1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
14

_____ should be used to create a project schedule.

Computers and Technology
1 answer:
dem82 [27]3 years ago
3 0

Answer:

meeting is the correct answer

You might be interested in
In VBA, write a code that does as follows: The first worksheet ("Ex. 1") has a list of 50 numbers. Write a program that will rea
leva [86]

The answer & explanation for this question is given in the attachment below.

8 0
3 years ago
PLEASE HELP ON TECHNOLOGY
Lilit [14]

Answer:

1,D. identify target employers, select an open position, prepare and submit

application materials

2,B. A person may have traits similar to other successful employees.

Explanation:

Hope It Helps :3

6 0
3 years ago
Which of the following are ways a vote thief could cast multiple votes in an online election? (check all that apply)
saveliy_v [14]

Answer:

All of the given options apply and are correct.          

Explanation:

a) The first option is correct because the intruder can use denial-of-service attack and by flooding the site with traffic to get the voter server unavailable. Then he can direct the voters to a fraud vote server.

b) The second options correctly applies too because the thief also buys the pass codes from the people who want to sell their right to vote and this way the thief can purchase multiple pass code and cast multiple votes.

c) The hackers can set up fake vote servers and then direct the voters to these servers or websites in order to collect pass codes of voters. These pass codes can then be misused by the thief to cast multiple votes in an online election.

d) Social engineering techniques can also be used to get pass codes from certain voters. By manipulating the targeted voters psychologically they can get their pass codes to cast multiple votes illegally.

3 0
3 years ago
Write a program that computes the minimum, maximum, average, median and standard deviation of the population over time for a bor
rodikova [14]

Answer:

import pandas as pd

df = pd.read_csv('nycHistPop_csv', skiprows=5)

NY_region = list(df.columns[1: -1])

select_region = input("Enter region: ")_capitalize()

if select_region in NY_region:

   pass

else:

   raise("Region must be in New york")

def pop(location):

   # or used describe() to replace all like: print(df[location]_describe())

   print(df[location]_min())

   print(df[location]_max())

   print(df[location]_mean())

   print(df[location]_median())

   print(df[location]_td())

pop(select_region)

Explanation:

Pandas is a python packet that combines the power of numpy and matplotlib used for data manipulation. It is good for working with tables that are converted to dataframes.

The nycHistPop_csv file is read to the code to a dataframe called "df", then the user input and the function "pop" is used to automatically generate the statistics of a given region.

4 0
3 years ago
The quality of lacking a pattern or organization so that result are unpredictable is also known as?
Aloiza [94]
<h2>Answer:</h2>

The quality of lacking a pattern or organization so that result are unpredictable is also known as<u> Randomness.</u>

<h2>Explanation:</h2>

In the daily routine work, randomness can be defined as the apparent lack of pattern. Randomness occurs when there is no predictability in events. Thus a random pattern of events, steps or symbols often has no sequence and order so they lead eventually towards Randomness. Similarly when elements will not follow an intelligible pattern or a proper combination they will result in Randomness.

<h3>I hope it will help you!</h3>
3 0
3 years ago
Other questions:
  • Which keyboard feature is a form feed character?
    14·1 answer
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • Which of the following is not a typical step in the ethical hacking process? A. Planning B. Discovery C. Attack D. Recovery
    5·1 answer
  • What tool listed below will be the most useful for developing presentation content?
    10·2 answers
  • What is encyclopedia. Com considered to be?
    14·1 answer
  • The second step when using the problem-solving process is to
    7·1 answer
  • Add me on xbox ahaha craig#6822 this is also just for points
    8·2 answers
  • What is x squared times b squared
    8·1 answer
  • Explain input device​
    9·2 answers
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!