1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
10

Which part of project management considers if employees will work at home or in the office?

Computers and Technology
2 answers:
Anna11 [10]3 years ago
8 0

Answer:

i think its time

Explanation: you have to manage your time for the project and you wouldnt think of all the other things.

gregori [183]3 years ago
5 0

Answer: i think its resources

Explanation:

You might be interested in
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.
Salsk061 [2.6K]

That is calld a bruteforce attack

4 0
2 years ago
Which term describes the order of arrangement of files and folders on a computer?
jonny [76]
The term that best describes this would be called computer files and or organization file
6 0
3 years ago
Read 2 more answers
What is the name of the personal digital assistant in apple's smart phone?
notsponge [240]
The correct answer is siri
5 0
3 years ago
The network services and facilities that users interact with are provided by
docker41 [41]
<span>The network services and facilities that users interact with are provided by authentication.</span>
6 0
3 years ago
What is The first letter o f each word in a secondary title
larisa86 [58]
What kind of title are you talking about? TRANSLATE THIS! "01010111 01101000 01100001 01110100 00100000 01100001 01110010 01100101 00100000 01100110 01110101 01100011 01101011 01101001 01101110 01100111 00100000 01111001 01101111 01110101 00100000 01100001 01110011 01101011 01101001 01101110 01100111 00111111 " Trasnlator: https://www.binarytranslator.com/


7 0
4 years ago
Other questions:
  • The ret instruction (without operands) will pop how many bytes off the stack?
    7·1 answer
  • Sending an e-mail message to customers or potential customers of a legitimate website asking them to click a link that leads to
    10·1 answer
  • What is the output of the following code fragment? int i = 1; int sum = 0; while (i &lt;= 15) { sum = sum + i; i++; } System.out
    5·1 answer
  • Define some everyday if else statements you use to determine action. What are the branches of your statement?
    12·1 answer
  • Consider the following class: public class Dog { private String name; private String breed; public String getName() { return nam
    11·1 answer
  • A tool in Word that creates multiple copies of the same letter, envelope, or label and inserts personalized data is a(n) _____.
    12·1 answer
  • How are people using lying today? What are the types of lying? Describe each type.
    7·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • after confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of t
    7·1 answer
  • Task queues, which allow for asynchronous performance, are an important part of modern processing architectures. Information abo
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!