In 1838 after pressuring the Cherokee to sign treaties giving up their lands, the federal government
forced Cherokee resistors to adopt the lifestyle of white settlers.
O realized that it could not legally take land from unwilling Cherokee
O sent the US Army to force Cherokee resistors to march west.
filed a lawsuit against the Cherokee Nation to force its removal​

Answers

Answer 1

The correct answer is C. Sent the US Army to force Cherokee resistors to march west.

Explanation:

In 1835 the U.S. government persuaded traditional Indian tribes including the Cherokee to sign a treaty that established the Cherokee would leave their land in exchange for money and other benefits. This treaty was signed by those that represented a minority in the tribe, and therefore it did not represent the opinion of all the tribe.

Additionally, after this treaty the government made the Cherokees leave their land and move to the Indian territory in the West. This was possible because the government sent the US Army, also, this forced displacement had a great negative effect in the tribe not only because they had to leave their land, but also because many died in the process.

Answer 2

Answer:

its C

Explanation:

I got 100 on my Quiz


Related Questions

which of the following is not true of linked objects? select one: a. they can only be updated in the destination program. b. they can have the same formatting as the destination file. c. they are created in the source program. d. they can have the same formatting as the source file.

Answers

Answer is option d) they can have the same formatting as the source file.

Linked objects :

             Object Linking & Embedding is a Microsoft-developed proprietary technology that allows embedding and linking to documents and other objects. It introduced OLE Control Extension, which allows developers to create and use custom user interface elements.

             OLE allows one editing application to export a portion of a document to another and then import it with additional content. A desktop publishing system, for example, might use OLE to send text to a word processor or a picture to a bitmap editor. The main advantage of OLE is that it allows you to add different types of data to a document from different applications, such as a text editor and an image editor. This generates a Compound File Binary Format document as well as a master file to which the document refers. Changes to the master file's data have an immediate impact on the document that references it. This is known as "linking."

            OLE objects and containers are objects that can implement interfaces to export their functionality and are built on top of the Component Object Model. Only the IOleObject interface is required; however, other interfaces may be required if the functionality exported by those interfaces is required.

To learn more about linked objects refer :

https://brainly.com/question/13566913

#SPJ4

Write a program that asks the user for a positive integer value. The program should use a loop to get the sum of all even integers from 0 up to the number entered, and then display the sum. For example, if the user enters 11, the loop will find the sum of 2, 4, 6, 8, and 10. Input validation: Do not accept a negative number or 0 from user input

Answers

import java.io.*;

public class GFG {

   // Returns true if s is

   // a number else false

   static boolean isNumber(String s)

   {

       for (int i = 0; i < s.length(); i++)

           if (Character.isDigit(s.charAt(i)) == false)

               return false;

       return true;

   }

   // Driver code

   static public void main(String[] args)

   {

       // Saving the input in a string

       String str = "6790";

       // Function returns 1 if all elements

       // are in range '0 - 9'

       if (isNumber(str))

           System.out.println("Integer");

       // Function returns 0 if the

       // input is not an integer

       else

           System.out.println("String");

   }

}

A program needs designing to analyse a set of words that are input into a system. The user needs to enter
100 words. Each word could include capital letters and lowercase letters, but these need to be treated equally.
It then needs to output all of the words that are between 5 and 10 letters long (inclusive) and count all of the words
that start with a vowel (a, e, i, o, u).

Answers

Answer:

for word in words:

 if word[0] inside([a, e, i, or u]) and word.len() >= 5 and word.len() <= 10:

   print(word)

Explanation:

This is a basic for loop problem.

https://pythonnumericalmethods.berkeley.edu/notebooks/chapter05.01-For-Loops.html

https://www.w3schools.com/js/js_loop_for.asp

https://www.cs.utah.edu/~germain/PPS/Topics/for_loops.html

another word for Arithmetic Logic Unit​

Answers

Answer:

ALU

Explanation:

just to say it faster than having to say it...

Answer:

ALU

Explanation:

ALU is a functional part of CPU which perform arithmetic and logical operations.

when a data flow diagram (dfd) is exploded, the higher-level diagram is called the child diagram.
a. true
b. false

Answers

It is FALSE to state that when a Data Flow Diagram (DFD) is exploded, the higher-level diagram is called the child diagram. (Option B)

What is a DFD?

A data-flow diagram depicts the movement of data through a process or system. The DFD also contains information on each entity's and the process's outputs and inputs. There is no control flow in a data-flow diagram; there are no decision rules or loops.

A data flow diagram depicts the processing of data inside a system that relies on inputs and outputs. The flow of data, data sources and termini, and where data is kept are all shown visually. Data flow diagrams are frequently used as the initial stage in redesigning a system.

Learn more about Data Flow Diagrams:
https://brainly.com/question/29418749
#SPJ1

a(n) ____ path begins at the root level and lists all subdirectories to the destination file.

Answers

Answer:

A(n) absolute path begins at the root level and lists all subdirectories to the destination file.

Explanation:

So this is not exactly a question but I can’t find the answer anywhere else. Also if you answer this, please do, I will give you brainliest.



What does the blue circle with the i in it mean on EBay?

So this is not exactly a question but I cant find the answer anywhere else. Also if you answer this,

Answers

Answer: Well, in transit means "in the process of being transported" according to Merriam Webster, so I would think that would mean that it is being shipped from China over to America (Or wherever you may live) currently. Hope this helped!

Explanation:

which issue of computer ethics is concerned about the technological division in the society?​

Answers

Answer:

There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying

The issue of computer ethics concerned with technological division in society is known as "Digital Divide."

What is Digital Divide?

It refers to the unequal access and disparities in the use of technology, where certain groups or individuals have limited or no access to digital resources, skills, and opportunities, leading to social and economic inequalities.

The digital divide can be caused by factors such as socioeconomic status, geographic location, education, and infrastructure availability, raising ethical concerns about fairness, inclusivity, and the potential for exacerbating existing societal divisions.

Read more about computer ethics here:  

https://brainly.com/question/20264892

#SPJ2

which line has an error? 1 public static int computesumofsquares ( int num1 , int num2 ) { 2 int sum ; 3 sum

Answers

As can be seen in the attached image, line 4 has an error since it does not show the return value sum. The corrected line should be: return sum;

In this sense. Whenever a function is created in Java, if it is not a void type, it must necessarily contain a return value. In the example given below, we have the complete code:

Java code:

import java.io.*;

public class Main {

public static void main(String args[]) throws IOException {

 BufferedReader in = new BufferedReader(new InputStreamReader(System.in));

 int num1;

 int num2;

 int sum;

 System.out.println("Program to sum the square of two numbers");

// Data entry

 System.out.print("Enter First Number: ");

 num1 = Integer.parseInt(in.readLine());

 System.out.print("Enter Second Number: ");

 num2 = Integer.parseInt(in.readLine());

// Call function

 sum = computesumofsquares(num1,num2);

// Output

 System.out.println("Result: "+res);}

public static int computesumofsquares(int num1, int num2) {

 int sum;

 sum = (num1*num1)+(num2*num2);

return sum; }}

For more information on Java methods see: https://brainly.com/question/19360941

#SPJ11

which line has an error? 1 public static int computesumofsquares ( int num1 , int num2 ) { 2 int sum
which line has an error? 1 public static int computesumofsquares ( int num1 , int num2 ) { 2 int sum

A database is an organized collection of systems files.

Answers

true? are you asking true or false?
I think the answer is True.
(More info is needed)

keisha is a network administrator. she wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. what service is keisha looking for?

Answers

The service is keisha looking for is cloud computing. Cloud computing depends on resource sharing to accomplish coherence.

In order to provide quicker innovation, adaptable resources, and scale economies, cloud computing, in its simplest form, is the supply of computing services via the Internet ("the cloud"), encompassing servers, storage, databases, networking, software, analytics, and intelligence.

The on-demand availability of computer system resources, in particular data storage (cloud storage) and processing power, without direct active supervision by the user, is known as cloud computing. Functions in large clouds are frequently dispersed over several sites, each of which is a data center. Cloud computing often uses a "pay as you go" model, which can help reduce capital expenses but may also result in unanticipated running expenses for users. Cloud computing depends on resource sharing to accomplish coherence.

To know more about cloud computing click here:

https://brainly.com/question/11973901

#SPJ4

Fields in the main document correspond to _____ in the data source file.

Answers

Fields in the main document correspond to column headings in the data source file.

In a mail merge or data merge process, the main document serves as a template or a layout for generating multiple personalized documents. The data source file contains the actual data that needs to be merged into the main document.

Each field in the main document represents a specific piece of information that will be populated with data from the data source file. These fields are typically denoted by placeholders, such as <<Field Name>> or {{Field Name}}, within the main document.

The column headings in the data source file define the categories or labels for the corresponding data in each column. For example, if the main document has fields for "First Name" and "Last Name," the data source file would have corresponding column headings like "First Name" and "Last Name" that hold the actual data for each individual record.

During the merge process, the software matches the fields in the main document with the corresponding column headings in the data source file. It then populates the fields in the main document with the data from the appropriate columns in the data source file, creating personalized documents or performing data calculations based on the provided information.

So, the correct answer is d. column headings.

Learn more about column headings click;

https://brainly.com/question/13163317

#SPJ4

Complete question =

Fill in the blanks =

Fields in the main document correspond to _____ in the data source file.

Many who move to business-oriented information security were formerly__________ who were often involved in national security or cybersecurity .

Answers

Answer:

The information security function

Explanation:

Many who move to business-oriented information security were formerly_____ who were often involved in national security or cybersecurity . All of the above The information security function

Page orientation is determined in Microsoft Word from the __________ tab

Answers

Answer:

Page orientation is determined in Microsoft Word from the Page Layout tab.

Explanation:

The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.

Which of the follow efficiencies would be considered unreasonable?

Answers

Answer:

Exponential or factorial efficiencies algorithms

Explanation:

In a computer engineering system, the efficiencies that would be considered unreasonable is the "Exponential or factorial efficiencies algorithms"

This is unlike Algorithms with a polynomial efficiency that is considered to have Reasonable Time.

What action(s) from the CRUD method should be used to describe the required data usage in the case of the function name is "Take delivery of a new goods" for the entity types: GOODS and DELIVERY?

Answers

The CREATE and UPDATE actions from the CRUD method should be used to describe the required data usage in the case of the function name "Take delivery of new goods" for the entity types GOODS and DELIVERY.

This is because CREATE is the action used for generating and inserting data into the database, whereas UPDATE is used for changing the existing data. A CRUD (Create, Read, Update, and Delete) is an acronym for database operations to enable the storage and management of data.

It is a standard and widely recognized method of performing database operations. The CREATE action involves adding a new item to the database, which is what happens when a new delivery of goods arrives. This operation stores new data in the database to allow the records to be retrieved when required. Similarly, the UPDATE operation allows the records in the database to be updated if new information becomes available or data errors occur. Therefore, the CREATE and UPDATE actions from the CRUD method should be used to describe the required data usage in the case of the function name "Take delivery of new goods" for the entity types GOODS and DELIVERY.

To know more about data visit:

https://brainly.com/question/28285882

#SPJ11

Please solve in 5 mins very fast​

Please solve in 5 mins very fast

Answers

Answer:

a. virtual reality

b. Master Boot Records

c. Primary function of a router

d. zoom

Explanation:

The first one is gonna be B and the second is gonna be C

why is hip hop and rap so popular

Answers

Answer:

its popular because hip hop and rap is a way for people to express themselves whether it be their feelings or something that happened in their life and it also evolved from different people

How do I fix a reCAPTCHA error?

Answers

By hitting Windows + I, you can access Settings on a Windows computer. Under Settings, click Network & Internet. On the left sidebar, select Proxy. The Use a proxy server checkbox on the right should be disabled.

What does the error reCAPTCHA mean?

ReCAPTCHA examines website interactions to determine whether they are made by a human or an automated abuser. A "failed reCAPTCHA check" error message occasionally appears when you attempt to establish or edit your account. This indicates that the website thinks you could have been a robot.

Why does CAPTCHA not function in Chrome?

Ensure that your browser is up to date (see minimum browser requirements) Check to see if your browser has JavaScript enabled. Plugins that can conflict with reCAPTCHA can be disabled.

To know more about Windows visit:-

https://brainly.com/question/13502522

#SPJ4

the styles button on the tool bar allows you to?​

Answers

You can format the cell contents using the buttons and drop-down boxes on this toolbar.

What does a computer tool bar do?

A toolbar is a portion of a window, frequently a bar from across top, that has buttons that, when clicked, execute actions. You may configure the toolbars in many programs so that the instructions you use regularly are visible and accessible. Toolbars are also found in many dialog boxes.

How can I get my tool bar back?

The following actions can also be used to restore the Taskbar: In addition to pressing the Esc key, hold down the Ctrl key. Let go of both keys. Tapping the Spacebar while keeping the Alt key depressed.

To know more about tool bar visit:

https://brainly.com/question/20915697

#SPJ1

Just take points, this website is so weird because of all the reporting and I didn't do any thing

Answers

Answer:

I agree with you! And thank you for the points

Explanation:

I answer educational questions and ask one of my own regarding math and it gets reported

Someone asked if their art was good and how they can improve it and it gets reported

But the only questions they don’t report are free po!nts

For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???

Answer:but this is free ponts so it is safe uggg

Is there something "funny" with this network? What is it? What is the logic function that this network implements?

Answers

The funny thing about this network is that it's actually a single artificial neuron or perceptron. It's the simplest form of a neural network, consisting of just one node with inputs and a single output.

In more detail, a perceptron takes multiple input values, each multiplied by corresponding weights, and then sums them up. The bias term is added to this sum. The resulting value is passed through an activation function to produce the output. The activation function introduces non-linearity into the system.

For example, if the weights and bias are set appropriately, the perceptron can implement the logical AND function. It will output 1 only when all the input values are 1; otherwise, it will output 0. Similarly, by adjusting the weights and bias, the perceptron can represent other logic functions such as OR and NAND.

However, a single perceptron cannot implement more complex logic functions like XOR, which requires multiple layers or a different network architecture like a multi-layer perceptron (MLP) with hidden layers. In an MLP, the outputs of multiple perceptrons are combined to perform more intricate computations.

So, the funny thing is that despite its simplicity, a single perceptron can still perform basic logic operations by adjusting its weights and bias.

Learn more about  network here: brainly.com/question/15332165

#SPJ11

When schools use spy systems to see what you're doing, is it possible for them to see what you're doing connected to ethernet and not wifi?

Answers

Yes, if you're on a school network with a border firewall that records activity, they could see what you're searching for on the Internet.

What is “reasonable suspicion”?

They can search only under certain conditions. To begin, your school must have a "reasonable suspicion" that searching you will yield evidence of a violation of a school rule or law.

Unfortunately, no precise definition exists. A reasonable suspicion, on the other hand, should be founded on facts unique to you or your situation. It can't be based on a rumor, a hunch, or a whim.

A teacher, for example, cannot request a search for drugs based solely on the appearance of the bag.

Can my school conduct a random search of its students?

YES. These random searches, however, must be based on special, school-wide needs, such as ensuring school safety, and must be truly random. A random search cannot be used to target specific students.

To know more about ethernet, visit: https://brainly.com/question/26956118

#SPJ1

What makes this information systems environment unique? (3 points)

Answers

Information technologies are unique not just because of their growing use in decision-making and knowledge management systems, important as that is. Their use has also yielded significant improvements in the efficiency of energy and materials use.

a class b ipv4 host configured with a private ip address will use what mechanisms to facilitate access to the internet?

Answers

The private IPv4 host configured with a private IP address will use NAT and PAT mechanisms to facilitate access to the internet.

NAT stands for Network Address Translation, and it is a technique used by routers to modify the source address of packets to match the address of the router's interface. PAT stands for Port Address Translation, which is a type of NAT that allows multiple hosts to use a single public IP address by using different source port numbers. This means that each outgoing packet from the host has a different port number assigned to it.

When a private IPv4 host sends a packet to the internet, the NAT router changes the source address of the packet to the public IP address of the router's interface. This is called NAT overload or Port Address Translation (PAT).The router then keeps track of the different source port numbers used by each packet. When a packet returns from the internet to the router, the router checks the destination port number and sends the packet to the appropriate host based on the source port number recorded in its NAT table. In this way, NAT and PAT allow hosts with private IP addresses to communicate with the internet using a single public IP address.

Know more about private IP address, here:

https://brainly.com/question/30408816

#SPJ11

What is the result when you run the following line of code after a prompt??
>>>print(3 + 11)

Answers

Answer:

The following output is 14

Explanation:

When you print something, python interprets it and spits it out to the console. In this case, python is just interpreting 3 + 11, which equals 14. Thus, making the answer 14.

hope i helped :D

Answer:

14

Explanation:

Which set of keys is your right pointer finger responsible for typing (3 points)

a
3, E, D, and C

b
4, R, F, and V

c
5, T, G, and B

d
6, Y, H, and N

Answers

Answer:

D

Explanation:

Your right pointer finger is responsible for typing the Y, H, and N keys

Answer:

D

Explanation:

When typing, you rest your right pointer finger on the J key.

Most people are able to find this key without looking due to a small bump on the lower half of it.

Having your finger rest here allows for your hands to each take up roughly one half of the keyboard.

Your right pointer finger is responsible for typing the 6, Y, H, and N keys due to its positioning on the keyboard.

still consider using anomaly detection for intrusion detection. let's analyze a case. suppose alice's computer has 4 files (not realistic but for easy calculation...), and here are some data:

Answers

It is still recommended to use anomaly detection for intrusion detection. Anomaly detection is a method used in intrusion detection systems to identify unusual behavior that could be indicative of a security breach. It involves monitoring network traffic and system activity for any patterns or behaviors that deviate from the norm.

By identifying these anomalies, security analysts can investigate and respond to potential threats before any damage is done. In the case of Alice's computer, let's say she has four files. Using anomaly detection, her system activity would be monitored for any unusual behavior such as attempts to access or modify files that are not normally accessed, or connections to unknown or suspicious IP addresses.

