Some help please i have done those a long time ago can t remember ​

Some Help Please I Have Done Those A Long Time Ago Can T Remember

Answers

Answer 1
If you added the formula =SUM(B1:B5) to a spreadsheet, what would it do?
O
A. Add together the contents of cells B1, B2, B3, B4, and B5.
O
B. Divide the content of cell B5 by that of cell B1.
O C. Subtract the content of cell B5 from that of cell B1.
D. Multiply the contents of cells B1, B2, B3, B4, and B5.
SUBMIT

Related Questions

application of machine learning in python finance at northeastern

Answers

Machine learning has various applications in the field of finance, including Python. At Northeastern University, machine learning is employed in finance to analyze and model financial data, make predictions, and support decision-making processes.

This application of machine learning enables the extraction of valuable insights, risk assessment, portfolio optimization, fraud detection, and more. In the context of finance at Northeastern University, machine learning in Python can be leveraged for a wide range of tasks. One significant application is the analysis and modeling of financial data.

By utilizing machine learning algorithms, patterns and trends can be identified in historical data, enabling the development of predictive models. These models can then be used to forecast future market trends, stock prices, and other financial indicators. Machine learning in finance also plays a crucial role in risk assessment. By analyzing large datasets, machine learning algorithms can identify potential risks, assess creditworthiness, and predict defaults. This enables financial institutions to make informed decisions when approving loans or managing investments.

Another valuable application of machine learning in finance is portfolio optimization. Machine learning algorithms can analyze historical performance data, market trends, and risk factors to optimize investment portfolios. This helps in achieving a balance between risk and return, maximizing portfolio performance.

Additionally, machine learning techniques are utilized for fraud detection in financial transactions. By training models on historical data and monitoring real-time transactions, machine learning algorithms can identify anomalous patterns and flag potentially fraudulent activities, providing an additional layer of security. Overall, the application of machine learning in finance at Northeastern University in Python enables advanced data analysis, prediction, risk assessment, portfolio optimization, and fraud detection, contributing to more informed decision-making and improved financial outcomes.

Learn more about Machine learning here:- brainly.com/question/31908143

#SPJ11

Drag each label to the correct location on the image. Match the components of the ER diagram to the diagram.

Drag each label to the correct location on the image. Match the components of the ER diagram to the diagram.

Answers

Note that the above words will be arranged in an ER Diagram as follows:

Entity Name --> Relationship --> Cardinality --> Entity

An ER (Entity-Relationship) diagram is a visual representation used to model entities, their attributes, and their relationships.

What is the rationale for the above response?

This is the standard order used in ER diagrams, where the entity names are first identified, followed by the relationship between entities, the cardinality of the relationship, and finally the related entity.

For example, consider the entities "Customers" and "Orders" which have a one-to-many relationship (one customer can have many orders). In the ER diagram, it would be arranged as follows:

Customers --> Has --> One-to-Many --> Orders

Learn more about ER Diagrams:
https://brainly.com/question/30710118
#SPJ1

what size is an internet protocol (ip) v6 payload field?

Answers

The Internet Protocol (IP) v6 payload field size is 16 bits.

In IPv6, the payload field is used to carry the actual data of a packet, such as the contents of an application or a higher-layer protocol. The payload field follows the IPv6 header and is used to transport information from the source to the destination. The payload field size in IPv6 is 16 bits, allowing for a maximum payload size of 65,535 octets. This larger payload field size in IPv6 compared to IPv4 (which has a 32-bit payload field) allows for more efficient transmission of data and supports the requirements of modern applications and protocols.

Learn more about IPv6 here:

https://brainly.com/question/31915824

#SPJ11

Hello,
I need help with (MATLAB) programs because I want to create a task to simulate the probability of getting the following hands on a given:
•Couple
•Two pairs
•Triss
•Quad number
•Cook
•Ladder
Note that if the deal contains four identical cards, it only counts as a four and not also a pair or three.
The statistics should be plotted as a bar chart where the height of the bars indicates
the probability in percent. The program that simulates the statistics must receive
one argument, the number of rolls to base the statistics on.

Answers

To simulate the probability of getting specific hands in a card game using MATLAB, you can create a program that takes the number of rolls as an input and generates statistics. The statistics can be plotted as a bar chart, where the height of the bars represents the probability in percentage.

