answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
2 years ago
15

Assume you have a project with seven activities labeled A-G (following). Derive the earliest completion time (or early finish-EF

), latest completion time (or late finish -LF), and slack for each of the following tasks (begin at time = 0). Which tasks are on the critical path?
Please answer fast please


Please someone answer

Help me

Computers and Technology
1 answer:
Norma-Jean [14]2 years ago
7 0

Answer: the critical path is the late finish  

Explanation:

Because it is the latest time to finish it ma be overdue    

You might be interested in
Please answer this a due tomorrow!!!
dem82 [27]

Answer:  

4-Well first of all for the "VR" problem it could be a problem, because people could forget about there actual life and not be able to much of anything when needed.

1-the first one you are going to have to answer.

2-If you have different files then you aren't stumbling through multiple different links and could have trouble with finding what is needed.

3-the third one you are going to have to answer.

5-If I were you I would help them the best way you could so they can actually know how to do their job.

5 0
1 year ago
Which type of utp cable is used to connect a pc to a switch port?
rodikova [14]
HDMI Cable, i think that's what it's called.
3 0
2 years ago
Develop an EER model for the following situation using the traditional EER notation, the Visio notation, or the subtypes inside
podryga [215]

Answer:

Explanation:

To develop the model for Creating the supertype/subtype relationship three diffrent types of notation is given bellow accrdig to the diagram attached.

1.Traditional EER (Enhance Entity-Relational) notation

2.Microsoft Visio notation

3.Subtypes Inside supertype note

<em><u>Traditional EER(Enhance Entity-Relational)notation for the international school of technology diagram is attached bellow</u></em>

The diagram consist of the following entity

Room Supertype

Media Entity Type

COURSE entity type

Section weak entity type

Schedule associatiative entity type

<u><em>Microsoft Visio Notation for the international school of technology  is ashown in the diagram bellow.</em></u>

The diagram consist of the following entity

Room Supertype

Media Entity Type

Computer entity type

Instructor entity type

Time slot entity type

<u><em>Subtype Inside Supertype note Notation for the international school of technology  is shown in the diagram bellow.</em></u>

The diagram consist of the following entity

Room Supertype

Media Entity Type

Computer entity type

Instructor entity type

Time slot entity type

3 0
2 years ago
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
2 years ago
A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. Th
Sphinxa [80]

Answer: Machine learning

Explanation:

The technology that could be combined with the current solution to do this is the machine learning.

Machine learning refers to the use and development of the computer systems which can learn and adapt without them following explicit instructions. This is done through the use of statistical models and algorithms in order to analyse inferences from the patterns in data.

Since the bank wants to streamline their operations for the receiving and processing checks while also enhancing the solution to recognize signs of potential check fraud, then the machine learning can be used.

3 0
1 year ago
Other questions:
  • Where is the Name Manager dialog box found?
    13·1 answer
  • _____ is the process of adjusting colors in an image.
    13·2 answers
  • A program needs to allow a customer to input integers until the input number is zero. When the input number is zero, the program
    14·1 answer
  • Write a Python function called simulate_observations. It should take no arguments, and it should return an array of 7 numbers. E
    7·1 answer
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • 1. Show that the three security services-confidentiality, integrity, and availabilty- are sufficient to deal with the threats of
    10·1 answer
  • Modify the closest pair of points algorithm so that the separating line L now separates the first n/4 points (sorted according t
    14·1 answer
  • Dante wants to calculate the currently monthly subtotals for the sales of golf balls in his store. Which of the following will h
    12·1 answer
  • Write code which takes a sentence as an input from the user and then prints the length of the first word in that sentence.
    6·1 answer
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!