1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
4 years ago
13

Brian has to manage a project with tight deadlines. Help him arrange the stages of project management in the correct sequence.

Computers and Technology
1 answer:
Vladimir [108]4 years ago
5 0
I think it is 2, 4, 1, 5, 3 the numbers are the cards down
You might be interested in
To open computer manger you would
Irina18 [472]
"start", "control panel", "administrative tools", "computer management" thats it
8 0
3 years ago
Which of the following are true statements about the data that can be represented using binary sequences?
g100num [7]

Answer:

All of the above.

Explanation:

In Computer science, a bit is a short word for the term binary digit and it's primarily the basic (smallest) unit measurement of data or information.

A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;

  • True or ON, which is equal to one (1).
  • False or OFF, which is equal to zero (0).

Therefore, a bit that is turned off represents the value of binary numbering because it has a numerical value of zero (0).

A binary sequence represents all binary digits that are to be written in sequences of ones (1s) and zeroes (0s). Hence, a binary sequence can be used to encode data such as sound (audio) strings of characters, video, images, colors, computer instruction codes etc.

<em>The true statements about the data that can be represented using binary sequences are;</em>

1. Binary sequences can be used to represent strings of characters.

2. Binary sequences can be used to represent colors.

3. Binary sequences can be used to represent audio recordings.

6 0
4 years ago
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
Pls someone help me with these four questions
ipn [44]

Answer:

16. Grace Hopper. 1959.

8 0
3 years ago
Which pair of properties apply to both sound and electromagnetic waves?
Alex73 [517]
Both waves can have interference, reflection, and diffraction.

Wave interference is a phenomenon that occurs when two waves meet while traveling along the same medium. The interference of waves causes the medium to take on a shape that results from the net effect of the two individual waves upon the particles of the medium.

Wave reflection happens when a wave reaches the boundary between one medium and another medium, a portion of the wave undergoes reflection and a portion of the wave undergoes transmission across the boundary.

Wave diffraction<span> involves a change in direction of waves as they pass through an opening or around a barrier in their path.<span> </span></span>
3 0
4 years ago
Read 2 more answers
Other questions:
  • Programmers say the data items are ____ only within the module in which they are declared.
    5·1 answer
  • Which type of factories began to flourish in the late eighteenth century
    5·1 answer
  • Write a program that prompts the user for a name (any String value would work for testing), and print a hello message to the con
    5·1 answer
  • Three batch jobs, A through E, arrive at a computer center at almost the same time. They have estimated running times of 10, 6,
    6·1 answer
  • 2<br><br> What combination of keys turns the value in a cell into a percentage?
    12·1 answer
  • When installing EMT conduit that will be exposed to wet conditions, _______ fittings should be used.
    5·2 answers
  • Consider the algorithm for determining whether a sequence of parentheses is balanced (has correct nesting). The pseudo code for
    10·1 answer
  • The InfoBar is located below the ribbon and on top of a message. It is used for which purposes? Check all that apply. showing th
    9·2 answers
  • An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa
    5·1 answer
  • How have newspapers and magazines adapted to digital technology?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!