1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
7

An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks every

one to choose a card with estimated number of ideal days to complete a user story and then reveal the card. If estimates were widely different, the facilitator would immediately ask for re-estimates until all the estimates converge. What did the facilitator do wrong?
A. Participants used ideal days as the unit for the estimates.
B. Participants re-estimated immediately after everyone revealed their cards.
C. Cards were revealed when the process should have been anonymous.
D. The facilitator did nothing wrong and played by the rules.
Computers and Technology
1 answer:
Natali [406]3 years ago
4 0

Answer:

The answer is "Option B"

Explanation:

In the given-choices, the only option B is correct because by reassessing instantly, the team loses is its advantage of debating its projections and how it chose those assessments, and the wrong choice can be defined as follows:

  • In choice A, Mostly as a unit for the projections, respondents should not use the ideal days.  
  • In choice C, Whenever the procedure should've been anonymous, no cards were released.
  • In choice D, Its mediator was incorrect and the laws were followed.
You might be interested in
The vertical and horizontal scroll bars can be used to aid in navigation throughout the document. true or false
Triss [41]

Answer: True

Hope this helps :)

7 0
3 years ago
Read 2 more answers
The code below uses the Space macro which simply displays the number of blank spaces specified by its argument. What is the firs
IceJOKER [234]

Answer:

Code explained below

Explanation:

Include Irvine32.inc

INCLUDE Macros.inc               ;Include macros for space

.code

main proc

  push 4                   ;Push 4 to the stack

push 10                   ;Push 10 to the stack

  call rcrsn                   ;call the function  

  exit

  ;invoke ExitProcess,0           ;After return from the function

                      ;call exit function

  main ENDP               ;end the main

  rcrsn PROC               ;define the function

      push ebp               ;push the ebp into stack

      mov ebp,esp           ;set ebp as frame pointer

      mov eax,[ebp + 12]       ;This is for second parameter

      mov ebx,[ebp + 8]       ;This is for first parameter

      cmp eax,ebx           ;compare the registers

      jl recurse           ;jump to another function  

      jmp quit               ;call quit

      recurse:               ;Implement another function  

      inc eax               ;increment count value

      push eax               ;push the eax value into stack

      push ebx               ;push ebx into stack

      call rcrsn           ;call above function

      mov eax,[ebp + 12]       ;This is for second parameter

      call WriteDec           ;write the value on the screen

      mWritespace 2           ;Space macro print 2 spaces

                      ;pause the screen

      quit:               ;Implement quit function

      pop ebp               ;pop the pointer value from the stack

      ret 8               ;clean up the stack

 

  rcrsn ENDP          

end main

6 0
4 years ago
The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at
inysia [295]

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

7 0
3 years ago
Which phrases suggest that Bob is a web administrator?
aliina [53]

"creates a weekly backup from a remote web server"

This implies that he is the owner of the server since, one, he backs it up every week, and two, he has access to create a backup.

3 0
3 years ago
If you wouldn't want someone to photograph you doing something, don't photograph someone else in that situation either. True Fal
Sunny_sXe [5.5K]

In the United States, it's illegal for a photographer to use someone's likeness ... Model release forms contain conditions on working with people, and in some ... You'll need this release form if you want to publish photos of another person's ... If you don't want to take any legal risks, then use a photo release form to be safe.

4 0
3 years ago
Other questions:
  • Acrynom for wys or wyg
    10·1 answer
  • A college meal plan allows students to:
    7·2 answers
  • You want to place a video from the internet to your desktop. what process do you use?
    15·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    9·2 answers
  • Research different ways that 3D printing is used in society. Tell us about the items that are 3D printed.
    15·2 answers
  • You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a
    7·1 answer
  • Hello! I hope you have a great day! Good things will come your way.
    12·1 answer
  • Match each code snippet to its appropriate markup language name. XML CSS HTML XHTML<br><br><br>​
    10·1 answer
  • You're expecting visitors who will be demanding Mamet access Before they arrive, you can activate a Guest network that has its o
    11·1 answer
  • You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!