1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
6

What is the name of the port that you plug an ethernet network cable into?

Computers and Technology
1 answer:
IrinaVladis [17]3 years ago
3 0

the answer is RJ-45

You might be interested in
George is only familiar with VGA connector for monitors. What should you tell him are the main differences between VGA and DVI c
lara [203]

Answer:

That a DVI connector looks different and that it support more monitors.

Explanation:

3 0
3 years ago
Select the correct answer.
Vladimir79 [104]

Answer:

I think make a copy maybe

Explanation:

4 0
3 years ago
Read 2 more answers
Within the seven domains of a typical IT infrastructure, there are particular roles responsible for data handling and data quali
nikitadnepr [17]

Answer:

The answer is "auditors"

Explanation:

Description to this question can be described as follows:

  • Auditors are professionals who analyze business and corporate accounts to determine, that the financial reports are accurate and lawful. It will serve as a consultant to suggest possible measures for risk avoidance or cost reduction.
  • Data security is the mechanism to avoid theft, loss of sensitive information, and information quality is critical and it is not able to know or stay in contact with your clients without high-quality data, that's why auditors are the correct answer and other choices can't be defined in the following senior.
7 0
3 years ago
science and technology are interdependent advances in one lead to advances in the other. give an example of this phenomenon.
goblinko [34]
Wouldn't it Be Stem ? 
Science 
technology
Engineering 
Mathmatics 
5 0
3 years ago
With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
Wewaii [24]

Answer:

The correct answer is C) With respect to PERT and​ CPM, slack is the amount of time a task may be delayed without changing the overall project completion time.

Explanation:

The CPM (Critical Path Method) method is frequently used in the development and control of projects whose tasks have a fixed duration while the PERT (Program Evaluation and Review Techniques) method is a set of techniques with the same purpose but that allows to work with tasks with estimated probability duration but not deterministic.

Both methods are based on developing a complete scheme that includes all the tasks of a project linked to each other according to their sequence, determining the duration and analyzing different ways of reconfiguring the task planning to optimize the use of the resources of according to the general objectives of the project.

There are tasks that to start performing them must have been completed one or more previous tasks. The overall duration of the project is determined by the Critical Path, which is the sequence of tasks of greater duration. The tasks belonging to the critical path have to be carried out with special care because delays in them would cause delays in the total achievement of the project. That is why these tasks have no slack.

The rest of the tasks have some slack, which is determined by the time that a previous task can be delayed without delaying the total time of completion of the project, that is, not exceeding the duration determined by the critical path.

That is that why we say that the <em>slack</em><em> is the amount of time a task may be delayed without changing the overall project completion time</em>.

8 0
3 years ago
Other questions:
  • Holly Carpenter argues that technology may actually prevent some kinds of evolution that would benefit humans. Do you agree with
    8·2 answers
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • Why you should care about copyright
    13·1 answer
  • 2. Use inheritance to create a hierarchy of Exception classes -- EndOfSentenceException, PunctuationException, and CommaExceptio
    6·1 answer
  • What do these terms have in common? google, yahoo!, bing they are important books. they are internet search engines. they are wo
    10·1 answer
  • A RISC processor has 186 total registers, with 18 global registers. There are 12 register windows, each with 10 locals. How many
    5·1 answer
  • In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
    7·1 answer
  • List 5 differences between monitors and printers​
    14·1 answer
  • Help pweeze this is due today :(<br><br> I will give u brainliest just pweeze, I need this answer :(
    8·1 answer
  • When writing a function or a formula in a spreadsheet,what is the first u should do​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!