Critical path analysis, Computer Engineering

Assignment Help:
  1. Given the information provided in Table 1:
    1. Prepare an Activity on the Node (AON) Network Diagram ( I recommend you  use MS Project or any drawing tool);
    2. Prepare a table of the possible activity paths and identify the critical path;
    3. Assume that adding an additional person to the project allows the project manager to reduce any task under PM control that is 4 or more days long by one day (tasks P, Q, and R are external and cannot be changed). How does this affect the critical path, and what is the duration of the project with the added resource?

Important Note:  Be sure to take into consideration any special dependencies indicated in the chart (e.g., start-to-start, finish-to-finish) when calculating durations, slack, critical path, etc.  The normal dependency unless otherwise stated is finish-to-start. If there is a delay between two activities, it is shown as a plus or minus offset.  For example, a start-to-start + 5 dependency means the dependent task is planned to start 5 days after the start of the predecessor task.  Any special dependencies shown only apply to the immediate task listed to the left, not to the other tasks in the list.

Table.  Desktop Installation Project

Activity

Description

Estimated Duration (Days)

Predecessor

A

Determine workstation applications

5

-

B

Determine hardware specifications

5

A

C

Determine image configurations

3

B

D

Purchase evaluation workstation

5

B

E

Purchase workstation software

5

C

F

Create image

2

D, E

G

Test image

2

F

H

Customer acceptance testing of image

3

G

I

Prepare purchase order

3

A, B, H (Finish to Finish)

J

Acquire workstations

8

I

K

Install image on workstations

8

J

L

Install workstations on site

6

Q, K (Start to Start + 4)

M

Connect workstations to network

6

P, L (Start to Start +2)

N

Test workstations

6

M (Start to Start +2)

O

Prepare closeout report

3

N

P

Test network connections

6

B

Q

Install furniture

10

R

R

Acquire furniture

16

B


Related Discussions:- Critical path analysis

What is read-only-memory, Q. What is Read-only-Memory? Read only memory...

Q. What is Read-only-Memory? Read only memory is an illustration of a Programmable Logic Device (PLD) it implies that binary information which is stored within a PLD is specifi

Uml, what is uml ?

what is uml ?

What is over-clocking, Overclocking is the process of making a computer or ...

Overclocking is the process of making a computer or component operate faster than the clock frequency particular by the manufacturer by modifying system parameters. One of the most

Define word/byte rotation and xor bit masking encryption, Define Word/byte ...

Define Word/byte rotation and XOR bit masking encryption technique to make sure secured transactions on the net? Word/byte rotation and XOR bit masking: In this process t

Function wallsintact, We also need to know, given a cell, which of its neig...

We also need to know, given a cell, which of its neighbours has all of its walls intact. Write the function wallsintact that accepts the grid and a list of neighbouring cells and r

Develop a menu-driven application, In assignment you are required extend th...

In assignment you are required extend the Patient class to implement an  Inpatient  class,  representing a patient who is admitted to the hospital for a longer term and who may req

Full form of www, What do you understand by WWW WWW: The World Wide ...

What do you understand by WWW WWW: The World Wide is an architectural framework for accessing linked documents increase out over thousands of machines all over the world. It

Explain dataflow computation model, Explain dataflow computation model ...

Explain dataflow computation model An option to the von Neumann model of computation is a dataflow computation model. In a dataflow model the control is tied to the flow of dat

Explain the term middleware in context of rpc, Explain the term middleware ...

Explain the term middleware in context of RPC. A variety of commercial tools have been urbanized to assist the programmer in constructing client- server software. These tools a

What is public key cryptography, What is Public Key Cryptography Publi...

What is Public Key Cryptography Public-key cryptography is a form of modern cryptography which permits users to communicate safely without lastly agreeing on a shared secret

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd