What is the only way to remove a password encryption on an Excel file?
A) Resave the workbook as a new document or make a copy of it.
B) Open the workbook as Read Only and resave it without a password.
C) Open the workbook in Protected View and resave it without a password.
D) Enter the password to open the workbook, and delete the password created in the Encrypt with Password box.

Answers

Answer 1

The password encryption in an excel file can be removed by opening the file with the password and then deleting the password from the password box. Thus, option D is correct.

What is password encryption?

Password encryption is given as assigning a specific password to the file, thereby not allowing the other users to open the file without the password. This works as a safety purpose for confidential and important documents.

The excel file found to be already protected can be made to remove the encryption by entering the password. After opening the workbook and deleting the created password from the password box, save it. Thus, option D is correct.

Learn more about password encrypted files, here:

https://brainly.com/question/15199366

#SPJ2

Answer 2

Answer:

D

Explanation:

edge 2022


Related Questions

Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time. If a review contains the desired word you should make a note of the review score in an accumulator variable. Finally, produce some output that tells your user how that word was used across all reviews as well as the classification for this word (any score of 2.0 or higher can be considered

Answers

Answer:

import numpy as np

word = input("Enter a word: ")

acc = []

with open("Downloads/record-collection.txt", "r") as file:

   lines = file.readlines()

   for line in lines:

       if word in line:

           line = line.strip()

           acc.append(int(line[0]))

   if np.mean(acc) >= 2:

       print(f"The word {word} is a positive word")

       print(f"{word} appeared {len(acc)} times")

       print(f"the review of the word {word} is {round(np.mean(acc), 2)}")

   else:

       print(f"the word {word} is a negative word with review\

{round(np.mean(acc), 2)}")

Explanation:

The python program gets the text from the review file, using the user input word to get the definition of reviews based on the word, whether positive or negative.

The program uses the 'with' keyword to open the file and created the acc variable to hold the reviews gotten. The mean of the acc is calculated with the numpy mean method and if the mean is equal to or greater than 2 it is a positive word, else negative.

A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to create nearly duplicate bank transfers but alters the target account to steal the funds. The attacker is reproducing traffic to re- create an event from previous transactions. This is an example of what type of attack?
A. Xmas attack
B. Smurf attack
C. DDoS attack
D. Replay attack

Answers

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

Hackers use packet sniffing attacks to intercept or steal potentially unprotected data from networks. A network-generated threat is a sniffing attack, also known as a packet sniffing assault. Thus, option D is correct.

What are the hacker using sniffing network?

Snooping gives ethical hackers a lot of information about how a network functions and how its users behave, which can be used to improve a company's cybersecurity.

Sniffing can, however, be utilized by unscrupulous hackers to conduct catastrophic attacks against gullible targets.

A network sniffer can detect someone using excessive bandwidth at a college or commercial organization and hunt them down.

Therefore, replay attacks are employed so that the attacker can find the hash and obtain the desired object. Once the attacker has received the object, the replay attack causes the object to return to the original connection.

Learn more about  sniffing network here:

https://brainly.com/question/10316246

#SPJ5

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True
b. False

Answers

Answer:

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True

Explanation:

Yes.  It is in the best interest to choose option A which dominates choice B.  A Multiple Attribute Utility involves evaluating the values of alternatives in order to make preference decisions over the available alternatives.  Multiple Attribute Utility decisions are basically characterized by multiple and conflicting attributes.  To solve the decision problem, weights are assigned to each attribute.  These weights are then used to determine the option that should be prioritized.

A physical host machine has four quad-core CPUs, 16GB of RAM, 1TB of hard drive space, and two 1Gbps NICs. If we need to create four Windows 2008 servers, what will be the first bottleneck we should upgrade?a. CPUb. RAMc. Hard drived. NIC

Answers

Answer:

B. Ram

Explanation:

A random access memory (RAM) can be defined as the internal hardware memory which allows data to be read and written (changed) in a computer. Basically, a random access memory (RAM) is used for temporarily storing data such as software programs, operating system (OS), machine code and working data (data in current use) so that they are easily and rapidly accessible to the central processing unit (CPU).

Additionally, RAM is a volatile memory because any data stored in it would be lost or erased once the computer is turned off. Thus, it can only retain data while the computer is turned on and as such is considered to be a short-term memory.

There are two (2) main types of random access memory (RAM) and these are;

1. Static Random Access Memory (SRAM).

2. Dynamic Random Access Memory (DRAM).

Given a physical host machine that has four quad-core central processing units (CPUs), 16GB of random access memory (RAM), 1TB of hard drive space, and two 1Gbps network interface cards (NICs). Therefore, if we need to create four Windows 2008 servers, the first bottleneck we should upgrade is the random access memory (RAM) because it is typically the working memory that would be used by the server to store data, so they can be accessed easily and rapidly by the central processing unit (CPU).

Hence, the random access memory (RAM) may be increased from 16GB to 64GB or more depending on the client's requirements.

What is the main reason for assigning roles to members of a group?

Answers

So that people with strengths in different areas can work on what they do best, plus it divides the workload.

Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?

Answers

Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.

Create a function copy() that reads one file line by line and copies each line to another file. You should use try-except statements and use either open and close file statements or a with file statement.>>>def copy(filename1, filename2) :

Answers

Answer:

See attachment for answer

Explanation:

I could not add the answer; So, I made use of an attachment

The program is written on 9 lines and the line by line explanation is as follows:

Line 1:

This defines the function

Line 2:

This begins a try except exception that returns an exception if an error is encountered

Line 3:

This open the source file using open and with statement

Line 4:

This open the destination file using open and with statement and also makes it writable

Line 5:

This iterates through the content of the source file; line by line

Line 6:

This writes the content to the destination file

Line 7 & 8:

This is returned if an error is encountered

Line 9:

This prints that the file has been successfully copied        

To call the function from main; use

copy(filename1, filename2)

Where filename1 and filename2 are names of source and destination files.

Take for instance:

filename1 = "test1.txt"

filename1 = "test2.txt"

copy(filename1, filename2)

The above will copy from test1.txt to test2.txt

The function copies text from one file to another. The program written in python 3 goes thus

def copy(filename1, filename2):

#initialize a function names copy and takes two arguments which are two files

try:

#initiate exception to prevent program throwing an error

with open(filename1, "r") as file1 :

#open file1 in the read mode with an alias

with open(filename2, "w") as file2:

#open file 2 in write mode with an alias

for line in file1:

#loop through each line in file 1

file2.write(line)

#copy / write the line in file2

except:

print("Error copying file")

#display if an error is encountered

print("File Copied")

#if no error, display file copied

Learn more : https://brainly.com/question/22392664


Which heading function is the biggest?
1. h1
2. h2
3. h3

Answers

Answer:

h3

Explanation:

sub to Thicc Panda on YT

The answer for this question is number 1

Explain why agile methods may not work well in organizations that have teams with a wide range of skills and abilities and well-established processes.

Answers

Answer:

This is mainly because the agile method involves the use of procedures which usually lack concrete steps.

Explanation:

The agile methods may not work well in organizations that have teams with a wide range of skills and abilities and well-established processes mainly because the agile method involves the use of procedures which usually lack concrete steps.

While the so called companies are usually guided by various concrete steps in their mode of functions/operation.

how to create a structure using c# programming

Answers

Answer:

The answer to this question is given in the explanation section.

Explanation:

C# uses the struct keyword to declare structure.

The are used to store related data item.

For example the record of Student i-e his name, father name, address and class no can be declared using structure

using system

struct Student {

  public string name;

  public string father_name;

  public string address;

  public int class_no;

};

Which interpersonal skill is the most important for a telecom technician to develop?
teamwork
active listening
conflict resolution
social awareness

Answers

Answer: Interpersonal communication is the process of face-to-face exchange of thoughts, ideas, feelings and emotions between two or more people. This includes both verbal and nonverbal elements of personal interaction.

Explanation:

i think plz dont be mad

Which attitudes are most common among successful IT professionals?

Answers

openness to learning new things and interest in technology

emotional resilience and enjoyment of leadership positions

tough-mindedness and a focus on financial gain

empathetic and motivated by a concern for others


hopefully that helps!

25 pts) Level 1 Programming Task Write the function getPop(char myCode[3]), which takes in a two-digit string representing the state or territory code and returns the associated state or territory population. The function should open and scan the file USpops.txt for the input two-digit code, myCode. If myCode is not found in the file, the function should return -1. Make sure to close the file once the file reading is complete.

Answers

Answer:

The method definition to this question can be defined as follows:

int getPop(char myCode[3])//defining a method getPop that takes char array in its parameter

{

FILE* f = NULL;//defining a pointer variable

int pop;//defining integer variable

char s_code[2];//defining char array state_code

char s_name[100];//defining char array stateName

f = fopen("state", "r");//using pointer variable that use fopen method for open file

if(f == NULL)//defining if block that check file is empty

{

return -1;//return value -1

}

while(!feof(f))//defining while loop for input value in file

{

fscanf(f, "%s %s %d",s_code, s_name, &pop);//input value

if(strncmp(myCode, s_code, 2) == 0)//use if block to compare string value

{

printf("Population for %s: %d", s_name, pop);//print value

return 0;//return 0

}

}

fclose(f);//close file

return 0;

}

Explanation:

In the above code, a method "getPop" is defined that accepts a character array "myCode" in its parameter, and inside the method, one pointer variable "f", one integer variable "pop", and two char array "s_code and s_name" is declared.

In the method firstly fopen method is used that holds a file and use if block to check it is not empty, if the condition is true it will give a value that is "-1".

In the next step, a while loop is declared, that input value and use if block to compare string value, and return 0, and at the last, it closed the file.    

How does technology change thinking?

Answers

Answer:

Answer

Technology has altered human physiology. It makes us think differently, feel differently, even dream differently. It affects our memory, attention spans and sleep cycles. This is attributed to a scientific phenomenon known as neuroplasticity, or the brain's ability to alter its behavior based on new experiences.

have a nice day <3

if this helped, rate 5 stars

The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False

Answers

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

Write the code for the method getNewBox. The method getNewBox will return a GiftBox that has dimensions that are m times the dimensions of its GiftBox parameter, where m is a double parameter of the method.
For example, given the following code segment:
GiftBox gift = new Gift Box (3.0, 4.0, 5.0):
The call
getNewBox , 0, 5).
would return a GiftBox whose dimensions are: length = 1.5, width = 2.0, and height = 2.5 .

Answers

Answer:

public class GiftBox{

private int length;

private int width;

private int height;

 

public GiftBox(double length, double width, double height) {

this.length = length;

this.width = width;

this.height = height;

}

 

public static GiftBox getNewBox(GiftBox giftBox, double m) {

return new GiftBox(m * giftBox.length, m * giftBox.width, m * giftBox.height);

}

 

private boolean fitsInside(GiftBox giftBox) {

if(giftBox.length < this.length && giftBox.width <this.width

&& giftBox.height < this.height) {

return true;

}

return false;

}

 

public static void main(String []args){

GiftBox giftBox = new GiftBox(3.0 , 4.0, 5.0);

GiftBox newGiftBox = getNewBox(giftBox, 0.5);

System.out.println("New Box length: " + newGiftBox.length);

System.out.println("New Box width: " + newGiftBox.width);

System.out.println("New Box height: " + newGiftBox.height);

 

GiftBox gift = new GiftBox(3.0 , 4.0, 5.0);

GiftBox other = new GiftBox(2.1 , 3.2, 4.3);

GiftBox yetAnother = new GiftBox(2.0 , 5.0, 4.0);

 

System.out.println(gift.fitsInside(other));

System.out.println(gift.fitsInside(yetAnother));

}

}

Explanation:

The getNewBox is a public method in the GiftBox class in the Java source code above. It returns the GiftBox object instance increasing or multiplying the dimensions by the value of m of type double.

:) :) :):):):)):):):)):)/):))::)):):):):):)):):)):):))/):):))

Answers

Answer:

:)))))))))))))))))))))))))))))))))))))))) thanks

What happens when a basic text file without any HTML code is opened in a web browser?
The text will be shown without any formatting.
The web page will appear to be blank.
The browser will show an error message.
The file will open only if it has the extension .html.

Answers

Answer:

The text will be shown without any formatting.

Explanation:

Answer:

the answer is

ও a- the text will be shown without any formatting

Explanation:

⁂ just did the cumulative exam review, hope this helped ☺

Question #11
If A = 5 and B = 10, what is A* B equal to?
estion #2
estion # 3
restion #4
testion5
O 15
O Five
OTwo
O 50
Read Question

Answers

Answer:

Option 4: 50 is the correct answer.

Explanation:

Arithmetic operations can be performed using the programming languages. Some symbols used in programming languages are different from what we use in mathematics.

The symbol * is used to represent multiplication in programming languages.

Given

A = 5

B = 10

So, A*B will be equal to: 5*10 = 50

Hence,

Option 4: 50 is the correct answer.

The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing

Answers

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

Why is a bedroom considered a poor study environment?

Bedrooms are dimly lit.
Bedrooms are too small.
Bedrooms are too comfortable.
Bedrooms are messy and cluttered.

Answers

Bedrooms are too comfortable, I'm not sure if this is the answer

Answer:

It would basically be based on how you study and what your room is like. But my opinion would be

Bedrooms are Too Comfortable- which causes you to want to sleep or not due your work

Bedrooms are dimly lit- Which makes it hard for you to see your work and see anything

Bedrooms are too small- You will fell crushed and hard to focus (I would most likely choose this answer)

Bedrooms are messy and cluttered- You will not be able to concentrate and make it hard to study or do school work. ( I would choose this because I have experienced with this and I score higher in a cleaner environment and able to focus more)

Explanation: This would all depend on how you best work.

Hope this Helps!!

What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?

Answers

Answer:

dd if=/dev/drive1 of=/dev/backup

Explanation:

Linux operating system is an open-source computer application readily available to system operators. The terminal is a platform in the operating system used to write scripts like bash and directly communicate with the system kernel.

There are two commands used in bash to copy files, the "cp" and "dd". The dd is mostly used to copy files from one storage or partition to another. The syntax of dd is;

dd if= (source partition/directory) of= (target partition/directory)

5. What will be displayed when this program finishes running?
var numbers List = [20, 10, 5]
appendItem(numbersList, 50)
appendItem(numbersList, 100)
removeItem(numbersList, 1)
insertItem(numbersList, o, 30)
console.log(numbersList.length)
A. 3
B. 6
C. 7
D. 5

Answers

Answer:5 i think im not sure though

Explanation:

5  will be displayed when this program finishes running. Hence, option D is correct.

What is program?

A set of preset, sequential actions that a computer is designed to perform is known as a program. The program in the modern computer that John von Neumann described in 1945 contains a set of instructions that the computer executes one at a time.

A set of instructions called a program or software program instructs the hardware of a computer how to do a task. To complete a task, a computer executes a set of guidelines known as a program.

To communicate with computers, programmers use a programming language, which is a computer language. It is a set of instructions written in a specific language such as C, C++, Java, or Python, built to do a certain task.

Thus, option D is correct.

For more information about program, click here:

https://brainly.com/question/11023419

#SPJ2

Research the significance of the UNIX core of macOS and write a few sentences describing your findings.

Answers

Answer:

The Unix core used in Apple's macOS is called Darwin which is similar to the BSD Unix operating system. The Darwin in macOS has evolved, providing a slick aqua-graphical user interface for users to interact with the application by clicking rather than writing Unix commands in terminals.

Explanation:

The macOS is the operating system used by Apple computer brands. The operating system is a subset of the Unix's BSD operating system. It still makes use of the traditional Unix terminal and scripts but with a few alterations.

The significance of the UNIX core of macOS can be briefly described as:

It makes use of an aqua-graphical user interface to easily communicate with the application for seamless use.

What is UNIX core?

This refers to the different kernel subsystems which are a part of the process management and memory allocation of a device.

Hence, the significance of the UNIX core of macOS has made it very easy for Apple users to communicate with their device in real time and also to power the phone.

Read more about UNIX here:

https://brainly.com/question/26338728

Relatively simple CRUD (create, read, update, delete) web applications development can be facilitated with: _________.
a. HTTP
b. HTTPS
c. Web Application Frameworks
d. Cascading Style Sheets (CSS)
e. Document Object Model (DOM)

Answers

Answer:

c. Web Application Frameworks

Explanation:

Web Application Frameworks is a form of a software framework that is made to perform support for the building of web applications such as web services, web resources, and web APIs. Web frameworks.

Also, Web Application Frameworks automatically perform the function of primary activities carried out in web development such as create, read, update, delete.

Hence, in this case, the correct answer is Web Application Framework.

What is meant by the term visual communication?

Answers

Answer:

eye contact

Explanation:

What line of code makes the character pointer studentPointer point to the character variable userStudent?char userStudent = 'S';char* studentPointer;

Answers

Answer:

char* studentPointer = &userStudent;

Explanation:

Pointers in C are variables used to point to the location of another variable. To declare pointer, the data type must be specified (same as the variable it is pointing to), followed by an asterisk and then the name of the pointer. The reference of the target variable is also assigned to the pointer to allow direct changes from the pointer variable.

Select the examples that best demonstrate likely tasks for Revenue and Taxation workers. Check all that apply. Brenda works for the IRS reviewing paperwork. Jenny reviews buildings to determine how much money they are worth. Luke administers tests for driver licenses. Vernice negotiates with foreign officials in a U.S. embassy. Kareem advises businesses to make sure they handle their finances correctly. Parker takes notes during city council meetings and creates reports for council members.

Answers

Answer:

Brenda works for the IRS reviewing paperwork.

Jenny reviews buildings to determine how much money they are worth

Kareem advises businesses to make sure they handle their finances correctly.

Explanation:

The best demonstrate likely tasks for Revenue and Taxation workers are:

a. Brenda works for the IRS reviewing paperwork.

b. Jenny reviews buildings to determine how much money they are worth

e. Kareem advises businesses to make sure they handle their finances correctly.

What are Revenue and Taxation?

In practically every nation on the planet, governments impose taxes as mandatory levies on people or things. Taxation is primarily used to generate money for government spending, though it can also be used for other things.

A tax is a mandatory financial charge or another sort of levy that is placed on a taxpayer by a governmental entity in order to pay for public services and other expenses.

Taxes are essential because governments use the money they raise from them to fund social programs. Government investments in the healthcare industry would not be possible without taxes. Health services including social healthcare, medical research, social security, etc. are paid for by taxes.

Therefore, the correct options are a, b, and e.

To learn more about Revenue and Taxation, refer to the link:

https://brainly.com/question/29570932

#SPJ2

Write a Python program to keep track of data for the following information in a medical clinic: doctors, patients, and patient_visits

Patients and Doctors have an ID, first name, and last name as common attributes. Doctors have these additional attributes: specialty (e.g. heart surgeon, ear-nose-throat specialist, or dermatologist), total hours worked, and hourly pay. Further, doctors keep track of the patient_visits. A patient_visit has the following attributes, number_of_visits to the clinic, the patient who is visiting, the doctor requested to be visited, and the number of hours needed for consultation. Based on the number of consultation hours, the doctor will get paid.


The following functions are required:

1. addVisit: this function adds a patient_visit to the doctor. A new visit will NOT be added if the doctor has already completed 40 hours or more of consultation. If this happens, an error is thrown mentioning that the doctor cannot have more visits this week.

2. calculatePay: this function calculates the payment for the doctor using the following logic: Each hour is worth AED 150 for the first two visits of the patient and all further visits are billed at AED 50.


