1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Solnce55 [7]
3 years ago
9

An important piece of a project is past due date.

Computers and Technology
2 answers:
Kipish [7]3 years ago
8 0

Answer: Budget and time.

Its D cuz the project is PAST DUE DATE.

Let me know if this helped :)

bixtya [17]3 years ago
4 0
Budget and time is the answer
You might be interested in
The permissions of a file in a Linux system are split into three sets of three permissions: read, write, and execute for the own
Reptile [31]

Answer:

Explanation:

def octal_to_string(octal):

   result = ''

   value_letters = [(4, 'r'), (2, 'w'), (1, 'x')]

   for c in [int(n) for n in str(octal)]:

       for value, letter in value_letters:

           if c >= value:

               result += letter

               c -= value

           else:

               result += '-'

   return result

print(octal_to_string(755))

print(octal_to_string(644))

print(octal_to_string(750))

print(octal_to_string(600))

**************************************************

7 0
3 years ago
Does anyone know any nitro type hack??
alexgriva [62]

Answer:

yes nitro hack is where they time your hacking skills

5 0
4 years ago
Read 2 more answers
In this​ video, Samir describes how business executives use a BI application to drill down and see​ _____ data, the detail in th
Zielflug [23.3K]

Answer and Explanation:

The answer is granular data.

Granular data is detailed data. As granular data is lowest level data, that can refer to the size as Granularity is the level of detail where data are stored in the database. For example, a table contains cost attributes but in both table cost to use for different columns and different purpose.

The other example of granular data is the name field is subdivided. Such as

First name, middle name, and last name.

Data becomes specific and conferred as more granular.

5 0
4 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
4 years ago
Read 2 more answers
Which standard is commonly used on the Internet to represent non-numeric data?
mezya [45]
ASCI is the standard that is commonly used on the Internet to represent non-numeric data. ASCI stands for American Standard Code fro Information Interchange. This character encoding standard represents text in computers, telecommunications equipment, and other devices.  It assigns letters, numbers, and other characters within the 256 slots available in the 8-bit code
4 0
3 years ago
Other questions:
  • Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?
    11·2 answers
  • How long is the latency time of a typical hard-disk drive spinning at 360 revolutions per second?
    6·1 answer
  • My programming lab 9.2 C++ Write a full class definition for a class named Counter, and containing the following members:_______
    6·1 answer
  • With iteration-control systems, each team member ________. is given an account with a set of permissions is given their own priv
    6·1 answer
  • A _____ describes two or more computers connected to each other.
    6·2 answers
  • The ____________________ utility uses the Burrows-Wheeler Block Sorting Huffman Coding algorithm when compressing files.a) bzip2
    11·1 answer
  • When is the kids choiceee awads?????????????????????????
    12·2 answers
  • What are some common predefined number formats used in the United States? Check all that apply.
    15·1 answer
  • After you set a goal or purpose for your Web site, what is the next step to designing your​ pages​?
    13·1 answer
  • The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a clus
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!