1) The critical path of a network is the A) shortest time path through the network. B) path with the fewest activities. C) path with the most activities. D) longest time path through the network. E) None of the above

Answers

Answer 1

Answer:

D

Explanation:

source

https://hbr.org/1963/09/the-abcs-of-the-critical-path-method


Related Questions

Difference between web browser and search engine.​

Answers

Answer:

A search engine is like Bing, but a web browser is a browser you can search from anywhere in the world and end up with the same search results.

Explanation:

Q10: ____ server maintains a database of hostnames and their corresponding IP addresses and performs the translations automatically.

Answers

A web server is designed to maintain a database of hostnames and their corresponding IP addresses while also performing the translations of hostnames to an IP address automatically.

A server can be defined as a specialized computer system that is designed and configured to store, maintain, and provide specific remote services for its end users (clients), especially on a request basis.

In Computer and Technology, the different types of server include:

Virtual serverProxy serverApplication serverPrint serverDatabase serverFile serverWeb server

A typical function of a web server is the maintenance of a database comprising hostnames and internet protocol (IP) addresses, as well as performing the translations of hostnames to an IP address automatically.

Read more: https://brainly.com/question/21078428

Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands

Answers

Answer:

Alexa device

Explanation:

You can build smart home and other products that customers from millions of Alexa devices with just their voice .

what is cyber crime? is hacking is cyber crime ​

Answers

Answer:

Crime committed using computer networks.

Explanation:

well I don't think sooo..........

HOPE IT HELPS.......

Answer:

Cyber crime means the crime done through the means of internet.Using others account without permission,Leaking others personal information,etc.are example of it.

Yes,hacking is a cyber crime.

To use the Expression Builder to create a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.

Answers

Answer:

square brackets [ ]

Explanation:

Hope I could help. Good luck with your studies .

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

What is Acronyms in Design and Technology?

Answers

Answer:

In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.Students also take into account the ethical, legal, aesthetic and functional factors that inform the design processes.

Explanation:

Hope its help

On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program

Answers

Change priority from the Details tab. Press Ctrl + Shift + Esc to start Task Manager. Go to the Details tab, right-click the desired process, and choose Set priority and select any value that you want.

In what way can the data be visualized to get the answer that is required?

Answers

Answer:

Data visualization is the graphical representation of information and data. By using visual elements like charts, graphs, and maps, data visualization tools provide an accessible way to see and understand trends, outliers, and patterns in data.

In the world of Big Data, data visualization tools and technologies are essential to analyze massive amounts of information and make data-driven decisions.

A company gives out bonuses based on the amount of income generated by their sales representatives per month. Once the income is greater than $5000 a bonus of 10% of the generated income is given to the employees. Read the income generated and print the bonus

Answers

The code block which calculates the bonus amount earned based on sales is written thus in python 3 ;

income = eval(input("Enter generated income : "))

#takes input for the amount of income made

bonus = 0

#initialize the bonus amount

if income > 5000 :

#if the income earned is greater than 5000

bonus = (0.1 * income)

#bonus earned is 10%

print("Your bonus is :", bonus)

#display bonus

A sample run of the program is attached.

Learn more : https://brainly.com/question/15437930

(NOT A AND B) AND (NOT A AND NOT C) OR (B AND C) logic Gates
draw the logic circuit​

Answers

answer:

((!A && B) && (!A && !C) || (B && C))

I hope the drawing is clear enough.

What is voice recognition system ?​

Answers

Answer: Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.

Explanation:

Answer:

Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. ... Voice recognition systems enable consumers to interact with technology simply by speaking to it, enabling hands-free requests, reminders and other simple tasks.

____ is Windows XP system service dispatch stubs to executables functions and internal support functions.

Answers

Answer:

Ntdll.dll is Windows XP system service dispatch stubs to executables functions and internal support functions.

Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the most information about user web activity

Answers

Answer:

port 80

Explanation:

port 80 is http. port 443 is https. so if you are trying to be a sneaky little person and eavesdrop on people, eavesdrop on port 80 not port 443 because port 80 is unsecured plaintext data transmission over websites

code hs spell it out 7.2.6

Answers

what do you mean can you say it more clear?

The programming question requires that we write a function that takes a string and returns every character in it but the first character.

The function in Python, where comments are used to explain each line is as follows:

#This defines the function

def end_of_word(myStr):

   #This returns every character in the string except the first

   return myStr[1:]

Read more about Python functions at:

https://brainly.com/question/13795586

WILL GIVE A BRAINLIEST!!! PLS HELP!!!




We're no strangers to love
You know the rules and so do I
A full commitment's what I'm thinking of
You wouldn't get this from any other guy
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

never gonna give you uppp

Explanation:

criiiiii

whats the task of one of the computers in network called?

a. hardware server
b. software server
c. Web server ​

Answers

The answer that’s gonna be followed is a:hardware server I’m sure

Answer:

C

Explanation:

I guess that's the answer

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

MyPlate was created to __________. A. To encourage Americans to eat the same quantity of food across the different food groups B. To be a visual tool for understanding a healthy diet C. To help Americans measure the amount of fat in their bodies D. To provide a reference for evaluating different types of cuisine Please select the best answer from the choices provided. A B C D.

Answers

Answer:

B

Explanation:

MyPlate was created to be a visual tool for understanding a healthy diet.

        -> MyPlate image is attached

A. To encourage Americans to eat the same quantity of food across the different food groups

   This is incorrect, MyPlate does not show the same amount of quantity for each food group.

B. To be a visual tool for understanding a healthy diet

   This is correct, MyPlate was created to be a visual guide of what a healthy diet might look like.

C. To help Americans measure the amount of fat in their bodies

   This is incorrect, MyPlate has nothing to do with body measurement.

D. To provide a reference for evaluating different types of cuisine

   This is incorrect, MyPlate had nothing to do with evaluating different types of food.

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

Answer:

the correct answer is b

Explanation:

edge 2022

If you use your smartphone as a hotspot to connect to the Internet on your tablet you are using a ________.quillet

Answers

Personal Area Network

If you use your smartphone as a hotspot to connect to the Internet on your tablet you are using a Personal Area Network.

What is meant by personal area network?

An individual's workspace can be connected with electronic devices via a personal area network. Between devices like PCs, smartphones, tablets, and PDAs, a PAN enables data transmission.

A PAN is an interconnection of personal technology devices that allows them to communicate over a small distance (less than 10 meters or 33 feet), often using wireless technologies.

Short-range wireless networks with a range of a few tens of meters are known as personal area networks (PANs). PAN's primary function is to do away with cords that link devices to peripherals. PAN technologies often use radio or infrared for cordless items like keyboards and mice.

To learn more about personal area network refer to:

https://brainly.com/question/14704303

#SPJ2

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

The first step of the Data Encryption Standard (DES) involves breaking the plaintext into blocks of ______.

Answers

Answer:

64 bits

Explanation:

DES uses block encryption

Debug big tower can someone help me

Answers

Answer:

2

Explanation:

2 is because that what i think

Answer:its c

Explanation:

because thts wht i thinl

a ____________ is the intersection of a column and row in an excel spreadsheet.

Answers

Answer:

a cell is the intersection of a column and row in an excel spreadsheet.

how do the peograms on a computer work

Answers

Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.

Explanation:

what is the main circuit board inside the computer called?

Answers

Answer:

Motherboard is the main circuit board inside the computer.

What security feature on a smartphone prevents the device from being used until a passcode is entered?

Answers

Answer:

Lock Screen

Explanation:

the commands to add transitions to slides is located on which tab of the ribbon?

Answers

Answer:

When looking at the tabs there will be a "Transitions" tab

1. What are the electronic hand tools presented in the video? 2. How many cleaning materials where used to maintain the tools? 3. Enumerate the steps in maintaining the hand tools presented in the video clip.

Answers

I don't think you can answer the question without a video

1.erros can easily be ____ 2.work is done in an ____ no mess environment 3.colors do not _____ and brushes are never ______ 4.stages and version (s) of the artwork can be _____ filed and easily 5. work can be transferred or _____ on almost any 6. work can be _____ and easily _____ to interested parties​

Answers

Answer:

1) corrected

2) organized

3) Fade and worn-out

4) saved

5) saved

6) organized and graphics

Other Questions
PleaseHelp! Quick!Read the play.The Beggar and the Kingby Winthrop Parkhurst[A chamber in the palace overlooks a courtyard. The season is midsummer. The windows of the palace are open, and from a distance there comes the sound of a man's voice crying for bread.][THE KING sits in a golden chair. A golden crown is on his head, and he holds in his hand a sceptre which is also of gold. A SERVANT stands by his side, fanning him with an enormous fan of peacock feathers.]THE BEGGAR: (outside) Bread. Bread. Bread. Give me some bread.THE KING: (languidly) Who is that crying in the street for bread?THE SERVANT: (fanning) O king, it is a beggar.THE KING: Why does he cry for bread?THE SERVANT: O king, he cries for bread in order that he may fill his belly.THE KING: I do not like the sound of his voice. It annoys me very much. Send him away.THE SERVANT: (bowing) O king, he has been sent away.THE KING: If that is so, then why do I hear his voice?THE SERVANT: O king, he has been sent away many times, yet each time that he is sent away he returns again, crying louder than he did before.THE KING: He is very unwise to annoy me on such a warm day. He must be punished for his impudence. Use the lash on him.THE SERVANT: O king, it has been done.THE KING: Then bring out the spears.THE SERVANT: O king, the guards have already bloodied their swords many times driving him away from the palace gates. But it is of no avail.THE KING: Then bind him and gag him if necessary. If need be cut out his tongue. I do not like the sound of the fellow's voice. It annoys me very much.THE SERVANT: O king, thy orders were obeyed even yesterday.THE KING: (frowning) No. That cannot be. A beggar cannot cry for bread who has no tongue.THE SERVANT: Behold he canif he has grown another.THE KING: What! Why, men are not given more than one tongue in a lifetime. To have more than one tongue is treason.THE SERVANT: If it is treason to have more than one tongue, O king, then is this beggar surely guilty of treason?THE KING: (pompously) The punishment for treason is death. See to it that the fellow is slain. And do not fan me so languidly. I am very warm.THE SERVANT: (fanning more rapidly) Behold, O great and illustrious king, all thy commands were obeyed even yesterday.THE KING: How! Do not jest with thy king.THE SERVANT: If I jest, then there is truth in a jest. Even yesterday, O king, as I have told thee, the beggar which thou now hearest crying aloud in the street was slain by thy soldiers with a sword.THE KING: Do ghosts eat bread? Forsooth, men who have been slain with a sword do not go about in the streets crying for a piece of bread.THE SERVANT: Forsooth, they do if they are fashioned as this beggar.THE KING: Why, he is but a man. Surely he cannot have more than one life in a lifetime.THE SERVANT: Listen to a tale, O king, which happened yesterday.THE KING: I am listening.THE SERVANT: Thy soldiers smote this beggar for crying aloud in the streets for bread, but his wounds are already healed. They cut out his tongue, but he immediately grew another. They slew him, yet he is now alive.THE KING: Ah! That is a tale which I cannot understand at all.In The Beggar and the King, what does the king's reaction to the beggar reveal about the king?The king has no respect for human life. The king welcomes advice from his servants.The king is troubled by poverty and suffering.The king is unsure how to use his authority. Depletion time describes the length of time it takes to use up Which expression is equivalent to 2x + 2x + 2y + 2y?A) 2x2yB) 4 + xyC) 4x + 4yD) 8xy According to _________, all people are born with the potential for a fulfilling life and just need the correct conditions to thrive. what are the answers to number 3 4 5 Q.)) what is science fiction?? Can you please help ASAP. It is very easy 2. What are the three examples Arroyo gives for how we can prepare for themassive impact climate change will have on all of us? 3. 13.2 -0.006How would you show the work Which of the following statements best explains how an electron microscope generates a high-resolution image?. Write an essay about an event you're looking forward to attending in the coming weeks or months. Focus on varying your sentence structure by using the types of phrases and clauses taught in this lesson. You should include at least one example of each of the following:a. a participial phraseb. a prepositional phrasec. a sentence with two independent clauses joined by a conjunctiond. a noun clausee. a relative, or adjective, clausef. an adverbial clauseYour essay should be at least 150 words long.When you have finished your essay, find one of each of the types of phrases and clauses you have used, place brackets around it, and put a letter next to it. (You only need to mark one of each type of phrase or clause, even if you have used the form several times.)Y'all I just need help identifying sentences PLS I NEED HELP ASAP!Growing up, Mike watched his dad struggle to put food on the table. He feels that there is no point in working hard at a regular job when you can never get ahead. Mike has figured out how to clone and sell credit card numbers. He is making more money doing that than his dad ever could working at a store! According to strain theory, what reaction is Mike having to the situation he finds himself in? A. conformity B. ritualism C. innovation D. rebellion natural remedies for migraines and tension headaches How did the T virus started two complete sentences Find the slope-intercept equation of the line that has a slope of -2 and goes through the point (5,-2). If LM = 18 and MN = 15, what is LN? Function or non functional??? y=x^(2)-8x+15 write in intercept form 8. Classify the function as linear or quadratic and identify the quadratic, linear, and constant terms.y = (3x + 4)(2x 3)A. linear function; linear term: 17x; constant term: 12B. quadratic function; quadratic term: 12x^2; linear term: 18x; constant term: 12C. quadratic function; quadratic term: 6x^2; linear term: 17x; constant term: 12D. linear function; linear term: 6x^2; constant term: 12 The table below shows a proportional relationship. True or False?