If such behavior is detected, an alert is triggered, and security analysts can investigate the source of the anomaly to determine if it is a legitimate threat or a false positive. Anomaly detection is particularly useful in detecting zero-day attacks, which are previously unknown exploits that have not yet been identified by signature-based detection methods. Overall, anomaly detection is an important tool in an organization's security arsenal, and should be used in conjunction with other security measures such as firewalls, antivirus software, and intrusion prevention systems. Anomaly detection is a proactive approach to security that involves monitoring system activity for any deviations from the norm. It is used to identify potential security threats that may not be detected by traditional signature-based methods. By using anomaly detection, organizations can detect and respond to security breaches before they cause any significant damage. In the case of Alice's computer, anomaly detection would be used to monitor her system activity for any unusual behavior that could be indicative of a security breach Yes, anomaly detection can be used for intrusion detection in this case. Anomaly detection is a technique used to identify unusual patterns or behaviors that deviate from the norm. In the context of intrusion detection, it can help identify potential threats or intrusions on Alice's computer by analyzing the activities related to her 4 files. Establish a baseline: First, we need to create a baseline of normal activities or behaviors for Alice's computer. This could include file access patterns, file modifications, and network activities.

To know more about detection visit:

https://brainly.com/question/28284322

#SPJ11

A text that presents an event and describe what happens as a result is an example of what text structure

Answers

the answer is cause and effect

what derogatory title do experienced hackers give to inexperienced hackers who copy code or use tools created by knowledgeable programmers without und

Answers

Inexperienced hackers benefit from script kiddie' expertise as computer operators.

What are novice hackers known as?

A derogatory term known as "script kiddie" was created by computer hackers to describe immature but frequently just as dangerous individuals who take advantage of internet security flaws. Not all inexperienced hackers use script kids. Unskilled attackers do make an effort to become familiar with and comprehend the tools they employ.

What three categories of hackers are there?

Black hat, white hat, and gray hat hackers are the three main subcategories of hackers. Although hackers are sometimes thought of as people who break into systems or networks and take advantage of security flaws, not all hacking is harmful or prohibited.

To know more about hackers visit :-

https://brainly.com/question/30419117

#SPJ4

Other Questions
when was slc board established in nepal Which of the following expressions is the sum of four terms?8 + jk + 5m + 12n + 7p3 + 4m + njk + mn7 + 7j + 7m + mj explain why improper capitalization of amounts spent could result in financial statement fraud and overstatement of assets. The Supreme Court considers diversity in education a "compelling state interest." una carta de opinion sobre el universo doy cornona Nicholas has a collection of books. He has 115 fantasy and science fiction books. These books are 46 of his collection. How many books does he have in his collection?-- pls explain!!! Question attached below plz help ty express balanced equations for the production of nitric acid from nitrogen In khoomii the performer seems to sing more than one of which of the following at a time What is the slope of the line y = 3x + 5? What is a good Ashoka hook The density of a certain type of plastic is 0.77 g/cm3. If a sheet of this plastic is 10.0 m long, 1.0 m wide, and 1 cm thick, what is its mass Paragraph OneHe drives a racecar 80 miles per hour. He motivates audiences of hundreds. He's earned awards for his performance on and off the racetrack, and he's traveled the country to compete. Did we mention that he's 13 years old? One look at his accomplishments and it is easy to see that Noah "Little Gator" Cornman is on the fast track to success. "Little" might be a part of his nickname, but it does not describe his determination to succeed and his heart to make a difference for kids like him.In paragraph 1, which sentence implies that the author is impressed with the teen's accomplishments? (5 points) aHe drives a racecar 80 miles per hour. bHe motivates audiences of hundreds. cDid we mention that he's 13 years old? dHe's traveled the country to compete. diana charges $10 for a house call plus $35 an hour for electric work.If she made $150 on one job,how many hours did she work What is negative 1/3 plus positive 16/20?(I need this answer ASAP!!!!!!) a 240 turn solenoid having a length of 29 cm and a diameter of 10 cm carries a current of 0.32 a. calculate the magnitude of the magnetic field b with arrow inside the solenoid. What do the stern gazes on the faces of the women in the painting depict above? an apartment owner's belief that black people are lazy is an example of . his refusal to rent an apartment to a black family is an example of . How does the environment of both the new england and middle colonies affect their economies?. roquan is a u.s. citizen and is doing a three to six-year assignment as a sales executive in paris for a french company. the assignment began this year. roquan earned $109,500 working for the french company this year but only lived in france for 180 days (out of 365 days). he will live full time in france next year. what amount of roquan's $109,500 salary this year will he be allowed to exclude from gross income in the united states?