Draft compliance matrix and compliant proposal to rfp

Assignment Help Computer Network Security
Reference no: EM13940213

Assignment: Draft Compliance Matrix and Compliant Proposal to RFP

Note: The assignments are a series of papers that build upon one another.

Refer to the following resources to complete this assignment:
FAR § 15.2 (Solicitation and Receipt of Proposals and Information)

As the Contract Officer (CO) of your newly formed company, you will create a compliance matrix, and then draft a proposal in response to the RFP from Assignment 2.

Write a five to seven (5) page Compliance Matrix and Compliant Proposal to your RFP paper in which you:
Create a compliance matrix and prepare a FAR-compliant proposal in response to the RFP from Assignment 2. Note: You may create and /or assume all necessary assumptions needed for the completion of this assignment.

Apply the appropriate FAR clauses in order to meet compliance in contract formulation and award.
Apply the knowledge gained from your analysis of Government Accountability Office reports / decisions to identify and account for FAR compliance issues and contributing factors.
Apply the knowledge of planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency is in compliance with the FAR requirements.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • The specific course learning outcomes associated with this assignment are:
  • Identify and apply the appropriate Federal Acquisition Regulation (FAR) clauses to meet compliance in contract formulation and award.
  • Analyze Government Accountability Office reports / decisions to identify FAR compliance issues and contributing factors.
  • Analyze the planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency is in compliance with the FAR requirements.
  • Given a contract disputes situation, evaluate the various options and select the appropriate administrative and judicial processes available to resolve the dispute.
  • Use technology and information resources to research issues in government contract law.
  • Write clearly and concisely about government contract law using proper writing mechanics.

Reference no: EM13940213

Questions Cloud

Create a spreadsheet model : Your task is to create a spreadsheet model (using Microsoft Excel) showing your friend which alternative is to prefer. In particular your friend wants you to show her the following in the spreadsheet model: Show by calculation what would be the p..
The dividend projected to be growing : Shares of SoHot Donuts common stock are currently selling for $15. Next year’s dividend is expected to be $1.50 per share and the market rate of return is 10%. At what rate is the dividend projected to be growing?
Explain concept of decoupled organization as it relates : Large organizations face the threat of becoming decoupled. Explain the concept of a decoupled organization as it relates to a criminal justice agency. Discuss some of the challenges that decoupling presents and strategies utilized by criminal just..
Equity prior to the announcement is expected gain or loss : FARO Technologies, whose products include portable 3D measurement equipment, recently had 17 million shares outstanding trading at $42 a share. Suppose the company announces its intention to raise $200 million by sell new shares. What do market signa..
Draft compliance matrix and compliant proposal to rfp : Create a compliance matrix and prepare a FAR-compliant proposal in response to the RFP from Assignment 2. Note: You may create and /or assume all necessary assumptions needed for the completion of this assignment.
Calculate the variable cost and contribution margin per unit : Calculate the variable cost per unit and the contribution margin per unit. Calculate the contribution margin ratio and the variable cost ratio.
Determine and print the weekly rate. : Write the Java Statements that retrieve the age of the child and the number of days the child will be at the day care center.
Estimate of the the call options value-stock price model : You are attempting to value a call option with an exercise price of $90 and one year to expiration. The underlying stock pays no dividends, its current price is $90, and you believe it has a 50% chance of increasing to $125 and a 50% chance of decrea..
Calculate the net present value for the two options : Show by calculation the net present value for the two options (selling cars, mileage fees). Also, according to NPV suggest which alternative you advise your friend to choose

Reviews

Write a Review

Computer Network Security Questions & Answers

  A digital evidence and computer crime and technology and law

Digital Evidence, Computer Crime, Technology and Law- As digital criminals have become more sophisticated, security-related incidents have become substantially more diverse in nature, and their impact on society is increasingly more destructive.

  Provide a report - an industry perspective of cyber security

Brief introduction to the topic, stating clearly the name and credentials of the presenter and brief overview of what the lecture was about and then setting out the interesting aspects that you are going to be covering in more detail  in your ..

  Airplane technology security

airplane technology security

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  Expected time to find all users passwords

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Identify the types of network components devices and

define the requirements and then design an appropriate network that would support this dental practice. your answer

  What are service level agreements

What are Service Level Agreements (SLAs) and why are they a critical component of any IT Outsourcing agreements?

  How does csma-ca in dcf handle media contention

How does the WiMAX privacy sublayer provide security for a WiMAX network? How does CSMA/CA in DCF handle media contention?

  Description of des encryption feistel structure algorithm

Prove that y’ = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented). [This is Question 3.3 of the textbook. Hint: this can be proved using the “high-level” description of DES encryption Feistel structure ..

  Decrypt cipher-text by using secret key

Decrypt the cipher-text c = 12 by using secret key sk = (p, q) = (11, 13), where te corresponding public key is pk = (N, e) = (143, 13).

  What is the significance of nevis island

ndra changes banks following her troubles with MBT. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system.

  Network design paper

Network Design Paper

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd