Define a work breakdown structure

Assignment Help Management Information Sys
Reference no: EM132158440

Assignment : VoIP Part 1 (Work Breakdown Structure)

This assignment contains two (2) deliverables: a summary document to be delivered in a word processor document format and a Work Breakdown Structure (WBS) to be delivered in a project file.

Overview

As the project manager for an IT department, you have been assigned to manage the project of deploying a new VoIP phone system to the company's campus.

The campus consists of three (3) different buildings, each with twenty to fifty (20 to 50) workstations. The project must be completed in ninety (90) calendar days starting on November 1.

Deliverable 1: Summary (MS Word or open source equivalent)

1. Write a two to three (2-3) page summary document in which you:

a. Summarize the project requirements and other assumptions (e.g., budget, human resources, workload, environmental dependencies, etc.).

b. Define a work breakdown structure and describe the methodology behind constructing one.

Deliverable 2: WBS (MS Project or open source equivalent)

2. Use Microsoft Project to create a WBS which:

a. Contains at least five (5) main tasks, one for each of the PMBOK® process areas.

b. Contains at least sixty (60) line items distributed in ten (10) or more work packages.

c. Contains Work Breakdown Structure Code for each task.

d. Presents a duration estimate for each task which results in a duration estimate for the project not to exceed the requirements described in the overview.

Deliverable one (1) of your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM132158440

Questions Cloud

Establish a sample hardware asset list : You are part of a disaster recovery team charged with completing the asset inventory at a small business that primarily sells a small selection of products.
Calculate the number of cycles per loader : Calculate the number of cycles per loader to fill each truck and Calculate the number of trucks required for each loader
Describe the different types of operating systems : Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS.
Describe how the two work together : Put yourself in the shoes of an IT Security Analyst that needs to describe the differences of a BCP and DR plan to a group of managers.
Define a work breakdown structure : As the project manager for an IT department, you have been assigned to manage the project of deploying a new VoIP phone system to the company's campus.
How often should servers be backed up : What is installed when you choose the RSAT-DFS-MGMT-Con feature? What are the different types of data backup that are performed?
Create a schema that supports the companys business : One of the main functions of any business is to be able to use data to leverage a strategic competitive advantage.
Why were the contractors held accountable : How the U.S. Veterans Administration gave contractors access to HIPAA Compliant Data. The individuals who were granted access to the data did not properly.
Determine the main roles of the agile project team : Determine the main roles of the Agile project team and explain whether the product manager should be from the IT field or non-IT related field.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why is supply chain important

Short two-paragraphs on the importance of the supply chain. Discusses how companies are transitioning from a manufacturer-driven chain to a customer-driven chain.

  How would you incorporate diversity in designing a team

Discuss team identity. Why do you feel attached to certain groups and teams but not to others?

  Determine some of the legal and technical challenges

Organizations must be aware of the different regulations that apply to their organization and business sector, such as HIPAA, FERPA, CIPA, and others.

  Write a review article for vpn security issues

Assignment - VPN Technologies and Issues. Write a review article for the following topics - VPN Replacement Technologies and VPN Security Issues

  Improvement of the accounting information system

What kind of obstacles would you expect to have in communications between IT developers and accountants regarding development or improvement of the accounting information system

  Why do some online ventures fail

Based on your experience or research, what aspects of e-Business systems are important to understand to achieve success online? Why do some online ventures fail

  Achieve a competitive advantage

Recommend two (2) actions that a hospital could take in order to achieve a competitive advantage. Provide a rationale for your response.

  Create an infographic using an infographic maker

Create an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, displaying an organization chart .

  Different software development methods

Compare and contrast at least three (3) different software development methods. Explain why the testing of software products is of great importance

  Discuss the capability maturity model integration

After watching the videos below and reading about the Balanced Scorecard in Chapter 12, compare and contrast the Balanced Scorecard to one of the IT frameworks below (COBIT, ITIL, TOGAF, CMMI-Dev). Describe the context in which the Balanced Scorec..

  Planning electronic commerce initiatives

Read at least three articles that are no more than 12 months old. Apply the content from the articles to planning electronic commerce initiatives.

  What is information security

What is Information Security? How does the proper application of Information Security can reduce risk?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd