A(n) ____ chart shows project activities with graphical representations of time. Bars are often placed into cells as tasks are completed.

a.

schedule

b.

time management

c.

Gantt

d.

PERT

c.

Gantt

Computer Science & Information Technology

You might also like to view...

All Android devices automatically encrypt data stored on the device when a user activates the login password.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following defines a rootkit?

a. It is the act of fraudulently using email to try to get the recipient to reveal personal data by sending legitimate-looking emails urging the recipient to take action to avoid a negative consequence or to receive a reward. b. It is the unintended release of sensitive data by unauthorized individuals. c. It is the abuse of email systems to send unsolicited email to large numbers of people. d. It is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge.

Computer Science & Information Technology