Answer:
B.
Explanation:
Three major tribes lived in the Southeast region of America, namely, the Choctaw, Creek, and Cherokee.
The Choctaw lived originally in present-day Mississippi, Alabama, Florida, and Louisiana. But after the 'Trail of Tears,' they were forced to move to Oklahoma. In the 1800s, the government of the United States made 'Indian Territory' in Oklahoma; Choctaw and Cherokee tribes were forced to move to this place.
So, from the given options the correct one is option B, Choctaw.
Answer:
While these mounds take many forms and served different purposes, with each in a sense telling its own story, all were built entirely by hand, usually by piling up earth one basket-full at a time. Some served as burial mounds for the honored dead, while other flat-topped mounds were parts of large cities or towns and held temples or ceremonial buildings, and still others were built in the shape of giant animals.
Answer: Place a students who is different in a group with a student who is tolerant
Explanation: If Mr. Philips put all students who were perceived by peers as different in one group, this would then make them feel labelled and even rejected, and not as part of the whole community, but as a different group within the community. There are always students who will find different students repulsive and sometimes will even show some aggression towards them. That is why it is better to allocate such different students to groups with more tolerant students, because it is important that different students feel and experience that they are part of the whole, that is, in groups that accept them as different.
D. A card Catalog
Why? Because the card catalog is a "map" of where everything
It can also be an atlas
Answer:
Chief information officer
Explanation:
The Chief Information Officer is responsible for ensuring that individual and organizational information systems are reliable, secure, efficient, and supportable. The duties of the CIO also includes;
1. developing and maintaining information security policies, procedures, and control techniques to address all applicable requirements,
2. overseeing personnel with significant responsibilities for information security and ensuring that the personnel are adequately trained
3. Ensuring that the organization-wide information security program is effectively implemented.