Explain four methods for identifying-selecting IS projects

Assignment Help Basic Computer Science
Reference no: EM132447376

Apply: Project Selection and Planning

Assignment Content

After last week's presentation, the board of directors wants to continue consideration of a new webstore for Pine Valley Furniture. The board has asked you to assist them in selecting and initiating which project to do. They are considering a webstore for one of their three target markets:

Corporate furniture

Home office furniture

Student furniture

The board wants you to help them determine which project to select and get started on the planning process.

Prepare a 10- to 16-slide presentation or write a 3- to 4-page executive summary to help the board choose.

Explain four methods for identifying and selecting IS projects. Compare the characteristics of each and identify the strengths and weaknesses of each method.

Identify valuation criteria when classifying and ranking the three projects, and then rank them.

Summarize the project initiation and planning process so the board knows the next steps.

Reference no: EM132447376

Questions Cloud

Discuss risk-costs of compromised data integrity breaches : Discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine,
What are some of the strategies for reducing the risks : What is the weakest link in the security of an IT infrastructure? What are some of the strategies for reducing the risks?
Create list of stakeholders for the ir planning committee : Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee
Describe basic input output system and read only memory : Describe Random Access Memory (RAM) and its purpose. Describe Basic Input Output System (BIOS) and Read Only Memory (ROM).
Explain four methods for identifying-selecting IS projects : Explain four methods for identifying and selecting IS projects. Compare the characteristics of each and identify the strengths and weaknesses of each method.
Industry experts believe blockchain is technology : Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.
Evaluate its preparedness for virtualization : Describe the organization's environment, and evaluate its preparedness for virtualization.
Federal information security management act : In chapter 8 you should have read about the Federal Information Security Management Act (FISMA). What you just discussed in your paper about FISMA
Business understanding and data preparation : Below are steps used in data mining. Please provide why each of steps listed below are important in data mining. Business understanding. Data preparation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Problem regarding the lipophilic hormones

1. Hormones: 2. Lipophilic hormones: 3. Hydrophilic (amino-acid based) hormones:

  What potential consequences would an organization face if

powerpoint 5 slides not including first and last 250 speaker notes more than 2 references1. what are the definitions

  Mean for gcc compiler in linux

What does the attribute "packed" and "aligned" mean for GCC compiler in Linux? How to use these two attributes? Please give example code segments.

  Challenges of implementing and maintaining the technology

Discuss the challenges of implementing and maintaining the technology. Examine how the technology will evolve in the next 5 years.

  Earnings and dividend forecasts made

The following are earnings and dividend forecasts made at the end of 2012 for a firm with $20.00 book value per common share at that time. The firm has a required equity return of 10percent per year.

  Design a production system to control the elevator

Design a production system to control the elevator in an efficient manner. (It is not efficient, for example, to reverse the elevator direction from going up to going down either if there is someone still inside the elevator who wants to go to d h..

  Carry your intermediate computations

Carry your intermediate computations to at least four decimal places. Report your result to at least three decimal places.

  Visuals for your presentation

Cis 500-Your project has been staffed-you are about to meet with team for first time.Initial impressions are important and you'll need visuals for presentation.

  Find the name of a famous inventor

Question: Find the name of a famous inventor who claims to have achieved wireless transmission quite some time ago.

  Organization encourage positive organizational behavior

Does Google as an organization encourage positive Organizational Behavior? If yes, in what ways and give examples. 300-350 words

  Advantages of performing encryption at the disk-block level

What are the advantages of performing encryption at the disk-block level, below the file system? (Mark all that apply.)

  Montana mountain biking

Jerry Singleton founded Montana Mountain Biking (MMB) 18 years ago. MMB offers one-week guided mountain biking expeditions based in four Montana locations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd