1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
3 years ago
15

Which three pieces of information must you include in a project goals document? (Choose 3)

Computers and Technology
1 answer:
Kitty [74]3 years ago
5 0

Answer:

A) Target audience

B) Project deadline

C) Project purpose

Explanation:

The project goals document outlines the scope of the project, detailing what the project entails to everyone that is to work on the project such that the objectives to focused on, the tasks to be completed, the timeline and deadline of the project, the project participants, and audiences are known or understood, thereby placing everyone in the project team on track

The three pieces of information that must be included in a project are therefore; the target audience of the document, the deadline of the project, clearly stated, and the purpose of the project; what the project is going to accomplish

You might be interested in
Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victor
tangare [24]

Answer:

The question is incomplete and should read as follows:

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore?

This issue can be fixed by taking the following steps:

A. Disable System Protection.

B. Back up the restore point.

C. Enable System Protection.

D. Run the antivirus software on a restore point.

The system is then restored to the now clean restore point to rid the computer completely of the virus.

Explanation:

3 0
3 years ago
Read 2 more answers
Write a program in main.c that reads the file lorum.txt and counts the number of characters on each line. Your program should cr
Aneli [31]

Answer:

A C programming language was used to write a file lorum.txt and counts the number of characters on each line.

Explanation:

Raw_Code :

#include<stdio.h>

int main(){

  FILE *read,*write;       //creating file pointers

  int line=1,count=0;

  char ch;

  read = fopen("lorum.txt","r");   //opening files to read and write

  write = fopen("count.txt","w");

  while((ch = getc(read))!=EOF){       //reading lines until end of the file

      if(ch == '\n'){                   //if new line character encountred

          fprintf(write,"%d: %d\n",line,count);       //Then printing count of that line to file  

          line++;                       //incrementing the count of lines

          count = 0;                   //making characters count to 0

      }

      else{

          count++;           //if it is not new line character then increasing character count

      }

  }

  fprintf(write,"%d: %d",line,count);   //writing last lines count to count.txt

  fclose(read);

  fclose(write);

  return 0;

}

4 0
3 years ago
What is the main purpose of a DNS server?
Daniel [21]

Answer:

C

Explanation:

Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

3 0
3 years ago
Send a newsletter when you want to communicate directions, advice, or information.
lilavasa [31]
True, since you do want to give out information
4 0
3 years ago
Read 2 more answers
In a language JUNGLE is codded as UJNGEL then how will BANDID is codded?​
Misha Larkins [42]

\huge\tt\underline\pink{BANDID\:✒\:ABNDDI\:✅}

<h2><u>Step</u>-<u>by</u>-<u>step</u> <u>explanation</u>:-</h2>

J ⇢ \sf\purple{U}

U ⇢ \sf\purple{J}

N ⇢ \sf\red{N}

G ⇢ \sf\red{G}

L ⇢ \sf\blue{E}

E ⇢ \sf\blue{L}

  • The first two letters \sf\purple{"J"} and \sf\purple{"U"} are interchanged and they take each other's place respectively.
  • The third and fourth letters \sf\red{"N"} and \sf\red{"G"} maintain their position.
  • The fifth and sixth letters \sf\blue{"L"} and \sf\blue{"E"} also take each other's place respectively.

Following the above sequence, we have

B ➵ \sf\purple{A}

A ➵ \sf\purple{B}

N ➵ \sf\red{N}

D ➵ \sf\red{D}

I ➵ \sf\blue{D}

D ➵ \sf\blue{I}

\circ \: \: { \underline{ \boxed{ \sf{ \color{green}{Happy\:learning.}}}}}∘

4 0
3 years ago
Other questions:
  • The actual database of Active Directory shared resources is stored on one or more computers designated as:
    6·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!!
    9·1 answer
  • ENG103 DISCUSSION BOARD 5
    12·1 answer
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • What does this mean in python?
    5·1 answer
  • What is the advantage of postfix notation?
    6·1 answer
  • What is a new technology in computer science that is emerging to solve a social, economic, or technological problem.
    9·1 answer
  • Using this feature keeps the message thread intact.
    14·2 answers
  • Smart art is considered a​
    14·1 answer
  • What open source format has multiple versions for storing audio and video content?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!