Describe the methodology behind constructing one

Assignment Help Operating System
Reference no: EM13739083 , Length: 3

Imagine that you work as the project manager for an IT department. Your organization has recently approved the development of a mobile application. As the project manager, you will manage the development of the project. The project will include user experience (UX) design by a consultant, graphic design by a team of two contracted designers, and in-house application development by a team of three (3) programmers and a database developer.

Deliverable 1: Summary (MS Word or open source equivalent)

a. Write a one to two (1-2) page summary document in which you:

b. Summarize the project requirements and other assumptions (i.e., budget, human resources, workload, environmental dependencies, etc.).

c. Define a work breakdown structure and describe the methodology behind constructing one.

Deliverable 2: WBS (MS Project or open source equivalent)

d. Use Microsoft Project or an open source equivalent to create a WBS which addresses the following:

e. Contain at least five (5) main tasks, one (1) for each of the PMBOK process areas.

f. Contain at least thirty (30) line items distributed in five (5) or more work packages.

g. Contain Work Breakdown Structure Code for each task.

h. Present duration estimates for each task that results in a duration estimate for the project not to exceed the requirements described in the overview.

The specific course learning outcomes associated with this assignment are:

o Explain and apply the phases of the project management life cycle.

o Develop processes that initiate technology projects, including project selection and defining project scope.

o Analyze and develop project schedules with appropriate techniques and software tools.

o Use technology and information resources to research issues in information systems and technology.

Reference no: EM13739083

Questions Cloud

What was the kansas nebraska act : What was the kansas nebraska act?
Perform a job analysis of each position : Describe your method of collecting the information for the job analysis (i.e., one-on-one, interview, survey, etc.).
The fate of opel : The once mighty General Motors, unable to survive by meeting the needs of customers turned to the taxpayers for a bailout in the U.S. In Europe its Opel subsidiary required similar life support from the German government. However, GM wanted to get..
Define and explain franchising : From a franchisor standpoint, seeking to expand the business by appointing qualified franchisee candidates is among the most important strategic decision. Define and explain "franchising.
Describe the methodology behind constructing one : Explain and apply the phases of the project management life cycle and develop processes that initiate technology projects, including project selection and defining project scope - Define a work breakdown structure and describe the methodology behind ..
Communicate the company culture : Select a company you are familiar with. Imagine that this company is developing materials to communicate the company culture, process, procedures, and general information for a new hire.
Research capacity management : Capacity management in businesses is a function of their operations and environment. In today's business world, evaluating and managing capacities is becoming significantly more difficult. Therefore, managers need to do a balancing act to reduce c..
How many paying customers are needed : If the Event A organizer plans to make a profit of $35,0000, how many paying customers are needed and How many paying customers do we need to break even for the Event A below
New executives to the organization : Create a checklist of steps to ensure that executive onboarding will result in a timely and efficient process to orient new executives to the organization and provide the rationale for the sequence you develop.

Reviews

Write a Review

Operating System Questions & Answers

  Explain the role of antennas in transmission

Explain the role of antennas in transmission of radio waves. Determine what type of antenna is typically used in a wireless LAN?

  Network security related question

Assume we want to use Kerberos for securing electronic mail. The obvious way of accomplishing this is for Alice, when sending a message to Bob,

  Ext4 file systems on linux vs. ntfs file systems

List what characters are absolutely not allowed for ext4 file systems on Linux vs. NTFS file systems on Windows in a plain text document.

  A distributed file service

explain if 5 clients accessed the same file in a Distributed File Service how many copies of the file may exist on the network? List where the copies are.

  Microsoft traditional and current name resolution approaches

Determine Microsoft traditional name resolution approaches and Microsoft current name resolution approaches also discuss the differences between them?

  List at least 5 significant differences between the two you

select two of the following os avoid combinations that your classmates have picked already windows unix andor linux mac

  Specify the order in which processes execute

Specify the order in which processes execute and determine the mean process turnaround time for each of the scheduling algorithms.

  What is the maximum consecutive period

What is the maximum consecutive period of time any process remains in the ready queue (the max waiting time) expressed in terms of N,S,Q?

  Computing the access time

Main memory uses a block transfer capability & has 1st word (four bytes) access time of fifty ns and access time for following words as 5 ns.

  Multiple choice - system analysis and design

The primary benefits of the Waterfall Development methodology is needs are completely specified and held relatively constant prior to programming.

  Why does concurrency lead to programming errors

Why does concurrency lead to programming errors that are difficult to locate? Give as concrete an example as you possibly can?

  Explain the difference between a cpu-bound process

Explain the difference between a CPU-bound process and an I/O bound process in terms of the length of CPU burst and the length of I/O burst. Why is it important for the operating system to select a good mix of I/O bound and CPU bound processes?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd