1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
3 years ago
7

An Agile Team decides they want to use pair programming in future Iterations. Where should this be captured? g

Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
7 0

Answer:

The decision to use pair programming by an Agile Team should be captured in their <em>Inspect and Adapt meeting notes.   </em>

Explanation: The underlying principle for having an agile team that the team is committed to constant incremental and or progressive improvement.

Inspect and Adapt Meeting Notes are notes which hold the summary of past achievements which hold and records of things to do going forward in order to ensure that there is progress and improvement over the last set of objectives.

These notes are usually taken at the Inspect and Adapt meeting. This is simply a meeting held at the end of each project milestone. An agile team during this meeting will review its performance, agree and document how it can be more effective.

Pair programming is also an Agile practice in the parlance of software development. Instead of the regular method where an individual is tasked with the development of an application, in this case, two programmers are tasked with the development of one App.

Sometimes this method is used during Extreme Programming (XP)

Cheers!

You might be interested in
Create an algorithm that will convert dog years to human years using the assumption that 1 dog year = 7 human years. Prompt the
matrenka [14]

Answer:

Algorithm:

1. Declare and initialize variable one_dog_year=7.

2.Ask user to give dog age.

   2.1 Read the dog age and assign it to variable "dog_age".

3.Create a variable "human_age" to store the equivalent human age.

   3.1 Calculate equivalent human age as "human_age=one_dog_year*dog_age".

4.Print the equivalent human age of dog age.

7. End the program.

// here is algorithm implemented in c++

#include <bits/stdc++.h>

using namespace std;

int main()

{

   // initialize one dog year

   int one_dog_year=7;

   int dog_age;

   int equi_h_age;

   cout<<"Enter the dog age:";

   // read the dog age

   cin>>dog_age;

   

   //calculate the equivalent human age

   equi_h_age=dog_age*one_dog_year;

   cout<<"equivalent human age is : "<<equi_h_age<<endl;

return 0;

}

Output:

Enter the dog age:2                                                                                                                                            

equivalent human age is : 14

4 0
3 years ago
EDI stands for__________________ a) Electronic digital interface b) Electronic data interchange c) Enterprise data interface d)
vagabundo [1.1K]

The correct answer is B

6 0
4 years ago
Which of the following can a cell contain?
Ksju [112]
The answer is choice D-All of these :)
8 0
3 years ago
Read 2 more answers
(ACCESS 2016)
galben [10]

Explanation:

rowCount() returns the number of rows affected by the last DELETE, INSERT, or UPDATE statement executed by the corresponding PDOStatement object.

7 0
3 years ago
Read 2 more answers
Website hosting servers have their own unique IP address, what does this address consist of?
Alchen [17]
A. Numbers and letters
4 0
3 years ago
Other questions:
  • By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memori
    6·1 answer
  • If two different devices try to transmit to a common device at the same time, switches suffer from a problem in the collision do
    13·1 answer
  • Why are computers assigned IP addresses
    15·1 answer
  • How can I change my username here at brainly?
    13·2 answers
  • What are the three primary components of an inbox?
    11·1 answer
  • The Table Design and Layout tabs are available under the
    13·2 answers
  • I’ll give brainliest if answers are correct
    11·1 answer
  • I really need help in this!!!
    11·1 answer
  • Which statement is true with respect to Java?
    12·1 answer
  • Which of the following security policies can be implemented to prevent removable media from automatically launching potentially
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!