1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
3 years ago
15

Robert and Anne, a married couple filing jointly, have an adjusted gross income of $68,676. They claim two exemptions, and can d

educt $3,752 for charitable donations, $3,375 for interest on their mortgage, and $959 from city income tax. If the standard deduction for a married couple filing jointly is $8,350 and exemptions are worth $3,650 apiece, what is their total taxable income?
Computers and Technology
2 answers:
artcher [175]3 years ago
8 0

Answer:

the answer is B

Explanation:

Just took the test

Likurg_2 [28]3 years ago
6 0

Answer:

The answer is B $53,026

Explanation

Just took the test on Edge

You might be interested in
A red wavy line under a word means _____.
zhenek [66]
The third option is correct.
3 0
3 years ago
Read 2 more answers
If a destructive program is running that might be destroying evidence what should be done
Vikentia [17]
The choices can be found elsewhere and as follows:
a. perform an immediate full backup
b. attempt to end the process
c. pull the power cable
d. record the destruction using a video capture of the screen

I think the correct answer is option a. If a destructive program is running that might be destroying evidence, then perform an immediate full backup. 
3 0
3 years ago
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
4 years ago
A content team can create a custom board in Hootsuite Analytics with widgets displaying how their content is resonating with the
valkas [14]
<span>you might include things like total clicks, clicks by country, or reaction topics</span>
8 0
3 years ago
Read 2 more answers
A student should be most cautious using a web address ending in
Inessa [10]

Answer:

It is .com because all the others are school-safe. And .com is snatch-able.

Explanation:

4 0
4 years ago
Other questions:
  • Write a function named "json_filter" that takes a JSON formatted string as a parameter in the format of an array of objects wher
    15·1 answer
  • In a typical system design specification, the _____ section contains the complete design for a new system, including the user in
    5·1 answer
  • Which process is used for sending invitations to players to start a game?
    9·2 answers
  • How are computers located on a network
    5·1 answer
  • Which is considered the best way to secure a laptop to a desk in a workplace?
    12·1 answer
  • The ____ operator executes one of two expressions based on the results of a conditional expression. Group of answer choices
    15·2 answers
  • Define the body of the function read_data(filename). If filename is None, return the sentence (already defined for your), otherw
    5·1 answer
  • Processing information involves ____.a. Performing arithmetic or logical operations on binary data accepting information from th
    15·1 answer
  • What is the relevance of Address Block?​
    13·1 answer
  • Your laptop donot have a serial port. what type of connector will your laptop requireyour laptop donot have a serial port what t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!