7. In a particular town in a country, people are tested for Corona infection. A new testing kit was procured to test the infection. 22nd April a patient came for testing at 2. 30 pm. The testing methods consist of 7 activities which are given below. Activity duration Activity Constrain (min) 30 Starts at 4.30 pm 40 None Cannot start until A and B are completed Cannot start until B is completed Cannot start until A is completed Cannot start until C and E are completed Cannot start until A B CDEF are completed 50 D 40 50 40 G 40 (i) When the testing was finished? (ii) Draw an activity network showing all the activity. (iii) Find the critical path of the testing procedure. (iv) If the activity D is delayed for 20 hours then when the testing will be finished? (v) Can activity E and F start together? Give reason for your answer.

Question

7- Please I want answer with steps. Many thanks

7. In a particular town in a country, people are tested for Corona infection.
A new testing kit was procured to test the infection. 22nd April a patient
came for testing at 2. 30 pm. The testing methods consist of 7 activities
which are given below.
Activity
duration
Activity
Constrain
(min)
30
Starts at 4.30 pm
40
None
Cannot start until A and B are completed
Cannot start until B is completed
Cannot start until A is completed
Cannot start until C and E are completed
Cannot start until A B CDEF are completed
50
D
40
50
40
G
40
(i) When the testing was finished?
(ii) Draw an activity network showing all the activity.
(iii) Find the critical path of the testing procedure.
(iv) If the activity D is delayed for 20 hours then when the testing will be
finished?
(v) Can activity E and F start together? Give reason for your answer.
Expand
Transcribed Image Text

7. In a particular town in a country, people are tested for Corona infection. A new testing kit was procured to test the infection. 22nd April a patient came for testing at 2. 30 pm. The testing methods consist of 7 activities which are given below. Activity duration Activity Constrain (min) 30 Starts at 4.30 pm 40 None Cannot start until A and B are completed Cannot start until B is completed Cannot start until A is completed Cannot start until C and E are completed Cannot start until A B CDEF are completed 50 D 40 50 40 G 40 (i) When the testing was finished? (ii) Draw an activity network showing all the activity. (iii) Find the critical path of the testing procedure. (iv) If the activity D is delayed for 20 hours then when the testing will be finished? (v) Can activity E and F start together? Give reason for your answer.

Expert Answer

1 Rating

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Engineering

Design with UML

Related Computer Engineering Q&A

Find answers to questions asked by students like you.

Q: Ceng X y! ccm blackboard X Bb HOMEWORK- X Bb Tirrito CMP130 New Tab tml?deploymentld%359531118568315...

A: From the given information, one can identifies the internal components of a computer as follows. Au...

Q: Use an IPO chart to create the logic for a c++ program that continuously prompts a user for a numeri...

A: Below are the IPO chart and the C++ program to continuously ask the user for a numeric value until t...

Q: Q1. Assume X is an array of char such that cahr X[] = “welcome C++II students to pointer camp, come ...

A: Create a function to compare the strings – Take a loop to traverse through the strings. Use an if c...

Q: Which hexadecimal block in an IPv6 address is used for the Subnet ID? a. The first one b. The third ...

A: The fourth one of the hexadecimal block is used for Subnet ID. Hence, correct answer is option "C".

Q: Why might organizations be willing to take on the risk of BYOD?

A: Bring Your Own Device (BYOD): It is the practice of bringing the technical device of a particular i...

Q: When a wireless signal encounters a large obstacle, what happens to the signal?

A: Reflection: When a wireless signal is attacked by an obstacle the signal gets reflected or bounce b...

Q: Produce the DSA key generation algorithm. Explain the steps. Explain the DSA signing and verificatio...

A: Input: L The desired length of the prime p (in bits). N The desired length of the prime q (in bits)...

Q: TaskYou have been asked to design the entire cabling system for a medical instru-ment manufacturer’s...

A: Explanation: The company can request fiber optic. Fiber optic is fastest type that is important for...

Q: Which form of SHA was developed by private designers?

A: SHA (Secure Hash Algorithm): SHA-3 is the form of SHA that was developed by private designers for ...

Q: What is the least number of bits you would need to borrow from the network portion of a Class B subn...

A: Explanation: The number of bits required to borrow from the Class B subnet mask to attain 130 hosts...

Q: Which part of a MAC address is unique to each manufacturer? a. The network identifier b. The OUI c. ...

