Information for building project

Assignment Help Basic Computer Science
Reference no: EM13763781

This exercise begins with information for a building project. Working in Microsoft Project, you will create the task list, including summary tasks and their sub-tasks, create links between tasks and their predecessors, add resources, and make changes to the original plan.

A. Enter the following tasks, including the specified duration, specified predecessors, and specified resources. Tasks that are bolded are summary tasks and the indented tasks are sub-tasks. HW7 Tasks File. Make the Start date of the project: December 15th, 2015.

B. Identify the Original Finish Date for the entire project. Save the baseline for the project.

C. You now have received the following update from the field:

Items 1-20 completed on time
Item 21 delayed as inspector was on vacation causing a 3-day delay, but now is complete.
Item 24 Wallboard is 50% complete
Item 25 Stairway is 65% complete
Item 26 Since the painting contractor could not start on time he has now informed you that he has started another job and you will have to wait until it is done. The new date he will be available to start is May 5th, 2016.
Item 28 the landscape crew says the raised garden material will not arrive on time and he is not able to start until May 19th, 2016.

Input the above data into project (do not change the baseline plan). Annotate reasons for schedule changes (e.g., inspector delay, painting). (Use the notes feature)

D. The customer wants to know if the walk-through date and final project completion date is on schedule. Is it? If not what are the dates?

E. The boss just called and said that the delay is unacceptable to the customer. What can you change to make the project finish on time? Remember to give good justification for the changes

Reference no: EM13763781

Questions Cloud

External analysis of the motorcycle industry : Discuss whether you think PEST analysis and Porter's 5 Forces analysis would be useful tools for H-D executives to help them make wise strategic choices. Give examples to support your arguments and above all, demonstrate that you have a strong gra..
Discuss the numerous ways an early childhood program : Discuss the numerous ways an early childhood program and its staff could provide a safe and appropriate learning environment for Carly and how to adapt the environment to meet her needs.
Project annual after tax cash flow : What is the expected value of each project's annual after tax cash flow? Justify your answers and identify any conflicts between the IRR and the NPV and explain why these conflicts may occur.
Compare the views of aristotle and descartes : Compare the views of Aristotle and Descartes on the relationship between body and mind/soul. 2. Compare the views of John Locke and Immanuel Kant on the role of nature versus nurture in knowledge acquisition.
Information for building project : This exercise begins with information for a building project. Working in Microsoft Project, you will create the task list, including summary tasks and their sub-tasks, create links between tasks and their predecessors, add resources, and make chan..
Regression analysis and its issues : Describe two methods for selecting variables into a regression equation for your imaginary study, and the rationale for using those methods.
Describe the core conflict represented in the story : Describe the core conflict represented in the story. Describe the theme of the story. Select three literary elements/techniques in the story and describe them.
Case study - the nokero story : Identification of appropriate issues to be analyzed and the tools and techniques for analysis - Case Study - The Nokero Story
Nursing and its body of knowledge issues : Describe the value of these concept analyses to your understanding of nursing knowledge.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Risk assessment tools

Risk assessment tools.

  Web e mail

Is web e mail access easier to use than other versions of e-mail.

  How would the physical security aspect of protecting compute

How would the physical security aspect of protecting computer assets relate in this case? Make sure to give some examples.

  Design a circuit that takes two 3-bit binary number

design a circuit that takes two 3-bit binary numbers A2A1A0 and B2B1B0 as inputs and that has single output L that is "one" if and only if A2A1A0 is less than B2B1B0. Your design can make use of NOT gates, XNOR gates, AND gates and OR gates as requir..

  Iris reviewed the scant stack of applications for the newly

Iris reviewed the scant stack of applications for the newly created security manager position and frowned. There should have been many more than just three applicants for the position. After the human resources incident earlier in the month, sh..

  Internet access providers

Should Internet access providers or telephone companies be allowed to monitor how you use your Internet or telephone connection? Why or why not?

  Finding content of top of stack-call instruction is executed

Specify the content of PC, SP, and the top of the stack in the following situations: After the call instruction is executed.

  Demonstrate method polymorphism

Write some usable code snippets that demonstrate method polymorphism.

  Explore and estimate software programs

Explore and estimate software programs based on following criteria: Needs assessment -- Why would the prospective user require program? Write down the features of the program?

  Construct a 3-bit counter using three d flip-flop

Construct a 3-bit counter using three D flip-flops and a selection of logic gates. The inputs should consist of a signal that resets the counter to 0, called reset

  How to deal with each type of known attack

Include Denial of Service attacks, Spoofing, Replays, TCP Session Hijacking, and Attacks on Encrypted Data (such as passwords).

  The federal government uses many techniques

The federal government uses many techniques to ensure that multiple high officials are not exposed to the same vulnerabilities at the same time. For example, the president and the vice-president would be taken to separate safe areas in the even..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd