1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
14

HELPPP ME PLEASEEE!!

Computers and Technology
1 answer:
natita [175]3 years ago
4 0
It’s the last one! The key to an effective persuasion is to know what you want and be clear about your response.
You might be interested in
With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
Wewaii [24]

Answer:

The correct answer is C) With respect to PERT and​ CPM, slack is the amount of time a task may be delayed without changing the overall project completion time.

Explanation:

The CPM (Critical Path Method) method is frequently used in the development and control of projects whose tasks have a fixed duration while the PERT (Program Evaluation and Review Techniques) method is a set of techniques with the same purpose but that allows to work with tasks with estimated probability duration but not deterministic.

Both methods are based on developing a complete scheme that includes all the tasks of a project linked to each other according to their sequence, determining the duration and analyzing different ways of reconfiguring the task planning to optimize the use of the resources of according to the general objectives of the project.

There are tasks that to start performing them must have been completed one or more previous tasks. The overall duration of the project is determined by the Critical Path, which is the sequence of tasks of greater duration. The tasks belonging to the critical path have to be carried out with special care because delays in them would cause delays in the total achievement of the project. That is why these tasks have no slack.

The rest of the tasks have some slack, which is determined by the time that a previous task can be delayed without delaying the total time of completion of the project, that is, not exceeding the duration determined by the critical path.

That is that why we say that the <em>slack</em><em> is the amount of time a task may be delayed without changing the overall project completion time</em>.

8 0
3 years ago
What is the difference, if any, between secure HTTP and firewalls?
Jobisdone [24]

Answer:

SSL would simply encrypt whatever request is sent to the server. In order to prevent the execution of such malicious scripts/payloads at the Web application (in other words the Web server), a Web Application Firewall is implemented in place. ... Whereas, HTTPS where SSL comes into picture would have methods such as POST.

in other words its A

5 0
3 years ago
A technically qualified individual who may configure firewalls and IDPSs, implement security software, diagnose and troubleshoot
sineoko [7]

Answer:

Security technician

Explanation:

Security technicians are responsible for fixing, planning, and implementing the IT and computer security system of organisations by making sure the safety and security of the data and information of the clients as well as the employees that make daily use of the systems

Security technicians administer security access to the clients and employees of the organization and are responsible for being up to date with the latest IT security technology developments.

7 0
3 years ago
What is the most complex part of a PC?
rjkz [21]

Answer:

From a hardware standpoint, the CPU is most likely the main component. From a software standpoint, macOS and Windows are complex software systems.

Explanation:

6 0
2 years ago
Everybody at a company is assigned a unique 9 digit ID. How many unique IDs exist?
timama [110]

Answer:

3,265,920 unique ID exist.

Explanation:

The nine digits are from 0 to 9, there are ten bits from 0 -9,

0, 1, 2, 3, 4, 5, 6, 7, 8, 9

The first is select from the highest bit (9), and the second is selected at random from 0 - 9, the third bit to the last must be unique and different from each other;

number of unique IDs = 9 × 9 × 8 × 7 × 6 × 5 × 4 × 3 × 2

Multiplying the nine bits of unique IDs = 3,265,920.

3 0
3 years ago
Other questions:
  • What would I need to make the perfect music video
    10·1 answer
  • _____ rows indicate that there is different formatting for odd and even rows.
    14·1 answer
  • What is the name used for the integrated program development environment that comes with a Python installation?
    5·1 answer
  • HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical control
    12·1 answer
  • Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journal
    8·1 answer
  • Help fast plzzzzzzzzzzzz ​
    10·2 answers
  • Brendan needs to edit all the slides in a presentation by adding a company logo and a header and footer. Which is
    13·2 answers
  • It's a holiday poop in my bitt
    10·2 answers
  • Can you help me with this question please ​
    13·1 answer
  • Which of the following statements about interpreting colors are true? Select 3 options.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!