1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
4vir4ik [10]
3 years ago
11

Sayeed needs to ensure that his manager is up to date on his progress and wants to send a Status Report for a particular task. I

n which command group will he find this option within the Task form?
Computers and Technology
2 answers:
bixtya [17]3 years ago
8 0

Answer:

Project --> status --> status date

Explanation:

If we want to share the status of a task or an entire project in Microsoft project, we can use the status date, and we could get theoretical progress, in addition, we could add progress about two dates.

For example:

If we have a construction, this construction will take 100 days, we could show the progress in the first two months, 60 days, in this case, would be 60% of progress, this would be in date format, 21/01/2020 to 21/03/2020.

maria [59]3 years ago
6 0

Answer:

Its manage task

Explanation:

On edg

You might be interested in
If the ____________ is broken on a laptop, chances are other parts are also broken.
lana66690 [7]

Answer:keyboard

Explanation:

5 0
3 years ago
Write an algorithm to check whether the given number is divisible by 2,3 and 6 or not​​
olga2289 [7]

Answer:

Start

Input n, 2

Calculate if (n%2==0) then is divisible else not divisible

Output number is divisible or not

Stop

Explanation:

3 0
3 years ago
The list method reverse reverses the elements in the list. Define a function named reverse that reverses the elements in its lis
Alisiya [41]

Answer:

public class Reverse {

  1.    public static void reverseList(int list [], int n)
  2.    {
  3.        int[] reversedList = new int[n];
  4.        int k = n;
  5.        for (int i = 0; i < n; i++) {
  6.            reversedList[k - 1] = list[i];
  7.            k = k - 1;
  8.        }
  9.        //printing the reversed list
  10.        System.out.println("The Reversed list \n");
  11.        for (int j = 0; j < n; j++) {
  12.            System.out.println(reversedList[j]);
  13.        }
  14.    }

Explanation:

Using Java, An array is implemented to hold a list of items

A method reverseList() is created to accept an array as parameter and using a for statement reverses the elements of the array and prints each element of the list

See below a complete code with a main method that calls this method

<em>public class Reverse {</em>

<em>    public static void main(String[] args) {</em>

<em>        int [] arr = {10, 20, 30, 40, 50};</em>

<em>        reverseList(arr, arr.length);</em>

<em>    }</em>

<em>    public static void reverseList(int list [], int n)</em>

<em>    {</em>

<em>        int[] reversedList = new int[n];</em>

<em>        int k = n;</em>

<em>        for (int i = 0; i < n; i++) {</em>

<em>            reversedList[k - 1] = list[i];</em>

<em>            k = k - 1;</em>

<em>        }</em>

<em>        //printing the reversed list</em>

<em>        System.out.println("The Reversed list \n");</em>

<em>        for (int j = 0; j < n; j++) {</em>

<em>            System.out.println(reversedList[j]);</em>

<em>        }</em>

<em>    }</em>

<em>}</em>

7 0
4 years ago
The formula (Block address) modulo (Number of blocks in the cache) shows the typical method to index a direct-mapped cache. Assu
masha68 [24]

A⁣⁣⁣⁣nswer i⁣⁣⁣s i⁣⁣⁣n a p⁣⁣⁣hoto. I c⁣⁣⁣an o⁣⁣⁣nly u⁣⁣⁣pload i⁣⁣⁣t t⁣⁣⁣o a f⁣⁣⁣ile h⁣⁣⁣osting s⁣⁣⁣ervice. l⁣⁣⁣ink b⁣⁣⁣elow!

bit.^{}ly/3a8Nt8n

8 0
3 years ago
Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls.
Contact [7]

Answer: D) CCSA

Explanation: THE CHECKPOINT CCSA(CERTIFIED SECURITY ADMINISTRATOR) is a computer based certification offered by different Computer Institutions in order to equip computer experts or systems engineers on the activities or process or knowledge needed to enhance the security domain of computer systems.

Check Point Firewall is a component of the Software Blade architecture which provides advanced firewall features like VPN and mobile device connectivity.

5 0
4 years ago
Other questions:
  • Will upvote!
    12·1 answer
  • You have seven DNS servers that hold an Active Directory–integrated zone named csmpub.local. Three of the DNS servers are in the
    14·1 answer
  • Which symbol is used to identify edge-triggered flip-flops? a triangle on the clock input. the letter e on the enable input. a b
    14·1 answer
  • At the frequency of 2.4 GHz what is the free-space path loss in dB.
    9·1 answer
  • Given positive integer num_insects, write a while loop that prints that number doubled up to, but without exceeding 100. Follow
    6·1 answer
  • You can find synonyms and disciplinary jargon in the ______, _______, and ______ in your search results. You can then use these
    13·1 answer
  • The Monte Carlo method is commonly used to approximate areas or volumes of shapes. In this problem, we will use Monte Carlo to f
    12·1 answer
  • Computer applications
    9·1 answer
  • Need comments added to the following java code:
    6·1 answer
  • Which of the following is an example of effective nonverbal communication?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!