1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
3 years ago
9

Consider an online shopping portal that allows a customer to browse and purchase different products. The products are arranged u

nder different categories like Books, Computers, and Electronics, etc. Only a registered customer can order a product from this portal. Each registered customer will have his own shopping cart. He can view, add or remove products in his shopping cart and view his total bill. The final cart is submitted for payment and details like shipment address are confirmed by the customer. The customer is confirmed with a shipment id and delivery of goods within 15 days. Once the customer finishes selecting the product/s, he can view the cart and then place the order by providing details like postal address, number of items, etc. The website is managed by an Administrator. An administrator can add, remove and update categories, products under each category, their price, and quantity. He can also remove or verify the customer.
The project manager of the system adopted the scrum process model to divide tasks into small iterations with cross functional communication amongst teams. The project manager fails to manage the reliability of the system due to improper validation and stakeholder involvement/feedback. Thus, an integrated scrum process is required to improve the development process of a given scenario. You have to give reasons why scrum not successful in this scenario and which process method best suitable for this type of system development with a combination of scrum process.
.
Computers and Technology
2 answers:
o-na [289]3 years ago
7 0
Way too much to read bye
solniwko [45]3 years ago
4 0
I don’t understand…
Explanation
You might be interested in
Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
marysya [2.9K]

Answer:

The customer's browser has been hijacked by some attackers may be.

Explanation:

According to customer's explanation there is  possibility that that his data may be stolen and he has to disconnect computer from network and then call given number in order to get back his data.

5 0
4 years ago
What is the tendency for an individual to have better memory for information that relates to oneself in comparison to material t
Elena-2011 [213]

Answer:

The answer is "Option c".

Explanation:

The self-reference will affect the appears, that enables the people to transmit data separately, as per their degree of knowledge, If people are willing to identify the information, the frequency of recalling may be increased if it is linked in some way to ourselves, and other options are wrong, that can be described as follows:

  • In option a, It is used to store information for a long time, that's why it is not correct.
  • In option b, It is used for both, input and receives sensory register and the long-term store, that's why it is not correct.
  • In option d, It provides cognitive interference that's why it is not correct.
4 0
3 years ago
File Letter Counter
Zanzabum

Answer:

The solution code is written in Python.

  1. fileName = input("Enter file name: ")
  2. target = input("Enter target character: ")
  3. with open(fileName, "r")as reader:
  4.    content = reader.read()
  5.    print(content.count(target))

Explanation:

Firstly, use <em>input() </em>function to prompt user for a file name. (Line 1)

Next, we use input() function again to prompt user input a target character (Line 2)

Create a reader object and user <em>read() </em>method to copy entire texts from to the variable<em> content </em>(Line 4 - 5).

At last we can get the number of times the specified character appears in the file using the Python string built-in method <em>count() </em>(Line 6)

5 0
4 years ago
What is the difference between a learner’s license and an operator’s license?
SpyIntel [72]
I think a learners license is when your still in the process in getting a operator's license. A operator's license is that you are certified
4 0
3 years ago
Read 2 more answers
what is the first step in necessary to begin setting up a website once a host has been selected and paid
kenny6666 [7]

explain this more please..

6 0
3 years ago
Read 2 more answers
Other questions:
  • Question 1:
    15·1 answer
  • A number used to encrypt data is called a(n ________. signature key cookie escrow
    10·1 answer
  • This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system
    15·1 answer
  • A new object, Object Y, was discovered outside our solar system. Object Y is small and rocky, is not a satellite of any other ob
    6·2 answers
  • An electronic device that can accept data as input, process it according to a program, store it, and produce information as outp
    6·1 answer
  • In database transaction concurrency, the lost update anomaly is said to occur if a transaction Tj reads a data item, then anothe
    6·1 answer
  • What is a Network It’s a system that is used to link two or more computers and name the different types of networks.?
    11·1 answer
  • The system requirements for software include the
    5·1 answer
  • Win10如何删除自己添加的环境变量?...............
    8·1 answer
  • The four main disabilities or impairments that computers can modify are for
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!