3. calculateBill: this function calculates the bill for the patient, which displays the doctor's details, patient details, and payment details. An additional 5% of the total is added as VAT.


The student is required to identify classes, related attributes, and behaviors. Students are free to add as many attributes as required. The appropriate access modifiers (private, public, or protected) must be used while implementing class relationships. Proper documentation of code is mandatory. The student must also test the code, by creating at-least three objects. All classes must have a display function, and the program must have the functionality to print the current state of the objects.

Answers

This is too much to understand what you need the answer too. In my opinion I can’t answer this question

Oozie is still using a parameter called _______ to identify the YARN arguments as they are yet to create a new parameter for YARN itself.

Answers

Answer:

Job Tracker

Explanation:

Given that JobTracker is a term in computer engineering that describe the main or primary point whereby users can maintain and start submitting and tracking MR jobs in a network environment.

Hence, it can be concluded that Oozie is still using a parameter called JOB TRACKER to identify the YARN arguments as they are yet to create a new parameter for YARN itself.

Oozie is still using a parameter called Job Tracker

The following information should be considered:

JobTracker is a term in computer engineering that reoresent the main or primary point in which users can maintain,  start submitting, and tracking MR jobs in a network environment.It identified the YARN arguments for developing the new parameter.

Learn more: brainly.com/question/17429689

Other Questions
A woman speaks a language that is part of the Uralic family. Where does this woman probably live?a. East Asiab. East Africac. Northern Europed. Northern South Americae. Western Europe Please just label tanks :) ****ECONOMICS****Which situation is an example of a person making use of credit?A. A mechanic borrows money from a bank to buy a new set ofexpensive tools.B. A farmer changes the type of crops she grows to make a greaterprofit.C. An architect puts his weekly paychecks into a savings account ata local bank.D. A college student saves money in order to buy a cheap used car. Explain each of the five theories of emotion (James-Lange, Cannon-Bard, Schachter-Singer two-factor theory, Zajonc and LeDoux, and Lazarus) discussed in the text. What are the three steps of composition process? please help mee Which statement(s) most directly apply to capitalism?1. There is heavy government regulation of industry.II. Individuals can start some, but not all, kinds of enterprises.III. The price and availability of goods is determined primarily by the market.a. I and IIb. ll onlyc. I and IIId. Ill only Please help me!!! will give brainliest what do you mean by basic need Please select the word from the list that best fits the definition a darker contour line, usually every fifth line Which of the following is the most important ingredient in asuccessful popular reality show?A.a scripted dialog.B.dynamic and out-going personalitiesC. having every show a half-hour length.D. needs to be shown only a traditional network. The concept of good overcoming evil is presented throughout Beowulf. Identify two examples of good overcoming evil within the story. What does this reveal about Anglo-Saxon society as a whole? Find the slope between the two points. (4, 2) and (3, 8)Plz help ASAP Consider the distance formula d=16t^2 where d is the distance in feet that an object travels and t is the time in seconds that it travels. How long does it take an object to travel 624 feet?best answer gets brainliest, a rental car company charges drivers a flat fee to rent a car plus $0.25 for each mile they drive. If a drivers pays $100 drives 160 miles , which equation can he use to find his total cost y in terms of the number of miles driven ? Relate the effect of temperature and pressure on a gas to the model of a gas given by the kinetic molecular theory. Rhoda and James both sell laptops and earn commission based on the number of laptops sold. In one month, Rhodaearns $2000 in commission for selling 10 laptops and has a base salary of $600. The money James earns for sellinglaptops in the same month is shown in the graph below. PLS HELP ASAP I WILL GIVE THANKS BUT JUST PLS HELP NOW!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!EarthWhat is the orbit of the Earth?Is the Sun at the center of the Earths orbit?Describe the motion of the Earth throughout its orbit? Does it move at a constant speed? Pharaohs were buried in their temples with personal items, food and servants.TrueFalse What is the biggest problem with the Electoral College system? I M FRM ASIA... NEDD FRNDS...