Performing effective project monitoring and risk management

Assignment Help Basic Computer Science
Reference no: EM132531039

Assignment : Performing Effective Project Monitoring and Risk Management

Imagine that you are employed as an IT project manager by a prestigious coffeemaker organization. This organization operates many coffee shops within the region and would like to promote its brand by creating a mobile application that will provide its customers with the ability to view the nearest coffee shop location within their geographical area.

As a member of the software development team, you estimate a total project cost of $150,000. You have designated control points to measure project progress. At control point 2, the following data is available:

Budget Cost of Work Performed $ 24,000

Actual Cost of Work Performed $ 27,500

There are various stakeholders that are interested in the progress of the project. These stakeholders include the marketing management team (internal customers), software designers, programmers, testers, and upper management. The software development team has attempted to release a mobile application of this magnitude in the past; however, lack of sponsorship, mobile development expertise, and technical infrastructure has limited the team's success.

Write a paper in which you:

1. Identify at least four (4) attributes of the mobile application development project that can be measured and controlled and evaluate how each is a critical factor for the success of the project.

2. Generate a project plan summary of the various project milestones. Develop a WBS that details work packages required to complete project scope.

3. Develop a workflow model that can be used to inspect and detect defects during the acceptance of this mobile product through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

4. Describe how the defects detected during the acceptance of the mobile application should be reported and explain the circumstances in which a defect may not require reporting.

5. Analyze the communication needs of the different project stakeholders. Explain the types of project status reports that would be useful to each.

6. Compute the cost variance, schedule variance, cost performance index, schedule performance index, and estimated actual cost using the information presented at control point 2. Interpret the project schedule and budget status from the calculations.

7. Explain how work package, binary tracking, and earned valued reporting can be used effectively during the maintenance phase of the software life cycle if various change requests may be assigned to individuals and processed on an individual basis.

8. Develop a risk register that will document all of the estimated risks. Assign one (1) risk management technique for each risk and explain the basis for your selection.

9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

• Develop a software project plan based on IEEE 1058 to solve a business problem.

• Explain the methods of creating, measuring, and controlling work products and work processes.

• Explain and analyze earned value reporting techniques in software projects.

• Describe ethical issues and risk management factors inherent in software projects.

• Use technology and information resources to research issues in IT Project Leadership Strategies.

• Write clearly and concisely about topics related to IT Project Leadership Strategies using proper writing mechanics and technical style conventions.

Reference no: EM132531039

Questions Cloud

Being the bridge and service delivery life cycle : Critique the idea that the CIO can be a bridge between enterprise finance, marketing, and sales functions. Justify the legitimacy of the statement.
Central repository and threat modeling : From the e-Activity, provide three examples of unintentional security threats and three examples of intentional security threats.
Framework for process reengineering in higher education : Abdous and He (2008) proposed a framework for process reengineering in higher education. Predict five (5) potential failures of the reengineered system
Managing vs. leading and team work : Describe at least three characteristics that distinguish managing from leading within the software project management discipline.
Performing effective project monitoring and risk management : Imagine that you are employed as IT project manager by a prestigious coffeemaker organization. Generate project plan summary of the various project milestones
Management information system : Read at least three academically reviewed articles on Management Information Systems and/or a company you're interested in,
Infrastructure and security : The infrastructure which encompasses the network solution and security considerations is a major consideration for your company.
Compare and contrast the two protocols : Compare and contrast the two protocols. Discuss how and why each is used, then discuss how they are similar and how they differ.
Discussion centers around concept of blockchain : Discussion centers around the concept of Blockchain. There is still much confusion regarding what Blockchain is and what it is not

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd