1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
4 years ago
11

To reduce costs and the environmental impact of commuting, your company decides to close a number of offices and to provide supp

ort for staff to work from home. However, the senior management who introduce the policy are unaware that software is developed using Scrum.
Explain how you could use technology to support Scrum in a distributed ­environment to make this possible.
What problems are you likely to encounter using this approach?
Computers and Technology
1 answer:
stealth61 [152]4 years ago
5 0

Answer:

Using services such as GitHub and Skype

Disorganization and Communication Problems

Explanation:

Scrum is a framework for projects that are almost exclusively about programming and coding. Which means that there is always group work involved and one of the most important elements of group work is efficient communication.

The company's decision of providing the employees the opportunity to work from their homes greatly interferes with this concept and most likely there will be issues.

Using Scrum in the development process while working from different locations forces the team to use different ways to communicate and collaborate effectively which i believe can be done by using services such as Skype and GitHub.

Using this approach does not eliminate all possibility of problems mentioned above. There can be miscommunication and desynchronization in terms of the coding process which can result in bugs in the code and delay of the final product.

I hope this answer helps.

You might be interested in
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
What can you use on Code.org's Web Lab to find and fix problems when you are writing code for your website?
Lunna [17]

Answer:

I think I need your ip for thissssssssssssssssss

8 0
3 years ago
Tạo biến
rewona [7]

Answer:

WHERE ARE YOU FROM

Explanation:

TRANSLATE IT TO ENGLISH

5 0
3 years ago
What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?
stiv31 [10]

Answer:

Depends. could be an external opticial drive, a scuzi drive, a real to real tape system, or just a simple electromagnetic hard drive with speeds of 1000 rpm or more

8 0
3 years ago
WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES
Makovka662 [10]

Answer:

lectronic Health Record (EHR) Software. ...

Medical database software. ...

Medical research software. ...

Medical diagnosis software. ...

Medical imaging software. ...

E-prescribing software. ...

Telemedicine software. ...

Appointment scheduling (booking) software.

6 0
3 years ago
Other questions:
  • Can someone help me with...A table can help? PLEASE
    8·1 answer
  • Fax machines, voice mail, electronic mail, and electronic conferencing are all examples of _________.
    15·2 answers
  • A provides an easy way for workers to interact with their computers
    9·1 answer
  • Write a Python program calculate summary statistics about a class assignment. First, prompt the user for the number scores to be
    6·1 answer
  • keeping in mind the role in order of precedence plays in equations, what would excel display as the result of the following equa
    14·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi
    15·1 answer
  • Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2
    14·1 answer
  • What are some things you think are worthwhile and are willing to work harder to accomplish? Check all that apply.
    5·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!