1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
3 years ago
9

Dummy activities A. are found in both AOA and AON networks. B. are used when two activities have identical starting and ending e

vents. C. cannot be on the critical path. D. have a duration equal to the shortest​ non-dummy activity in the network.
Computers and Technology
2 answers:
Nikitich [7]3 years ago
4 0

Answer:

B. are used when two activities have identical starting and ending events.

Explanation:

Dummy activities are used when we want to demonstratethe relationship between two methods or evens, which place option B as the correct one.

Dummy activities have no duration at all, actually they are not suppose to be on the critical path, because they are just demonstrative, so option D and C are not correct.

sasho [114]3 years ago
3 0

Answer:

B. are used when two activities have identical starting and ending events.

Explanation:

A dummy activity is a simulated activity of sorts, one that is of a zero duration and is created for the sole purpose of demonstrating a specific relationship and path of action on the arrow diagramming method. Dummy activities are a useful tool to implement when the specific logical relationship between two particular activities on the arrow diagramming method cannot specifically be linked or conceptualized through simple use of arrows going from one activity to another.

You might be interested in
Mary is employed by a multinational firm, and works lon hours on a desktop computer. Recently, she experienced back pain and vis
iVinArrow [24]
Sit with good posture, get up and stretch and walk for 1 minute every 45 minutes.
6 0
3 years ago
Read 2 more answers
Whenever you communicate online, remember a. to delete anything you don't want to keep b. everything you put online is available
maxonik [38]

Answer:

B-Everything you put online is available forever. Messages or photos will never be permanently deleted from memory cards on cameras or cell phones.

5 0
3 years ago
Use humorous and monster in a sentence.
Sphinxa [80]

Answer: Here are a few...

1) The monstrous elephant trampled through the jungle crushing everything in its path.

2) Because it was so monstrous, the maid often got lost in the massive home she cleaned.

3) Monstrous amounts of foods are needed to feed the hundreds of refugees who showed up at the soup kitchen.

Explanation:

I hope this helps :D

4 0
3 years ago
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.
Eddi Din [679]

Answer:

read-only properties.

Explanation:

Only the read only properties can view but cannot change the data.The user don't have access to the no access properties, full-access properties can read and modify the data.The write only properties can only modify the data.So to only view the data the data should have read only properties.

4 0
4 years ago
Other questions:
  • One disadvantage of using the styles feature of a word processor is that you cannot modify existing styles. true or false
    14·1 answer
  • Given that a method receives three parameters a, b, c, of type double, write some code, to be included as part of the method, th
    8·1 answer
  • Which skill refers to the ability to visualize and implement possible business solutions to problems?
    6·1 answer
  • To apply a style to one or more elements on a web page, configure a css ________.
    5·1 answer
  • Tsunami warning systems that utilize satellite technology to send an alarm have recently been developed and installed. these sys
    14·1 answer
  • En que parte del mall del rio venden tarjetas de google play en cuenca​
    7·1 answer
  • The OSI is a reference system that is used by most types of technicians EXCEPT _____.
    11·2 answers
  • A lack of financial literacy can cause you to lose your
    10·1 answer
  • When was the federal commission act put into effect?????
    13·1 answer
  • A computer cannot boot if it doesn't have ?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!