How to allocate for the management reserve

Assignment Help Computer Engineering
Reference no: EM1334145

You are planning to make modifications to an existing application. You have identified:
30% probability of delay of receipt of resources - cost $50,000.
20% probability that the resources will be $10,000 cheaper than planned.
25% probability that there will be a problem integrating with existing software, cost to fix $3,500.
30% probability that the development may be simpler than expected, savings $2,500.
5% probability of a design defect causing $5,000 of rework.
Calculate the net expected value for the project risks and opportunities cited above. How much should you plan for your contingency reserve budget based on the above? You must show all of your calculations. How much would you allocate for the management reserve? What are your assumptions about these reserves?

Reference no: EM1334145

Questions Cloud

How do organizations decline : Why do organizations grow? How do organizations decline?
Interest rate differential : Assume interest rate differential in dollar and Swiss francs is 4 percent per annum-What actions would you take to profit from the above condition provided that you can borrow SF 1,000,000.00 or its dollar equivalent?
Shwo the training modules : Examine three training modalities and explian a scenario that would be most appropriate for each modality and why.
Uncovering barriers to effective implementation initiatives : Find the best method in uncovering barriers to effective implementation initiatives?
How to allocate for the management reserve : How much would you allocate for the management reserve? What are your assumptions about these reserves.
Addressing the attorney ethics : Do you think lawyers that contact potential clients by mail, after an accident would be in bad taste?
Describing problems relating to decision making : Identify and describe a minimum of 3 problems, relating to decision making that occur when managers complete performance reviews.
Bank one and bank enn interest rates-arbitrage opportunity : What arbitrage opportuity is available? Which bank would experience a surge in demand for loan? Which bank would receive surge in deposit. What would you expect to take place to interest rate the two banks are offering?
Question about hrm function : Prepare a presentation including detailed speakers notes that covers, in detail, the following areas Overview with brief description of all of the topics that NL&C needs

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describing the penetration test

By using the MS Word, write down the three-page summary explaining a successful penetration test. Which penetration tools and techniques do you think would be required in the successful penetration test.

  Suppose poisson arrivals and departures at each router

A CPU in a router can process 2 million packets/sec. The load offered to it is 1.5 million packets/sec. If the route from source to destination contains 10 routers (having no additional traffic), how much time is spent being queued and serviced by..

  Determining the asymptotic formula

Provide an asymptotic formula for each of the following recurrence equations, utilizing big “Θ” rather than just big “O” for better results whenever possible.

  Build the production software to meet our goal

Our department has been assigned the task of developing new software programs essential to supporting the introduction of Product ABC. We have narrowed our options to 4 possible system design.

  How to create an interactive java gui program

make an interactive Java GUI program (using JOptionPane's showOptionDialog) that converts miles to kilometers and vice versa, depending on what the user chooses.

  Developing the reports useful for business decisions

Database reports offer us with the capability to further analyze our data and offer it in the format which can be utilized to make the business decisions.

  Why organization that meets the company''s specifications

A software application has been delivered to your organization that meets the company's specifications. Using associated examples, describe problems which may arise when it is installed and used in your organization.

  Illustrate the constraint graph

Illustrate the constraint graph

  Write down the data in a text file

Write down the data in a text file. Ask users to put in their annual income for 3 years.

  Implementing model to check the vulnerability

Construct a simple threat model which explains the risk this represents: attacker(s), vulnerability, assets, attack vector, and the likelihood of occurrence, likely impact, and the plausible mitigations.

  Give a short overview of any five programs

Visit Web sites for companies that sell computer peripherals. Compile a list that contains as many types of input and output devices as you can locate on these Web sites. After compiling this list, be sure to document the Web sites you viewed to d..

  What aim does a firewall play in an organization

How varios two routers be used to provide separation of a LAN from the outside world? Provide references.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd