Reference no: EM133479
QUESTION 1
A pool of newly qualified doctors are not satisfied with their existing revenue and decide to set up an individual on-call night service i.e. the doctors will go to the patient's residence to consult the patient. It is considered that they will need a centralised booking system. The escritoire will then allocate a request for intervention to a doctor who will then go to the patient's house for a consultation. The doctor may also recommend and give medicines to the patient. The patient will then pay the doctor in cash or by credit card. The approximation costs are: Capital costs: Rs 2,000,000 (for purchase of equipment, cars and other logistics) recurring costs: Salary: Rs 150,000 per month Travelling costs: Rs 50,000 per month The guesstimated revenue is Rs 10,000 per day. The service is expected to be operational round the clock every day all through the year.
(a)Carry out a technical feasibility for the project.
(b)Does the project seem to be cheaply feasible?
(c)On what restrictions are the economics of the project based?
(d)How responsive is the project to small changes (10%) in these parameters?
(e)State any TWO items which could have an impact on the economic feasibility of the project and which have been ignored in the above case.
(f)Declare TWO operational risks which could affect the project after its implementation.
(g)Measure the exposure to these risks.
(h)What would you do to lessen these risks?
Conserving biodiversity
: legal framework to guard biodiversity, marine biosphere, Ex-situ conservation, marine biodiversity, conservation of biodiversity, International Conventions
|
Ecosystem
: preserve biodiversity, social, environmental and cost-effective perspective, in-situ conservation, ex- situ conservation, Invasive alien species, conservation education a significant tool for protecting biodiversity, marine biodiversity, Ecosystem Ba..
|
Energy transition
: energy, poverty, agriculture, biodiversity, Energy Management, geothermal energy, use of E10 in petrol vehicles, use nuclear power to meet the electricity demand, sustainable energy
|
Information flow complexity
: Cyclomatic complexity, monitoring devices, wireless dial-out device with controller, Request for Proposals (RFPs), Weighted IFC
|
Project management for engineering
: economic feasibility of the projec, restrictions are the economics of the project based, technical feasibility for the project
|
Ip spoofing
: honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer
|
Protocol stack for wap2
: WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..
|
Network threats
: confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem
|
Ssl for http traffic
: SSL Record protocol of the SSL protocol stack, RADIUS, networks for access control, DNS poisoning, Spear Phishing attacks, centralised or decentralised access control, encrypt email data
|