1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
13

Linda is a core member of a project. She estimates the cost of the project, creates project requirements, and notes risks. What

is Linda’s position in the project?
Linda is the project
.
Computers and Technology
1 answer:
lord [1]3 years ago
4 0

Explanation:

no linda is the core member not rhe project

You might be interested in
Do most facebook and twitter users access the platform from their personal computers?
vlabodo [156]
No???? Yes. Maybe. I don't know. Why is this relevant? <span />
8 0
3 years ago
Read 2 more answers
Encapsulation is the process of “packaging” information prior to transmitting it from one location to another. true or false
GenaCL600 [577]

The statement that encapsulation is the process of “packaging” information prior to transmitting it from one location to another is true.

This method augments the data with successive layers of control information before transmission across a network. Each OSI (Open System Interconnection) layer  is part of the encapsulation by adding a header to the data packet in the transmission network.

3 0
3 years ago
Why do attackers tend to target public or private Wi-fi networks?
Anika [276]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

5 0
3 years ago
What is the type of person of personal computer which is also called a laptop computer?
gulaghasi [49]

Today personal computer is changed to laptop mode. Personal computer is made of CPU, monitor, keyboard, printer and mouse. All input device and output device connected with wire or without wire.

<u>Explanation:</u>

Personal computers are also called as desktop or workstation. These days all become compatible device which is called as laptop.

Basically all input devices and output device are fixed in laptop so end user can carry the laptop and used anywhere.

Laptop is charged and used, whereas desktop or workstation just fixed in the table and used it.

7 0
4 years ago
Jason works as a financial investment advisor. He collects financial data from clients, processes the data online to calculate t
Sedbober [7]

I believe the answer is A. because he has to listen to what the people tell him and he information he has to think about and make a choice on what to reply with.

I hope this helps and its correct please let me know if its wrong have a great day//night.

4 0
3 years ago
Other questions:
  • Add the following functions to the code:
    9·1 answer
  • Which of these jobs would be most appropriate for someone who majors in computer engineering? I need the answer ASAP Helping com
    14·2 answers
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • A star appears under the <br> menu of the word processing program.
    5·1 answer
  • Outlines are effective because
    13·2 answers
  • Experienced students may serve as mentors if they are at least age 21 and have at least 3 years of post-secondary education. In
    5·1 answer
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • If two egg cells are fertilized what will happen?
    10·1 answer
  • James root lol ........................
    12·1 answer
  • Write an expression in Boolean algebra that evaluates to 1 when an odd number of bits of the number is 1 and 0 otherwise
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!