How will risks be communicated to all project participants

Assignment Help Basic Computer Science
Reference no: EM132675537

Think of how many risks come into play when you decide to conduct a simple project, such as painting your living room. The following are some examples of risks:

What type of paint will you use (and can you afford high-quality paint)?

Who will move that brand new, big screen TV?

Who is going to paint?

Do you have the time, money, and resources?

Have you ever considered any of this, or do you simply cover up as much things as you can and start painting?

Risks exist regardless of whether people acknowledge it or not. Depending on the complexity of the project, the number and type of risk multiplies. Everyone has their own solution to each risk, but when working with a group within an organization, fragmentation such as this becomes counterproductive and a major risk in the end.

Scenario :

I have come with an Idea called ROSE which stands for Reserve on Site Easily, its a application that can be used on any phone. How it works is by lets say someone doesn't have a Wi-Fi connection or is not by Wi-Fi. What would happen is once by or near Wi-Fi their reservations will be saved and than will be sent to the hotel they would like to stay at, this will save a lot of time for not only them but the hotel as well. This will also save their spot until they have reached Wi-Fi, this will also be able to show what's available and what's not available when not on Wi-Fi.

Assignment:

Group Portion

As a group, you are to describe a project that all of you will participate in, and include the following:

Define the goal of the project

List the project's duration

Explain who are the stakeholders (those who participate)

Review benefits by the project implementation (My Portions)

Explain your need for resources

You need not go into in-depth details on the project.

Individual Portion

Each group member is to come up with 2 risks to this project. Each risk must include the following elements:

What technique(s) was used to identify the risk?

What type of risk is it, and does it have specific IT elements and considerations?

How was the risk assessed, and how does it rank with all of the risks identified by the group?

Is the risk qualitative or quantitative, and does it work with an EMV or Pareto analysis with all of the risks identified by the group?

What is the response to this risk, assuming it occurs during the project's lifecycle?

Provide at least 2 contingency plans for this risk (one primary and a second backup).

Group Portion

A summary of the project (as discussed in the 1st group discussion)

How will the risks be monitored and controlled?

How will risks be communicated to all project participants?

What EVM comes from the risk management plan? (My Portion)

Are there any special tools utilized by the plan to manage all identified risks?

Reference no: EM132675537

Questions Cloud

Employee Monitoring : Is monitoring an employee's work on a computer a desirable or undesirable activity from a manager's perspective?
Planning and conducting diversity training : You are responsible for planning and conducting diversity training for your organization. List and explain some of the topics you would include in the training.
Financial Acumen and Sarbanes-Oxley : Discuss the benefits of establishing solid financial acumen in a company? Sarbanes Oxley and the importance this act has for American businesses today
What is nursing informatics : Discuss ways that nursing informatics could be applied to all areas of professional nursing practice, including clinical practice, administration, education,
How will risks be communicated to all project participants : How will the risks be monitored and controlled? How will risks be communicated to all project participants?
The cost of inadequate controls : Because you performed so well in the scenario for the Access Control Strategy Report assignment, upper management at LOTR Experience
Critically examine the cia concept identifying the strengths : CIA is the underlying concept of providing uninterrupted, continuous and reliable access to information resources - Critically examine the CIA concept
Create a piece of work that relates themes : Create a piece of work that relates themes from the Book of the Year, This is my Song (for example, racism, persecution, trauma, hope etc.) to the CST principle
How training benefits the organization : The impact of training & development on productivity & wags and How training benefits the organization - Training and development

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd