1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
10

Which part of project management considers if employees will work at home or in the office?

Computers and Technology
2 answers:
Anna11 [10]3 years ago
8 0

Answer:

i think its time

Explanation: you have to manage your time for the project and you wouldnt think of all the other things.

gregori [183]3 years ago
5 0

Answer: i think its resources

Explanation:

You might be interested in
Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.
Lyrx [107]

Answer:

=IF(D3>50; E3; F3) AND =IF(A1>60;"Pass";"Fail")

Explanation:

An IF structure is built following this pattern:

IF(TEST;IFTRUE;IFFALSE)

These are the only options in the given drop-down menus what comply with this pattern.  All others are not following this pattern.

The computer will do the test and if the result is true will apply the IFTRUE value, otherwise will apply the IFFALSE value.

4 0
3 years ago
What is activated as necessary to support local eocs and to ensure that responders have the resources they need to conduct respo
gizmo_the_mogwai [7]

Answer: Emergency Operation Center (EOC)

Explanation:

An Emergency Operation Center is the coordination base for emergency service in case there is any within a state or a state Connecticut. The major purpose of the emergency center is to be in charge of controlling deploying and utilizing facilities needed to prepare for any form of emergency, disaster management, etc.

To run an effective Emergency Operation Center, focus must be on the facilities, equipments and personnel involved.

3 0
3 years ago
What is another word for microchips operating systems input methods and everything in between?
lord [1]
The answer is computer. A computer is made up of microchips (CPU and GPU), an operation system (macOS or Windows), input methods (keyboard and mouse), and other parts.
7 0
3 years ago
Victoria turned in a rough draft of a research paper. Her teacher commented that the organization of the paper needs work.
Katarina [22]

Answer:

D

Explanation:

4 0
3 years ago
Read 2 more answers
How are phishing, ransomware and distributed- denial of service attack alike and different?
Aleks04 [339]

Answer:

Phishing means cyber theft in which the cyber thief sends the target PC a malicious email, which looks like coming from some known source, and they ask for certain critical information, which must not be leaked. Similarly, In ransomware, they send the phishing email with malicious code, and they hack the computer system. They then ask for a ransom as a return for reactivating your PC. Distributed Denial of service attack happens when the traffic flood the bandwidth and the resources of a PC, and finally a lot of are denied of access to them. Ransomware, when it attacks a bank account, becomes a Denial of service attack, as multiple users are stopped from accessing their account. All of these are hence, almost the same and revolves around the phishing email.

Explanation:

Please check the answer.

8 0
3 years ago
Other questions:
  • Write a program that lets a maker of chips and salsa keep track of their sales for five different types of salsa they produce: mi
    8·1 answer
  • If you're using the paintbrush tool and want to change the color of the paint being used what should you change
    6·1 answer
  • Which one of the following is not possible to view in the debug logs?
    8·1 answer
  • Which of the following is considered part of the process in the systems thinking example of a TPS?
    6·1 answer
  • Join my discord server! CODE IS (CebjBXN)​
    12·2 answers
  • Brian has been working for a few years now and has saved a substantial amount of money. He now wants to invest 50 percent of his
    12·2 answers
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    8·1 answer
  • A folder has been shared with other users and set to read-only. What does this mean for users?
    12·2 answers
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!