1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
14

Which part of project management involves determining the required materials?

Computers and Technology
2 answers:
Katyanochek1 [597]3 years ago
5 0
Resources I think because what u have all depends on resources
beks73 [17]3 years ago
4 0

Answer:

Resources

Explanation:

I took the test and got the answer right

You might be interested in
Can someone please tell me what I’m doing wrong ? Please and it’s due on Thursday!!
liberstina [14]

Answer:

Sure. In Unit test 5, it's looking for 1 instead of 0. You are returning 0 instead of 1.

0 requires 1 digit to express it and should therefore return 1.

In line 6, change the 0 to a 1.

8 0
2 years ago
_________ products/services are more quickly consumed,usually in a single use or a few usage occasions.
stiks02 [169]

Answer: Non durable

Explanation:

Non durable products/services are more quickly consumed,usually in a single use or a few usage occasions. Examples of these product include daily eatables which has to be consumed within a few days or it will perish and other services such as medical and etc.

4 0
3 years ago
Before you create a pivot table, it is important to __.
Reptile [31]

Before you create a pivot table, it is important to <em><u>Create a database</u></em>.

Option: A

<u>Procedure to create Pivot Table: </u>

1. Select the cells and table in the sheet containing the data you want to use.

2. Go to the Insert tab and click the PivotTable command.

3. In the dialog box ‘Create PivotTable’ will appear. Choose your settings, then click OK. In our example, we will use Sheet1 as our source data and insert the PivotTable on a new worksheet.

4. The Field List and blank PivotTable will appear on a new worksheet.

5. Once you create a PivotTable, you have to decide which fields to add. Each field has a simple column header from the source data. In the PivotTable Field List, check the box for each field you want to add.  

6. The selected fields will be added to one of the four areas below the Field List. In our example, the Salesman field has been added to the Rows area, while the Order Amount has been added to the Values area. Alternatively, you can click, hold, and drag a field to the desired area.

7. The PivotTable values will calculate and summarize the selected fields. In our example, the PivotTable shows the amount sold by each salesman.

8 0
3 years ago
Read 2 more answers
Networking Gadgets, Inc. currently employs 8 people but plans to hire 10 more in the next four months. Users will work on multip
kirza4 [7]

Answer:

Following is given the solution to the question.

I hope it will make the idea clear.

Explanation:

7 0
4 years ago
Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
sergiy2304 [10]

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

6 0
3 years ago
Other questions:
  • &gt;
    6·1 answer
  • Write a shell (text-based) program, called sum_second.py, that opens a text file called stuff.txt with 2 numbers per line separa
    8·1 answer
  • Press the _______ key to move to the next cell in a row.
    5·1 answer
  • Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
    6·1 answer
  • Which information purpose uses video from a security camera?
    15·1 answer
  • Nonprogrammed decision
    7·1 answer
  • ___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
    15·1 answer
  • (Reverse number) Write a program that prompts the user to enter a four-digit inte- ger and displays the number in reverse order.
    9·1 answer
  • 1 paint 2 anahaw leaf 3 shellac 4 varnish 5 metal sheets 6 paint 7 G.I. pipe 8 enamel paint 9 bamboo 10 fillers
    14·1 answer
  • Hosts on the Internet have ________ addresses. Group of answer choices both A and B neither A nor B IP data link
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!