1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
3 years ago
12

A Tracking Gantt chart is based on the percentage of work completed for project tasks or the actual start and finish dates. True

False
Computers and Technology
1 answer:
murzikaleks [220]3 years ago
4 0

Answer:

True

Explanation:

The Gantt chart is a specific bar chart that indicates the possible timeline for a project. It is named after the inventor Henry Gantt. Gantt charts are used on multiple projects to determine the project schedule or timeline, and guides these projects to achieving their goals.

A tracking Gantt chart is a dynamic chart as it tracks and compares the project's current course and the original laid down plans. Basically, you can actively compare two dates for a project.

The following steps show how to setup tracking Gantt chart.

  1. On your project window, select the Tracking Gantt Chart ribbon.
  2. Choose the data elements
  3. Click Ok.
You might be interested in
You are the administrator for the contoso.com website. recently, the server hosting the website had a failure that caused it to
Alisiya [41]
Protecting the Power supply
Adding disk Arrays
Install an NLB Cluster
4 0
3 years ago
What are the purpose of Keyframes,
Kobotan [32]

Answer:

In media production, a key frame or keyframe is a location on a timeline which marks the beginning or end of a transition. It holds special information that defines where a transition should start or stop. The intermediate frames are interpolated over time between those definitions to create the illusion of motion.

Explanation:

7 0
3 years ago
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
3 years ago
Which of the follow is the best technique to determine how many menu items are needed and how to structure the menus and sub men
AnnZ [28]

Answer:

c. ​Group use cases by actor.

Explanation:

A use case is used to describe interaction between systems and users to achieve a goal. Mostly, a list of possible interaction between the system and the user is identified. The user can be a single person or a group. By using use case, the requirement of a systems is identified from a users point of view.

8 0
3 years ago
*/ What's wrong with this program? /* public MyProgram { public static void main(String[] args); } int a, b, c \\ Three integers
gulaghasi [49]

Answer:

A lot is wrong with the program given in the question. See the corrected version below:

<em>public class ANot {</em>

<em>    public static void main(String[] args) {</em>

<em>        int a, b, c;</em>

<em>    //Three integers</em>

<em>    a = 3; b = 4; c = a + b;</em>

<em>        System.out.println("The value of c is " + c);</em>

<em>    }</em>

<em>}</em>

Explanation:

Errors:

1. The main method had a semi colon after it. This is wrong

2. An open brace was supposed to follow the main method

3. The declaration of the variables was supposed to end with a semi colon

4. the correct comment style is // and not \\

5. Initialization of variables was supposed to end with semi colons

6. The output statement had C and not c which is the declared and initialized variable..Java is strictly typed

7. Open and closing braces for the class and method wrongly placed

6 0
3 years ago
Other questions:
  • Which part of the cpu stores instructions for high speed access or processing
    14·1 answer
  • Rate is how fast a screen updates the information being displayed.
    6·2 answers
  • How read binary file in c++
    7·1 answer
  • How to Create a while loop
    6·2 answers
  • Many languages distinguish between uppercase and lowercase letters in user-defined names. What are the pros and cons of this des
    8·1 answer
  • Can someone help please
    12·1 answer
  • You hash a symmetric key and store the hash on your workstation. You call your friend and verbalize the symmetric key to him or
    7·1 answer
  • highlight the possible risks and problems that should be address during the implementation of information system process
    5·1 answer
  • One last question
    7·2 answers
  • Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!