Project manager in the it department for a university

Assignment Help Basic Computer Science
Reference no: EM132134152

Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create faculty intranet. The university has multiple campuses in various locations, and professors and other faculty need to be able to easily post questions, schedules and other documents to share in a secure environment. Mary Kate performed the following steps to begin the intranet project. She performed a needs analysis. Mary Kate interviewed the university faculty to determine their needs for an intranet and the uses they foresee for it. She discovered that several of the professors were working on a research project and wanted to use the intranet to facilitate group discussions, as well as to host periodic Webinars for professors at other universities. She chose the project team. Mary Kate enlisted members of the IT department for the project, including someone to install firewalls so users have more secure access to the Internet, and someone to set up the site to host Webinars. She determined the project constraints. Mary Kate determined when the intranet needed to be live. She considered how long she would have the services of the various team members, how long team members could work on this project before being assigned to other tasks, and when the first Webinar was scheduled. Once she gathered all of this information, she was able to determine the project scope and constraints. She created the project schedule. Mary Kate worked with the project team to outline the tasks and task relationships required to complete the project. She assigned resources to specific tasks so that each person was aware of his or her role in the overall project plan. She scheduled weekly meetings for the duration of the project. Mary Kate included the CIO, project team members, faculty members and all other stakeholders in the meetings. She created a project status report and an issues log. Mary Kate used these documents in each meeting to apprise stakeholders of the project's progress and to introduce any problems or issues that had arisen since the last meeting. Once Mary Kate had performed all these tasks, she was ready to begin the executing phase of the project.

Which steps already performed by Mary Kate are part of the initiating phase for this project? Which steps are part of the planning phase? Has Mary Kate overlooked any steps in the first two phases of this project? What other tasks might she need to perform? What tasks might Mary Kate perform in the executing phase? In the controlling phase? In the closing phase? How might scope creep occur in this project? How could it be managed?

Reference no: EM132134152

Questions Cloud

Accesses a program might require : In terms of reducing the total number of memory accesses a program might require. Using the arithmetic expression S = (A+B)-(C+D), support this statement.
Are search algorithms tied to data structures being searched : Are search algorithms tied to data structures being searched, or can they be utilized in other scenarios?
Prepare research project on current management problem : Each student will submit a research project that selects a current management problem and applies one or more principles of management discussed in the class.
Classifier performance on the training data set : With regards to data mining/ business analytics, Why is it not ideal to evaluate a classifier's performance on the training data set?
Project manager in the it department for a university : Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create faculty intranet.
Calculate Holly taxable income and net tax payable : TAXA2000 - INTRODUCATION TO AUSTRALIAN TAX LAWS QUESTIONS - Calculate Holly's taxable income and net tax payable
Help with a java program that takes two arrays : That is, it returns an array c of length n such that c[i]=a[i]*b[i].
Which statement do you think is the most important : Based on your understanding of financial statement analysis, of the three statements (Income Statement, Balance Sheet, Statement of Cash Flows) which statement.
How could the contracts manager further secure this file : Consider some of the other Internet services discussed in this lesson. Which ones would be inappropriate for transmitting this file? Why?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How do you integrate python and mysql

How do you integrate Python and MySQL? Can you also explain how you iterate through a JSON field in a Python?

  How operations managers apply planning

Question 1. Explain how operations managers apply planning, organization, leading, and controlling to the 10 strategic OM decisions. Please include examples in your response.

  Implement in an organization

Pick one of the policy that is available in Windows 2012 Server and explain it. Why do you think this policy is an important one to implement in an organization? What are the negative consequences for not setting this up properly?

  What takes place with regard to a data transfer instruction

The MOV instruction is to be used to copy the information stored in word N7:20 to N7:35. What address is entered into the source and the destination?

  Find the type of grammar

S - > a ? b | b ? c | aB S-> ? S|b

  Can the conservators cancel the deed

Conrad Schaneman sr v. Lawrence Schaneman. Can the conservators cancel the deed?

  Remove duplicates from an array

Here's an interesting way to remove duplicates from an array. The insertion sort uses a loop-within-a-loop algorithm that compares every item in the array with every other item.

  Write insertion and removal operations for this tree

In a doubly linked chain, each node can point to the previous node as well as to the next node. Figure 4-9 shows a doubly linked chain and its head pointer. Define a class to represent a node in a doubly linked chain.

  An example of a picture effect for images in powerpoint 2007

An example of a picture effect for images in PowerPoint 2007 would be

  Cost estimate generated by the project team

Why is the cost estimate generated by the project team likely to be different from the cost estimate created by senior management?

  Explain how access restrictions on a folder or directory

Explain how access restrictions on a folder or directory can block a user's access to a file, even if the file itself may be readable by that user.

  Indicate whether or not there is a carry

1 ) What is the base-10 equivalent of: 1111, a 4-bit one's complement number 4) Add the following 16-bit 2's complement numbers (represented in Hex): 78CF + FAB4 and indicate whether or not there is a carry and/or an overflow generated. Also, if n..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd