Perform project feasibility study using suitable methods

Assignment Help Computer Engineering
Reference no: EM133538633 , Length: word count:6000

IT Project Management

Scenario
In this assignment you will choose and manage a suitable IT related project. The IT related project could be a MIS solution, a game development or a mobile application development. Ideally you should work for a "live client" e.g. a local business who wants a business solution which could be an advanced website.

Task 1 - Project Proposal Instructions
Once you have agreed your IT research topic with your tutor, produce a detailed proposal for the research project which includes the following:

a. In the introduction, identify potential IT projects required from an appraisal of established business objectives of the client.
b. Perform project feasibility study using suitable methods.
c. Determine the project's aims and objectives and share them with key stakeholders.
d. Review project methodologies suitable for the chosen project and select a suitable methodology with justification.

e. Second part of the proposal is about planning your project. Produce a project management plan that covers aspects of cost, scope, time, quality, communication, risk and resources.
f. Follow the plan by producing a work breakdown structure.
g. Finally, create milestone schedules for monitoring and completing the aims and objectives of the IT project.

Task 2 - Project Management and Report

Instructions

Manage the computing project and agree with your tutor/client the communication methods you intend to use to update them on progress.

You will need to keep evidence throughout the project with the use of a supervisor log that shows:

a. Monitor project progress according to your project plan.
b. Manage risks and issues arising from your project following the agreed procedures.
c. Manage changes in your IT project according to agreed procedures.
d. Report on the progress of your IT project to appropriate stakeholders using agreed communication methods.

Task 3 - Post Implementation Report Instructions
In this task you are required to produce an evaluative report that includes the following:

a. Critically evaluate and reflect on the project outcomes.
b. Reflect on the value of undertaking the IT project to meet stated objectives and
discuss the lessons that you have learnt.

Manage the computing project and agree with your tutor/client the communication methods you intend to use to update them on progress.

Reference no: EM133538633

Questions Cloud

Describe potential challenges or risks that may be inherent : Describe any potential challenges or risks that may be inherent in the technologies associated with these trends you described.
Design and build class diagrams using a uml tool : Design and build class diagrams using a UML tool for the above user case and Define/refine class diagrams derived from the given extension code scenario using a
Give an example of prejudice and racial stereotype : Give an example of prejudice and racial stereotype. What roles do race and social class continue to play in the United States?
Does the show feature a traditional nuclear family : Does the show feature a traditional nuclear family, step-family, single parent family? Do both parents work outside of the home? Are household duties divided
Perform project feasibility study using suitable methods : Perform project feasibility study using suitable methods and Determine the project's aims and objectives and share them with key stakeholders.
How healthcare professional proactively plan to update skill : How should healthcare professionals proactively plan to update their knowledge and skills to respond to the major public health issues and challenges facing?
How does this film help us to understand racial trauma : How does this film help us to understand racial trauma and the historical moment we are in with regard to the Black Lives Matter movement?
Produce a comprehensive design of a network : Produce a comprehensive design of a network and providing an evaluation of typical network protocols and standards and also an evaluation of different network
Explain what the jenesys programme is : Explain what the JENESYS programme is and how does participating in such a programme help strengthen relations between Japan and the Pacific Island countries.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Evaluate and choose appropriate software design patterns

Demonstrates an ability to evaluate a problem and choose an appropriate software design pattern. Demonstrates a sound understanding of the chosen software

  Programming project comprises writing a program that

programming project involves writing a program that computes the average salary for a collection of employees of

  Write an integer array of integers with 4 elements

Write a function template midElement that takes an array A and its dimension N and returns the middle element of the array. In the main function.

  What is the dining philosophers problem

What are the monitors? What is the Dining Philosopher's Problem? How do you represent the problem logically and also discuss the solution to the problem

  Write a driver program to test all your methods

Give the definition of a class named Doctor whose objects are records for a clinic's doctors. Write a driver program to test all your methods.

  Why is it important for business strategy to is strategy

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

  Designing the network infrastructure using given details

Designing the Network Infrastructure: Bacon Institute is an organization that provides educational offerings to nontraditional students.

  Identify the necessary computers and devices

identify the type of computer: desktop computer; mobile device; all-in-one, etc. identify the platform requirements identify the processor requirements

  How can cryptography can be used to facilitate security

How can cryptography can be used to facilitate security, How can the security of IoT be improved

  Why do you think the given method is not used any more

Since a tape can easily be simulated on disk (as a file), why do you think this method is not used any more?

  Demonstrate the concepts of phase and group velocities

Two copropagating plane waves that have the same magnitude but a small frequency difference.

  Is dhcp server detection and ip forwarding enabled

Is DHCP Server detection and IP Forwarding enabled have security risks after a vulnerabilities scan, what can be done to fix it. Please explain and provide

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd