1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
14

In a PERT network, non-critical activities that have little slack need to be monitored closely

Computers and Technology
1 answer:
kozerog [31]3 years ago
6 0

Answer: b)because near-critical paths could become critical paths with small delays in these activities

Explanation: Program evaluation and review technique(PERT) technique is used for management of the project .The organizing, maintenance,coordination of any task is done by this chart. The non-critical activities need to be observed carefully because they may create near-critical methods which can lead to complexity.

Other options are incorrect because not all activities are equally rather monitoring is done to avoid errors and slack can occur at any path . Small delays can be caused but not complete project can get delayed and there can be risk of complexity rather than being uncompleted.Thus, the correct option is option(b).

You might be interested in
What happens when you double-click one of the graphic options in the middle panel of the choose a smartart graphic dialog box?
pickupchik [31]
When you open MS Word, selecting the insert option and clicking SmartArt, will pop up SmartArt dialog box. Double-clicking on one of the graphic options in the middle panel will automatically select and place the graphic art you want. It is an easy way of inserting a SmartArt of your choice without selecting the art itself and clicking OK.





3 0
2 years ago
Read 2 more answers
What changes should be made in OSI model(Open System Interconnection).
saveliy_v [14]

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

4 0
2 years ago
Read 2 more answers
Diseñe un algoritmo que le permita montar bicicleta y llevar en ella una carga desde la tienda hasta su casa.
Stella [2.4K]

Answer:

La fuerza se aplica en el lado opuesto de la carga.

Explicación:

Para andar en bicicleta y llevar una carga de la tienda a su casa, usamos tales reglas para llevar la carga de manera más fácil y segura. Si la carga es grande y está colgada en el mango derecho de la bicicleta, entonces la fuerza se aplica en el lado izquierdo de la bicicleta para mantener el equilibrio. Si no hicimos esto, la moto se irá hacia el lado derecho y el piloto sufrió el accidente.

6 0
2 years ago
Practice using word processing software, including creating, formatting, and saving a document.
irakobra [83]

When writing the cover letter, the following points are important:

  • Keep it short.
  • Proofread.
  • Avoid cliches.
  • Be creative.

<h3>What is a cover letter?</h3>

A cover letter simply means a document that's written alongside a CV when an individual applies for jobs.

The cover letter should be addressed to a specific person and should describe one's accomplishments and achievements.

Learn more about cover letters on:

brainly.com/question/3602860

6 0
2 years ago
A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
defon

By Tx/Rx reverse the technician can address this issue.

C. Tx/Rx reverse

<u>Explanation:</u>

Technician has to trouble the laptop, since the laptop is connected and got internet while is the network resources inside the office. But if he connects the same laptop in research lab end user is not connected

Following troubleshooting to made

1. Routing is done properly

2. Any packet dropping by using TRACE command in windows operating system.

Since DHCP is used in office, whereas same type is not used in research lab. End user can try TX/RX reverse cable to connect in the research laptop.

5 0
3 years ago
Other questions:
  • You have deployed your Ethernet cable near a generator, whose heat is effecting the cable in a way that its energy is lost. If s
    11·1 answer
  • Given an integer variable count, write a statement that displays the value of count on the screen. Do not display anything else
    11·1 answer
  • darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. which of these options sho
    9·2 answers
  • Suppose x and y are int variables and ch is a char variable. Consider the following input: 5 28 36 What value (if any) is assign
    11·1 answer
  • The _____ feature automatically corrects typing, spelling, capitalization, or grammar errors as you type them.
    13·1 answer
  • What is HTML? (list down any 5 points)
    12·1 answer
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • Explain the main components of a computer system​
    12·1 answer
  • If you play gta and don't know the song ''Glamorous'' Then what do you even do when you play?
    6·2 answers
  • Match each method of communication with its intended purpose.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!