1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
3 years ago
9

PLEASE HELP ME!!!!!! ITS FOR 100 POINTS AND BRAINLIEST!!!!!!!! NO ONE EVER WANTS TO ANSWER MY QUESTION!!! I JUST NEED SOMEONE TO

EXPLAIN WHAT THEY'RE ASKING ME TO DO!!!!!!!!
Step 1: Read the Scenario
Because of the great work you’ve been doing for your department at running shoe company Runner Rush, your vice president has elected you to join an innovative cross-departmental team in your organization. The company is looking to launch a new shoe that enhances any runner’s speed. Management wants this new team to create an idea within a month. All the members of the team are alleviated of some of their regular job duties in order to join several meetings a week to brainstorm and design the new product.

Step 2: Develop a Month Plan
You have been appointed as the team leader. Develop a month plan that you will present to your teammates at the initial meeting. Focus on developing a strong team dynamic, setting goals, expectations, deadlines, and other elements that will lead the team to success. Make sure that your plan is easy to follow and clearly outlines all the required information.
Computers and Technology
1 answer:
Veronika [31]3 years ago
6 0

Answer: my suggestion is to ask a teacher and do research like look up the best shoe companies and things like that

Explanation:

You might be interested in
A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable
drek231 [11]

Answer:

The answer is "SPAN"

Explanation:

The full form of SPAN port is  "Switch Port Analyzer", which is used to designed specifically for the interface on a network device, that would be able to monitor all traffic passing across the entire device.

  • The use of this port will also call the mirror ports, that is a popular way of gathering data traffic for tracking purposes.
  • It is primarily used to access the bus switch and all interfaces, which is usually accessible from data transmission.
7 0
4 years ago
Which solution eliminates the need for dedicated high-speed WAN connections between sites
s344n2d4d5 [400]

Answer:

running in the 90 s intensifies

Explanation:

4 0
3 years ago
What is an easy and accurate way that a graphic designer can increase the size of a digital shape while keeping the ratio of hei
VikaD [51]

Answer:

Open the shape’s properties window, and type the height value multiplied by 2 and the width value multiplied by 3.

Explanation:

7 0
3 years ago
Read 2 more answers
Anyone got E-aqa login?​
pashok25 [27]

Answer:no

Explanation:

3 0
3 years ago
Contrast the following terms (provide examples): Partial dependency; transitive dependency
kiruha [24]

Answer:

Explanation:

Transitive dependency

In this case, we have three fields, where field 2 depends on field 1, and field three depends on field 2.

For example:

Date of birth --> age --> vote

Partial dependency

It is a partial functional dependency if the removal of any attribute Y from X, and the dependency always is valid

For example:

Course and student these tables have a partial dependency, but if we have the field registration date, this date will depend on the course and student completely, we must create another table with the field registration date to remove this complete dependency.

If we remove or update the table registration date, neither course nor student must not change.

5 0
3 years ago
Other questions:
  • Can you help me correct a sentence?
    13·1 answer
  • When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihoo
    5·1 answer
  • I would A lot of knowledge and education for computers and <br> Technology
    10·2 answers
  • A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
    8·1 answer
  • Write a method for the Customer class that that will return a string representing a bill notice when passed a double value repre
    14·1 answer
  • Drag the correct type of update to its definition.
    14·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • Explain how you think robotics plays a part in the subway driver's job.
    13·2 answers
  • Which digital cellular standard is used widely throughout the world except the united states?
    6·1 answer
  • write a program that prompts the user to input the length of a string as an integer, followed by the string and outputs the stri
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!