1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
3 years ago
15

Your project will require a 7-day work week rather than the traditional 5-day. How can you adapt the software to this new schedu

le
Computers and Technology
1 answer:
slamgirl [31]3 years ago
6 0

Answer:

Click on the Project Tab then the Change Working Time Tab

Explanation:

The software here is believed to a MICROSOFT PROJECT. This is used often by project managers to manage projects particularly in terms of project duration, methods of the undertaking, resource management, reports, etc.

Hence, to adapt the software to this new schedule to a 7-day work week from the traditional 5-day, one should "Click on the Project Tab then the Change Working Time Tab."

This can be done by

1. Click on the Project tab, then click on Properties group

2. Click on Change working time

2. From the Change Working Time window click on "Create new calendar"

3. Name your calendar a name, in this case, "7 day week, " from there on keep following the prompt questions to finish the settings.

4. After the working times are set, click Ok.

You might be interested in
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data i
erastovalidia [21]

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

6 0
3 years ago
1 _ A Unit of information containing the object's position: rotation, and scale values is called:
Damm [24]

Answer:

an inform

Explanation:

A information is an inform

4 0
3 years ago
Define reading and writing that regards storage​
Naily [24]

Answer:

Reading and writing on computers and other gadgets require storage.

HOPE THIS HELPS

HAPPY THANKSGIVING

4 0
3 years ago
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
stepladder [879]

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.

5 0
2 years ago
In the bee movie whom did barry disappoint by not immediately taking a job in "honey"?
jeka94

In the bee movie, all bees were expected to quickly make a decision on what their career would be and then stay with that career for the rest of their lives. Barry was expected by his parents to be a stirrer, like his father was. Barry felt that he needed more time to decide what he would like to do if he were to be stuck with that career for the rest of his life. By not immediately choosing a job in honey, Barry disappointed his parents.

3 0
4 years ago
Read 2 more answers
Other questions:
  • What did the use of steam engines in printing presses lead to the development of?
    14·1 answer
  • What does this say:<br> √ans
    6·2 answers
  • Which of the following is the best reason for including a photograph in a formal business document
    12·1 answer
  • True or False. Over the past few years, the hacking community has engaged in more "lone wolf" types of hacking activities as opp
    7·1 answer
  • Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
    8·1 answer
  • Although implementations vary, reader–writer locks usually block additional readers if a lock is already held in read mode and a
    13·1 answer
  • What is software? what are two types of software?​
    6·1 answer
  • What is the most popular monitor​
    11·1 answer
  • When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.
    5·1 answer
  • The entities on which data are collected are _____.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!