A website that sells high-end ties notices that its ads are showing up for searches that include "cheap". Because its ties are expensive, it does not want its ads to show up for searchers using the word "cheap". What should this advertiser do?

Answers

Answer 1

Answer: Add "cheap" to the negative keyword list.

Explanation: Pretty self explanatory, by adding a negative keyword It should not use that word if searched to find people to advertise to.


Related Questions

3.A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 950 to the AMD Ryzen 7 2700X. Which of the following accurately describes this upgrade

Answers

Answer:

The upgrade is possible and it will yield a remarkable  increase in performance

Explanation:

It is a newer product, there is tendency of having a better application compatibility/performance

It has much higher multi threaded performance which is around 522% higher. This allows for higher performance in professional applications like encoding and heavy multitasking compared to the previous.

When considering gaming, it has higher performance compared to the previous.

Use two variables k and total to write a for loop to compute the sum of the squares of the first 50 counting numbers, and store this value in total. Thus, your code should put 1*1 + 2*2 + 3*3 +... + 49*49 + 50*50 into total. Use no variables other than k and total.

Answers

Answer:

Following are the statement in the C++ Language  

int total=0; // variable declaration

int k;// variable declaration

for(k=0;k<50;k++) // iterating the for loop

{

   total=total+k*k;// perform operation  and calculating square of 50 number

}

Explanation:

Following is the description of the statement  

Declared a variable "total" and "k" of the "int" type initialized the total variable with the value 0. Iterating the for loop for calculating the squares of the first 50 counting numbers. So we will execute the loop less then 50 . In this loop, we counted the square of 50 number in the "total" variable.

If the destination file is closed when you make a change in the source file, you choose whether to update the link to display the current values when you open the destination file or continue to display the older values from the destination file.a) trueb) false

Answers

Answer:

True

Explanation:

When changes are made in the source file, even if the destination file is closed, you can either do any of these two; you choose whether to update the link to display the current values when you open the destination file or continue to display the older values from the destination file till the destination file is opened.

Any of the two you choose will not affect the changes already made at the source file becsuse the source file controls the activities in the destination file.

Hence, the statement as ascertained to be true.

Sandy is replacing her broken laptop LCD screen with a new screen. During disassembly, she notices two cables that wrap around the screen and connect to the mini-PCIe card inside the laptop.

What will happen if Sandy breaks one of these cables?

Answers

Answer:

She will not be able to connect to Wi-Fi with the laptop.

Explanation:

The mini pci-e card is simply referred to as the Wi-Fi card. It is the work of the mini pci-e to enable the computer or laptop have a Wi-Fi access when it is in perfect condition.

When any of the parts, that is the black and white cables is broken or faulty then such a mini pci-e will not have the capacity to connect its associated laptop to a Wi-Fi.

What is the easiest way to provide sufficient bandwidth for VoIP plus data on your LAN? Group of answer choices Over-provision the network Use gigabit Ethernet Use fiber optic cable Use a high-compression codec

Answers

Answer:

Over-provision the network.

Explanation:

Over-provision of the network is the simplest method to have an appropriate VoIP bandwidth plus information on the Local Area Network.

Over-provision is typically seen to secure network efficiency from changes in traffic. Usually, it includes dimensioning connections such that that the bandwidth meets by some margin that projected data pressure, which would be chosen to indicate that the connection can handle both anticipated and unforeseen traffic variations.

In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of ____________________ keys.

Answers

In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of surrogate keys.

Explanation:

A surrogate key is a unique identity as an object or entity. It is used as an object in the database and as an entity in the modern world. Surrogate key is not a natural key hence it cannot be derived from application data.

Advantages of using surrogate key:

They are uniqueThey have uniform rulesIt allows unlimited valuesIt stands the test of time

the program is running, it can use the class to create as manyobjects of a specific type as needed. Each object that is created from aclass is called a(n) __ of the class

Answers

Answer: "An instance of a class"

Explanation:

When you create an object, you are creating an instance of a class, therefore "instantiating" a class.

You create an object from a class, thus you can say that a class provides the blueprint for objects.

When used in object-oriented programming, a class is a factory for creating objects and Such objects are called "instances" of the class.

Henry considered two criteria when he selected his laptop: efficiency of the CPU and the capacity of the hard disk drive. These features represent the _____.

Answers

Answer:

Determinant criteria

Explanation:

When studying consumer behaviour, it is important to understand the criteria that consumers use to make their choices when it comes to goods. This criteria can be divided in several categories, such as determinant criteria and evaluative criteria. In this case, the example describes determinant criteria. This is the criteria that is most carefully considered and is directly related to the actual choice that is made.

Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counsel's desk b. an MBA student who tracks the market very closely c. a broker who once worked in the pharmaceutical industry d. All of the above would be tippees.

Answers

Answer:

Option A is correct.

Explanation:

A janitor that collects data through reviewing reports on a business counsel's desk could be a tippee for insider trading activities.

Probably, the justification for insider trading remains wrong being that it offers each insider the undue benefit on and around the marketplace, gets the insider's preferences beyond them for which they assume the trustee responsibility, as well as enables the insider to unfairly manipulate the cost of the inventory of a business.

So, the following are the reason the other options are not correct according to the given scenario.

Ming's computer crashed suddenly the other day. Ming kept trying the solution that worked last few times it had crashed, even though it is clear that it won't fix his computer now. Ming's failure to solve this problem is most likely due to ______________.

Answers

Answer:

A mental set is the correct answer of this question.

Explanation:

Ming's computer crashed abruptly the next day. Ming has continued to try the workaround the last couple of times it's crashed, though it's clear that it's not going to fix his computer now. The inability of Ming to overcome this issue is most likely due to a collection of mentalities.Because of his mental set he fails to solve the problem.

It means it is directly related to the mind set of the computer system the main objective of mental set in computer to solve the problem is mental set in computer is not crashed then computer system is not working.

Omega Software Inc. is currently running a training program for employees to upgrade their software skills so that they are able to design more efficient software programs. Omega Software is attempting to make a change in the area of:_______.

Answers

Answer:

Omega Software is attempting to make a change in the area of people.

Explanation:

Types of Organizational Change:

Most organizations have to go through a change to keep up with the changing market dynamics, trends and technologies. There are four major types of organizational change:

StructuralStrategicPeopleProcess

People change:

One of the organizational change is people change where organizations strive towards the improvement of their employee's skills set and productivity. This is usually achieved by launching various specialized and general training programs for employees to enhance their knowledge and widen their skills set so that they can work more efficiently for the organization.

Therefore, it can be concluded that Omega Software is attempting to make a change in the area of People.

Give a recursive implementation for the function: def is_sorted(lst, low, high) This function is given a list of numbers, lst, as well as two indices: low and high (low ≤ high), which indicate the range of the indices for the elements that should to be considered. When called, the function should determine if the elements that are placed at the low, low+1, …, high positions, are in an (ascending) sorted order. That is, it should return True if-and-only-if lst[low] ≤ lst[low+1] ≤ … ≤ lst[high] For example, if lst = [1, 3, 6, 8, 12, 15, 31], the call is_sorted(lst, 0, 6), will return True. Implementation requirements: Your function should run in worst case linear time. That is, if n is the size of the range low, low+1, …, high, calling is_sorted(lst, low, high) will run in �(�). Note: Write your implementation.

Answers

Answer:

# recursive method to find if list is in ascending order

def is_sorted(list, low, high):

   if low >= high:     # if reached end of list

       return True

   if list[low] > list[low+1]:     # if item at low is greater than low+1

       return False                # return false

   return True and is_sorted(list, low+1, high)    # or return True and recursion call to low+1

Explanation:

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.

Answers

Answer:

TCP connection(Transmission Control Protocol) is the correct answer of this question.

Explanation:

TCP guarantees data delivery and also means packets will be provided in the same order in which they were sent.Negotiation by the sender's transport layer with the receiver's transport layer to establish what size containers should be set up by maintaining a(n) TCP connection between the sender and the receiver.

Once diluted, it could also be used as a mouthwash, and may also double as a specific disinfectant.TCP / IP is essential because it runs over the whole Internet.

ou discover an unattended email address or fax machine in your office that receives beneficiary appeals requests. You suspect that no one is processing the appeals. What should you do

Answers

Answer:

C. Contact your compliance department.

Explanation: You can Contact your compliance department to look into the beneficiary appeal requests that your company receives, screen then and decide on which ones to work with or which ones your company should discard and delete.

Which of the following statements about Java Class Libraries is false? Question 18 options: A) An advantage of using Java class libraries is saving the effort of designing, developing and testing new classes. B) Java class libraries are also known as Java APIs (Application Programming Interfaces). C) Java class libraries consist of classes that consist of methods that perform tasks. D) Java class libraries are not portable

Answers

Answer:

D) Java class libraries are not portable

Explanation:

The Java Class Library (JCL) is an array of enthusiastically loadable libraries that Java applications can identify and refer to at run time. Since the Java Platform is independent of any particular operating system, applications can’t depend on any of the platform-native libraries.

The library is a massive collection and works of prebuilt classes that is distributed through the Java SE platform.

Answer:

D) Java class libraries are not portable

Explanation:

The Java Class Library (JCL) is an array of enthusiastically loadable libraries that Java applications can identify and refer to at run time. Since the Java Platform is independent of any particular operating system, applications can’t depend on any of the platform-native libraries.

The library is a massive collection and works of prebuilt classes that is distributed through the Java SE platform.

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from many locations at the same time.

Answers

DDoS - Distributed Denial of Service

Explanation:

In DDoS attack, the attack comes from various system to a particular one by making some internet traffic. This attack is initiated from various compromised devices, sometimes distributed globally through a botnet. It is different from other attacks  such as (DoS) Denial of Service attacks, in which it utilizes an unique Internet-connected device ( single network connection) to stream a target with the malicious traffic. So in DDoS, multiple systems are involved in the attack and hence we can conclude that as the answer.

Which of the following is not a component of the programming phase of facility construction? deciding what to build examining space, cost, and other criteria designing the facility with architects deciding what events will be held at the facility and addressing capacity and amenities issues deciding the number and location of food and beverage preparation and sales areas

Answers

The programming phase focuses on fundamental design and planning aspects of facility construction but does not typically include deciding which events will be held at the facility. It lays out foundational design elements like capacity and amenities, while event scheduling pertains to operational planning.

The component that is not a part of the programming phase in facility construction is 'deciding what events will be held at the facility'. Programming, as a part of the design process, focuses on gathering information about the project, such as site inventory, analysis, and understanding user needs, environmental conditions, and economic considerations. This phase includes activities like deciding what to build, examining space, cost and other criteria, and integrating findings into the design with architects. It specifically deals with the fundamental aspects of designing the facility, ensuring the design maintains a focus on elements like capacity and amenities to meet users' needs. However, decisions related to events pertain to operational planning, which is distinct from the initial construction programming.

Programming provides the critical foundation for later stages such as schematic design, design development, construction documentation, and construction administration. This early stage of planning helps lay out the essential frameworks and supports potential adaptability in design—not detailed operational planning such as event scheduling.

are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer

Answers

Answer:

Check the explanation

Explanation:

The Message confidentiality:

1) If any digital attacker can’t recognize or read the encrypted message then the message is termed as message confidentiality.

2) Making use of encryption and decryption technique to find the confidentiality.

Message Integrity:

1) The message is altered by the receiver and the procedure is called message integrity.

2) In this case initial message is not changed in the transfer point.

3) With the use of summing methods are to find the message integrity.

----------------------------------------------------------------------------------------

No, the two message privacy and integrity are different autonomous processes.

-----------------------------------------------------------------------------------------

Yes, the message integrity without any confidentially. Sometimes hackers finds it possible to alter message in the case of message integrity. Then the confidentiality status of message is damaged.

You are planning to add CSS to a web page that was written with HTML and has lists on the page. What new formatting option will you gain by including CSS?

Answers

Answer: Easily alter the color of all list to a different one.

Explanation: Cascading Style Sheet (CSS) is mainly used to style documents written in Markup language such as Hypertext Markup Language (HTML). Cascading Style Sheet is a robust due to the ease afforded to web designers in the alteration and modification of styles applied to documents written in Markup Language. It gives users or designers more control over the style of documents, it is easier and ultimately saves a lot of time.

In the scenario above, adding CSS allows the user to change or alter the style of the list, such as color much more easily.

In order for Dr. Reynolds to send a CPOE from her office computer system to the computer system at the local hospital, a/an ____________________ must exist between the two computer systems.

Answers

Answer:

Interface

Explanation:

An interface is the communication connection between two or more computers in a network that allows sharing of information or data between each components of the network such as computer peripheral device and software.

If you are trying to create a web page for your band and having difficulty creating links to other groups on your page, what is the most likely cause of this problem?

Answers

Answer: Malfunctioning of your hypertext program or malfunctions in your hypertext program.

Explanation: Hypertext is text that contains links to other texts. The HyperMedia is a collective term which can include graphics, video, sounds and texts, hence Hypertext.

The Hypertext also be said to be a special type if database system in which objects like Text, pictures, music, programs etc can be linked to each other creatively such that When you select an object, you can see all the other objects that are linked to it and you can move from one object to another regardless of if they have different forms or not. It was invented by Ted Nelson in the 1960s.

According to the question, when you are trying to create a web page for your band and creating links to other groups on your page, you are probably using the hypertext and if you are having problems doing this, then your hypertext linking is malfunctioning.

With any installation, remember the importance of using a ground strap (ground bracelet) to ground yourself when working inside a computer case to protect components against ____.

Answers

Answer:

ESD

Explanation:

ElectroStatic Discharge (ESD) are Sparks (electrons) that jump from an electrically charged object to an approaching conductive object.

Cheers

Care should be taken whenever you post comments or photos to any social media or other websites, because each of these online activities either add to or detract from your personal brand.1. True2. False

Answers

Answer:

True

Explanation:

Building your personal brand requires extreme care when it comes to social media presence. In the age of internet there is nothing hidden, so whatever you post or comment will be seen by your audience and it can go in either way. It can either make your brand or break it. It is of utmost importance to leave a pleasant and positive impact on your audience. One should not indulge in inappropriate or controversial debates and try to avoid being too personal on social media.  

You need to provide connectivity between two buildings without running any cables. You decided to use two 802.11ac APs to provide wireless connectivity between the buildings. Which of the following is the BEST choice to support this need?
a. Use omnidirectional antennas on both APs.
b. Use wide channels.
c. Use the 2.4 GHz frequency band.
d. Use direction antennas on both APs.

Answers

Answer:

D

Explanation:

Use Directional antennas on both APs

In order to get a comprehensive evaluation of the computer programmers he managed, Justin organized a(n) __________, where he asked immediate coworkers and others who worked closely with the programmers to participate in the evaluation process.

Answers

Answer:

c. 360-degree review

Explanation:

360-degree feedback mostly serve as a process of communicating strengths and weaknesses to a targeted manager or the one doing the review.

A managers can decide to get better or improve their performance through a 360-degree review feedback.

The review and the feedback gottrn often provides an external source by making available information that increases managerial self-awareness.

The combination of systematic coaching and the feedback gotten can be used to improve self awareness.

When the feedback gotten is combined with systematic coaching, it has a positive effect on work attitudes and intentions to quit. This in turn reduces the costs through decreased turnover, improved job satisfaction, and performance related commitment

The main aim of feedback is often to achieve change.

A manager that wants to carry out a comprehensive assessment will have to do 360-degree review.

Melinda completed the Computer Programming Aptitude Test when she applied for a position with Beta Electronics. Six months later, she took the same test when she applied for a position with another company. The fact that her scores were almost identical on the two occasions suggests that the test has a high degree of Group of answer choices stability. content validity. reliability. standardization. predictive validity.

Answers

Answer:

reliability

Explanation:

The fact that her scores were almost identical on the two occasions suggests that the test has a high degree of reliability. Meaning that the test is trustworthy and performs consistently. That is because the main factor that determines whether or not a test is reliable is if a certain input, outputs the same results every single time regardless of the amount of times that it is tried. Which seems to be the case in this scenario with this test.

When evaluating portable CD players, you consider price, the sound quality, and ease of using the controls. These are your ______ in the purchased decision process.

Answers

Answer:

Hi you haven't provided the options to the question so I will just give the answer in my own words and you can check with the options.

Answer is ALTERNATIVES

When evaluating portable CD players, you consider price, the sound quality, and ease of using the controls. These are your ALTERNATIVES in the purchased decision process

Explanation:

Purchase decision process is the decision making process used by consumers regarding the market transactions before, during and after the purchase of a good or service.

There are five stages involved in purchase decision process which are: need recognition,

Information search, evaluation of alternatives, purchase decision and post purchase behavior.

Evaluation of alternatives: The information search reveals different products for the consumer to evaluate and understand which product would be appropriate, this can also be referred to as the consumer's alternatives.

Therefore, the answer that best suits the question is ALTERNATIVES. When evaluating portable CD players, you consider price, the sound quality, and ease of using the controls. These are your ALTERNATIVES in the purchased decision process

Answer:

They are my "Alternatives" in the purchase decision process

Explanation:

Before customers take the bold step of purchasing goods or paying for services, they usually pass through five stages. These five stages are:

1. The problem recognition stage.

2. The information search stage.

3. Evaluation of alternatives stage.

4. Purchase decision stage.

5. Post- purchase evaluation stage.

This then implies that before a product is finally purchased or before a service is paid for, the process of buying that product/service commences long before the actual acquisition of the service/product.

