1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
6

Rachel is on her way to an interview for the position of a project manager. She is trying to prepare for this interview by analy

zing her own skills. Which of Rachel’s skills is relevant to the position of a project manager?
A)she was a very efficient programmer
B)she was very calm under pressure 
C)she is good at web design 
D)she was very good at graphic designing 
Computers and Technology
1 answer:
Fittoniya [83]3 years ago
5 0

The answer would be A.


You might be interested in
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
When your Windows XP file becomes too large to fit in a single window, which of these components allows you to bring different p
IRISSAK [1]
<span>Scroll bar and scroll arrows allow you to bring different portions into view.</span>
8 0
3 years ago
. Which of the following is NOT an option for increasinghard drive storage space?
Andrew [12]

Answer: B) Install an addition memory card to the current drive

Explanation: Drive  storage space is space that has particular capacity to store files and data. If the storage reaches the capacity,it turns out that more space is required for the data storage. The hard drive is a major storage space in a system with large capacity. So, if it gets full, there are various ways it could be increased such as replacing it with other internal hard drive, external hard drive etc.

But installation of the memory card is not the solution for increasing the space because they don't have very large space and can only support small devices.

7 0
3 years ago
Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
Ahat [919]

CAVA’s Academic Integrity Policy refers to Calfornia Virtual Academic’s policy book for students of their schools, which are public charter schools in the state of California.

In the handbook, it is mentioned that students who commit plagiarism will be required to re-submit the assignment during the first offence; will receive a fail grade for the assignment during the second offence; and will be withdrawn from a course or even the school during the third offence.

Thus the answer to the question is (D) all of the above.

8 0
3 years ago
Can someone give me the code for the edhesive 3.7 code practice for python? Thanks.
belka [17]

Answer:

Its me I think u might be able to know :)

Explanation:

4 0
2 years ago
Other questions:
  • In what year did commercial use of the Internet become available? 1991 1996 1999 2001
    9·1 answer
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • Due to the internal style sheets of some browsers, your website may look different to someone who is using firefox as opposed to
    11·1 answer
  • Why are cable networks such as mtv and cnn more profitable than the big four broadcast networks?
    8·1 answer
  • Is 5g harmful to the body ?
    9·2 answers
  • What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
    13·1 answer
  • How to create an app on app store please its not a joke, if someone knows tell me how
    15·1 answer
  • Why can't I register for Brainly?? I've been trying for months, too! I've noticed this question has been asked so many times, bu
    7·1 answer
  • Como a contribuido el desarrollo tecnologico a mejorar la calidad debida de los seres humanos
    11·1 answer
  • What happens if an email server cannot find a matching username or the mailbox is full
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!