Describe the scope of the project and control measures

Assignment Help Basic Computer Science
Reference no: EM131197082

Project Plan

This assignment consists of three sections: a written project plan, a revised Gantt chart or project plan, and a project plan PowerPoint presentation. You must submit the three sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

While taking all business and project parameters into consideration, make quality assumptions to support the following requirements.

Section 1: Written Project Plan

You are now in the final stage of the project plan development. All previous documentation will be combined into one document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team and the venture capital group. The project plan is very detailed which is appropriate to accomplish the monumental task of implementation. However, the executive team is only interested in a ten minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive group that your solution is optimal.

1. Write an eight to ten page executive summary in which you provide a high-level technical overview of your project where you address the following:

a. Describe the scope of the project and control measures.
b. Describe the goals and objectives of the project.
c. Give a detailed, realistically estimated cost analysis of the entire project.
d. Relate the value of the project plan solution to the competitive advantage that information technology will afford your organization.
e. Provide all aspects of the information technology implementation into the project plan.
f. Use at least five quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in MS Visio and MS Project as appendix of the Word document. Make reference of these files in the body of the Word document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 4: Infrastructure and Security, with all the project tasks.

Section 3: Project Plan PowerPoint Presentation

Additional to your detailed executive summary you must present your findings to the executive team and the venture capital group that, along with the executive summary, will convince the group that your solution is optimal.

3. Create a ten to fifteen slide PowerPoint presentation in which you:

a. Illustrate the concepts from your written report in Section 1 of this assignment.

b. Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.

c. Use a professional technically written style to graphically convey the information.

Reference no: EM131197082

Questions Cloud

Mock spss data construction and analysis : Trust in Online Banking: Mock SPSS Data Construction and Analysis - This paper proposes to delve analytically into the antecedents of trust towards online financial service providers by consumers intending to establish clarity about what conditions..
Region of space where it experiences : A negatively charged particle is released from rest in a region of space where it experiences a constant force in the +z direction. In which direction will it move (+z or -z)? And at what velocity? (constant, constantly increasing, constantly decr..
Find the appropriate level ii sampling plan : Suppose a lot of size 3,000 is to be sampled by attributes. An AQL of 4% is specified for acceptable lots.
Compute the annual depreciation and carrying value : Compute the annual depreciation and carrying value for the robot for each year assuming the following depreciation methods:- straight-line, production.
Describe the scope of the project and control measures : Describe the scope of the project and control measures. Describe the goals and objectives of the project. Give a detailed, realistically estimated cost analysis of the entire project.
List the five steps typically involved in the behavior model : Briefly describe why it is insufficient to define a career plateau as a period of time in which an individual is not advancing up the organization's hierarchy.
Should this thread be used on the garments : A random sample of 50 measurements on a certain thread gave a mean breaking strength of 210 grams and a standard deviation of 18 grams. Should this thread be used on the garments?
Straight path with an average velocity : A bus travels 240 km south along a straight path with an average velocity of 90 km/h to the south. The bus stops for 24 min, then it travels 220 km south with an average velocity of 74 km/h to the south. How long does the total trip last? Answer in ..
Identify the financial statements : Identify the financial statements on which each of the following items appears by placing a check mark in the appropriate column.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Operating systems for mainframe computers

What are the main differences between operating systems for mainframe computers and personal computers?

  Add all of the numbers except for the sentinel.

The following loop is supposed to read some numbers until it reaches a sentinel (in this case -1). It is supposed to add all of the numbers except for the sentinel.

  Peter sold an investment property in sydney and the

1.this assignment is to be submitted in accordance with assessment policy stated in the subject outline and student

  The concept of global and scope of variables

Having looked at what happens to variables within functions and the concept of global and scope of variables, reflect on why Vectors are such a useful data structure. Explain your reasoning and provide examples to support it.

  What features of the product could serve as design variables

Conceive a modern real life product ( e.g. , smartphone, solar PV, or PHEV) where optimization can be used to further improve its design. Describe the scope of applying optimization in that context. Specifically state (i) what objectives will need to..

  How has modern technology impacted people''s views on ethics

Has the view of what is right or wrong in American culture changed in the last 20 years as a result of people's increased use of information technologies?

  Find the meaning of the terms hue

find the meaning of the terms hue, saturation, and brightness (or luminance), and how these color models are related to the CMYK and Pantone color schemes.

  The cpu fetch-execute cycle

A von Neumann machine has a random-access memory and each successive operation can read or write any memory location, independent of the location accessed by the previous operation and also has a CPU with one or more registers that hold data that are..

  What happens when we start a connection

Suppose TCP senders did reliably get explicit congestion indications from routers. Assuming links as above were common, would it be feasible to support window sizes much larger than four segments? What would TCP have to do?

  Web server application attacks

It is common knowledge that Web server application attacks have become common in today's digital information sharing age. Understanding the implications and vulnerabilities of such attacks, as well as the manner in which we may safeguard against t..

  Test program that prompts the user to enter an integer

Use the reverse method to implement isPalindrome. A number is a palin- drome if its reversal is the same as itself. Write a test program that prompts the user to enter an integer and reports whether the integer is a palindrome.

  Disk that has both logical and physical block sizes

Consider a file system on a disk that has both logical and physical block sizes of 512 bytes. Assume that the each file is already in a memory. The file size is 512k and we are currently at a logical block 5 and want to access the information at o..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd