Control procedures-pert and gantt charts

Assignment Help Basic Computer Science
Reference no: EM131825922

Control Procedures: PERT and GANTT Charts

The role of an operations manager is to ensure products are manufactured and delivered on time, on budget, and to customer specifications. Two primary techniques are used to monitor the progress of production and aid both managers and employees in constantly monitoring production and activities associated with meeting deadlines. The use of PERT and GANTT charts can aid in maximizing operational effectiveness in an organization that relies on production.

Developed in the 1950s for constructing nuclear submarines, the program evaluation and review technique (PERT) assists users in analyzing the tasks to carry out given project, estimate the time needed to complete each task, and compute the minimum time needed to complete the whole project. This allows users to calculate the critical path, which is the sequence of tasks that takes the longest time to complete. This aids in monitoring for delays in the process. The GANTT chart is a simple bar chart and a strategy manufacturers use for monitoring production progress. This bar chart identifies what projects are being worked on and how much has been completed at any given time.

Determine in each scenario whether he/she is using the PERT chart or GANTT chart

1) Calton is studying the production progress of several projects going on in the company.

2) Owen is computing the minimum time needed to complete the whole project.

3) Aidan reviews the projects in progress to determine how much of each has been completed at a given time.

4) Eilysh is attempting to identify the sequence of tasks that takes the longest to complete.

5) Taryn uses her computer to track what projects are being worked on.

6) Nicolas is analyzing tasks to carry out a particular project.

7) Julia is the production manager and is interested to see at a glance when projects are scheduled to be completed and what the status is now.

8) Drew is estimating the time needed to complete each task associated with a given project.

Reference no: EM131825922

Questions Cloud

Discuss the regulatory issues company faces : Discuss the regulatory issues your company faces if it should choose to use this new stuffing with the "second skin." What federal regulatory agencies
Favorite requirements-gathering method : As a business analyst, what would be your favorite requirements-gathering method and why? Least favorite, and why?
Analyze the data collection efforts detailed in the study : Describe and analyze data collection efforts detailed in study. Justify methodological recommendations for data collection methods for which you would advocate.
Cross exchange rate of the polish zloty : By what percentage did the cross exchange rate of the Polish zloty in Swedish kronor change over the last year?
Control procedures-pert and gantt charts : The role of an operations manager is to ensure products are manufactured and delivered on time, on budget, and to customer specifications.
Explain your sense of idealism or realism : You an idealist as in Platonism, or are you a realist like Aristotle? Explain your sense of idealism or realism with at least three specific examples
Evaluate the usefulness of the information : Assume that a new company is considering entering the cola market. Before it does any primary research, it wants to investigate secondary research.
How has social media aided in audience analysis : 1. How do the types of jobs available today differ from jobs available for the last three decades? What has been responsible for these changes?
Conduct comparative evaluation of brand name and packaging : Conduct a comparative evaluation of the brand name and packaging of two brands of bath soap or body wash from the perspective of health- and environmentally.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the security vulnerabilities associated

Briefly describe your mobile device and another device currently on the market that uses a different OS. Explain the security vulnerabilities associated with each device. Explain the security solutions that would address the vulnerabilities. Final..

  Elements of a digital computer

What is a printed circuit board on which the CPU, RAM chips and other electronic circuit elements of a digital computer are frequently located?

  Grasp and the software development kit

Using j Grasp and the Software Development Kit, write a program in response to the following prompt:

  Represent the fixed point decimal number

(a) Represent the fixed point decimal number + 88.875 in IEEE 754 floating point format. Express your final answer in hexadecimal showing all the working.

  Slugworth candies

Slugworth Candies, LLC, is a candy maker company that employs 450 people. The company is composed of six departments: Executive Staff (20), Human Relations (6), Finance and Accounting (15), Marketing and Sales (15), Factory (150), and Research & D..

  Torque m that should be applied to the screw

Determine the torque M that should be applied to the screw to start lifting the 6000-lb load acting at the end of member ABC

  Physical network for the south dakota campus

Develop a 12- to 14-slide proposal presentation in which you present your solutions to the South Dakota Network dilemma. The presentation should include the following:

  Find a new product or system that manipulates secret data

Find a new product or system that manipulates secret data. This might be the same product or system you analyzed for Exercise 1.8. Conduct a security review

  Relationship between current interest rates

Based on your answer to question (a), what is the relationship between current interest rates, the coupon rate, and time to maturity?

  Why biometric technology accepted/utilized in near future

why biometric technology, fingerprinting application will become most commonly accepted/utilized in the near future?

  Compromise an organization confidential information

Employees can compromise an organization's confidential information, deliberately or inadvertently, through their network and Internet usage. Such concerns prompt companies to introduce security monitoring of their employees. However, they have to..

  Amount of net working capital

This amount of net working capital will need to be replaced once the machine is sold. The corporate tax rate is 35 percent. The appropriate discount rate is 12.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd