Draft compliance matrix and compliant proposal to rfp

Assignment Help Computer Network Security
Reference no: EM13940213

Assignment: Draft Compliance Matrix and Compliant Proposal to RFP

Note: The assignments are a series of papers that build upon one another.

Refer to the following resources to complete this assignment:
FAR § 15.2 (Solicitation and Receipt of Proposals and Information)

As the Contract Officer (CO) of your newly formed company, you will create a compliance matrix, and then draft a proposal in response to the RFP from Assignment 2.

Write a five to seven (5) page Compliance Matrix and Compliant Proposal to your RFP paper in which you:
Create a compliance matrix and prepare a FAR-compliant proposal in response to the RFP from Assignment 2. Note: You may create and /or assume all necessary assumptions needed for the completion of this assignment.

Apply the appropriate FAR clauses in order to meet compliance in contract formulation and award.
Apply the knowledge gained from your analysis of Government Accountability Office reports / decisions to identify and account for FAR compliance issues and contributing factors.
Apply the knowledge of planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency is in compliance with the FAR requirements.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • The specific course learning outcomes associated with this assignment are:
  • Identify and apply the appropriate Federal Acquisition Regulation (FAR) clauses to meet compliance in contract formulation and award.
  • Analyze Government Accountability Office reports / decisions to identify FAR compliance issues and contributing factors.
  • Analyze the planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency is in compliance with the FAR requirements.
  • Given a contract disputes situation, evaluate the various options and select the appropriate administrative and judicial processes available to resolve the dispute.
  • Use technology and information resources to research issues in government contract law.
  • Write clearly and concisely about government contract law using proper writing mechanics.

Reference no: EM13940213

Questions Cloud

Create a spreadsheet model : Your task is to create a spreadsheet model (using Microsoft Excel) showing your friend which alternative is to prefer. In particular your friend wants you to show her the following in the spreadsheet model: Show by calculation what would be the p..
The dividend projected to be growing : Shares of SoHot Donuts common stock are currently selling for $15. Next year’s dividend is expected to be $1.50 per share and the market rate of return is 10%. At what rate is the dividend projected to be growing?
Explain concept of decoupled organization as it relates : Large organizations face the threat of becoming decoupled. Explain the concept of a decoupled organization as it relates to a criminal justice agency. Discuss some of the challenges that decoupling presents and strategies utilized by criminal just..
Equity prior to the announcement is expected gain or loss : FARO Technologies, whose products include portable 3D measurement equipment, recently had 17 million shares outstanding trading at $42 a share. Suppose the company announces its intention to raise $200 million by sell new shares. What do market signa..
Draft compliance matrix and compliant proposal to rfp : Create a compliance matrix and prepare a FAR-compliant proposal in response to the RFP from Assignment 2. Note: You may create and /or assume all necessary assumptions needed for the completion of this assignment.
Calculate the variable cost and contribution margin per unit : Calculate the variable cost per unit and the contribution margin per unit. Calculate the contribution margin ratio and the variable cost ratio.
Determine and print the weekly rate. : Write the Java Statements that retrieve the age of the child and the number of days the child will be at the day care center.
Estimate of the the call options value-stock price model : You are attempting to value a call option with an exercise price of $90 and one year to expiration. The underlying stock pays no dividends, its current price is $90, and you believe it has a 50% chance of increasing to $125 and a 50% chance of decrea..
Calculate the net present value for the two options : Show by calculation the net present value for the two options (selling cars, mileage fees). Also, according to NPV suggest which alternative you advise your friend to choose

Reviews

Write a Review

Computer Network Security Questions & Answers

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance

  Describe common security concerns inherent to wired

Describe common security concerns inherent to wired, wireless, and mobile networking.

  You work as a network administrator for a college located

you work as a network administrator for a college located in your local city. next door to the college is a new gated

  Management issues of computer security

What are the major defensive mechanisms that can be used to stop such attacks-Pick up one mechanism and comment on it - Management issues of computer security

  Ethics or values within the hacking subculture.

Write a 1-2 page essay defining and showing examples of hacking and its subculture. Do hackers have ethics or values? If so, give examples of ethics or values within the hacking subculture.

  Describe the purpose of a ddos attack

Describe the purpose of a DDoS attack. How is a DDoS attack configured. How can DDoS attacks be detected and prevented. Research the internet for a DDoS attack. Describe the events.

  It project management tasks

Project life cycle consists of different phases. Recognize the main IT project management tasks associated with the concept, development and closeout phases of the project life cycle.

  Secure software and systems

What are two of the best practices for developing secure software and systems? Why would each practice be suitable for an organization to implement to strengthen its information security posture? Describe the benefits of each.

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Where do the spams come from

Do you know what email clients the spammers use to generate their spams?

  What plan will you follow to assign printers to all the user

What plan will you follow to assign printers to all the users in the organization and how will you use your network administrator skills and knowledge in assigning IPs to each user?

  Cryptography methods to protect organizational information

Research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd