When setting up a project timeline for a computer lab, which of the following should not be taken into consideration?
time to install software
time to set up the network
time to purchase items
time for maintenance

Answers

Answer 1

Answer: It depends on where you are how far the place where you are going to purchase the items and also it depends if your a fast builder or not

but if you are quick it shouldnt take so long just depends on you.

Explanation:


Related Questions

You have a server with Windows Server 2016 installed on Disk 0, a basic disk. You're using the server to store users' documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for users' documents

Answers

Answer:

Convert the new disks to GPT. Create a spanned volume using Disk 1 and Disk 2.

Explanation:

Memory of your familiar old e-mail password may block the recall of your new password. This illustrates

Answers

Answer:

Retroactive Interference

Explanation:

Memory of your familiar old e-mail password may block the recall of your new password, This illustrates a phenomenon known as proactive interference.

Proactive interference occurs when previously learned information interferes with the recall or retrieval of new information.

The memory of the familiar old e-mail password is interfering with the recall of the new password.

The interference happens because the old password is already deeply ingrained in the individual's memory, and when trying to recall the new password, the old password comes to mind automatically and hinders the retrieval of the correct information.

This interference can lead to forgetting or temporarily blocking the recall of the new password.

To learn more on Proactive interference click:

https://brainly.com/question/30320488

#SPJ6

Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the most information about user web activity

Answers

Answer:

port 80

Explanation:

port 80 is http. port 443 is https. so if you are trying to be a sneaky little person and eavesdrop on people, eavesdrop on port 80 not port 443 because port 80 is unsecured plaintext data transmission over websites

What is the most likely reason for protecting a worksheet?

to track all changes made by editors to a worksheet
to stamp the worksheet with an individual’s information
to prevent email programs from sending the worksheet
to prevent unauthorized users from modifying the worksheet

Answers

Answer: D, to prevent unauthorized users from modifying the worksheet.

Explanation:

Answer:

D. to prevent unauthorized users from modifying the worksheet

Explanation:

hope this helps :)

what is pascaline ?

Answers

Pascal's calculator is a mechanical calculator invented by Blaise Pascal in the mid 17th century. Pascal was led to develop a calculator by the laborious arithmetical calculations required by his father's work as the supervisor of taxes in Rouen.

also called Arithmetic Machine, the first calculator or adding machine to be produced in any quantity and actually used. The Pascaline was designed and built by the French mathematician-philosopher

According to the C&M Technology Competitor View, while Accenture leads in Consulting and SI, which are our two major competitors in large deals?

Answers

Even though Accenture leads in Consulting and SI, its major competitors include McKinsey and Bain & Co. Inc.

Accenture is a multinational professional technology service company that provides digital, tactical, strategic, and consulting services for its clients.

Accenture was formerly known as Arthur Anderson LLP. It's regarded as one of the top accounting firms in the world. Some of its major competitors in large deals include McKinsey, Bain & Co. Inc., Boston Consulting Group, Inc.

Read related link on:

https://brainly.com/question/25740331

Software whose code is made freely available to others for use, augmentation, and resale is referred to as:

Answers

Answer:

Open Source Software

Explanation:

_______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi

Answers

Wireless fidelity (Wi-Fi) is known simply as a wired LAN that does not have cables. Wifi is a medium-range wireless network.

WiFi configuration is made of of transmitter with an antenna. It is the wireless access point because it connects to a wired LAN or to satellite dishes that gives an Internet connection.

Wi-Fi is the mostly used type of medium-range wireless communication system.

Medium-range Wi-Fi signal can take about 100 meters and they also not take as far as cellular signals.

Learn more from

https://brainly.com/question/20812811

Methods that set values are called ____ methods. Group of answer choices modifier mutator creator access

Answers

Answer:

modifier methods.

Explanation:

A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.What is the first step Accenture could take?

Answers

Accelerating output and hence, growth of an enterprise is one of the core functions of Accenture. Hence, the first step to be taken by Accenture is to design an Enterprise analytic strategy assessment.

Data science leverages the power of collected data combined with simple and complex machine learning algorithm in other to draw pattern and trends from data.

Since, the healthcare provider is a large enterprise, the first step that should be followed would be to design a strategy to the assess the data available to the organization or enterprise

Hence, the first step is to develop an enterprise analytic strategy assessment.

Learn more : https://brainly.com/question/25602226

the ____, located near the top of the window, is the control center in excel as well as most other 2019 office applications.

Answers

The ribbon located near the top of the window, is the control center in excel as well as most other 2019 office applications.

Omitted options are  A.Title bar B.Ribbon C.Status bar D.Menu

The Microsoft Excel ribbon like other 2019 office applications is located at the the top of the window and consists of  row of tabs and icons.

This helps a user to easily locate, understand and use commands in order to complete a task.  

The ribbon in Excel is made

tabsgroupsdialog launchers command button

The excel ribbon can also be customized for individual needs.

See here: https://brainly.com/question/23647530

what was your first pokemon game


if you have not played one just comment don't answer

Answers

Answer:

FireRed & LeafGreen

Explanation:

so if it's mobile games then Pokémon go
but if it's Nintendo games then probably sword and shield cos you can catch pretty much every Pokémon.

Which would a student most likely do in a digital laboratory? conduct an experiment in chemistry take continuing education classes in chemistry look for an out-of-print book about chemistry watch an instructional video about chemistry.

Answers

Answer:

conduct an experiment in chemistry

Explanation:

A digital laboratory is an interactive online tool, where students are asked to mimic an experiment.

Answer:

"conduct an experiment in chemistry"

Explanation:

A digital laboratory is an online tool used to conduct chemistry experiments when, say, you are at home or the tools needed are dangerous. It also helps to make sure you have exact results since it is computerized.

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

When using ________ access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.

Answers

When using sequential access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.

Which of the following can be termed “application software”? *
1 point
a) DOS
b) Linux
c) Defragment
d) Internet Explorer/ Microsoft Edge

Answers

The answer option which can be described as an application software is: d) Internet Explorer/ Microsoft Edge.

A software can be defined as a set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

In Computer and Technology, software applications (programs) are broadly classified into three (3) main categories and these are;

System softwareUtility softwareApplication software

An application software refers to a type of software applications (programs) that is typically designed and developed for the performance of a specific task rather than the operation of a computer system.  Some examples of application software include the following:

1. Internet Explorer/Microsoft Edge

2. Notepad

3. Windows media player

Find more information: https://brainly.com/question/14379808

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

What is the name of the table tools contextual tab that appears once you insert a table? Transform Design Outline Charts.

Answers

Answer: B.) Design

Explanation: just took it

Answer:

b

Explanation:

principles of Responsible Artificial Intelligence (AI)?

Answers

Answer:

Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.

Explanation:

who has played pokemon red, blue, or yellow on the gameboy

Answers

Answer:

I didn't think this would be an actual question... I did- :3

I have, it gets harder near the end

To break a text string into several lines, which means that the text string continues on the next line, the _____ character should be used.

Answers

Answer:

To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.

How do i add a picture on a computer? Its a random question but i dont know how to do it. It needs to be a very detailed description.

Answers

get the picture glue it on the screen

What is a megavirus in computing

Answers

In the lab experiments conducted by Professor Claverie and colleagues, in which they infected fresh-water amoebas, Megavirus was seen to construct large trojan organelles - the "cells within cells" that would produce new viruses to infect other amoebas.

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

yes cause you didn’t block them

translate ¨friends¨ into spanish

Answers

Friends to Spanish is Amigos

Answer: I hope this is helpful

Explanation:

Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun

Friends- trusted and caring person

True or false: The Internet and the World Wide Web are not synonymous. The WWW is just one part of the Internet, and its primary use is to correlate and disseminate information. The Internet includes the WWW and also other forms of communication systems such as email.

Answers

True or false: The Internet and the World Wide Web are not synonymous. The WWW is just one part of the Internet, and its primary use is to correlate and disseminate information. The Internet includes the WWW and also other forms of communication systems such as email.

Answer : True

1- pensamiento sistémico
2- visión oriental y occidental​

Answers

I don't know

Explanation:

what do you mean?

To use the Expression Builder to create a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.

Answers

Answer:

square brackets [ ]

Explanation:

Hope I could help. Good luck with your studies .

If you are going to build a custom fast PC for gaming and you need a lot of storage for big video files and videos, but you have a low budget, what storage device(s) option you are going to consider? Why?

Answers

Answer:

Cheap and efficient PC's for two drives

Explanation:

Buying a expensive PC usually runs slower

Discuss the importance of an operating system as it relates to computer hardware and software. Provide at least one example of a service that operating systems provide.

Answers

Answer:

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language.

Examples:

1. User Interface.

2. Program Execution.

3. File system manipulation.

4. Input / Output Operations.

5. Communication.

6. Resource Allocation.

7. Error Detection.

8. Accounting.

Bob has been asked to do research into increasing the accuracy in identifying rogue APs in his enterprise. Which rogue AP system detection probe will allow his company's IT department to monitor the airwaves for traffic, scan and record wireless signals within its range (even when the device is idle or not receiving any transmission), and then report this information to a centralized database

Answers

Considering the situation described above, the rogue AP system detection probe that will allow Bob's company's IT department to monitor the airwaves for traffic, amongst others, is Wireless Device Probe.

This is because the Wireless Device Probe possesses a WiFi interface that occasionally produces a wireless probe procedure through the effective transmission of a control frame.

This process is often referred to as 'probe request''.

The purpose of Wireless Device Probe is to ensure that closer wireless access points transmit information about wireless networks that are accessible for connection.

Hence, in this case, it is concluded that the correct answer is "Wireless Device Probe."

Learn more here: https://brainly.com/question/10249897

Other Questions
Youre writing a novel.If you write 5 pages every 2 days,how long will it take you to write a 250 page novel? Why might these Arabic words be found in English today? According to the Fundamental Theorem of Algebra, how many roots exist for the polynomial function f(x)=(4x313x+11)3? Penny has some money. Aftershe pays $5 for her new kitten,she will have $27. How muchmoney does she have now? who is the current prime minister of Malaysia The process of burning means to react a substance with: An egg with an initial temperature 25C was place into a boiling water for 15 minutes. Heat from the boiling water enters the egg and changes its temperature gradually over time and space. Using the 2 dimensional finite element method, prove that the temperature of the egg varies from the shell to the center of the egg. You may need to develop your own nodes before start deriving the equations. Yara is trying to find the best price for 8 notebooks.If 2 notebooks cost $14.00 at Barnyard Books, and 5 notebooks cost $20.00 at The Bookworm, how many dollars will Yara save if she buys 8 notebooks from The Bookworm instead of Barnyard Books? Suppose that the functions u and w are defined as follows.u(x) ==-x-1w(x) = 2x +1Find the following. Categorize the graph as linear increasing, linear decreasing, exponentialgrowth, or exponential decay. how did you react to the news you received in school on March 13, 2020, that you will not return to school for about two weeks what is the decimal equivalent of the -68/255 Evaluate the function.f(x) = 2x2 15Find f(-2) which statement is not true about electrical synapses? 17 rounded to the nearest 10th of a degree Fiona has $18 to spend. She spent $4.25, including tax, to buy a notebook. She needs to save $9.75, but she wants to buy a snack. If crackers cost $0.50 per package including tax, what inequality would show the maximum number of packages that Fiona can buy DUE IN A FEW HOURS HELP PLS Find the mode of the following list of weight (in pounds)of snakes at a pet store. 3,11,11,11,11,11,8,3,17,11 What is the common name of Methamphetamine Hydrochloride? Shall I get _________ oranges for you?A. all B. either C. some D. any