1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
10

Discuss the importance of top management commitment and the development of standards for successful project management. Provide

examples to illustrate the importance of these items based on your experience on any type of project.
Computers and Technology
1 answer:
sasho [114]3 years ago
4 0

Answer:

Significance of top administration responsibility: Top administration duty assumes an indispensable job in the development of any association. The duties of top administration decied the future objective of the association. So we can say that the development of association is straightforwardly proportional to the duties set by the top administration.

The viable and effective headings and the duties bargains the association to achive the arranged objectives and the objectives.

Improvement of Standards: Development of norms are likewise significant in any association. The quality check of the association or the review is being finished dealing with the these measures. So we can say that the nature of association is estimated on the bases of norms set. That is the reason its essential to set the gauges

initially, characterize the measures and flow it inside the association. Since it by implication sway the nature of any association.

For example if we are developing any project that its important that we should be clear about the expectation and commitments set by the top management regarding the

project and it should be developed on the standards set by the organization. Because without these two fators it may happen that our project fails in real

scenario

1. Difficulties in regards to asset the board.

2. Difficulties with respect to cost and budgetary needs

3. Difficulties in regards to innovations and skiils

4. Difficulties in regards to convenient conveyance of the task

Explanation:

You might be interested in
Owning provides _________ flexibility but can lead to _________ costs in the long-term.
4vir4ik [10]

Owning provides less flexibility but can lead to lower costs in the long-term.  Correct answer:D

Less flexibility because you can change it or modificate it not so easy.

But owning also means that you don't have to pay rent or pay for it monthly, and that way you will save money in long term.

8 0
3 years ago
Read 2 more answers
Given the char variable c, write an expression that is true if and only if the value of c is not the space character .
saw5 [17]
If( c != ' ' )
  /*Do something*/
6 0
3 years ago
Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,050,
cluponka [151]

Answer:

a. 18102

b. 5656

c. 6090

Explanation:

Pleaae kindly check attachment for the detailed and step by step solution of the given problem.

7 0
2 years ago
Jody should select the
Alex Ar [27]

Answer:

In the View tab, you will find Zoom Option. Set the Zoom level to 100%.

Explanation:

You need to set the Zoom level to 100%, And you can do this, by setting the zoom level to 100%, from the scroll bar. Or you can move to view tab in the main menu, and then in the Ribbon, you need to select the zoom % and set it to 100 percent. You will then be able to see the entire page. And if you want, you can increase the Zoom level to even further, for getting an even more clearer picture.

3 0
3 years ago
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Other questions:
  • What is called photo and video edition?
    8·1 answer
  • Select the correct answer.
    13·1 answer
  • Im being timed please help!!
    7·2 answers
  • Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
    6·1 answer
  • An online journal or diary you create to share your thoughts, opinions and personal news is referred to
    13·1 answer
  • Which shape is used for input or output?
    15·1 answer
  • Adam's interview with the hiring manager is going well. However, he wants to ensure that his skills and work history are memorab
    6·1 answer
  • The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
    5·1 answer
  • Which of the following statements describe the benefits of a career in transportation, distribution, and logistics (TDL)?
    5·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!