1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
8

In class Assignment Setup of Production FacilityJobs Description Duration/ Weeks Predecessors1 Design production tooling 4 - 2 P

repare manufacturing drawings 6 - 3 Prepare production facility 10 - 4 Procure tooling 12 1 5 Procure production parts 10 2 6 Kit parts 2 3,4,5 7 Install tools 4 3,4 8 Testing 2 6,7 1. Draw the network diagram2. What is the critical path

Computers and Technology
1 answer:
Zolol [24]3 years ago
3 0

Answer:

See explaination

Explanation:

Critical path method (CPM) is a step-by-step process by which critical and non-critical tasks are defined so that time-frame problems and process bottlenecks are prevented.

please see attachment for the step by step solution of the given problem.

You might be interested in
Graphic images can be stored in a variety of formats including ____.
Marrrta [24]
Graphic images can be stored in a variety of formats including JPEG and GIF. Hope this helped!
5 0
3 years ago
1 #include 2 3 int max2(int x, int y) { 4 int result = y; 5 if (x > y) { 6 result = x; 7 } 8 return result; 9 } 10 11 int max
Serhud [2]

Answer:

7

Explanation:

#include <stdio.h>

int max2(int x, int y) {

   int result = y;

   if (x > y) {

       result = x;

   }

   return result;

}

int max3(int x, int y, int z) {

   return max2(max2(x,y),z);

}

int main() {

   int a = 5, b = 7, c = 3;

   printf("%d",max3(a, b, c));

   printf("");

   return 0;

}

Hi, first of all, next time you post the question, it would be nice to copy and paste like above. This will help us to read the code easily. Thanks for your cooperation.

We start from the main function:

The variables are initialized → a = 5, b = 7, c = 3

max3 function is called with previous variables and the result is printed → printf("%d",max3(a, b, c));

We go to the max3 function:

It takes 3 integers as parameters and returns the result of → max2(max2(x,y),z)

Note that max2 function is called two times here (One call is in another call actually. That is why we need to first evaluate the inner one and use the result of that as first parameter for the outer call)

We go to the max2 function:

It takes 2 integers as parameters. If the first one is greater than the second one, it returns first one. Otherwise, it returns the second one.

First we deal with the inner call. max2(x,y) is max2(5,7) and the it returns 7.

Now, we need to take care the outer call max2(7, z) is max2(7, 3) and it returns 7 again.

Thus, the program prints 7.

6 0
3 years ago
Select the best answer from the drop-down menu. ________ networks use cables connected directly to the computer. Signals sent in
LekaFEV [45]

Answer: Wired, Wi-fi, Wi-fi, A wired network, Wi-fi

Explanation:

4 0
3 years ago
What is one important feature of an AUP?
rusak2 [61]

Answer:

A clear outline of the consequences of violating the policy  is the correct answer to this question.

Explanation:

AUPs are used by schools and universities, corporations, businesses, internet and hosting service providers, and website owners. An acceptable use of policy in AUP helps in many ways:

  • Online platforms and applications require users to sign the policy before granting access to any information database, online shop, or other networks.
  • An acceptable use policy helps in reducing risk when it comes to online safety, decreased productivity, and damage to both the company and the users.
  • One of the main reasons why an acceptable use policy is important is to ensure the safety of users.
  • Use of policy is also known as fair use policy.It is set of rules applied by the owner of the network or website.
8 0
3 years ago
What is the name of the programming language created by Spu7Nix?
VMariaS [17]
The name of the programming language is “Brainfugd”
3 0
3 years ago
Read 2 more answers
Other questions:
  • Why has unicode become the standard way of converting binary to text??
    8·1 answer
  • Do most facebook and twitter users access the platform from their personal computers?
    6·2 answers
  • Which presenter would most likely benefit from a custom slide show?
    10·2 answers
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • The version of Windows that first provided networking capabilities was _____.
    12·2 answers
  • What is a set of javascript statements that result in an action?
    15·1 answer
  • In what ways do you think the media should function in a democratic society?
    9·1 answer
  • Describe how you would create a Java program that prompted the user to correctly enter a username and password. The username is
    7·1 answer
  • Saitama And Tatsumaki Both Go Shopping Together ,Both have Have 50 loafs of bread , And Saitama takes 43 , How much do Tatsumaki
    14·1 answer
  • Enzo is writing a paper about the similarities and differences between ancient Rome and modern America. Which text structure is
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!