Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Technology review What technology is currently being used to support virtual teams? Provide a brief evaluation of the pros and cons of that technology. Research

Technology review

What technology is currently being used to support virtual teams?

Provide a brief evaluation of the pros and cons of that technology.

Research at least two other technology options that you consider would be better for supporting teams in virtual environments.

Describe the technologies here and pros and cons.

Remember that you will present this information at the virtual meeting so ensure your Portfolio includes enough information that you can use to speak at the meeting. You do not have to develop a presentation, you can just speak to your notes.

Protocols for knowledge sharing

Develop a one page document with protocols for knowledge sharing and that specifically relate to working collaboratively in a virtual team environment.

You can design your document in any way as long as it is clear and easy to read.

Include at least five protocols.

List the name of your document here and attach it to your Portfolio.

Protocols for cyber security

Develop a one page document with protocols for cyber security and that specifically relate to working collaboratively in a virtual team environment.

You can design your document in any way as long as it is clear and easy to read.

Include at least five protocols.

List the name of your document here and attach it to your Portfolio.

Make sure your protocols align with the organisation's cyber security procedures. If you are completing this for the case study business, this will be as per the information in your Simulation Pack.

In the virtual meeting at Activity Step 2.5, you will not be able to test compliance with cyber security protocols directly but you should question your team about whether they are following the protocols you have developed.

Team information

As you need to make sure your team is informed of the knowledge sharing protocols for use at the meeting and cyber security procedures to follow, develop an email and send it to your team with your protocols attached. Attach a screenshot of the email to your Portfolio and list the name of the document here.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networks

Authors: Andrew S. Tanenbaum, David J. Wetherall

5th edition

132126958, 978-0132126953

More Books

Students also viewed these Computer Network questions

Question

Verify the formula given for the Pi of the M/M/k.

Answered: 1 week ago