Risk identification

Assignment Help Basic Computer Science
Reference no: EM13307921

Risk Identification . 

You have been assigned as the manager on a project to develop a new application system for your business partner. You were given two weeks to develop a project plan and high level cost estimates. 

Unfortunately, this is a relatively new technology for the company, and although the technology has been tried and tested elsewhere, there are no previous internal projects you can use to help estimate. Your initial estimate calls for a six-month development effort with a planned staff of 10. 

The system takes data feeds from three upstream applications, and sends information back to two of them. You have never worked with these three systems in the past, although one of your developers used to work in the group that supports one of them. An upstream application is one that your own program is not aware of. Essentially it is a program that feeds data to an ETL (extract, transform and load) process which in turn feeds the data to another process. Your app knows about the ETL, but it doesn''t know where the data loader is getting its data from - the upstream program. 

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy. 

Include relevant information--facts and/or opinions--from “expert” sources to support selections. Citations and references must be written in Harvard style of citation. Your paper should be approximately 850-1000 words not counting title page and references.

Verified Expert

Reference no: EM13307921

Questions Cloud

Apply economic concepts to real world applications : Relates to content and skills covered in Week 7 of the Weekly Study Program, Chapter 32 of Ganset al. (2012). Refer here to the comments given for Week 7 for assistance in answering this question.
Write a program that prompts the user to enter an integer : Write a program that prompts the user to enter an integer, n, and the n floating-point numbers. As the numbers are read, the program will calculate the average of the positivie numbers.
Newly acquired knowledge of energy economics : The integrated project is designed to tie your newly acquired knowledge of energy economics to the analysis of major global issues you will likely face in your career.
Why does the label control that contains your name print : why does the label control that contains your name print above the page number?
Risk identification : You have been assigned as the manager on a project to develop a new application system for your business partner. You were given two weeks to develop a project plan and high level cost estimates.
What has been the change in internal energy of the gas : A cylinder with a moveable piston holds .20 lb of hydrogen initially in a volume of 1 cu ft at a tem-perature of 1300 F. Then the volume is expanded to 2.5 cu ft while the gas pressure remains constant.
Terms of diversity : Description: Write a report about your workplace analysing it in terms of diversity. Convince your manager to develop a "Diversity Management Strategy" by explaining the advantages of having such a strategy. Support your argument with evidence, resea..
What volume of leachate is being added to the river each day : A landfill is located 500 km from a river whose surface elevation is 40 m lower than the ground elevation at the landfill. After several years it is discovered that leachate from the landfill, with a COD of 1300 mg/L, is leaking into the river.
Why do companies fail at risk management : Why do companies fail at risk management? In responding to the question, draw from your own experiences, the text, the topic notes, the additional readings, and/or any additional sources that you research and cite.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain enterprise architecture using zachman framework

In your opinion, does framework necessarily lead to the top-down approach to development, e.g. you start with models in row 1, then work on row 2 models, and so on?

  The basic solutions of the simplex method.

Solve the following problem by inspection, and justify the method of solution in terms of the basic solutions of the simplex method.

  Design the class doctortype

Design the class doctorType, inherited from the class personType, with an additional data member to store doctors speciality. Add appropriate constructors and member functions to initialize, access, and manipulate the data members.

  Trust and deception

Trust and Deception

  Highlight element enables highlight the text.true or false

The highlight element enables you to highlight the text. True or False

  Write a java program to demonstrate the use of linked-lists

Once you have processed the d4.dat file and the d4.delete file, it is a simple matter of iterating over the list and writing the object data to the outputfile. The output file size will be 22,725 or 27,270 bytes depending on platform and methods u..

  Describe two commercial technologies for use by small

Describe two commercial technologies for use by small or medium size businesses in effectively managing operations.

  Create directories in home directory begin-mac-mac directory

Create following directories in your home directory cp_even, cp_mid,cp_iso,cp,thousand,cp_even. Examine files in the /usr/share/tcl8.3/encoding directory copy all files which begin with mac into mac directory.

  What is the goal of computer forensics

What is the goal of computer forensics? How do investigators retrieve and analyze data?How is the information used in investigations?

  Matrix that compares properties of four signal types

Discuss four different types of wireless technologies. Describe the characteristics and properties of each signal type, and how each can be used.

  Create a simple movie management system

Create a simple movie management system that manages a list of scheduled movies to be played at a fictitious movie theater. Your program must use of the "list" API in the C++ standard template library (STL).

  How implement memory allocation with strings

how implement memory allocation with strings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd