Create a gantt chart illustrating the project tasks

Assignment Help Basic Computer Science
Reference no: EM131039093

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.

Create a 3-4 page project plan for this project in which you:

Include a one-half page project scope statement.

Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.

Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).

Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment must:

Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

Distinguish between non-functional and functional requirements.

Use contemporary CASE tools in process and data modeling.

Use technology and information resources to research issues in systems analysis and development.

Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Verified Expert

The solution file is prepared in ms word which discussed about to build an access control list for small college. The report has introduction , problem statement , Gantt chart of project, system design , Major task and conclusion of the project. The project plan done it in ms project to create task and Gantt chart of the project. The report has 1300 words around and references are included as per APA format.

Reference no: EM131039093

Questions Cloud

Find the coordinates of the other point : The tangent line to the graph of g(x)=2x^3-7x at (1,-5) intersects the curve at another point. Find the coordinates of the other point. Round all non-terminating decimals in the calculation to seven significant digits. Round your final answer to t..
What are the steps for solving an equation : What are the steps for solving an equation? Should any other factors be accounted for when solving an equation? Should any factors be accounted for when explaining how to solve an equation? Explain your answer.
Create two more unit plans integrating science : Just create two more unit plans integrating science and math content of fractions, decimals, and/or percents. Ensure you have listed each of the science (NSES)) and math (NCTM) standards to include learning goals and objectives.It should be a sing..
What will be dollar cost of hedging with forward contract : How would you hedge your exposure with forward contracts and option contracts and what will be the dollar cost of hedging with forward contract?
Create a gantt chart illustrating the project tasks : Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
What is the mean of your sample : Obtain, generate, or select your own random set of 120 integers between 1 and 100. You may use a calculator, excel, or a table of random numbers to achieve this. Use your sample to answer the following questions:
Write report on high voltage power transmission line design : Write a good engineering report on high voltage power transmission line design and operation. Establish the need to calculate the electric and magnetic field profiles underneath electric power transmission lines.
Compare the role and powers of the office of management : Compare the role and powers of the Office of Management and Budget to the Congressional Budget Office. Choose a current policy issue. Discuss this issue in terms of the stages of the policymaking process.
Testing a random sample of eight of them : A computer company will screen a shipment of 30 processors by testing a random sample of eight of them. How many different samples are possible? Please answer in details.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Greedy algorithms for chained matrix

1. Show that none of the following greedy algorithms for chained matrix multiplica- tion work. At each step

  Estimate how much speedup would be gained from change

Suppose you are designing a computer system and are considering a change to your original design. Estimate how much speedup would be gained from this change. You must.show your work.

  Operations of information security

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it ..

  Implement a super class person make two classes student

Implement a super class Person. Make two classes, Student and Instructor that inherit from Person. A person has a name and a year of birth. A student has major and the instructor has a salary. Write the class declarations, the constructors, and the m..

  Write a program that asks a user for a file name and prints

Write a program that asks a user for a file name and prints the number of characters, words, and lines in that file.

  How will you run a process in background

How will you run a process in background? How will you bring that into foreground and how will you kill that process?

  Calculate the net expected value for the project risks

Calculate the net expected value for the project risks and opportunities cited above. How much should you plan for your contingency reserve budget based on the above?

  An incident command system

For the last question set up and diagram an Incident Command System for the following scenario. Define all the roles and responsibilities for each function area that would be included in this scenario. SCENARIO: At 10:05a.m. today, a hurricane/earthq..

  Problem regarding the business consulting

Remember Bill? He was the gentleman that you helpedto start up his business in week 4. Well his business is doing well, but he has come to you with some questions and concerns.

  Command and natural language

Command and Natural Language, The president of your company approached you with his iPhone in one hand and his iPad in the other. He has just purchased the iPhone 4S and is fascinated with Siri, the voice recognition software.

  Develop the tourism industry at sterling bay

Assume that tourism has been selected as the preferred industry to be developed. What type of tourism should be adopted? Describe examples of F&B, accommodation, transportation, attractions and events that suit the approach that you have recommend..

  Advantages of verifying the hash function

Explain the advantages of verifying the hash function of the bit torrent peer to peer network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd