1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondor19780726 [428]
4 years ago
11

If you are asked to bring in agile way of working into the way a meeting runs, which one among the listed options will you imple

ment?A. Meetings must be scheduled with a lead time so that the participants can plan their work better.B. Meetings must be run strictly according to the agenda to reduce digressions.C. Meetings must be facilitated and time-boxed.
D. Facilitator/Team Lead must facilitate discussions but he/she may close meetings as per preference.
Computers and Technology
1 answer:
Basile [38]4 years ago
8 0

Facilitator/ Team lead must facilitate discussions but he/she may close meetings as per preference.

Answer: Option D.

<u>Explanation:</u>

An agile model of working mainly refers to a certain process of working , where the team is expected to be very flexible regarding the work time and the style of working.

The motto or the purpose of the agile model of work system is adaptation according to the situation. So according to this situation, the facilitator or the team lead must facilitate the discussions but if the need by, they should close the meetings.

You might be interested in
What is the name of the process that is used to establish whether or not a user’s identity is legitimate?
pogonyaev

Answer:

Authentication

Explanation:

The authentication process is used to check the identification of the particular user or computer system .we can give authentication to any user by the username and password. If a particular user puts the correct username and password into the website then it has the authority to access that particular website.

For example: In the any mail website, if a particular user login with the correct username and password then it has an authenticated user. It means it has the right to access the mail of that account .  

8 0
3 years ago
What information most likely presents a security risk on your personal
11111nata11111 [884]

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

  • Date of birth.
  • Occupation.
  • Religion.
  • Gender (sex).
  • Location.
  • Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: brainly.com/question/21765376

6 0
2 years ago
To make a black and white image out of a color image, you would use which option?
fenix001 [56]
The black and white filter

6 0
3 years ago
Suppose an application generates chunks of 20 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and
nikitadnepr [17]

Answer:

67%

Explanation:

TCP Header = 20 bytes

IP Header = 20 bytes.

Data chunk = 20 bytes

Adding the 20 byte data chunk to the TCP/IP header makes 60 total bytes.

Total = 60 bytes

Overhead is 40 of the 60

i.e (40/60) * 100 = 66.67 %

5 0
3 years ago
What type of input and output devices would be ideal for a college student completing his or her coursework?
Xelga [282]
If your looking for devices that help a college student get answers or help Air Math is great, along with Homework Helper. Sorry if this is not what your asking for, but it helps!
4 0
2 years ago
Other questions:
  • numbers that the user inputs. You must use JoptionPane to input the three numbers. A first method must be called and used to dev
    13·1 answer
  • Which of the following might not exist in a URL?
    10·2 answers
  • A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
    9·2 answers
  • Which of the following letters do the most reliable websites end in?
    12·2 answers
  • Describe the effects technology, particularly computers, has had on mechanical labor.
    8·1 answer
  • Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his comp
    15·2 answers
  • If you Buy my group clothing in R.o.b.l.o.x for a donation i will make you brainliest
    14·2 answers
  • What is the value of numX when this program is executed? if 3 &lt; 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • 1. What are the main uses for Protein in the body?
    13·2 answers
  • What should you consider when using a wireless keyboard with your home computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!