1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
8

Why did Hunter gatherers moved into theAmerica's?​

Computers and Technology
1 answer:
GrogVix [38]3 years ago
8 0

Answer:

Explanation:

Hunter-gatherers are humans that get the food and living collecting wild plants and pursuing wild animals, this was the first human's adaptation, this people arrive to America from the Bering Strait from Asia Eurasia, they were following some prehistoric mammoths, and using primitive boats arriving at Pacific coast to South America.

You might be interested in
Frequently used commands can be placed in or on the _____ in the top left corner of the window.
podryga [215]

Answer:

b. Quick Access Toolbar                                        

Explanation:

  • Quick Access Toolbar is a customizable toolbar that is displayed in Microsoft Excel, Microsoft Word, and other Office products.
  • It appears in the top left corner of the window by default.  
  • QAT provides with quick access to frequently used features e.g. the Save, Undo, Redo features.
  • When you click on the drop down menu of QAT, it allows you to customize QAT. This enables you to add and remove the commands that are displayed in the toolbar. These are default commands however, it allows you to add your own commands. You can add commands to the QAT that you frequently use. You can import or export these modifications.
  • For example Excel Quick Access Toolbar contains only 3 buttons by default Save, Undo and Redo.

7 0
3 years ago
Your manager has asked you to write a program that displays the percentage of males and female in your class. The program should
Blababa [14]

<u>Explanation:</u>

The program using <em>python programming language </em>would be:

First, we write the Input prompt.

<u>Input  prompt for the user</u>

number_of_males_in_class = int (input ('Enter the number of males: '))

number_of_females_in_class = int(input('Enter the number of females: '))

Next, we write the Process algorithm.

<u>Process  algorithm</u>

total_number_of_students_in_class = number_of_females_in_class + number_of_males

_in_class

percentage_of_males_in_class = number_of_males_in_class / total_number_of_students

_in_class

percentage_of_females_in_class = number_of_females / total_number_of_students

Finally, the Output process

<u>Output process</u>

print('Total number of males in class =', format(percentage_of_males_in_class, '.0%'))

print('Total number of females =', format(percentage_of_females_in_class, '.0%'))

7 0
3 years ago
"You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can
SSSSS [86.1K]

Answer:

6 hosts can have IP addresses on the LAN attached to the router interface

Explanation:

Given IP address

=> 192.168.192.10/29

It has a subnet mask of /29 which means it has 3 host bits. This is calculated by subtracting 29 from 32(number of bits in an IPV4)

Since there are 3 host bits,  the total number of possible addresses is given by

=> 2^{3} = 8 possible addresses.

Out of these 8 possible addresses, the first address will be the subnet id and the last address will be the broadcast address.

Therefore, there are only 6 addresses available for the hosts.

<em>Hope this helps!</em>

5 0
3 years ago
To clear a filter, click the ____ button on the home tab and then click clear all filters.
Shtirlitz [24]
Advanced button

Filter is important to see the data you want displayed only. In order to clear all filters in Access, click the Home tab, select Sort and Filter group option, click ADVANCED and then proceed to Click ALL Filters
5 0
3 years ago
Identify five financial risks that can be covered by insurance.
lina2011 [118]
Credit risk, liquidity risk, asset-backed risk, foreign investment risk, equity risk and currency risk
6 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • Write the execution steps if the input is a lion.
    11·1 answer
  • When an ethernet nic has been configured by os to use half-duplex, the transmit pair of the twisted-pair cable uses?
    8·1 answer
  • kieran wants to search a database quickly for information on the last time a patient came to his medical facility.The informatio
    14·2 answers
  • Need the answer ASAP!!!!!!!!!!!!! I’ll mark brainliest if correct
    8·1 answer
  • What data type or you use to represent true or false values?
    13·1 answer
  • Question in photo below
    13·2 answers
  • What year did polaroid introduce one-step photography with the SX-70
    14·1 answer
  • How many passes will it take to find 30 using a binary search?
    6·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!