The mobile application development project

Assignment Help Basic Computer Science
Reference no: EM13781100

Imagine that you are employed as an IT project manager by a prestigious coffeemaker organization. This organization operates many coffee shops within the region and would like to promote its brand by creating a mobile application that will provide its customers with the ability to view the nearest coffee shop location within their geographical area.

As a member of the software development team, you estimate a total project cost of $150,000. You have designated control points to measure project progress. At control point 2, the following data is available:

Budget Cost of Work Performed
$ 24,000
Actual Cost of Work Performed
$ 27,500

There are various stakeholders that are interested in the progress of the project. These stakeholders include the marketing management team (internal customers), software designers, programmers, testers, and upper management. The software development team has attempted to release a mobile application of this magnitude in the past; however, lack of sponsorship, mobile development expertise, and technical infrastructure has limited the team's success.

Write a four to six (4-6) page paper in which you-

Identify at least four (4) attributes of the mobile application development project that can be measured and controlled and evaluate how each is a critical factor for the success of the project.

Generate a project plan summary of the various project milestones. Develop a WBS that details work packages required to complete project scope.

Develop a workflow model that can be used to inspect and detect defects during the acceptance of this mobile product through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Describe how the defects detected during the acceptance of the mobile application should be reported and explain the circumstances in which a defect may not require reporting.

Analyze the communication needs of the different project stakeholders. Explain the types of project status reports that would be useful to each.

Compute the cost variance, schedule variance, cost performance index, schedule performance index, and estimated actual cost using the information presented at control point 2. Interpret the project schedule and budget status from the calculations.

Explain how work package, binary tracking, and earned valued reporting can be used effectively during the maintenance phase of the software life cycle if various change requests may be assigned to individuals and processed on an individual basis.

Develop a risk register that will document all of the estimated risks. Assign one (1) risk management technique for each risk and explain the basis for your selection.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13781100

Questions Cloud

Shared reading workshop : You are preparing a workshop for parents that focuses on literacy activities they can do with their child that develop reading and writing. Create a PowerPoint presentation of no less than 10-15 slides that discusses the rationale for specific act..
Write a paper about seam roller design : Write a paper about Seam Roller Design.
Law should be in compliance with california state law : For your final task in this contractual theme, this week you will provide your department with an understanding of cyber crimes that we see in the business world.
Pretrial diversion program : As a new intern, it is your turn to present to the pretrial diversion program staff luncheon this week. All employees and interns take turns presenting each Thursday at noon at the staff luncheon. You have only been an intern for a few months and ..
The mobile application development project : Identify at least four (4) attributes of the mobile application development project that can be measured and controlled and evaluate how each is a critical factor for the success of the project.
Describe the welfare costs of a monopoly : Describe the welfare costs of a monopoly and discuss the regulator organizations that monitor anti-trust inAmerica. Name these organizations and their functions.
The ones who walk away from omelas : Read the American writer Ursula LeGuin's "The Ones Who Walk Away from Omelas" Write an essay in which you analyze the theme of the individual and society in that story.
What factors constitute a safety net : What factors constitute a "Safety Net" offered by a central bank to its commercial bank? What is the role of each factor?
Write an essay for my teacher about a life lesson : Write an essay for my teacher about a life lesson that I learned alot of things from. what is the lesson? How did the lesson affect my life and how did it chenged me.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Half-wave and full-wave rectifier

Half-wave and Full-wave Rectifier The half-wave rectifier has a diode in series with a load resistor. True False

  How i should write out the source file

Given struct vector scale_vector (struct vector v, double scalar) for the header file.

  Establishing an effective it security policy framework

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing t..

  The debate about centralization and decentralization

1. The debate about centralization and decentralization is heating up again with the advent of network computing and the increasing use of the Internet. Does the Internet make this debate more relevant? If you find any interesting articles on t..

  What is not a problem associated with poor data management

What is not a problem associated with poor data management? a. essential data missing from the database b. inability to locate data c. system down time d. inconsistencies in representations

  User experience framework

The user experience framework also informs about the relationship between a conceptual model and a user's understanding of it for past, current, and future systems. The case study actually consists of two studies

  A virtual boolean method that indicates

Data members should include all those inherited plus any you want to add  Member functions should include any inherited methods, plus at least  A virtual Boolean method that indicates whether the player gets another card  A method that announces that..

  Describe how they are similar

5.  Cloud computing is used as a means to provide off-site computing power to an organization. Compare cloud computing with grid computing and describe how they are similar and at least one way in which they differ.

  Methods-majority of target audience can play applications

What are some methods that we can guarantee that majority of target audience can play applications?

  Data breaches and regulatory requirements

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics.

  A word document containing all of the identified methods

A word document containing all of the identified methods for the "Zoo Organizer"

  Arrays for computer science

Initialize the array with the appropriate number of values.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd