1. Explain 'Computer Ethics" ?



plz following me ​

Answers

Answer 1

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.  or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.

Explanation:


Related Questions

due to the many legal and regulatory barriers to cloud computing, often related to international data access and transport, cloud computing customers have been forced to adopt what type of deployment model that is typically more expensive and offers more restricted benefits?

Answers

Customers of cloud computing have been pushed to use private clouds due to the numerous legal and regulatory barriers to cloud computing, which are frequently connected to international data access and transport. It is often more costly and provides less advantages.

A private cloud can be hosted on-premises (on hardware operating in a datacenter owned by the firm) or at a datacenter owned and operated by a third party on the customer's behalf. On-premise vs. third-party data centers have highly distinct operating costs and responsibility structures, as you might expect. The emphasis is usually on how services are made available to a particular firm, providing only authorized users logical and/or physical access.

The hardware needed to host a private cloud on-premises may be highly expensive, requiring businesses to make a significant financial commitment before realizing any profit. They also necessitate on-site cloud architects for setup, maintenance, and management. Hosted private clouds can significantly reduce these expenses.

Learn more about private cloud here: https://brainly.com/question/24177149

#SPJ4

crisis-mapping tools collect and analyze data from social media and create instantly available information to respond to a crisis.

Answers

Crisis-mapping tools gather and assess information from social media to provide instantly available information to respond to a crisis. In this way, the information collected from social media could be utilized to determine areas most affected, injured persons, and what relief actions have already been implemented.

Crisis mapping tools have revolutionized disaster response by enabling responders to obtain, process, and distribute data more rapidly and efficiently. These instruments assist responders in determining the most affected regions and enabling them to respond accordingly. In the case of natural calamities such as floods and earthquakes, these tools assist in determining the impact of the disaster on roads, homes, infrastructure, and human life.For instance, the online platform called "Ushahidi," which means "testimony" in Swahili, was used to map crisis reports following the 2010 earthquake in Haiti. The tool was used to gather and categorize crisis data from social media, texts, and emails, providing a real-time view of the situation. It was able to aid rescue workers to locate people in need of help. Crisis mapping tools have become essential in disaster response as it provides the necessary data and information required to mitigate the impact of the crisis.

To know more about crisis-mapping tools  visit:

https://brainly.com/question/14289435

#SPJ11

One benefit of having a syllabus is that it can:

A.
show you the answers to tests in advance.

B.
tell you how to do online research.

C.
help you avoid turning in assignments late.

D.
connect you with other students.

I think it's C.

Answers

Answer:

The answer should be D I hope I helped:)

Answer:

d

Explanation:

5.if a customer intends to transmit more data than they receive, which forms of dsl would be appropriate?

Answers

If a customer intends to transmit more data than they receive, the appropriate form of DSL would be Asymmetric Digital Subscriber Line (ADSL).

ADSL provides higher upload speeds compared to download speeds, making it suitable for users who need to send more data than they receive. To use ADSL, the customer would need an ADSL modem and a subscription from a DSL service provider.

#SPJ11

Learn more about DSL: https://brainly.com/question/12859851

If a customer intends to transmit more data than they receive, Asymmetric Digital Subscriber Line (ADSL) and Symmetric Digital Subscriber Line (SDSL) are the two DSL types that would be appropriate.

The following are some distinctions between the two:ADSL (Asymmetric Digital Subscriber Line): ADSL allows for a faster download speed than upload speed, making it suitable for customers who prefer to download more content than upload. ADSL is an acronym for Asymmetric Digital Subscriber Line. The speed is determined by the type of ADSL service you have subscribed to; for instance, ADSL2+ has a speed limit of 24 Mbit/s downstream and 1 Mbit/s upstream.SDSL (Symmetric Digital Subscriber Line): SDSL is a type of DSL that provides equal upload and download speeds, making it appropriate for customers who require a balanced amount of download and upload speed. SDSL is an acronym for Symmetric Digital Subscriber Line. The speed is the same for uploading and downloading, with a range of 128 Kbps to 3 Mbps.

Learn more about data: https://brainly.com/question/179886

#SPJ11

In an email, the most critical information should be placed:.

Answers

In an email, the most critical information should be placed at the beginning or in the opening paragraph.

Placing the most critical information at the beginning of an email is essential because recipients often skim or scan emails rather than reading them in detail. By presenting the crucial information upfront, it captures the recipient's attention and ensures that the main message is conveyed effectively.

Additionally, placing critical information early in the email increases the chances of it being read and understood, even if the recipient doesn't continue reading the entire email. This approach acknowledges the time constraints and attention span of the recipient, enabling them to quickly grasp the most important details without having to search for them within the email's content.

To know more about email visit:

https://brainly.com/question/28087672

#SPJ11

Which system procedure is normally done with both hand valves opened on a gauge manifold connected to a refrigeration system?

Answers

Answer:

The answer is "Evacuation".

Explanation:

The evacuation in coolants was its removal from the coolant of heat, air, and non-condensable toxic gases. Its seal HVAC system is drawn to a vacuum and use a pressure washer throughout this process.  

It loses the air and water vapor throughout the coolant point is called it. The two primary goals are accomplished by evacuating, that are eliminates content and hydrates.

Answer:

the answer is c i belive

Explanation:

i belive this is the answer good luck :>

Could someone please tell me what is the error in my code?

I'm trying to write a code for finding the cube of a number using C programming.

Could someone please tell me what is the error in my code?I'm trying to write a code for finding the

Answers

I think you have to remove the semicolon at the end of line 15. From what I see, this is not a logic error, rather than a syntax error.

Looking at the error on the bottom, it's expecting a '(' before the '{'.

These questions are from the sql database query,


Find the highest rated apps with a user rating of at least 4. 6, have at least 1000 reviews, and does not have a content rating of ‘Everyone’.


Find the total number of apps for each of the 6 content rating categories.


Find the top 3 highest rated apps in the category of ‘TOOLS’ that have more than 225,000 reviews. Also, include at least 1 positive review for each of the top 3 apps in the visualization

Answers

To find the highest rated apps with a user rating of at least 4.6, have at least 1000 reviews, and does not have a content rating of ‘Everyone’, you would need to have access to the app store or platform where the apps are listed.

From there, you would need to filter the apps based on their user rating and the number of reviews they have received. Then, you would need to further filter the apps based on their content rating to exclude those with a rating of ‘Everyone’.

To find the total number of apps for each of the 6 content rating categories, you would need to have access to the app store or platform where the apps are listed. From there, you would need to group the apps based on their content rating and count the number of apps in each group.

To find the top 3 highest rated apps in the category of ‘TOOLS’ that have more than 225,000 reviews, you would need to have access to the app store or platform where the apps are listed. From there, you would need to filter the apps based on their category and the number of reviews they have received. Then, you would need to rank the remaining apps based on their user rating and select the top 3. Finally, you would need to find positive reviews for each of the top 3 apps and include them in a visualization.

Learn more about apps here brainly.com/question/11070666

#SPJ4

g write the code that would support overload for the * operator that will allow scalar multiplication, i.e. a double times a point.

Answers

Answer:

Here is one possible way to implement overload for the * operator that will allow scalar multiplication:

struct Vec3 {

 float x, y, z;

 Vec3 operator*(float scalar) const {

   return Vec3{x * scalar, y * scalar, z * scalar};

 }

};

This code defines a Vec3 struct that represents a three-dimensional vector, and it overloads the * operator to perform scalar multiplication. The * operator takes a float value as its right-hand operand and returns a new Vec3 object that is the result of scaling the original vector by the given scalar value.

write a for loop that prints the integers 0 through 39, separated by spaces.

Answers

Answer:

in Python:

for i in range(40):
     print(i, end = ' ')

Explanation:

PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS ALSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)

Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *

Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.

Software used for professional print publications such as posters, books, and email newsletters is called a: *

Professional software
Word processing software
Desktop program
Desktop publishing software

Which of the following criteria does NOT determine the credibility of a source? *

How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author

The process of finding a solution to a difficult or complex issue to make it easier is known as *

problem
problem-solving
input

A series of actions taken in order to solve a particular problem is known as the____________ *

process
problem
input
output

A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *

problem
output
algorithm
input

Which is the third step in the problem-solving process? *

Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem

A list of sources you used when writing a scholarly article on a specific subject is known as a: *

intellectual-property
credibility
bibliography
trademark

Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter

Which of the following is NOT a writing style format for academic purposes? *

Times New Roman
American Psychological Association
Modern Language Association

The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *

plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *

SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.

say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.

Answers

Answer:

finding a suitable solution for issue can be accomplished by following the basic four-step problem solving process and methodology outlined.

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Which of the following describes the process of making a copy of a website for the purpose of obtaining money or data from unsuspecting users?

A. Backing up files to an external hard drive

B. Cloning

C. Encrypting your email

D. Storing logins and passwords

Answers

Cloning is a harmful practice that users must avoid to prevent themselves from falling victim to cybercriminals. The answer is B. Cloning.

The process of making a copy of a website for the purpose of obtaining money or data from unsuspecting users is known as cloning. A clone website is an exact replica of the original website that is created to deceive users into sharing their personal information, financial details, or login credentials. The users are not aware that they are dealing with a fake website and, therefore, share their sensitive information that is later used for criminal activities such as identity theft or fraud. Cloning can be achieved by copying the entire HTML, CSS, and JavaScript code of the original website or by using website cloning software that automatically copies the website content and creates a replica.Cloning a website is illegal and unethical. It can cause severe damage to the reputation of the original website and cause financial loss to the users. Therefore, users must be aware of the authenticity of the website before sharing their personal information, financial details, or login credentials. They must look for the secure connection icon (https) in the address bar, check the website's domain name, read the privacy policy, and avoid clicking on suspicious links.

To know more about cloning visit:

brainly.com/question/30283706

#SPJ11

Write any four causes of cyber crime

Answers

A Lack of Empathy
The Victim Deserves It
Self-loathing
It Becomes an Addiction

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

Predict the output a b= 12 13 print(print(a+b)) ​

Answers

Answer:

Invalid Syntax

We if correct the syntax then output is 25

Explanation:

In the given question a=12 ,b=13 if we used print(print(a+b)) ​ this syntax then invalid syntax will occur if we correct the syntax then correct syntax program is given below

a =12

b=13

print(a+b)

it gives 25 as output because we used "+" operator between a and b variable this operator provide addition between the two variable .

if your computer is set up for more than one user, you might need to __, or select your user account name when the computer starts

Answers

If your computer is set up for more than one user, you might need to log in, or select your user account name when the computer starts. This ensures that each user can access their own files and settings on the computer, maintaining privacy and organization.

The process is known as user authentication and is typically required to access personalized settings, files, and applications associated with a specific user account. Logging in involves providing a username and password, or other forms of authentication, to verify your identity and grant you access to your individual user profile on the computer. This helps ensure that each user's data and settings are kept separate and protected from unauthorized access. Once logged in, you can access your personalized settings, files, and applications, and use the computer with your specific user account privileges and permissions.

To learn more about authentication; https://brainly.com/question/13615355

#SPJ11

Where do you place the logical test argument in an IF function formula?
.before the IE function
.the first argument listed after IF
.the second argument listed after IF
.the third argument listed after IF

Answers

Answer:

The first argument listed after IF

Explanation:

When the two variables are listed next to each other, Excel will find and calculate the correlation between them.

Answer:

B. the first argument listed after IF

Explanation:

What is the difference between cyberbullying and bullying.

Answers

Answer:

cyber bullying is more online other than normal bullying is face to face

Explanation:

Cyber bullying is online, bullying is mainly in real life and often is physical

What is true about teen pregnancy and parenting? Teen parents and their child experience little effects that are different from other families. Teen parents often have an easier time parenting because they have more energy than older parents. Children of teen parents often lag behind developmentally. Teen parents may have trouble finding jobs.

Answers

Answer:

I think its "Children of teen parents often lag behind developmentally." But I'm not for sure

Answer:

D) Teen parents may have trouble finding jobs.

Explanation:

This is the correct answer!! I took the test, Hope this helps!!:)

Access includes a(n) _____ feature that provides information and guidance on how to complete functions.

Answers

Access includes a feature called the "Tell Me" feature that provides information and guidance on how to complete functions.

When you click on the "Tell Me" box located on the ribbon, you can type in keywords related to the function you need help with. Access will then provide you with relevant suggestions, commands, and help articles to guide you through completing the function. For example, if you need assistance with creating a query, you can type "query" into the "Tell Me" box, and Access will provide you with options and explanations on how to create a query. This feature is designed to make it easier for users to find the information they need and complete functions efficiently.
To know more about function visit:

https://brainly.com/question/31062578

#SPJ11

José notices cell A5 of his worksheet contains the railroad tracks (#####) formula error. What should he do?
Delete the formula and just enter the value he wants in the cell
Resize the cell to fit the contents
Clear the formatting on the cell
Filter the cell

Answers

Answer: I think it’s clear the formatting on the cell

Explanation:

I don’t know if it’s correct

Based on the information given, José should: B. Resize the cell to fit the contents.

What is a worksheet?

A worksheet can be defined as a document which comprises cells (rows and columns) that are arranged in a tabulated format and used for the following on computer systems:

Formatting dataArranging dataAnalyzing and storing data.Calculating and sorting data.

On a spreadsheet application such as Microsoft Excel, you should resize the cell to fit the data (contents) when you notice that your worksheet contains railroad tracks (#####) formula error.

Read more on worksheet here: brainly.com/question/26053797

Which two commands can be used on a Windows host to display the routing table? (Choose two.)
A. netstat -s
B. route print
C. show ip route
D. netstat -r
E. tracert

Answers

The two commands that can be used on a Windows host to display the routing table are "route print" and "netstat -r".

1. Route print: This command displays the IPv4 and IPv6 routing tables on a Windows host. It provides detailed information about the network destinations, netmask, gateway, interface, and metric.

2. Netstat -r: This command is used to display the IPv4 routing table on a Windows host. It shows the list of network destinations, netmask, gateway, interface, and metric.

Note: The other options listed, such as "netstat -s" and "show ip route" are not valid commands on a Windows host. "Tracert" is a command used to trace the route taken by packets across an IP network, and it does not display the routing table.

Learn more about Windows host: https://brainly.com/question/29460274

#SPJ11

he Get_Winnings(m, s) function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Answers

The function "Get_Winnings(m, s)" takes a string for the number of gold medals and an integer for the sponsored dollar amount, returning the money won as an integer or "Invalid" if the amount is invalid.

The function "Get_Winnings(m, s)" takes two parameters: a string "m" representing the number of gold medals and an integer "s" representing the sponsored dollar amount. Here's a step-by-step explanation of the function.

Check if the input values are valid. If the "m" parameter is not a string or the "s" parameter is not an integer, return the string "Invalid".Convert the string "m" to an integer to calculate the total winnings based on the number of gold medals won.Calculate the money won by multiplying the number of gold medals with the sponsored dollar amount.Return the calculated winnings as an integer.

If the input values are not valid or cannot be converted, the function will return the string "Invalid" to indicate an invalid amount. Otherwise, it will return the calculated money won as an integer.

For more such question on Integer

https://brainly.com/question/30030325

#SPJ8  

how to compute one sided inverses of non square matrices

Answers

Answer:

(Transpose(A) A)X=Transpose(A)B

Explanation:

If the purpose of inverting the non-square matrix A is to solve a system of linear equations like Ax=B then you can multiply both sides of the matrix equation by the transpose of A so that it becomes (Transpose(A) A)X=Transpose(A)B. You can now invert Transpose (A) A and thus solve the system of equations

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

Describe how a cell’s content and format attributes are related.

Answers

Answer: They are independent and not related.

Explanation: Changing the format affects the content. Which of the following is NOT a way to change the column width in Excel?

a cell's content and format are similar. a cell's content and format are unrelated. the content of a cell is influenced by changing its format. the format of the cell is also affected when the content of the cell is changed.

hope this helps

PPTP is the preferred vpn protocol.

a. true
b. false

Answers

This statement is false. PPTP is not the preferred VPN protocol.

What is a VPN protocol?

This can be defined to be the set of rules that helps to ascertain the way that the data routes that connects a computer affects the VPN server. The providers of the VPN help to ensure that there is a stable and a good connection between the protocols for the sake of security.

