1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AfilCa [17]
1 year ago
11

3.2.3 What major al able to do? 3.2.4 What major advantage would Printer X have for Tembi who want documents printed? 3.3 If Tem

bi decides not to purchase new computers, but to replace her printers, what software will she need to install to ensure that the new printers work with her existing computers? 3.4 Tembi thinks she needs a new printer in her office because her present laser printer prints pages with faded edges. You don't think the printer is broken. Explain to her what the problem could be and how she could probably fix it. 4. If Tembi buys new computers, they will need to be linked to the network at the DVD shop. 4.1 What important component will the new computers need to have to be able to link to the existing network? 4.2 List three reasons that the computers need to be linked to the network for the business to operate optimally. 5. Tembi has seen an advertisement for notebook computers that seem very affordable. Name two reasons why notebooks would not be suitable for use in the DVD store. 6. Convergence of technology means that the customers would like to be able to view which movies are available for hire using their smartphones. 6.1 Explain the term convergence of technology. 6.2 Provide another example of technology convergence that's obvious today. 6.3 Name two ways in which a smartphone differs from a normal cellphone. 3 (1) (2) (1) (3) (2) (1) (1) (2) Total: (25)​
Computers and Technology
1 answer:
zzz [600]1 year ago
6 0

Answer:

she or he will use handouts

You might be interested in
Given the String variables name1 and name2, write a fragment of code that assigns the larger of the two to the variable first (a
Neporo4naja [7]

Answer:

if ( name1 > name2) {

    first = name1;

} else {

    first = name2;

}

Explanation:

First you need take a decision for that reason you need and if - else structure to decide if asign the variable name1 or the variable name2 to the result. Later you can use an > or < to compare two strings because it use the ASCII code to compare wich one is larger than another.

if ( name1 > name2) {

    first = name1;

} else {

    first = name2;

}

6 0
3 years ago
With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
Wewaii [24]

Answer:

The correct answer is C) With respect to PERT and​ CPM, slack is the amount of time a task may be delayed without changing the overall project completion time.

Explanation:

The CPM (Critical Path Method) method is frequently used in the development and control of projects whose tasks have a fixed duration while the PERT (Program Evaluation and Review Techniques) method is a set of techniques with the same purpose but that allows to work with tasks with estimated probability duration but not deterministic.

Both methods are based on developing a complete scheme that includes all the tasks of a project linked to each other according to their sequence, determining the duration and analyzing different ways of reconfiguring the task planning to optimize the use of the resources of according to the general objectives of the project.

There are tasks that to start performing them must have been completed one or more previous tasks. The overall duration of the project is determined by the Critical Path, which is the sequence of tasks of greater duration. The tasks belonging to the critical path have to be carried out with special care because delays in them would cause delays in the total achievement of the project. That is why these tasks have no slack.

The rest of the tasks have some slack, which is determined by the time that a previous task can be delayed without delaying the total time of completion of the project, that is, not exceeding the duration determined by the critical path.

That is that why we say that the <em>slack</em><em> is the amount of time a task may be delayed without changing the overall project completion time</em>.

8 0
3 years ago
Electronic files created on a computer using programs such as Word software are considered to be _____.documents icons media sav
Rudiy27
Documents. Note that electronic document is a type of media too.
5 0
3 years ago
For which firewall feature should you create forward trust and forward untrust certificates?
guajiro [1.7K]

Answer:Jun 19, 2019 - Additionally, set up a forward untrust certificate for the firewall to ... After setting up the forward trust and forward untrust certificates required for SSL Forward Proxy ... If you do not install the forward trust certificate on client systems, ... Create a Decryption Policy Rule to define traffic for the firewall to decrypt.

WELCOME

8 0
3 years ago
The beginning balance of Keyshawn's savings account for the month of September was $3900, and it remained this way for the first
Doss [256]
I’m not gonna wanna was that 638
4 0
3 years ago
Other questions:
  • To insert notes into a worksheet, insert ________ in cells.
    15·1 answer
  • __________ ensure that hardware and software produced by different vendors work together.
    14·1 answer
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • PLEASE HELP ASAP!!
    11·2 answers
  • What are the three basic classes of application
    14·2 answers
  • Imagine that a crime has been committed and being a police officer you have to investigate the case. Solving a crime can be a ve
    12·1 answer
  • Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr
    7·1 answer
  • I’ll give brainliest if answers are correct
    11·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
  • Which of the following offers more reliable antivirus protection? Question 43 options: A) antivirus software on user PCs B) anti
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!