1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
2 years ago
6

In project management, which step involves the project manager identifying

Computers and Technology
1 answer:
nasty-shy [4]2 years ago
8 0

Answer: The only help is your lord and savior Jesus Christ Amen YAR

Explanation: The Bible or Church

You might be interested in
Is it more costly to Andrew to go to graduate business school full time or part time if the tuition is the same for each? A. Par
andrezito [222]

Answer:

A. Part time

Explanation:

Since tuition is the same whether he goes part time or full time, in the long run he will end up paying tuition a greater number of times if he is a part time student.

4 0
4 years ago
Read 2 more answers
Write a program that reads in an array of type int . you may assume that there are fewer than 50 entries in the array. your prog
Alla [95]
This may be a difficult thing to do so for anyone to ACTUALLY answer this you migghttt want to up the amount of points you get for answering maybe, 20-40 points.
7 0
3 years ago
You are trying to access the Wi-Fi network at a coffee shop. What protocol will this type of wireless networking most likely use
Anna71 [15]

The wireless network is called WAP protocol

8 0
3 years ago
The dns clients that make requests to the dns server are known as ____________.
beks73 [17]
<span>The dns clients that make requests to the dns server are known as : </span>Recursive queries

-Hope this helps.
6 0
4 years ago
Read 2 more answers
Guys, it took me 3 seconds to get banned on brainly, try to beat that, actually don't, unless you don't care about your account
Anarel [89]

How did u get banned?

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Failure to verify information can lead to?
    10·1 answer
  • Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
    15·1 answer
  • Software engineering design teams use ________, which are grounded in mathematical concepts of sets and relations, for their sof
    13·1 answer
  • Which of the following programs can open a bitmap file?
    11·2 answers
  • Hi I m from India plz follow me and I will follow u​
    15·2 answers
  • Write a parent program to fork(2) n processes where n is passed tothe program on the command line, and n can be from 1 to 10. Al
    12·1 answer
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • What is the HTML tag used to define a block of content?<br> O <br> O class<br> O #id<br> O
    8·2 answers
  • Synthesize (15 points)
    13·1 answer
  • Write common ICT tools​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!