1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
10

A large computer software firm promised a client that it could deliver a new operating system on a tight deadline and put Keith

in charge of the project. Which best explains why Keith qualifies for such amposition
Computers and Technology
2 answers:
daser333 [38]3 years ago
5 0

Answer:

The correct option is b. He is a good communicator , he is a motivator, he can keep a secret and lastly he can quickly learn about operating systems.

Explanation:

Based on the information given what best explains why Keith was in charge of the project and was qualified for such a position was that he has a great Communication skills because he communicate and relate with customers in a great ways and he is a good listener.

Secondly he posses confidentiality skills which is a very important skills for a business or an organization.

Lastly he his a fast learner who has the ability to quickly learn and know about everything that has to do with an operating system which is the reason why he was qualified to be in such position and was put in charge of the project based on all the important skills mentioned above that he possess.

Ber [7]3 years ago
5 0

Answer:

He has a deep understanding of operating systems, is creative, works well with others, and can break down large projects into small pieces.

Explanation:

correct me if im wrong, but this makes the most sense.

You might be interested in
How do assignment article computer security, ethics and privacy?
Softa [21]
Explain those things:
Security-What is used to protect.
Ethic-The will to.
Privacy-Is secrecy.
5 0
3 years ago
Why did artists use pinhole cameras during the renaissance?
murzikaleks [220]
<span>Pinhole cameras were one of the most sophisticated devices of the period, it made tasks much easier it basically worked exactly like the human eye and is something just like tracing.

Hope it helps! :)</span>
3 0
3 years ago
1. provide at least 3 properties and 3 methods of the object computer.
ValentinkaMS [17]

Answer:

The answers to these questions are given below in the explanation section.

Explanation:

The following are 3 properties and 3 methods of the object computer.

Solution

Properties:

  1. computer name;
  2. computer model;
  3. computer color;
  4. computer manufacturer

Methods:

  1. Turn on/off
  2. Do Wordprocessing
  3. Connect Keyboard/Mouse
  4. Charging
  5. Play sound

The following are 3 properties and 3 methods of the object computer.

Properties:

  1. Car Model;
  2. Car Manufacturer;
  3. Car Color

Methods:

  1. Car Run (Speed)
  2. Change Gear
  3. Open/Close Door
  4. Turn on/off

7 0
4 years ago
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
3 years ago
What shows on the web, what is behind the web (source code) and what is placed on the server (database) , is known as web source
slega [8]

Answer:

A. True

Explanation:

Websites are created using html, css, javascript and other web based programming languages. When a website page is requested, the host server sends the copy of the source code to the web browser of the client system, the web browser is able to interpret the source code and displays the graphical representation on the web browser for the client.

3 0
4 years ago
Other questions:
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • Which registry hive is loaded first during windows startup?
    5·1 answer
  • Can someone please give me example of three types of loop in pascal (It has to has randomize in it too)
    15·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • I need help. I wanna help a friend by giving him my powerpoint but I dont want him to steal my work. Is their anyway to restrict
    8·1 answer
  • What techniques overcome resistance and improve the credibility of a product? Check all that apply.
    8·1 answer
  • My phone takes forever to load the ads, does anyone else have this problem? Is there a way to fix it? I’ve tried getting another
    12·2 answers
  • Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
    14·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
  • What is computer viras? Loist 2 preventive measures against it​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!