To create the MATLAB program, you would start by defining the rules of the card game and the conditions for each hand (e.g., couple, two pairs, triss, quad number, cook, ladder). Then, you can implement a loop that performs the desired number of rolls, randomly generating card combinations and keeping track of the occurrence of each hand.
Within the loop, you would check if the current combination matches any of the defined hands. If a match is found, you increment the corresponding counter. After the loop completes, you calculate the probabilities by dividing the frequency of each hand by the total number of rolls and multiplying by 100 to get the percentage.
Finally, you can use the bar chart function in MATLAB to plot the statistics, where each hand corresponds to a bar, and the height of the bar represents the probability of obtaining that hand.
By executing this program with different numbers of rolls, you can observe how the probabilities of getting specific hands vary and gain insights into the dynamics of the card game.

learn more about MATLAB here

https://brainly.com/question/30760537



#SPJ11

Once a business determines that change needs to occur, what ahould the
business create?
A. Business operation
B. Business analysis
C. Business model
D. Business strategy

Answers

Answer:

D. Business strategy

Explanation:

Kono Dio Da!!

true or false A software license is a legal agreement but it does not control the use and distribution of software.

Answers

A software license is a legal agreement but it does not control the use and distribution of software is True.

They are some of the exclusive rights that the copyright owner has, or the rights that come with copyright ownership. A permission is granted by a license.

What is licensed software?On the other hand, licensed software is exclusive software that is only made available to authorized users through a licensing agreement. As the source code is not intended to be shared with the public for anyone to view or alter, it is the exact opposite of open source.Shareware software is offered for free or at a cheap cost, but in order to use it fully legally, it usually needs to be purchased and registered.Free software that has minimal license and copyright restrictions is known as proprietary software. The distribution disc's most popular apps and files are copied to your computer's hard drive during a custom installation.

To learn more about licensed software refer to:

https://brainly.com/question/29106760

#SPJ1

error handling python

Answers

You can check for mistakes in a block of code using the try block. You may deal with the error in Python using the except block.

How do you deal with Python's many errors?

Capturing every exception using a try-and-except statement

Python uses the try and except statements to catch and manage errors. The statements that manage the exception are written inside the except clause, but the sentences that potentially raise exceptions are retained inside the try clause.

What is Python's approach to value errors?

A try-except block can be used to fix the ValueError in Python programs. Try blocks should contain any lines of code that could potentially throw a ValueError, and except blocks can catch and handle errors.

To know more about Python visit:-

https://brainly.com/question/13106116

#SPJ4

Question:

What is error handling in Python?

Which of the following is constantly changing and advancing?

Innovation

Cell phones

Technology

Computers

Answers

Answer:

Technology

Explanation:

This is because Cell phones ,Innovation ,and Computers ARE changing although they are in the same group of "Technology" so it would be technology.

Any questions?

In class discussions we learned that the principle of holding employees accountable for internal control responsibilities is most closely associated with which of the COSO component

Answers

The principle of holding employees accountable for internal control responsibilities is most closely associated with the Control Activities component of the COSO framework.

Control activities are the policies and procedures implemented by management to ensure that internal controls are functioning as intended.

Holding employees accountable for their responsibilities within these control activities is essential to maintaining effective internal control.

This principle emphasizes the importance of assigning clear roles and responsibilities to employees, monitoring their performance, and taking corrective action when necessary.

Learn more about COSO model at

https://brainly.com/question/17246172

#SPJ11

Yesterday, you created a new swap area for your system. Today, after rebooting the system, you find that the swap area is not mounted. What should you

Answers

Answer:

You should recreate your swap mount and save it so it does'int go anywhere and u can have it for another day

Explanation:

A search expression entered in one search engine will yield the same results when entered in a different search engine.
A. True
B. False

Answers

Answer:

false

Explanation:

For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that shows what the progress looks like over time. Which application is best suited for this effort?


Notepad or Paint


Impress or PowerPoint


Writer or Word


Calc or Excel

Answers

Calc or excel
Hope this helps

Q1 – A python script is attached below. Please choose the correct approach to update it so that it will draw a square instead of a line.
import turtle
t1 = turtle.Turtle()
for m in range(4):
t1.forward(50)
turtle.done()
A. Add “t1.right(90)” in the for loop, after the forward(50) statement.
B. Add “t1.right(90)” before the for loop.
C. Replace “t1.forward(50)” with “t1.square()” statement.
D. Replace “t1.forward(50)” with “t1.left(90)” statement.

Q2 – Try the following script, what will you get?
G1 = turtle.Turtle()
for i in range(50):
G1.forward(50)
G1.right(144)
turtle.done()

A. A star
B. A circle
C. A square
D. A curve

Answers

Answer:

A and A

Explanation:

Q1 – The correct approach to update the script so that it will draw a square instead of a line is:

A. Add “t1.right(90)” in the for loop, after the forward(50) statement.

This will make the turtle turn right by 90 degrees after each forward movement, creating a square.

Q2 – The script will draw:

A. A star

The script moves the turtle forward by 50 units, then turns it right by 144 degrees. This process is repeated 50 times, creating a star pattern. The angle of 144 degrees is chosen because it is a divisor of 360, which ensures that the turtle returns to its starting position after completing the loop.

どういたしまして

Which security principle states that if you have not specifically been allowed access, then it should be denied

Answers

The security principle that states that if you have not specifically been allowed access, then it should be denied is known as the principle of least privilege (POLP).

POLP is a fundamental security concept that suggests that a user or process should be granted only the privileges or access necessary to perform their tasks and nothing more.POLP reduces the risk of unintended access, misuse, and data breaches that could result from unnecessary access by limiting access rights to the minimum level required to complete a job. For instance, a user account may be granted access to a specific folder, but the permissions could be read-only, preventing the user from making modifications.

This principle can help reduce the risk of a user unintentionally or deliberately accessing files or applications that they should not have access to.POLP is critical for data security in networks, especially in cloud environments. The principle is commonly used in computer networks and is widely recognized as a key aspect of data security. POLP limits access rights to only the most fundamental needs, and it ensures that network users can access only what is necessary to do their work while still safeguarding valuable data assets.

Learn more about principle of least privilege: https://brainly.com/question/30262419

#SPJ11

7. in a binary search, first, the search item is compared with the last element of the list. a. true b. false

Answers

The statement "In a binary search, first, the search item is compared with the last element of the list" is false (b).

If the search item is less than the middle element, the search continues in the lower half of the list. If it is greater than the middle element, the search continues in the upper half of the list. This process of dividing the list in half and comparing the search item to the middle element is repeated until the item is found or it is determined that the item is not in the list.

In a binary search, the search item is initially compared with the middle element of a sorted list. If it matches, the search is successful. If not, the process is repeated with the appropriate half of the list, depending on whether the search item is greater or smaller than the middle element.

To know more about binary search visit:

https://brainly.com/question/12946457

#SPJ11

How would someone know if their were communication devices placed in their homes illegally. Cameras and USB controlling devices?

Answers

Explanation:

Among the recommended options often suggested by IT experts includes:

In the case of cameras, using a cell phone around the home switch results in unusual signal interference possibly indicates a special radio frequency coming from the illegally implanted device.The use of a mobile app designed for detecting hidden cameras. For example, the ”detect hidden cameras” app available on iPhone or Android mobile devices is a good tool. This app automatically senses  the radio frequencies of any hardware within the device range.

Write a function that takes in a parameter, squares it, and then prints the results. Squaring a number means multiplying it by itself. Then make several calls to that function in your start function to test it out. Does it
work for all arguments?

this is what i have so far but when i check the code it says “you should call your function square with some parameters. call your function at least twice” what am i doing wrong?

Write a function that takes in a parameter, squares it, and then prints the results. Squaring a number

Answers

Answer:

are you looking answer like this?

def square(x):

   return x * x

def start():

   print(square(2))

   print(square(3))

   print(square(4))

   print(square(5))

start()

Katie is a professional photographer. For a wedding season shoot, she chose an outdoor location to shoot her models wearing different kinds of
wedding gowns. She used natural lighting, and she kept the focus on the models with a blurry background. Which kind of focusing technique did
Katie use?

A- rack focus
B- silhouette focus
C- follow focus
D- selective focus

Answers

Answer:

D- selective focus

Explanation:

In photography the phrase 'selective focus' introduces a procedure where the photographer selectively concentrates on the subject of an illustration, basically neglecting all other characters of the scene.  The contrast of the intense subject toward the delicate image background formulates powerful, meditative images.

Answer:

Selective focus

Explanation:

can direct the viewers' attention to a subjectt by focusing on the subject and burring the background

which of the following describes an ec2 dedicated instance? group of answer choices an ec2 instance running on a physical host reserved for the exclusive use of a single aws account an ec2 instance running on a physical host reserved for and controlled by a single aws account an ec2 ami that can be launched only on an instance within a single aws account an ec2 instance optimized for a particular compute role

Answers

Dedicated instance are EC2 is running on a physical host reserved for the exclusive use of a single AWS account.  run in a VPC on hardware that's dedicated to a single customer. Dedicated instance are EC2 is used to run in a VPC on hardware that's desired to a single customer.

Dedicated Instances are Amazon EC2 instances that is running on a physical host reserved for the exclusive use of a single AWS account. Your Dedicated instances are physically isolated at the host hardware level from instances that belong to other AWS accounts. Dedicated Instances belonging to different AWS accounts are physically isolated at the hardware level, even if those accounts are linked to a single payer account. Dedicated Instances is that a Dedicated Host gives you additional visibility and control over how instances are deployed on a physical server, and you can consistently deploy your instances to the same physical server over time.

Learn more about dedicated intance at https://brainly.com/question/14302227

#SPJ4

A Class or ID can be declared in the opening or closing tag
psing tag
O True
O False

Answers

Answer

True.

Explanation:

In HTML, you can declare a class or ID for an element in the opening tag or closing tag of the element.

Electronic Computers could not understand our language of the alphabet and our number system. so what do you think had to be done to assist Computers to understand our Language and how we express our language.

Answers

Answer: All data in a computer system consists of binary information. 'Binary' means there are only 2 possible values: 0 and 1. Computer software translates between binary information and the information you actually work with on a computer such as decimal numbers, text, photos, sound, and video. Binary information is sometimes also referred to as machine language since it represents the most fundamental level of information stored in a computer system.

Explanation:

Answer:

I think a better way is to develop higher technology. Something like 5G will allow Electronic Computers to turn faster and understand our language.

Perform binary calculation: 110111 +101011) X 11​

Answers

Answer:

10000110110

Explanation:

\(110111 +\\101011\)

______

1100010

1100010 × 2 is the same as \(1100010+\\1100010\)   = 11000100

11000100 × 2 is the same as \(11000100+\\11000100\)    = 110001000

110001000 × 2 is the same as \(110001000+\\110001000\\\)   = 1100010000

\(1100010000\\11000100\\1100010+\\\)

_______

10000110110

Decrypt a message that was encrypted using the following logic: • First the words in the sentence are reversed. For example, "welcome to hackerrank" becomes "hackerrank to welcome". • For each word, adjacent repeated letters are compressed in the format

Answers

To decrypt a message that was encrypted using the logic you described, you can use the following steps:

Reverse the order of the words in the message: This will restore the original word order of the sentence.

For each word, find any compressed letters and expand them: For example, if a word contains the letter pair "aa", you can replace it with "a".

Concatenate the words to form the original message: This will give you the decrypted message.

Here is an example of how you can use these steps to decrypt a message:

Message: "kcabtoohsrewolfnwodgnikooL"

Step 1: "kcabtoohsrewolfnwodgnikooL" becomes "Look good going down now wolf welcome short so hot back"

Step 2: "Look good going down now wolf welcome short so hot back" becomes "Look good going down now wolf welcome short so hot back"

Step 3: Concatenate the words to form the original message: "Look good going down now wolf welcome short so hot back"

To know more about Decrypt kindly visit
https://brainly.com/question/15443905

#SPJ4

suppose you are working with the tiny clothes database. write one sql query to find the name and address of everyone who bought pants.

Answers

SELECT Name, AddressFROM Customers

JOIN Orders ON Customers.CustomerID = Orders.CustomerIDJOIN OrderItems ON Orders.OrderID = OrderItems.OrderID

JOIN Products ON OrderItems.ProductID = Products.ProductIDWHERE Products.ProductType = 'pants';

The SQL query above retrieves the Name and Address of customers who bought pants from the Tiny Clothes database.

by joining multiple tables: Customers, Orders, OrderItems, and Products. The query links the CustomerID in the Customers table to the CustomerID in the Orders table, then joins the OrderID in Orders with the OrderID in OrderItems, and finally links the ProductID in OrderItems with the ProductID in Products. The WHERE clause filters the results to only include products with the ProductType of 'pants'. This query provides the desired information about customers who  pants.

