Eric is working on his website, which sells produce from his farm. He's thinking of different ways to improve his website so that it appears on more search engine results and gets more traffic. Which of these ideas will help improve his search visibility?

Answers

Answer 1

OPTIONS:

1. Write recipes that use vegetables that he sells

2. Get lots of likes or followers on social media

3. Encourage others to write about his website

4. Add lots of links to the website

Answer:

1. Write recipes that use vegetables that he sells , and 3. Encourage others to write about his website

Explanation:

In other for Eric to improve his website search visibility, there are several search engine optimization techniques that he can use to make his website appear more on search engine results. Two of such tips is given in the options above, they are "write recipes that use vegetables that he sells", and "encourage others to write about his website".

If Eric writes quality contents that feature keywords and vegetables that he uses in his recipes, this would go a long way in giving his website a good search visibility score.

Also, getting other to write about his website would make his website more visible online, and also increase search visibility score.


Related Questions

6. In cell K4, create a formula using the IF function to calculate the interest paid on the mortgage (or the difference between the total payments made each year and the total amount of mortgage principal paid each year). a. The formula should first check if the value in cell H4 (the balance remaining on the loan each year) is greater than 0. b. If the value in cell H4 is greater than 0, the formula should return the value in J4 subtracted from the value in cell D5 multiplied by 12. Use a relative cell reference to cell J4 and an absolute cell reference to cell D5. (Hint: Use 12*$D$5-J4 as the is_true argument value in the formula.) c. If the value in cell H4 is not greater than 0, the formula should return a value of 0.

Answers

Answer: IF(H4>0,12*$D$5-J4,0)

From the question, we are used to create a formula to calculate an interest paid on mortgage using the IF function.

We will start by giving a brief analysis on how to go about this for better understanding. This should help us get to our desired result.

If( H4>0 is the logical test,

then

12*$D$5-J4 is [value_if_true]

0 is [value_if_false]  

so we have : IF(H4>0,12*$D$5-J4,0)

Using this above formula and typing it into cell K4;

we are able to first check if the value in H4 is greater than 0.if is greater,it returns a value in J4  subtracted from the value in cell D5 multiplied by 12but if it is not, it returns a value of 0

[Note] :Absolute referencing of cell D5 means that this will not change while extending this formula to the entire column. Whereas, since cell H4 and J4 have relative cell referencing, these will change relatively as we extend the formula to the entire column.

cheers i hope this helps

You've been asked to set up a temporary Internet cafe for a conference your company is hosting. You have ten laptops to use in your cafe and need to keep them from "wandering off" once you have them set up and running. What should you use to help physically secure these laptops?

Answers

Answer: Cable Locks

Explanation:

The cable locks is one of the type of secure device that helps in physically secure the various types of laptops and computer system. The cable lock helps the devices and the confidential information to prevent from theft and it is also known as the versatile security system.   The cable lock is basically warp up in the form of metal cable and we usually insert the this cable lock into the laptop device slot in the system.  

  According to the given question, The cable lock is typically used in the laptop devices that protect and physically secure from the hacking purpose and it is used in the various types of deices such as printers, electronic devices and the laptops.  

Chris is a project manager. He would like to schedule a status meeting for the next week. Several of the group members work at another site. What should Chris do?

Answers

Answer:

chris should make a website for everyone

Answer:

set up a meeting and conference call and send the phone number and pass code to the attendees

Explanation:

edge 2021 , have a great day!

The network board in a workstation is currently configured as follows:

-Network speed = Auto
-Duplexing = Auto

The workstation is experiencing poor network performance and you suspect that the network board is not correctly detecting the network speed and duplex settings. Upon investigation, you find that it is running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation.

Before you do so, you need to verify the configuration of the switch port that the workstation is connected to. Given that it is a Cisco switch, which commands can be used on the switch to show a list of all switch ports and their current settings?

Answers

Answer:

show running-config interface

Explanation:

Given that it is a Cisco switch, "show running-config interface" or "show interface" commands can be used on the switch to show a list of all switch ports and their current settings.

This will help to verify the configuration of the switch port that the workstation is connected to.

Mary wants to run a text ad on the Google Search Network. She's new to text ads and needs to start with the basics. What are the three components of a text ad on the Google Search Network that Mary will need to know?

Answers

Answer:

1. Headline

2. URL

3. Description

Explanation:

The three components of a text ad on the Google Search Network that Mary will need to know are;

1. Headline

2. URL

3. Description

The headline component on Search Network Text Ad provides up to three fields of 30 characters each.

The Uniform Resource Locator (URL) has the domain name and the web resource for addressing documents accessible over the internet.

As an administrator for the Contoso Corporation, your primary office is in Sacramento and your data recovery site in Las Vegas. You want to install a DHCP server at both locations to provide high availability. Which configuration should be used?

Answers

Answer:

Hot Standby mode failover partner

Explanation:

The configuration you should use as an administrator is the Hot Standby mode failover partner.

Under the Hot standby mode, the partner server is in a standby role, in order to lease IP addresses to DHCP clients if only the active isn't available.

Hence, when the active server is unavailable, the failover partner will be used temporarily.

While a vector graphic can be scaled larger or smaller with no change in quality, bitmap graphics display optimally only at their original, or ____, length and width. a. native b. natural c. intended d. final

Answers

Answer:

a. native

Explanation:

While a vector graphic can be scaled larger or smaller with no change in quality, bitmap graphics display optimally only at their original, or native, length and width.

Search engines rank Web pages based on which of the following?

.The amount of advertising used on the web page

.The popularity and credibility of the Web page

.The profit margins of the sponsoring company

.The ratio of graphics to text on the web page​

Answers

Answer:

The popularity and credibility of the Web page.

The page must have a lot of traffic on it, and for this to happen the page must also be a provider of most needed information.

During the Requirements Definition stage of a systems development​ project, the employees who will be the primary users of the new system are not asked about their needs. The IS department is violating which of its​ responsibilities?

Answers

Answer:

enabling users to contribute to requirements for new system features and functions

Explanation:

Based on the scenario being described within the question it can be said that the main responsibility that is being violated is enabling users to contribute to requirements for new system features and functions. They are responsible for gathering user feedback, in order to get a sense of what the user's like and dislike regarding a system in order to later make the necessary changes needed to the system.

Your Salesforce organization's Login Hours are set from 7 AM to 7 PM. A user logs in at 6:57 PM and is viewing a record when the clock passes 7 PM. Which of the following scenarios happens once a logged in user is outside of the specified Login Hours for an organization?a.The user can continue to view the page they are currently on, but if they navigate away from the page, they will be logged out.b.The user can continue to edit records, until they manually log out of the systemc.A warning message displays and the user is logged out immediatelyd.The user can continue to work indefinitely, but new users will be unable to log in

Answers

Answer:

The user can continue to view the page they are currently on, but if they navigate away from the page, they will be logged out.

Explanation:

At 7 PM, the user will be effectively logged out of the system but the user will still have access to his current page. Having being logged out of the system, the have the access to perform any DML, read write, execute operation and at the same time the user won't be able to open any new page; navigating away from this page, the user will be notified that they're logged out.

This is possible because the moment the user sends a new request to the server to execute some DMLs or to navigate, the system logs out the user immediately signaling a session expiry .

Conclusively, already logged in users will only have Read-Only access once mode once the Login Hours has elapsed for the organization. No consequent saves or edits can be made to the database, at this point.

A typical broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content. G
a. Webcasts
b. Blogs
c. Microblogs
d. Twitter

Answers

Answer:

Webcasts

Explanation:

The rest of the options don't need to be streamed as there isn't a continuous flow of information.

In Language C please.When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.For this program, adjust the values by subtracting the smallest value from all the values. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.Ex: If the input is:5 30 50 10 70 65the output is:20 40 0 60 55The 5 indicates that there are five values in the list, namely 30, 50, 10, 70, and 65. 10 is the smallest value in the list, so is subtracted from each value in the list.For coding simplicity, follow every output value by a space, including the last one.

Answers

Answer:

THE ANSWER IS EASY

Explanation:

Jonas is an experienced information security professional with a specialized focus on evaluating computers for evidence of criminal or malicious activity and recovering data. Which GIAC certification would be most appropriate for Jonas to demonstrate his abilities?

Answers

Answer:

The answer is "GIAC Certified Forensic Examiner (GCFE)".

Explanation:

The GIAC Accredited Professional Analyst qualification confirms to the expertise of a professional security analysis, via a focus on smaller skills required to obtain and interpret data from computer systems. The GCFE offers a way for experts, which shows the skills, information, and ability to conduct typical event operations like e-discovery, forensics evaluation, and documentation, and web forensic science, and Platforms application monitoring and client behavior.

Louis is using the Web interface to configure his SOHO home router/access point. At this exact moment, none of his computers are on the wireless network. He goes into a screen called "active clients" only to see that a computer he doesn't recognize is on his network. What should he do?

Answers

Answer:

reassess and add better security to his wireless network

Explanation:

Based on the scenario being described within the question it can be said that Louis should reassess and add better security to his wireless network. This is because this unrecognized client is someone who has entered his home network without authorization. Most likely due to Louis not having the correct or any security on his wireless network.

One of the graphics Emily wants to include in her mailings is an illustration, a line drawing whose size she can increase as much as she wants without affecting its overall quality. Which of the following is the most likely format for this illustration?
A) .gif
B) " · png "
C) .wmf
D) .tiff

Answers

Answer:

C) .wmf

Explanation:

Based on the scenario being described within the question it can be said that the most likely format for this illustration would be a .wmf file. This file extension refers to a Windows MetaFile, which is a file format that usually holds vector images to be used in different microsoft software, and is known for being able to resize the image without affecting it's overall quality.

If we have a priority queue storing approximately million numbers, and the bottom level is "full", which of the following statements is false? (lower numbers have higher priority) A) The height of the structure is approximately 20. B) The width of the lowest level of the structure is approximately 500,000. C) Nearly half of the 1000 largest values must be in the bottom level of the structure. D) Nearly half of the 1000 smallest values must be in the top half of the tree (if there are k levels in the tree, the "top half" is the top k/2 levels). E) Nearly half of the 1000 smallest values may be in the bottom level of the structure.

Answers

Answer:

The width of the lowest level of the structure is approximately 500,000 is a false statement.

my old Brainly account stopped working so i made a new one i made it as close as possible to the one i had

Answers

Answer:

congrats

Explanation:

!

Answer:

Kmiller have you contacted brainly support?

Explanation:

A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites and on the desktop. a. Disk Cleanup b. File History c. Disk Defragmenter d. VirusScan

Answers

Answer:

File History

Explanation:

File History will always, by default, on an hourly basis, perform a regular backup of all selected files or the entire files in your desktop, document, videos, libraries, contacts, music, and favorites. It is similar to back up and restore which also allows you to perform a backup of your system, drives, and files in the folders.

Scatterplots are useful when applied behavior analysts are interested in finding out the ________ distribution of the target behavior. In other words, a scatterplot illustrates whether the behavior's occurrence is typically associated with certain time periods.
A. Temporal
B. Amount of
C. Standard
D. Simple

Answers

Answer:

The answer is "Option A".

Explanation:

Scatterplots are kinds of graphs or mathematical plots, that display variables using Algebraic, coordinates for usually dual variables for a set of data. It is an application, that targets an activity, a diffusion graph shows the event, which is normally linked to specific periods, and wrong choices can be described as follows:

In option B, It is incorrect because it is used in shareholders. In option D, It is used in a normal random variable, that's why it is incorrect. In option C, It is incorrect because it is used in the frequency distribution.

Final answer:

The correct answer to the question is A. Temporal, indicating that scatterplots are used in behavior analysis to reveal the temporal distribution of a target behavior and identify patterns associated with different time periods.

Explanation:

Scatterplots are instrumental in behavior analysis because they can reveal the temporal distribution of a target behavior, which suggests when during a certain period the behavior is most likely to occur. The correct answer to this question is A. Temporal. Specifically, a scatterplot allows analysts to see if there's any association between the time of day, week, or month and the frequency of the behavior.

In applied settings such as behavior analysis, scatterplots can indicate if problem behaviors are more prevalent during specific periods, helping to identify potential environmental triggers or showing if interventions are having the desired effect over time. Data visualization through scatterplots also assists in determining the correlation between variables, aiding in data analysis by revealing patterns or trends that might not be obvious from raw data.

a student writes a prgroma to find the factorial of a number. the factorial for a number n is defined as the product of all whole numbers between 1 and n, inclusive. while attempting to find the factorial for 120, the program's output is not what the student expectec. assuming that the program has been corectly written, what is a possible explanation for the incorrect output?

Answers

Answer:

B. Integers may be constrained in the maximum and minimum values that can be represented in a program because of storage limitations.

Explanation:

Since the program has been written correctly by the student and yet the output of the program is not what was expected, then the next possibility is that because of the limitations in storage, the integers may be constrained in the minimum and maximum values capable of being represented when writing a program.

Identify the traditional communication process. A. Source-Encoding-Message channel-Decoding-Receiver-Feedback. B. Source-Encoding-Message channel-Receiver-Feedback. C. Source-Encoding-Message channel-Noise-Receiver-Feedback. D. Source-Message channel-Decoding-Receiver-Feedback. E. Source-Noise-Message channel-Receiver-Feedback.

Answers

Final answer:

The correct answer to the question identifying the traditional communication process is option A: Source-Encoding-Message channel-Decoding-Receiver-Feedback. This sequence encapsulates the full cycle of communication from the inception of a message by the source to the reception and feedback from the receiver, incorporating both encoding and decoding processes.

Explanation:

The question asks to identify the traditional communication process from given options. The correct process is Source-Encoding-Message channel-Decoding-Receiver-Feedback. This sequence starts with a source that creates a message; this message is then encoded, or turned into a form that can be transmitted. It's sent through a chosen communication channel to the receiver, who then decodes, or interprets, the message. Feedback is provided back to the original source, closing the communication loop and making the process interactive. Noise can interfere at any point in this process, potentially distorting the message.

This traditional communication process encompasses the essential elements needed for effective communication: a sender (or source), encoding, a message channel, decoding, a receiver, and feedback. Understanding this process is key in fields like public speaking, marketing, interpersonal communication, and computer-mediated communication.

Given the SQL statement:

CREATE TABLE SALESREP ( SalesRepNo int NOT NULL, RepName char(35) NOT NULL, HireDate date NOT NULL, CONSTRAINT SalesRepPK PRIMARY KEY (SalesRepNo), CONSTRAINT SalesRepAK1 UNIQUE (RepName)
);

we know that _____.

A. None of these statements are true
B. RepName is the primary key
C. RepName is an alternate candidate key
D. RepName is a surrogate key
E. RepName is a foreign key

Answers

Answer:  

C. RepName is an alternate candidate key

Explanation:

The explanation is attached in a document.

Match the term with its definition and characteristics.
A subset of Machine Learnign that referst to artificial neural networks that are composed of many layers.
Mimic evolutionary precesses to generate increasingly better solutions to a problem. Mutation within a genetic algorithm involve randomly trying combinations and evaluating success (or failure) in order to learn to optimize outcomes.
analyze large quantitied of information to establish patterns and charceristicwd when the logic or rules are unknown.
Include a knowledge based with accumulated experience and a set of rules for aplying the knowledge base to each particular situation.
A subset of Artificial Intelligence that users algorithms to learn iteratively from data and can find insigths without explicit programming.

Answers

Answer:

1. Deep Learning

2. Genetic algorithm

3. Neural network

4. Expert systems

5. Machine Learning

Explanation:

Deep Learning is a subset of Machine Learning that refers to artificial neural networks that are composed of many layers.

Genetic algorithm mimic evolutionary processes to generate increasingly better solutions to a problem. Mutation within a genetic algorithm involve randomly trying combinations and evaluating success (or failure) in order to learn to optimize outcomes.

Neural network analyze large quantities of information to establish patterns and characteristic when the logic or rules are unknown.

Expert systems includes a knowledge base with accumulated experience and a set of rules for applying the knowledge base to each particular situation.

Machine Learning is a subset of Artificial Intelligence that uses algorithms to learn iteratively from data and can find insight without explicit programming.

You remember that, when you lost your wallet last semester, campus security found it for you. You misplaced it again this morning and decided to call campus security. The method used to solve this problem is called a(n) _________.
A) heuristic search.
B) means-ends analysis.
C) pattern matching.
D) schema-driven route.

Answers

The answer is D. route is a previously used approach to solving a problem. When a sikilar situation later occurs, the same schema may be activated and suggest the use of the former solution strategy

What is top down design? a. Top down design is a way of designing your program by starting with the biggest problem and breaking it down into smaller and smaller pieces that are easier to solve. b. Top down design is a way that you can create designs on a computer to put on a web page c. Top down design is a way of designing your programs starting with the individual commands first d. Top down design is a way to use loops and classes to decompose the problem

Answers

Answer:

The answer is "Option a".

Explanation:

This design is the breakdown for a structure to smaller components to recognize the textural functionalities. This system analysis the built-in the top-down style, that defines and it does not describe some first-level components, which is often known as a staggered layout, and wrong choices can be described as follows:

In option b, It is wrong because it is not used in web pages. In option c, It does not start with individual commands, that's why it is incorrect. In option d, It is wrong because it uses loops and classes, but it can't decompose the problem.

Final answer:

Top down design is a method used in software design where a problem is decomputed into smaller, manageable parts. The programmer starts with the large,main goal of the software then breaks it down into smaller components. Each of these components can then be broken down further if needed.

Explanation:

Top down design, sometimes referred to as stepwise refinement, is essentially a method that is used in the designing of software. This design approach is majorly rooted in the principle of decomposition, where a problem is broken down into smaller, more manageable parts. With the top down design approach, the programmer starts with the largest, overall objective of the software being created.

For instance, if you were designing a calculator software, you'd begin with the overall concept, which is a calculator. Then, you'd decompose this broad concept into smaller parts such as addition, subtraction, multiplication, division, square roots, etc. Each of these sub-problems can further be broken down if necessary. This approach allows you to focus on solving small, specific problems instead of feeling overwhelmed by the complexity of the larger challenge.

Learn more about Top down design here:

https://brainly.com/question/32498450

What role does energy play in the formation of sedimentary rock?

Answers


Sedimentary rock. ... Four basic processes are involved in the formation of a clastic sedimentary rock: weathering erosion caused mainly by friction of waves, transportation where the sediment is carried along by a current, deposition and compaction where the sediment is squashed together to form a rock of this kind.


Hope this helps

The major role of energy in the formation of sedimentary rock is that the energy from the Sun creates the cycle of rain and wind that causes erosion to produce sedimentation. Thus, the correct option is C.

What are Sedimentary rocks?

Sedimentary rocks are the class of rocks which are formed from the pre-existing rocks or the pieces of once-living organisms. These rocks form from the deposits which accumulate on the Earth's surface. Sedimentary rocks are often found to have distinctive layering or bedding on them.

The energy plays an important role in the formation of sedimentary rock which is that the energy from the Sun creates the cycle of rain and wind which causes the erosion to produce sedimentation.

Therefore, the correct option is C.

Learn more about Sedimentary rock here:

https://brainly.com/question/10709497

#SPJ6

Your question is incomplete, most probably the complete question is:

What role does energy play in the formation of sedimentary rock?

A. Rain cools sand, mud, and pebbles into hard layers that solidify using energy from the Sun.

B. The heat from the Sun melts sand, mud, and pebbles which then cool and solidify into a rock that can be broken down again through erosion.

C. Energy from the Sun creates the cycle of rain and wind that causes erosion to produce sedimentation.

D. Rain provides the energy needed to bring sand, mud, and pebbles to one location where energy from the Sun changes them to rock.

For off campus work study positions, students should contact the

Answers

Answer:

The answer is "financial aid office".

