1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
4 years ago
9

With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta

sk. C. is the amount of time a task may be delayed without changing the overall project completion time. D. is the latest time an activity can be started without delaying the entire project.
Computers and Technology
1 answer:
Wewaii [24]4 years ago
8 0

Answer:

The correct answer is C) With respect to PERT and​ CPM, slack is the amount of time a task may be delayed without changing the overall project completion time.

Explanation:

The CPM (Critical Path Method) method is frequently used in the development and control of projects whose tasks have a fixed duration while the PERT (Program Evaluation and Review Techniques) method is a set of techniques with the same purpose but that allows to work with tasks with estimated probability duration but not deterministic.

Both methods are based on developing a complete scheme that includes all the tasks of a project linked to each other according to their sequence, determining the duration and analyzing different ways of reconfiguring the task planning to optimize the use of the resources of according to the general objectives of the project.

There are tasks that to start performing them must have been completed one or more previous tasks. The overall duration of the project is determined by the Critical Path, which is the sequence of tasks of greater duration. The tasks belonging to the critical path have to be carried out with special care because delays in them would cause delays in the total achievement of the project. That is why these tasks have no slack.

The rest of the tasks have some slack, which is determined by the time that a previous task can be delayed without delaying the total time of completion of the project, that is, not exceeding the duration determined by the critical path.

That is that why we say that the <em>slack</em><em> is the amount of time a task may be delayed without changing the overall project completion time</em>.

You might be interested in
While approaching your parked car, the first step before getting in should be
Lady_Fox [76]

The answer to your question is:

A. Have the key in your hand.

8 0
3 years ago
Read 2 more answers
Which statements describe the elements of the email function? Check all that apply.
liq [111]

Which statements describe the elements of the email function? Check all that apply.

Messages are delivered from one email address to another.

An email address can be used to identify the sender in Contacts.

The local part of the email address contains the user name.

The domain part of the email address can a business name.

Answer:

The local part of the email address contains the user name.

The domain part of the email address can a business name.

Explanation:

Elements of email function include the local part of the email which can contain the username, the domain part of the email, the sender, receiver, and other components.

8 0
4 years ago
Read 2 more answers
While working on a presentation, Jack lost all the data because he switched off his computer unknowingly. On which of these comp
Lelechka [254]

Random Access memory(RAM) stores data temporary until the computer is switched off

3 0
3 years ago
Read 2 more answers
Marie wanted to make sure that the information in her presentation was well organized. She should _____.
Sauron [17]
Marie could either ask a friend or her parents to peer edit it and tell her if its good enough or if she should work on it more.<span />
4 0
3 years ago
Sarah stores data electronically.
attashe74 [19]

Answer:

Always back up your data. Prevention is the best protection.

Diversify your backups. You always want more than one backup system.

Encrypt sensitive data. Data is not always encrypted even when it's on a backup tape.

Address data security.  

Use anti-virus and email security.  

Trust the professionals

Explanation: <u>HOPE IT HELPS YOU</u>

3 0
3 years ago
Other questions:
  • Which of the following connects the processor to the chipset and memory on the motherboard? a. Thread b. FSB c. BIOS d. ALU
    9·1 answer
  • On Sarah’s first day at work she is provided with a range of information technology that she can use to write , edit or create d
    5·2 answers
  • This device transmits data to all the workstations on a network. gateway hub router switch
    11·2 answers
  • What is a good project I can do for Artificial Intelligence? It has to be some type of Technology that covers Artificial Intelli
    14·1 answer
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • How many bits does it take to represent the values from 0 to 255?
    9·1 answer
  • Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
    8·1 answer
  • What are the three fundamental principals of mnemonics??
    6·2 answers
  • If you were creating a program that would convert Fahrenheit to Celsius, which kind of variable would you want to use? a string
    7·2 answers
  • When you look directly at a camera lens, it may seen like there is only one lens, but entering light actually passes through a s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!