1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
7

Marisol manages the online advertising campaigns for a chain of toy stores with both a physical and an online presence. Which Go

ogle Ads campaign should Marisol use to show images of her products, advertise her company's online and local inventory of toys, and boost traffic to their website and local toy stores?
Computers and Technology
1 answer:
tatiyna3 years ago
8 0

Answer:

Marisol must make use of the Shopping campaign for showing the image of her products, as well as advertise her company's online as well as the local inventory of the toys, as well as boost the traffic to their site and the local toy stores. These types of ads are displayed on Google Shopping which comes just after the search results and near the responsive and text ads.

Explanation:

Please check the answer section.

You might be interested in
File Letter Counter
Zanzabum

Answer:

The solution code is written in Python.

  1. fileName = input("Enter file name: ")
  2. target = input("Enter target character: ")
  3. with open(fileName, "r")as reader:
  4.    content = reader.read()
  5.    print(content.count(target))

Explanation:

Firstly, use <em>input() </em>function to prompt user for a file name. (Line 1)

Next, we use input() function again to prompt user input a target character (Line 2)

Create a reader object and user <em>read() </em>method to copy entire texts from to the variable<em> content </em>(Line 4 - 5).

At last we can get the number of times the specified character appears in the file using the Python string built-in method <em>count() </em>(Line 6)

5 0
4 years ago
I am stuck on these 2 questions. Can someone help me please?
Debora [2.8K]

Answer:

My answer could not be submitted because of some signs and symbols in my solution.

So, I've added the answer and a comprehensive explanation as an attachment.

Note that the question is answered using Python programming language.

Explanation:

Lines that start with # are used to explain the program

<em>See attachment</em>

Download txt
5 0
3 years ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
4 years ago
In the program to evaluate passwords, you gradually built a message to display to the user. What did you add to the end of each
lisabon 2012 [21]
You need to add \n to start a new line
5 0
2 years ago
Which of the following type of software application would open a txt file
kogti [31]
I think that it's A or C
3 0
3 years ago
Read 2 more answers
Other questions:
  • Computers have become easier to use and more powerful over time.
    12·2 answers
  • video-sharing sotes such as youtube and vimeo provide a place to post short videos called clips true or false?
    5·1 answer
  • What change does NOT need to be made to the above cover letter excerpt before sending it to an employer? a. Remove background co
    6·2 answers
  • Blue light reduces quality sleep and comes from
    9·2 answers
  • The ____ is a well-established organization with a primary emphasis on computer science. a. International Standards Organization
    14·1 answer
  • Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can
    13·1 answer
  • What medical equipment do they have in Jr. high, To help save peoples lives?
    14·1 answer
  • Select the correct answer.
    11·1 answer
  • What is an insertion point?
    6·1 answer
  • Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produc
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!