1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
12

A household consists of a married couple, their twin three-year-old sons, and their twin eight-year-old daughters. The couple's

children had no income and lived with their parents all of last year. How many exemptions can the couple claim on last year's tax return if they file with the "Married filing jointly" status?
A. 6
B. 5
C. 3
D. 4
Computers and Technology
2 answers:
Mazyrski [523]3 years ago
7 0
The answer should be B.5

Fynjy0 [20]3 years ago
7 0

Answer:

A household has

One husband, one wife which is a couple

And twin three-year old son means 2 sons

And twin eight-year-old  daughter means 2 daughters.

So, there are total 6 members

So, there will be four children and one wife that is 5 members who are exempted from the last year,s tax return.

Therefore, option B is correct that is 5.

You might be interested in
Is jesus dead or alive
Morgarella [4.7K]

Answer:

Explanation:

i think he alive but in heaven i dunno

8 0
2 years ago
Can you withdraw from courses in top hat?
ad-work [718]

Answer:

Yes, but this must be done before the withdraw deadline

Explanation:

TopHat is an online learning platform. Students register for courses and if they decide not to continue with a course for reasons best known to them, they are allowed a time period usually one to two weeks to drop the courses. They are then reimbursed the fee for that particular course.

But if that time period elapses and they drop the course, that is considered a withdrawal that is not accepted and which no provisions for reimbursements are made.

7 0
2 years ago
Which of the following is a method which can be used to delete a page from a publication?
Alexandra [31]
Selecting the page and pressing the backspace key
3 0
2 years ago
PLEASE HELP ASAP!!!
Studentka2010 [4]

If you are using CSS :

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

HTML

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

for HTML:

<!DOCTYPE html>

<html>

<head>

<meta charset="UTF-8">

<title>Sample table</title>

<style>

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

</style>

</head>

<body>

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

</body>

</html>

3 0
3 years ago
___________ is produced by propulsion systems or engines.
Rama09 [41]
I think it’s thrust good luck
8 0
3 years ago
Other questions:
  • Define a function setheight, with int parameters feetval and inchesval, that returns a struct of type heightftin. the function s
    6·1 answer
  • Which computer network component allows data transfers from one computer to another through a telephone line?
    11·2 answers
  • nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in th
    6·1 answer
  • Contains the instructions your computer or device needs to run programs and apps
    5·1 answer
  • Catering question<br> What is the hottest food in the world
    5·1 answer
  • ______ is a slow process that takes place in nature. (2 points)
    8·1 answer
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
  • Why is making a model, or prototype, important in the design process?
    6·1 answer
  • ________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!