A: OUI of MAC address is unique. Hence, correct answer is option "B".

Q: Define Backpatching.

A: Backpatching can be defined as the process of resolving forward branches that are inside the code. I...

Q: Questions: You are expected to generate a password of 8 characters. These characters can be between ...

A: Use a srand() function to create the starting point to generate the random numbers. Declare a string...

Q: Which cloud computing services model gives software developers access to multiple operating systems ...

A: Platform as a Service (PaaS) is the cloud computing service model that offers the software developer...

Q: program that will load 100 integers into array X. Separate the even from the odd valued elements. Th...

A: Programming language is missing in the question. The below program is provided in C++ language. If y...

Q: At what layer of the OSI model do proxy servers operate? a. Layer 3 b. Layer 2 c. Layer 7 d. Layer 4

A: At the Application layer of the Open Systems Interconnection (OSI) model, the proxy servers manage s...

Q: Which web application attack is more likely to extract privacy data elements out of a database?   Wh...

A: Hey, since there are multiple questions posted, we will answer first question. If you want any speci...

Q: Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a w...

A: Answer: The correct option is (C) Tone locator

Q: What area of a network can provide less stringent security so a web server is more accessible from t...

A: Introduction: Generally, only limited transmissions will take place in the broadcast domains and so...

Q: Define streaming multiprocessor.

A: Streaming multiprocessor: The Streaming Multiprocessor (SM) is a segment of Graphics Processing Uni...

Q: What is the fundamental distinction between a node and a host?

A: Fundamental distinction between a node and a host: The fundamental differences between a node and a ...

Q: How can I find the Pseudocodes and C++ codes for this problem?

A: A C++ program for the given criteria is as follows, File name: “main.cpp” //include header files #in...

Q: What security countermeasures could be used to monitor your production SQL databases against injecti...

A: Security countermeasures used to monitor the production SQL database against injection attacks: The...

Q: Draw a flowchart and write pseudocode for each of the following scenarios for the ABC College:a. The...

A: Hey, since there are multiple questions posted, we will answer first question. If you want any speci...

Q: What kind of route is created when a network administrator configures a router to use a specific pat...

A: When exact path between “2” nodes is to be monitored, then an administrator creates a static route. ...

Q: What are the two basic principles of aggregation?

A: Aggregation in general is the combination or collection of smaller concepts or parts.

Q: Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11g b. 802.11ac c. 802.1...

A: The “802.11n” standard of “802.11” performs in both the 2.4-GHz and 5-GHz bands. Hence, correct answ...

Q: Identify four types of software licenses frequently used. Which approachdoes the best job of ensurin...

A: Software licenses: Software license is an authorized device leading the use or redistribution of so...

Q: You need to connect a new network printer to a nearby wall jack. What kind of cable should you use? ...

A: Explanation: Patch cable is used for connection a network printer to a wall jack. Hence, the correc...

Q: In a computer instruction format, the instruction length is 10 bits and the size of anaddress field ...

A: Solution: Given an instruction format with instruction length of 10 bits and size of address filed ...

Q: A clerk officer found out that his pen is missing so he decided to go to the market to purchase one....

A: Flowchart is basically a pictorial representation of any situation. In flowchart the information is ...

Q: The Jumpin’ Jive coffee shop charges $2 for a cup of coffee and offers the add-ins shown in the tabl...

A: Program approach: Create main function. Declare parallel array for nameOfProduct. Declare parallel ...

Q: Write a program in java that does the following process using one dimension array. manu 1-insert dat...

A: Create an object of a Scanner class to take the inputs. Take 2 variables to iterate the loop. Take a...

Q: write use cases in textual format for: 1. sending a message in whatsapp application . 2. purchase la...

A: ASSUMPTION: - Since the UseCases are required in textual format, so I will be explaining the terms i...

Q: Explain static multiple-issue processors.

A: The term multiple issue means the multiple pipelines which are obtained by replicating the pipeline ...

Q: Which fiber connector contains two strands of fiber in each ferrule? a. MTRJ b. SC c. ST d. LC

A: The MTRJ fiber connector consists of two strands of fiber in each ferrule. Hence, the correct option...

Q: Explain in the detail the elements of the spheres of security model. Document needs to have signific...

A: Information Security is mainly concerned with protecting information from unauthorized access. It de...