1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elan Coil [88]
3 years ago
8

what evidence supports the claims that the Taj Mahal is a symbol of historical and cultural glory as well as an architectural ma

rvel
Computers and Technology
1 answer:
belka [17]3 years ago
8 0

Answer:

Taj Mahal

Explanation:

The Taj Mahal is best described in the book; World Wonders Worn Down by Cody Crane.

Go to Page 14 of the attached pdf document and you'd find the write up by Jeffery Batholet.

Cheers

Download pdf
You might be interested in
Question 5 / 15
erastova [34]

The value that would be returned based on the formula [=COUNTIF(A43:A47, "NP*")] in cell A49 is 4.

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., so as to avail its end users the ability to analyze and visualize spreadsheet documents.

In Microsoft Excel, there are different types of functions (predefined formulas) and these include:

  • Sum function
  • Average function
  • Minimum function
  • Maximum function
  • Count function

A count function is typically used to to calculate the number of entries in a cell or number field that meets a specific (predefined) value set by an end user.

In this scenario, "NP*" is the specific (predefined) value that was set and as such the value that would be returned based on the formula in cell A49 is 4 because A43, A44, A45 and A46 contain the value "NP."

Read more on Excel formula here: brainly.com/question/25219289

7 0
1 year ago
Read 2 more answers
The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
Semmy [17]

The most serious security threat to Bluetooth-enabled devices is \sf\purple{bluebugging}, which occurs when a hacker gains access to the device and its functions without the owner's consent.

\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{.}}}}}

6 0
3 years ago
Sometimes news organizations have biasis because
elena55 [62]
Every person has their own personal beliefs, we are all human, so sometimes the news can include biasis because someone put their personal opinion in what they say/write.
5 0
2 years ago
Which of the following best describes the purpose of a design specification?
snow_lady [41]

Answer:

it is.    Describing the requirements for how a program will work or users will interact with it

Explanation:

mark brainlist

6 0
2 years ago
Read 2 more answers
This is used in a program to mark the beginning or ending of a statement, or separate items in a list:_____
hammer [34]

Answer:

B) Punctuation

Explanation:

Punctuation are greatly used in different programming languages for different purposes. In the Java, C++ and C# Programming languages for example, two popular punctuation marks are the comma (,) and semi-colon (;). The comma is used for separating elements of a list and arrays, while the semi-colon indicates end of an executable statement or line of code. Other popular punctuation marks used in programming are periods (dot), question marks, parenthesis angle brackets and braces each implementing a specific grammatical syntax in the language.

5 0
2 years ago
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • Write a paragraph on the orgin or development of ONE of the following elementss of the Internet:
    15·1 answer
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • What is VoIP?
    5·1 answer
  • When public relations professionals make provocative statements in newsgroups to get people to visit an organization's website o
    10·1 answer
  • Which statement best describes the purpose of the Insert Function dialog box?
    13·1 answer
  • Assume you are a network consultant for a company that is designing a private WAN to communicate between five locations spread t
    10·1 answer
  • If you need to define a connection request policy to apply to an 802.1x authenticating switch or a wireless access point, which
    12·1 answer
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • 1. (A) What do you mean by computer? Discuss the use of<br> computer in daily life.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!