1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
8

The critical path of a network is the A. shortest time path through the network. B. path with the most activities. C. longest ti

me path through the network. D. path with the fewest activities.
Computers and Technology
1 answer:
S_A_V [24]3 years ago
8 0

Answer: Option [C] : The longest time path through the network.

Explanation:

The critical path of a network is the longest time path through the network.

You might be interested in
What are the advantage of an e-library​
Semmy [17]

Answer:

Makes it easier to read... summarize cite electronic versions of editions

3 0
1 year ago
Ark titanoboa taming
ivann1987 [24]
Huh???????................
3 0
3 years ago
Why would a virtual machine be useful in a school? It provides a completely secure connection to the internet. Students can coll
Stels [109]
They can learn more and also it’s faster
5 0
3 years ago
FREE POINTS AND BRAINLIEST!!!<br><br> You guys are welcome. :)
Viefleur [7K]
Heheheheheheheheh perfect b
3 0
3 years ago
Read 2 more answers
With the cold winter months fast approaching, Lungi wants to improve the overall effectiveness of
oksano4ka [1.4K]

Answer:

please can you make this question make sence so i can at least try to help by answering this question for you

5 0
2 years ago
Other questions:
  • What might be one reason why a stock becomes more valuable over time
    5·1 answer
  • What is the difference between deta security and privecy ?
    12·2 answers
  • Consider the concept of cultural lag. Identify two American values that are “lagging.” What are three norms that are lagging? Ho
    11·1 answer
  • An array name and index are separated using ____.
    13·1 answer
  • 4. How can you select non-adjacent cells (i.e. cells that are not all together in one block)?
    5·2 answers
  • Which option is the strongest password?
    7·2 answers
  • A ___________ is similar to Computer Integrated Manufacturing, but is based much more on standard reusable application software
    5·1 answer
  • What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to acc
    7·1 answer
  • How to design remote access policy using the appropriate access controls for systems,applications, and data access
    6·1 answer
  • which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!