1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
4 years ago
8

Read the following scenario: A project will require more people than originally estimated. Identify the possible risks to the pr

oject. A) Ideas and creativity B)Money and resources C) Policies and procedures D)Time and work ethic
Computers and Technology
2 answers:
egoroff_w [7]4 years ago
8 0
A ideas and creativity
max2010maxim [7]4 years ago
8 0
I believe the best answer is B, if it requires more people, then that is a risk of needing more resources. hope this helps, have an amazing day :)
You might be interested in
In needs analysis: Group of answer choices the costs of different physical network design alternatives are assessed the rate of
Ludmilka [50]

Answer:

the goal is to understand what users and applications the network will support.

Explanation:

A traditional network design approach is said to follow the structured systems of analysis as well design process that is similar to that which is used in building such applications. The main goal of the application developers is understand and study the needs of the users and also the application which the network will support.

5 0
3 years ago
PLEASE HELP WITH MY CODING!!!!!!!!!!!!!!
igor_vitrenko [27]
A: Similar..............
6 0
3 years ago
Read 2 more answers
Phân tích cạnh tranh của cocacola và pepsi
Fittoniya [83]
I don’t understand please speak English
7 0
2 years ago
Can someone please give me the 3.6 code practice answer I will mark you brainlyist
Stolb23 [73]

3.6 Code Practice Question:

Write a program to input 6 numbers. After each number is input, print the biggest of the number entered so far:

Answer:

nums = []

biggest = 0

for i in range(6):

    num = int(input("Number: "))

    nums.append(num)

    if(i == 0):

         print("Largest: "+str(nums[0]))

         biggest = nums[0]

    else:

         if nums[i]>biggest:

              print("Largest: "+str(nums[i]))

              biggest = nums[i]

         else:

              print("Largest: "+str(biggest))

                       

Explanation:

This question is answered using python

This line declares an empty list

nums = []

This line initalizes the biggest input to 0

biggest = 0

This iteration is perfoemed for 6 inputs

for i in range(6):

This prompts user for input

    num = int(input("Number: "))

This appends user input to the list created

    nums.append(num)

For the first input, the program prints the first input as the largest. This is implemented in the following if condition

<em>     if(i == 0):</em>

<em>          print("Largest: "+str(nums[0]))</em>

<em>          biggest = nums[0]</em>

For subsequent inputs

    else:

This checks for the largest input and prints the largest input so far

<em>          if nums[i]>biggest:</em>

<em>               print("Largest: "+str(nums[i]))</em>

<em>               biggest = nums[i]</em>

<em>          else:</em>

<em>               print("Largest: "+str(biggest))</em>

<em />

3 0
3 years ago
A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text mess
tensa zangetsu [6.8K]

Answer:

A. Multifactor authentication

Explanation:

Multifactor authentication is a security system process that requires a user to verify his or her identity by providing two categories of credentials.

A mobile device user has entered her user ID and password to access an online account, she immediately receives a text message with a unique PIN or One Time Password (OTP) that must be entered before she is granted access to the account. This is an example of a multifactor authentication security method.

8 0
3 years ago
Other questions:
  • They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll
    9·2 answers
  • You '' friend or ''like'' a page o your favorite social media page that advertises a
    10·1 answer
  • How many bits would be in the memory of a computer with 4kb memory?
    8·1 answer
  • If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign
    8·1 answer
  • How to fix dark images?<br><br>I am using a phone btw​
    14·2 answers
  • A regular polygon is an n-sided polygon in which all sides are of the same length and all angles have the same degree (i.e.,the
    15·1 answer
  • Which of these personal protective equipment items prevents injury from falling objects ?
    15·1 answer
  • Stock Market
    11·1 answer
  • !!! PLEASE HELP ASAP REALLY NEED IT !!!
    15·2 answers
  • Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individua
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!