1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna1 [17]
2 years ago
8

PLEASE HELP HURRY

Computers and Technology
1 answer:
DaniilM [7]2 years ago
5 0

A conversation is the exchange of ideas between two or more people. An email can be used to draft reports, and to share the meeting agenda, while an in-person discussion must be done for the promotion-related talks.

<h3>What is an e-mail?</h3>

E-mail is an electronic mail that involves sending and receiving textual information from one computer system to another. It is used for professional and academic use like sending a work report or sharing meetings and work-related queries.

To discuss an opportunity related to promotion, the person should have an in-person talk with a career mentor. Also to know the details about the meeting that will take place soon one must make a phone call instead of using email.

Therefore, the best tool for the conversation are:

  • E-mail
  • In-person
  • E-mail
  • Phone

Learn more about the conversation here:

brainly.com/question/10875655

#SPJ1

You might be interested in
You have just performed a cpm analysis and have found that more than one path through the project network has zero slack values.
Alex787 [66]

Answer:

There are multiple critical paths

Explanation:

The critical path method (CPM), or critical path analysis (CPA), is an algorithm for scheduling a set of project activities. It is commonly used in conjunction with the program evaluation and review technique (PERT). A critical path is determined by identifying the longest stretch of dependent activities and measuring the time required to complete them from start to finish.

The essential technique for using CPM is to construct a model of the project that includes the following:

  •    A list of all activities required to complete the project (typically categorized within a work breakdown structure),
  •    The time (duration) that each activity will take to complete,
  •    The dependencies between the activities and,
  •    Logical end points such as milestones or deliverable items.      

Using these values, CPM calculates the longest path of planned activities to logical end points or to the end of the project, and the earliest and latest that each activity can start and finish without making the project longer. This process determines which activities are "critical" (i.e., on the longest path) and which have "total float" (i.e., can be delayed without making the project longer).

considering the above function of the cpm analysis because you have multiple path, there is tendency that more than path through the project network will have zero slack values.

5 0
3 years ago
A __________ search engine focuses on a specific subject.<br><br>answer : Specialized
natita [175]

Answer:

Specialized fr just want point lol

Explanation:

5 0
3 years ago
You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
cluponka [151]
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and the AP go through a 4-step process of authentication.
8 0
4 years ago
"open workbench can exchange files with microsoft project by importing and exporting the data in ____ file format."
Leviafan [203]
I believe the answer to this question is XML
5 0
3 years ago
A security technician has been receiving alerts from several servers that indicate load balancers have had a significant increas
djyliett [7]

Answer:The capacity of the servers

Explanation:because is full

6 0
3 years ago
Other questions:
  • Using social media and sending a blast are examples of
    13·1 answer
  • Which of these are examples of a Single Sign-On (SSO) service?
    5·1 answer
  • A terrible new disease, HORSEVID, has begun to spread among horses worldwide. Stable manager Jimmy is trying to take as many pre
    5·1 answer
  • Which of the following is NOT a function of the Web Accessibility Initiative​ (WAI)? A. Offering links to a variety of software
    10·1 answer
  • BRAINLIEST ANSWER AWARDED PLEASE HELP
    12·1 answer
  • An app where you spin a wheel for coins and exchange for giftcards
    6·1 answer
  • How neural networks impact our life??
    7·1 answer
  • Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
    13·1 answer
  • PLEASE HELP WITH MY CODING!!!!!!!!!!!!!!
    7·2 answers
  • Write if true or false
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!