1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
2 years ago
13

Which tool helps a project manager identify the task that have been completed and the ones that are still outstanding

Computers and Technology
1 answer:
vodka [1.7K]2 years ago
4 0

Answer:

timeline please make me branliest

You might be interested in
Presentations must have what to be efffective
RideAnS [48]

Answer:

eye contact with the audience, thorough research, you must give your audience time to ask questions

6 0
1 year ago
You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address
ioda

Answer:

The answer is "private Ip addresses were not be accessed over the Network".

Explanation:

Private network addresses were not distributed on the web and also no data from either the network will be sent to them, it only was intended to operate inside of the home network.

  • It includes the appropriate subnet the IP addresses. This network also enables you to link to many other sites.  
  • This network will use its IP address to access the home device, but it can not interact with the network.
4 0
3 years ago
Acrynom for wys or wyg
REY [17]
What you said? And what you get?
8 0
2 years ago
Digital manufacturing has impacted our world today! List a reasons why.
Maru [420]
Because we can get manufacturing faster than usual
6 0
3 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
Other questions:
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • Which statement is true about the elements of the interface of a presentation program? The status bar appears at the top of the
    14·2 answers
  • Explique si en la pc que se usa para hacer las tareas escolares se puede ver un video juego de los llamados “pesados”
    13·1 answer
  • How to revert a dismissed javascript popup alert box in chrome?
    5·1 answer
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provi
    8·1 answer
  • How does a content management system differ from a basic wysiwyg web authoring tool??
    11·1 answer
  • To reload a picture taken with a digital camera means to copy the digital picture from the camera to your computer.
    5·2 answers
  • The options on the Ribbon will____:
    11·1 answer
  • Kyra is teaching a photography class. She would like her students to share photos. She would also like the students to be able t
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!