Create a gantt chart illustrating the project tasks

Assignment Help Basic Computer Science
Reference no: EM131047699

Case Study: Building an Access Control System

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.

Create a 3-4 page project plan for this project in which you:

1. Include a one-half page project scope statement.

2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.

3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).

4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment must:

• Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

• Distinguish between non-functional and functional requirements.
• Use contemporary CASE tools in process and data modeling.
• Use technology and information resources to research issues in systems analysis and development.
• Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Verified Expert

The solution file is prepared in ms word which discussed about to build an access control list for small college. The report has introduction , problem statement , Gantt chart of project, system design , Major task and conclusion of the project. The project plan done it in ms project to create task and Gantt chart of the project. The report has 1300 words around and references are included as per APA format.

Reference no: EM131047699

Questions Cloud

An example of political risk : Which of the following is not an example of political risk?
Average profit margin and average total asset : ABC corporation has a below average profit margin and a below average total asset turnover, yet their VP of Accounting claims the firm's ROE is above average! Which of the following is correct?
Combined communications is new firm in rapidly growing : Combined Communications is a new firm in a rapidly growing industry. The company is planning on increasing its annual dividend by 21 percent a year for the next 4 years and then decreasing the growth rate to 5 percent per year. The company just paid ..
What is the current price of the firms stock : Dartsch Corporation just paid a dividend of euro 1.45. Dartsch is expected to increase its dividend by 12 percent for the next five years, thereafter the firm's dividends are expected to grow at a more modest rate of 4 percent indefinitely. If the re..
Create a gantt chart illustrating the project tasks : Create a Gantt chart illustrating the project tasks. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).
Most ratios are difficult to interpret in isolation : Most ratios are difficult to interpret in isolation, but which of the following is almost certainly Bad News, especially if the general economy is in excellent condition?
Advantage of transitioning firm from private business : Which of the following is NOT generally considered an advantage of transitioning a firm from a private business to a public corporation, despite the time and expense required to do so?
Write regression equation that can be used to predict sales : Use the above results and write the regression equation that can be used to predict sales. Estimate the sales volume for an advertising expenditure of 3.5 million dollars and 45 salespeople. Give your answer in dollars
Decision when raising capital : Which of the following is NOT a Stage II decision when raising capital

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a website consisting of many pages

create a website consisting of many pages organized in groups of pages linked off of the main page. The website hierarchy and key page namesare given

  Make a marketing plan for

Final Assignment A: Choosing a Business Idea In your next assignment, you'll create a marketing plan for a business. Before you create a marketing plan, you'll think about what type of business you'd like to make a marketing plan for.

  Advantages and disadvantages of wlan in an organization

Assume you are the IT manager for an organization tasked with evaluating whether or not to deploy internal wireless access for employees.

  Some businesses and organizations use active directory

Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access.

  Write a basic java program called that simulates a lottery

Your program will generate a 5-digit lottery number, and then it will prompt the user to enter a guess in the form of a 5-digit number. Your program should then determine how many numbers.

  Discuss the legal theories used by the plaintiff to recover

products liability research paper due week 10 and worth 250 points select a company that has been the subject of a

  Discuss the most effective way to implement policies

4 to 7 pages research paper. One of the biggest risks that companies face is advanced persistent threats. Discuss the most effective way to implement policies that mitigate the chance of an insider either taking part in or facilitating an adva..

  Software engineering procedure

Can correctness proving solve the problem that the product as delivered to the customer may not be what the consumer really requires?

  File contains data for an individual wedding album

Each line of this file contains data for an individual wedding album and delivery. These data  are used to determine the total cost of producing and posting a batch of albums to a  customer. Each column of this file contains values for the following..

  Whose trademark is the operating system unix

Whose trademark is the operating system UNIX? A.Motorola B.Microsoft C.BELL Laboratories D.AshtonTate

  Describe how host-based intrusion detection works

Describe how host-based intrusion detection works, briefly contrasting it with network-based intrusion detection. Explain three types of threats against which HIDS is particularly effective.

  Calculate the problem and stop after the condition

Use the information below to create a storyboard (which can be a text based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for you..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd