1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
14

Question 14. (3.04 MC) how does the project manager evaluate the scope of a project

Computers and Technology
1 answer:
3241004551 [841]3 years ago
7 0
<h2><u>Scope of a project: </u></h2>

A project manager should always be clear with all the managerial and technical requirements of a project.

  • The project manager should set the goals and objective of a project.
  • The project manager should use SMART guidelines to confirm the objective and goals of a project.
  • The project manager should know the whole description of the project.
  • The project manager must know the expectation of the end users.
  • The project manager must recognize the limitations in achieving the goals of the project.
  • The project manager should keep on get the feedback and do the required changes to make the project successful.
You might be interested in
What kind of server connects a remote system through the internet to local serial ports using tcp/ip?
zaharov [31]
A proxy server. A system requests information from the internet, and that traffic is routed through the proxy server before arriving to the requesting system.

This is why proxy servers are used for hiding identity and being more secure, as internet traffic would show the IP address of the proxy server, and not the requesting system, though this often depends on the type of proxy server, as some proxy server's main objective isn't anonymousity, but rather efficiency.
4 0
2 years ago
What is the benefit of the load balancing logic to end-user?
Alborosie

Answer:

<em>It can minimize response time, and minimize the costs for the end user.</em>

Explanation

Load balancing is a form of workload distribution across several computers or resources. It allows each segment of the system to process a smaller task, minimizing respond time, helping to avoid overload, and contributing to optimize resource use.

6 0
2 years ago
Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
Evgesh-ka [11]

Answer:

b) False.

Explanation:

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.

5 0
2 years ago
Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file that contains the numbers in
morpeh [17]

Answer:

See explaination

Explanation:

PhoneLookup.java

import java.io.FileReader;

import java.io.IOException;

import java.util.Scanner;

public class PhoneLookup

{

public static void main(String[] args) throws IOException

{

Scanner in = new Scanner(System.in);

System.out.println("Enter the name of the phonebook file: ");

String fileName = in.nextLine();

LookupTable table = new LookupTable();

FileReader reader = new FileReader(fileName);

table.read(new Scanner(reader));

boolean more = true;

while (more)

{

System.out.println("Lookup N)ame, P)hone number, Q)uit?");

String cmd = in.nextLine();

if (cmd.equalsIgnoreCase("Q"))

more = false;

else if (cmd.equalsIgnoreCase("N"))

{

System.out.println("Enter name:");

String n = in.nextLine();

System.out.println("Phone number: " + table.lookup(n));

}

else if (cmd.equalsIgnoreCase("P"))

{

System.out.println("Enter phone number:");

String n = in.nextLine();

System.out.println("Name: " + table.reverseLookup(n));

}

}

}

}

LookupTable.java

import java.util.ArrayList;

import java.util.Collections;

import java.util.Scanner;

/**

A table for lookups and reverse lookups

*/

public class LookupTable

{

private ArrayList<Item> people;

/**

Constructs a LookupTable object.

*/

public LookupTable()

{

people = new ArrayList<Item>();

}

/**

Reads key/value pairs.

atparam in the scanner for reading the input

*/

public void read(Scanner in)

{

while(in.hasNext()){

String name = in.nextLine();

String number = in.nextLine();

people.add(new Item(name, number));

}

}

/**

Looks up an item in the table.

atparam k the key to find

atreturn the value with the given key, or null if no

such item was found.

*/

public String lookup(String k)

{

String output = null;

for(Item item: people){

if(k.equals(item.getName())){

output = item.getNumber();

}

}

return output;

}

/**

Looks up an item in the table.

atparam v the value to find

atreturn the key with the given value, or null if no

such item was found.

*/

public String reverseLookup(String v)

{

String output = null;

for(Item item: people){

if(v.equals(item.getNumber())){

output = item.getName();

}

}

return output;

}

}

Item.java

public class Item {

private String name, number;

public Item(String aName, String aNumber){

name = aName;

number = aNumber;

}

public String getName(){

return name;

}

public String getNumber(){

return number;

}

}

input.txt

Abbott, Amy

408-924-1669

Abeyta, Ric

408-924-2185

Abrams, Arthur

408-924-6120

Abriam-Yago, Kathy

408-924-3159

Accardo, Dan

408-924-2236

Acevedo, Elvira

408-924-5200

Acevedo, Gloria

408-924-6556

Achtenhagen, Stephen

408-924-3522

Note: Replace all the "at" with at symbol

4 0
3 years ago
Assume:
kobusy [5.1K]

Answer:

?

Explanation:

8 0
3 years ago
Other questions:
  • The major difference between a calculator and a computer, when performing calculations, is that a
    10·1 answer
  • What does this say:<br> √ans
    6·2 answers
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • (Please answer! Correct answer gets brainliest!)
    5·2 answers
  • How is this fictional tex in the people could fly different from the nonfictional text​
    12·2 answers
  • Translation of a file into a coded format that occupies less space than the original file is called
    15·1 answer
  • Who elso does their online school in their bed cause i do
    7·2 answers
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
  • What type of malware is best known for carrying other malware as a payload?
    8·1 answer
  • What is the function of tab?<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!