1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
4 years ago
8

How long does it take 2 consultants to create a slide deck of 120 slides, assuming one consultant make 2 slides per hour?

Computers and Technology
1 answer:
Andreyy894 years ago
7 0

It would take 2 consultants 30 hours to create a slide deck of 120 slides.

Explanation:

Rate of slide making by one consultant- 2 slides per hour

Target- 120 slides

2 consultants are employed in the job-  

Since 2 consultants are employed in the job, total rate of making slides per hour would be 4 slides/hour (2*2 slides/hour)

Time required to complete 120 slides= total slides/rate of doing slides per hour

Substituting the values, we get

Time required= 120/4= 30 hours

Hence, it would take 30 hours for 2 consultants to create a slide deck of 120 slides.

You might be interested in
Tell me something about "nuclear power station" (help)​
iren2701 [21]

Answer:

A nuclear power plant is actually a thermal power station in which the heat source is a nuclear reactor.

Explanation:

Ask me more if you want more.

8 0
3 years ago
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
2 years ago
Buying a new computer for which of these reasons is most likely a sound
Svetllana [295]

Answer:

b. you need it to do your homework

Explanation:

3 0
3 years ago
Define a pointer variable named daco that can be used for objects of the class Banana.
ozzi

Answer:

c)Banana * daco;

Explanation:

To declare an variable pointer we use * symbol after writing it's type.For example int *.Then we write the name of the variable since the name of the variable is daco.The class is a user defined data type so instead of writing any data type we will write class name then the * then name of the variable.

Banana * daco; which matches the option c Banana* daco;

4 0
3 years ago
Read 2 more answers
All modern cd-r drives are _______________, such that you can go back and burn additional data onto the cd-r disc until the disc
ratelena [41]
All modern cd-r drives are writable, such that you can go back and burn additional data onto the cd-r disc until the disc is full.
6 0
4 years ago
Other questions:
  • Janice, who is 15, posts a picture of herself drinking alcohol and making an obscene gesture on her social networking page. Whic
    11·2 answers
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • Write a recursive function that takes a non-negative integer as an argument and displays the same number in reverse order (i.e.
    15·1 answer
  • Csc105 final graded project
    9·1 answer
  • If a clean install is performed on a hard drive with a previous install of windows and the drive is not re-formatted during the
    9·1 answer
  • A software package developed to handle information requirements for a specific type of business is called a(n) ____. A. outsourc
    10·1 answer
  • Which of the following is a precaution that helps to protect you from electric shock when working with electric power tools?
    7·2 answers
  • Where can elicitation techniques be used?
    12·1 answer
  • Identify the following verb by number and person by checking on the appropriate boxes.
    15·2 answers
  • How to call a variable as a tag in react native.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!