1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
1 year ago
13

a network has been crashed to the point where all activities are critical. additional crashing: group of answer choices is unnec

essary. may require crashing multiple tasks simultaneously. can be done, but all critical tasks must be reduced in duration. is prohibitively expensive. is impossible.
Computers and Technology
1 answer:
Lunna [17]1 year ago
3 0

Option D is correct. Project managers and stakeholders often use the project management technique of "crashing" to deal with emerging problems.

By allocating more resources where they are most needed, project crashing maintains or accelerates a project's scope and timeline. Crashing is a compression approach that focuses on the project timetable to hasten the project's completion date. Here are some plausible instances of crashing: Over-time. adding more resources to a particular activity. Crashing is the process of reducing the length of time it takes to complete a project by changing its scope or adding resources. Fast-tracking, which involves adjusting project activities so that they are completed in parallel and with less time spent, is typically the first option when a project's production duration needs to be shortened.

Learn more about crashing here-

brainly.com/question/4701800

#SPJ4

You might be interested in
What are the common characteristics of a bastion host?
Ksju [112]
The bastion host node is typically an influential server with better-quality security actions and custom software. It frequently hosts only a single request because it wants to be very good at whatever it does. The software is commonly modified, limited and not obtainable to the public. This host is envisioned to be the strong fact in the network to care for the system last it. Therefore, it often endures unvarying maintenance and audit. Occasionally bastion hosts are used to draw occurrences so that the basis of the attacks may be outlined. The bastion host practices and filters all inward traffic and averts malicious traffic from incoming the network, acting much like a gateway. 
6 0
3 years ago
What are the paragraph different formatting paragraph tools?draw its icon and state its function.
aliya0001 [1]

Theres Tab, And File


:)

7 0
3 years ago
Can someone please tell me how can I code this onto C# on Visual Studio 2019? It’s due tomorrow!!
11111nata11111 [884]

Answer:

i need points

Explanation:

lol

8 0
3 years ago
again assume that each of the resistors in the circuit shown above has a resistance value of 100k(question in the picture above)
Svetllana [295]
Statement A is true. R4 is not part of the circuit since it has one terminal not connected. The other resistors are in series, so the same current flows through them. Hence they will dissipate equal power.
4 0
3 years ago
A method variable a class variable with the same name. a) acquiesces to b) destroys c) overrides d) alters
arlik [135]

Answer:

Option(c) is the correct answer for the given question.

Explanation:

The method variable overrides the class variable name with same name The method variable overrides of the class variable name .

Following are the example in java language

public class Main

{

int b=90; // class varaible or instance varaible

void sum()

{

   int b=34; // method having same name as class varaible name

   b=b+10;

   System.out.println(b); // display b

}

public static void main(String[] args)  // main method

{

 Main ob=new Main(); // craete object

 ob.sum(); // calling method sum

}

}

Output:

44

In this we declared a variable 'b' as int type in class and override this variable in sum() function it means same variable name is declared in function sum() .

acquiesces ,destroys,alters are the wrong for the given question.

So overrides is the correct answer

4 0
3 years ago
Other questions:
  • Every node (except of the last node) in a singly linked list contains ____
    5·1 answer
  • What activities are the most likely to infect your computer with a virus? Check all that apply
    11·2 answers
  • Six external parts of a computer system, which are output and which are input devices.
    12·1 answer
  • A device which lets you interact with the computer
    6·2 answers
  • BRAINLIEST!!! 20 PNTS!!!! HELPP!!!
    12·1 answer
  • You can use a minus sign to make a negative numberlike -2. What happens to each of the following 2++2
    8·1 answer
  • How you use ict today and how will you use it tomorrow
    14·1 answer
  • Complete the following sentence. <br> _______ is often used to solve riddles and puzzles.
    7·2 answers
  • Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Referenc
    7·1 answer
  • Bob The Penguin is a real you-tuber, and he plays Mine-craft. Who is his owner?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!