Learn more about SQL here:

https://brainly.com/question/31663284

#SPJ11

select the true statement about html html is a network protocol

Answers

The statement "HTML is a network protocol" is false.

HTML (Hypertext Markup Language) is not a network protocol but a markup language used for structuring content on the web. It provides a way to define the structure and presentation of web pages. HTML is responsible for specifying the elements, tags, and attributes that define the content and layout of a webpage. On the other hand, network protocols, such as HTTP (Hypertext Transfer Protocol), are responsible for the communication between web servers and clients over the internet.

learn more about:- HTML  network protocol here

https://brainly.com/question/24065854

#SPJ11

Write a method that will print out a schedule from a network, where the network is the parameter to the method. The schedule should print out 2~3 show titles. The program exits when the user types in “quit”
public static void tvGuide(String network)

JAVA ONLY!!! CHECK YOUR CODE IF IT CORRECT!!!!!

Answers

Here's an implementation of the tvGuide method in Java:

The Program

import java.util.Scanner;

public class TVGuide {

   public static void tvGuide(String network) {

       Scanner sc = new Scanner(System.in);

       String input;

       while (true) {

           System.out.println("Welcome to " + network + " TV Guide!");

           System.out.println("Today's top shows:");

           System.out.println("1. Show 1");

           System.out.println("2. Show 2");

           System.out.println("3. Show 3");

           System.out.println("Type 'quit' to exit");

           input = sc.nextLine();

           if (input.equals("quit")) {

               break;

           }

       }

       sc.close();

   }

}

This method takes a network string as a parameter, which is used to print out the TV guide for the given network. The method uses a Scanner object to get user input and a while loop to continually display the TV guide until the user types in "quit".

The break statement is used to exit the loop and the Scanner object is closed at the end of the method.

Read more about Java method here:

https://brainly.com/question/15410217

#SPJ1

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

Assume that c is a variable that has assigned a string value. Write an expression whose value istrue if and only if c is a newline character.

Answers

Only if the character c is a newline. isQuadrilateral=numberOfSides in clause A

c == '\n'

What does the programming statement "c == '\n'" mean, and what exactly is a newline character?

The comparison operator "c == '\n'" determines whether the value of the variable "c" equals the newline character "n."

A newline character, which is a control character in programming languages, signifies the end of one line of text and the start of a new one. The ASCII character code 10 or the escape sequence "n" serves as its representation.

Create a formula whose value is true if and only if c is the character for a new line.

The evaluation of the comparison "c == '\n'" is as follows:

The variable "c value "'s is obtained.

A constant is established for the character "\n."

We compare the values of "c" and "\n."

The comparison's outcome is true if they are equal; if not, it is false.

Because of this, the statement "c == '\n'" can only be true if the value of "c" is a newline character. The formula evaluates to false if the character "c" is any other character.

In conclusion, this phrase can be used to programmatically determine whether a variable has a newline character, which is helpful for text manipulation and parsing.

To know more about newline character visit:

https://brainly.com/question/14455256

#SPJ4

You defined a class and saved it as shoe.py.
Which line of code will allow you to use the class in another program?
from shoeClass import *
O import shoe from
O from shoe import
O import shoeClass from

Please hurry

Answers

Answer:

Import shoeClass from

Explanation:

You defined a class and saved it as a shoe. The line of code that allows you to see the class in another program is import shoeClass from. The correct option is d.

What is programming?

A form of computer programming language known as procedural programming describes a number of well-planned actions and processes during the course of its development.

It includes statements, functions, and commands that are organized systematically to finish a computing task or program. Its main focus is on developing procedures.

While object-oriented programming is a type of programming where the emphasis is on creating objects as opposed to actions and data or logic. Its four guiding principles are encapsulation, abstraction, polymorphism, and inheritance.

Therefore, the correct option is d. import shoeClass from.