What is the PPTP

This is the term that stands for the point to point tunneling protocol. This was a VPN protocol that came into use in the year 1995.

Hence we can conclude that the  point to point tunneling protocol Is not a preferred VPN protocol.

Read more on VPN protocol here: https://brainly.com/question/10018259

#SPJ1

which of the following is not a variable data type default to the c language? group of answer choices short real int float

Answers

Short real is not a variable data type default to the c language.

What are Data Types?
Data types are categories of data that determine the type of operations that can be performed on it and the type of values it can possess. They are used to classify data into different categories and are important in designing computer programs. Examples of data types include text, numbers, boolean values, dates, and times. Text data types are used to store words, phrases, and sentences. Numbers data types are used to store numerical values such as integers, floating-point numbers, and decimals. Boolean values are used to store true or false data.

To know more about Data types
https://brainly.com/question/30459199
#SPJ4

What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and loading it into a database. It is a process that is performed at the end of the data warehouse model prior to putting the information in a cube. It is a process that is performed at the beginning of the data mining model. t is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Answers

Answer:

It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Explanation:

Extraction, transformation, and loading can be defined as a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Other Questions
mention 4 measuring and mixing utensils Find the slope and y-intercept of y = 2x - 5.Im =b In the early stages of development all animals begin as what? Which human activity is a major reason for the increasing amounts of the atmospheric greenhouse gas, carbon dioxide How do you solve for a marginal relative frequency in a two way table? A. divide a specific frequency by the grand total B. divide a row or column total by the grand total C. divide a specific frequency by the row or column total D. none of the above A key factor contributing to the growth and acceptance of pipelines as a primary transporter of petroleum products was: Group of answer choices Teamster strikes in the early 1800s against the low rates paid to transport by wagon Monopolistic pricing by the railroads High fuel prices making water transport less competitive Relocation of oil refineries from the mid-west to the south-west German U-boat attacks of oil tankers during World War II Given the function f(x)=-x^2+3x, express the value of {f(x+h)-f(x)}{h} in simplest form. Is ArrayList a subclass of ArrayList A hedge fund returns on average 26% per year with a standard deviation of 13%. Using theempirical rule, approximate the probability the fund returns over 50% next year. does social nertworking subvert Madisons argument or strengthen it? trainers need to stay in excellent physical condition themselves and always show up on time for the classes and personal training sessions they are scheduled to lead. which personality factor is most important to perform this task successfully? Help I need help with this problem 100 points 100^5+10^2 equal what. Journal entries that transfer the end-of-period balances in revenue accounts to a permanent equity account are known as: 1. The issue of young boys playing dress-up by choosing female clothing and accessories often stimulatesvery uncomfortable feelings in teachers of young children, or they are confronted by family memberswho are not happy with that activity in the classroom. What is your reaction to this?2. Why is it both appropriate and developmentally important that young children try out various ways todifferentiate fantasy from reality? if a regression model is estimated using observations on each of these variables, what are the degrees of freedom (df) for the regression sum of squares, error sum of squares, and total sum of squares? How does Sir Walter Elliot's passion for the Baronetage book develop the theme of the passage?O His feelings demonstrate a fading connection to people and events in the past.O His feelings show how learning about one's ancestry can be transformative.O His feelings reflect an excessive attention to status and social standing.O His feelings illustrate that everyday objects can trigger vivid memories. Party trays which cost $14 to make not including labor are sold for $35 if two people work eight hour shifts making the tray at seven dollars per hour how many trays must be sold to cover the cost including the labor? Gabby just joined a new yoga studio. The studio charges a monthly fee plus an extra fee for each class students attend. The monthly cost for attending c classes is 20.50+2c dollars. Gabby plans to attend 9 classes this month.What price will Gabby pay if she attends 9 classes this month? Why is vacations valuable and make you the happiest write a paragraph due today The excerpt would be of limited use to a historian seeking to explain the political position common in the 1990s that the United States shouldA. help immigrants affected by international crisesB. recruit immigrant laborers for agricultural workC. reduce the influence of new immigrant culturesD. celebrate the diversity created by immigration