Explanation:

The work studies are a good way for people to raise funds in component-time on-campus jobs for payment for tuition. In off-campus study, it uses financial aid office, that provides learners to chance to gain useful job experiences when they study at university.

It usually works with you even if you have received an admission invitation. In off-campus study work, it uses the department of Financial Aid, in which it is used to find the financial aid office of your school. It can scan the sorted alphabetically lists below.

Linear programming problems have:______.
a. non-linear objective functions, linear constraints.
b. non-linear objective functions, non-linear constraints.
c. linear objective functions, non-linear constraints.
d. linear objective functions, linear constraints.

Answers

Answer:

The correct answer to the following question will be Option D(linear objective functions, linear constraints).

Explanation:

We've already perused that somehow the linear programming issues have become the people that aim to optimize an amount that would be linearly defined in aspects of several judgment parameters.

Even though the title indicates in and of itself, these problems include maximizing the consumption of some of these kinds of nutrient-rich foods that could support one adopt a specific diet. The purpose of a diet issue would be to have a range of foods at a minimal cost that will fulfill a range of regular nutritional requirements.

Constraints: The essential micro-nutrients stated, that may be a minimum consumption of calories or the number of calories including cholesterol throughout the meal.Objective function: The expense of bringing in the meal.

The other three options are not related to the problems of linear programming. So Option D is the right answer.

What is an IP address and where I can find the IP address for my computer?
a) An IP address is a unique number identification assigned to each computer, server, or device connected to the Internet.
b) To find your IP address, go to Google and type "what is my IP". An IP address is an encrypted name assigned to each computer, server, or device connected to the Internet for identification.
c) To find your IP address you have to type ipaddress in the command prompt window.
d) An IP address is a hexadecimal code identification assigned to each computer, server, or device connected to the Internet.
e) To find your IP address, you have to contact your ISP.
f) An IP address is a series of packets assigned to each computer, server, or device connected to the Internet.
To find your IP address, check the classless interdomain routing.

Answers

Answer:

a) and b) are correct.

Explanation:

You can also type ipconfig on windows terminal to see your ip address - or ifconfig if you are running linux / macos terminal.

Technician A says that if the coefficient of friction is too low, the brakes will grab.


Technician B says that the coefficient of friction is influenced by the materials in contact.


Who is right?

Answers

Answer:

Only Technician B is right

Explanation:

Technician A is wrong because the brakes will grab and cause the wheel to lock up and slide only if the coefficient of friction is too high. If the coefficient of friction is too low, excessive pressure on the brake pedal will be required to stop the vehicle.

Technician B is right the materials in contact is a factor that influences the coefficient of friction. For example, when ice slides on steel, the two materials slide past each other easily, this means that icehas a low coefficient of friction. On the other hand, rubber on pavement has a high coefficient of friction as the materials do not slide past each other easily.

Therefore, only Technician B is right.

Other Questions
Alma is estimating the proportion of students in her school district who, in the past month, read at least 1 book. From a random sample of 50 students, she found that 32 students read at least 1 book last month. Assuming all conditions for inference are met, which of the following defines a 90 percent confidence interval for the proportion of all students in her district who read at least 1 book last month?a. [tex]32 \pm 1.645\sqrt{\frac{(32)(18)}{50}}[/tex]b. [tex]32 \pm 1.96\sqrt{\frac{(32)(18)}{50}}[/tex]c. [tex]0.64 \pm 1.282\sqrt{\frac{(0.64)(0.36)}{50}}[/tex]d. [tex]0.64 \pm 1.645\sqrt{\frac{(0.64)(0.36)}{50}}[/tex]e. [tex]0.64 \pm 1.96\sqrt{\frac{(0.64)(0.36)}{50}}[/tex] 1. If Aristotle were to watch a commercial about saving money on your electric bill, he would saythe commercial appeals to the consumer's Which situation is most likely to involve the action of a pheromone?a. Albatrosses showing courtship behaviorb. A prairie dog emitting a loud yelpc. The chirping of a cricketd. Urine of a male mouse attracting a femalee. A male collared lizard showing his large mouth A put on Sanders stock with a strike price of $31 is priced at $2 per share, while a call with a strike price of $31 is priced at $2.50. The maximum per-share loss to the writer of an uncovered put is __________, and the maximum per-share gain to the writer of an uncovered call is _________. Amanda wants to sell her old car. she will open a classified ad in the Sacramento Bee. the newspaper charges $42 for the first two lines and $11 dollars each additional line. she buys a three week ad that has four lines. What is Amanda's cost? Create a row vector vA=1:3:34 that has 12 elements. Then, create a new nine-element vector vB from the elements of vA such that the first five elements are the first five elements of the vector vA, and the last four are the last four elements of the vector vA. Use the colon symbol to address a range of elements. (Do not type the elements of the vector vA explicitly.) Yields on short-term bonds tend to be more volatile than yields on long-term bonds. Suppose that you have estimated that the yield on 20-year bonds changes by 10 basis points for every 21-basis-point move in the yield on 5-year bonds. You hold a $1.5 million portfolio of 5-year maturity bonds with modified duration 4 years and desire to hedge your interest rate exposure with T-bond futures, which currently have modified duration 9 years and sell at F0 = $70. How many futures contracts should you sell? (Do not round intermediate calculations. Round your final answer to the nearest whole number.) Early in 2018, the Excalibur Company began developing a new software package to be marketed. The project was completed in December 2018 at a cost of $14,000,000. Of this amount, $11,000,000 was spent before technological feasibility was established. Excalibur expects a useful life of five years for the new product with total revenues of $15,000,000. During 2019, revenue of $6,000,000 was recognized. Required: 1. Prepare a journal entry to record the 2018 development costs. 2. Calculate the required amortization for 2019. 3. At what amount should the computer software costs be reported in the December 31, 2019, balance sheet Which word best describes the overall tone of the novel The Secret Garden?spookymiserableboredhopeful A rod equals 5 and one half yards. If a bridge is 770 yards long, how long is it in rods? Darlington Inc., permits any of its employees to buy shares directly from the company. There are no brokerage fees and shares can be purchased at a 10% discount. During May, employees purchased 14,000 shares at a time when the market price of the shares was $10 per share. Prepare the appropriate journal entry for the May purchase. ( Nitrogen is a very important element in biology. What are some of the reasons that organisms need nitrogen? 1 2 3 4 5 6 7 8 9 10 TIME REMAINING 54:32 Because the lid of a marker is wider than the marker itself, a set of markers can be packaged in a container that is in the shape of a trapezoid instead of a rectangle. A trapezoid has a base of 12 inches, height of 10 inches, and top side length of 10 inches. A rectangle has a base of 12 inches and height of 10 inches. What is the difference in area between the two packages What is the measure of Arc NM?a: 55b: 60c: 120d: 125please help ive been stuck on this question for so long i dont understand how to do this :A principal wants to know if students at a particular high school are in favor of a new dress code at their school. The principal is not able to ask the opinion of every student at the school, so she needs to select an appropriate sample of the students to represent the high school. Select which sample of students the principal should choose. Which proportion can you use to find the value of a? Suppose that a well-respected study published in Child Psychology Today finds that a very high proportion of children raised by stay-at-home fathers are accepted to Harvard University. If a large number of previously working fathers quit their jobs and become stay-at-home dads, which of the following will occur, all else equal? (i) The unemployment rate will decrease. (ii) The size of the labor force will decrease. (iii) The number of unemployed people will increase. (iv) The unemployment rate will increase. Which of the following is NOT an example of how Napoleon puts an end to any opposition from the others?a. He uses the dogs to threaten the others into silence,b. He arranges the seats during meetings to show his own power.c. He displays Major's skull as a symbol of reverenced. He locks up Snowball in the attic of the house with Major. What does the sensory language in the line, "Each dog barksitting in his own yard!" tell the reader about the way a here Khan feels about the wolves? Benjamin is riding a unicycle. The tire of his unicycle has a circumference of 2.8 \text{ m}2.8 m2, point, 8, start text, space, m, end text, and the tire revolves 1.51.51, point, 5 times per second. What is the distance Benjamin travels in 100100100 seconds