Collaboration and social media

Assignment Help Basic Computer Science
Reference no: EM132517792

Collaboration and Social Media Please respond to the following:

While planning for a new project, a young developer mentions that she used Facebook as a collaborative group space for developing her senior project. She tells you that it was the ideal solution since it was free and all of her group members were friends with her. Further, she tells you that your company should do the same thing. Explain whether or not you think that Facebook would be a proper venue for your developers to collaborate. Give at least three reasons for your answer.

Imagine you were going to be teaching this class next semester and you were given the choice to teach it asynchronously distributed interface, synchronously distributed interface, or face-to-face. Choose one of these techniques to teach the class and describe why you chose the presentation style you did. Discuss the advantages and disadvantages associated with the style you chose.

Reference no: EM132517792

Questions Cloud

Big Data Analytics in the e-Healthcare industry : There are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry.
Information risk planning and management : One of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results.
Concerning windows forensic toolchest tool : Write a brief summary concerning "Windows Forensic Toolchest " tool. Need screen shots of the work with tools.
Interaction devices : Touch screens are becoming extremely popular input devices for phones and tablets
Collaboration and social media : While planning for a new project, a young developer mentions that she used Facebook as a collaborative group space for developing her senior project.
Discuss registry security information : You can focus your discussion on a particular type of incident or more broadly discuss registry security information.?
Compliance and regulations : Many recent breaches have involved payment card systems, otherwise known as point of sales (POS) terminals.
Human to computer interface : Everything we touch that is electronic has a Human to Computer Interface (HCI). Some companies put a lot of effort into the user experience;
Competitive value of information technology : Identify three factors to consider in determining the competitive value of information technology.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Technical data and information to the field team

Your task is to design an information system that provides technical data and information to the field team. What types of output and information delivery would you suggest for the system? Why? APA citation

  Do we need a link-layer switch between the two

Assume we want to connect two isolated hosts together to let each host communicate with the other. Do we need a link-layer switch between the two? Explain.

  Compute monthly payment for car

Compute the monthly payment for $ 22,000 car with a $3,500 down payment and $500 trade-in if term of loan is 5 years and the annual interest rate is 5%.

  Virtualized and cloud environment

Explain various security concerns and measures in the virtualized and cloud environment.

  Linux implementation proposal

Determine the hardware to be used and the installation options. How will systems receive IP addresses? Explain. Manpower Estimates must be detailed.

  Educational information is safeguarded

From the e-Activity, discuss how students' educational information is safeguarded. Decide if you believe that the safeguard methods are sufficient, too stringent, or too lenient and support your answer.

  The sum of the first even integers true or false

The sum of the first 17 even integers is 306. True or False Answer

  Which is the most effective way to apply force to the wrench

Also, why is it best to keep the car tire on the ground rather than first jacking it up? Explain your answers with an equilibrium analysis.

  Derive excitation and output equations

Construct a state and output table and show that the circuit behaves as a positive edge-triggered flip-flop.

  Pseudocode algorithm for a computer store

Write a pseudocode algorithm for a computer store that inputs the type of customer and the amount of the purchase

  Can hdm and gypsy be used interchangeably

Contrast the goals of the Gypsy Verification Environment with those of HDM. In particular, when is using HDM appropriate, and when is using Gypsy appropriate? Can HDM and Gypsy be used interchangeably?

  Method of attack and preventative measures

Describe the method of attack and preventative measures. Also post your paper to discussion 3 and reply to two of your classmates' posts.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd