual data values that contribute to the subtotal.

To Know More About MS Excel, Check Out

https://brainly.in/question/41302020

#SPJ4

Other Questions
Briefly explain all three parts.(a). Briefly explain as to how you would identify whether a particular control system uses open-loop, feedback, feedforward, cascade, or ratio, control? (b). Using appropriate symbols give five exampl Can anyone plz help me out with this?I am all mixed upI also need to find the axis of symmetry as well.Thanks for the helpI appreciate it help me plzzzz asap Kendra is buying an outfit that is on sale for 20% off.The original price of the outfit is $109. What is the sale price?$130.80 $87.20 $21.80 $78.20 Investiga quin es Jupiter, el personaje que se le apareci al leador al principio delcuentoIdentifica las ideas principales y determina el tema que plantea el cuentoSegn tu punto de vista explica cual es la relacin que hay entre el titulo del cuento yel desarrollo de la historiaExplica cules caracteristicas del cuento maravilloso se cumplen Extrae ejemplostextualesQue mensaje te transmite el cuento? The area of the spreadsheet highlighted in red is the _____. cell C1 formula bar row C column C I saw the helpless Cherokees arrested and dragged from their homes, and driven at the bayonet point into the stockades. . . .On the morning of November the 17th we encountered a terrific sleet and snow storm with freezing temperatures and from that day until we reached the end of the fateful journey on March the 26th, 1839, the sufferings of the Cherokees were awful. The trail of the exiles was a trail of death. They had to sleep in the wagons and on the ground without fire. And I have known as many as twenty-two of them to die in one night of pneumonia due to ill treatment, cold, and exposure.John G. Burnett, 1890What is the main purpose of the passage?to express how nice the US troops were to the Cherokeesto help people understand how the Cherokees were treatedto help the US government justify the Indian Removal Actto help people understand the climate and weather of the West just the no. d) Anyone have goosebumps to solve it? Which element was extremely important to the moche people, as evidenced in their landscape and their artwork? what should I add to this paragraph?No one knew whether any of them would complete the race yet the 1100 mile dogsled race through the mountains and the frigid temperatures. "no one thought someone would make it in 20 days, 0 hours, 49 minutes, and 41 seconds Wilmarth won the first race in the year 1973"." last spot finisher crossed the end goal in the slowest time ever of more than 32 days in 1973".iditarod.com. What is the best summary of the passage getting to the golden age Which of these is a disadvantage of social media sites?They use words rather than pictures.Sometimes users harass or bully other users.Most people find them too difficult to use.They are unlikely to remain popular. 60 students are asked the following question in a survey:How do you travel to school?Here are the results:Travel method No of studentsWalkCycleCarBus3051510busCarComplete the pie chart to showthis information.Cycle "hitlers words were like a scourge. when he spoke of the disgrace of germany, i felt ready to spring on any enemyglancing around, i saw that his magnetism was holding these thousands as one.i was a man of 32, weary of disgust and disillusionment, a wanderer seeking a cause.a yearner after the heroic without a hero. the intense will of the man, the passion of his sincerity, seemed to flow from him into me. i experienced a feeling that could be likened only to a religious conversion .i felt sure that no-one who heard hitler that night that he was the man of destinyi had given him my heart." according to the second document, why did kurt ludecke join the nazi party? the distance a jet travels (d) varies directly with the number of hours (t) flown. a jet travels 1,350 miles in three hours write an equation that represents this direct variation Ricardo ran the 400 m race three times. His fastest time was 54.3 seconds hey slow as time was 56.1 seconds. If his average time was 55.0 seconds, what was his time for the third race? I need help with this one can an6one help me? 2x-4y How many grams of NaCl pleaseeee helpppp im not sure what this one is also please explain thanksss Which statement is true?Question 15 options:Gravity is the force of resistance to a change in position. The greater the distance between two objects, the greater this force will be.Gravity is a force that keeps objects moving in space. The less the object weighs, the further out in space gravity will pull the object.Gravity is the force of attraction between two objects with mass and is dependent on the distance between these objects.Gravity is the force that repels two objects that have opposite charges. It is dependent upon the charges of the objects. Every morning, a street vendor can buy newspapers for $2 and resell them for $2.50. Daily demand is between 6 and 10 with probabilities of 0.1,0.1,0.3,0.4 and 0.1, respectively. Blanks 1-4/a) How many newspapers should the street vendor buy based on the optimistic decision criterion (Blank 1), the conservative decision criterion (Blank 2), the minimax regret criterion (Blank 3) or the expected value criterion (Blank 4)? For example, if the decision was 6 or 7 , write "6 or 7 " Blanks 5-8/e) Now suppose that at the end of the day, each unsold newsvendor can be returned for a partial refund of $0.50. How does your new analysis change the prior decisions based on the optimistic decision criterion (Blank 5), the conservative decision criterion (Blank 6), the minimax regret criterion (Blank 7) or the expected value criterion (Blank 8)? Again, if the new decision was 6 or 7 , write "6 or 7 "