In the first stage, the consumer understands/recognizes that there is a problem or need that could be met by a product.

In the second stage, after recognition of the need that must be met by a product or service, the consumer then makes moves to search for further information regarding the possible products that could meet this need.

After the consumer has satisfactorily gathered enough information regarding the products that can possibly meet those needs, he/she then starts evaluating those products/service with regards to the belief in the company producing the products, the degree of importance, characteristics and abilities of the commodity, satisfaction, price etc, in order to choose wisely and correctly.

Therefore, if I consider price, sound quality etc when evaluating portable CD player, those things I consider are my alternatives in the purchase decision process.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network form her laptop computer. While talking to her, you discover that she is trying to work form the break room two floors above the floor where she normally works.

Which of the following is the MOST likely cause of her connectivity problem?

• The user has not yet rebooted her laptop computer while at her new location.
• The user needs a new IP address because she is working on a different floor.
• The wireless network access point on the user's normal floor has failed.
• The user is out of the effective range of the wireless access point on her floor.
• The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

The user is out of the effective range of the wireless access point on her floor.

Explanation:

This user is obviously not close to the access point. As help desk, if a user ever calls to complain about slow speeds or intermittent connectivity while trying to access the network, the first question that you should ask them is how far out are they from the modem or the Access Point. The location between her and the access point might affect the performance of the wireless network. Since she is working from the break room that is two floors above the floor where she normally works, then this means that the walls and ceilings will act as an obstruction to the Wi-Fi signal. The number of Walls and other obstacles will obviously affect the range of the Wi-Fi and will limit the signal’s effectiveness. I will advise the user to go back to her initial working area or be within range to the access point.

__________ involves analyzing a large amount of data to extract knowledge and insight

Answers

Answer:

"Data analytics" is the correct answer for the above question.

Explanation:

Data analytics is a process that is done by the analyst, This process is done to take some important decisions for the perspective of the organization.The organization data is stored in some places, then analysis takes the data from the storage and process it to extract some useful information. This useful information is used to make decisions that will work to enhance the profit of the organization.This process involves some process that is used to make the information from the data and this is also asked by the above question. Hence "Data Analytics" is the correct answer to the above question.

Assume that dataTransmitter is a variable that refers to an object that provides a method, named sendTwo. There are two arguments for this method: a double and an int. Invoke the method with the double value of 15.955 and the int value of 133.

Answers

Answer:

The code to this question can be described as follows:

Code:

dataTransmitter.sendTwo(15.955,133); //calling method sendTwo()

Explanation:

Description of the above code as follows:

In the given code a class is defined, that a class is created, inside the class a method "sendTwo" is declared, that accepts a double and an integer value in its parameters. Outside the class, a class object "dataTransmitter" is created, which calls the "sendTwo" method, in which it passes integer and double value as a parameter.  

Other Questions
For a period of time, Energizer Batteries used mock commercials for seemingly boring, mundane products- A few secondsinto the mock commercial, viewers heard the distinctive drumbeat of the Energizer Bunny before it marched across thescreen. Several viewers said that when they heard the drums, they looked at and attended to the commercial because theyliked the bunny. However, over time, viewers stopped paying attention to the commercial- What theory suggests that if astimulus doesnt change, over time we adapt or habituate to it and begin to notice it less?A. Adaptation level theoryB. Dualocoding theoryC. Expectation theoryD. Wearoout theoryE. Overoexposure theory Read the two sentences below and decide if the items are cheap or inexpensive. Then write two sentences in Spanish if the item is cheap or expensive. Use the the verb ES and the adjective vocabulary words in unit 6 for inexpensive and expensive. *Hint: Make sure the adjective agrees with the item. Compr un reloj pulsera por quinientos dlares. ___________________ Compr un llavero por dos dlares. __________________________ A manufacturer of nickel-hydrogen batteries randomly selects 100 nickel plates for test cells, cycles them a specified number of times and determines that 14 of the plates have blistered.Does this data provide compelling evidence for concluding that more than 10% of all plates blister under such circumstances?Use Alpha =0.10.A. What is the parameter of interest?B. State the null and alternative hypotheses.C. Calculate the test statistic.D. Find the rejection region.E. Make a decision and interpret.F. Find a p-value corresponding to the test and compare with your decision in E. In February, X City ordered $550,000 of supplies. On March 17th it received all of the ordered supplies and an invoice of $551,000. Which of the following would be recorded upon receipt of the supplies and invoice?A. Debit Budgetary Fund Balance -- Reserve for Encumbrances for $551,000.B. Debit Budgetary Fund Balance -- Reserve for Encumbrances for $550,000.C. Debit Encumbrances Control for $551,000.D. Debit Encumbrances Control for $550,000. At 2 P.M., ship A is 150 km west of ship B. Ship A is sailing east at 35 km/h and ship B is sailing north at 25 km/h. How fast is the distance between the ships changing at 6 P.M.? (Round your answer to one decimal place.) You are riding your bicycle. It takes you 9min to go 2.5 mi. If you continue traveling at the same rate, how long will it take you to go 7 mi? How many grams of sodium sulfide are formed in 1.6 g of hydrogen sulfide is bubbled into a solution containing 2.13 g of sodiums hydroxide assuming that the sodium sulfite is made and 94% yield? What are the political issues caused the most division in washington? Each day, Tasty Tortilla Company incurs total costs of $8,000 to process flour into tortillas. The company can sell the tortillas as is for daily revenue of $22,500. Alternatively, Tasty could fold and fry the tortillas to make hard taco shells. The additional costs for making the taco shells would be $4,200 per day, and the daily revenue from the finished shells would be $26,700. Given these data a. the firm will make an additional $8,000 in income per day if it sells tortillas instead of taco shells. b. the firms income will remain unchanged whether it sells tortillas or taco shells. c. the firm will make an additional $4,200 in income per day if it sells taco shells instead of tortillas. d. the firm will make an additional $14,500 in income per day if it sells taco shells instead of tortillas. what is the correct meaning of the word quip WHICH SENTENCE IDENTIFIES THE Y INTERCEPT AND ORDERED PAIR OF THE POINT ON THE GRAPH When a nonvolatile solute is added to a solvent, it tends to ___________________ the freezing point and ___________________ the boiling point, compared to the pure solvent. what correction is needed in the sentence When scrooge reached the door to his office he looked at the sign The home health care nurse is visiting a client with elevated triglyceride levels and a serum cholesterol level of 398 mg/dl/ The client is taking cholestyramine. Which statement by the client indicates a need for further teaching:___________.1. Constipation and bloating might be a problem.2. I will continue to watch my diet and continue to reduce fats.3. Walking a mile each day will help to solve the process.4. I will continue my nicotinic acid from the health food store. Which molecule of the gpcr-adenylyl cyclase signal transduction system phosphorylates proteins to create the cellular response? Sarah owns a vacation cabin in the Tennessee mountains. Without considering the cabin, she has gross income of $65,000. During the year, she rents the cabin for two weeks for $2,500 and uses it herself for four weeks. The total expenses for the year are $10,000 mortgage interest; $1,500 property tax; $2,000 utilities, insurance, and maintenance; and $3,200 depreciation. If an amount is zero, enter "0". a. What effect does the rental of the vacation cabin have on Sarah's AGI? Sarah reports rental income of ? and rental expenses of ? for AGI. b. What expenses can Sarah deduct, and how are they classified (i.e., for or from AGI)? Note: Assume that she itemizes her deductions. a. Utilities $ b. Insurance $ c. Property Taxes $ d. Mortgage interest $ e. Maintenance expenses $ Assume the following JavaScript program was interpreted using static-scoping rules. What value of x is displayed in function sub1? Under dynamic-scoping rules, what value of x is displayed in function sub1? var x; function sub1() { document.write("x = " + x + ""); } function sub2() { var x; x = 10; sub1(); } x = 5; sub2(); Toll on a bridge was increased from $.50 to a dollar and the number of vehicles crossing the bridge decreased from 520,000 to 435,000. Calculate demand elasticity for bridge use. What is the angle of a triangle if one angle is 68 and the other is 52 I don't know how to solve this one. I don't even know how to write it. I need help. Please.Write two scnr.nextInt statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a slash, and the year. End with newline. The program will be tested with inputs 1 2000 and then with inputs 5 1950. Ex: If the input is 1 2000, the output is: 1/2000 Note: The input values come from user input, so be sure to use scnr.nextInt statements, as in birthMonth = scnr.nextInt();, to get those input values (and don't assign values directly, as in birthMonth = 1). import java.util.Scanner;public class InputExample { public static void main(String [] args) { Scanner scnr = new Scanner(System.in); int birthMonth; int birthYear; birthMonth = scnr.nextInt();