To learn more about programming, refer to the link:

https://brainly.com/question/14368396

#SPJ5

who invented the computer? ​

Answers

Answer:

Charles Babbage invented computer

Other Questions
After a charge is filed with the EEOC and the EEOC finds reasonable cause, it will first attempt to eliminate the discriminatory practice through which of the following methods?Conciliation You are conducting an iteration demonstration to a group of stakeholders when the CFO expresses their displeasure over the missing reporting module. You explain to the CFO why the module was rescheduled to be developed in a later iteration. How could you have better managed this? In a food web, what would happen if a secondary consumer were removed.A. The food web would collapse.b. The food chain would collapse.c. The consumer eaten by the secondary consumer would die.d. Another secondary consumer would would replace the removed secondary consumer. Hi Mehta06 heres my question that i told you what kind of harm can come from the myth that healthy relationships are entirely free from conflict? Which angle is vertical to GDF? the disc diffusion method should be read out in 24 hours after inoculation. what errors can occur allowing plates to sit longer than 24 hours? Seven million forty-eight thousand five hundred and six may be written as Translate into a variable expression. y decreased by 30 What are the benefits of reading Rich Dad Poor Dad? deferred revenue, which represents the company's obligation to honor gift cards previously issued to customers, totaled $6,600 at the beginning of the year and $9,000 at the end of the year. customers purchased gift cards amounting to $50,400 during the year. what was the amount of gift cards redeemed by customers during the year? multiple choice $48,000 $52,800 $66,000 $34,800 Which solution (s) is/are hypotonic? Check all that apply.iodinedistilled water0.85% normal salinewater from Elodea dish10% saline why would the nurse provide special instructions to nursing assistive personnel (nap) before feeding a patient with dysphagia? Which theory states that earth is the center of the universe?. 15. The sum of two numbers is 31/35, and their difference is 11/35. What are the numbers? Increasing salinity causes the density of water to-AincreaseBdecreaseCremain the sameDfirst increase, then drastically decrease Suppose workers have the utility function U(C, L) = C (L^2)/2, where C is consumption and L ishours worked. The worker is choosing how many hours to work in a year. The wage rate is w=10per hour. There is no non-labor income.a. Solve for the amount of labor that maximizes utility.b. Now suppose there are two people in the country, Bernie and Hillary. Hillary's wage is wh=20, while Bernie's is wb=10. The government implements a tax and transfer scheme. Income istaxed at a flat 20% rate. The proceeds are used to fund an equal lump-sum transfer to Bernie andHillary. For both Bernie and Hillary, find hours worked and taxable income.c. What is the tax revenue of the government? What is the income of Hillary and Bernie aftertaxes and transfers? How was labor supply impacted? Jack wants toput a mat on the floor of his tree house.The mat has an area of 72 square feet.His tree house measures 8 feet by 8 feet.Will the mat fit in the tree house? Howdo you know? In the 1800s, the United States was still a very young nation, trying to solidify its identity. The Industrial Revolution began in Great Britain, a fast development of society following the introduction of machines. The United States was slower than Great Britain to fully embrace the changes. Yet key technological developments caused a rapid growth in American urban areas.Better farming methods and tools in the 1800s increased food production. Americans were able to grow enough food for their families as well as to sell. The abundance caused food prices to fall.The expansion of cotton and the growth of textile factories in northern states helped produce the first wave of American industry. More people turned to work in northern factories as a way to support their families. Thousands of immigrants to the United States also settled in or near port cities, looking for work. Even today, the need for work is a common reason people move to urban areas.As a result, cities grew in numbers of people and physical space. As more people and businesses moved in, they needed buildings for living and working. They needed ways to move around the city. We call this process urbanization.In 1820, the United States had only a few cities of 10,000 residents or more. About seven percent of U.S. residents lived in urban areas. The number of cities with more than 10,000 people grew quickly over the next 40 years, especially in the Northeast and Midwest. By 1860, about 20 percent lived in cities. Philadelphia and New York City were the most populated cities in 1860 and would soon reach one million residents.The urbanization of the United States quickened due to technology improvements. Without innovations in food production, the factories could not have grown so quickly. The trend quickened after 1860 and continued throughout the 21st century as well. By 2007, more Americans lived in or near cities than they did in rural areas.Which details are used to support the main fact in the fifth paragraph? How do you do this question?