1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
2 years ago
6

If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles

Computers and Technology
1 answer:
Nuetrik [128]2 years ago
5 0

There are various ways to resolve conflict. Addressing conflict by the  team manage is by:

  • Control conflict by expanding the resource base
  • Eliminate conflict by assigning volunteers to another project team.

There are a lot of ways an individual can handle conflict. One of which is to expand the resource base.

Example: Supporting  team manager receives 4 budget requests for $150,000 each. If he has only $200,000 to distribute, there will be conflict at this stage because each group will believe its proposal is worth funding and will not be happy if not fully funded. So the best thing to do is to expand the resources allocated.

The right way to fix this conflict is to tell your volunteers in advance that some of them will not be doing different tasks etc.

See full question below

  • Capital One invites employees to work on special projects during hackathons. Employees can explore new technologies, rapidly push development forward, or just expand their network to include more colleagues interested in innovation. There's always the possibility that more employees want to participate in the hackathon than there are roles available. If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles?
  • Control conflict by expanding the resource base.
  • Eliminate conflict by assigning volunteers to another project team.
  • Eliminate conflict by avoiding the volunteers.
  • Stimulate conflict by making volunteers compete for the available roles.

Learn more from

brainly.com/question/18103914

You might be interested in
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
Katarina [22]
The answer is C. Shareware
4 0
3 years ago
Read 2 more answers
1.<br> Which of the following is NOT caused by alcohol?
Alla [95]

Answer:

What are the choices

7 0
3 years ago
Read 2 more answers
structured analysis is called a(n) _____ technique because it focuses on processes that transform data into useful information.
zzz [600]

Answer:

Process - centered technique

Explanation:

Process - centered technique -

It is the method , where the useless or waste data is converted to some useful information , is referred to as process - centered technique .

This conversion process requires some activities , like  maintenance/support  , implementation , design , analysis and  planning .

Hence , from the given information of the question,

The correct option is Process - centered technique .

4 0
3 years ago
Why do we need multitasking functionality in an Operating System?
Leokris [45]

Answer:

Multitasking is a process in which we do multiple task at a time.    

In computing system, multitasking is the concept of performing different types of multiple task and process over a certain period of time by executing simultaneously.

Operating system basically allow various task to run simultaneously by the user. In an operating system, each task consume storage system and all the other resources.

Multitasking function facilitate memory isolation in the processor and also supported different levels of security system in the operating system. For example, "a programmer working on any program in a system and as well as listening the music then, it perform multiple task at the same time".

7 0
2 years ago
Other questions:
  • What are you guys doing?
    13·2 answers
  • /*
    8·1 answer
  • Who invented the ENIAC? More than one answer may apply.
    14·1 answer
  • A franchise restaurant is attempting to understand if customers think their service is good day-to-day by summarizing a series o
    10·1 answer
  • Which of the following is not considered a system component that can be found inside a computer? A-CPU B-RAM C-PCIe graphics ada
    6·1 answer
  • 1. Would it be possible for two people to have the same email address? Explain.
    9·2 answers
  • In a network, multiple critical paths can occur. true or false
    13·2 answers
  • You saved a file on drive C go your computer. You want to find and open the file. Which of the following programs will you use t
    14·1 answer
  • Writing down your main ideas, subpoints, and supporting material, then using geometric shapes and arrows to indicate logical rel
    10·1 answer
  • Compare and contrast hardware and software.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!