1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
6

What is a project manager?

Computers and Technology
2 answers:
slava [35]3 years ago
5 0

Explanation:

Jesus Christ had dreads so shake em', I ain't got none but I'm planning on growing some

zhenek [66]3 years ago
5 0

Answer:

D

Explanation:

a project manager dose evreything in a project

You might be interested in
The lower band and upper band of integer data type​
Nikolay [14]
The whole idea of lower and upper bounds in Integration is that the lower bound represents the smallest value from which we start summing areas(smallest value of the interval) and upper bound is the value to which we sum to(maximum value of the interval).
(Just gave you an answer describing what it was because you didn’t implant a question so I gave you a definition)
3 0
3 years ago
Biểu diễn cây sau bằng mảng một chiều
xeze [42]

Answer:

fhfhbrg

Explanation:

brikbgjgjkkjola

3 0
3 years ago
DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
OLEGan [10]

DES is a commonly used symmetric encryption

A) is a commonly used symmetric encryption

<u>Explanation:</u>

DES stands for Data Encryption Standard. It is a symmetric key algorithm and is used for encrypting electronic data. It was developed in 1975. DES is one of the oldest encryption standards to be used in the industry.

The algorithm takes 16 rounds of permutations in order to encrypt data. But now, with the advent of technology, as new algorithms have been designed and put in use, DES is less preferable.

In the process of key generation, some keys generated sometimes turn out to be weak and hence are prone to attacks. If not for the weak keys generation, DES works perfectly fine and is an effective algorithm to encrypt data.

6 0
3 years ago
What is the target audience of an ad?
GuDViN [60]

All ages

Explanation:

It is a toothpaste advert which most people use. It will also appeal to people who want to get whiter teeth

8 0
3 years ago
write a program with total change amount as an integer input and output the change using the fewest coins, one coin type per lin
notka56 [123]

Answer:

Explanationoojhh

8 0
3 years ago
Other questions:
  • Corey is an architect. What software does he most likely use to design houses? graphic software scheduling software CAD software
    10·2 answers
  • Please help me complete this task for ICT! Its about Hardware and Software
    12·1 answer
  • Which of these are forms of data? Check all that apply.
    8·2 answers
  • How many bits would be in the memory of a computer with 4kb memory?
    8·1 answer
  • True or false a computer with a high efficiency rating should stay cooler than one with a low effiency rating
    9·1 answer
  • A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
    15·1 answer
  • How to create a network of relevant prospects?
    5·1 answer
  • A serial schedule:
    8·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIES THANKS
    7·2 answers
  • HOW TO GET RID OF THESE LINES?? PLS WILL GIVE BRAINLIEST
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!