As a member of the information security team at a small

Assignment Help Computer Engineering
Reference no: EM13462408

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system.  The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.

Create a 3-4 page project plan for this project in which you:

  1. Include a one-half page project scope statement.
  2. Define five major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
  3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
  4. Create a system diagram illustrating the equipment and connections required for this project.

Your assignment must:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

  • Distinguish between non-functional and functional requirements.
  • Use contemporary CASE tools in process and data modeling.
  • Use technology and information resources to research issues in systems analysis and development.
  • Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Verified Expert

The solution file is prepared in ms word which discussed about to build an access control list for small college. The report has introduction , problem statement , Gantt chart of project, system design , Major task and conclusion of the project. The project plan done it in ms project to create task and Gantt chart of the project. The report has 1300 words around and references are included as per APA format.

Reference no: EM13462408

Questions Cloud

Explainnbspto tednbspwhatnbspa supply chain management scm : in 1985 ted thomas took 6000 of his savings borrowed another 4000 from his best friend and opened a bike rental
Linear programming algorithm requires that a single goal or : 1.operating systems can be designed to support a single user or multiple users. you can run software slowly in a batch
Using microsoft visio powerpoint or word create a network : using microsoft visio powerpoint or word create a network diagram containing the following components workstation
Discuss some of the information technology needs of health : write 400-600 words that respond to the following questions with your thoughts ideas and comments. be substantive and
As a member of the information security team at a small : as a member of the information security team at a small college you have been made the project manager to install an
One of the main functions of any business is to be able to : one of the main functions of any business is to be able to use data to leverage a strategic competitive advantage. this
Briefly explain some of the issues that a company may face : information systems use security policy write a paper consisting of 500-1000 words double spaced about your experience
You are working with php a general-purpose server-side : you are working with php a general-purpose server-side scripting language that allows you to add a lot of function
Describe what a relational database is and why relational : you are the trainer for a major technology firm. one of the problems your firm has is hiring new technologists who have

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionwrite down java-like pseudocode to specify the

questionwrite down java-like pseudocode to specify the logic for following program application-write down an

  Given the dblc as a structured methodology for designing

Given the DBLC as a structured methodology for designing and implementing a database system, explain the activities that are associated with each phase.

  Create an alien class

make an Alien class. Include at least three protected data members of your choice for each data field and toString () method that returns a String containing a complete description of the Alien. Save the file as Alien.java

  Developing the database of company

Enable the user in order to input a last name; then find the file and show all the names and phone numbers corresponding to that last name.

  Define a class

Using object oriented programming, define a class, and present what constructors would be necessary.

  How to create a checking account balance code

compute the balance by adding deposits and subtracting service charges and checks. Include buttons for calculate, Clear, Print, and Exit. Please put comments in the code.

  Suppose further that this isp is deliberately dropping 25

suppose an internet service provider isp has a voice over ip voip telephone system that is manages and sells. suppose

  Write down a program tht reads this information

People from three different income levels, A, B, and C, rated each of two different products with a number 0 through 10. make a file in which each line contains the income level and product rankings for one respondent.

  Explain computer forensics software

Research using a Web search engine for at least two products or tools that would help you to investigate an incident based upon a scenario.

  Add items to the arraylist

Add items to the ArrayList, one at a time, based on user typed input. The user will be prompted for the String to be stored in the ArrayList and then hit enter. The user would be able to continue to add items to the ArrayList until they just hit e..

  Utilize routers for connectivity devices instead of hubs

Utilize routers for connectivity devices instead of hubs

  Find out the retail price for each product

A mail-order house sells five products whose retail prices are as follows: Product 1, $2.98; product 2, $4.50; product 3, $9.98; product 4, $4.49; product 5, $6.87.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd