1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
4 years ago
14

In a PERT network, non-critical activities that have little slack need to be monitored closely

Computers and Technology
1 answer:
kozerog [31]4 years ago
6 0

Answer: b)because near-critical paths could become critical paths with small delays in these activities

Explanation: Program evaluation and review technique(PERT) technique is used for management of the project .The organizing, maintenance,coordination of any task is done by this chart. The non-critical activities need to be observed carefully because they may create near-critical methods which can lead to complexity.

Other options are incorrect because not all activities are equally rather monitoring is done to avoid errors and slack can occur at any path . Small delays can be caused but not complete project can get delayed and there can be risk of complexity rather than being uncompleted.Thus, the correct option is option(b).

You might be interested in
Information technology has powerful effects on social behavior. Which of the following issues should NOT be expected when intera
AfilCa [17]

Increased inhibitions and a decreased likelihood that all members will contribute to the discussion is the following issues should NOT be expected when interacting with teammates via information technology

b. Increased inhibitions and a decreased likelihood that all members will contribute to the discussion.

<u>Explanation:</u>

In information technology, social behaviour will effect more powerful in industries. In digital medial those use mobile everybody is a media person, easily share the important to social media and sharing person doesn’t aware of the effect of sharing the information.

If a piece of information is received or send both the sender and receiver should be aware of the importance of information make sure it should not be shared outside the group members or the world.

Once import information shared outside the world it can stop any given point time.

6 0
3 years ago
FIND THE 6 ERRORS IN THIS RESUME 30 POINTS!!!!
babymother [125]
Answer:
________________________
The following is a list of "6 (six) errors" :
__________________________________
1)  The "city, state, and zip code" should be listed on a separate line, directly following the street address:
_______________________________________________________
   → Hartford, CT 06114
_______________________________________________________
2)  In "Objective" section:  The misspelled:  "challenging" should be changed to "challenging".
_______________________________________________________
3) In the "Objective" section:  The word:  "righting" should be changed to:
      "writing".
_______________________________________________________
4)  In the "Summary" section:  The misspelled: "addjust" should be changed to:   "adjust" .
________________________________________________________
5)  The misspelled "impppeccable" should be changed to "impeccable".
________________________________________________________
6)  Perhaps, "drive-thru" should be changed to: "drive-through" ;  but even more importantly— refer to:
________________________________________________________
"Managed all staff and ensured hi performance and efficiency" ;
          → The "hi" should be changed to "high".
___________________________________________________
These are some errors.  Glad to be of help!
___________________________________________________
6 0
4 years ago
Works in the public domain have copyright that are expired or abandoned true or false
amid [387]

Answer:

False

Explanation:

Only one of the two are true. Works in the public domain have a copyright that has expired only. E.g. Works of classical music artist, are almost always expired, in accorance with American Copyright law. Abandoning a copyright doesn't do anything because so long the copyright has remained unexpired, the copyright remains. Thats why it can take decades for a new movie in a series to release, like "IT" by Stephen King. The copyright hasn't expired but rather was 'abandoned'. Before "IT" 2017 was relasesed, the copyright was abandoned.

4 0
3 years ago
You’ve been stuck in bumper-to-bumper traffic for nearly an hour on a hot summer day. The temperature warning light has just com
nekit [7.7K]

Answer:

In a bumper-to-bumper traffic, when the engine starts overheating the situation can be handled by tapping the accelator which will revive the engine.

Explanation:

Overheating of engine can be due to many reasons. But one should know what to do when an engine overheats in a traffic. Bumper-to-bumper traffic is when the cars are so close in traffic that they touch each other. This usually happens when there's a traffic for a long time or on very busy lane. During summer times, it is important to keep checking the engine temperature to avoid any problem.

When one is stuck in bumper-to-bumper traffic with overheating engine, then there are some meausres that one can take. They are:

  • To put the car on park or neutral mode of driving and tap the accelator which will revive the engine.
  • The heat can be disperse by rolling down the window and turn the heater up. It will disperse the heat.

6 0
3 years ago
Which term describes the process of training a machine to do simple, repetitive tasks, and adapt or correct its performance base
yKpoI14uk [10]
Automation. ... It involves taking a machine or software that was taught to do simple repetitive tasks (traditional automation) and teaching it to intuitively adapt or correct its performance based on changing conditions, at speed and scale.
8 0
3 years ago
Other questions:
  • Perhaps programs used for business purposes ought to conform to higher standards of quality than games. With respect to software
    7·1 answer
  • Pretrial services programs are also known as early intervention programs. <br> a. True <br> b. False
    15·1 answer
  • What does "Forward" in emails do?​
    7·1 answer
  • Which of the following goals is likely to require funding? Check all that apply.
    6·2 answers
  • The convergence of information technology and operations technology, offering the potential for tremendous improvements in effic
    14·1 answer
  • 802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size bonded channels d
    10·1 answer
  • When microsoft introduced its zune mp3 player, many people thought it would capture the mp3 player market by pricing its product
    8·1 answer
  • Which is a basic job requirement for a career in corrections services?
    13·1 answer
  • The profile picture that you plan to use to market your professional brand on social media networks should feature you only.
    12·1 answer
  • Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!