Define a work breakdown structure

Assignment Help Basic Computer Science
Reference no: EM13768026

Assignment On Mobile App- Work Breakdown Structure

This assignment contains two (2) deliverables: a summary document to be delivered in a word processor document format and a Work Breakdown Structure (WBS) to be delivered in a project file.

Overview:

Imagine that you work as the project manager for an IT department. Your organization has recently approved the development of a mobile application. As the project manager, you will manage the development of the project. The project will include user experience (UX) design by a consultant, graphic design by a team of two contracted designers, and in-house application development by a team of three (3) programmers and a database developer.

1: Summary (MS Word or open source equivalent)

Write a one to two (1-2) page summary document in which you:

Summarize the project requirements and other assumptions (i.e., budget, human resources, workload, environmental dependencies, etc.).
Define a work breakdown structure and describe the methodology behind constructing one.

2: WBS (MS Project or open source equivalent)

Use Microsoft Project or an open source equivalent to create a WBS which addresses the following:

Contain at least five (5) main tasks, one (1) for each of the PMBOK® process areas.

Contain at least thirty (30) line items distributed in five (5) or more work packages.

Contain Work Breakdown Structure Code for each task.

Present duration estimates for each task that results in a duration estimate for the project not to exceed the requirements described in the overview.

Reference no: EM13768026

Questions Cloud

Assignment on multinational corporation expansion : Imagine that you are a senior business manager for a U.S.-based multinational company. You have been informed by your supervisor that your Company needs to consider expanding into a new international market to seek new opportunities.
Which type of report do you feel will be the most difficult : Which type of report do you feel will be the most difficult to write and why? What practices will you employ and develop to improve your report writing techniques
Ecology environment such as realistic-renewable resource : It is easy to criticize society for not using renewable resources, but in reality, how difficult would this transition be? What processes and procedures would be involved? How would such a transition be made?
Define a work breakdown structure : Summarize the project requirements and other assumptions (i.e., budget, human resources, workload, environmental dependencies, etc.). Define a work breakdown structure and describe the methodology behind constructing one.
Factors affect the four functions of management : Explain how internal and external factors affect the four functions of management - Select an organization you are familiar with.
What conclusions does descartes draw from this : The testimony of our senses: The first doubt that Descartes discusses focuses on the idea that our senses occasionally mislead us. What conclusions does Descartes draw from this? Do you agree with his line of thought? Why or why not
Calculate the price elasticities of demand and indicate : Calculate the price elasticities of demand and indicate whether your result shows that demand is price inelastic, price elastic, or unitary elastic - determine exactly how many cookies Paco will eat every day, it is possible to determine the maxim..
Number of shares to be used for calculating : (a) The number of shares to be used for calculating: (Round answers to 0 decimal places, e.g. 2,500.) (1) Basic earnings per share shares

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which of these conditions returns true

Which of these conditions returns true? Check the Java documentation for the inheritance patterns.

  Entrepreneurs is starting a new data storage

An enterprising group of entrepreneurs is starting a new data storage and retrieval business, SecureStore, Inc. For a fee, the new company will accept digitalized data (text and images, multimedia), and store it on hard drives until needed by t..

  Is the intersection of these languages context free

is the intersection of these languages context free? Why or why not?

  What is the total distance

Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. The drive is currently serving a request at cylinder 143, and the previous request was at cylinder 125.

  How to use dynamic programming to optimally make change

Consider a coin system for which we know the greedy algorithm would fail to always provide optimal change: d = [1,5,8] . Show how to use dynamic programming to optimally make change for 10 units.

  Make the contents of your script resident in memory

Modify your whoisthere function so that you can enter "These are the folks logged in:" as an argument to appear before your list of who is logged in to the system.

  Review or appraisal based on careful analytical evaluation

Your analysis should explore the positives and negatives in each case and reach a balanced view of the strengths and weaknesses of the person you have selected.

  Assignment related to mcqs

Which one of the following is a correct SELECT clause in a VBScript program for selecting the fields: FirstName and LastName and Age? SELECT FirstName and LastName and Age, SELECT FIELDS(FirstName,LastName,Age, SELECT FirstName,LastName,Age, SELECT..

  Determine the delays of the carry out bit c48

Determine the delays of the carry out bit c48 and the gate complexity, i.e, the numbers of AND, OR and XOR gates needed for implementing the following 48-bit adders.

  The three common security goals

1. Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database. Classify each vulnerability with being technical, managerial,..

  What type of address is stored in the source address field

What type of address is stored in the Source Address field of an Ethernet frame

  Describe the use of the remote network monitoring

Describe the use of the Remote Network Monitoring (RMON) protocol and its relationship to SNMP.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd