As a member of the information security team at a small

Assignment Help Computer Engineering
Reference no: EM13462408

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system.  The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.

Create a 3-4 page project plan for this project in which you:

  1. Include a one-half page project scope statement.
  2. Define five major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
  3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
  4. Create a system diagram illustrating the equipment and connections required for this project.

Your assignment must:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

  • Distinguish between non-functional and functional requirements.
  • Use contemporary CASE tools in process and data modeling.
  • Use technology and information resources to research issues in systems analysis and development.
  • Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Verified Expert

The solution file is prepared in ms word which discussed about to build an access control list for small college. The report has introduction , problem statement , Gantt chart of project, system design , Major task and conclusion of the project. The project plan done it in ms project to create task and Gantt chart of the project. The report has 1300 words around and references are included as per APA format.

Reference no: EM13462408

Questions Cloud

Explainnbspto tednbspwhatnbspa supply chain management scm : in 1985 ted thomas took 6000 of his savings borrowed another 4000 from his best friend and opened a bike rental
Linear programming algorithm requires that a single goal or : 1.operating systems can be designed to support a single user or multiple users. you can run software slowly in a batch
Using microsoft visio powerpoint or word create a network : using microsoft visio powerpoint or word create a network diagram containing the following components workstation
Discuss some of the information technology needs of health : write 400-600 words that respond to the following questions with your thoughts ideas and comments. be substantive and
As a member of the information security team at a small : as a member of the information security team at a small college you have been made the project manager to install an
One of the main functions of any business is to be able to : one of the main functions of any business is to be able to use data to leverage a strategic competitive advantage. this
Briefly explain some of the issues that a company may face : information systems use security policy write a paper consisting of 500-1000 words double spaced about your experience
You are working with php a general-purpose server-side : you are working with php a general-purpose server-side scripting language that allows you to add a lot of function
Describe what a relational database is and why relational : you are the trainer for a major technology firm. one of the problems your firm has is hiring new technologists who have

Reviews

Write a Review

Computer Engineering Questions & Answers

  1 the project could fail because the cost of a key

1. the project could fail because the cost of a key component has increased and we could build a product that does not

  Questionproduce a book class that stores book information

questionproduce a book class that stores book information. your book class will store following-book titleauthors first

  The third project involves writing the semantic analyzer

the third project involves writing the semantic analyzer for the compiler that was begun in the previous projects. to

  Administration, performance for the database

According to you what would be the inherent problems of the database auditing if program was not implemented with the careful thought and consideration? Consider administration, performance, and other factors.

  What is the role of the world trade organization

define the basic forms of conducting international business (export/import, licensing/franchising, contract manufacturing/outsourcing, joint ventures/alliances, and direct investment), and basic international business strategies (multinternationa..

  Find out the retail price for each product

A mail-order house sells five products whose retail prices are as follows: Product 1, $2.98; product 2, $4.50; product 3, $9.98; product 4, $4.49; product 5, $6.87.

  Define working with database tables

For this assignment, you would create a Visual Basic.NET application based on the skills and concepts used in IP2. In this exercise, you will create a solution that works with two tables having a Master/Detail relationship.

  Define an example of a one-to-one relationship

Look for an example of a one-to-one relationship, an instance of a one-to-many relationship, and an example of a many-to-many relationship in a newspaper, magazine, book, or everyday situation you encounter.

  Implement the lzw algorithm

The LZW algorithm compresses a given text by figuring out patterns which appear very often in the text. The basic idea is to replace (perhaps very long) patterns which appear many times by a much shorter code. Read about this algorithm here .

  For benefit of upper management that is non-technical

What edition of Windows 2003 server would you use for your domain controller? If you required four way clustering for Sherrill's Web server, what edition of Windows Server 2003 would you use.

  What is the dissimilatries between rfp and rfq

What is the dissimilatries between an RFP and an RFQ? Are they different, or the same? How does RFI associated to them

  Write down a java application that reads customer''s income

Write down a Java application that reads customer's income for few years from a file (income.txt), and calculates the average tax customer needs to pay per year. suppose that customer's tax bracket is 30%.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd